{"title":"Notifiable Disease Databases for Client Management and Surveillance","authors":"A. Jolly, James J. Logan","doi":"10.4018/978-1-5225-2515-8.CH017","DOIUrl":"https://doi.org/10.4018/978-1-5225-2515-8.CH017","url":null,"abstract":"The spread of certain infectious diseases, many of which are preventable, is widely acknowledged to have a detrimental effect on society. Reporting cases of these infections has been embodied in public health laws since the 1800s. Documenting client management and monitoring numbers of cases are the primary goals in collecting these data. A sample notifiable disease database is presented, including database structure, elements and rationales for collection, sources of data, and tabulated output. This chapter is a comprehensive guide to public health professionals on the content, structure, and processing of notifiable disease data for regional, provincial, and federal use.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of Groupthink on Culture and Conflict in Twitter","authors":"G. Steele, Niekitta Zephyrine","doi":"10.4018/978-1-5225-3784-7.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-3784-7.CH009","url":null,"abstract":"Groupthink puts pressure on individuals to conform to social norms, but anonymity has been found to reduce or lessen such influence. Apart from anonymity, the significance of the topic and self-censorship may or may not contribute to the influence of groupthink. Groupthink has been studied in the context of social media using various approaches, but to date it remains unclear how much and to what extent it influences the conflict among users within this cultural context. This chapter describes approaches to studying the influence of groupthink on the users of an open social media platform (e.g., Twitter) and proposes a methodology for conducting a study. Using data from a selected hashtag, it reports on the application of theory to research, considers the role and influence of groupthink, and discusses the implications of the findings for reconceptualizing approaches to the study of new media.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123043550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomalous Event Detection Methodologies for Surveillance Application","authors":"T. J. N. Rao, G. Girish, M. Tahiliani, Jeny Rajan","doi":"10.4018/978-1-5225-7113-1.ch041","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch041","url":null,"abstract":"Automatic visual surveillance systems serve as in-place threat detection devices being able to detect and recognize anomalous activities which otherwise would lead to potentially harmful situations, and alert the concerned authorities to take appropriate counter actions. However, development of an efficient visual surveillance system is quite challenging. Designing an unusual activity detection mechanism which is accurate and real-time is the primary challenge. Review of literature carried out led to the inference that there are some attributes which are essential for a successful unusual event detection mechanism for surveillance application. The desired approach must detect genuine anomalies in real-world scenarios with acceptable accuracy, should adapt to changing environments and, should require less computational time and memory. In this chapter, an attempt has been made to provide an insight into some of the prominent approaches employed by researchers to solve these issues with a hope that it will benefit researchers towards developing a better surveillance system.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129524750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Panopticon – Cybercontrol in Liquid Modernity","authors":"Roman Batko","doi":"10.4018/978-1-5225-7113-1.ch091","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch091","url":null,"abstract":"The chapter proposes a critical analysis of the panopticon, the model of an ideal prison devised in the 18th century by the English philosopher Jeremy Bentham, and its function in modern management. The original prison was designed in such a way that it enabled a single prison guard to watch all the inmates at all times, while the latter could never tell whether they were currently being watched or not. The idea behind the panopticon gave rise to the concept of panopticism, a philosophy developed by the French thinker Michel Foucault, which he voiced in Discipline & Punish: The Birth of the Prison (1975/1995). Analyzing the mechanism of control through the ages, he ponders the resilience and adaptability of such concepts as discipline, training and hierarchical surveillance. I intend to provide a critical analysis of methods and techniques of organizational control applied today, in the era of liquid modernity. Since that control, more often than not, is executed nowadays by electronic surveillance equipment and computer programs, hence my term of choice – “cybercontrol”.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Danjuma, S. Oyelere, Elisha Sunday Oyelere, T. Laine
{"title":"Mobile Application for Ebola Virus Disease Diagnosis (EbolaDiag)","authors":"K. Danjuma, S. Oyelere, Elisha Sunday Oyelere, T. Laine","doi":"10.4018/978-1-5225-4029-8.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-4029-8.CH004","url":null,"abstract":"This chapter describes how the Ebola virus is considered extremely infectious with a series of physical and psychological traumas on the victims. Common clinical signs associated with the disease include a sudden fever, severe headaches, muscle pain, fatigue, diarrhea, vomiting, and unexplained hemorrhages. In Africa, with strained medical facilities and remote localities, prompt identification and diagnosis of the symptoms of Ebola in a suspected patient are important to the control of the epidemic and in curtailing further spread. This chapter presents the development of an Android mobile application called EbolaDiag (Ebola Diagnosis), which is capable of supporting the diagnosis, screening, and healthcare experts working on the frontline in contact tracing and monitoring of the spread of Ebola. Furthermore, EbolaDiag is suitable for aiding the strained medical facilities in endemic areas. In addressing this gap, the application provided a model for implementing such solutions in pandemic environments. Such a solution becomes more relevant and useful to combat Ebola and several other diseases in similar environments.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maturity in Health Organization Information Systems","authors":"A. Carneiro","doi":"10.4018/978-1-5225-7113-1.ch017","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch017","url":null,"abstract":"Adapting maturity models to healthcare organization's needs is an issue that researchers and technicians should consider and a valuable instrument for IT managers because these models allow the assessment of a present situation as well as the identification of useful improvement measures. This paper discusses the practical utilization of maturity models, including different manners of exploring model's usefulness. For a more complete understanding of maturity models, the selection of criteria and processes of measurement, called metrics, is briefly reviewed in terms of indicators and daily procedures. Some issues of management information systems security are briefly addressed, along with a note on measuring security assessment. Finally some considerations are presented about the need for privacy of personal data to ensure the strategies to be pursued to sensitive data in order to establish a level of effective privacy which is included in the concerns of security of information systems.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126822532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Western Female Migrants to ISIS","authors":"E. Saltman","doi":"10.4018/978-1-5225-7119-3.ch009","DOIUrl":"https://doi.org/10.4018/978-1-5225-7119-3.ch009","url":null,"abstract":"Women have long been a blind spot for security, academic and think tank sectors in relation to the growing threat of global extremism. The recent spike in female recruitment to the terrorist organisation, Islamic State in Iraq and Syria (ISIS), is a strong indicator of this dangerous trend. While often assumed to be passive agents, women continue to play strong roles in online and offline recruitment to violent extremist organisations. However, women can also act as strong counter-extremism agents in the fight against radicalisation and terrorism. Looking at the issue of gender, there is a new ability through online research to retrieve valuable insight into terrorist strategies around recruitment of women from online propaganda. This chapter aims to address questions of gender within current radicalisation trends through an analysis of online data, and through tracking Western females who are migrating to territories under the control of ISIS.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preservation in Information System","authors":"D. Acharjya, G. Mary A","doi":"10.4018/978-1-4666-4940-8.CH003","DOIUrl":"https://doi.org/10.4018/978-1-4666-4940-8.CH003","url":null,"abstract":"The information technology revolution has brought drastic change in the way data is collected or generated for decision mining. The accumulated data has no relevance unless it provides certain useful information pertaining to the interest of an organization. The real challenge lies in converting high dimensional data into knowledge and to use this knowledge for the development of the organization. On the other hand, hiding an organization's sensitive information is a major concern. Much research has been carried out in this direction. This chapter discusses various privacy preservation techniques that can be employed in an information system to safeguard the sensitive information of an organization. This chapter also highlights sensitive fuzzy association rules that can be generated from an information system. The authors provide illustrations wherever necessary to give a clear idea of the concepts developed.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127687329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lindsay A. West, Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, G. Macgregor-Skinner
{"title":"Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting","authors":"Lindsay A. West, Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, G. Macgregor-Skinner","doi":"10.4018/978-1-5225-7113-1.ch098","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch098","url":null,"abstract":"Today, terrorist groups are recruiting, inspiring, and guiding global strategies not just by Internet operations, but through an organized, steady infusion of propaganda videos and call-to-action messages. Most worrisome: increasing evidence that the youth population represents a particularly susceptible cohort, being drawn into the ranks of terrorist organizations operating worldwide. In response, this article will address the pros and cons of social media banning, its effects on constitutional rights, and its effectiveness towards decreasing radicalization and recruitment. The research presented here aims to further the field of Homeland Security and to encourage debates on how to decrease terrorism and youth recruitment and whether banning social media would assist the Department of Homeland Security's mission. In conclusion, this article explores both sides of the spectrum while offering insight for scholars, organizations, and practitioners regarding the attainability of social media banning in the United States.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilization Pattern and Privacy Issues in the Use of Health Records for Research Practice by Doctors","authors":"Eunice Olubunmi Omidoyin, R. Opeke, G. Osagbemi","doi":"10.4018/IJPHIM.2016010101","DOIUrl":"https://doi.org/10.4018/IJPHIM.2016010101","url":null,"abstract":"Research is a fundamental activity in teaching hospitals, and medical doctors use information contained in health records for research. In this process, researchers are often confronted with privacy issues. It is however not clear the extent to which doctors paid attention to this privacy issues in their research. The purpose of this study was to establish the extent to which privacy principles were followed by medical doctors in federal teaching hospitals in Nigeria when using health records for research. Survey research design was adopted for this study with two-stage random sampling technique to select 60% of the federal teaching hospitals; and 60% of the medical doctors in the selected hospitals. Attention was paid to securing patients unused data; health records was used mostly to generate data to support application for grant. There was a joint positive significant relationship between the predictor variables (privacy and health records) and the criterion variable in research practice.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}