701 research outputs found

    NATURE RELATEDNESS: INVESTIGATING DIFFERENCES AMONG RURAL, SUBURBAN, AND URBAN POPULATIONS IN CONNECTION TO NATURE SCORES

    Get PDF
    The study examined the Nature Relatedness scores of people from rural, suburban, and urban populations to investigate differences among these populations. Survey participants also reported on whether or not they were currently raising children under the age of 18 in their home, how many outdoor activities they participated in as children and currently as adults, and their hours of screen time per day. These variables were examined to measure their impact on Nature Relatedness scores. Results showed significant differences in the Nature Relatedness scores of people from rural and urban, and urban and suburban populations. This study found that people who are currently raising children under the age of 18 had a lower Nature Relatedness score compared to people who are not raising children. People who participated in a high diversity of outdoor activities as children, and people who participated in more outdoor activities as adults, also showed a stronger connection to nature

    PP-SDLC The privacy protecting systems development life cycle

    Get PDF
    Many new Privacy Laws and Regulations have placed an increased importance on the correct design and implementation of information systems. This is an attempt to preserve and protect user and information privacy. Incorporating privacy regulations and guidelines into an active information system is often unsuccessful and ineffective. In addition, systems that have already progressed through the development life cycle can very expensive to change once implemented. We propose the integration of privacy preservation methodologies and techniques into each phase of the system development life cycle (SDLC). This is to preserve the privacy of individuals and to protect PII (Personally Identifiable Information) data. The incorporation of IT Security measures in each SDLC phase is also discussed. This is due to its direct relevance and correlation with information system privacy issues. The proposed methodology involves identifying the privacy and security issues in each phase. From there appropriate privacy protecting and security techniques are applied to address these issues. Special mention is made of the recently proposed Common Criteria. The CC is an international standard for IT Security for Information Systems. Specifically, this paper will analyse the way the Common Criteria currently deals with privacy in information systems, and what is needed to improve its current inadequate handling of information privacy

    An environmentally adaptive conceptual framework for addressing information privacy issues in digital ecosystems

    Get PDF

    Organising organic: a Foucauldian analysis of the regulation of organic food production

    Get PDF
    Early in the life of this thesis, Britain became the world's third largest consumer of organic produce with sales of organic food exceeding one billion pounds. Drawing on a conceptual framework based on Foucault's texts, the research investigates this little word "organic" and asks how organic food production is regulated. The empirical study begins with a genealogy/archaeology of organic farming regulation, including very recent history in the making during the research period. Using Foucault's concepts of code- and ethics-oriented morality and focusing on self-regulation, the study considers commitment to organic farming by producers as ethical subjects. An ethnography carried out within a self-managing cooperative organic farming community shifts the research to a local level. The research investigates the various organic truths produced by individuals through subjectivisation-objectivisation interplay. The code-oriented morality of the Soil Association is an absent presence that is at variance with a looser set of values and rules associated with the self-sufficiency movement and handed down as an oral tradition. Within a heterogeneity of organic, the care of the self practice parrhesia is used to analyse how community members establish collective organic farming practices through decision-making practices. The research uncovers the hidden complexities and ambiguities embedded in organic food production. The thesis reveals too how power relations are at play within the context of equality in a headless organisation. The thesis addresses the under-researched area of agriculture within business schools. Moreover, the thesis provides a comprehensive and accessible working example of Foucault's main themes and contributes to an emerging body of work based on the interplay of subjectivisation and objectivisation. Finally, the thesis contributes an empirical study of self-management to the emerging research field within Critical Management Studies of alternative organisational forms

    Subtropical townhouse designs

    Get PDF
    Unbuilt architectural designs as typological research into small-footprint subtropical housing models

    A framework of privacy shield in organizational information systems

    Get PDF
    Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have a serious impact on an individual?s right and ability to protect their privacy. This paper proposes a new framework for Preserving Privacy for individuals along with the protection of personally identifiable information. We have termed it Privacy Shield. Through the application of anonymity and privacy principles in design, the privacy protecting separation of data, the use of public key infrastructure, and the application of our Information System Hippocratic Policies, we provide a framework of privacy shield to protect an information system user?s personal data

    A new conceptual framework within information privacy: Meta privacy

    Get PDF
    When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not been factored in to most methods. Metadata, or data about data, can contain many personal details about an entity. It is subject to the same risks and malicious actions personal data is exposed to. This paper presents a new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and privacy of information system metadata and metastructure details. We first present a formal definition for meta privacy, and then analyse the factors that encompass and influence meta privacy. In addition, we recommend some techniques for the protection of meta privacy within the information systems. Further, the paper highlights the importance of ensuring all informational elements of information systems are adequately protected from a privacy perspective

    An introduction to a taxonomy of information privacy in collaborative environments

    Get PDF
    Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of Collaborative Environments. There is a need for a better understanding and classification of information privacy concepts and terms. This is especially true in relation to their affect on the operation, creation and ongoing administration of Collaborative Environments. The knowledge provided from a information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies (PET's). This paper provides a Information Privacy taxonomy for Collaborative Environments

    An information privacy taxonomy for collaborative environments

    Get PDF
    Purpose: Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of Collaborative Environments. There is a need for a better understanding and classification of information privacy concepts and terms. The pur-pose of this paper is to provide a taxonomy of Information Privacy in Collaborative Environments. The knowledge provided from an information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies (PET?s).Approach: Through the hierarchical classification and categorization of information privacy concepts and principles an organized representation of these components has been produced. Each area was well surveyed and researched and then classified into a number of sub-categories according to their nature and relevance.Findings: A taxonomy was successfully developed with the identification of three high level dimensions of information privacy. Within each dimensional view a further three sub-classifications were proposed each with their own unique nature.Originality: This paper provides an Information Privacy taxonomy for Collaborative Environments, the first of its kind to be proposed. A number of new Information Pri-vacy terms are defined that make up the categorization and classification of Informa-tion Privacy concepts and components

    A conceptual framework for information security and privacy

    Get PDF
    There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design considerations, have not been very effective. This is because there has been little in the way of instruction on how developers and designers are supposed to use these privacy tools. In this paper we address the problem by providing a privacy solution for integration into information systems called Shield Privacy. The Shield Privacy solution provides an effective system wide approach to privacy protection. It integrates relevant components from the various privacy models. We have implemented our Shield Privacy in a collaborative environment application. In this paper we also describe the prototype and discuss its advantages and areas of future work
    • …
    corecore