224,893 research outputs found

    EHRs at King Fahad Specialist Hospital : an overview of professionals' perspectives on the use of biometric patient identification for privacy and confidentiality, taking into consideration culture and religion : a thesis presented in partial fulfilment of the requirements of the degree of Master in Information Science, Massey University, Albany, Auckland, New Zealand

    Get PDF
    The Kingdom of Saudi Arabia is focused on expanding use of biometric technologies and it is a matter of time before this expansion includes medical institutions. However there is a lack of research on Electronic Health Records (EHRs) in Saudi Arabian hospitals, especially on the staff views and attitudes in relation to confidentiality, privacy, and security policies in the context of Saudi society, which is governed largely by culture and Islam. This research utilised an online survey tool to ask doctors, managers, and IT professionals, at the King Fahad Specialist Hospital (KFSH) about these aspects and explored if they recommend the classic non-biometric access method over the rather intrusive, yet more advanced, biometric patient identification (BPI) technology. Encouragingly, all the participants recommended BPI methods with the least favoured method being the facial recognition method for Saudi female patients. This study also focused on whether staff believed that religious and cultural issues influence EHR privacy and confidentiality, as the literature showed that in certain cases unauthorised revelation of an EHR could lead to honorary killing of the patient. Implications of this research include the need for comprehensive staff training on being culturally aware, as well as training on EHR security policy, privacy, and confidentiality

    A comparison between e-government practices in Taiwan and New Zealand.

    Get PDF
    Few studies have focused on comparing the state of e-government in Western- and Non-Western settings, where the political, social, economic, and cultural environments can be markedly different. This paper compares the views of local authority policymakers in Taiwan and New Zealand, in order to judge the sophistication of their e-government initiatives via the formal and informal policies underpinning website development. Good level of agreement were observed between the Taiwanese and New Zealander respondents for the high levels of significance they attached to 3 key issues, which the authors argue are critical for successful e-government: Accessibility, Security and Privacy. Similarly, the policymakers agreed on a medium level of significance for the 7 key issues: E-procurement, Digital Divide, Private Sector, Taxation, Cultural Obstacles, IT Workforce, and Social Effects (and on a low level of significance for E-Tailing). It was concluded that government policymakers in both countries, in an era of commercial online social networking, are continuing to favour pushing(what they deem to be important) information to citizens, rather than creating collaborative service channels with citizens, contractors and suppliers or integrating separate service processes to satisfy all stakeholders. An attendant lack of commitment to promoting heightened (e-)democracy was also noted, especially in New Zealand

    Usage and Consequences of Privacy Settings in Microblogs

    Get PDF
    Twitter facilitates borderless communication, informing us about real-life events and news. To address privacy needs, Twitter provides various security settings. However, users with protected profiles are limited to their friendship circles and thus might have less visibility from outside of their networks. Previous research on privacy reveals information leakage and security threats in social networks despite of privacy protection enabled. In this context, could protecting microblogging content be counterproductive for individual users? Would microbloggers use Twitter more effectively when opening their content for everyone rather than protecting their profiles? Are user profile protection features necessary? We wanted to address this controversy by studying how microbloggers exploit privacy and geo-location setting controls. We followed a set of user profiles during half of year and compared their usage of Twitter features including status updates, favorites, being listed, adding friends and follower contacts. Our findings revealed that protecting user accounts is not always detrimental to exploiting the main microblogging features. Additionally, we found that users across geographic regions have different privacy preferences. Our results enable us to get insights into privacy issues in microblogs, underlining the need of respecting user privacy in microblogs. We suggest to further research user privacy controls usage in order to understand user goals and motivations for sharing and disclosing their microblogging data online with the focus on user cultural origins

    Seeker Are You Protected? Social Media and Protection Granted to Women in Sri Lanka

    Get PDF
    Facebook, which revolutionized social networking, offers solid platforms for women freely to express and give life to their opinions on any subject they desire, from fashion to human rights, feminism to politics. As a result, a number of issues have arisen regarding the safety of social exposure, chief amongst them being the preservation of privacy. This study examines privacy concerns of female Facebook users in Sri Lanka (age group of 20-30) and the possible judicious measures that can be taken by government organizations regarding this matter. During the course of this research, a mixed methodology was adopted in data collection, which included 118 surveys and interviews. The general concern of Facebook privacy, attitudes and expectations was evaluated through the survey. Interviews were conducted with the goal of bringing attention to and evaluating the existing privacy protection mechanisms provided for Facebook users. The willingness displayed by many females to disclose personal views and information on Facebook has become a phenomenon which demonstrates breaking the silence and absolute freedom of expression. The survey revealed that a majority of the survey participants were pessimistic about Facebook security, even after the application of strict privacy settings. This paper concludes with a discussion of the proposed privacy protection, through amendments and reforms, which is viewed as part of the government’s legal responsibility to uphold Facebook privacy and affirms the matriarchal cultural values of Sri Lanka, where the general expectation of young females is to raise a family that upholds virtue and family values. In turn, female mental and social security and the prevalence of freedom of expression ensure gender equality in Sri Lanka

    Communication privacy management of students in Latvia

    Get PDF
    The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronio’s theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to disclose it is often confronted with numerous privacy dilemmas and issues regarding their secureness, especially in universities where peers are young with different cultural backgrounds. This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management theory. Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among student

    Privacy, Restriction, and Access: Legal and Ethical Dilemmas

    Get PDF
    This paper examines the intersection of privacy and access in archival repositories. Archival repositories are well known for containing restricted material, and for protecting the privacy of the donors. This literature review examines the need for restricted material from both legal and ethical standpoints, as well as discussing culturally sensitive materials while determining what archives and libraries can do to protect both themselves and their donors while enhancing accessibility and freedom of information

    Bridging the Data Divide: Understanding State Agency and University Research Partnerships within SLDS

    Get PDF
    This report examines this question through an analysis of state agency-university researcher partnerships that exist in State Longitudinal Data Systems (SLDS). Building state agency-university researcher partnerships is an important value of SLDS. To examine state agency-university researcher partnerships within SLDS, our analysis is guided by the following set of questions based on 71 interviews conducted with individuals most directly involved with SLDS efforts in Virginia, Maryland, Texas and Washington. The findings from this analysis suggest that each state’s SLDS organization and governance structure includes university partners in differing ways. In general, stronger partnership efforts are driven by legislative action or executive-level leadership. Regardless of structure, the operation of these partnerships is shaped by the agency’s previous experience and cultural norms surrounding the value and inclusion of university researchers

    A User-Focused Reference Model for Wireless Systems Beyond 3G

    Get PDF
    This whitepaper describes a proposal from Working Group 1, the Human Perspective of the Wireless World, for a user-focused reference model for systems beyond 3G. The general structure of the proposed model involves two "planes": the Value Plane and the Capability Plane. The characteristics of these planes are discussed in detail and an example application of the model to a specific scenario for the wireless world is provided
    • 

    corecore