41,335 research outputs found

    RESPECTING THE ETHICAL TENSION BETWEEN SURVEILLANCE AND PRIVACY IN PROMOTING PUBLIC HEALTH AND DISEASE MANAGEMENT

    Get PDF
    The recognition of the need to undertake surveillance and to protect privacy is well established. However, the continually changing circumstances and fast-paced development of healthcare today requires a continuing need to respect this ethical tension between surveillance and privacy. Hence, this dissertation is to respect the ethical tension between surveillance and privacy in promoting public health and disease management. This dissertation investigates the ethics of conducting public health surveillance, including the challenges associated with obtaining consent and protecting data from unauthorized access. The dissertation will focus on the ethical consequences of big data, including issues associated with obtaining informed consent, data ownership, and privacy. As the dissertation concludes, it will provide an ethical justification of observing privacy in public health surveillance. The analysis is pursued in the dissertation in the following manner. After a brief introduction in Chapter 1, the analysis begins in Chapter 2 by explaining the importance of consent with regard to protecting privacy, including confidentiality in clinical ethics. Chapter 3 moves the discussion to the realm of public health ethics, discussing two examples of population health matters to illustrate the dissertation’s focus. Chapter 4 focuses on the complex issue of disease management for which the ethical tension between surveillance and privacy is pivotal. Chapter 5 then discusses the critical need for respecting this ethical tension in research protocols from a global perspective. Chapter 6 moves the discussion to the fast-developing debate of data analysis in healthcare for which respecting the ethical tension between surveillance and privacy will be pivotal for the continuing success in this new arena. Finally, Chapter 7 provides a brief conclusion to the dissertation

    Unmanned Insecurity: The Safety and Privacy Issues of Unmanned Aircraft Information Assurance

    Get PDF
    Information assurance and computer security are foundational paradigms in ground based information systems. However, in the aerial realm of unmanned systems, information security often takes the proverbial back seat to high visibility issues such as safety and privacy. Yet, a secure unmanned aircraft is a basic tenant of safety and privacy in the operational arena. Information assurance and security that are enveloped into an unmanned aircraft protect the systems data, communications, as well as internal operations and permeates not only the aircraft’s systems, but also the system’s interactions with satellites, ground stations, and other aerial entities that share data and communication streams with the UAS. This paper will discuss the vital foundational information assurance and security elements of unmanned aerial systems and how these elements relate directly to UAS safety, privacy, reliability, and resilience. It will present case based research of unmanned and manned aircraft mishaps, from both the military and civilian domains, that demonstrate the centrality of security to a safe and viable operational aircraft. It will also demonstrate how privacy issues stem directly or indirectly from information assurance and computer security breaches in an unmanned aircraft. Such breaches of privacy can lead to such issues as privacy torts, theft of intellectual property, Constitutional violations, and issues of personal safety and security from exposed data and communication streams. Additionally, information security breaches can also lead to a hostile takeover of the UAS by a malicious third party, or improper systems functioning of the aircraft leading to myriad public safety issues such as a downed UAS, the uncontrolled flight of the UAS in controlled airspace, or at worse the collision of the UAS into a manned aircraft resulting in a catastrophic outcome. This paper will also discuss the mechanisms of information security in an unmanned aerial system as well as its corresponding ground station and satellite communication systems. It will trace security issues directly to issues of safety and privacy and provide methodologies to improve UAS information security to improve system safety and data security to eliminate negative outcomes from operational UAS missions. Additionally, the paper will provide guidance on holistic UAS operational security, through the maintenance of confidentiality, availability, and integrity via policy, technological, and physical security mechanisms

    PRECEPT: A Framework for Ethical Digital Forensics Investigations.

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction. Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization’s right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain. This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability. In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals’ rights to privacy and organizations’ rights to control intellectual capital disclosure. The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this. Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced. Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other

    When the Public Does Not Have a Right to Know: How the California Public Records Act Is Deterring Bioscience Research and Development

    Get PDF
    Many bioscience firms collaborate with public research universities to conduct innovative research through sponsored research agreements. Companies sponsoring this research usually require strict confidentiality from their academic partners in order to protect sensitive information that, if revealed, could put them at a competitive disadvantage and threaten their ability to obtain future patents. Yet, ambiguous disclosure requirements in the California Public Records Act preclude California\u27s public research universities from guaranteeing that proprietary information provided in connection with sponsored research agreements will remain confidential. Entering into such agreements with public universities in California is therefore a risky proposition for the sponsors. This iBrief argues that unless this is corrected, many of these public/private partnerships, which often lead to significant advances in science and medicine, may be deterred

    Dissemination of Government Statistical Micro Data and Policy Challenges for Japanese Statistical System

    Get PDF
    It was as early as 1960s when some countries such as the United States and United Kingdom have released anonymized resampled micro data created from censuses and surveys followed by Canada and some Nordic countries. Many analytical findings with micro based data have carved out new frontiers not only in academic research but also in their policy use that traditional table-based analyses could never promise. In addition to the enormous contributions in offering academic findings, micro data have created new dimensions in terms of potential usability of statistical data. New types of datasets such as longitudinal and panel data created from individual records have cultivated a new arena of dynamic data analysis that neither cross sectional nor time series data could afford. Japan is far behind other foreign countries in terms of the use of micro data. Government has been hesitant in creating public use micro data files in Japan due partly to the apprehensions for the potential threat of privacy issues and partly to the conventional practice of data enclosure within institutions. Governments\u27 negative responses to the disclosure of micro data have also been supported by the strict application of confidentiality clause stipulated in Japanese Statistics Law. During a couple of decades after 1980, however, many countries which appeared to be new member countries with public use micro data files have amended their legislative frameworks one afteranother so as to adjust confidentiality clause with launching systems to provide public use micr data files. This paper aims to bring to the light the impending challenge of Japanese statistical system

    The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium

    Get PDF
    The automotive industry stands in front of a great challenge, to decrease its impact on the environment. One important part in succeeding with this is to decrease the structural weight of the body structure and by that the fuel consumption or the required battery power. Carbon fibre composites are by many seen as the only real option when traditional engineering materials are running out of potential for further weight reduction. However, the automotive industry lacks experience working with structural composites and the methods for high volume composite manufacturing are immature. The development of a composite automotive body structure, therefore, needs methods to support and guide the conceptual work to improve the financial and technical results. In this thesis a framework is presented which will provide guidelines for the conceptual phase of the development of an automotive body structure. The framework follows two main paths, one to strive for the ideal material diversity, which also defines an initial partition of the body structure based on the process and material selection. Secondly, a further analysis of the structures are made to evaluate if a more cost and weight efficient solution can be found by a more differential design and by that define the ideal part size. In the case and parameter studies performed, different carbon fibre composite material systems and processes are compared and evaluated. The results show that high performance material system with continuous fibres becomes both more cost and performance effective compared to industrialised discontinuous fibre composites. But also that cycle times, sometimes, are less important than a competitive feedstock cost for a manufacturing process. When further analysing the manufacturing design of the structures it is seen that further partition(s) can become cost effective if the size and complexity is large enough.      QC 20140527</p

    PRECEPT:a framework for ethical digital forensics investigations

    Get PDF
    Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction. Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization’s right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain. This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.Design methodology: In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals’ rights to privacy and organizations’ rights to control intellectual capital disclosure.Findings: The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.Practical Implications: Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.Originality/value: Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other

    Security and privacy aspects of mobile applications for post-surgical care

    Full text link
    Mobile technologies have the potential to improve patient monitoring, medical decision making and in general the efficiency and quality of health delivery. They also pose new security and privacy challenges. The objectives of this work are to (i) Explore and define security and privacy requirements on the example of a post-surgical care application, and (ii) Develop and test a pilot implementation Post-Surgical Care Studies of surgical out- comes indicate that timely treatment of the most common complications in compliance with established post-surgical regiments greatly improve success rates. The goal of our pilot application is to enable physician to optimally synthesize and apply patient directed best medical practices to prevent post-operative complications in an individualized patient/procedure specific fashion. We propose a framework for a secure protocol to enable doctors to check most common complications for their patient during in-hospital post- surgical care. We also implemented our construction and cryptographic protocols as an iPhone application on the iOS using existing cryptographic services and libraries

    ePortfolios: Mediating the minefield of inherent risks and tensions

    Get PDF
    The ePortfolio Project at the Queensland University of Technology (QUT) exemplifies an innovative and flexible harnessing of current portfolio thinking and design that has achieved substantial buy-in across the institution with over 23000 active portfolios. Robust infrastructure support, curriculum integration and training have facilitated widespread take-up, while QUT’s early adoption of ePortfolio technology has enabled the concomitant development of a strong policy and systems approach to deal explicitly with legal and design responsibilities. In the light of that experience, this paper will highlight the risks and tensions inherent in ePortfolio policy, design and implementation. In many ways, both the strengths and weaknesses of ePortfolios lie in their ability to be accessed by a wider, less secure audience – either internally (e.g. other students and staff) or externally (e.g. potential employees and referees). How do we balance the obvious requirement to safeguard students from the potential for institutionally-facilitated cyber-harm and privacy breaches, with this generation’s instinctive personal and professional desires for reflections, private details, information and intellectual property to be available freely and with minimal restriction? How can we promote collaboration and freeform expression in the blog and wiki world but also manage the institutional risk that unauthorised use of student information and work so palpably carries with it? For ePortfolios to flourish and to develop and for students to remain engaged in current reflective processes, holistic guidelines and sensible boundaries are required to help safeguard personal details and journaling without overly restricting students’ emotional, collaborative and creative engagement with the ePortfolio experience. This paper will discuss such issues and suggest possible ways forward
    • 

    corecore