Search results for "Internet privacy"
showing 10 items of 223 documents
Conservation and people: Towards an ethical code of conduct for the use of camera traps in wildlife research
2020
International audience; Abstract 1. Camera trapping is a widely employed tool in wildlife research, used to estimate animal abundances, understand animal movement, assess species richness and understand animal behaviour. In addition to images of wild animals, research cameras often record human images, inadvertently capturing behaviours ranging from innocuous actions to potentially serious crimes. 2. With the increasing use of camera traps, there is an urgent need to reflect on how researchers should deal with human images caught on cameras. On the one hand, it is important to respect the privacy of individuals caught on cameras, while, on the other hand, there is a larger public duty to re…
Monitoring internet trade to inform species conservation actions
2017
Specimens, parts and products of threatened species are now commonly traded on the internet. This could threaten the survival of some wild populations if inadequately regulated. We outline two methods to monitor internet sales of threatened species in order to assess potential threats and inform conservation actions. Our first method combines systematic monitoring of online offers of plants for sale over the internet with consultation by experts experienced in identifying plants collected from the wild based on images of the specimens, species identity and details of the trade. Our second method utilises a computational model, trained using Bayesian techniques to records that have been clas…
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
Health communication in covid-19 era: Experiences from the italian vaccinarsì network websites
2021
In 2013, in a bid to combat Vaccine Hesitancy (VH) and provide information on vaccines by communicating with the general public and the health community (e.g., healthcare workers and public health operators), the Italian Society of Hygiene and Preventive Medicine (S.It.I.) published the national website “VaccinarSì”. The project was subsequently extended to ten Italian Regions. This led to the creation of the VaccinarSì Network, whose websites are publicly owned. The aim of this work was to present the framework of the websites of the VaccinarSì Network and to analyse user behaviour in the pre-COVID-19-era (dating from each website’s publication until 31 January 2020) and in the COVID-19-er…
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
2017
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…
Privacy in Modern Healthcare Communications: The Lesson of Alan Turing
2016
Security Management in Health Care Information Systems — A Literature Review
2017
Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…
Digital Volunteers in Disaster Response: Accessibility Challenges
2019
The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…
Enabling openness of valuable information resources: Curbing data subtractability and exclusion
2019
In this paper we investigate how data openness can be made possible in communal settings. We adopt a utility perspective that foregrounds the use value of data, conceptualizing them as “goods.” On the basis of this conceptualization we explore 2 key goods' attributes: subtractability and exclusion. Our theoretical basis is built upon concepts from the theory of the commons, power theorizing, and notions related to data and information. Empirically, we investigate openness in the genetics domain through a longitudinal study of the evolving communal infrastructure for data related to 2 genes influencing women's susceptibility to breast and ovarian cancer (BRCA1 and BRCA2). We follow the conti…
Whole-genome sequencing for TB source investigations : principles of ethical precision public health
2021
[Background]: Whole-genome sequencing (WGS) of Mycobacterium tuberculosis allows rapid, accurate inferences about the sources, location and timing of transmission. However, in an era of heightened concern for personal privacy and science distrust, such inferences could result in unintended harm and undermine the public's trust.