961 resultados para privacy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Self-report underpins our understanding of falls among people with Parkinson’s (PwP) as they largely happen unwitnessed at home. In this qualitative study, we used an ethnographic approach to investigate which in-home sensors, in which locations, could gather useful data about fall risk. Over six weeks, we observed five independently mobile PwP at high risk of falling, at home. We made field notes about falls (prior events and concerns) and recorded movement with video, Kinect, and wearable sensors. The three women and two men (aged 71 to 79 years) having moderate or severe Parkinson’s were dependent on others and highly sedentary. We most commonly noted balance protection, loss, and restoration during chair transfers, walks across open spaces and through gaps, turns, steps up and down, and tasks in standing (all evident walking between chair and stairs, e.g.). Our unobtrusive sensors were acceptable to participants: they could detect instability during everyday activity at home and potentially guide intervention. Monitoring the route between chair and stairs is likely to give information without invading the privacy of people at high risk of falling, with very limited mobility, who spend most of the day in their sitting rooms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

I consider the case for genuinely anonymous web searching. Big data seems to have it in for privacy. The story is well known, particularly since the dawn of the web. Vastly more personal information, monumental and quotidian, is gathered than in the pre-digital days. Once gathered it can be aggregated and analyzed to produce rich portraits, which in turn permit unnerving prediction of our future behavior. The new information can then be shared widely, limiting prospects and threatening autonomy. How should we respond? Following Nissenbaum (2011) and Brunton and Nissenbaum (2011 and 2013), I will argue that the proposed solutions—consent, anonymity as conventionally practiced, corporate best practices, and law—fail to protect us against routine surveillance of our online behavior. Brunton and Nissenbaum rightly maintain that, given the power imbalance between data holders and data subjects, obfuscation of one’s online activities is justified. Obfuscation works by generating “misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating good data from bad,” thus decreasing the value of the data collected (Brunton and Nissenbaum, 2011). The phenomenon is as old as the hills. Natural selection evidently blundered upon the tactic long ago. Take a savory butterfly whose markings mimic those of a toxic cousin. From the point of view of a would-be predator the data conveyed by the pattern is ambiguous. Is the bug lunch or potential last meal? In the light of the steep costs of a mistake, the savvy predator goes hungry. Online obfuscation works similarly, attempting for instance to disguise the surfer’s identity (Tor) or the nature of her queries (Howe and Nissenbaum 2009). Yet online obfuscation comes with significant social costs. First, it implies free riding. If I’ve installed an effective obfuscating program, I’m enjoying the benefits of an apparently free internet without paying the costs of surveillance, which are shifted entirely onto non-obfuscators. Second, it permits sketchy actors, from child pornographers to fraudsters, to operate with near impunity. Third, online merchants could plausibly claim that, when we shop online, surveillance is the price we pay for convenience. If we don’t like it, we should take our business to the local brick-and-mortar and pay with cash. Brunton and Nissenbaum have not fully addressed the last two costs. Nevertheless, I think the strict defender of online anonymity can meet these objections. Regarding the third, the future doesn’t bode well for offline shopping. Consider music and books. Intrepid shoppers can still find most of what they want in a book or record store. Soon, though, this will probably not be the case. And then there are those who, for perfectly good reasons, are sensitive about doing some of their shopping in person, perhaps because of their weight or sexual tastes. I argue that consumers should not have to pay the price of surveillance every time they want to buy that catchy new hit, that New York Times bestseller, or a sex toy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

After the WWII, there was much concern to protect human rights situation all over the world. During the cold wars, huge displacement took place within different countries due to internal arms/ethnic conflicts. Millions of IDPs, who were uprooted by armed conflict or ethnic strife faced human rights violence. In 2002, there were estimated between 20-25 millions IDPs in the world (Phuong, p.1). Internally displacement is a worldwide problem and millions of the people displaced in Africa and Asia. These all Internal displacements of the people are only the result of the conflicts or the violations of the Human Rights but also sometimes it happened because of the natural disasters. “All human beings are born free and equal in dignity and rights..."(Streich, Article 1) This article works as the foundation of human rights which gives every human being an equal rights and opportunity to maintain his/her dignity. Human Rights issues related to human dignity must be taken very seriously and should not be ignored at any level; Many human rights issues are not always visible, issues such as: privacy, security, equality, protection of social and cultural values etc. In this paper I am going to apply theoretical approach of “all human being are equal in dignity and rights” to defend IDPs rights.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book presents contemporary European research on eParticipation by means of a 13 chapters each describing a PhD research project as well as analyses of this research. The book both reflects the field and contributes to shaping it by discussing both long-standing and emerging issues. Contributions include three chapters on issues of DEVELOPMENT, including communities of practice, user-centred development, and safety & privacy issues, four chapters on IMPLEMENTATION, including spatial planning, participatory budgeting, and transformation processes, and five chapters on issues of USE, focusing on local government, developing countries, EU, civil society and NGO.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Becoming a parent of a preterm baby requiring neonatal care constitutes an extraordinary life situation in which parenting begins and evolves in a medical and unfamiliar setting. Although there is increasing emphasis within maternity and neonatal care on the influence of place and space upon the experiences of staff and service users, there is a lack of research on how space and place influence relationships and care in the neonatal environment. The aim of this study was to explore, in-depth, the impact of place and space on parents’ experiences and practices related to feeding their preterm babies in Neonatal Intensive Care Units (NICUs) in Sweden and England. Methods: An ethnographic approach was utilised in two NICUs in Sweden and two comparable units in England, UK. Over an eleven month period, a total of 52 mothers, 19 fathers and 102 staff were observed and interviewed. A grounded theory approach was utilised throughout data collection and analysis. Results: The core category of ‘the room as a conveyance for an attuned feeding’ was underpinned by four categories: the level of ‘ownership’ of space and place; the feeling of ‘at-homeness’; the experience of ‘the door or a shield’ against people entering, for privacy, for enabling a focus within, and for regulating socialising and the; ‘window of opportunity’. Findings showed that the construction and design of space and place was strongly influential on the developing parent-infant relationship and for experiencing a sense of connectedness and a shared awareness with the baby during feeding, an attuned feeding. Conclusions: If our proposed model is valid, it is vital that these findings are considered when developing or reconfiguring NICUs so that account is taken of the influences of spatiality upon parent’s experiences. Even without redesign there are measures that may be taken to make a positive difference for parents and their preterm babies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts. Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Despite extensive use of self-rated health questions in youth studies, little is known about what such questions capture among adolescents. Hence, the aim of this study was to explore how adolescents interpret and reason when answering a question about self-rated health. METHODS: A qualitative study using think-aloud interviews explored the question, "How do you feel most of the time?", using five response options ("Very good", "Rather good", "Neither good, nor bad", "Rather bad", and "Very bad"). The study involved 58 adolescents (29 boys and 29 girls) in lower secondary school (7th grade) and upper secondary school (12th grade) in Sweden. RESULTS: Respondents' interpretations of the question about how they felt included social, mental, and physical aspects. Gender differences were found primarily in that girls emphasized stressors, while age differences were reflected mainly in the older respondents' inclusion of a wider variety of influences on their assessments. The five response options all demonstrated differences in self-rated health, and the respondents' understanding of the middle option, "Neither good, nor bad", varied widely. In the answering of potential sensitive survey questions, rationales for providing honest or biased answers were described. CONCLUSIONS: The use of a self-rated health question including the word 'feel' captured a holistic view of health among adolescents. Differences amongst response options should be acknowledged when analyzing self-rated health questions. If anonymity is not feasible when answering questions on self-rated health, a high level of privacy is recommended to increase the likelihood of reliability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increased use of email and the internet in the workplace raises important legal questions for workers and employers. The purpose of this paper is to  explore some of the legal implications of use by employees of workplace email and internet systems, with particular focus on employer monitoring of the use of email and internet and its implications for employee privacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Concerns over the overall cost of marketing research and the cost per usable response have in large measure caused marketing practitioners to turn to online marketing research techniques, either as a solus technique, or in a mixed mode application. However, the use of e-mail and mixed mode surveys such as postal invitations to complete online questionnaires present both familiar and new issues, as the extant literature illustrates. This paper examines an earlier study before reporting findings from the present study, which employs a method that ascertains the probability of commissioning and/or responding to four survey research methods, described in scenarios and delivered using e-mail and the World Wide Web (Web). It is evident that while perceptions of e-mail, the Internet, and privacy have changed since early use of the Internet and more particularly the World Wide Web, and there is acknowledgment in the literature concerning the lower costs and faster response speeds of online marketing research, small businesses do appear to discriminate in favour of targeted online survey methods over postal surveys, portrayed as scenarios in this study. They indicate a greater likelihood of responding to targeted, hybrid email/Web surveys than traditional postal surveys.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Of the many different variations that can occur in human sexual formation, transsexualism no doubt remains the least understood by the wider Australian community. As a consequence, the process of attaining human rights to legal status, privacy, dignity and freedom from discrimination for those who experience this unusual condition has been a slow and sometimes frustrating one. The article seeks to introduce the reader to some of the more recent developments in the international jurisprudence of transsexualism and the underlying medical evidence that has supported them. It also offers criticism of the belated attempt by the State of Victoria,  with the Births, Deaths & Marriages Registration (Amendment) Act 2004, to establish certain statutory rights in this regard. While the legislation was enacted with the stated and very laudable purpose of providing for the  correction of birth records on the Register of Births of those people with transsexualism who have altered their phenotypic sex by hormonal  medication and surgery, the article argues it has also served to remove other equally important rights already won and proposes that a final remedy will only be found, as on previous occasions, in the courts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Few studies have compared sexual behaviours among adolescents with high-functioning autism (HFA) and typical populations, and indicated whether specialized education is required. We hypothesized that adolescents with HFA would (1) display poorer social behaviours; (2) engage in fewer behaviours related to privacy and have poorer knowledge regarding privacy issues; (3) have less sex education; and (4) display more inappropriate sexual behaviours; and that (5) parental concerns would be greater for the HFA sample. Parents of typical adolescents (n = 50) and adolescents with HFA (n = 23) were surveyed with a Sexual Behaviour Scale (SBS) developed by the authors, with domains corresponding to the hypotheses. The HFA and typical groups were found to be significantly different on all five domains. However, following covariation with age and level of social behaviour, it was found that only parental concerns about their child distinguished between typical adolescents and those with HFA. Specialized sex education programmes with a social interaction emphasis should be considered for this group.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most research concludes that asynchronous activities increase the amount of student participation and improve the student-centred learning atmosphere. This raised concerns when students didn’t access discussion sites as part of their postgraduate teaching of English language studies. This study focused on the perception of a group of on-campus and off-campus postgraduate TESOL students (both native and non-native speakers of English) towards two different kinds of asynchronous activities: email and online discussion. The result showed that students preferred the email to the discussion though a large majority of both NS and NNS supported the use of online discussion as a learning tool. The reasons given included time as well as privacy, which, unexpectedly, was an issue raised mostly by native speakers of English.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the September 11, 2001 terrorist attacks in New York City, many countries including Australia and Malaysia have been able to justify the use biometric devices such as finger print scans, retina scans and facial recognition for identification and surveillance of its citizens and others in the name of national security. In addition, biometric devices are increasingly being used worldwide by organizations to keep track of their employees and their productivity, leading to concerns of privacy, the safety, reliability, abuse and misuse of the data collected and violations of civil liberties. Taking the critical theory perspective, this paper will analyse the data collected and report on the findings of a survey carried out in Australia and Malaysia, with respect to the responses provided and opinions expressed to the survey s open ended and other questions
by individuals as to their current use, experiences, preferences, concerns about the devices and the situations in which they think biometric devices should be used, including in their workplaces. This descriptive study uses both quantitative and qualitative data to examine what Australians and Malaysians think about the use of biometric devices in everyday situtions
and compare them as to their similarities and differences. The paper will then critically examine the ethical and civil liberties issues involved in the use of biometric devices in everyday life and argues that regulatory and legal measures should be taken to safeguard the rights of citizens while maintaining national security and productivity, in order to avoid the situation of Michel Foucaults Panopticon becoming an unpleasant everyday reality, which could negatively irifluence socialjustice and create social change due to its effects on individuals in two multicultural societies. The paper will argue about the need to educate the general public as to the issues of surveillance and privacy involved in the use of biometric devices in everyday situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the September 11, 2001 terrorist attacks in New York, the use of biometric devices such as fingerprint scans, retina and iris scans and facial recognition in everyday situations for national security and border control, have become commonplace. This has resulted in the biometric industry moving from being a niche technology to one that is ubiquitous. As a result. more and more employers are using biometrics to secure staff access to their facilities as well as for tracking staff work hours, maintaining 'discipline' and carry out surveillance against thefts. detecting work hour abuses and fraud. However, the data thus collected and the technologies themselves are feared of having the potential for and actually being misused - both in terms of the violating staff privacy and discrimination and oppression of targeted workers. This paper examines the issue of using biometric devices in organisational settings their advantages, disadvantages and actual and potential abuses from the point of view of critical theory. From the perspectives of Panoptic surveillance and hegemonic organisational control, the paper examines the issues related to privacy and identification, biometrics and privacy, biometrics and the 'body', and surveillance and modernity. The paper also examines the findings ofa survey carried out in Australia. Malaysia and the USA on respondents' opinions on the use of biometric devices in everyday life including at workplaces. The paper concludes that along with their applications in border control and national security, the use of biometric devices should be covered by relevant laws and regulations. guidelines and codes of practice. in order to balance the rights to privacy and civil liberties of workers with employers' need for improved productivity, reduced costs, safeguards related to occupational health and safety, equal opportunity, and workplace harassment of staff and other matters, that employers are legally responsible for.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The open provenance architecture (OPA) approach to the challenge was distinct in several regards. In particular, it is based on an open, well-defined data model and architecture, allowing different components of the challenge workflow to independently record documentation, and for the workflow to be executed in any environment. Another noticeable feature is that we distinguish between the data recorded about what has occurred, emphprocess documentation, and the emphprovenance of a data item, which is all that caused the data item to be as it is and is obtained as the result of a query over process documentation. This distinction allows us to tailor the system to separately best address the requirements of recording and querying documentation. Other notable features include the explicit recording of causal relationships between both events and data items, an interaction-based world model, intensional definition of data items in queries rather than relying on explicit naming mechanisms, and emphstyling of documentation to support non-functional application requirements such as reducing storage costs or ensuring privacy of data. In this paper we describe how each of these features aid us in answering the challenge provenance queries.