789 resultados para electronic commerce security
Resumo:
The Association of South East Asian Nations (ASEAN) Secretariat and its member states have repeatedly professed their commitment to the protection and advancement of women’s economic and human rights. Such commitments have included the Declaration on the Advancement of Women in ASEAN in 1988, the ASEAN Declaration on the Elimination of Violence Against Women in 2004, and the ASEAN Declaration of Human Rights in 2012, as well as the establishment of the ASEAN Committee on Women in 2002 and the ASEAN Commission on the Promotion and Protection of Women and Children in 2009. However, none of these regional commitments or institutions expressly take up the core concern of the Women, Peace and Security (WPS) agenda set out in United Nations Security Council (UNSC) Resolution 1325 in 2000. ASEAN has no 1325 regional action plan and amongst the ASEAN membership, the Philippines is the only state that has adopted a 1325 National Action Plan (NAP). We explore the possible reasons for lack of ASEAN institutional engagement with 1325, outline the case for regional engagement, and suggest specific roles for ASEAN Secretariat, donor governments and individual member states to commit to UNSCR 1325 as a regional priority.
Resumo:
The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.
Resumo:
Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.
Resumo:
Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...
Resumo:
As printed and flexible plastic electronic gadgets become increasingly viable today, there is a need to develop materials that suit the fabrication processes involved. Two desirable requirements are solution-processable active materials or precursors and low-temperature processability. In this article, we describe a straightforward method of depositing ZnO films by simple spin coating of an organometallic diethylzinc precursor solution and annealing the resulting film at low temperatures (≤200 °C) without involving any synthetic steps. By controlling the humidity in which annealing is conducted, we are able to adjust the intrinsic doping level and carrier concentration in diethylzinc-derived ZnO. Doped or conducting transport layers are greatly preferable to undoped layers as they enable low-resistance contacts and minimize the potential drops. This ability to controllably realize doped ZnO is a key feature of the fabrication process that we describe in this article. We employ field-effect measurements as a diagnostic tool to measure doping levels and mobilities in ZnO and demonstrate that doped ZnO with high charge carrier concentration is ideal for solar cell applications. Respectable power conversion efficiencies (up to 4.5%) are achieved in inverted solar cells that incorporate diethylzinc-derived ZnO films as the electron transport layer and organic blends as the active material. Extensions of this approach to grow ternary and quaternary films with organometallic precursor chemicals will enable solution based growth of a number of semiconductor films as well as a method to dope them.
Resumo:
Objective The move internationally by Governments and other health providers to encourage patients to have their own electronic personal health record (e-PHRs) is growing exponentially. In Australia the initiative for a personally controlled electronic health record (known as PCEHR) is directed towards the public at large. The first objective of this study then, is to examine how individuals in the general population perceive the promoted idea of having a PCEHR. The second objective is to extend research on applying a theoretically derived consumer technology acceptance model to guide the research. Method An online survey was conducted to capture the perceptions and beliefs about having a PCEHR identified from technology acceptance models and extant literature. The survey was completed by 750 Queensland respondents, 97% of whom did not have a PCEHR at that time. The model was examined using exploratory factor analysis, regressions and mediation tests. Results Findings support eight of the 11 hypothesised relationships in the model. Perceived value and perceived risk were the two most important variables explaining attitude, with perceived usefulness and compatibility being weak but significant. The perception of risk was reduced through partial mediation from trust and privacy concerns. Additionally, web-self efficacy and ease of use partially mediate the relationship between attitude and intentions. Conclusions The findings represent a snapshot of the early stages of implementing this Australian initiative and captures the perceptions of Queenslanders who at present do not have a PCEHR. Findings show that while individuals appreciate the value of having this record, they do not appear to regard it as particularly useful at present, nor is it particularly compatible with their current engagement with e-services. Moreover, they will need to have any concerns about the risks alleviated, particularly through an increased sense of trust and reduction of privacy concerns. It is noted that although the respondents are non-adopters, they do not feel that they lack the necessary web skills to set up and use a PCEHR. To the best of our knowledge this is one of a very limited number of studies that examines a national level implementation of an e-PHR system, where take-up of the PCEHR is optional rather than a centralised, mandated requirement.
Resumo:
Private title insurance has been the subject of much debate by law reform bodies and academics. This article adds a new dimension to the discussion by analysing its role against a recent scenario where a nun was betrayed by the actions of her brother, and compensation payable from the assurance fund, after much challenge by the registrar, amounted to in excess of $4 million.We ask whether the slow burning of title insurance into the psyche of Australian home purchasers will see state-based assurance fundings looking to minismise their role in the Torrens system. We also query how the rather more immediate electronic establishment of electronic conveyancing will alter the balance between the assurance fund, private title insurance and the increasing responsibilities on stakeholdes involved in conveyancing.
Resumo:
The ability of new information and communication technologies to pierce previously impenetrable physical, personal, and social boundaries has particular relevance to contemporary society and young people as there is now more information that can be collected, accessed, and distributed about individuals and groups. The ability to know about each other has become a central feature of many young people’s lives. The need to know is further complicated by other questions – Who knows? What do they know? What are the implications of this knowledge?. These questions are a consequence of society having become more mobile and networked enabling increased surveillance, tracking, and spreading of dis/information. With the acceleration of new pervasive and immersive technologies, these questions have taken on a new urgency and significance that go beyond an Orwellian Big Brother scenario. This chapter extends Foucault’s notion of the panopticon to take account of the challenges of an AmI environment of smart networked devices. By drawing on examples of recent young adult fiction, I examine some of the ways in which these texts invite their readers to reflect and speculate on the uneasy relationship between surveillance and democracy and what this means for individual rights and freedom, and a sense of place and belonging.
Resumo:
In recent years, increasing focus has been made on making good business decisions utilizing the product of data analysis. With the advent of the Big Data phenomenon, this is even more apparent than ever before. But the question is how can organizations trust decisions made on the basis of results obtained from analysis of untrusted data? Assurances and trust that data and datasets that inform these decisions have not been tainted by outside agency. This study will propose enabling the authentication of datasets specifically by the extension of the RESTful architectural scheme to include authentication parameters while operating within a larger holistic security framework architecture or model compliant to legislation.
Resumo:
Devising authentic assessments for subjects with large enrolments is a challenge. This study describes an electronic role-play assessment for approximately 600 first-year nursing students to learn and apply pathophysiology (bioscience) concepts to nursing practice. Students used Microsoft Office PowerPoint® to prepare electronic role-plays both between a nurse and patient, and between two nurses, thus simulating workplace scenarios. Student feedback demonstrated that respondents found this assessment useful for learning pathophysiology, and for applying pathophysiology to a nursing clinical setting. This electronic presentation circumvented issues associated with a traditional oral presentation such as embarrassment and logistics of scheduling groups, and rated well with students of non-English speaking background. The electronic role-play assessment initiative encouraged students to apply their bioscience knowledge to a clinical setting, and allowed students to conceptualise the importance of bioscience within both the nursing degree and the profession.
Resumo:
This conceptual paper is a preliminary part of an ongoing study into take-up of electronic personal health records (ePHRs). The purpose of this work is to contextually ‘operationalise' Grönroos’ (2012) model of value co-creation in service for ePHRs. Using findings in the extant literature we enhance theoretical and practical understanding of the potential for co-creation of value with ePHRs for relevant stakeholders. The research design focused on the selection and evaluation of relevant literature to include in the discussion. The objective was to demonstrate which articles can be used to 'contextualise' the concepts in relation to relevant healthcare providers and patient engagement in the co-creation of value from having shared ePHRs. Starting at the service concept, that is, what the service provider wants to achieve and for whom, there is little doubt that there are recognised benefits that co-create value for both healthcare providers and healthcare consumers (i.e. patients) through shared ePHRs. We further highlight both alignments and misalignments in the resources and activities concepts between stakeholder groups. Examples include the types of functionalities as well as the interactive and peer communication needs perceived as useful for healthcare providers compared to healthcare consumers. The paper has implications for theory and practice and is an original and innovative approach to studying the co-creation of value in eHealth delivery.