logo
    Managed Care: What Is It, and Can It Be Applied to Canada?
    1
    Citation
    0
    Reference
    10
    Related Paper
    This report discusses smart for children that use the internet to interact with the user. It outlines various security concerns regarding the collection and use of information about children, and whether these toys are governed by the Children's Online Privacy Protection Act of 1998.
    Privacy software
    Privacy Protection
    Citations (0)
    This study investigates the relationship between employee readiness to adopt technology in halal meat retailing and manufacturing industries and halal supplier service quality on halal logistics performance. In this paper, quantitative research was carried out by collecting random sample data from 276 respondents working in Indonesian halal meat industries and suppliers. Inter-correlation analysis using SmartPLS is used to determine the extent to which employees' readiness to adopt technology in halal meat retailing and manufacturing industries, as well as the quality of halal service suppliers, affects the performance of halal logistics. The results of this study indicate that the performance of halal logistics is significantly influenced by the readiness of the use of technology in the retail halal meat industry and the quality of halal service suppliers. Meanwhile, the moderate influence occurs in the relationship between the technology readiness in the halal meat manufacturing sector and the performance of halal logistics.
    Sample (material)
    Citations (14)
    This study investigates the relationship between employee readiness to adopt technology in halal meat retailing and manufacturing industries and halal supplier service quality on halal logistics performance. In this paper, quantitative research was carried out by collecting random sample data from 276 respondents working in Indonesian halal meat industries and suppliers. Inter-correlation analysis using SmartPLS is used to determine the extent to which employees' readiness to adopt technology in halal meat retailing and manufacturing industries, as well as the quality of halal service suppliers, affects the performance of halal logistics. The results of this study indicate that the performance of halal logistics is significantly influenced by the readiness of the use of technology in the retail halal meat industry and the quality of halal service suppliers. Meanwhile, the moderate influence occurs in the relationship between the technology readiness in the halal meat manufacturing sector and the performance of halal logistics.
    Sample (material)
    This workshop examined some of the new challenges to health-related privacy emerging as a result of the proliferation of electronic communications and data storage, including through social media, electronic health records and ready access to personal information on the internet. The right to privacy is a human right. As such, protecting privacy and enforcing the duty of confidentiality regarding health information are fundamental to treating people with autonomy, dignity and respect. For people living with HIV, unauthorized disclosure of their status can lead to discrimination and breaches of other human rights. While this is not new, in this information age a new breed of privacy violation is emerging and our legal protections are not necessarily keeping pace.
    Dignity
    Right to privacy
    Citations (2)
    We are living in a digital world where people use their mobile devices to not only store their Personally Identifiable Information (PII) but also the PII of other people like friends, relatives and colleagues. Unlike the past where the governments and businesses alone were the custodians of PII, today people themselves are also the new custodians of PII. This has resulted in a new privacy breach scenario, which we call as People to People (P2P) privacy breaches, where people disseminate the PII of other people without (i) their consent and (ii) any notification to them. P2P privacy breaches have been facilitated by the ubiquitous internet and popular instant messaging applications like WhatsApp, Facebook Messenger. We conducted an online survey with 1810 participants to understand the privacy perceptions of the users related to PII. Survey data analysis shows that 68.9 % people have already indulged in a P2P privacy breach recently while 95.86 % people have chosen to be informed if their PII is shared by others. Thus, we establish that P2P privacy breach is a real concern and needs to be addressed. Analysis also shows that contact numbers and email ID, usually stored in contact cards in mobile devices, are the most shared PII categories followed by personal photographs and addresses. In this work we determine the risk associated with the contact card sharing from the mobile devices. We demonstrate the extent of privacy breach by modelling the contact card information diffusion in a directed random graph. To address this problem, we propose a collaborative P2P privacy model which detects all instances of contact card sharing from mobile devices and generates notifications for the data subjects. The notification also includes the P2P privacy breach severity.
    Custodians
    Social Networking Sites (SNS) have been studied extensively over the last 10 years. The area of privacy and security has always been the prominent area of research. With the exponential increase of social networking users the numbers of threats have increased alarmingly; stealing personal information has been the most common threat as the information is later used to carry out subsequent malicious activities. The vulnerabilities are exploited because majority of SNS users are usually unaware of consequences of disclosing personal information over the public forums without proper privacy measures. Unaware users usually choose weak settings and are not mindful regarding posting their personal information online. The users trust their SNS providers for providing necessary security and privacy to their data, this excessive trust and ignorance results in different degrees of privacy violations. Considering the fact that the privacy preferences of users are strongly influenced by cultural and ethnical differences, the following research was conducted to study the privacy concerns of Pakistani users and the privacy problems associated with posting on SNS. It was found that the users are keenly concerned about their privacy however, they are unable to achieve the desired privacy on SNS as a result of the lack of awareness of privacy options, inappropriate settings and the excessive time associated with configuring those settings. Based on the above observations the idea of nudging the user from behavioral science has been proposed to help people make better privacy choices and decisions on online social networks. The proposed model will nudge users while posting by calculating Privacy Score and Accessing Last Modified Privacy Settings for users which will alert users to adjust their privacy settings. The idea of Privacy Nudges will help HCI researchers to build more sophisticated and user friendly Privacy features without getting into lengthy and time consuming details of adjusting privacy settings.
    Ignorance
    Privacy software
    Citations (3)
    The rapid increase in the number of older adults in developed countries has raised concerns about their well-being and increasing need for healthcare. New technologies, including Internet of Things, are being used to monitor older adults' health and activities, thus enabling them to live safely and independently at home as they age. However, Internet of Things monitoring solutions create privacy challenges that need to be addressed. This review examines how privacy has been conceptualised in studies proposing new Internet of Things solutions for monitoring older adults. The literature reviewed mostly links privacy with information security and unauthorised accessibility threats. There is a limited consideration of other aspects of privacy such as confidentiality and secondary use of users' information. We argue that developers of Internet of Things solutions that aim to monitor and collect health data about older adults need to adopt an expanded view of privacy. This will ensure that safeguards are built in to Internet of Things devices to protect and maintain users' privacy while also enabling the appropriate sharing of data to support older adults' safety and wellbeing.
    Privacy software
    Citations (13)
    This paper presents a part of a larger study in the perspective of halal food logistics (HFL) towards halal food & beverages (FB logistics service providers (LSPs) that offering HFL services and the halal product's manufacturers, mainly from small and medium enterprises (SMEs). Some of the challenges were identified such as the complex management of warehousing and terminals, the lack of trust and knowledge, perceived risk, and others that related to the halal matters.
    Citations (13)