Censorship, Surveillance, and Privacy最新文献

筛选
英文 中文
Notifiable Disease Databases for Client Management and Surveillance 用于客户管理和监测的应通报疾病数据库
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-2515-8.CH017
A. Jolly, James J. Logan
{"title":"Notifiable Disease Databases for Client Management and Surveillance","authors":"A. Jolly, James J. Logan","doi":"10.4018/978-1-5225-2515-8.CH017","DOIUrl":"https://doi.org/10.4018/978-1-5225-2515-8.CH017","url":null,"abstract":"The spread of certain infectious diseases, many of which are preventable, is widely acknowledged to have a detrimental effect on society. Reporting cases of these infections has been embodied in public health laws since the 1800s. Documenting client management and monitoring numbers of cases are the primary goals in collecting these data. A sample notifiable disease database is presented, including database structure, elements and rationales for collection, sources of data, and tabulated output. This chapter is a comprehensive guide to public health professionals on the content, structure, and processing of notifiable disease data for regional, provincial, and federal use.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Influence of Groupthink on Culture and Conflict in Twitter Twitter中群体思维对文化和冲突的影响
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-3784-7.CH009
G. Steele, Niekitta Zephyrine
{"title":"The Influence of Groupthink on Culture and Conflict in Twitter","authors":"G. Steele, Niekitta Zephyrine","doi":"10.4018/978-1-5225-3784-7.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-3784-7.CH009","url":null,"abstract":"Groupthink puts pressure on individuals to conform to social norms, but anonymity has been found to reduce or lessen such influence. Apart from anonymity, the significance of the topic and self-censorship may or may not contribute to the influence of groupthink. Groupthink has been studied in the context of social media using various approaches, but to date it remains unclear how much and to what extent it influences the conflict among users within this cultural context. This chapter describes approaches to studying the influence of groupthink on the users of an open social media platform (e.g., Twitter) and proposes a methodology for conducting a study. Using data from a selected hashtag, it reports on the application of theory to research, considers the role and influence of groupthink, and discusses the implications of the findings for reconceptualizing approaches to the study of new media.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123043550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomalous Event Detection Methodologies for Surveillance Application 监视应用中的异常事件检测方法
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch041
T. J. N. Rao, G. Girish, M. Tahiliani, Jeny Rajan
{"title":"Anomalous Event Detection Methodologies for Surveillance Application","authors":"T. J. N. Rao, G. Girish, M. Tahiliani, Jeny Rajan","doi":"10.4018/978-1-5225-7113-1.ch041","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch041","url":null,"abstract":"Automatic visual surveillance systems serve as in-place threat detection devices being able to detect and recognize anomalous activities which otherwise would lead to potentially harmful situations, and alert the concerned authorities to take appropriate counter actions. However, development of an efficient visual surveillance system is quite challenging. Designing an unusual activity detection mechanism which is accurate and real-time is the primary challenge. Review of literature carried out led to the inference that there are some attributes which are essential for a successful unusual event detection mechanism for surveillance application. The desired approach must detect genuine anomalies in real-world scenarios with acceptable accuracy, should adapt to changing environments and, should require less computational time and memory. In this chapter, an attempt has been made to provide an insight into some of the prominent approaches employed by researchers to solve these issues with a hope that it will benefit researchers towards developing a better surveillance system.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129524750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Panopticon – Cybercontrol in Liquid Modernity 圆形监狱——流动现代性中的网络控制
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch091
Roman Batko
{"title":"Panopticon – Cybercontrol in Liquid Modernity","authors":"Roman Batko","doi":"10.4018/978-1-5225-7113-1.ch091","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch091","url":null,"abstract":"The chapter proposes a critical analysis of the panopticon, the model of an ideal prison devised in the 18th century by the English philosopher Jeremy Bentham, and its function in modern management. The original prison was designed in such a way that it enabled a single prison guard to watch all the inmates at all times, while the latter could never tell whether they were currently being watched or not. The idea behind the panopticon gave rise to the concept of panopticism, a philosophy developed by the French thinker Michel Foucault, which he voiced in Discipline & Punish: The Birth of the Prison (1975/1995). Analyzing the mechanism of control through the ages, he ponders the resilience and adaptability of such concepts as discipline, training and hierarchical surveillance. I intend to provide a critical analysis of methods and techniques of organizational control applied today, in the era of liquid modernity. Since that control, more often than not, is executed nowadays by electronic surveillance equipment and computer programs, hence my term of choice – “cybercontrol”.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Application for Ebola Virus Disease Diagnosis (EbolaDiag) 埃博拉病毒病诊断移动应用程序(EbolaDiag)
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-4029-8.CH004
K. Danjuma, S. Oyelere, Elisha Sunday Oyelere, T. Laine
{"title":"Mobile Application for Ebola Virus Disease Diagnosis (EbolaDiag)","authors":"K. Danjuma, S. Oyelere, Elisha Sunday Oyelere, T. Laine","doi":"10.4018/978-1-5225-4029-8.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-4029-8.CH004","url":null,"abstract":"This chapter describes how the Ebola virus is considered extremely infectious with a series of physical and psychological traumas on the victims. Common clinical signs associated with the disease include a sudden fever, severe headaches, muscle pain, fatigue, diarrhea, vomiting, and unexplained hemorrhages. In Africa, with strained medical facilities and remote localities, prompt identification and diagnosis of the symptoms of Ebola in a suspected patient are important to the control of the epidemic and in curtailing further spread. This chapter presents the development of an Android mobile application called EbolaDiag (Ebola Diagnosis), which is capable of supporting the diagnosis, screening, and healthcare experts working on the frontline in contact tracing and monitoring of the spread of Ebola. Furthermore, EbolaDiag is suitable for aiding the strained medical facilities in endemic areas. In addressing this gap, the application provided a model for implementing such solutions in pandemic environments. Such a solution becomes more relevant and useful to combat Ebola and several other diseases in similar environments.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Maturity in Health Organization Information Systems 卫生组织信息系统的成熟度
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch017
A. Carneiro
{"title":"Maturity in Health Organization Information Systems","authors":"A. Carneiro","doi":"10.4018/978-1-5225-7113-1.ch017","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch017","url":null,"abstract":"Adapting maturity models to healthcare organization's needs is an issue that researchers and technicians should consider and a valuable instrument for IT managers because these models allow the assessment of a present situation as well as the identification of useful improvement measures. This paper discusses the practical utilization of maturity models, including different manners of exploring model's usefulness. For a more complete understanding of maturity models, the selection of criteria and processes of measurement, called metrics, is briefly reviewed in terms of indicators and daily procedures. Some issues of management information systems security are briefly addressed, along with a note on measuring security assessment. Finally some considerations are presented about the need for privacy of personal data to ensure the strategies to be pursued to sensitive data in order to establish a level of effective privacy which is included in the concerns of security of information systems.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126822532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Western Female Migrants to ISIS
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7119-3.ch009
E. Saltman
{"title":"Western Female Migrants to ISIS","authors":"E. Saltman","doi":"10.4018/978-1-5225-7119-3.ch009","DOIUrl":"https://doi.org/10.4018/978-1-5225-7119-3.ch009","url":null,"abstract":"Women have long been a blind spot for security, academic and think tank sectors in relation to the growing threat of global extremism. The recent spike in female recruitment to the terrorist organisation, Islamic State in Iraq and Syria (ISIS), is a strong indicator of this dangerous trend. While often assumed to be passive agents, women continue to play strong roles in online and offline recruitment to violent extremist organisations. However, women can also act as strong counter-extremism agents in the fight against radicalisation and terrorism. Looking at the issue of gender, there is a new ability through online research to retrieve valuable insight into terrorist strategies around recruitment of women from online propaganda. This chapter aims to address questions of gender within current radicalisation trends through an analysis of online data, and through tracking Western females who are migrating to territories under the control of ISIS.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preservation in Information System 信息系统中的隐私保护
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-4666-4940-8.CH003
D. Acharjya, G. Mary A
{"title":"Privacy Preservation in Information System","authors":"D. Acharjya, G. Mary A","doi":"10.4018/978-1-4666-4940-8.CH003","DOIUrl":"https://doi.org/10.4018/978-1-4666-4940-8.CH003","url":null,"abstract":"The information technology revolution has brought drastic change in the way data is collected or generated for decision mining. The accumulated data has no relevance unless it provides certain useful information pertaining to the interest of an organization. The real challenge lies in converting high dimensional data into knowledge and to use this knowledge for the development of the organization. On the other hand, hiding an organization's sensitive information is a major concern. Much research has been carried out in this direction. This chapter discusses various privacy preservation techniques that can be employed in an information system to safeguard the sensitive information of an organization. This chapter also highlights sensitive fuzzy association rules that can be generated from an information system. The authors provide illustrations wherever necessary to give a clear idea of the concepts developed.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127687329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting 美国禁止青少年社交媒体打击极端分子招募的对立观点
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7113-1.ch098
Lindsay A. West, Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, G. Macgregor-Skinner
{"title":"Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting","authors":"Lindsay A. West, Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, G. Macgregor-Skinner","doi":"10.4018/978-1-5225-7113-1.ch098","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch098","url":null,"abstract":"Today, terrorist groups are recruiting, inspiring, and guiding global strategies not just by Internet operations, but through an organized, steady infusion of propaganda videos and call-to-action messages. Most worrisome: increasing evidence that the youth population represents a particularly susceptible cohort, being drawn into the ranks of terrorist organizations operating worldwide. In response, this article will address the pros and cons of social media banning, its effects on constitutional rights, and its effectiveness towards decreasing radicalization and recruitment. The research presented here aims to further the field of Homeland Security and to encourage debates on how to decrease terrorism and youth recruitment and whether banning social media would assist the Department of Homeland Security's mission. In conclusion, this article explores both sides of the spectrum while offering insight for scholars, organizations, and practitioners regarding the attainability of social media banning in the United States.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilization Pattern and Privacy Issues in the Use of Health Records for Research Practice by Doctors 医生在研究实践中使用健康记录的使用模式和隐私问题
Censorship, Surveillance, and Privacy Pub Date : 1900-01-01 DOI: 10.4018/IJPHIM.2016010101
Eunice Olubunmi Omidoyin, R. Opeke, G. Osagbemi
{"title":"Utilization Pattern and Privacy Issues in the Use of Health Records for Research Practice by Doctors","authors":"Eunice Olubunmi Omidoyin, R. Opeke, G. Osagbemi","doi":"10.4018/IJPHIM.2016010101","DOIUrl":"https://doi.org/10.4018/IJPHIM.2016010101","url":null,"abstract":"Research is a fundamental activity in teaching hospitals, and medical doctors use information contained in health records for research. In this process, researchers are often confronted with privacy issues. It is however not clear the extent to which doctors paid attention to this privacy issues in their research. The purpose of this study was to establish the extent to which privacy principles were followed by medical doctors in federal teaching hospitals in Nigeria when using health records for research. Survey research design was adopted for this study with two-stage random sampling technique to select 60% of the federal teaching hospitals; and 60% of the medical doctors in the selected hospitals. Attention was paid to securing patients unused data; health records was used mostly to generate data to support application for grant. There was a joint positive significant relationship between the predictor variables (privacy and health records) and the criterion variable in research practice.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信