927 resultados para Ethics of information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction. Social media is becoming a vital source of information in disaster or emergency situations. While a growing number of studies have explored the use of social media in natural disasters by emergency staff, military personnel, medial and other professionals, very few studies have investigated the use of social media by members of the public. The purpose of this paper is to explore citizens’ information experiences in social media during times of natural disaster. Method. A qualitative research approach was applied. Data was collected via in-depth interviews. Twenty-five people who used social media during a natural disaster in Australia participated in the study. Analysis. Audio recordings of interviews and interview transcripts provided the empirical material for data analysis. Data was analysed using structural and focussed coding methods. Results. Eight key themes depicting various aspects of participants’ information experience during a natural disaster were uncovered by the study: connected; wellbeing; coping; help; brokerage; journalism; supplementary and characteristics. Conclusion. This study contributes insights into social media’s potential for developing community disaster resilience and promotes discussion about the value of civic participation in social media when such circumstances occur. These findings also contribute to our understanding of information experiences as a new informational research object.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An increasing amount of people seek health advice on the web using search engines; this poses challenging problems for current search technologies. In this paper we report an initial study of the effectiveness of current search engines in retrieving relevant information for diagnostic medical circumlocutory queries, i.e., queries that are issued by people seeking information about their health condition using a description of the symptoms they observes (e.g. hives all over body) rather than the medical term (e.g. urticaria). This type of queries frequently happens when people are unfamiliar with a domain or language and they are common among health information seekers attempting to self-diagnose or self-treat themselves. Our analysis reveals that current search engines are not equipped to effectively satisfy such information needs; this can have potential harmful outcomes on people’s health. Our results advocate for more research in developing information retrieval methods to support such complex information needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces a modified Kano approach to analysing and classifying quality attributes that drive student satisfaction in tertiary education. The approach provides several benefits over the traditional Kano approach. Firstly, it uses existing student evaluations of subjects in the educational institution instead of purpose-built surveys as the data source. Secondly, since the data source includes qualitative comments and feedback, it has the exploratory capability to identify emerging and unique attributes. Finally, since the quality attributes identified could be tied directly to students’ detailed feedback, the approach enables practitioners to easily translate the results into concrete action plans. In this paper, the approach is applied to analysing 26 subjects in the information systems school of an Australia university. The approach has enabled the school to uncover new quality attributes and paves the way for other institutions to use their student evaluations to continually understand and addressed students’ changing needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis provides a review of 199 papers published on Green IT/IS between 2007−2014, in order to present taxonomy of segments in Green IT/IS publications, where the segments are later used for multiple analyses to facilitate future research and to provide a retrospective analysis of existing knowledge and gaps thereof. This research also attempts to make a unique contribution to our understanding of Green IT/IS, by consolidating papers it observes current patterns of literature through approach analysis and segmentation, as well as allocating studies to the technology, process, or outcome (TPO) stage. Highlighting the necessity of a consolidated approach, these classification systems have been combined into a TPO matrix so that the studies could be arranged according to which stage of the Green IT/IS cycle they were focused on. We believe that these analyses will provide a solid platform from which future Green IT/IS research can be launched.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examined the role of information, efficacy, and 3 stressors in predicting adjustment to organizational change. Participants were 589 government employees undergoing an 18-month process of regionalization. To examine if the predictor variables had long-term effects on adjustment, the authors assessed psychological well-being, client engagement, and job satisfaction again at a 2-year follow-up. At Time 1, there was evidence to suggest that information was indirectly related to psychological well-being, client engagement, and job satisfaction, via its positive relationship to efficacy. There also was evidence to suggest that efficacy was related to reduced stress appraisals, thereby heightening client engagement. Last, there was consistent support for the stress-buffering role of Time 1 self-efficacy in the prediction of Time 2 job satisfaction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This constructivist grounded theory study investigated the nature of new mothers' information experience in social media. The findings provide a holistic view of the phenomenon and the resultant substantive grounded theory describes new mothers' information experience in social media as a complex, multi-layered, and highly contextualised phenomenon. It encapsulates multiple individual experiences of information, and is broader and deeper than the individual experiences it is comprised of. The theory incorporates the characteristics, dimensions and categories of experience to provide a holistic view of new mothers' information experience in social media.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Huge amount of data are generated from a variety of information sources in healthcare while the data sources originate from a veracity of clinical information systems and corporate data warehouses. The data derived from the above data sources are used for analysis and trending purposes thus playing an influential role as a real time decision-making tool. The unstructured, narrative data provided by these data sources qualify as healthcare big-data and researchers argue that the application of big-data in healthcare might enable the accountability and efficiency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system and in recent studies of patient control of access to their eHealth information. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called Accountable-eHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research used design science research methods to develop, instantiate, implement, and measure the acceptance of a novel software artefact. The primary purpose of this software artefact was to enhance data collection, improve its quality and enable its capture in classroom environments without distracting from the teaching activity. The artefact set is an iOS app, with supporting web services and technologies designed in response to teacher and pastoral care needs. System analysis and design used Enterprise Architecture methods. The novel component of the iOS app implemented proximity detection to identify the student through their iPad and automatically link to that student's data. The use of this novel software artefact and web services was trialled in a school setting, measuring user acceptance and system utility. This integrated system was shown to improve the accuracy, consistency, completeness and timeliness of captured data and the utility of the input and reporting systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The literature around Library 2.0 remains largely theoretical with few empirical studies and is particularly limited in developing countries such as Indonesia. This study addresses this gap and aims to provide information about the current state of knowledge on Indonesian LIS professionals’ understanding of Library 2.0. The researchers used qualitative and quantitative approaches for this study, asking thirteen closed- and open-ended questions in an online survey. The researchers used descriptive and in vivo coding to analyze the responses. Through their analysis, they identified three themes: technology, interactivity, and awareness of Library 2.0. Respondents demonstrated awareness of Library 2.0 and a basic understanding of the roles of interactivity and technology in libraries. However, overreliance on technology used in libraries to conceptualize Library 2.0 without an emphasis on its core characteristics and principles could lead to the misalignment of limited resources. The study results will potentially strengthen the research base for Library 2.0 practice as well as inform LIS curriculum in Indonesia so as to develop practitioners who are able to adapt to users’ changing needs and expectations. It is expected that the preliminary data from this study could be used to design a much larger and more complex future research project in this area.