173,097 research outputs found

    Patient choice in the NHS: How critical are facilities services in influencing patient choice?

    Get PDF
    Purpose – From December 2005, patients in the UK needing an operation will be offered a choice of four or five. These could be NHS trusts, foundation trusts, treatment centres, private hospitals or practitioners with a special interest operating within primary care. This is called “Choose and Book”. The purpose of this research is to discover how critical facilities management service factors are in influencing a choice of hospital. The aim is to find out what the most important influencing factors are to people when making a choice of which hospital to have their operation. If facilities services and the patient environment are influencing factors in the patient experience, which are considered critical. Design/methodology/approach – Focus groups were used as the primary method of data collection. Findings – The study finds that all three focus groups placed more importance on clinical factors than facilities factors. High standards of cleanliness and good hospital food were the two facilities factors that participants in all groups placed most importance on. Cleanliness was highlighted by all three groups as a top facilities priority for the NHS at the moment and there was a general perception that private hospitals have better standards of cleanliness. Practical implications – By understanding how important facilities factors are in influencing patient choice and which ones have a critical impact, it will help NHS trusts focus on where they channel their resources.</p

    Artificial intelligence and UK national security: Policy considerations

    Get PDF
    RUSI was commissioned by GCHQ to conduct an independent research study into the use of artificial intelligence (AI) for national security purposes. The aim of this project is to establish an independent evidence base to inform future policy development regarding national security uses of AI. The findings are based on in-depth consultation with stakeholders from across the UK national security community, law enforcement agencies, private sector companies, academic and legal experts, and civil society representatives. This was complemented by a targeted review of existing literature on the topic of AI and national security. The research has found that AI offers numerous opportunities for the UK national security community to improve efficiency and effectiveness of existing processes. AI methods can rapidly derive insights from large, disparate datasets and identify connections that would otherwise go unnoticed by human operators. However, in the context of national security and the powers given to UK intelligence agencies, use of AI could give rise to additional privacy and human rights considerations which would need to be assessed within the existing legal and regulatory framework. For this reason, enhanced policy and guidance is needed to ensure the privacy and human rights implications of national security uses of AI are reviewed on an ongoing basis as new analysis methods are applied to data

    The RFID PIA – developed by industry, agreed by regulators

    Get PDF
    This chapter discusses the privacy impact assessment (PIA) framework endorsed by the European Commission on February 11th, 2011. This PIA, the first to receive the Commission's endorsement, was developed to deal with privacy challenges associated with the deployment of radio frequency identification (RFID) technology, a key building block of the Internet of Things. The goal of this chapter is to present the methodology and key constructs of the RFID PIA Framework in more detail than was possible in the official text. RFID operators can use this article as a support document when they conduct PIAs and need to interpret the PIA Framework. The chapter begins with a history of why and how the PIA Framework for RFID came about. It then proceeds with a description of the endorsed PIA process for RFID applications and explains in detail how this process is supposed to function. It provides examples discussed during the development of the PIA Framework. These examples reflect the rationale behind and evolution of the text's methods and definitions. The chapter also provides insight into the stakeholder debates and compromises that have important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation

    The Promise of Health Information Technology: Ensuring that Florida's Children Benefit

    Get PDF
    Substantial policy interest in supporting the adoption of Health Information Technology (HIT) by the public and private sectors over the last 5 -- 7 years, was spurred in particular by the release of multiple Institute of Medicine reports documenting the widespread occurrence of medical errors and poor quality of care (Institute of Medicine, 1999 & 2001). However, efforts to focus on issues unique to children's health have been left out of many of initiatives. The purpose of this report is to identify strategies that can be taken by public and private entities to promote the use of HIT among providers who serve children in Florida

    The New Privacy

    Get PDF
    This article reviews Overseers of the Poor: Surveillance, Resistance and the Limits of Privacy John Gilliom (2001). In 1964, as the welfare state emerged in full force in the United States, Charles Reich published The New Property, one of the most influential articles ever to appear in a law review. Reich argued that in order to protect individual autonomy in an age of governmental largess, a new property right in governmental benefits had to be recognized. He called this form of property the new property. In retrospect, Reich, rather than anticipating trends, was swimming against the tide of history. In the past forty years, formal claims to government benefits have become more tenuous rather than more secure. Overseers of the Poor: Surveillance, Resistance and the Limits of Privacy, by John Gilliom, an associate professor of political science at Ohio State University, demonstrates both the tenuousness of welfare rights today and the costs that this system imposes on individual autonomy. In Overseers of the Poor, Gilliom uses his case study of welfare recipients as the occasion for an attack on classic notions of privacy rights. Gilliom finds that welfare clients do not engage in privacy talk - indeed, he finds the concept to be devoid of value for the welfare recipients. Here, another comparison can be made with Reich\u27s new property. Reich explicitly tied his idea of a property right in government entitlements to privacy. He felt that the new property was needed to protect privacy and, in particular, individual autonomy. Reich\u27s notion of privacy reaches back to a classic concept of privacy, one that we term the old privacy. It is precisely this classic idea that Gilliom finds welfare recipients to have rejected. Theoretical work inside and outside of the legal academy has pointed, however, to a new privacy. The new privacy is centered around Fair Information Practices ( FIPs ) and is intended to prevent threats to autonomy. The idea of privacy centered on FIPs is based not on a property interest in one\u27s information, but the idea that processors of personal data should be obliged to follow certain standards. If, as we will see, classic notions of privacy are not of much use in the welfare state, the new privacy may be. This review begins by examining Gilliam\u27s methodology and findings. It credits the insights of his look at the inner world of welfare recipients, but finds that he appears to ignore the need for income limits on aid recipients and the concomitant need for at least some personal information to enforce these limits. It also criticizes his failure to explore an interaction of an ethics of care among welfare recipients with possible use of retooled privacy rights or interests. In the second part of this review, The authors consider the extent to which theoretical work inside and outside of the legal academy points to a new privacy and discuss how Gilliam\u27s empirical research provides support for that scholarship. They also evaluate the extent to which the new privacy, centered on PIPs, can prevent the threats to personal autonomy so poignantly identified by Gilliom

    Online Personal Data Processing and EU Data Protection Reform. CEPS Task Force Report, April 2013

    Get PDF
    This report sheds light on the fundamental questions and underlying tensions between current policy objectives, compliance strategies and global trends in online personal data processing, assessing the existing and future framework in terms of effective regulation and public policy. Based on the discussions among the members of the CEPS Digital Forum and independent research carried out by the rapporteurs, policy conclusions are derived with the aim of making EU data protection policy more fit for purpose in today’s online technological context. This report constructively engages with the EU data protection framework, but does not provide a textual analysis of the EU data protection reform proposal as such

    Could There Ever be an App for that? Consent Apps and the Problem of Sexual Assault

    Get PDF
    Rape and sexual assault are major problems. In the majority of sexual assault cases consent is the central issue. Consent is, to borrow a phrase, the ‘moral magic’ that converts an impermissible act into a permissible one. In recent years, a handful of companies have tried to launch consent apps which aim to educate young people about the nature of sexual consent and allow them to record signals of consent for future verification. Although ostensibly aimed at addressing the problems of rape and sexual assault on university campuses, these apps have attracted a number of critics. In this paper, I subject the phenomenon of consent apps to philosophical scrutiny. I argue that the consent apps that have been launched to date are unhelpful because they fail to address the landscape of ethical and epistemic problems that arise in the typical rape or sexual assault case: they produce distorted and decontextualised records of consent which may in turn exacerbate the other problems associated with rape and sexual assault. Furthermore, because of the tradeoffs involved, it is unlikely that app-based technologies could ever be created that would significantly address the problems of rape and sexual assault

    Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks

    Full text link
    The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the technological risks associated with them. We then explore strategies that can be adopted to address these risks, and explore emerging responses by governments for addressing AV risks. Our analyses reveal that, thus far, governments have in most instances avoided stringent measures in order to promote AV developments and the majority of responses are non-binding and focus on creating councils or working groups to better explore AV implications. The US has been active in introducing legislations to address issues related to privacy and cybersecurity. The UK and Germany, in particular, have enacted laws to address liability issues, other countries mostly acknowledge these issues, but have yet to implement specific strategies. To address privacy and cybersecurity risks strategies ranging from introduction or amendment of non-AV specific legislation to creating working groups have been adopted. Much less attention has been paid to issues such as environmental and employment risks, although a few governments have begun programmes to retrain workers who might be negatively affected.Comment: Transport Reviews, 201
    • 

    corecore