Search results for "Privacy"
showing 10 items of 402 documents
On the Prevalence of Addicted or Problematic Gaming in Finland
2019
Highlights • A dataset from Finland in 2015 (systematic random sampling N = 4511) suggests an (unweighted) prevalence rate of certain “addicted gaming” (videogame play) to be 0.6% among local gamers and 0.03% among the whole population. • The implied prevalence of certain “problematic gaming” (videogame play) climbs to 1.4% among local gamers and 0.6% among the whole population. • Of those “addicted” individuals to whom videogame play was a problem “almost always,” eight reported their hours of play during a week (72, 30, 10, 7, 4, 1, 1, 1), which indicate that “addicted gaming,” if understood as excessive play, might not be optimal for describing such problems.
The global flood of COVID-19 contact tracing apps: sailing with human rights and data protection standards against the wind of mass surveillance
2021
Research background: Countries all around the world are rapidly introducing contact tracing apps and other surveillance technologies to tackle the spread of COVID-19 raising serious concerns about human rights and democratic principles. Purpose of the article: The article aims to analyse how human rights and data protection law regulate the COVID-19 contact tracing apps and reveal the biggest challenges that countries face in applying the essential requirements. Methods: The article will analyse the legal framework and compare many guidance documents issued by the international organisations, including the Council of Europe, the OECD and many EU institutions on the data protection requireme…
Privacy protection in a mobile biomedical information collection service
2006
Masteroppgave i informasjons- og kommunikasjonsteknologi 2006 - Høgskolen i Agder, Grimstad This report presents a model in a mobile health care environment and uses a combination of existing technologies to build a privacy protection scheme. This work covers security issues in both the wireless and wired network, and proposes solutions to these issues. A framework using PKI to distribute digital certificates combined with strong encryption using the AES algorithm is described. Using this framework in combination with a RBAC model using location control we present some principles that will ensure privacy in a mobile wireless biomedical information collection service.
Mobile Phones and Health Risks
2008
Epidemiological studies which have been conducted up to date have found little evidence linking short-term mobile phone use to an increased risk of brain tumors. Some studies have shown slight increases in risk for long-term mobile phone users (>10 years). These results are however based on small numbers and need confirmation. Keywords: mobile phones; health risks; brain tumors; epidemiological studies
Personal health promotion through personalized health technologies — Nuadu experience
2009
Poor lifestyles — overweight, unhealthy diet, physical inactivity, sleep deprivation, and stress — are significant risk factors to chronic illnesses, which cause majority of the health care costs. Hence, behavioral change towards healthy lifestyles is one of the keys to health care cost containment. Personal health systems (PHS) offer tools to support behavioral change. As health risks, personal needs and preferences vary from an individual to another, personalization of the PHS is needed. In Nuadu project we have developed a PHS integrating several different personal health technologies. This system was studied in a large (N=354) randomized controlled trial where employees with several hea…
Emerging aspects of mobile phone use
2009
The mobile phone is a modern-day invention, which has managed to reach many parts of the world enabling telecommunications across areas where it was not possible before. Although these devices have proved to be life saving in certain circumstances (e.g., after accidents) and helped improve the quality of life in some sectors, concerns continue to be raised about potential adverse health impacts associated with their use. These range from cancer and cognitive deficiencies to subjective effects, such as a feeling of warmth around the ear used, headache and fatigue. We provide an overview of the concerns raised and summarise what is known about them. We conducted a literature search in Pubmed/…
Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research
2021
Information systems (IS) scholars have proposed guidelines for interpretive, mixed methods, and design science research in IS. Because many of these guidelines have also been suggested for evaluating what good or rigorous research is, they may be used as a checklist in the review process. In this paper, we raise the question: To what extent do research guidelines for interpretive, mixed methods, and design science research offer evidence that they can be used to evaluate the quality of research. We argue that scholars can use these guidelines to evaluate what good research is if there is compelling evidence that they lead to certain good research outcomes. We use three well-known sets of gu…
Pokémon GO 2016: Exploring Situational Contexts of Critical Incidents in Augmented Reality
2016
Pokémon GO, an augmented reality mobile game, captured the attention of millions of people around the world in July 2016. Various sources from around the globe have reported both positive and negative incidents and outcomes related to the game. Some of the incidents have been particularly remarkable for the player, i.e., critical incidents. A critical incident is a single experience, which a person perceives or remembers as unusually positive or negative. Critical incidents typically are highly influential for human behaviour, and thus, important to study. Playing augmented reality games can take place in varying situational contexts. Situational context includes information that can be use…
Personal correlates of problematic types of social media and mobile phone use in emerging adults
2019
We investigated the occurrence of selected types of problematic social media and mobile phone use in emerging adults, specifically social media and mobile phone overuse, phubbing, creeping, and catfishing. Contemporaneous relations with age, gender, and Big Five personality traits were examined. The participants comprised 459 Slovenian emerging adults, aged 18 to 29 years (68% female). The results suggest that problematic behaviors associated with social media and mobile phone use, with the exception of catfishing, are relatively common among young people. The examined behaviors were negatively related to age, and overuse of mobile phones, social media, and creeping were more prevalent in f…
Compliance and resistance : An investigation into the construction of gender identities by Pakistani women on Facebook
2020
Facebook has recently gained popularity among young, digitally literate and predominantly urban Pakistanis. Such social networking sites allow users the freedom to express themselves using usernames, visuals and topics of their own choice. In this article, I examine how Pakistani Facebook users mobilize such resources in their identity work. Using Multimodal Discourse Analysis, I investigate how Pakistani women construct their gender identities on Facebook using visual and linguistic resources. The results revealed the significant impact of Facebook on the socio-cultural and linguistic norms of discourse in Pakistan that enables women to challenge established communication models while they…