827 resultados para privacy violations


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Train pedestrian collisions are the most likely to result in severe injuries and fatalities when compared to other types of rail crossing accidents. However, there is currently scant research that has examined the origins of pedestrians’ rule breaking at level crossings. As a result, this study examined the origins of pedestrians’ rule breaking behaviour at crossings, with particular emphasis directed towards examining the factors associated with making errors versus deliberation violations. A total of 636 individuals volunteered to participate in the study and completed either an online or paper version of the questionnaire. Quantitative analysis of the data revealed that knowledge regarding crossing rules was high, although up to 18% of level crossing users were either unsure or did not know (in some circumstances) when it was legal to cross at a level crossing. Furthermore, 156 participants (24.52%) reported having intentionally violated the rules at level crossings and 3.46% (n = 22) of the sample had previously made a mistake at a crossing. In regards to rule violators, males (particularly minors) were more likely to report breaking rules, and the most frequent occurrence was after the train had passed rather than before it arrives. Regression analysis revealed that males who frequently use pedestrian crossings and report higher sensation seeking traits are most likely to break the rules. This research provides evidence that pedestrians are more likely to deliberately violate rules (rather than make errors) at crossings and it illuminates high risk groups. This paper will further outline the study findings in regards to the development of countermeasures as well as provide direction for future research efforts in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of camera traps in wildlife management is an increasingly common practice. A phenomenon which is also becoming more common is for such camera traps to unintentionally film individuals engaged in a variety of activities, ranging from the innocent to the nefarious and including lewd or potentially embarrassing behaviour. It is therefore possible for the use of camera traps to accidentally encroach upon the privacy rights of persons who venture into the area of surveillance. In this chapter we describe the legal framework of privacy in Australia and discuss the potential risk of this sleeping tiger for users of camera traps. We also present the results of a survey of camera trap users to assess the frequency of such unintended captures and the nature of activity being filmed before discussing the practical implications of these laws for camera traps users in this country and make recommendations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis considers whether the Australian Privacy Commissioner's use of its powers supports compliance with the requirement to 'take reasonable steps' to protect personal information in National Privacy Principle 4 of the Privacy Act 1988 (Cth). Two unique lenses were used. First, the Commissioner's use of powers was assessed against the principles of transparency, balance and vigorousness and secondly against alignment with an industry practice approach to securing information. Following a comprehensive review of publicly available materials, interviews and investigation file records, this thesis found that the Commissioner's use of his powers has not been transparent, balanced or vigorous, nor has it been supportive of an industry practice approach to securing data. Accordingly, it concludes that the Privacy Commissioner's use of its regulatory powers is unlikely to result in any significant improvement to the security of personal information held by organisations in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Suppose a homeowner habitually enjoys sunbathing in his or her backyard, protected by a high fence from prying eyes, including those of an adolescent neighbour. In times past such homeowners could be assured that they might go about their activities without a threat to their privacy. However, recent years have seen technological advances in the development of unmanned aerial vehicles (‘UAVs’), also known colloquially as drones, that have allowed them to become more reduced in size, complexity and price. UAVs today include models retailing to the public for less than $350 and with an ease of operation that enables them to serve as mobile platforms for miniature cameras. These machines now mean that for individuals like the posited homeowner’s adolescent neighbour, barriers such as high fences no longer constitute insuperable obstacles to their voyeuristic endeavours. Moreover, ease of access to the internet and video sharing websites provides a ready means of sharing any recordings made with such cameras with a wide audience. Persons in the homeowner’s position might understandably seek some form of redress for such egregious invasions of their privacy. Other than some kind of self-help, what alternative measures may be available?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The home environment is conceptualised in prolific ways within the academic literature. A home is an unparalleled base for human settlement and habitation that embodies a sensorial space that is layered with personal memories and traces of history. The success of a home in providing a strong ‘sense of place’ depends on various factors such as geographical location, monetary funds or personal perceptions. A home too, is an influential medium that allows its dwellers to express, perform and continue their cultural traditions and religious faiths. Traditional Islamic teachings and practices involve guidelines that apply directly to the domestic space. The principles of privacy, modesty and hospitality are paramount to these guidelines and each has a significant influence upon the design of Muslim homes and the home owners’ or dwellers’ domestic behaviours. Despite a significant increase of Muslim population in Australia over the last decade, very little is known about their perceptions of domestic life and their use of domestic spaces within an Australian context. This research investigated on how Muslims in Brisbane live and adapt within their Australian homes and if these homes meet their personal and familial needs to perform their daily activities, as well as maintaining and practising their Islamic faiths and traditions. Specific attention has been given to their perceptions on tripartite principles of privacy, modesty, and hospitality (PMH) and how they achieve these three objectives. A qualitative case study approach was used to investigate six Muslim families living in four Brisbane suburbs, consisting of: a) Case Study 1: three Muslim families residing in one suburb of Brisbane and, b) Case Study 2: three international Muslim students living in three different Brisbane suburbs. This research indicates that apart from minor ‘design-related’ difficulties, case study participants were able to continue to perform their daily activities within their current homes through minor changes to the use of the available interior spaces. Above all, case study participants opined that their current Australian homes provide them with adequate safety and privacy for their families without any major disturbances. Insight gained from these cases suggests that greater research attention needs to be given to the potential development of Australian home designs that are adaptable to the ever-changing needs of the Australian multicultural society. Awareness of the multifactorial nature of the influences on Muslims’ perceptions of home and their use of domestic space is needed if architects, building designers, engineers and builders are to be properly equipped to meet the needs of their Muslim clients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dwellings in multi-storey apartment buildings (MSAB) are predicted to increase dramatically as a proportion of housing stock in subtropical cities over coming decades. The problem of designing comfortable and healthy high-density residential environments and minimising energy consumption must be addressed urgently in subtropical cities globally. This paper explores private residents’ experiences of privacy and comfort and their perceptions of how well their apartment dwelling modulated the external environment in subtropical conditions through analysis of 636 survey responses and 24 interviews with residents of MSAB in inner urban neighbourhoods of Brisbane, Australia. The findings show that the availability of natural ventilation and outdoor private living spaces play important roles in resident perceptions of liveability in the subtropics where the climate is conducive to year round “outdoor living”. Residents valued choice with regard to climate control methods in their apartments. They overwhelmingly preferred natural ventilation to manage thermal comfort, and turned to the air-conditioner for limited periods, particularly when external conditions were too noisy. These findings provide a unique evidence base for reducing the environmental impact of MSAB and increasing the acceptability of apartment living, through incorporating residential attributes positioned around climate-responsive architecture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The book, New Dimensions in Privacy Law, has an arresting cover — a pack of paparazzi take photographs, with their flash-bulbs popping and exploding,like starbursts in the sky. The collection explores the valiant efforts of courts and parliaments to defend the privacy of individuals against such unwanted intrusions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close.” David Fewer “While European and American IP maximalists have pushed for TRIPS-Plus provisions in FTAs and bilateral agreements, they are now pushing for TRIPS-Plus-Plus protections in these various forums.” Susan Sell “ACTA is a threat to the future of a free and open Internet.” Alexander Furnas “Implementing the agreement could open a Pandora's box of potential human rights violations.” Amnesty International. “I will not take part in this masquerade.” Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European Parliament Executive Summary As an independent scholar and expert in intellectual property, I am of the view that the Australian Parliament should reject the adoption of the Anti-Counterfeiting Trade Agreement 2011. I would take issue with the Department of Foreign Affairs and Trade’s rather partisan account of the negotiations, the consultations, and the outcomes associated with the Anti-Counterfeiting Trade Agreement 2011. In my view, the negotiations were secretive and biased; the local consultations were sometimes farcical because of the lack of information about the draft texts of the agreement; and the final text of the Anti-Counterfeiting Trade Agreement 2011 is not in the best interests of Australia, particularly given that it is a net importer of copyright works and trade mark goods and services. I would also express grave reservations about the quality of the rather pitiful National Interest Analysis – and the lack of any regulatory impact statement – associated with the Anti-Counterfeiting Trade Agreement 2011. The assertion that the Anti-Counterfeiting Trade Agreement 2011 does not require legislative measures is questionable – especially given the United States Trade Representative has called the agreement ‘the highest-standard plurilateral agreement ever achieved concerning the enforcement of intellectual property rights.’ It is worthwhile reiterating that there has been much criticism of the secretive and partisan nature of the negotiations surrounding the Anti-Counterfeiting Trade Agreement 2011. Sean Flynn summarizes these concerns: "The negotiation process for ACTA has been a case study in establishing the conditions for effective industry capture of a lawmaking process. Instead of using the relatively transparent and inclusive multilateral processes, ACTA was launched through a closed and secretive “‘club approach’ in which like-minded jurisdictions define enforcement ‘membership’ rules and then invite other countries to join, presumably via other trade agreements.” The most influential developing countries, including Brazil, India, China and Russia, were excluded. Likewise, a series of manoeuvres ensured that public knowledge about the specifics of the agreement and opportunities for input into the process were severely limited. Negotiations were held with mere hours notice to the public as to when and where they would be convened, often in countries half away around the world from where public interest groups are housed. Once there, all negotiation processes were closed to the public. Draft texts were not released before or after most negotiating rounds, and meetings with stakeholders took place only behind closed doors and off the record. A public release of draft text, in April 2010, was followed by no public or on-the-record meetings with negotiators." Moreover, it is disturbing that the Anti-Counterfeiting Trade Agreement 2011 has been driven by ideology and faith, rather than by any evidence-based policy making Professor Duncan Matthews has raised significant questions about the quality of empirical evidence used to support the proposal of Anti-Counterfeiting Trade Agreement 2011: ‘There are concerns that statements about levels of counterfeiting and piracy are based either on customs seizures, with the actual quantities of infringing goods in free circulation in any particular market largely unknown, or on estimated losses derived from industry surveys.’ It is particularly disturbing that, in spite of past criticism, the Department of Foreign Affairs and Trade has supported the Anti-Counterfeiting Trade Agreement 2011, without engaging the Productivity Commission or the Treasury to do a proper economic analysis of the proposed treaty. Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European Parliament, quit his position, and said of the process: "I want to denounce in the strongest possible manner the entire process that led to the signature of this agreement: no inclusion of civil society organisations, a lack of transparency from the start of the negotiations, repeated postponing of the signature of the text without an explanation being ever given, exclusion of the EU Parliament's demands that were expressed on several occasions in our assembly. As rapporteur of this text, I have faced never-before-seen manoeuvres from the right wing of this Parliament to impose a rushed calendar before public opinion could be alerted, thus depriving the Parliament of its right to expression and of the tools at its disposal to convey citizens' legitimate demands.” Everyone knows the ACTA agreement is problematic, whether it is its impact on civil liberties, the way it makes Internet access providers liable, its consequences on generic drugs manufacturing, or how little protection it gives to our geographical indications. This agreement might have major consequences on citizens' lives, and still, everything is being done to prevent the European Parliament from having its say in this matter. That is why today, as I release this report for which I was in charge, I want to send a strong signal and alert the public opinion about this unacceptable situation. I will not take part in this masquerade." There have been parallel concerns about the process and substance of the Anti-Counterfeiting Trade Agreement 2011 in the context of Australia. I have a number of concerns about the substance of the Anti-Counterfeiting Trade Agreement 2011. First, I am concerned that the Anti-Counterfeiting Trade Agreement 2011 fails to provide appropriate safeguards in respect of human rights, consumer protection, competition, and privacy laws. It is recommended that the new Joint Parliamentary Committee on Human Rights investigate this treaty. Second, I argue that there is a lack of balance to the copyright measures in the Anti-Counterfeiting Trade Agreement 2011 – the definition of piracy is overbroad; the suite of civil remedies, criminal offences, and border measures is excessive; and there is a lack of suitable protection for copyright exceptions, limitations, and remedies. Third, I discuss trade mark law, intermediary liability, and counterfeiting. I express my concerns, in this context, that the Anti-Counterfeiting Trade Agreement 2011 could have an adverse impact upon consumer interests, competition policy, and innovation in the digital economy. I also note, with concern, the lobbying by tobacco industries for the Anti-Counterfeiting Trade Agreement 2011 – and the lack of any recognition in the treaty for the capacity of countries to take measures of tobacco control under the World Health Organization Framework Convention on Tobacco Control. Fourth, I note that the Anti-Counterfeiting Trade Agreement 2011 provides no positive obligations to promote access to essential medicines. It is particularly lamentable that Australia and the United States of America have failed to implement the Doha Declaration on the TRIPS Agreement and Public Health 2001 and the WTO General Council Decision 2003. Fifth, I express concerns about the border measures in the Anti-Counterfeiting Trade Agreement 2011. Such measures lack balance – and unduly favour the interests of intellectual property owners over consumers, importers, and exporters. Moreover, such measures will be costly, as they involve shifting the burden of intellectual property enforcement to customs and border authorities. Interdicting, seizing, and destroying goods may also raise significant trade issues. Finally, I express concern that the Anti-Counterfeiting Trade Agreement 2011 undermines the role of existing international organisations, such as the United Nations, the World Intellectual Property Organization and the World Trade Organization, and subverts international initiatives such as the WIPO Development Agenda 2007. I also question the raison d'être, independence, transparency, and accountability of the proposed new ‘ACTA Committee’. In this context, I am concerned by the shift in the position of the Labor Party in its approach to international treaty-making in relation to intellectual property. The Australian Parliament adopted the Australia-United States Free Trade Agreement 2004, which included a large Chapter on intellectual property. The treaty was a ‘TRIPs-Plus’ agreement, because the obligations were much more extensive and prescriptive than those required under the multilateral framework established by the TRIPS Agreement 1994. During the debate over the Australia-United States Free Trade Agreement 2004, the Labor Party expressed the view that it would seek to mitigate the effects of the TRIPS-Plus Agreement, when at such time it gained power. Far from seeking to ameliorate the effects of the Australia-United States Free Trade Agreement 2004, the Labor Government would seek to lock Australia into a TRIPS-Double Plus Agreement – the Anti-Counterfeiting Trade Agreement 2011. There has not been a clear political explanation for this change in approach to international intellectual property. For both reasons of process and substance, I conclude that the Australian Parliament and the Australian Government should reject the Anti-Counterfeiting Trade Agreement 2011. The Australian Government would do better to endorse the Washington Declaration on Intellectual Property and the Public Interest 2011, and implement its outstanding obligations in respect of access to knowledge, access to essential medicines, and the WIPO Development Agenda 2007. The case study of the Anti-Counterfeiting Trade Agreement 2011 highlights the need for further reforms to the process by which Australia engages in international treaty-making.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this research was to identify the role of brand reputation in encouraging consumer willingness to provide personal data online, for the benefits of personalisation. This study extends on Malhotra, Kim and Agarwal’s (2004) Internet Users Information Privacy Concerns Model, and uses the theoretical underpinning of Social Contract Theory to assess how brand reputation moderates the relationship between trusting beliefs and perceived value (Privacy Calculus framework) with willingness to give personal information. The research is highly relevant as most privacy research undertaken to date focuses on consumer related concerns. Very little research exists examining the role of brand reputation and online privacy. Practical implications of this research include gaining knowledge as to how to minimise online privacy concerns; improve brand reputation; and provide insight on how to reduce consumer resistance to the collection of personal information and encourage consumer opt-in.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.