31,297 research outputs found
A conceptual model of intention to adopt BYOD among HCP in Pakistan
Healthcare facilities and manpower in Pakistan are a generally acute shortage, incompetent. congested and overburden which cannot meet the requirements of the people visiting these facilities. Medical sectors are progressively looking for portable solutions to meet their Information Technology (IT) needs.To identify Healthcare Professionals (HCP) intention in both adopting the Bring Your Own Device (BYOD) and concerns related to security and privacy of their devices, the researchers
propose a conceptual model by integrating the Consumer Acceptance and Use of Information Technology Extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) and Protection Motivation Theory (PMT) which would impact their behavior intention in both using the device and provide the good understanding of concerns about security and privacy of their devices
All Watched Over by Machines of Loving Grace: Border Searches of Electronic Devices in the Digital Age
The border search exception to the Fourth Amendment has historically given the U.S. government the right to conduct suspicionless searches of the belongings of any individual crossing the border. The federal government relies on the border search exception to search and detain travelers’ electronic devices at the border without a warrant or individualized suspicion. The government’s justification for suspicionless searches of electronic devices under the traditional border search exception for travelers’ property has recently been called into question in a series of federal court decisions. In March 2013, the Ninth Circuit in United States v. Cotterman became the first federal circuit court to rule that a border search of an electronic device may require reasonable suspicion that its owner committed a crime due to the privacy impact of such a search. The following year, in Riley v. California (a nonborder search case), the U.S. Supreme Court explicitly endorsed the view that searches of cell phones implicate privacy concerns far beyond those implicated by searches of other physical items. Most recently, two divergent circuit court decisions, United States v. Kolsuz and United States v. Touset, lay bare the conflict in the federal circuit courts between a view that border searches of electronic devices are no different than those of other personal property and an emerging sense that digital border searches merit additional scrutiny due to their increased likelihood to harm travelers’ Fourth Amendment privacy interests. This Note proposes that courts should extend the logic of Riley to the border by treating searches of travelers’ electronic devices as distinctly more harmful to Fourth Amendment interests than searches of other types of property. This Note argues that border searches of electronic devices should be justified by a standard of at least reasonable suspicion in order to balance the necessity of border searches with the adverse impact on Fourth Amendment privacy concerns caused by extensive searches of travelers’ digital devices
Recommended from our members
MCTs and universities: new risks, new visibilities and new vulnerabilities
Universities have long used new technologies to enhance teaching but mobile communication technologies (MCTs) are posing new ethical and policy challenges. The capture functions on MCTs bring considerable benefits in terms of a student being able to play back and review what was said in the teaching rooms. However, the convergence and connectivity of web 2.0 and its successors add new, as yet largely uncharted dimensions. It not only extends the classroom but also renders previously bounded teaching and residential spaces porous as anybody who has access to these rooms and a MCT can capture and open to outside scrutiny what previously would have been relatively private spaces. This has contradictory ethical implications. Abuses of power and indiscretions can be held to account before wider public opinion. However, the capture and dissemination of sensitive personal information in the form of the opinions, beliefs and ideas of students and staff can expose individuals to risk. Furthermore, the technologies also enable acceptable content to be edited and/or reformed into mashups that may not be intended to be malicious but have the potential for reputational damage. This paper explores these issues first in terms of a range of events and incidents that highlight new vulnerabilities and visibilities. It then outlines some of the policy responses in the United States in terms of cyberbullying; in the UK under data protection; and the implications of a proposed new EU directive. However, it argues, that the fundamental limitation with all of these is that ultimately the institution does not own the device and therefore its control of how it is used is limited. The paper concludes with some preliminary findings on how a handful of British universities are adopting a proactive response here
Are Existing Security Models Suitable for Teleworking?
The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational teleworking policy can be implemented. The teleworking computing environment presents a different set of security threats to those present in an office environment. Teleworking requires a security model to provide security policy enforcement to counter the set of security threats present in the teleworking computing environment. This paper considers four existing security models and assesses each model’s suitability to define security policy enforcement for telework. The approach taken is to identify the information security threats that exist in a teleworking environment and to categorise the threats based upon their impact upon confidentiality of data, system and data integrity, and availability of service in the teleworking environment. It is found that risks exist to the confidentiality, integrity and availability of information in a teleworking environment and therefore a security model is required that provides appropriate policy enforcement. A set of security policy enforcement mechanisms to counter the identified information security threats is proposed. Using an abstraction of the identified threats and the security policy enforcement mechanisms, a set of attributes for a security model for teleworking is proposed. Each of the four existing security models is assessed against this set of attributes to determine its suitability to specify policy enforcement for telework. Although the four existing models were selected based upon their perceived suitability it is found that none provide the required policy enforcement for telework
An Economist's Guide to Digital Music
In this guide, we discuss the impact of digitalization on the music industry. We rely on market and survey data at the international level as well as expert statements from the industry. The guide investigates recent developments in legal and technological protection of digital music and describes new business models as well as consumers' attitude towards music downloads. We conclude the guide by a discussion of the evolution of the music industry
Stopping Police in Their Tracks: Protecting Cellular Location Information Privacy in the Twenty-First Century
Only a small fraction of law enforcement agencies in the United States obtain a warrant before tracking the cell phones of suspects and persons of interest. This is due, in part, to the fact that courts have struggled to keep pace with a changing technological landscape. Indeed, courts around the country have issued a disparate array of holdings on the issue of warrantless cell phone tracking. This lack of judicial uniformity has led to confusion for both law enforcement agencies and the public alike. In order to protect reasonable expectations of privacy in the twenty-first century, Congress should pass legislation requiring law-enforcement agencies to obtain a warrant based upon probable cause before they can track a cell phone except in a limited set of time-sensitive situations and emergencies. This Issue Brief describes the technology police use to track cell phones, discusses the need for federal legislation, concludes that current Fourth Amendment jurisprudence is inadequate to address cell phone tracking, analyzes two bills dealing with “geolocation information” privacy that legislators have introduced in Congress, and ultimately concludes that one of those bills is superior to the other
PESH/OSHA Standards: Information for Workers
[Excerpt] Health and safety for union members on the job is a top priority for the Public Employees Federation. Our members face the risk of on-the-job injuries every working day. It is a known fact that the injury and illness rates for public employees far exceed that of private sector employees.
Our union’s Health and Safety Department has prepared this handbook to assist PEF members in recognizing the workplace hazards that are most frequently cited by PESH and OSHA. This handbook gives you an overview of the standards related to those hazards as well as a reference guide to do any further research
- …