809 resultados para Privacy typology


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system and in recent studies of patient control of access to their eHealth information. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called Accountable-eHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The international collaboration in this book creates a unique opportunity to establish, discuss and draw conclusions about fundraising across nations. Based on the 26-country dataset provided by the authors in this volume, this chapter describes and analyzes for the first time the diverse fundraising environments around the world that are shaped by different historical, cultural, social, religious, political and economic conditions. It begins by noting the lack of research on fundraisers and fundraising in contrast to the extensive studies undertaken of donors, and argues that the demand side of charitable transactions is worthy of greater attention if a complete and dynamic understanding of giving is to be achieved. It then presents and discusses key themes related to fundraising in the countries represented in this book. A typology is suggested to impose order on the huge variety of fundraising approaches and stages of development in the organization of this activity around the world; this typology also strengthens understanding of the connection between asking and giving. After offering suggestions for future research in this area of study, the chapter ends by noting that despite global differences in the evolution of fundraising as a profession and the diversity of current contexts, fundraisers in every country face shared challenges that would benefit from greater exchange of knowledge and best practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The world has experienced a large increase in the amount of available data. Therefore, it requires better and more specialized tools for data storage and retrieval and information privacy. Recently Electronic Health Record (EHR) Systems have emerged to fulfill this need in health systems. They play an important role in medicine by granting access to information that can be used in medical diagnosis. Traditional systems have a focus on the storage and retrieval of this information, usually leaving issues related to privacy in the background. Doctors and patients may have different objectives when using an EHR system: patients try to restrict sensible information in their medical records to avoid misuse information while doctors want to see as much information as possible to ensure a correct diagnosis. One solution to this dilemma is the Accountable e-Health model, an access protocol model based in the Information Accountability Protocol. In this model patients are warned when doctors access their restricted data. They also enable a non-restrictive access for authenticated doctors. In this work we use FluxMED, an EHR system, and augment it with aspects of the Information Accountability Protocol to address these issues. The Implementation of the Information Accountability Framework (IAF) in FluxMED provides ways for both patients and physicians to have their privacy and access needs achieved. Issues related to storage and data security are secured by FluxMED, which contains mechanisms to ensure security and data integrity. The effort required to develop a platform for the management of medical information is mitigated by the FluxMED's workflow-based architecture: the system is flexible enough to allow the type and amount of information being altered without the need to change in your source code.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we explore how small and medium-sized enterprises (SMEs) engage in external knowledge sourcing, a form of inbound open innovation. We draw upon a sample of 1,411 SMEs and empirically conceptualize a typology of strategic types of external knowledge sourcing, namely minimal, supply-chain, technology-oriented, application-oriented, and full-scope sourcing. Each strategy reflects the nature of external interactions and is linked to a distinct mixture of four internal practices for managing innovation. Both full-scope and application-oriented sourcing offer performance benefits and are associated with a stronger focus on managing innovation. However, they differ in their managerial focus on strategic and operational aspects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims To discuss ethical issues that may arise in using WWA to monitor illicit drug use in the general population and in entertainment precincts, prisons, schools and work-places. Method Review current applications of WWA and identify ethical and social issues that may be raised with current and projected future uses of this method. Results Wastewater analysis (WWA) of drug residues is a promising method of monitoring illicit drug use that may overcome some limitations of other monitoring methods. When used for monitoring purposes in large populations, WWA does not raise major ethical concerns because individuals are not identified and the prospects of harming residents of catchment areas are remote. When WWA is used in smaller catchment areas (entertainment venues, prisons, schools or work-places) their results could, possibly, indirectly affect the occupants adversely. Researchers will need to take care in reporting their results to reduce media misreporting. Fears about possible use of WWA for mass individual surveillance by drug law enforcement officials are unlikely to be realized, but will need to be addressed because they may affect public support adversely for this type of research. Conclusions Using wastewater analysis to monitor illicit drug use in large populations does not raise major ethical concerns, but researchers need to minimize possible adverse consequences in studying smaller populations, such as workers, prisoners and students.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food retail is known for its use of flexible labour and for the centralisation of functions at head office, resulting in a reduction of managerial autonomy at store level. This article employs a typology of controls developed from labour process scholarship to explore how retail managers negotiate the control of their predominantly part-time workforce. Using an Australian supermarket chain as a case, and mixed methods, the article demonstrates that supermarkets use a multiplicity of forms of control across their workforce. For front line service workers, the article identifies a new configuration of controls which intersects with employment status and acts differentially for checkout operators on different employment contracts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis investigates the use of fusion techniques and mathematical modelling to increase the robustness of iris recognition systems against iris image quality degradation, pupil size changes and partial occlusion. The proposed techniques improve recognition accuracy and enhance security. They can be further developed for better iris recognition in less constrained environments that do not require user cooperation. A framework to analyse the consistency of different regions of the iris is also developed. This can be applied to improve recognition systems using partial iris images, and cancelable biometric signatures or biometric based cryptography for privacy protection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian Media Law details and explains the complex case law, legislation and regulations governing media practice in areas as diverse as journalism, advertising, multimedia and broadcasting. It examines the issues affecting traditional forms of media such as television, radio, film and newspapers as well as for recent forms such as the internet, online forums and digital technology, in a clear and accessible format. New additions to the fifth edition include: - the implications of new anti-terrorism legislation for journalists; - developments in privacy law, including Law Reform recommendations for a statutory cause of action to protect personal privacy in Australia and the expanding privacy jurisprudence in the United Kingdom and New Zealand; - liability for defamation of internet search engines and service providers; - the High Court decision in Roadshow v iiNet and the position of internet service providers in relation to copyright infringement via their services; - new suppression order regimes; - statutory reforms providing journalists with a rebuttable presumption of non-disclosure when called upon to reveal their sources in a court of law; - recent developments regarding whether journalists can use electronic devices to collect and disseminate information about court proceedings; - contempt committed by jurors via social media; and an examination of recent decisions on defamation, confidentiality, vilification, copyright and contempt.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process view technology is catching more attentions in modern business process management, as it enables the customisation of business process representation. This capability helps improve the privacy protection, authority control, flexible display, etc., in business process modelling. One of approaches to generate process views is to allow users to construct an aggregate on their underlying processes. However, most aggregation approaches stick to a strong assumption that business processes are always well-structured, which is over strict to BPMN. Aiming to build process views for non-well-structured BPMN processes, this paper investigates the characteristics of BPMN structures, tasks, events, gateways, etc., and proposes a formal process view aggregation approach to facilitate BPMN process view creation. A set of consistency rules and construction rules are defined to regulate the aggregation and guarantee the order preservation, structural and behaviour correctness and a novel aggregation technique, called EP-Fragment, is developed to tackle non-well-structured BPMN processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for privacy protection and authorization control in process-oriented business management. Owing to complex organizational structure, it is challenging for large companies to accurately specify the diverse perception of different users over business processes. Aiming to tackle this issue, this article presents a role-based process view model to incorporate role dependencies into process view derivation. Compared to existing process view approaches, ours particularly supports runtime updates to the process view perceivable to a user with specific view merging operations, thereby enabling the dynamic tracing of process perception. A series of rules and theorems are established to guarantee the structural consistency and validity of process view transformation. A hypothetical case is conducted to illustrate the feasibility of our approach, and a prototype is developed for the proof-of-concept purpose.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Shared eHealth records systems offer promising benefits for improving healthcare through high availability of information and improved decision making; however, their uptake has been hindered by concerns over the privacy of patient information. To address these privacy concerns while balancing the requirements of healthcare professionals to have access to the information they need to provide appropriate care, the use of an Information Accountability Framework (IAF) has been proposed. For the IAF and so called Accountable-eHealth systems to become a reality, the framework must provide for a diverse range of users and use cases. The initial IAF model did not provide for more diverse use cases including the need for certain users to delegate access to another user in the system to act on their behalf while maintaining accountability. In this paper, we define the requirements for delegation of access in the IAF, how such access policies would be represented in the Framework, and implement and validate an expanded IAF model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Meaningful use of eHealth, as seen through four key lenses: Usability; Usefulness; Utility; and Safety, is achieved through Accountable-eHealth systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Allowing consumers to designate preferred healthcare professionals; Accountable-eHealth systems create a transparent and accountable eHealth environment for better healthcare delivery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge economy seeks its nourishment from diversity and dissemination of ideas and creativity of its talent base. This has led to the acknowledgement of place making as a major strategy to attract and retain the knowledge base into the emerging knowledge and innovation spaces. The study seeks to explore the adoption of place making in this context. Literature and practice provide information to understand the evolution of various spatial typologies and the specialised role of place making in such locations. This helps in determining the key facilitators of place making. The paper takes an interdisciplinary approach and develops an integrated conceptual framework considering dimensions and facilitators of place making. Through the lens of the framework, best practices across Europe—i.e., Cambridge Science Park (UK), 22@Barcelona (Spain), Arabianranta (Finland), Strijp-S (Netherlands), and Digital Hub (Ireland)—are scrutinised to highlight various approaches to place making. The findings provide insights and a discussion into the interplay of form, function, image and underlying processes in globally emerging spatial typologies of contemporary knowledge and innovation spaces.