Search results for "Internet privacy"

showing 10 items of 223 documents

Conservation and people: Towards an ethical code of conduct for the use of camera traps in wildlife research

2020

International audience; Abstract 1. Camera trapping is a widely employed tool in wildlife research, used to estimate animal abundances, understand animal movement, assess species richness and understand animal behaviour. In addition to images of wild animals, research cameras often record human images, inadvertently capturing behaviours ranging from innocuous actions to potentially serious crimes. 2. With the increasing use of camera traps, there is an urgent need to reflect on how researchers should deal with human images caught on cameras. On the one hand, it is important to respect the privacy of individuals caught on cameras, while, on the other hand, there is a larger public duty to re…

0106 biological sciencesCode of conductmedia_common.quotation_subjectPARTNERS principles for community‐based conservationInternet privacyComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONWildlifeprivacyhuman rights010603 evolutionary biology01 natural sciencesEcology and Environment[SHS]Humanities and Social Sciencessnow leopardGE1-35014. Life underwaterlawQH540-549.5Ethical codemedia_commonEcologyHuman rightscamera trapcode of conductbusiness.industry010604 marine biology & hydrobiology15. Life on landethicsEnvironmental sciencesGeographySnow leopardCamera trapPARTNERS principles for community-based conservationbusinessEcological Solutions and Evidence
researchProduct

Monitoring internet trade to inform species conservation actions

2017

Specimens, parts and products of threatened species are now commonly traded on the internet. This could threaten the survival of some wild populations if inadequately regulated. We outline two methods to monitor internet sales of threatened species in order to assess potential threats and inform conservation actions. Our first method combines systematic monitoring of online offers of plants for sale over the internet with consultation by experts experienced in identifying plants collected from the wild based on images of the specimens, species identity and details of the trade. Our second method utilises a computational model, trained using Bayesian techniques to records that have been clas…

0106 biological sciencesSettore BIO/07 - EcologiaEcologybusiness.industry010604 marine biology & hydrobiologyInternet privacyfood and beverages010603 evolutionary biology01 natural scienceslcsh:QK1-989Geographylcsh:Botanylcsh:ZoologySettore BIO/03 - Botanica Ambientale E ApplicataThe InternetAdenia Commiphora Operculicarya Uncarina Machine learning Infer.NET Naive Bayes classifierlcsh:QL1-991businessNature and Landscape Conservation
researchProduct

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing

2016

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…

020203 distributed computingbusiness.industryComputer scienceInternet privacy020206 networking & telecommunicationsAccess controlHealth information exchangeCloud computing02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingResource (project management)Health care0202 electrical engineering electronic engineering information engineeringAttribute-based encryptionbusinesscomputer2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

Health communication in covid-19 era: Experiences from the italian vaccinarsì network websites

2021

In 2013, in a bid to combat Vaccine Hesitancy (VH) and provide information on vaccines by communicating with the general public and the health community (e.g., healthcare workers and public health operators), the Italian Society of Hygiene and Preventive Medicine (S.It.I.) published the national website “VaccinarSì”. The project was subsequently extended to ten Italian Regions. This led to the creation of the VaccinarSì Network, whose websites are publicly owned. The aim of this work was to present the framework of the websites of the VaccinarSì Network and to analyse user behaviour in the pre-COVID-19-era (dating from each website’s publication until 31 January 2020) and in the COVID-19-er…

020205 medical informaticsHealth Toxicology and MutagenesisInternet privacy02 engineering and technologyOrganic searchArticleSession (web analytics)03 medical and health sciences0302 clinical medicineHealth care0202 electrical engineering electronic engineering information engineeringHumans030212 general & internal medicineHealth communicationVaccine hesitancyVaccinesE-healthbusiness.industryVaccinarSì networkSARS-CoV-2CommunicationRPublic Health Environmental and Occupational HealthCOVID-19Bounce ratePage viewItalyHealth CommunicationInformation and Communications TechnologyAnalyticsMedicinewebsitebusinessPsychologyHuman
researchProduct

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records

2017

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…

020205 medical informaticsRevocationbusiness.industryComputer scienceInternet privacyCloud computingAccess controlHealth information exchange02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingScalability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAttribute-based encryptionbusinesscomputerProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
researchProduct

Privacy in Modern Healthcare Communications: The Lesson of Alan Turing

2016

020205 medical informaticsSettore MED/27 - Neurochirurgiabusiness.industryInternet privacy02 engineering and technologyTelemedicine03 medical and health sciences0302 clinical medicineSurgery Neurology (clinical)Confidentiality Telemedicine Humans Computer Security SmartphoneHealth care0202 electrical engineering electronic engineering information engineeringHumansMedicineSurgerySmartphoneNeurology (clinical)businessTuringcomputerComputer SecurityConfidentiality030217 neurology & neurosurgerycomputer.programming_languageWorld Neurosurgery
researchProduct

Security Management in Health Care Information Systems — A Literature Review

2017

Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…

020205 medical informaticsbusiness.industryInternet privacyInformation needsAccess controlUsability02 engineering and technologyInformation securityPeer review03 medical and health sciences0302 clinical medicineHealth careHealth care information systems0202 electrical engineering electronic engineering information engineeringSecurity management030212 general & internal medicinebusiness2017 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

Digital Volunteers in Disaster Response: Accessibility Challenges

2019

The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…

021110 strategic defence & security studiesEmergency managementCrisis mappingbusiness.industryComputer scienceInternet privacy0211 other engineering and technologies02 engineering and technologyAccessibilityDisaster responseCrisis mappingCrowdsourcingField (computer science)Digital humanitarian volunteersDomain (software engineering)020204 information systems0202 electrical engineering electronic engineering information engineeringCrowdsourcingSituational ethicsbusiness
researchProduct

Enabling openness of valuable information resources: Curbing data subtractability and exclusion

2019

In this paper we investigate how data openness can be made possible in communal settings. We adopt a utility perspective that foregrounds the use value of data, conceptualizing them as “goods.” On the basis of this conceptualization we explore 2 key goods' attributes: subtractability and exclusion. Our theoretical basis is built upon concepts from the theory of the commons, power theorizing, and notions related to data and information. Empirically, we investigate openness in the genetics domain through a longitudinal study of the evolving communal infrastructure for data related to 2 genes influencing women's susceptibility to breast and ovarian cancer (BRCA1 and BRCA2). We follow the conti…

0301 basic medicineComputer Networks and Communicationsbusiness.industryInternet privacycommonsopen data030105 genetics & heredityCritical researchPeer reviewPower (social and political)power03 medical and health sciencesOpen data030104 developmental biologyOpenness to experiencecritical researchbusinessCommonsSoftwareInformation Systems
researchProduct

Whole-genome sequencing for TB source investigations : principles of ethical precision public health

2021

[Background]: Whole-genome sequencing (WGS) of Mycobacterium tuberculosis allows rapid, accurate inferences about the sources, location and timing of transmission. However, in an era of heightened concern for personal privacy and science distrust, such inferences could result in unintended harm and undermine the public's trust.

0301 basic medicinePulmonary and Respiratory Medicinemedicine.medical_specialtymedia_common.quotation_subjectInternet privacyDisease OutbreaksBlame03 medical and health sciences0302 clinical medicineMedicineHumans030212 general & internal medicinehealth care economics and organizationsmedia_commonCommunity engagementDistrustWhole Genome Sequencingbusiness.industryPublic healthAdministrative PersonnelMycobacterium tuberculosisTransparency (behavior)Information sensitivity030104 developmental biologyInfectious DiseasesHarmRight to knowPublic HealthHuman medicinebusinessInternational journal of tuberculosis and lung disease
researchProduct