871 |
Electronic banking & e-readiness adoption by Commercial Banks in PakistanSardar, Kashif, Shamim, Salman January 2010 (has links)
<p> </p><p>This study firstly examines the current literature concerning the electronic banking problems during implementation of electronic problems in Pakistan and causes that hinders this process. To investigate in the real-time scenario we have taken the case study of Muslim Commercial Bank Limited in Pakistan in order to understand “why” and “how” the electronic banking could not be implemented successfully.</p><p>The data was collected via interviews, surveys and bank website. Both qualitative and quantitative research approach has been used to investigate and have proper understanding of current e-banking issues. We have sent questionnaire to bank employees and interviews were conducted by the bank mangers. The response of interviews and surveys shows that there are certain issues that hinder the use of e-banking in Pakistan. In-spite of the fact that internet banking has been started in Pakistan, people are still using the old manual system to do the banking transaction, popularity of cash system, waiting in long queues for hours and lacking of proper computer education and trust etc are the major problems that are hurdles in electronic banking. On the other side there are a lot of reasons that the banks did not concentrate on internet banking and cash flow is still popular in banks and internet banking was used by the banks for the limited services.</p><p>Last years a lot of changes has been done and a greater understanding have been developed and now banks are offering various online banking services but banks are facing the problem of customer awareness regarding security and privacy of using Internet banking services as still customers are reluctant to use the online banking services so they prefer to come to banks and deposit the money by hand. So we have investigated these hindrance in our research and also we put some light on what are the advantages in using electronic banking and the how the customers are getting benefit by using e-banking in Pakistan.</p><p>We have developed our own model based upon the prior research. The results were presented in detail based upon the interview and questionnaire and later on we have given recommendations so that e-banking concept can be implemented in Pakistan and suggestions which can be very helpful for the future research</p>
|
872 |
PERSONAL PRIVACY IN A COMPUTER INFORMATION SOCIETY.ESQUERRA, RONALD LEE. January 1982 (has links)
Americans live in a service-oriented, computer-based society whose collective market place is fueled by the collection, use, exchange, and storage of information about people by government and business institutions. Consequently, individuals are having fewer face-to-face contacts in their relationships with these institutions while more decisions affecting their everyday lives are being made by strangers based upon information maintained in computer data systems. This being so, public concern about privacy, specifically the potential abuse and misuse of personal information by government and business, has increased substantially in recent years. There also exists the constant threat of information technology outstripping existing legal frameworks and outpacing the privacy expectations of citizens. More than ever, government and business policy makers will face the dilemma of balancing the legitimate needs of institutions for information about people with the privacy standing of the individual. Knowledge of public views are essential to this task. The purpose of this opinion research study is to learn the views of Arizona residents regarding their personal privacy and relationships with select privacy-intensive public and private institutions. The results provide empirical data for the privacy protection deliberations of the government and business policy makers who practice within Arizona. The results show personal privacy as an issue of serious public concern, with Arizona residents requesting further government laws and business policies and practices to protect their privacy. Arizona residents recognize the legitimate information needs of government and business institutions, but they expect protections against unwelcome, unfair, improper, and excessive collection and dissemination of personal information about them. Computers are perceived as threats to personal privacy, suggesting if institutions expect to be able to continue widespread applications of computers, measures must be taken to assure the public that the personal information stored in such systems are safeguarded from abuse and misuse. The results also show that there is a direct relationship between the degree of alienation or estrangement which individuals feel from government and business institutions and their attitudes toward privacy issues and perception of computer benefits and dangers. Consequently, to affect such attitudes will require sound measures.
|
873 |
Relationships among perceptions of patient privacy, powerlessness, and subjective sleep characteristics in hospitalized adults with coronary heart diseaseRuehl, Polly Banks January 1988 (has links)
The purpose of this study was to describe the relationships among perceptions of privacy, powerlessness, and subjective sleep characteristics in hospitalized adults with coronary heart disease. Thirty subjects, 48 to 92 years old who were hospitalized for suspected or confirmed coronary heart disease, completed three questionnaires. Negative relationships were found between patient privacy and powerlessness (r = -.44) and between powerlessness and the subjective sleep characteristics of sleep effectiveness (r = -.30). Feelings of powerlessness were negatively related to total number of days of (r = -.50) and number of days in the Coronary Care Unit (CCU) (r = -.41). The number of days in the CCU was positively related to sleep disturbance (r =.30). Age was negatively related to patient privacy (r = -31) but positively related to powerlessness (r =.33) and sleep supplementation (r =.35). A better understanding of the hospital environment enhances the planning of nursing care for hospitalized patients.
|
874 |
公務機關比對個人資料對資訊隱私權之可能影響 / Information Privacy Issues under the Data-matching Programs in Public Sector王怡人, Wang, Yi-Ren Unknown Date (has links)
隨著政府給付行政功能日益加重,公部門掌握個人資訊之機會與能力快速成長。以現今之資訊科技,各公務機關分別持有之檔案,可輕易在極短時間內經由傳輸、串連、比對而彙整為相當完整之個人資料檔,使得政府有機會成為社會上最龐大個人資料庫之擁有者。如能妥慎運用,不但可以提升行政效能,建立政府一體形象,且能積極實現人民權益,形成政府與人民雙贏。反之,漫無限制之資料比對則可能侵害人民之資訊隱私權。
所謂「資訊隱私權」係指個人可自行決定是否將自身資料公開或供特定使用之權利。我國大法官於2005年9月28日作出之釋字第603號解釋有完整之闡釋,指出其係受憲法第22條所保障之基本權利。然而憲法對其保障並非絕對,必要時,國家仍得基於公益之必要,在符合法律保留、法律明確及比例原則之條件下予以限制,但應在組織與程序上對於個人資料採行必要之防護措施。就公務機關執行個人資料比對業務而言,值得探討之處在於法律保留、法律明確原則是否落實,以及組織與程序上之防護措施是否妥適。
本論文以「歷史解釋」方法解析資訊隱私權之意義,以「比較法制」方法討論其憲法基礎,以及各國為保護此權利所制訂之資料比對法規。最後,經由「文獻分析」方法,整理學術論文、著作、法規、函釋及實務案例後,對我國公務機關比對個人資料之法制規範以及組織與程序提出建議。具體建議包括:於個資法中明定公務機關執行個人資料比對應盡之程序義務,對於資料之使用確實遵行合目的原則,儘可能以作用法為依據,不應僅憑組織法行之;參與比對之機關內部應設專責組織,推動「自我審查」機制,另於外部設督導單位,監督各機關比對業務之進行,同時藉重資訊科技協助正當程序之落實。
|
875 |
Privacy-Preserving Data Integration in Public Health SurveillanceHu, Jun 16 May 2011 (has links)
With widespread use of the Internet, data is often shared between organizations in B2B health care networks. Integrating data across all sources in a health care network would be useful to public health surveillance and provide a complete view of how the overall network is performing. Because of the lack of standardization for a common data model across organizations, matching identities between different locations in order to link and aggregate records is difficult. Moreover, privacy legislation controls the use of personal information, and health care data is very sensitive in nature so the protection of data privacy and prevention of personal health information leaks is more important than ever. Throughout the process of integrating data sets from different organizations, consent (explicitly or implicitly) and/or permission to use must be in place, data sets must be de-identified, and identity must be protected. Furthermore, one must ensure that combining data sets from different data sources into a single consolidated data set does not create data that may be potentially re-identified even when only summary data records are created.
In this thesis, we propose new privacy preserving data integration protocols for public health surveillance, identify a set of privacy preserving data integration patterns, and propose a supporting framework that combines a methodology and architecture with which to implement these protocols in practice. Our work is validated with two real world case studies that were developed in partnership with two different public health surveillance organizations.
|
876 |
Reliable and Secure Geocasting in VANETsPrado Bernia, Antonio 19 September 2012 (has links)
Current geocasting algorithms for VANETs are being designed to enable either private or reliable communications, but not both. Existing algorithms preserve privacy by minimizing the information used for routing, and sacrifice message delivery success. On the other hand, reliable protocols often store node information that can be used to compromise a vehicle's privacy. We have designed two private and reliable geocasting protocols for VANETs that ensure confidentiality. One is a probabilistic algorithm that uses direction-based dissemination, while the other is a deterministic algorithm that uses transmission-coverage dissemination. To preserve privacy, we create unlinkable and pseudonymous channels of communication with geocasting. For encryption and authentication, we use a public key technique. Our probabilistic forwarding model depends on message rate and cumulative payload, as well as the value of the angle of spreading of the direction-based scheme. To reduce message duplication, we apply dynamic traffic restriction and probabilistic forwarding techniques. The deterministic forwarding algorithm delays forwarding messages based on its uncovered transmission area after neighbouring nodes have broadcast the message. We prove that both algorithms ensure node privacy with appropriate message encryption security, and we ran simulations to demonstrate that both meet the message delivery requirements. From the gathered data, we observe that both algorithms behave differently depending on the scenario, with node density affecting the deterministic algorithm, while the angle of spreading does have a significant impact on the probabilistic protocol.
|
877 |
Towards Internet Voting in the State of QatarAl-Hamar, Jassim Khalid January 2011 (has links)
Qatar is a small country in the Middle East which has used its oil wealth to invest in the country's infrastructure and education. The technology for Internet voting now exists or can be developed, but are the people of Qatar willing to take part in Internet voting for national elections?. This research identifies the willingness of government and citizens to introduce and participate in Internet voting (I-voting) in Qatar and the barriers that may be encountered when doing so. A secure I voting model for the Qatar government is then proposed that address issues of I-voting which might arise due to the introduction of such new technology. Recommendations are made for the Qatar government to assist in the introduction of I-voting. The research identifies the feasibility of I-voting and the government s readiness and willingness to introduce it. Multiple factors are examined: the voting experience, educational development, telecommunication development, the large number of Internet users, Qatar law which does not bar the use of I-voting and Qatar culture which supports I-voting introduction. It is shown that there is a willingness amongst both the people and the government to introduce I-voting, and there is appropriate accessibility, availability of IT infrastructure, availability of Internet law to protect online consumers and the existence of the e government project. However, many Qataris have concerns of security, privacy, usability, transparency and other issues that would need to be addressed before any voting system could be considered to be a quality system in the eyes of the voters. Also, the need to consider the security threat associated on client-side machines is identified where a lack of user awareness on information security is an important factor. The proposed model attempts to satisfy voting principles, introducing a secure platform for I-voting using best practices and solutions such as the smart card, Public Key Infrastructure (PKI) and digital certificates. The model was reviewed by a number of experts on Information Technology, and the Qatari culture and law who found that the system would, generally, satisfy voting principles, but pointed out the need to consider the scalability of the model, the possible cyber-attacks and the risks associated with voters computers. which could be reduced by enhancing user awareness on security and using secure operating systems or Internet browsers. From these findings, a set of recommendations were proposed to encourage the government to introduce I-voting which consider different aspects of I-voting, including the digital divide, e-literacy, I voting infrastructure, legal aspects, transparency, security and privacy. These recommendations were also reviewed by experts who found them to be both valuable and effective. Since literature on Internet voting in Qatar is sparse, empirical and non-empirical studies were carried out in a variety of surveys, interviews and experiments. The research successfully achieved its aim and objectives and is now being considered by the Qatari Government.
|
878 |
Multi-dimensional-personalization in mobile contextsSchilke, Steffen Walter January 2013 (has links)
During the dot com era the word 'personalisation' was a hot buzzword. With the fall of the dot com companies the topic has lost momentum. As the killer application for UMTS or the mobile internet has yet to be identified, the concept of Multi-Dimensional-Personalisation (MDP) could be a candidate. Using this approach, a recommendation of mobile advertisement or marketing (i.e., recommendations or notifications), online content, as well as offline events, can be offered to the user based on their known interests and current location. Instead of having to request or pull this information, the new service concept would proactively provide the information and services – with the consequence that the right information or service could therefore be offered at the right place, at the right time. The growing availability of "Location-based Services“ for mobile phones is a new target for the use of personalisation. "Location-based Services“ are information, for example, about restaurants, hotels or shopping malls with offers which are in close range/short distance to the user. The lack of acceptance for such services in the past is based on the fact that early implementations required the user to pull the information from the service provider. A more promising approach is to actively push information to the user. This information must be from interest to the user and has to reach the user at the right time and at the right place. This raises new requirements on personalisation which will go far beyond present requirements. It will reach out from personalisation based only on the interest of the user. Besides the interest, the enhanced personalisation has to cover the location and movement patterns, the usage and the past, present and future schedule of the user. This new personalisation paradigm has to protect the user's privacy so that an approach supporting anonymous recommendations through an extended 'Chinese Wall' will be described.
|
879 |
Privacy, Professionalism, and the Female LawyerKanzler, Katja 07 February 2017 (has links) (PDF)
"The legal drama – a staple of American popular culture – has evolved as one of the "masculine" genres in the gendered landscape of television culture. A type of workplace drama focusing on professional settings historically dominated by men, it traditionally dramatizes "a world where men played the only important parts and where male bonding and inter-male conflict were dominant elements in the narrative," to adapt Kenneth MacKinnon’s general observations about "masculine" tv (69). Yet the gendering of the (traditional) legal drama goes well beyond the ubiquity of male characters: It is deeply ingrained in the figuration of the lawyer that classic instances of the genre established..." / "Der vorliegende Beitrag ist die pre-print Version. Bitte nutzen Sie für Zitate die Seitenzahl der Original-Version." (siehe Quellenangabe)
|
880 |
INFLUENCE ANALYSIS TOWARDS BIG SOCIAL DATAHan, Meng 03 May 2017 (has links)
Large scale social data from online social networks, instant messaging applications, and wearable devices have seen an exponential growth in a number of users and activities recently. The rapid proliferation of social data provides rich information and infinite possibilities for us to understand and analyze the complex inherent mechanism which governs the evolution of the new technology age. Influence, as a natural product of information diffusion (or propagation), which represents the change in an individual’s thoughts, attitudes, and behaviors resulting from interaction with others, is one of the fundamental processes in social worlds. Therefore, influence analysis occupies a very prominent place in social related data analysis, theory, model, and algorithms. In this dissertation, we study the influence analysis under the scenario of big social data. Firstly, we investigate the uncertainty of influence relationship among the social network. A novel sampling scheme is proposed which enables the development of an efficient algorithm to measure uncertainty. Considering the practicality of neighborhood relationship in real social data, a framework is introduced to transform the uncertain networks into deterministic weight networks where the weight on edges can be measured as Jaccard-like index. Secondly, focusing on the dynamic of social data, a practical framework is proposed by only probing partial communities to explore the real changes of a social network data. Our probing framework minimizes the possible difference between the observed topology and the actual network through several representative communities. We also propose an algorithm that takes full advantage of our divide-and-conquer strategy which reduces the computational overhead. Thirdly, if let the number of users who are influenced be the depth of propagation and the area covered by influenced users be the breadth, most of the research results are only focused on the influence depth instead of the influence breadth. Timeliness, acceptance ratio, and breadth are three important factors that significantly affect the result of influence maximization in reality, but they are neglected by researchers in most of time. To fill the gap, a novel algorithm that incorporates time delay for timeliness, opportunistic selection for acceptance ratio, and broad diffusion for influence breadth has been investigated. In our model, the breadth of influence is measured by the number of covered communities, and the tradeoff between depth and breadth of influence could be balanced by a specific parameter. Furthermore, the problem of privacy preserved influence maximization in both physical location network and online social network was addressed. We merge both the sensed location information collected from cyber-physical world and relationship information gathered from online social network into a unified framework with a comprehensive model. Then we propose the resolution for influence maximization problem with an efficient algorithm. At the same time, a privacy-preserving mechanism are proposed to protect the cyber physical location and link information from the application aspect. Last but not least, to address the challenge of large-scale data, we take the lead in designing an efficient influence maximization framework based on two new models which incorporate the dynamism of networks with consideration of time constraint during the influence spreading process in practice. All proposed problems and models of influence analysis have been empirically studied and verified by different, large-scale, real-world social data in this dissertation.
|
Page generated in 0.0214 seconds