Search results for "privacy"

showing 10 items of 402 documents

Conservation and people: Towards an ethical code of conduct for the use of camera traps in wildlife research

2020

International audience; Abstract 1. Camera trapping is a widely employed tool in wildlife research, used to estimate animal abundances, understand animal movement, assess species richness and understand animal behaviour. In addition to images of wild animals, research cameras often record human images, inadvertently capturing behaviours ranging from innocuous actions to potentially serious crimes. 2. With the increasing use of camera traps, there is an urgent need to reflect on how researchers should deal with human images caught on cameras. On the one hand, it is important to respect the privacy of individuals caught on cameras, while, on the other hand, there is a larger public duty to re…

0106 biological sciencesCode of conductmedia_common.quotation_subjectPARTNERS principles for community‐based conservationInternet privacyComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONWildlifeprivacyhuman rights010603 evolutionary biology01 natural sciencesEcology and Environment[SHS]Humanities and Social Sciencessnow leopardGE1-35014. Life underwaterlawQH540-549.5Ethical codemedia_commonEcologyHuman rightscamera trapcode of conductbusiness.industry010604 marine biology & hydrobiology15. Life on landethicsEnvironmental sciencesGeographySnow leopardCamera trapPARTNERS principles for community-based conservationbusinessEcological Solutions and Evidence
researchProduct

Monitoring internet trade to inform species conservation actions

2017

Specimens, parts and products of threatened species are now commonly traded on the internet. This could threaten the survival of some wild populations if inadequately regulated. We outline two methods to monitor internet sales of threatened species in order to assess potential threats and inform conservation actions. Our first method combines systematic monitoring of online offers of plants for sale over the internet with consultation by experts experienced in identifying plants collected from the wild based on images of the specimens, species identity and details of the trade. Our second method utilises a computational model, trained using Bayesian techniques to records that have been clas…

0106 biological sciencesSettore BIO/07 - EcologiaEcologybusiness.industry010604 marine biology & hydrobiologyInternet privacyfood and beverages010603 evolutionary biology01 natural scienceslcsh:QK1-989Geographylcsh:Botanylcsh:ZoologySettore BIO/03 - Botanica Ambientale E ApplicataThe InternetAdenia Commiphora Operculicarya Uncarina Machine learning Infer.NET Naive Bayes classifierlcsh:QL1-991businessNature and Landscape Conservation
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing

2016

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…

020203 distributed computingbusiness.industryComputer scienceInternet privacy020206 networking & telecommunicationsAccess controlHealth information exchangeCloud computing02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingResource (project management)Health care0202 electrical engineering electronic engineering information engineeringAttribute-based encryptionbusinesscomputer2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

Health communication in covid-19 era: Experiences from the italian vaccinarsì network websites

2021

In 2013, in a bid to combat Vaccine Hesitancy (VH) and provide information on vaccines by communicating with the general public and the health community (e.g., healthcare workers and public health operators), the Italian Society of Hygiene and Preventive Medicine (S.It.I.) published the national website “VaccinarSì”. The project was subsequently extended to ten Italian Regions. This led to the creation of the VaccinarSì Network, whose websites are publicly owned. The aim of this work was to present the framework of the websites of the VaccinarSì Network and to analyse user behaviour in the pre-COVID-19-era (dating from each website’s publication until 31 January 2020) and in the COVID-19-er…

020205 medical informaticsHealth Toxicology and MutagenesisInternet privacy02 engineering and technologyOrganic searchArticleSession (web analytics)03 medical and health sciences0302 clinical medicineHealth care0202 electrical engineering electronic engineering information engineeringHumans030212 general & internal medicineHealth communicationVaccine hesitancyVaccinesE-healthbusiness.industryVaccinarSì networkSARS-CoV-2CommunicationRPublic Health Environmental and Occupational HealthCOVID-19Bounce ratePage viewItalyHealth CommunicationInformation and Communications TechnologyAnalyticsMedicinewebsitebusinessPsychologyHuman
researchProduct

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records

2017

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…

020205 medical informaticsRevocationbusiness.industryComputer scienceInternet privacyCloud computingAccess controlHealth information exchange02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingScalability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAttribute-based encryptionbusinesscomputerProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
researchProduct

Privacy in Modern Healthcare Communications: The Lesson of Alan Turing

2016

020205 medical informaticsSettore MED/27 - Neurochirurgiabusiness.industryInternet privacy02 engineering and technologyTelemedicine03 medical and health sciences0302 clinical medicineSurgery Neurology (clinical)Confidentiality Telemedicine Humans Computer Security SmartphoneHealth care0202 electrical engineering electronic engineering information engineeringHumansMedicineSurgerySmartphoneNeurology (clinical)businessTuringcomputerComputer SecurityConfidentiality030217 neurology & neurosurgerycomputer.programming_languageWorld Neurosurgery
researchProduct

Security Management in Health Care Information Systems — A Literature Review

2017

Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…

020205 medical informaticsbusiness.industryInternet privacyInformation needsAccess controlUsability02 engineering and technologyInformation securityPeer review03 medical and health sciences0302 clinical medicineHealth careHealth care information systems0202 electrical engineering electronic engineering information engineeringSecurity management030212 general & internal medicinebusiness2017 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

Digital Volunteers in Disaster Response: Accessibility Challenges

2019

The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…

021110 strategic defence & security studiesEmergency managementCrisis mappingbusiness.industryComputer scienceInternet privacy0211 other engineering and technologies02 engineering and technologyAccessibilityDisaster responseCrisis mappingCrowdsourcingField (computer science)Digital humanitarian volunteersDomain (software engineering)020204 information systems0202 electrical engineering electronic engineering information engineeringCrowdsourcingSituational ethicsbusiness
researchProduct