Search results for " privacy."

showing 10 items of 313 documents

Il consenso informato per l'effettuazione del test per la diagnosi di infezione da HIV: Come comportarsi in caso di minori

2008

AIDS is a clinical picture related to Human Immunodeficiency Virus (HIV) infection. In the last 20 years this infection has spread progressively, with approximately 2.4 million children under 15 years old now infected. The HIV antibody test is generally used to reveal the infection. In most European countries the test is voluntary; in Italy, implementation of the test is now regulated by Law 135/90. Art. 5 of the law states that the test is voluntary while informed consent is obligatory. However, nothing is stated concerning the child's consent. By contrast, other Italian laws (e.g., Law 194/78, Law 194/96 and DPR 309/90) establish that the physician should only accept the wishes of minors …

ConsentMinorMicrobiology (medical)Infectious DiseasesSettore MED/43 - Medicina LegalePrivacyConsent; HIV testing; Minor; Privacy; Microbiology (medical); Infectious DiseasesHIV testing
researchProduct

Social Media News: Motivation, Purpose and Usage

2013

This paper presents the results of an online survey which was conducted to analyse the use of social web in the context of daily news. Users' motivation and habit in the news consumption were focused. Moreover, users' news behaviour was distinguished in three purposes such news consumption, news production and news dissemination to find out if the usage has a passive or active character. In a second step it was questioned which social software is used for which purpose. In conclusion users appreciate social software for features such as interactivity and information that traditional media does not provide. Among the social web platforms users prefer social networking sites as well as videos…

Consumption (economics)business.industryComputer scienceSocial softwareInternet privacyRank (computer programming)Context (language use)computer.software_genreSocial webWorld Wide WebInteractivitySocial media optimizationSocial mediabusinesscomputerInternational Journal of Computer Science and Information Technology
researchProduct

Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice

2004

.  Several approaches for and against the unauthorized copying of software have been proposed. These approaches can be divided into two categories: moral reasoning and solution. These categories of approaches to unauthorized copying of software are scrutinized in the light of Kohlberg's theory of Cognitive Moral Development. The results suggest that most approaches presenting solutions to unauthorized copying of software have focused attention on the lower levels of moral development, while approaches at the highest stage are few and far between. No single approach covers all the stages of moral development. The implications of this analysis for practice and research are discussed.

CopyingComputingMilieux_THECOMPUTINGPROFESSIONComputer Networks and Communicationsbusiness.industryComputer ethicsInternet privacyComputingMilieux_LEGALASPECTSOFCOMPUTINGCognitionMoral reasoningSoftwareMoral developmentLawrence Kohlberg's stages of moral developmentbusinessPsychologySocial psychologySoftwareInformation SystemsInformation Systems Journal
researchProduct

Attitudes to and factors affecting unauthorized copying of computer software in Finland

2005

Several quantitative studies have sought to determine the factors affecting the unauthorized copying of software, particularly in North America. However, we find no statistically reliable studies on the situation in Europe. In order to address this gap in the literature, we explored the attitudes to and factors affecting the unauthorized copying of computer software of 249 Finnish university students: nine hypotheses derived from the existing research on unauthorized copying of computer software or theories of ethics were tested. A quantitative questionnaire was used as the research instrument. The results shed new light on the characteristics of users and factors affecting the unauthorized…

CopyingInfluence factorbusiness.industryInternet privacyGeneral Social SciencesComputingMilieux_LEGALASPECTSOFCOMPUTINGHuman-Computer InteractionSoftwareArts and Humanities (miscellaneous)Computer softwareDevelopmental and Educational PsychologyPsychologybusinessSocial psychologyBehaviour & Information Technology
researchProduct

From virtual to real healing: a critical overview of the therapeutic use of virtual reality to cope with mourning

2021

In recent years, virtual reality (VR) has been effectively employed in several settings, ranging from health care needs to leisure and gaming activities. A new application of virtual stimuli appeared in social media: in the documentary 'I met you' from the South-Korean Munhwa Broadcasting, a mother made the experience of interacting with the avatar of the seven-year-old daughter, who died four years before. We think that this new application of virtual stimuli should open a debate on its possible implications: it represents contents related to grief, a dramatic and yet natural experience, that can have deep psychological impacts on fragile subjects put in virtual environments. In the presen…

Coronavirus disease 2019 (COVID-19)IMPACTmedia_common.quotation_subjectSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)Internet privacySocial SciencesINVENTORYSettore M-PSI/08 - PSICOLOGIA CLINICAVirtual realityArticleVirtual realityPsychology MultidisciplinaryBEREAVEMENTHealth carePsychologyNatural (music)Social mediaPREDICTORSGeneral PsychologyTRAUMAmedia_commonAvatarOUTCOMESCOMPLICATED GRIEFbusiness.industryCOVID-19Virtual therapyGriefGriefPROLONGED GRIEF DISORDERMourningPsychologybusinessHALLUCINATIONSBereavementCurrent Psychology
researchProduct

Una sentenza della Corte Suprema del Regno Unito sulla tutela giurisdizionale amministrativa

2019

Si dà notizia del caso "R (on the application of Privacy International) (Appellant) v. Investigatory Powers Tribunal and others (Respondent)" deciso dalla Corte Suprema del Regno Unito. It is a brief comment on the case "R (on the application of Privacy International) (Appellant) v. Investigatory Powers Tribunal and others (Respondent)" decided by UK Supreme Court.

Corte Suprema del Regno Unito Anisminic Privacy International ouster clausesUK Supreme Court Anisminic Privacy International ouster clauses
researchProduct

Validating the Gratifications Associated with the Use of the Smartphone and the Internet by University Students in Chile, Ecuador and Spain

2021

The pervasiveness of the smartphone and the Internet among young university students can cause both benefits and problematic behaviour mediated by the motivations of the users. This study, using th...

Cultural StudiesInternet usebusiness.industryCommunication05 social sciencesInternet privacy050801 communication & media studies050109 social psychology0508 media and communications0501 psychology and cognitive sciencesThe InternetSociologybusinessUses and gratifications theoryJournal of Intercultural Communication Research
researchProduct

A Cross-Cultural Perspective on the Privacy Calculus

2017

The “privacy calculus” approach to studying online privacy implies that willingness to engage in disclosures on social network sites (SNSs) depends on evaluation of the resulting risks and benefits. In this article, we propose that cultural factors influence the perception of privacy risks and social gratifications. Based on survey data collected from participants from five countries (Germany [ n = 740], the Netherlands [ n = 89], the United Kingdom [ n = 67], the United States [ n = 489], and China [ n = 165]), we successfully replicated the privacy calculus. Furthermore, we found that culture plays an important role: As expected, people from cultures ranking high in individualism found i…

Cultural StudiesUncertainty avoidanceKnowledge managementSocial networkbusiness.industryCommunication05 social sciencesInternet privacy050801 communication & media studies050109 social psychologyPrivacy calculuslcsh:P87-96Computer Science Applicationslcsh:Communication. Mass mediaIndividualism0508 media and communicationsSelf-disclosureCross-cultural0501 psychology and cognitive sciencesSocial mediaSociologybusinessSocial capitalSocial Media + Society
researchProduct

‘I shared the joy’: sport-related social support and communality on Instagram

2020

The popularity of sharing photographs on digital platforms has increased significantly due to the communicative affordances of mobile media and the emergence of photo-sharing applications, such as Instagram. In this paper, we examine how social support and communality can be built and reinforced through digital visual communication. We focus especially on photo sharing in the context of recreational climbing and trail running. In a qualitative study with Finnish climbers and runners, we asked what meanings sports practitioners ascribe to the practice of sharing and observed how they communicate these meanings through photographs. The results indicate that different types of visual content b…

Cultural StudiesVisual Arts and Performing ArtsverkkoyhteisötInternet privacyComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0507 social and economic geographysosiaalinen mediasosiaalinen tukiinspiraatioSocial support0504 sociologySociologyAffordancevalokuvatverkkopalvelutmotivaatioyhteisöllisyysbusiness.industry05 social sciencesvisuaalinen viestintä050401 social sciences methodsPopularityMobile mediaAnthropologyInstagrambusiness050703 geographyurheilijatVisual Studies
researchProduct

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct