813 resultados para Privacy and Awareness


Relevância:

90.00% 90.00%

Publicador:

Resumo:

We know where you live is an entertaining and informative quiz show highlighting the dangers resulting from a lack of awareness of Facebook's privacy and security settings. The game show is complemented by a short tutorial explaining these settings. The show is aimed at a wider audience and is suitable for all.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Speaker: Dr Kieron O'Hara Organiser: Time: 04/02/2015 11:00-11:45 Location: B32/3077 Abstract In order to reap the potential societal benefits of big and broad data, it is essential to share and link personal data. However, privacy and data protection considerations mean that, to be shared, personal data must be anonymised, so that the data subject cannot be identified from the data. Anonymisation is therefore a vital tool for data sharing, but deanonymisation, or reidentification, is always possible given sufficient auxiliary information (and as the amount of data grows, both in terms of creation, and in terms of availability in the public domain, the probability of finding such auxiliary information grows). This creates issues for the management of anonymisation, which are exacerbated not only by uncertainties about the future, but also by misunderstandings about the process(es) of anonymisation. This talk discusses these issues in relation to privacy, risk management and security, reports on recent theoretical tools created by the UKAN network of statistics professionals (on which the author is one of the leads), and asks how long anonymisation can remain a useful tool, and what might replace it.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This study examines current and forthcoming measures related to the exchange of data and information in EU Justice and Home Affairs policies, with a focus on the ‘smart borders’ initiative. It argues that there is no reversibility in the growing reliance on such schemes and asks whether current and forthcoming proposals are necessary and original. It outlines the main challenges raised by the proposals, including issues related to the right to data protection, but also to privacy and non-discrimination.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this review we evaluate the cognitive and neural effects of positive and negative mood on executive function. Mild manipulations of negative mood appear to have little effect on cognitive control processes, whereas positive mood impairs aspects of updating, planning and switching. These cognitive effects may be linked to neurochemistry: with positive mood effects mediated by dopamine while negative mood effects may be mediated by serotonin levels. Current evidence on the effects of mood on regional brain activity during executive functions, indicates that the prefrontal cortex is a recurrent site of integration between mood and cognition. We conclude that there is a disparity between the importance of this topic and awareness of how mood affects, executive functions in the brain. Most behavioural and neuroimaging studies of executive function in normal samples do not explore the potential role of variations in mood, yet the evidence we outline indicates that even mild fluctuations in mood can have a significant influence on neural activation and cognition. (c) 2006 Elsevier Ltd. All rights reserved.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Participants' eye-gaze is generally not captured or represented in immersive collaborative virtual environment (ICVE) systems. We present EyeCVE. which uses mobile eye-trackers to drive the gaze of each participant's virtual avatar, thus supporting remote mutual eye-contact and awareness of others' gaze in a perceptually unfragmented shared virtual workspace. We detail trials in which participants took part in three-way conferences between remote CAVE (TM) systems linked via EyeCVE. Eye-tracking data was recorded and used to evaluate interaction, confirming; the system's support for the use of gaze as a communicational and management resource in multiparty conversational scenarios. We point toward subsequent investigation of eye-tracking in ICVEs for enhanced remote social-interaction and analysis.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Individual-level constructs are seldom taken into consideration in construction management research relating to project performance. This is antithetical to the objectives of properly conceptualizing and contextualizing the research we do because many project performance outcomes, such as the extent of cooperation and level of communication or teamwork are influenced and moderated by individuals’ perceptions, values and behaviour. A brief review of the literature in organizational studies centred on culture, identity, empowerment and trust is offered. These constructs are then explored in relation to project performance issues and outcomes, and it is noted that they are predominantly studied at the project and industry levels. We argue that focusing these constructs at the individual unit of analysis has significant implications for project performance and therefore their effects need to be systematically accounted for in explanations of the success and failure of projects. Far from being prescriptive, the aim is to generate interest and awareness for more focused research at the individual level of analysis in order to add new insights and perspectives to critical performance questions in construction management. To this end, a research agenda is outlined, arguing that construction management research integrating individual-level constructs and broader, macro-contextual issues will help define and enhance the legitimacy of the field.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

As part of the rebuilding efforts following the long civil war, the Liberian government has renegotiated long-term contracts with international investors to exploit natural resources. Substantial areas of land have been handed out in large-scale concessions across Liberia during the last five years. While this may promote economic growth at the national level, such concessions are likely to have major environmental, social and economic impacts on local communities, who may not have been consulted on the proposed developments. This report examines the potential socio-economic and environmental impacts of a proposed large-scale oil palm concession in Bopolu District, Gbarpolu County in Liberia. The research provided an in-depth mapping of current resource use, livelihoods and ecosystems services, in addition to analysis of community consultation and perceptions of the potential impacts of the proposed development. This case study of a palm oil concession in Liberia highlights wider policy considerations regarding large-scale land acquisitions in the global South: • Formal mechanisms may be needed to ensure the process of Free, Prior, Informed Consent takes place effectively with affected communities and community land rights are safeguarded. • Rigorous Environmental and Social Impact Assessments need to be conducted before operations start. Accurate mapping of customary land rights, community resources and cultural sites, livelihoods, land use, biodiversity and ecosystems services is a critical tool in this process. • Greater clarity and awareness-raising of land tenure laws and policies is needed at all levels. Good governance and capacity-building of key institutions would help to ensure effective implementation of relevant laws and policies. • Efforts are needed to improve basic services and infrastructure in rural communities and invest in food crop cultivation in order to enhance food security and poverty alleviation. Increasing access to inputs, equipment, training and advice is especially important if male and female farmers are no longer able to practice shifting cultivation due to the reduction/ loss of customary land and the need to farm more intensively on smaller areas of land.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The use of online data is becoming increasingly essential for the generation of insight in today’s research environment. This reflects the much wider range of data available online and the key role that social media now plays in interpersonal communication. However, the process of gaining permission to use social media data for research purposes creates a number of significant issues when considering compatibility with professional ethics guidelines. This paper critically explores the application of existing informed consent policies to social media research and compares with the form of consent gained by the social networks themselves, which we label ‘uninformed consent’. We argue that, as currently constructed, informed consent carries assumptions about the nature of privacy that are not consistent with the way that consumers behave in an online environment. On the other hand, uninformed consent relies on asymmetric relationships that are unlikely to succeed in an environment based on co-creation of value. The paper highlights the ethical ambiguity created by current approaches for gaining customer consent, and proposes a new conceptual framework based on participative consent that allows for greater alignment between consumer privacy and ethical concerns.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Speaking of the public response to the deaths of children at the Bristol Royal Infirmary before 2001, the BMJ commented that the NHS would be 'all changed, changed utterly'. Today, two inquiries into the Mid Staffordshire Foundation Trust suggest nothing changed at all. Many patients died as a result of their care and the stories of indifference and neglect there are harrowing. Yet Bristol and Mid Staffordshire are not isolated reports. In 2011, the Health Services Ombudsman reported on the care of elderly and frail patients in the NHS and found a failure to recognise their humanity and individuality and to respond to them with sensitivity, compassion and professionalism. Likewise, the Care Quality Commission and Healthcare Commission received complaints from patients and relatives about the quality of nursing care. These included patients not being fed, patients left in soiled bedding, poor hygiene practices, and general disregard for privacy and dignity. Why is there such tolerance of poor clinical standards? We need a better understanding of the circumstances that can lead to these outcomes and how best to respond to them. We discuss the findings of these and other reports and consider whether attention should be devoted to managing individual behaviour, or focus on the systemic influences which predispose hospital staff to behave in this way. Lastly, we consider whether we should look further afield to cognitive psychology to better understand how clinicians and managers make decisions?

Relevância:

90.00% 90.00%

Publicador:

Resumo:

CBPP is an important transboundary disease in sub-Saharan Africa whose control is urgent. Participatory data collection involving 52 focus group discussions in 37 village clusters and key informant interviews, a cross-sectional study involving 232 households and a post-vaccination follow up involving 203 households was carried out in 2006-2007 in Narok South district of Kenya. This was to investigate knowledge, attitudes, perceptions and practices (KAPP) associated with control of CBPP as well as the adverse post-vaccination reactions in animals in order to advice the control policy. The community perceived trans-boundary CBPP threat to their cattle. They had traditional disease coping mechanisms and were conversant with CBPP prevention and control with 49.8% (95%CI: 42.8-56.7%) giving priority to CBPP control. However, 12.9% (95%CI: 9.0-18.1%) of pastoralists had no knowledge of any prevention method and 10.0% (95%CI: 6.5-14.7%) would not know what to do or would do nothing in the event of an outbreak. Although 43.5% (95%CI: 37.1-50.2%) of pastoralists were treating CBPP cases with antimicrobials, 62.5% (95%CI: 52.1-71.7%) of them doubted the effectiveness of the treatments. Pastoralists perceived vaccination to be the solution to CBPP but vaccination was irregular due to unavailability of the vaccine. Vaccination was mainly to control outbreaks rather than preventive and exhibited adverse post-vaccination reactions among 70.4% (95%CI: 63.6-76.5%) of herds and 3.8% (95%CI: 3.5-4.2%) of animals. Consequently, nearly 25.2% (95%CI: 18.5-33.2%) of pastoralists may resist subsequent vaccinations against CBPP. Pastoralists preferred CBPP vaccination at certain times of the year and that it is combined with other vaccinations. In conclusion, pastoralists were not fully aware of the preventive measures and interventions and post-vaccination reactions may discourage subsequent CBPP vaccinations. Consequently there is need for monitoring and management of post vaccination reactions and awareness creation on CBPP prevention and interventions and their merits and demerits. CBPP vaccine was largely unavailable to the pastoralists and the preference of the pastoralists was for vaccination at specified times and vaccine combinations which makes it necessary to avail the vaccine in conformity with the pastoralists preferences. In addition, planning vaccinations should involve pastoralists and neighbouring countries. As the results cannot be generalized, further studies on CBPP control methods and their effectiveness are recommended.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

While several privacy protection techniques are pre- sented in the literature, they are not complemented with an established objective evaluation method for their assess- ment and comparison. This paper proposes an annotation- free evaluation method that assesses the two key aspects of privacy protection that are privacy and utility. Unlike some existing methods, the proposed method does not rely on the use of subjective judgements and does not assume a spe- cific target type in the image data. The privacy aspect is quantified as an appearance similarity and the utility aspect is measured as a structural similarity between the original raw image data and the privacy-protected image data. We performed an extensive experimentation using six challeng- ing datasets (including two new ones) to demonstrate the effectiveness of the evaluation method by providing a per- formance comparison of four state-of-the-art privacy pro- tection techniques.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that follow the "Privacy by Design" model created by Ann Cavoukian, Ph.D.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts. Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In recent decades, library associations have advocated for the adoption of privacy and confidentiality policies as practical support to the Library Code of Ethics with a threefold purpose to (1) define and uphold privacy practices within the library, (2) convey privacy practices to patrons and, (3) protect against potential liability and public relations problems. The adoption of such policies has been instrumental in providing libraries with effective responses to surveillance initiatives such as warrantless requests and the USA PATRIOT ACT. Nevertheless, as reflected in recent news stories, the rapid emergence of data brokerage relationships and technologies and the increasing need for libraries to utilize third party vendor services have increased opportunities for data surveillers to access patrons’ personal information and reading habits, which are funneled and made available through multiple online library service platforms. Additionally, the advice that libraries should “contract for the same level of privacy reflected in their privacy policies” is no longer realistic given that the existence of multiple vendor contracts negotiated at arms length is likely to produce varying privacy terms and even varying definitions of what constitutes personal information (PII). These conditions sharply threaten the effectiveness and relevance of library privacy policies and privacy initiatives in that such policies increasingly offer false comfort by failing to reflect privacy weaknesses in the data sharing landscape and vendor contracts when library-vendor contracts fail to keep up with vendor data sharing capabilities. While some argue that library privacy ethics are antiquated and rendered obscure in the current online sharing economy PEW studies point to pronounced public discomfort with increasing privacy erosion. At the same time, new directions in FTC enforcement raise the possibility that public institutions’ privacy policies may serve as swords to unfair or deceptive commercial trade practices – offering the potential of renewed relevance for library privacy and confidentiality policies. This dual coin of public concern and the potential for enhanced FTC enforcement suggests that when crafting privacy polices libraries must now walk the knife’s edge by offering patrons both realistic notice about the limitations of protections the library can ensure while at the same time publicly holding vendors accountable to library privacy ethics and expectations. Potential solutions for how to walk this edge are developed and offered as a subject for further discussion to assist the modification of model policies for both public and academic libraries alike.