807 resultados para privacy violations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent research in Sub-Saharan Africa has revealed the importance of children’s caring roles in families affected by HIV and AIDS. However, few studies have explored young caregiving in the context of HIV in the UK, where recently arrived African migrant and refugee families are adversely affected by the global epidemic. This paper explores young people’s socio-spatial experiences of caring for a parent with HIV, based on qualitative research with 37 respondents in London and other urban areas in England. In-depth semi-structured interviews were conducted with young people with caring responsibilities and mothers with HIV, who were predominantly African migrants, as well as with service providers. Drawing on their perspectives, the paper discusses the ways that young people and mothers negotiate the boundaries of young people’s care work within and beyond homespace, according to norms of age, gender, generational relations and cultural constructions of childhood. Despite close attachments within the family, the emotional effects of living with a highly stigmatised life-limiting illness, pressures associated with insecure immigration status, transnational migration and low income undermined African mothers’ and young people’s sense of security and belonging to homespace. These factors also restricted their mobility and social participation in school/college and neighbourhood spaces. While young people and mothers valued supportive safe spaces within the community, the stigma surrounding HIV significantly affected their ability to seek support. The article identifies security, privacy, independence and social mobility as key dimensions of African young people’s and mothers’ imagined futures of ‘home’ and ‘family’.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motor vehicle accidents are one of the principal causes of adolescent disability or mortality and male drivers are more likely to be involved in road accidents than female drivers. In part such associations between driver age and sex have been linked to differences in risky behaviour (e.g. speed, violations) and individual characteristics (e.g. sensation seeking, deviant behaviour). The aim of this research is to determine whether associations between risky road user behaviour and individual characteristics are a function of driver behaviour or whether they are intrinsic and measurable in individuals too young to drive. Five hundred and sixty-seven pre-driver students aged 11-16 from three secondary schools completed questionnaires measuring enthusiasm for speed, sensation seeking, deviant behaviour and attitudes towards driver violations. Boys reported more risky attitudes than girls for all measures. Associations between sensation seeking, deviant behaviour and attitudes towards risky road use were present from early adolescence and were strongest around age 14, before individuals learn to drive. Risky attitudes towards road use are associated with individual characteristics and are observed in adolescents long before they learn to drive. Safe attitudes towards road use and driver behaviour should be promoted from childhood in order to be effective. (C) 2007 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ubiquitous healthcare is an emerging area of technology that uses a large number of environmental and patient sensors and actuators to monitor and improve patients’ physical and mental condition. Tiny sensors gather data on almost any physiological characteristic that can be used to diagnose health problems. This technology faces some challenging ethical questions, ranging from the small-scale individual issues of trust and efficacy to the societal issues of health and longevity gaps related to economic status. It presents particular problems in combining developing computer/information/media ethics with established medical ethics. This article describes a practice-based ethics approach, considering in particular the areas of privacy, agency, equity and liability. It raises questions that ubiquitous healthcare will force practitioners to face as they develop ubiquitous healthcare systems. Medicine is a controlled profession whose practise is commonly restricted by government-appointed authorities, whereas computer software and hardware development is notoriously lacking in such regimes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In expanding on earlier analyses of the evolution of multinational business that have drawn from concepts of competition and innovation, this study examines the strategies used by British multinationals, between 1870 and 1929, to protect the global reputation of their brands, which were crucial to their survival and success. Even after the passage of new trademark legislation in 1876, enforcement of trademarks remained expensive, and often firms preferred to negotiate, rather than to prosecute violations. Many trademark imitators were based in the newly industrializing countries of the time—the United States, Germany, and Japan—and were part of the British export supply chains as licensees, franchisees, or wholesalers. British firms responded to infringements by lobbying governments, appointing local agents to provide intelligence, and collaborating with other firms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile devices are attractive media for directly communicating with consumers who have become busier and more difficult to reach. While SMS (short message service) advertising has received some attention in the literature, Bluetooth-enabled advertising is still unexplored. This research aims to investigate younger consumers’ acceptance of Bluetooth-delivered advertising. Although the majority of the respondents were willing to accept this form of advertising, they needed both to be in control of the frequency with which they receive messages and also to be reassured that the medium could ensure privacy and security. The research further indicated that peers influence the acceptance of Bluetooth-driven advertising.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper presents organisational semiotics (OS) as an approach for identifying organisational readiness factors for internal use of social media within information intensive organisations (IIO). The paper examines OS methods, such as organisational morphology, containment analysis and collateral analysis to reveal factors of readiness within an organisation. These models also help to identify the essential patterns of activities needed for social media use within an organisation, which can provide a basis for future analysis. The findings confirmed many of the factors, previously identified in literature, while also revealing new factors using OS methods. The factors for organisational readiness for internal use of social media include resources, organisational climate, processes, motivational readiness, benefit and organisational control factors. Organisational control factors revealed are security/privacy, policies, communication procedures, accountability and fallback.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We explored the impact of a degraded semantic system on lexical, morphological and syntactic complexity in language production. We analysed transcripts from connected speech samples from eight patients with semantic dementia (SD) and eight age-matched healthy speakers. The frequency distributions of nouns and verbs were compared for hand-scored data and data extracted using text-analysis software. Lexical measures showed the predicted pattern for nouns and verbs in hand-scored data, and for nouns in software-extracted data, with fewer low frequency items in the speech of the patients relative to controls. The distribution of complex morpho-syntactic forms for the SD group showed a reduced range, with fewer constructions that required multiple auxiliaries and inflections. Finally, the distribution of syntactic constructions also differed between groups, with a pattern that reflects the patients’ characteristic anomia and constraints on morpho-syntactic complexity. The data are in line with previous findings of an absence of gross syntactic errors or violations in SD speech. Alterations in the distributions of morphology and syntax, however, support constraint satisfaction models of speech production in which there is no hard boundary between lexical retrieval and grammatical encoding.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Few studies have investigated how individuals diagnosed with post-stroke Broca’s aphasia decompose words into their constituent morphemes in real-time processing. Previous research has focused on morphologically complex words in non-time-constrained settings or in syntactic frames, but not in the lexicon. Aims: We examined real-time processing of morphologically complex words in a group of five Greek-speaking individuals with Broca’s aphasia to determine: (1) whether their morphological decomposition mechanisms are sensitive to lexical (orthography and frequency) vs. morphological (stem-suffix combinatory features) factors during visual word recognition, (2) whether these mechanisms are different in inflected vs. derived forms during lexical access, and (3) whether there is a preferred unit of lexical access (syllables vs. morphemes) for inflected vs. derived forms. Methods & Procedures: The study included two real-time experiments. The first was a semantic judgment task necessitating participants’ categorical judgments for high- and low-frequency inflected real words and pseudohomophones of the real words created by either an orthographic error at the stem or a homophonous (but incorrect) inflectional suffix. The second experiment was a letter-priming task at the syllabic or morphemic boundary of morphologically transparent inflected and derived words whose stems and suffixes were matched for length, lemma and surface frequency. Outcomes & Results: The majority of the individuals with Broca’s aphasia were sensitive to lexical frequency and stem orthography, while ignoring the morphological combinatory information encoded in the inflectional suffix that control participants were sensitive to. The letter-priming task, on the other hand, showed that individuals with aphasia—in contrast to controls—showed preferences with regard to the unit of lexical access, i.e., they were overall faster on syllabically than morphemically parsed words and their morphological decomposition mechanisms for inflected and derived forms were modulated by the unit of lexical access. Conclusions: Our results show that in morphological processing, Greek-speaking persons with aphasia rely mainly on stem access and thus are only sensitive to orthographic violations of the stem morphemes, but not to illegal morphological combinations of stems and suffixes. This possibly indicates an intact orthographic lexicon but deficient morphological decomposition mechanisms, possibly stemming from an underspecification of inflectional suffixes in the participants’ grammar. Syllabic information, however, appears to facilitate lexical access and elicits repair mechanisms that compensate for deviant morphological parsing procedures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous research suggests that the processing of agreement is affected by the distance between the agreeing elements. However, the unique contribution of structural distance (number of intervening syntactic phrases) to the processing of agreement remains an open question, since previous investigations do not tease apart structural and linear distance (number of intervening words). We used event related potentials (ERPs) to examine the extent to which structural distance impacts the processing of Spanish number and gender agreement. Violations were realized both within the phrase and across the phrase. Across both levels of structural distance, linear distance was kept constant, as was the syntactic category of the agreeing elements. Number and gender agreement violations elicited a robust P600 between 400 and 900ms, a component associated with morphosyntactic processing. No amplitude differences were observed between number and gender violations, suggesting that the two features are processed similarly at the brain level. Within-phrase agreement yielded more positive waveforms than across-phrase agreement, both for agreement violations and for grammatical sentences (no agreement by distance interaction). These effects can be interpreted as evidence that structural distance impacts the establishment of agreement overall, consistent with sentence processing models which predict that hierarchical structure impacts the processing of syntactic dependencies. However, due to the lack of an agreement by distance interaction, the possibility cannot be ruled out that these effects are driven by differences in syntactic predictability between the within-phrase and across-phrase configurations, notably the fact that the syntactic category of the critical word was more predictable in the within-phrase conditions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This cross-sectional study examines the role of L1-L2 differences and structural distance in the processing of gender and number agreement by English-speaking learners of Spanish at three different levels of proficiency. Preliminary results show that differences between the L1 and L2 impact L2 development, as sensitivity to gender agreement violations, as opposed to number agreement violations, emerges only in learners at advanced levels of proficiency. Results also show that the establishment of agreement dependencies is impacted by the structural distance between the agreeing elements for native speakers and for learners at intermediate and advanced levels of proficiency but not for low proficiency. The overall pattern of results suggests that the linguistic factors examined here impact development but do not constrain ultimate attainment; for advanced learners, results suggest that second language processing is qualitatively similar to native processing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study used ERP (event-related potentials) to examine both the role of the L1 and the role of individual differences in the processing of agreement violations. Theories of L2 acquisition differ with regard to whether or not native-like acquisition of L2 features is possible (Schwartz and Sprouse, 1994, 1996; Tsimpli and Mastropavlou, 2007), and the results of previous ERP studies are inconsistent when it comes to whether or not native-like processing is observed in response to L2 agreement violations (e.g., Sabourin, 2003; Tokowicz and MacWhinney, 2005). Furthermore, studies of learners in early stages of L2 acquisition have found variability in the emergence of native-like responses (e.g., McLaughlin et al., 2010; Tanner et al., 2009), but sources of variability have not been investigated. The current study examines responses to gender and number agreement violations in English-speaking learners of Spanish (n=24). Stimuli targeted agreement in three conditions: subject-verb agreement (el barco flota/*flotan), which is similar in Spanish and English; number agreement on adjectival predicates (la isla rocosa/*rocosas), a context in which agreement is not instantiated in English; and gender agreement on adjectival predicates (la isla rocosa/*rocoso), which is unique to Spanish. Grammaticality judgments and ERP responses were also tested for correlations with aptitude scores on the Modern Languages Aptitude Test (MLAT; Carroll and Sapon, 1959) and the Raven Advanced Progressive Matrices (Raven, 1965). Results are in line with theories that claim native-like processing is acquirable, since learners demonstrated similar ERP responses to a control group of native Spanish-speakers (n=8) with regard to all three agreement types. Additionally, the MLAT (but not the Raven) was significantly correlated with sensitivity to number violations, both in terms of grammaticality judgments and ERP amplitudes, indicating a role for verbal but not nonverbal aptitude in L2 processing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Different theoretical accounts of second language (L2) acquisition differ with respect to whether or not advanced learners are predicted to show native like processing for features not instantiated in the native language (L1). We examined how native speakers of English, a language with number but not gender agreement, process number and gender agreement in Spanish. We compare agreement within a determiner phrase (órgano muy complejo “[DP organ-MASC-SG very complex-MASC-SG]”) and across a verb phrase (cuadro es auténtico “painting-MASC-SG [VP is authentic-MASC-SG]”) in order to investigate whether native like processing is limited to local domains (e.g. within the phrase), in line with Clahsen and Felser (2006). We also examine whether morphological differences in how the L1 and L2 realize a shared feature impact processing by comparing number agreement between nouns and adjectives, where only Spanish instantiates agreement, and between demonstratives and nouns, where English also instantiates agreement. Similar to Spanish natives, advanced learners showed a P600 for both number and gender violations overall, in line with the Full Transfer/Full Access Hypothesis (Schwartz and Sprouse, 1996), which predicts that learners can show native-like processing for novel features. Results also show that learners can establish syntactic dependencies outside of local domains, as suggested by the presence of a P600 for both within and across phrase violations. Moreover, similar to native speakers, learners were impacted by the structural distance (number of intervening phrases) between the agreeing elements, as suggested by the more positive waveforms for within than across-phrase agreement overall. These results are consistent with the proposal that learners are sensitive to hierarchical structure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of online data is becoming increasingly essential for the generation of insight in today’s research environment. This reflects the much wider range of data available online and the key role that social media now plays in interpersonal communication. However, the process of gaining permission to use social media data for research purposes creates a number of significant issues when considering compatibility with professional ethics guidelines. This paper critically explores the application of existing informed consent policies to social media research and compares with the form of consent gained by the social networks themselves, which we label ‘uninformed consent’. We argue that, as currently constructed, informed consent carries assumptions about the nature of privacy that are not consistent with the way that consumers behave in an online environment. On the other hand, uninformed consent relies on asymmetric relationships that are unlikely to succeed in an environment based on co-creation of value. The paper highlights the ethical ambiguity created by current approaches for gaining customer consent, and proposes a new conceptual framework based on participative consent that allows for greater alignment between consumer privacy and ethical concerns.