53 research outputs found

    Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy

    Get PDF
    Technological advances have created a new existence, providing an unforeseen level of interaction and transaction between parties that have never physically met. Preliminary thinking was that these advances would create a previously unimaginable level of privacy and anonymity. While a surface examination suggests an abundance of privacy in modern society, a more thorough examination reveals different results. Advances in technology and changes in public policy have produced a world in which a startling amount of information is available regarding a given individual. Rather than experiencing an increase in individual privacy, modern societies suffer from rapidly decreasing individual privacy

    Safety of medicines with respect to drug counterfeiting in developing countries

    Get PDF
    Background: This thesis presents a study of the safety of medicines with respect to drug counterfeiting in developing countries (East Africa and the Middle East). Counterfeit medicines are also present in industrialised countries, but not on the same scale as in developing countries. The aim of the study was to establish the responsiveness of health care professionals at the practice level concerning the counterfeiting of medicinal products in developing countries focusing on six countries in the East African region and seven countries located in the Middle East. Method: The method of data acquisition used was by survey questionnaires issued in 13 developing countries (6 in East Africa and 7 in the Middle East). The questionnaires were delivered to the respondents either personally or by e-mail and the questionnaire, responses were returned by the same means. Respondents returned their questionnaire forms direct to the author either on the same day or later by e-mail. The data were analysed with regard to the specific questions. Results: The study findings suggested that the poorer the country, the higher the degree of counterfeiting. All the respondents (n: 2180) agreed that there was a fake or counterfeit medicine problem in their own country (71% of respondents in Africa and 63% of respondents in the Middle East considered this a major problem). Both branded and generic drugs were counterfeited and the extent of the problem and several other factors concerning counterfeited drugs differed significantly between industrialised and developing countries. The difference depended on drug regulation control and enforcement and also on the quality and the prices in the legal supply chain. In most industrialised countries like the USA, Japan or the members of the EU, the level v of drug counterfeiting is <1% of the total medicines market value. An exception is the former Soviet Union where up to 20% of the market is occupied by counterfeit drugs. In contrast, within regions of Africa, Asia and parts of Latin America, between 10-30% of the available medicines are fakes (WHO 2006) Conclusions: The study showed that healthcare workers were aware of the prevalence of counterfeit medicines and quite a number of them had encountered them in their supply role. There is an indication that the respondents tried to assure themselves of the quality of the drugs they purchased by using several methods. However, no rigorous effort was taken to confirm as well as report suspected counterfeit drugs to regulatory authorities. In the industrialised world, medicines regulatory authorities have developed strict standards and controls to ensure the safety and effectiveness of drugs. However, as this study has found, in less developed countries a lack of human and financial resources within the health sector as a whole restricted the activity of regulatory agencies, resulting in a sub-optimally regulated environment in which substandard drug production persisted without detection

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Redefining personal information in the context of the Internet

    Full text link
    RĂ©alisĂ©e en cotutelle avec l'UniversitĂ© de PanthĂ©on-Assas (Paris II)Vers la fin des annĂ©es soixante, face Ă  l’importance grandissante de l’utilisation des ordinateurs par les organisations, une dĂ©finition englobante de la notion de donnĂ©e personnelle a Ă©tĂ© incorporĂ©e dans les lois en matiĂšre de protection de donnĂ©es personnelles (« LPDPs »). Avec Internet et la circulation accrue de nouvelles donnĂ©es (adresse IP, donnĂ©es de gĂ©olocalisation, etc.), il y a lieu de s’interroger quant Ă  l’adĂ©quation entre cette dĂ©finition et cette rĂ©alitĂ©. Aussi, si la notion de donnĂ©e personnelle, dĂ©finie comme Ă©tant « une donnĂ©e concernant un individu identifiable » est toujours applicable Ă  un tel contexte rĂ©volutionnaire, il n’en demeure pas moins qu’il importe de trouver des principes interprĂ©tatifs qui puissent intĂ©grer ces changements factuels. La prĂ©sente thĂšse vise Ă  proposer une interprĂ©tation tenant compte de l’objectif recherchĂ© par les LPDPs, Ă  savoir protĂ©ger les individus contre les risques de dommage dĂ©coulant de la collecte, de l’utilisation ou de la divulgation de leurs donnĂ©es. Alors que la collecte et la divulgation des donnĂ©es entraĂźneront surtout un risque de dommage de nature subjective (la collecte, un sentiment d’ĂȘtre sous observation et la divulgation, un sentiment d’embarras et d’humiliation), l’utilisation de ces donnĂ©es causera davantage un dommage objectif (dommage de nature financiĂšre, physique ou discriminatoire). La thĂšse propose plusieurs critĂšres qui devraient ĂȘtre pris en compte pour Ă©valuer ce risque de dommage ; elle servira de guide afin de dĂ©terminer quelles donnĂ©es doivent ĂȘtre qualifiĂ©es de personnelles, et fera en sorte que les LPDPs soient le plus efficaces possibles dans un contexte de dĂ©veloppements technologiques grandissants.In the late sixties, with the growing use of computers by organizations, a very broad definition of personal information as “information about an identifiable individual” was elaborated and has been incorporated in data protection laws (“DPLs”). In more recent days, with the Internet and the circulation of new types of information (IP addresses, location information, etc), the efficiency of this definition may be challenged. This thesis aims at proposing a new way of interpreting personal information. Instead of using a literal interpretation, an interpretation which takes into account the purpose behind DPLs will be proposed, in order to ensure that DPLs do what they are supposed to do: address or avoid the risk of harm to individuals triggered by organizations handling their personal information. While the collection or disclosure of information may trigger a more subjective kind of harm (the collection, a feeling of being observed and the disclosure, embarrassment and humiliation), the use of information will trigger a more objective kind of harm (financial, physical, discrimination, etc.). Various criteria useful in order to evaluate this risk of harm will be proposed. The thesis aims at providing a guide that may be used in order to determine whether certain information should qualify as personal information. It will provide for a useful framework under which DPLs remain efficient in light of modern technologies and the Internet

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Japan's Future in East Asia and the Pacific

    Get PDF
    Japan’s Future in East Asia and the Pacific takes a ’big-picture‘ approach to Japan’s economic place in East Asia alongside that of China. It analyses Japan’s successes and experiments in trade policy as well as its failures in macro-economic policy. Japan’s diplomatic and economic integration strategies are also examined for their impact on East Asia and on Australia. The collection assesses China’s growth and dynamism and questions the nature of the competition for economic influence between Japan and China. Contributors to Japan’s Future in East Asia and the Pacific are all graduates of The Australian National University who are making their mark in the region as scholars and economists on East Asian and Pacific affairs

    Conceptual metaphor in English popular technology and Greek translation

    Get PDF
    This research project studies the metaphorical conceptualisation of technology in English popular technology magazines and in translation in the respective Greek editions. The focus is on the cognitive linguistic view of metaphor initially presented by Lakoff and Johnson (1980), on the metaphor identification procedure (Pragglejaz Group 2007), and critical metaphor analysis (Charteris-Black 2004). The analysis of the English data identifies 14 main metaphors and 29 submetaphors which contribute to the structure of the target domain of technology. It distinguishes between conventional and novel metaphors, and common and original metaphorical expressions, motivated by correlations in experience between diverse source domains and by the widespread diffusion and impact of technology. The English data also provide insight into the functions of these metaphors in popular technology discourse and reveal evidence to thinking, values and attitudes about technology in the English language. The analysis of the Greek data examines similarities and differences in the conceptualisations between the English and Greek languages and cultures, and finds similarities in the categories of metaphors, frequency of and preference for metaphor use in the source and target languages, and in the majority of metaphorical expressions. Similarities are based on common experiences stemming from experiential co-occurrence or experiential similarity, and on translated experience. Differences are restricted to specific-level metaphors and expressions, motivated by alternative conceptualisations of terminology, cultural specificity and preferential conceptualisations. A set of translation strategies and a number of possible translation effects are also identified. These strategies and effects add to the possibilities of translation variations and the range of translation options, and are used to draw conclusions regarding the similarities and differences between the English and Greek languages and cultures. Consequently, through the identification and description of metaphors in technology magazines and in translation, the study attempts to highlight aspects of the culture of technology, which views technology as a cultural artefact and a producer of its own culture.EThOS - Electronic Theses Online ServiceGreek State Scholarship Foundation (IKY)GBUnited Kingdo

    The 45th Australasian Universities Building Education Association Conference: Global Challenges in a Disrupted World: Smart, Sustainable and Resilient Approaches in the Built Environment, Conference Proceedings, 23 - 25 November 2022, Western Sydney University, Kingswood Campus, Sydney, Australia

    Get PDF
    This is the proceedings of the 45th Australasian Universities Building Education Association (AUBEA) conference which will be hosted by Western Sydney University in November 2022. The conference is organised by the School of Engineering, Design, and Built Environment in collaboration with the Centre for Smart Modern Construction, Western Sydney University. This year’s conference theme is “Global Challenges in a Disrupted World: Smart, Sustainable and Resilient Approaches in the Built Environment”, and expects to publish over a hundred double-blind peer review papers under the proceedings
    • 

    corecore