991 resultados para Protection of personal information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project will produce animations in order to increase understandings of safe sex practices and address low perceptions of personal risk among two of the most vulnerable groups to HIV infection in Thailand. The animations will be incorporated into a prevention outreach program via Ipods, mobile phones and mobile-based portable devices to men who have sex with men (MSM) in their 'hide-outs', that is, parks, clubs and public toilets and male sex workers (MSW) in sex venues such as brothels, go-go bars and beats. To produce these animations, the project is first researching the sexual practices of MSM and MSW because of the lack of any substantive investigation of their social and sexual networks. This use of technology, informed by social research rather than behavioral studies, offers new possibilities to stem rapidly rising infection rates because it takes into account the diverse MSM and MSW identities. Overall, an estimated one- fifth (21%) of new HIV infections in Thailand occur in men who have unsafe sex with men. This disquieting increase highlights the fact that MSM are not adequately reached through HIV prevention programmes, most likely because little is known about their particular situations, contexts and practices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter presents a model which depicts the critical factors and assists in understanding the demands and effectiveness of Chief Information Officers (CIO) in public sector organisations. The chapter explores the literature on public sector CIO addressing personal and professional characteristics. It also reviews the literature pertaining to the responsibilities and career advancement and future directions in Government departments. The authors adopt a qualitative methodology by which semi-structured interviews are conducted with CIO representatives from a State Government in Australia. From collation of the interview results, utilising a ‘mind mapping’ strategy, the chapter identifies a model that adequately reflects the critical factors required for a public sector CIO. The chapter concludes that there are certain unique characteristics and responsibilities that a public sector CIO must possess yet a private sector CIO does not require. The chapter also acknowledges the importance of outlining a future direction of the role; something which is neglected by the literature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many aspects of our modern society now have either a direct or implicit dependence upon information technology. As such, a compromise of the availability or integrity in relation to these systems (which may encompass such diverse domains as banking, government, health care, and law enforcement) could have dramatic consequences from a societal perspective. These key systems are often referred to as critical infrastructure. Critical infrastructure can consist of corporate information systems or systems that control key industrial processes; these specific systems are referred to as ICS (Industry Control Systems) systems. ICS systems have devolved since the 1960s from standalone systems to networked architectures that communicate across large distances, utilise wireless network and can be controlled via the Internet. ICS systems form part of many countries’ key critical infrastructure, including Australia. They are used to remotely monitor and control the delivery of essential services and products, such as electricity, gas, water, waste treatment and transport systems. The need for security measures within these systems was not anticipated in the early development stages as they were designed to be closed systems and not open systems to be accessible via the Internet. We are also seeing these ICS and their supporting systems being integrated into organisational corporate systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Smartphone technology has become more popular and innovative over the last few years, and technology companies are now introducing wearable devices into the market. By emerging and converging with technologies such as Cloud, Internet of Things (IoT) and Virtualization, requirements to personal sensor devices are immense and essential to support existing networks, e.g. mobile health (mHealth) as well as IoT users. Traditional physiological and biological medical sensors in mHealth provide health data either periodically or on-demand. Both of these situations can cause rapid battery consumption, consume significant bandwidth, and raise privacy issues, because these sensors do not consider or understand sensor status when converged together. The aim of this research is to provide a novel approach and solution to managing and controlling personal sensors that can be used in various areas such as the health, military, aged care, IoT and sport. This paper presents an inference system to transfer health data collected by personal sensors efficiently and effectively to other networks in a secure and effective manner without burdening workload on sensor devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes Bibliography

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVE: A substantial proportion of chronically-stressed spousal dementia caregivers report fatigue. The objective of this study was to examine whether personal mastery moderates the relationship between caregiving status (caregiver/non-caregiver) and multiple dimensions of fatigue. METHODS: Seventy-three elderly Alzheimer's caregivers and 41 elderly non-caregivers completed the Multidimensional Fatigue Symptom Inventory-Short Form (MFSI-SF) and questionnaires assessing mastery. RESULTS: Regression analyses indicated that global fatigue was significantly higher for caregivers (M = 38.0 +/- 21.0) compared to non-caregivers (M = 18.2 +/- 10.4). However, personal mastery moderated the relation between caregiving status and global fatigue (t = -2.03, df = 107, p = 0.045), such that for those with low mastery, caregivers' fatigue scores were 18.1 points higher than non-caregivers, and for those with high mastery, this difference was only 7.5 points. For specific dimensions of fatigue, mastery moderated the relations between caregiving status and both emotional (t = -2.01, df = 107, p = 0.047) and physical (t = -2.51, df = 107, p = 0.014) fatigue. Specifically, association between caregiving status and emotional fatigue was greater when mastery was low than when mastery was high. Caregiving status was significantly associated with physical fatigue when mastery was low, but not when mastery was high. Significant main effects were found between mastery and general fatigue and vigor. CONCLUSION: Given the proportion of fatigued caregivers and the impact fatigue has on health; these findings provide important information regarding mastery's relationship with fatigue and may inform interventions aiming to alleviate fatigue in caregivers. Copyright (c) 2009 John Wiley ; Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Chemotherapy is a common and effective method to treat many forms of cancer. However, treatment of cancer with chemotherapy has severe side effects which often limit the doses of therapy administered. Because some cancer chemotherapeutics target proliferating cells and tissues, all dividing cells, whether normal or tumor, are affected. Cell culture studies have demonstrated that UCN-01 is able to reversibly and selectively arrest normal dividing cells; tumor cells lines do not undergo this temporary arrest. Following UCN-01 treatment, normal cells displayed a 50-fold increase in IC50 for camptothecin; tumor cells showed no such increased tolerance. We have examined the response of the proliferating tissues of the mouse to UCN- 01 treatment, using the small bowel epithelium as a model system. Our results indicate that UCN-01 treatment can cause a cell cycle arrest in the gut epithelium, beginning 24 hours following UCN-01 administration, with cell proliferation remaining suppressed for one week. Two weeks post-UCN-01 treatment the rate of proliferation returns to normal levels. 5-FU administered during this period demonstrates that UCN-01 is able to provide protection to normal cells of the mouse within a narrow window of efficacy, from three to five days post-UCN-01. UCN-01 pretreated mice displayed improved survival, weight status and blood markers following 5-FU compared to control mice, indicating that UCN-01 can protect normal dividing tissues. The mechanism by which UCN-01 arrests normal cells in vivo was also examined. We have demonstrated that UCN-01 treatment in mice causes an increase in the G1 phase cell cycle proteins cdk4 and cyclin D, as well as the inhibitor p27. Phosphorylated Rb was also elevated in the arrested cells. These results are a departure from cell culture studies, in which inhibition of G1 phase cyclin dependent kinases led to hyposphosphorylation of Rb. Future investigation will be required to understand the mechanism of UCN-01 action. This is important information, especially for identification of alternate compounds which could provide the protection afforded by UCN-01.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND A rapid review, guided by a protocol, was conducted to inform development of the World Health Organization's guideline on personal protective equipment in the context of the ongoing (2013-present) Western African filovirus disease outbreak, with a focus on health care workers directly caring for patients with Ebola or Marburg virus diseases. METHODS Electronic databases and grey literature sources were searched. Eligibility criteria initially included comparative studies on Ebola and Marburg virus diseases reported in English or French, but criteria were expanded to studies on other viral hemorrhagic fevers and non-comparative designs due to the paucity of studies. After title and abstract screening (two people to exclude), full-text reports of potentially relevant articles were assessed in duplicate. Fifty-seven percent of extraction information was verified. The Grading of Recommendations Assessment, Development and Evaluation framework was used to inform the quality of evidence assessments. RESULTS Thirty non-comparative studies (8 related to Ebola virus disease) were located, and 27 provided data on viral transmission. Reporting of personal protective equipment components and infection prevention and control protocols was generally poor. CONCLUSIONS Insufficient evidence exists to draw conclusions regarding the comparative effectiveness of various types of personal protective equipment. Additional research is urgently needed to determine optimal PPE for health care workers caring for patients with filovirus.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The TALISMAN+ project, financed by the Spanish Ministry of Science and Innovation, aims to research and demonstrate innovative solutions transferable to society which offer services and products based on information and communication technologies in order to promote personal autonomy in prevention and monitoring scenarios. It will solve critical interoperability problems among systems and emerging technologies in a context where heterogeneity brings about accessibility barriers not yet overcome and demanded by the scientific, technological or social-health settings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Which is the economic value of personal information? -How the exchange of information is benefiting society and the economy -How companies create value from personal information (by providing new services or servicing better an existing need). -The mechanisms by which personal information exchange creates economic value - How the level of privacy protection influences value creation in different markets

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This capstone examines the civil liberties of the modern terrorist and explicates the right to freedom of speech for terrorist organizations and their use of the internet. Terrorist organizations use the internet to promote ideas, recruit members, organize the flow of information, and coordinate actions. During the war on terror the US Patriot Act became law allowing for U.S. government censorship and surveillance of internet traffic and many believe these acts are a threat to civil liberties. Terrorist organizations have the right to express their views, however unpopular, and censoring or restricting web sites diminishes civil liberties for all, which democracies and liberal societies are founded upon.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L’évolution continue des besoins d’apprentissage vers plus d’efficacité et plus de personnalisation a favorisé l’émergence de nouveaux outils et dimensions dont l’objectif est de rendre l’apprentissage accessible à tout le monde et adapté aux contextes technologiques et sociaux. Cette évolution a donné naissance à ce que l’on appelle l'apprentissage social en ligne mettant l'accent sur l’interaction entre les apprenants. La considération de l’interaction a apporté de nombreux avantages pour l’apprenant, à savoir établir des connexions, échanger des expériences personnelles et bénéficier d’une assistance lui permettant d’améliorer son apprentissage. Cependant, la quantité d'informations personnelles que les apprenants divulguent parfois lors de ces interactions, mène, à des conséquences souvent désastreuses en matière de vie privée comme la cyberintimidation, le vol d’identité, etc. Malgré les préoccupations soulevées, la vie privée en tant que droit individuel représente une situation idéale, difficilement reconnaissable dans le contexte social d’aujourd’hui. En effet, on est passé d'une conceptualisation de la vie privée comme étant un noyau des données sensibles à protéger des pénétrations extérieures à une nouvelle vision centrée sur la négociation de la divulgation de ces données. L’enjeu pour les environnements sociaux d’apprentissage consiste donc à garantir un niveau maximal d’interaction pour les apprenants tout en préservant leurs vies privées. Au meilleur de nos connaissances, la plupart des innovations dans ces environnements ont porté sur l'élaboration des techniques d’interaction, sans aucune considération pour la vie privée, un élément portant nécessaire afin de créer un environnement favorable à l’apprentissage. Dans ce travail, nous proposons un cadre de vie privée que nous avons appelé « gestionnaire de vie privée». Plus précisément, ce gestionnaire se charge de gérer la protection des données personnelles et de la vie privée de l’apprenant durant ses interactions avec ses co-apprenants. En s’appuyant sur l’idée que l’interaction permet d’accéder à l’aide en ligne, nous analysons l’interaction comme une activité cognitive impliquant des facteurs contextuels, d’autres apprenants, et des aspects socio-émotionnels. L'objectif principal de cette thèse est donc de revoir les processus d’entraide entre les apprenants en mettant en oeuvre des outils nécessaires pour trouver un compromis entre l’interaction et la protection de la vie privée. ii Ceci a été effectué selon trois niveaux : le premier étant de considérer des aspects contextuels et sociaux de l’interaction telle que la confiance entre les apprenants et les émotions qui ont initié le besoin d’interagir. Le deuxième niveau de protection consiste à estimer les risques de cette divulgation et faciliter la décision de protection de la vie privée. Le troisième niveau de protection consiste à détecter toute divulgation de données personnelles en utilisant des techniques d’apprentissage machine et d’analyse sémantique.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L’évolution continue des besoins d’apprentissage vers plus d’efficacité et plus de personnalisation a favorisé l’émergence de nouveaux outils et dimensions dont l’objectif est de rendre l’apprentissage accessible à tout le monde et adapté aux contextes technologiques et sociaux. Cette évolution a donné naissance à ce que l’on appelle l'apprentissage social en ligne mettant l'accent sur l’interaction entre les apprenants. La considération de l’interaction a apporté de nombreux avantages pour l’apprenant, à savoir établir des connexions, échanger des expériences personnelles et bénéficier d’une assistance lui permettant d’améliorer son apprentissage. Cependant, la quantité d'informations personnelles que les apprenants divulguent parfois lors de ces interactions, mène, à des conséquences souvent désastreuses en matière de vie privée comme la cyberintimidation, le vol d’identité, etc. Malgré les préoccupations soulevées, la vie privée en tant que droit individuel représente une situation idéale, difficilement reconnaissable dans le contexte social d’aujourd’hui. En effet, on est passé d'une conceptualisation de la vie privée comme étant un noyau des données sensibles à protéger des pénétrations extérieures à une nouvelle vision centrée sur la négociation de la divulgation de ces données. L’enjeu pour les environnements sociaux d’apprentissage consiste donc à garantir un niveau maximal d’interaction pour les apprenants tout en préservant leurs vies privées. Au meilleur de nos connaissances, la plupart des innovations dans ces environnements ont porté sur l'élaboration des techniques d’interaction, sans aucune considération pour la vie privée, un élément portant nécessaire afin de créer un environnement favorable à l’apprentissage. Dans ce travail, nous proposons un cadre de vie privée que nous avons appelé « gestionnaire de vie privée». Plus précisément, ce gestionnaire se charge de gérer la protection des données personnelles et de la vie privée de l’apprenant durant ses interactions avec ses co-apprenants. En s’appuyant sur l’idée que l’interaction permet d’accéder à l’aide en ligne, nous analysons l’interaction comme une activité cognitive impliquant des facteurs contextuels, d’autres apprenants, et des aspects socio-émotionnels. L'objectif principal de cette thèse est donc de revoir les processus d’entraide entre les apprenants en mettant en oeuvre des outils nécessaires pour trouver un compromis entre l’interaction et la protection de la vie privée. ii Ceci a été effectué selon trois niveaux : le premier étant de considérer des aspects contextuels et sociaux de l’interaction telle que la confiance entre les apprenants et les émotions qui ont initié le besoin d’interagir. Le deuxième niveau de protection consiste à estimer les risques de cette divulgation et faciliter la décision de protection de la vie privée. Le troisième niveau de protection consiste à détecter toute divulgation de données personnelles en utilisant des techniques d’apprentissage machine et d’analyse sémantique.