809 resultados para Privacy.
Resumo:
This paper examines attitudes towards Radio Frequency Identification (RFID) technology and explores the wider concerns of the ever increasing prospect of social tagging. Capturing vignettes and narratives from a sample of study participants, the paper highlights concerns about adopting RFID implements now and in the future. The views captured through qualitative methodology act as the platform for a wider argument concerning the human rights and privacy intrusion concerns over IT applications. Intended as an insight into the reality of technology impact, this paper lists a series of questions for leaders to consider over matters of human rights specifically concerning RFID adoption. The authors conclude that caution, naivety and fear are the underlying reasons for society accepting RFIDs without question and that RFIDs will be a part of everyday working and domestic life in the near future.
Resumo:
Speaking of the public response to the deaths of children at the Bristol Royal Infirmary before 2001, the BMJ commented that the NHS would be 'all changed, changed utterly'. Today, two inquiries into the Mid Staffordshire Foundation Trust suggest nothing changed at all. Many patients died as a result of their care and the stories of indifference and neglect there are harrowing. Yet Bristol and Mid Staffordshire are not isolated reports. In 2011, the Health Services Ombudsman reported on the care of elderly and frail patients in the NHS and found a failure to recognise their humanity and individuality and to respond to them with sensitivity, compassion and professionalism. Likewise, the Care Quality Commission and Healthcare Commission received complaints from patients and relatives about the quality of nursing care. These included patients not being fed, patients left in soiled bedding, poor hygiene practices, and general disregard for privacy and dignity. Why is there such tolerance of poor clinical standards? We need a better understanding of the circumstances that can lead to these outcomes and how best to respond to them. We discuss the findings of these and other reports and consider whether attention should be devoted to managing individual behaviour, or focus on the systemic influences which predispose hospital staff to behave in this way. Lastly, we consider whether we should look further afield to cognitive psychology to better understand how clinicians and managers make decisions?
Resumo:
Buildings affect people in various ways. They can help us to work more effectively; they also present a wide range of stimuli for our senses to react to. Intelligent buildings are designed to be aesthetic in sensory terms not just visually appealing but ones in which occupants experience delight, freshness, airiness, daylight, views out and social ambience. All these factors contribute to a general aesthetic which gives pleasure and affects one’s mood. If there is to be a common vision, it is essential for architects, engineers and clients to work closely together throughout the planning, design, construction and operational stages which represent the conception, birth and life of the building. There has to be an understanding of how patterns of work are best suited to a particular building form served by appropriate environmental systems. A host of technologies are emerging that help these processes, but in the end it is how we think about achieving responsive buildings that matters. Intelligent buildings should cope with social and technological changes and also be adaptable to short-term and long-term human needs. We live through our senses. They rely on stimulation from the tasks we are focused on; people around us but also the physical environment. We breathe air and its quality affects the olfactory system; temperature is felt by thermoreceptors in the skin; sound enters our ears; the visual scene is beheld by our eyes. All these stimuli are transmitted along the sensory nervous system to the brain for processing from which physiological and psychological reactions and judgments are formed depending on perception, expectancies and past experiences. It is clear that the environmental setting plays a role in this sensory process. This is the essence of sensory design. Space plays its part as well. The flow of communication is partly electronic but also largely by people meeting face to face. Our sense of space wants different things at different times. Sometimes privacy but other times social needs have to be satisfied besides the organizational requirement to have effective human communications throughout the building. In general if the senses are satisfied people feel better and work better.
Resumo:
Widespread commercial use of the internet has significantly increased the volume and scope of data being collected by organisations. ‘Big data’ has emerged as a term to encapsulate both the technical and commercial aspects of this growing data collection activity. To date, much of the discussion of big data has centred upon its transformational potential for innovation and efficiency, yet there has been less reflection on its wider implications beyond commercial value creation. This paper builds upon normal accident theory (NAT) to analyse the broader ethical implications of big data. It argues that the strategies behind big data require organisational systems that leave them vulnerable to normal accidents, that is to say some form of accident or disaster that is both unanticipated and inevitable. Whilst NAT has previously focused on the consequences of physical accidents, this paper suggests a new form of system accident that we label data accidents. These have distinct, less tangible and more complex characteristics and raise significant questions over the role of individual privacy in a ‘data society’. The paper concludes by considering the ways in which the risks of such data accidents might be managed or mitigated.
Resumo:
This paper presents a study on reduction of energy consumption in buildings through behaviour change informed by wireless monitoring systems for energy, environmental conditions and people positions. A key part to the Wi-Be system is the ability to accurately attribute energy usage behaviour to individuals, so they can be targeted with specific feedback tailored to their preferences. The use of wireless technologies for indoor positioning was investigated to ascertain the difficulties in deployment and potential benefits. The research to date has demonstrated the effectiveness of highly disaggregated personal-level data for developing insights into people’s energy behaviour and identifying significant energy saving opportunities (up to 77% in specific areas). Behavioural research addressed social issues such as privacy, which could affect the deployment of the system. Radio-frequency research into less intrusive technologies indicates that received-signal-strength-indicator-based systems should be able to detect the presence of a human body, though further work would be needed in both social and engineering areas.
Resumo:
Self-report underpins our understanding of falls among people with Parkinson’s (PwP) as they largely happen unwitnessed at home. In this qualitative study, we used an ethnographic approach to investigate which in-home sensors, in which locations, could gather useful data about fall risk. Over six weeks, we observed five independently mobile PwP at high risk of falling, at home. We made field notes about falls (prior events and concerns) and recorded movement with video, Kinect, and wearable sensors. The three women and two men (aged 71 to 79 years) having moderate or severe Parkinson’s were dependent on others and highly sedentary. We most commonly noted balance protection, loss, and restoration during chair transfers, walks across open spaces and through gaps, turns, steps up and down, and tasks in standing (all evident walking between chair and stairs, e.g.). Our unobtrusive sensors were acceptable to participants: they could detect instability during everyday activity at home and potentially guide intervention. Monitoring the route between chair and stairs is likely to give information without invading the privacy of people at high risk of falling, with very limited mobility, who spend most of the day in their sitting rooms.
Resumo:
I consider the case for genuinely anonymous web searching. Big data seems to have it in for privacy. The story is well known, particularly since the dawn of the web. Vastly more personal information, monumental and quotidian, is gathered than in the pre-digital days. Once gathered it can be aggregated and analyzed to produce rich portraits, which in turn permit unnerving prediction of our future behavior. The new information can then be shared widely, limiting prospects and threatening autonomy. How should we respond? Following Nissenbaum (2011) and Brunton and Nissenbaum (2011 and 2013), I will argue that the proposed solutions—consent, anonymity as conventionally practiced, corporate best practices, and law—fail to protect us against routine surveillance of our online behavior. Brunton and Nissenbaum rightly maintain that, given the power imbalance between data holders and data subjects, obfuscation of one’s online activities is justified. Obfuscation works by generating “misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating good data from bad,” thus decreasing the value of the data collected (Brunton and Nissenbaum, 2011). The phenomenon is as old as the hills. Natural selection evidently blundered upon the tactic long ago. Take a savory butterfly whose markings mimic those of a toxic cousin. From the point of view of a would-be predator the data conveyed by the pattern is ambiguous. Is the bug lunch or potential last meal? In the light of the steep costs of a mistake, the savvy predator goes hungry. Online obfuscation works similarly, attempting for instance to disguise the surfer’s identity (Tor) or the nature of her queries (Howe and Nissenbaum 2009). Yet online obfuscation comes with significant social costs. First, it implies free riding. If I’ve installed an effective obfuscating program, I’m enjoying the benefits of an apparently free internet without paying the costs of surveillance, which are shifted entirely onto non-obfuscators. Second, it permits sketchy actors, from child pornographers to fraudsters, to operate with near impunity. Third, online merchants could plausibly claim that, when we shop online, surveillance is the price we pay for convenience. If we don’t like it, we should take our business to the local brick-and-mortar and pay with cash. Brunton and Nissenbaum have not fully addressed the last two costs. Nevertheless, I think the strict defender of online anonymity can meet these objections. Regarding the third, the future doesn’t bode well for offline shopping. Consider music and books. Intrepid shoppers can still find most of what they want in a book or record store. Soon, though, this will probably not be the case. And then there are those who, for perfectly good reasons, are sensitive about doing some of their shopping in person, perhaps because of their weight or sexual tastes. I argue that consumers should not have to pay the price of surveillance every time they want to buy that catchy new hit, that New York Times bestseller, or a sex toy.
Resumo:
After the WWII, there was much concern to protect human rights situation all over the world. During the cold wars, huge displacement took place within different countries due to internal arms/ethnic conflicts. Millions of IDPs, who were uprooted by armed conflict or ethnic strife faced human rights violence. In 2002, there were estimated between 20-25 millions IDPs in the world (Phuong, p.1). Internally displacement is a worldwide problem and millions of the people displaced in Africa and Asia. These all Internal displacements of the people are only the result of the conflicts or the violations of the Human Rights but also sometimes it happened because of the natural disasters. “All human beings are born free and equal in dignity and rights..."(Streich, Article 1) This article works as the foundation of human rights which gives every human being an equal rights and opportunity to maintain his/her dignity. Human Rights issues related to human dignity must be taken very seriously and should not be ignored at any level; Many human rights issues are not always visible, issues such as: privacy, security, equality, protection of social and cultural values etc. In this paper I am going to apply theoretical approach of “all human being are equal in dignity and rights” to defend IDPs rights.
Resumo:
This book presents contemporary European research on eParticipation by means of a 13 chapters each describing a PhD research project as well as analyses of this research. The book both reflects the field and contributes to shaping it by discussing both long-standing and emerging issues. Contributions include three chapters on issues of DEVELOPMENT, including communities of practice, user-centred development, and safety & privacy issues, four chapters on IMPLEMENTATION, including spatial planning, participatory budgeting, and transformation processes, and five chapters on issues of USE, focusing on local government, developing countries, EU, civil society and NGO.
Resumo:
Background: Becoming a parent of a preterm baby requiring neonatal care constitutes an extraordinary life situation in which parenting begins and evolves in a medical and unfamiliar setting. Although there is increasing emphasis within maternity and neonatal care on the influence of place and space upon the experiences of staff and service users, there is a lack of research on how space and place influence relationships and care in the neonatal environment. The aim of this study was to explore, in-depth, the impact of place and space on parents’ experiences and practices related to feeding their preterm babies in Neonatal Intensive Care Units (NICUs) in Sweden and England. Methods: An ethnographic approach was utilised in two NICUs in Sweden and two comparable units in England, UK. Over an eleven month period, a total of 52 mothers, 19 fathers and 102 staff were observed and interviewed. A grounded theory approach was utilised throughout data collection and analysis. Results: The core category of ‘the room as a conveyance for an attuned feeding’ was underpinned by four categories: the level of ‘ownership’ of space and place; the feeling of ‘at-homeness’; the experience of ‘the door or a shield’ against people entering, for privacy, for enabling a focus within, and for regulating socialising and the; ‘window of opportunity’. Findings showed that the construction and design of space and place was strongly influential on the developing parent-infant relationship and for experiencing a sense of connectedness and a shared awareness with the baby during feeding, an attuned feeding. Conclusions: If our proposed model is valid, it is vital that these findings are considered when developing or reconfiguring NICUs so that account is taken of the influences of spatiality upon parent’s experiences. Even without redesign there are measures that may be taken to make a positive difference for parents and their preterm babies.
Resumo:
Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts. Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.
Resumo:
BACKGROUND: Despite extensive use of self-rated health questions in youth studies, little is known about what such questions capture among adolescents. Hence, the aim of this study was to explore how adolescents interpret and reason when answering a question about self-rated health. METHODS: A qualitative study using think-aloud interviews explored the question, "How do you feel most of the time?", using five response options ("Very good", "Rather good", "Neither good, nor bad", "Rather bad", and "Very bad"). The study involved 58 adolescents (29 boys and 29 girls) in lower secondary school (7th grade) and upper secondary school (12th grade) in Sweden. RESULTS: Respondents' interpretations of the question about how they felt included social, mental, and physical aspects. Gender differences were found primarily in that girls emphasized stressors, while age differences were reflected mainly in the older respondents' inclusion of a wider variety of influences on their assessments. The five response options all demonstrated differences in self-rated health, and the respondents' understanding of the middle option, "Neither good, nor bad", varied widely. In the answering of potential sensitive survey questions, rationales for providing honest or biased answers were described. CONCLUSIONS: The use of a self-rated health question including the word 'feel' captured a holistic view of health among adolescents. Differences amongst response options should be acknowledged when analyzing self-rated health questions. If anonymity is not feasible when answering questions on self-rated health, a high level of privacy is recommended to increase the likelihood of reliability.
Resumo:
The open provenance architecture (OPA) approach to the challenge was distinct in several regards. In particular, it is based on an open, well-defined data model and architecture, allowing different components of the challenge workflow to independently record documentation, and for the workflow to be executed in any environment. Another noticeable feature is that we distinguish between the data recorded about what has occurred, emphprocess documentation, and the emphprovenance of a data item, which is all that caused the data item to be as it is and is obtained as the result of a query over process documentation. This distinction allows us to tailor the system to separately best address the requirements of recording and querying documentation. Other notable features include the explicit recording of causal relationships between both events and data items, an interaction-based world model, intensional definition of data items in queries rather than relying on explicit naming mechanisms, and emphstyling of documentation to support non-functional application requirements such as reducing storage costs or ensuring privacy of data. In this paper we describe how each of these features aid us in answering the challenge provenance queries.
Resumo:
Agent-oriented cooperation techniques and standardized electronic healthcare record exchange protocols can be used to combine information regarding different facets of a therapy received by a patient from different healthcare providers at different locations. Provenance is an innovative approach to trace events in complex distributed processes, dependencies between such events, and associated decisions by human actors. We focus on three aspects of provenance in agent-mediated healthcare systems: first, we define the provenance concept and show how it can be applied to agent-mediated healthcare applications; second, we investigate and provide a method for independent and autonomous healthcare agents to document the processes they are involved in without directly interacting with each other; and third, we show that this method solves the privacy issues of provenance in agent-mediated healthcare systems.