994 resultados para author privacy


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The exchange between the body and architecture walks a fine line between violence and pleasure. It is through the body that the subject engages with the architectural act, not via thought or reason, but through action. The materiality of architecture is the often the catalyst for some intense association; the wall that defines gender or class, the double bolted door that incarcerates, the enclosed privacy of the bedroom to the love affair. Architecture is the physical manifestation of Lefebvre’s inscribed space. It enacts the social and political systems through bodily occupation. Architecture, when tested by the occupation of bodies, anchors ideology in both space and time. The architect’s script can be powerful when rehearsed honestly to the building’s intentions and just as beautiful when rebuked by the act of protest or unfaithful occupation. This research examines this fine line of violence and pleasure in architecture through performance, in the work of Bryony Lavin’s play Stockholm and Revolving Door by Allora & Calzadilla as part of the recent Kaldor Public Art Projects exhibition 13 Rooms in Sydney. The research is underpinned by the work of Architect and theorist, Bernard Tschumi in his two essays, Violence of Architecture and The Pleasure of Architecture. Studying architecture through the lens of performance shifts the focus of examination from pure thought to the body; because architecture is occupied through the body and not the mind.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cities of Saudi Arabia have perhaps the largest growth rates of cities in the Middle East, such that it has become a cause in shortage of housing for mid and low-income families, as is the case in other developing countries. Even when housing is found, it is not sustainable nor is it providing the cultural needs of those families. The aim of this paper is to integrate the unique conservative Islamic Saudi culture into the design of sustainable housing. This paper is part of a preliminary study of an on-going PhD thesis, which utilises a semistructured interview of a panel of nine experts in collecting the data. The interviews consisted of ten questions ranging from general questions such as stating their expertise and work position to more specific question such as listing the critical success factors and/or barriers for applying sustainability to housing in Saudi Arabia. Since the participants were selected according to their experience, the answers to the interview questions were satisfactory where the generation of the survey questions for the second stage in the PhD thesis took place after analysing the participant’s answers to the interview questions. This paper recommends design requirements for accommodating the conservative Islamic Saudi Culture in low cost sustainable houses. Such requirements include achieving privacy through the use of various types of traditional Saudi architectural elements, such as the method of decorative screening of windows, called Mashrabiya, and having an inner courtyard where the house looks inward rather than outward. Other requirements include educating firms on how to design sustainable housing, educating the public on the advantages of sustainable housing and implementing new laws that enforce the utilisation of sustainable methods to housing construction. This paper contributes towards the body of knowledge by proposing initial findings on how to integrate the conservative Islamic culture of Saudi Arabia into the design of a sustainable house specifically for mid and low-income families. This contribution can be implemented on developing countries in the region that are faced with housing shortage for mid and low-income families.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The count-min sketch is a useful data structure for recording and estimating the frequency of string occurrences, such as passwords, in sub-linear space with high accuracy. However, it cannot be used to draw conclusions on groups of strings that are similar, for example close in Hamming distance. This paper introduces a variant of the count-min sketch which allows for estimating counts within a specified Hamming distance of the queried string. This variant can be used to prevent users from choosing popular passwords, like the original sketch, but it also allows for a more efficient method of analysing password statistics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Camera trapping is a scientific survey technique that involves the placement of heat-and motion-sensing automatic triggered cameras into the ecosystem to record images of animals for the purpose of studying wildlife. As technology continues to advance in sophistication, the use of camera trapping is becoming more widespread and is a crucial tool in the study of, and attempts to preserve, various species of animals, particularly those that are internationally endangered. However, whatever their value as an ecological device, camera traps also create a new risk of incidentally and accidentally capturing images of humans who venture into the area under surveillance. This article examines the current legal position in Australia in relation to such unintended invasions of privacy. It considers the current patchwork of statute and common laws that may provide a remedy in such circumstances. It also discusses the position that may prevail should the recommendations of either the Australian Law Reform Commission and/or New South Wales Law Reform Commission be adopted and a statutory cause of action protecting personal privacy be enacted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

eHealth systems promise enviable benefits and capabilities for healthcare delivery. However, the technologies that make these capabilities possible introduce undesirable drawbacks such as information security related threats, which need to be appropriately addressed. Lurking in these threats are information privacy concerns. Addressing them has proven to be difficult because they often conflict with information access requirements of healthcare providers. Therefore, it is important to achieve an appropriate balance between these requirements. We contend that information accountability (IA) can achieve this balance. In this paper, we introduce accountable-eHealth (AeH) systems, which are eHealth systems that utilise IA as a measure of information privacy. We discuss how AeH system protocols can successfully achieve the aforementioned balance of requirements. As a means of implementation feasibility, we compare characteristics of AeH systems with Australia’s Personally Controlled Electronic Health Record (PCEHR) sys-tem and identify similarities and highlight the differences and the impact those differences would have to the eHealth domain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information privacy is a critical success/failure factor in information technology supported healthcare (eHealth). eHealth systems utilise electronic health records (EHR) as the main source of information, thus, implementing appropriate privacy preserving methods for EHRs is vital for the proliferation of eHealth. Whilst information privacy may be a fundamental requirement for eHealth consumers, healthcare professionals demand non-restricted access to patient information for improved healthcare delivery, thus, creating an environment where stakeholder requirements are contradictory. Therefore, there is a need to achieve an appropriate balance of requirements in order to build successful eHealth systems. Towards achieving this balance, a new genre of eHealth systems called Accountable-eHealth (AeH) systems has been proposed. In this paper, an access control model for EHRs is presented that can be utilised by AeH systems to create information usage policies that fulfil both stakeholders’ requirements. These policies are used to accomplish the aforementioned balance of requirements creating a satisfactory eHealth environment for all stakeholders. The access control model is validated using a Web based prototype as a proof of concept.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The travel industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is generally thought that this has led to an increase in consumers' privacy concerns, which may have an adverse impact on their willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized secondary use of data, invasion of privacy, and errors. A study was undertaken to examine the effects of these factors on prior purchase of travel services via the Internet and future purchase probability. No evidence was found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Managerial implications are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To the Editor: The Victorian Health Records Act 2001 became operational on 1 July 2002. This legislation provides important protection for the individual against misuse of health information through the establishment of Health Privacy Principles. We support the spirit of this legislation, but would like to draw attention to its potential effects on multicentre research and disease surveillance...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

TO THE EDITOR: In Australia, personal and health information that identifies an individual cannot be used or disclosed for research without specific requirements being met.1 Even if these requirements are met, data custodians may still refuse access if their views are discordant with those of the relevant human research ethics committee (HREC). It is now evident that there are adverse consequences of this well-meaning legislation...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis considers how an information privacy system can and should develop in Libya. Currently, no information privacy system exists in Libya to protect individuals when their data is processed. This research reviews the main features of privacy law in several key jurisdictions in light of Libya's social, cultural, and economic context. The thesis identifies the basic principles that a Libyan privacy law must consider, including issues of scope, exceptions, principles, remedies, penalties, and the establishment of a legitimate data protection authority. This thesis concludes that Libya should adopt a strong information privacy law framework and highlights some of the considerations that will be relevant for the Libyan legislature.