224,893 research outputs found
EHRs at King Fahad Specialist Hospital : an overview of professionals' perspectives on the use of biometric patient identification for privacy and confidentiality, taking into consideration culture and religion : a thesis presented in partial fulfilment of the requirements of the degree of Master in Information Science, Massey University, Albany, Auckland, New Zealand
The Kingdom of Saudi Arabia is focused on expanding use of biometric technologies
and it is a matter of time before this expansion includes medical institutions. However
there is a lack of research on Electronic Health Records (EHRs) in Saudi Arabian
hospitals, especially on the staff views and attitudes in relation to confidentiality,
privacy, and security policies in the context of Saudi society, which is governed largely
by culture and Islam. This research utilised an online survey tool to ask doctors,
managers, and IT professionals, at the King Fahad Specialist Hospital (KFSH) about
these aspects and explored if they recommend the classic non-biometric access method
over the rather intrusive, yet more advanced, biometric patient identification (BPI)
technology. Encouragingly, all the participants recommended BPI methods with the
least favoured method being the facial recognition method for Saudi female patients.
This study also focused on whether staff believed that religious and cultural issues
influence EHR privacy and confidentiality, as the literature showed that in certain cases
unauthorised revelation of an EHR could lead to honorary killing of the patient.
Implications of this research include the need for comprehensive staff training on being
culturally aware, as well as training on EHR security policy, privacy, and
confidentiality
A comparison between e-government practices in Taiwan and New Zealand.
Few studies have focused on comparing the state of e-government in Western- and Non-Western settings, where the political, social, economic, and cultural environments can be markedly different. This paper compares the views of local authority policymakers in Taiwan and New Zealand, in order to judge the sophistication of their e-government initiatives via the formal and informal policies underpinning website development.
Good level of agreement were observed between the Taiwanese and New Zealander respondents for the high levels of significance they attached to 3 key issues, which the authors argue are critical for successful e-government: Accessibility, Security and Privacy. Similarly, the policymakers agreed on a medium level of significance for the 7 key issues: E-procurement, Digital Divide, Private Sector, Taxation, Cultural Obstacles, IT Workforce, and Social Effects (and on a low level of significance for E-Tailing). It was concluded that government policymakers in both countries, in an era of commercial online social networking, are continuing to favour pushing(what they deem to be important) information to citizens, rather than creating collaborative service channels with citizens, contractors and suppliers or integrating separate service processes to satisfy all stakeholders. An attendant lack of commitment to promoting heightened (e-)democracy was also noted, especially in New Zealand
Usage and Consequences of Privacy Settings in Microblogs
Twitter facilitates borderless communication, informing us about real-life events and news. To address privacy needs, Twitter provides various security settings. However, users with protected profiles are limited to their friendship circles and thus might have less visibility from outside of their networks. Previous research on privacy reveals information leakage and security threats in social networks despite of privacy protection enabled. In this context, could protecting microblogging content be counterproductive for individual users? Would microbloggers use Twitter more effectively when opening their content for everyone rather than protecting their profiles? Are user profile protection features necessary? We wanted to address this controversy by studying how microbloggers exploit privacy and geo-location setting controls. We followed a set of user profiles during half of year and compared their usage of Twitter features including status updates, favorites, being listed, adding friends and follower contacts. Our findings revealed that protecting user accounts is not always detrimental to exploiting the main microblogging features. Additionally, we found that users across geographic regions have different privacy preferences. Our results enable us to get insights into privacy issues in microblogs, underlining the need of respecting user privacy in microblogs. We suggest to further research user privacy controls usage in order to understand user goals and motivations for sharing and disclosing their microblogging data online with the focus on user cultural origins
Seeker Are You Protected? Social Media and Protection Granted to Women in Sri Lanka
Facebook, which revolutionized social networking, offers solid platforms for women freely to express and give life to their opinions on any subject they desire, from fashion to human rights, feminism to politics. As a result, a number of issues have arisen regarding the safety of social exposure, chief amongst them being the preservation of privacy. This study examines privacy concerns of female Facebook users in Sri Lanka (age group of 20-30) and the possible judicious measures that can be taken by government organizations regarding this matter. During the course of this research, a mixed methodology was adopted in data collection, which included 118 surveys and interviews. The general concern of Facebook privacy, attitudes and expectations was evaluated through the survey. Interviews were conducted with the goal of bringing attention to and evaluating the existing privacy protection mechanisms provided for Facebook users. The willingness displayed by many females to disclose personal views and information on Facebook has become a phenomenon which demonstrates breaking the silence and absolute freedom of expression. The survey revealed that a majority of the survey participants were pessimistic about Facebook security, even after the application of strict privacy settings. This paper concludes with a discussion of the proposed privacy protection, through amendments and reforms, which is viewed as part of the governmentâs legal responsibility to uphold Facebook privacy and affirms the matriarchal cultural values of Sri Lanka, where the general expectation of young females is to raise a family that upholds virtue and family values. In turn, female mental and social security and the prevalence of freedom of expression ensure gender equality in Sri Lanka
Communication privacy management of students in Latvia
The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronioâs theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to disclose it is often confronted with numerous privacy dilemmas and issues regarding their secureness, especially in universities where peers are young with different cultural backgrounds. This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management theory. Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among student
Privacy, Restriction, and Access: Legal and Ethical Dilemmas
This paper examines the intersection of privacy and access in archival repositories. Archival repositories are well known for containing restricted material, and for protecting the privacy of the donors. This literature review examines the need for restricted material from both legal and ethical standpoints, as well as discussing culturally sensitive materials while determining what archives and libraries can do to protect both themselves and their donors while enhancing accessibility and freedom of information
Recommended from our members
Information sharing in e-government initiatives: Freedom of Information and Data Protection issues concerning local government
In e-government initiatives, the sharing of information is crucial for empowering citizens and boosting joined-up services. The lack of clear guidance on how to share government data can potentially harm Freedom of Information and or Data Protection rights. This article addresses this issue by drawing from the main concerns governments have when dealing with Freedom of Information and Data Protection issues. As illustration, we comment on the findings of a case study we have conducted in a Local Authority in the United Kingdom (UK). Our findings show that local government managers might be struggling to adequately implement Freedom of Information and Data Protection aspects. Cultural aspects are subtly present in this context, as managersâ values and beliefs regarding public access to information might be biased toward either information disclosure or information withholding
Bridging the Data Divide: Understanding State Agency and University Research Partnerships within SLDS
This report examines this question through an analysis of state agency-university researcher partnerships that exist in State Longitudinal Data Systems (SLDS). Building state agency-university researcher partnerships is an important value of SLDS. To examine state agency-university researcher partnerships within SLDS, our analysis is guided by the following set of questions based on 71 interviews conducted with individuals most directly involved with SLDS efforts in Virginia, Maryland, Texas and Washington. The findings from this analysis suggest that each stateâs SLDS organization and governance structure includes university partners in differing ways. In general, stronger partnership efforts are driven by legislative action or executive-level leadership. Regardless of structure, the operation of these partnerships is shaped by the agencyâs previous experience and cultural norms surrounding the value and inclusion of university researchers
Recommended from our members
An investigation of e-government progress in Oman: A survey of public sector workers
E-government has become increasingly pervasive in modern society and it has emerged as an effective means of delivering government services to citizens. While most early e-government efforts were concentrated on developed countries, in the recent past, it has also become popular in many developing countries. Most notably are the Middle Eastern countries that have continued to invest significantly into e-government initiatives in the last five years; the Sultanate of Oman is one such example. However, although large investments have been made since 2003 to facilitate the implementation of electronic services in the public sector in Oman, only limited progress has been made in terms of realising fully functional e-government. The aim of this paper is to identify the factors that are currently influencing the development and implementation of e-government in Oman using a quantitative survey-based empirical study in three key public service agencies in Muscat, the capital of Oman. The research identified ten different factors that were influencing the progress of the national e-government project, e-Oman, from the viewpoint of government employees. The most salient of these factors was the Omani IT workforce capability and the citizens' trust and confidence in using e-services
A User-Focused Reference Model for Wireless Systems Beyond 3G
This whitepaper describes a proposal from Working Group 1, the Human Perspective of the Wireless World, for a user-focused reference model for systems beyond 3G. The general structure of the proposed model involves two "planes": the Value Plane and the Capability Plane. The characteristics of these planes are discussed in detail and an example application of the model to a specific scenario for the wireless world is provided
- âŠ