4 research outputs found

    Institutional Violence Complaints in Argentina: A Privacy Study

    Get PDF
    Argentina is a federal republic located in South America. Despite Argentina’s redemocratization in 1983, conditions favoring human rights abuses still persist. Institutional violence refers to structured practices of human rights violation by state officials belonging to public institutions. In this paper, we outline and discuss privacy issues in institutional violence complaints in Argentina. To this aim, we defined a BPMN process model for registering victims’ complaints in a database, and proposed an approach to investigate the privacy of such process from a threat modeling perspective. With the approach, we identified privacy threats of information disclosure and content unawareness, and defined privacy requirements and controls needed to mitigate these threats

    The Autism Spectrum Disorder Evaluative Education Model: a school-based method of assessing and selecting interventions for classroom use

    Get PDF
    Evaluating educational programs and interventions is generally considered a normal part of curriculum development and improvement, and published findings are readily accessible through peer-reviewed journals. Recently, however, researchers and practicing educators have identified a lack of evaluative research regarding Autism Spectrum Disorder (ASD) educational practices in the peer-reviewed literature. Autism Spectrum Australia (Aspect) has an established evidence-informed ASD curriculum that is constantly reviewed and updated to meet the needs of the students in Aspect schools and classes. Through a methodical evaluative process, all educational interventions and support processes and devices undergo a series of Evidence-Based Research Trials and evaluations before they are implemented in classes. This article demonstrates how a workflow model can deliver a systematic method for identifying, evaluating, implementing, and disseminating the research findings of a program or support intervention. The Autism Spectrum Disorder Evaluative Education (ASDEE) model is discussed

    On Anonymizing the Provenance of Collection-Based Workflows

    Get PDF
    We examine in this paper the problem of anonymizing the prove-nance of collection-oriented workflows, in which the constituent modules use and generate sets of data records. Despite their popularity , this kind of workflow has been overlooked in the literature w.r.t privacy. We, therefore, set out in this paper to examine the following questions: How the provenance of a collection-based module can be anonymized? Can lineage information be preserved? Beyond a single module, how can the provenance of a whole work-flow be anonymized? As well as addressing the above questions, we report on evaluation exercises that assess the effectiveness and efficiency of our solution. In particular, we tease apart the parameters that impact the quality of the obtained anonymized provenance information

    Privacy-aware workflow management

    No full text
    Information security policies play an important role in achieving information security. Confidentiality, Integrity, and Availability are classic information security goals attained by enforcing appropriate security policies. Workflow Management Systems (WfMSs) also benefit from inclusion of these policies to maintain the security of business-critical data. However, in typical WfMSs these policies are designed to enforce the organisation’s security requirements but do not consider those of other stakeholders. Privacy is an important security requirement that concerns the subject of data held by an organisation. WfMSs often process sensitive data about individuals and institutions who demand that their data is properly protected, but WfMSs fail to recognise and enforce privacy policies. In this paper, we illustrate existing WfMS privacy weaknesses and introduce WfMS extensions required to enforce data privacy. We have implemented these extensions in the YAWL system and present a case scenario to demonstrate how it can enforce a subject’s privacy policy
    corecore