91,906 research outputs found

    Exploring the evidence base for national and regional policy interventions to combat resistance

    Get PDF
    The effectiveness of existing policies to control antimicrobial resistance is not yet fully understood. A strengthened evidence base is needed to inform effective policy interventions across countries with different income levels and the human health and animal sectors. We examine three policy domains—responsible use, surveillance, and infection prevention and control—and consider which will be the most effective at national and regional levels. Many complexities exist in the implementation of such policies across sectors and in varying political and regulatory environments. Therefore, we make recommendations for policy action, calling for comprehensive policy assessments, using standardised frameworks, of cost-effectiveness and generalisability. Such assessments are especially important in low-income and middle-income countries, and in the animal and environmental sectors. We also advocate a One Health approach that will enable the development of sensitive policies, accommodating the needs of each sector involved, and addressing concerns of specific countries and regions

    An Examination of Privacy Policies of US Government Senate Websites.

    Get PDF
    US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy policies. This research studied privacy policy protection of 50 US Senate sites and found that few had comprehensive elements of privacy policies and a general lack of protection of personal data that could be obtain from the website. The study reviewed which specific privacy elements are most often mishandled, as well as suggestions for improving an overall online privacy practice

    An Examination of Privacy Policies of Global University Web Sites

    Get PDF
    Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning. However, adding online services requires that personal data is kept within computerized systems, thus putting personal private information at risk. Online consumers express concern about the risk of their personal private data and demand to know how organizations will protect their records. It is imperative that firms have mechanisms to guard their data and publish protection information within online privacy policies to mitigate user distrust. However, although industry privacy groups may recommend better protection and some countries may legislate its use; this is not universal in all university sites. This study analyzes 90 universities site throughout the world to determine the use of privacy protection. The results show a lack of use of certain privacy mechanisms. The research suggests methods for improving protection

    Empirical Study of Privacy Issues Among Social Networking Sites.

    Get PDF
    Social media networks are increasing their types of services and the numbers of users are rapidly growing. However, online consumers have expressed concerns about their personal privacy protection and recent news articles have shown many privacy breaches and unannounced changes to privacy policies. These events could adversely affect data protection and compromise user trust, thus it is vital that social sites contain explicit privacy policies stating a comprehensive list of protection methods. This study analyzes 60 worldwide social sites and finds that even if sites contain a privacy policy, the site pages may also possess technical elements that could be used to serendipitously collect personal information. The results show specific technical collection methods most common within several social network categories. Methods for improving online privacy practices are suggested

    Analysis of UK Parliament Web Sites for Disability Accessibility

    Get PDF
    The growth of the Internet has led to an increase in the number of public services offered by U.K. government entities on their Web sites. A variety of consumers use e-government sites, and those individuals with disabilities are guaranteed the same access government sites under the U.K.’s Disability Discrimination Act (DDA) of 1995. This law provides equality in access, and implements penalties for non-adherence to the law. Industry standards also exist which helps site developers to create better site accessibility. However, despite both standards and legal regulations, total openness of sites for people with disabilities is still not widespread. The purpose of this study is to examine the level of accessibility of a randomly selected sample of 130 members of the U.K. House of Commons. Each site was analyzed using an online software tool –Truwex - to determine if they met industry Web Content Accessibility Guidelines (WCAG) levels 1.0 and 2.0 standards and DDA law. The results showed that the majority of the sites did not meet either guidelines or legal mandates. Many of the sites displayed similar precedents when it came to the types of non-compliance, and could easily improve compliance with minor changes

    Future consumer mobile phone security: a case study using the data centric security model

    Get PDF
    In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security threats, a number of solutions have been suggested,\ud mostly aiming at securing data rather than whole systems or networks.\ud However, these visions (such as proposed by the Jericho Forum [9] and IBM\ud [4]) are mostly concerned with large (inter-) enterprise systems. Until now, it is\ud unclear what data-centric security could mean for other systems and environments.\ud One particular category of systems that has been neglected is that of\ud consumer mobile phones. Currently, data security is usually limited to a PIN\ud number on startup and the option to disable wireless connections. The lack of\ud protection does not seem justified, as these devices have steadily increased in\ud capabilities and capacity; they can connect wirelessly to the Internet and have\ud a high risk of being lost or stolen [8]. This not only puts end users at risk, but\ud also their contacts, as phones can contain privacy sensitive data of many others.\ud For example, if birth dates and addresses are kept with the contact records, in\ud many cases a thief will have enough information to impersonate a contact and\ud steal his identity.\ud Could consumer mobile phones benefit from data-centric security? How\ud useful is data-centric security in this context? These are the core questions we\ud will try to address here

    Support for National Institutes of Health (NIH) Implementation of the Revised Public Access Policy

    Get PDF
    Comments submitted by SPARC (Scholarly Publishing and Academic Resources Coalition) in response to the U.S. National Institutes of Health (NIH) “Request for Information: NIH Public Access Policy” issued on March 31, 2008 (73 Federal Register 16881)
    corecore