Search results for " privacy."
showing 10 items of 313 documents
Il consenso informato per l'effettuazione del test per la diagnosi di infezione da HIV: Come comportarsi in caso di minori
2008
AIDS is a clinical picture related to Human Immunodeficiency Virus (HIV) infection. In the last 20 years this infection has spread progressively, with approximately 2.4 million children under 15 years old now infected. The HIV antibody test is generally used to reveal the infection. In most European countries the test is voluntary; in Italy, implementation of the test is now regulated by Law 135/90. Art. 5 of the law states that the test is voluntary while informed consent is obligatory. However, nothing is stated concerning the child's consent. By contrast, other Italian laws (e.g., Law 194/78, Law 194/96 and DPR 309/90) establish that the physician should only accept the wishes of minors …
Social Media News: Motivation, Purpose and Usage
2013
This paper presents the results of an online survey which was conducted to analyse the use of social web in the context of daily news. Users' motivation and habit in the news consumption were focused. Moreover, users' news behaviour was distinguished in three purposes such news consumption, news production and news dissemination to find out if the usage has a passive or active character. In a second step it was questioned which social software is used for which purpose. In conclusion users appreciate social software for features such as interactivity and information that traditional media does not provide. Among the social web platforms users prefer social networking sites as well as videos…
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice
2004
. Several approaches for and against the unauthorized copying of software have been proposed. These approaches can be divided into two categories: moral reasoning and solution. These categories of approaches to unauthorized copying of software are scrutinized in the light of Kohlberg's theory of Cognitive Moral Development. The results suggest that most approaches presenting solutions to unauthorized copying of software have focused attention on the lower levels of moral development, while approaches at the highest stage are few and far between. No single approach covers all the stages of moral development. The implications of this analysis for practice and research are discussed.
Attitudes to and factors affecting unauthorized copying of computer software in Finland
2005
Several quantitative studies have sought to determine the factors affecting the unauthorized copying of software, particularly in North America. However, we find no statistically reliable studies on the situation in Europe. In order to address this gap in the literature, we explored the attitudes to and factors affecting the unauthorized copying of computer software of 249 Finnish university students: nine hypotheses derived from the existing research on unauthorized copying of computer software or theories of ethics were tested. A quantitative questionnaire was used as the research instrument. The results shed new light on the characteristics of users and factors affecting the unauthorized…
From virtual to real healing: a critical overview of the therapeutic use of virtual reality to cope with mourning
2021
In recent years, virtual reality (VR) has been effectively employed in several settings, ranging from health care needs to leisure and gaming activities. A new application of virtual stimuli appeared in social media: in the documentary 'I met you' from the South-Korean Munhwa Broadcasting, a mother made the experience of interacting with the avatar of the seven-year-old daughter, who died four years before. We think that this new application of virtual stimuli should open a debate on its possible implications: it represents contents related to grief, a dramatic and yet natural experience, that can have deep psychological impacts on fragile subjects put in virtual environments. In the presen…
Una sentenza della Corte Suprema del Regno Unito sulla tutela giurisdizionale amministrativa
2019
Si dà notizia del caso "R (on the application of Privacy International) (Appellant) v. Investigatory Powers Tribunal and others (Respondent)" deciso dalla Corte Suprema del Regno Unito. It is a brief comment on the case "R (on the application of Privacy International) (Appellant) v. Investigatory Powers Tribunal and others (Respondent)" decided by UK Supreme Court.
Validating the Gratifications Associated with the Use of the Smartphone and the Internet by University Students in Chile, Ecuador and Spain
2021
The pervasiveness of the smartphone and the Internet among young university students can cause both benefits and problematic behaviour mediated by the motivations of the users. This study, using th...
A Cross-Cultural Perspective on the Privacy Calculus
2017
The “privacy calculus” approach to studying online privacy implies that willingness to engage in disclosures on social network sites (SNSs) depends on evaluation of the resulting risks and benefits. In this article, we propose that cultural factors influence the perception of privacy risks and social gratifications. Based on survey data collected from participants from five countries (Germany [ n = 740], the Netherlands [ n = 89], the United Kingdom [ n = 67], the United States [ n = 489], and China [ n = 165]), we successfully replicated the privacy calculus. Furthermore, we found that culture plays an important role: As expected, people from cultures ranking high in individualism found i…
‘I shared the joy’: sport-related social support and communality on Instagram
2020
The popularity of sharing photographs on digital platforms has increased significantly due to the communicative affordances of mobile media and the emergence of photo-sharing applications, such as Instagram. In this paper, we examine how social support and communality can be built and reinforced through digital visual communication. We focus especially on photo sharing in the context of recreational climbing and trail running. In a qualitative study with Finnish climbers and runners, we asked what meanings sports practitioners ascribe to the practice of sharing and observed how they communicate these meanings through photographs. The results indicate that different types of visual content b…
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…