31,297 research outputs found

    A conceptual model of intention to adopt BYOD among HCP in Pakistan

    Get PDF
    Healthcare facilities and manpower in Pakistan are a generally acute shortage, incompetent. congested and overburden which cannot meet the requirements of the people visiting these facilities. Medical sectors are progressively looking for portable solutions to meet their Information Technology (IT) needs.To identify Healthcare Professionals (HCP) intention in both adopting the Bring Your Own Device (BYOD) and concerns related to security and privacy of their devices, the researchers propose a conceptual model by integrating the Consumer Acceptance and Use of Information Technology Extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) and Protection Motivation Theory (PMT) which would impact their behavior intention in both using the device and provide the good understanding of concerns about security and privacy of their devices

    All Watched Over by Machines of Loving Grace: Border Searches of Electronic Devices in the Digital Age

    Get PDF
    The border search exception to the Fourth Amendment has historically given the U.S. government the right to conduct suspicionless searches of the belongings of any individual crossing the border. The federal government relies on the border search exception to search and detain travelers’ electronic devices at the border without a warrant or individualized suspicion. The government’s justification for suspicionless searches of electronic devices under the traditional border search exception for travelers’ property has recently been called into question in a series of federal court decisions. In March 2013, the Ninth Circuit in United States v. Cotterman became the first federal circuit court to rule that a border search of an electronic device may require reasonable suspicion that its owner committed a crime due to the privacy impact of such a search. The following year, in Riley v. California (a nonborder search case), the U.S. Supreme Court explicitly endorsed the view that searches of cell phones implicate privacy concerns far beyond those implicated by searches of other physical items. Most recently, two divergent circuit court decisions, United States v. Kolsuz and United States v. Touset, lay bare the conflict in the federal circuit courts between a view that border searches of electronic devices are no different than those of other personal property and an emerging sense that digital border searches merit additional scrutiny due to their increased likelihood to harm travelers’ Fourth Amendment privacy interests. This Note proposes that courts should extend the logic of Riley to the border by treating searches of travelers’ electronic devices as distinctly more harmful to Fourth Amendment interests than searches of other types of property. This Note argues that border searches of electronic devices should be justified by a standard of at least reasonable suspicion in order to balance the necessity of border searches with the adverse impact on Fourth Amendment privacy concerns caused by extensive searches of travelers’ digital devices

    Are Existing Security Models Suitable for Teleworking?

    Get PDF
    The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational teleworking policy can be implemented. The teleworking computing environment presents a different set of security threats to those present in an office environment. Teleworking requires a security model to provide security policy enforcement to counter the set of security threats present in the teleworking computing environment. This paper considers four existing security models and assesses each model’s suitability to define security policy enforcement for telework. The approach taken is to identify the information security threats that exist in a teleworking environment and to categorise the threats based upon their impact upon confidentiality of data, system and data integrity, and availability of service in the teleworking environment. It is found that risks exist to the confidentiality, integrity and availability of information in a teleworking environment and therefore a security model is required that provides appropriate policy enforcement. A set of security policy enforcement mechanisms to counter the identified information security threats is proposed. Using an abstraction of the identified threats and the security policy enforcement mechanisms, a set of attributes for a security model for teleworking is proposed. Each of the four existing security models is assessed against this set of attributes to determine its suitability to specify policy enforcement for telework. Although the four existing models were selected based upon their perceived suitability it is found that none provide the required policy enforcement for telework

    An Economist's Guide to Digital Music

    Get PDF
    In this guide, we discuss the impact of digitalization on the music industry. We rely on market and survey data at the international level as well as expert statements from the industry. The guide investigates recent developments in legal and technological protection of digital music and describes new business models as well as consumers' attitude towards music downloads. We conclude the guide by a discussion of the evolution of the music industry

    Stopping Police in Their Tracks: Protecting Cellular Location Information Privacy in the Twenty-First Century

    Get PDF
    Only a small fraction of law enforcement agencies in the United States obtain a warrant before tracking the cell phones of suspects and persons of interest. This is due, in part, to the fact that courts have struggled to keep pace with a changing technological landscape. Indeed, courts around the country have issued a disparate array of holdings on the issue of warrantless cell phone tracking. This lack of judicial uniformity has led to confusion for both law enforcement agencies and the public alike. In order to protect reasonable expectations of privacy in the twenty-first century, Congress should pass legislation requiring law-enforcement agencies to obtain a warrant based upon probable cause before they can track a cell phone except in a limited set of time-sensitive situations and emergencies. This Issue Brief describes the technology police use to track cell phones, discusses the need for federal legislation, concludes that current Fourth Amendment jurisprudence is inadequate to address cell phone tracking, analyzes two bills dealing with “geolocation information” privacy that legislators have introduced in Congress, and ultimately concludes that one of those bills is superior to the other

    PESH/OSHA Standards: Information for Workers

    Get PDF
    [Excerpt] Health and safety for union members on the job is a top priority for the Public Employees Federation. Our members face the risk of on-the-job injuries every working day. It is a known fact that the injury and illness rates for public employees far exceed that of private sector employees. Our union’s Health and Safety Department has prepared this handbook to assist PEF members in recognizing the workplace hazards that are most frequently cited by PESH and OSHA. This handbook gives you an overview of the standards related to those hazards as well as a reference guide to do any further research
    • …
    corecore