WorldWideScience

Sample records for decisions privacy human

  1. Towards context adaptive privacy decisions in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Könings, Bastian; Weber, M.; Kargl, Frank

    2012-01-01

    In ubiquitous systems control of privacy settings will be increasingly difficult due to the pervasive nature of sensing and communication capabilities. We identify challenges for privacy decisions in ubiquitous systems and propose a system for in situ privacy decision support. When context changes

  2. Fuzzy Privacy Decision for Context-Aware Access Personal Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie

    2007-01-01

    A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.

  3. Footprints near the Surf: Individual Privacy Decisions in Online Contexts

    Science.gov (United States)

    McDonald, Aleecia M.

    2010-01-01

    As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…

  4. Self-disclosure decision making based on intimacy and privacy

    OpenAIRE

    Such, Jose M.; Espinosa, Agustin; Garcia-Fornes, Ana; Sierra, Caries

    2012-01-01

    Autonomous agents may encapsulate their principals¿ personal data attributes. These attributes may be disclosed to other agents during agent interactions, producing a loss of privacy. Thus, agents need self-disclosure decision-making mechanisms to autonomously decide whether disclosing personal data attributes to other agents is acceptable or not. Current self-disclosure decision-making mechanisms consider the direct benefit and the privacy loss of disclosing an attribute. Howe...

  5. An overview of human genetic privacy.

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  6. An overview of human genetic privacy

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2016-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. PMID:27626905

  7. Human Flesh Search Engine and Online Privacy.

    Science.gov (United States)

    Zhang, Yang; Gao, Hong

    2016-04-01

    Human flesh search engine can be a double-edged sword, bringing convenience on the one hand and leading to infringement of personal privacy on the other hand. This paper discusses the ethical problems brought about by the human flesh search engine, as well as possible solutions.

  8. An overview of human genetic privacy

    OpenAIRE

    Shi, Xinghua; Wu, Xintao

    2016-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that nee...

  9. FCJ-195 Privacy, Responsibility, and Human Rights Activism

    Directory of Open Access Journals (Sweden)

    Becky Kazansky

    2015-06-01

    Full Text Available In this article, we argue that many difficulties associated with the protection of digital privacy are rooted in the framing of privacy as a predominantly individual responsibility. We examine how models of privacy protection, such as Notice and Choice, contribute to the ‘responsibilisation’ of human rights activists who rely on the use of technologies for their work. We also consider how a group of human rights activists countered technology-mediated threats that this ‘responsibilisation’ causes by developing a collective approach to address their digital privacy and security needs. We conclude this article by discussing how technological tools used to maintain or counter the loss of privacy can be improved in order to support the privacy and digital security of human rights activists.

  10. A model-driven privacy compliance decision support for medical data sharing in Europe.

    Science.gov (United States)

    Boussi Rahmouni, H; Solomonides, T; Casassa Mont, M; Shiu, S; Rahmouni, M

    2011-01-01

    Clinical practitioners and medical researchers often have to share health data with other colleagues across Europe. Privacy compliance in this context is very important but challenging. Automated privacy guidelines are a practical way of increasing users' awareness of privacy obligations and help eliminating unintentional breaches of privacy. In this paper we present an ontology-plus-rules based approach to privacy decision support for the sharing of patient data across European platforms. We use ontologies to model the required domain and context information about data sharing and privacy requirements. In addition, we use a set of Semantic Web Rule Language rules to reason about legal privacy requirements that are applicable to a specific context of data disclosure. We make the complete set invocable through the use of a semantic web application acting as an interactive privacy guideline system can then invoke the full model in order to provide decision support. When asked, the system will generate privacy reports applicable to a specific case of data disclosure described by the user. Also reports showing guidelines per Member State may be obtained. The advantage of this approach lies in the expressiveness and extensibility of the modelling and inference languages adopted and the ability they confer to reason with complex requirements interpreted from high level regulations. However, the system cannot at this stage fully simulate the role of an ethics committee or review board.

  11. Human factors influencing decision making

    OpenAIRE

    Jacobs, Patricia A.

    1998-01-01

    This report supplies references and comments on literature that identifies human factors influencing decision making, particularly military decision making. The literature has been classified as follows (the classes are not mutually exclusive): features of human information processing; decision making models which are not mathematical models but rather are descriptive; non- personality factors influencing decision making; national characteristics influencing decision makin...

  12. Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions?

    OpenAIRE

    Zafeiropoulou, Aristea M.; Millard, David E.; Webber, Craig; O'Hara, Kieron

    2013-01-01

    Social Media and Web 2.0 tools have dramatically increased the amount of previously private data that users share on the Web; now with the advent of GPS-enabled smartphones users are also actively sharing their location data through a variety of applications and services. Existing research has explored people’s privacy attitudes, and shown that the way people trade their personal data for services of value can be inconsistent with their stated privacy preferences (a phenomenon known as the pr...

  13. Privacy as human flourishing: could a shift towards virtue ethics strengthen privacy protection in the age of Big Data?

    NARCIS (Netherlands)

    van der Sloot, B.

    2014-01-01

    Privacy is commonly seen as an instrumental value in relation to negative freedom, human dignity and personal autonomy. Article 8 ECHR, protecting the right to privacy, was originally coined as a doctrine protecting the negative freedom of citizens in vertical relations, that is between citizen and

  14. Human Rights, Privacy and Medical Research; Analysing UK Policy on Tissue and Data

    OpenAIRE

    Gillott, John

    2006-01-01

    This report is one outcome of a study into privacy and human genetics initiated by John Gillott and staff and trustees of the Genetic Interest Group. \\ud \\ud The initial focus was on genetics and human rights, with an emphasis on legal aspects and policy decisions informed by law and rights ideology. Article 8 of the Human Rights Act 1998, the right to respect for private and family life,1 is of most relevance to this study, though other Articles are considered.\\ud \\ud The study as a whole co...

  15. Privacy preserving mechanisms for optimizing cross-organizational collaborative decisions based on the Karmarkar algorithm

    NARCIS (Netherlands)

    Zhu, H.; Liu, H.W.; Ou, Carol; Davison, R.M.; Yang, Z.R.

    2017-01-01

    Cross-organizational collaborative decision-making involves a great deal of private information which companies are often reluctant to disclose, even when they need to analyze data collaboratively. The lack of effective privacy-preserving mechanisms for optimizing cross-organizational collaborative

  16. Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance.

    Science.gov (United States)

    Coventry, Lynne M; Jeske, Debora; Blythe, John M; Turland, James; Briggs, Pam

    2016-01-01

    Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which makes it interesting for those who seek to design 'nudges' designed to manipulate privacy behaviors. We explore such effects in a cookie decision task. Two hundred and ninety participants were given an incidental website review task that masked the true aim of the study. At the task outset, they were asked whether they wanted to accept a cookie in a message that either contained a social framing 'nudge' (they were told that either a majority or a minority of users like themselves had accepted the cookie) or contained no information about social norms (control). At the end of the task, participants were asked to complete a range of personality assessments (impulsivity, risk-taking, willingness to self-disclose and sociability). We found social framing to be an effective behavioral nudge, reducing cookie acceptance in the minority social norm condition. Further, we found personality effects in that those scoring highly on risk-taking and impulsivity were significantly more likely to accept the cookie. Finally, we found that the application of a social nudge could attenuate the personality effects of impulsivity and risk-taking. We explore the implications for those working in the privacy-by-design space.

  17. Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance

    Directory of Open Access Journals (Sweden)

    Lynne Margaret Coventry

    2016-09-01

    Full Text Available Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which makes it interesting for those who seek to design ‘nudges’ designed to manipulate privacy behaviors. We explore such effects in a cookie decision task. Two hundred and ninety participants were given an incidental website review task that masked the true aim of the study. At the task outset, they were asked whether they wanted to accept a cookie in a message that either contained a social framing ’nudge’ (they were told that either a majority or a minority of users like themselves had accepted the cookie or contained no information about social norms (control. At the end of the task, participants were asked to complete a range of personality assessments (impulsivity, risk-taking, willingness to self-disclose and sociability. We found social framing to be an effective behavioral nudge, reducing cookie acceptance in the minority social norm condition. Further, we found personality effects such that those scoring highly on risk-taking and impulsivity were significantly more likely to accept the cookie. Finally, we found that the application of a social nudge could attenuate the personality effects of impulsivity and risk-taking. We explore the implications for those working in the privacy-by-design space.

  18. Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance

    Science.gov (United States)

    Coventry, Lynne M.; Jeske, Debora; Blythe, John M.; Turland, James; Briggs, Pam

    2016-01-01

    Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which makes it interesting for those who seek to design ‘nudges’ designed to manipulate privacy behaviors. We explore such effects in a cookie decision task. Two hundred and ninety participants were given an incidental website review task that masked the true aim of the study. At the task outset, they were asked whether they wanted to accept a cookie in a message that either contained a social framing ‘nudge’ (they were told that either a majority or a minority of users like themselves had accepted the cookie) or contained no information about social norms (control). At the end of the task, participants were asked to complete a range of personality assessments (impulsivity, risk-taking, willingness to self-disclose and sociability). We found social framing to be an effective behavioral nudge, reducing cookie acceptance in the minority social norm condition. Further, we found personality effects in that those scoring highly on risk-taking and impulsivity were significantly more likely to accept the cookie. Finally, we found that the application of a social nudge could attenuate the personality effects of impulsivity and risk-taking. We explore the implications for those working in the privacy-by-design space. PMID:27656157

  19. Human Errors in Decision Making

    OpenAIRE

    Mohamad, Shahriari; Aliandrina, Dessy; Feng, Yan

    2005-01-01

    The aim of this paper was to identify human errors in decision making process. The study was focused on a research question such as: what could be the human error as a potential of decision failure in evaluation of the alternatives in the process of decision making. Two case studies were selected from the literature and analyzed to find the human errors contribute to decision fail. Then the analysis of human errors was linked with mental models in evaluation of alternative step. The results o...

  20. 78 FR 43258 - Privacy Act; System of Records: Human Resources Records, State-31

    Science.gov (United States)

    2013-07-19

    ... DEPARTMENT OF STATE [Public Notice 8384] Privacy Act; System of Records: Human Resources Records... system of records, Human Resources Records, State- 31, pursuant to the provisions of the Privacy Act of... State proposes that the current system will retain the name ``Human Resources Records'' (previously...

  1. Privacy-preserving clinical decision support system using Gaussian kernel-based classification.

    Science.gov (United States)

    Rahulamathavan, Yogachandran; Veluru, Suresh; Phan, Raphael C-W; Chambers, Jonathon A; Rajarajan, Muttukrishnan

    2014-01-01

    A clinical decision support system forms a critical capability to link health observations with health knowledge to influence choices by clinicians for improved healthcare. Recent trends toward remote outsourcing can be exploited to provide efficient and accurate clinical decision support in healthcare. In this scenario, clinicians can use the health knowledge located in remote servers via the Internet to diagnose their patients. However, the fact that these servers are third party and therefore potentially not fully trusted raises possible privacy concerns. In this paper, we propose a novel privacy-preserving protocol for a clinical decision support system where the patients' data always remain in an encrypted form during the diagnosis process. Hence, the server involved in the diagnosis process is not able to learn any extra knowledge about the patient's data and results. Our experimental results on popular medical datasets from UCI-database demonstrate that the accuracy of the proposed protocol is up to 97.21% and the privacy of patient data is not compromised.

  2. Privacy and human behavior in the age of information.

    Science.gov (United States)

    Acquisti, Alessandro; Brandimarte, Laura; Loewenstein, George

    2015-01-30

    This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age. Copyright © 2015, American Association for the Advancement of Science.

  3. Human decision error (HUMDEE) trees

    International Nuclear Information System (INIS)

    Ostrom, L.T.

    1993-01-01

    Graphical presentations of human actions in incident and accident sequences have been used for many years. However, for the most part, human decision making has been underrepresented in these trees. This paper presents a method of incorporating the human decision process into graphical presentations of incident/accident sequences. This presentation is in the form of logic trees. These trees are called Human Decision Error Trees or HUMDEE for short. The primary benefit of HUMDEE trees is that they graphically illustrate what else the individuals involved in the event could have done to prevent either the initiation or continuation of the event. HUMDEE trees also present the alternate paths available at the operator decision points in the incident/accident sequence. This is different from the Technique for Human Error Rate Prediction (THERP) event trees. There are many uses of these trees. They can be used for incident/accident investigations to show what other courses of actions were available and for training operators. The trees also have a consequence component so that not only the decision can be explored, also the consequence of that decision

  4. Variability in adolescent portal privacy features: how the unique privacy needs of the adolescent patient create a complex decision-making process.

    Science.gov (United States)

    Sharko, Marianne; Wilcox, Lauren; Hong, Matthew K; Ancker, Jessica S

    2018-05-17

    Medical privacy policies, which are clear-cut for adults and young children, become ambiguous during adolescence. Yet medical organizations must establish unambiguous rules about patient and parental access to electronic patient portals. We conducted a national interview study to characterize the diversity in adolescent portal policies across a range of institutions and determine the factors influencing decisions about these policies. Within a sampling framework that ensured diversity of geography and medical organization type, we used purposive and snowball sampling to identify key informants. Semi-structured interviews were conducted and analyzed with inductive thematic analysis, followed by a member check. We interviewed informants from 25 medical organizations. Policies established different degrees of adolescent access (from none to partial to complete), access ages (from 10 to 18 years), degrees of parental access, and types of information considered sensitive. Federal and state law did not dominate policy decisions. Other factors in the decision process were: technology capabilities; differing patient population needs; resources; community expectations; balance between information access and privacy; balance between promoting autonomy and promoting family shared decision-making; and tension between teen privacy and parental preferences. Some informants believed that clearer standards would simplify policy-making; others worried that standards could restrict high-quality polices. In the absence of universally accepted standards, medical organizations typically undergo an arduous decision-making process to develop teen portal policies, weighing legal, economic, social, clinical, and technological factors. As a result, portal access policies are highly inconsistent across the United States and within individual states.

  5. HUMAN DECISIONS AND MACHINE PREDICTIONS.

    Science.gov (United States)

    Kleinberg, Jon; Lakkaraju, Himabindu; Leskovec, Jure; Ludwig, Jens; Mullainathan, Sendhil

    2018-02-01

    Can machine learning improve human decision making? Bail decisions provide a good test case. Millions of times each year, judges make jail-or-release decisions that hinge on a prediction of what a defendant would do if released. The concreteness of the prediction task combined with the volume of data available makes this a promising machine-learning application. Yet comparing the algorithm to judges proves complicated. First, the available data are generated by prior judge decisions. We only observe crime outcomes for released defendants, not for those judges detained. This makes it hard to evaluate counterfactual decision rules based on algorithmic predictions. Second, judges may have a broader set of preferences than the variable the algorithm predicts; for instance, judges may care specifically about violent crimes or about racial inequities. We deal with these problems using different econometric strategies, such as quasi-random assignment of cases to judges. Even accounting for these concerns, our results suggest potentially large welfare gains: one policy simulation shows crime reductions up to 24.7% with no change in jailing rates, or jailing rate reductions up to 41.9% with no increase in crime rates. Moreover, all categories of crime, including violent crimes, show reductions; and these gains can be achieved while simultaneously reducing racial disparities. These results suggest that while machine learning can be valuable, realizing this value requires integrating these tools into an economic framework: being clear about the link between predictions and decisions; specifying the scope of payoff functions; and constructing unbiased decision counterfactuals. JEL Codes: C10 (Econometric and statistical methods and methodology), C55 (Large datasets: Modeling and analysis), K40 (Legal procedure, the legal system, and illegal behavior).

  6. Owning genetic information and gene enhancement techniques: why privacy and property rights may undermine social control of the human genome.

    Science.gov (United States)

    Moore, A D

    2000-04-01

    In this article I argue that the proper subjects of intangible property claims include medical records, genetic profiles, and gene enhancement techniques. Coupled with a right to privacy these intangible property rights allow individuals a zone of control that will, in most cases, justifiably exclude governmental or societal invasions into private domains. I argue that the threshold for overriding privacy rights and intangible property rights is higher, in relation to genetic enhancement techniques and sensitive personal information, than is commonly suggested. Once the bar is raised, so-to-speak, the burden of overriding it is formidable. Thus many policy decisions that have been recently proposed or enacted--citywide audio and video surveillance, law enforcement DNA sweeps, genetic profiling, national bans on genetic testing and enhancement of humans, to name a few--will have to be backed by very strong arguments.

  7. A Heuristic Model for Supporting Users’ Decision-Making in Privacy Disclosure for Recommendation

    Directory of Open Access Journals (Sweden)

    Hongchen Wu

    2018-01-01

    Full Text Available Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high-quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to inconsistency in the disclosure volumes and reduction of the prediction accuracy. Therefore, an analysis of why this influence occurs and how to optimize the user experience is highly important. We propose a novel heuristic model that defines the data structures of items and participants in social media, utilizes a modified decision-tree classifier that can predict participants’ disclosures, and puts forward a correlation analysis for detecting disclosure inconsistences. The heuristic model is applied to real-time dataset to evaluate the behavioral effects. Decision-tree classifier and correlation analysis indeed prove that some participants’ behaviors in information disclosures became decreasingly correlated during item requesting. Participants can be “persuaded” to change their disclosure behaviors, and the users’ answers to the mildly sensitive items tend to be more variable and less predictable. Using this approach, recommender systems in social media can thus know the users better and provide service with higher prediction accuracy.

  8. Simulation of human decision making

    Science.gov (United States)

    Forsythe, J Chris [Sandia Park, NM; Speed, Ann E [Albuquerque, NM; Jordan, Sabina E [Albuquerque, NM; Xavier, Patrick G [Albuquerque, NM

    2008-05-06

    A method for computer emulation of human decision making defines a plurality of concepts related to a domain and a plurality of situations related to the domain, where each situation is a combination of at least two of the concepts. Each concept and situation is represented in the computer as an oscillator output, and each situation and concept oscillator output is distinguishable from all other oscillator outputs. Information is input to the computer representative of detected concepts, and the computer compares the detected concepts with the stored situations to determine if a situation has occurred.

  9. Protection of the right to privacy in the practice of the European Court of Human Rights

    Directory of Open Access Journals (Sweden)

    Mladenov Marijana

    2013-01-01

    Full Text Available The right to privacy is a fundamental human right and an essential component of the protection of human autonomy and freedom. The development of science and information systems creates various opportunities for interferences with physical and moral integrity of a person. Therefore, it is necessary to determine the precise content of the right to privacy. The European Convention on Human Rights and Fundamental Freedoms guarantees this right under Article 8. The European Court of Human Rights did not precisely define the content of the right to privacy and thereby the applicants could bring different aspects of life into the scope of respect for private life. According to the Court, the concept of privacy and private life includes the following areas of human life: the right to establish and maintain relationships with other human beings, protection of the physical and moral integrity of persons, protection of personal data, change of personal name, various issues related to sexual orientation and transgender. The subject of this paper is referring to previously mentioned spheres of human life in the light of interpretation of Article 8 of the Convention.

  10. Humans Optimize Decision-Making by Delaying Decision Onset

    Science.gov (United States)

    Teichert, Tobias; Ferrera, Vincent P.; Grinband, Jack

    2014-01-01

    Why do humans make errors on seemingly trivial perceptual decisions? It has been shown that such errors occur in part because the decision process (evidence accumulation) is initiated before selective attention has isolated the relevant sensory information from salient distractors. Nevertheless, it is typically assumed that subjects increase accuracy by prolonging the decision process rather than delaying decision onset. To date it has not been tested whether humans can strategically delay decision onset to increase response accuracy. To address this question we measured the time course of selective attention in a motion interference task using a novel variant of the response signal paradigm. Based on these measurements we estimated time-dependent drift rate and showed that subjects should in principle be able trade speed for accuracy very effectively by delaying decision onset. Using the time-dependent estimate of drift rate we show that subjects indeed delay decision onset in addition to raising response threshold when asked to stress accuracy over speed in a free reaction version of the same motion-interference task. These findings show that decision onset is a critical aspect of the decision process that can be adjusted to effectively improve decision accuracy. PMID:24599295

  11. Modeling Human Elements of Decision-Making

    Science.gov (United States)

    2002-06-01

    include factors such as personality, emotion , and level of expertise, which vary from individual to individual. The process of decision - making during... rational choice theories such as utility theory, to more descriptive psychological models that focus more on the process of decision - making ...descriptive nature, they provide a more realistic representation of human decision - making than the rationally based models. However these models do

  12. An approach for assessing human decision reliability

    International Nuclear Information System (INIS)

    Pyy, P.

    2000-01-01

    This paper presents a method to study human reliability in decision situations related to nuclear power plant disturbances. Decisions often play a significant role in handling of emergency situations. The method may be applied to probabilistic safety assessments (PSAs) in cases where decision making is an important dimension of an accident sequence. Such situations are frequent e.g. in accident management. In this paper, a modelling approach for decision reliability studies is first proposed. Then, a case study with two decision situations with relatively different characteristics is presented. Qualitative and quantitative findings of the study are discussed. In very simple decision cases with time pressure, time reliability correlation proved out to be a feasible reliability modelling method. In all other decision situations, more advanced probabilistic decision models have to be used. Finally, decision probability assessment by using simulator run results and expert judgement is presented

  13. Dissociating sensory from decision processes in human perceptual decision making

    OpenAIRE

    Mostert, Pim; Kok, Peter; de Lange, Floris P.

    2015-01-01

    A key question within systems neuroscience is how the brain translates physical stimulation into a behavioral response: perceptual decision making. To answer this question, it is important to dissociate the neural activity underlying the encoding of sensory information from the activity underlying the subsequent temporal integration into a decision variable. Here, we adopted a decoding approach to empirically assess this dissociation in human magnetoencephalography recordings. We used a funct...

  14. Dissociating sensory from decision processes in human perceptual decision making.

    Science.gov (United States)

    Mostert, Pim; Kok, Peter; de Lange, Floris P

    2015-12-15

    A key question within systems neuroscience is how the brain translates physical stimulation into a behavioral response: perceptual decision making. To answer this question, it is important to dissociate the neural activity underlying the encoding of sensory information from the activity underlying the subsequent temporal integration into a decision variable. Here, we adopted a decoding approach to empirically assess this dissociation in human magnetoencephalography recordings. We used a functional localizer to identify the neural signature that reflects sensory-specific processes, and subsequently traced this signature while subjects were engaged in a perceptual decision making task. Our results revealed a temporal dissociation in which sensory processing was limited to an early time window and consistent with occipital areas, whereas decision-related processing became increasingly pronounced over time, and involved parietal and frontal areas. We found that the sensory processing accurately reflected the physical stimulus, irrespective of the eventual decision. Moreover, the sensory representation was stable and maintained over time when it was required for a subsequent decision, but unstable and variable over time when it was task-irrelevant. In contrast, decision-related activity displayed long-lasting sustained components. Together, our approach dissects neuro-anatomically and functionally distinct contributions to perceptual decisions.

  15. Dissociating sensory from decision processes in human perceptual decision making

    Science.gov (United States)

    Mostert, Pim; Kok, Peter; de Lange, Floris P.

    2015-01-01

    A key question within systems neuroscience is how the brain translates physical stimulation into a behavioral response: perceptual decision making. To answer this question, it is important to dissociate the neural activity underlying the encoding of sensory information from the activity underlying the subsequent temporal integration into a decision variable. Here, we adopted a decoding approach to empirically assess this dissociation in human magnetoencephalography recordings. We used a functional localizer to identify the neural signature that reflects sensory-specific processes, and subsequently traced this signature while subjects were engaged in a perceptual decision making task. Our results revealed a temporal dissociation in which sensory processing was limited to an early time window and consistent with occipital areas, whereas decision-related processing became increasingly pronounced over time, and involved parietal and frontal areas. We found that the sensory processing accurately reflected the physical stimulus, irrespective of the eventual decision. Moreover, the sensory representation was stable and maintained over time when it was required for a subsequent decision, but unstable and variable over time when it was task-irrelevant. In contrast, decision-related activity displayed long-lasting sustained components. Together, our approach dissects neuro-anatomically and functionally distinct contributions to perceptual decisions. PMID:26666393

  16. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  17. Human Decision-Making under Limited Time

    OpenAIRE

    Ortega, Pedro A.; Stocker, Alan A.

    2016-01-01

    Subjective expected utility theory assumes that decision-makers possess unlimited computational resources to reason about their choices; however, virtually all decisions in everyday life are made under resource constraints - i.e. decision-makers are bounded in their rationality. Here we experimentally tested the predictions made by a formalization of bounded rationality based on ideas from statistical mechanics and information-theory. We systematically tested human subjects in their ability t...

  18. Computational Complexity and Human Decision-Making.

    Science.gov (United States)

    Bossaerts, Peter; Murawski, Carsten

    2017-12-01

    The rationality principle postulates that decision-makers always choose the best action available to them. It underlies most modern theories of decision-making. The principle does not take into account the difficulty of finding the best option. Here, we propose that computational complexity theory (CCT) provides a framework for defining and quantifying the difficulty of decisions. We review evidence showing that human decision-making is affected by computational complexity. Building on this evidence, we argue that most models of decision-making, and metacognition, are intractable from a computational perspective. To be plausible, future theories of decision-making will need to take into account both the resources required for implementing the computations implied by the theory, and the resource constraints imposed on the decision-maker by biology. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Transactive System: Part I: Theoretical Underpinnings of Payoff Functions, Control Decisions, Information Privacy, and Solution Concepts

    Energy Technology Data Exchange (ETDEWEB)

    Lian, Jianming [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhang, Wei [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sun, Y. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Marinovici, Laurentiu D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Widergren, Steven E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2018-01-17

    new transactive energy system design with demonstrable guarantees on stability and performance. Specifically, the goals are to (1) establish a theoretical basis for evaluating the performance of different transactive systems, (2) devise tools to address canonical problems that exemplify challenges and scenarios of transactive systems, and (3) provide guidelines for design of future transactive systems. This report, Part 1 of a two part series, advances the above-listed research objectives by reviewing existing transactive systems and identifying a theoretical foundation that integrates payoff functions, control decisions, information privacy, and mathematical solution concepts.

  20. Human Factors Influencing Decision Making

    Science.gov (United States)

    1998-07-01

    and Einhom (1991); Zeelenberg et al. (1997). This environmental context also makes it difficult to associate measured personality traits with specific... Zeelenberg and Beattie5 (1997): People are motivated to minimize post-decision regret. As a result people can become risk averse or risk seeking...188-201), Ablex, Norwood NJ, 1993. 5 Zeelenberg M. and J. Beattie. "Consequences of regret aversion 2: additional evidence for effects of feedback on

  1. The evolutionary roots of human decision making.

    Science.gov (United States)

    Santos, Laurie R; Rosati, Alexandra G

    2015-01-03

    Humans exhibit a suite of biases when making economic decisions. We review recent research on the origins of human decision making by examining whether similar choice biases are seen in nonhuman primates, our closest phylogenetic relatives. We propose that comparative studies can provide insight into four major questions about the nature of human choice biases that cannot be addressed by studies of our species alone. First, research with other primates can address the evolution of human choice biases and identify shared versus human-unique tendencies in decision making. Second, primate studies can constrain hypotheses about the psychological mechanisms underlying such biases. Third, comparisons of closely related species can identify when distinct mechanisms underlie related biases by examining evolutionary dissociations in choice strategies. Finally, comparative work can provide insight into the biological rationality of economically irrational preferences.

  2. Integrated Environmental Modelling: Human decisions, human challenges

    Science.gov (United States)

    Glynn, Pierre D.

    2015-01-01

    Integrated Environmental Modelling (IEM) is an invaluable tool for understanding the complex, dynamic ecosystems that house our natural resources and control our environments. Human behaviour affects the ways in which the science of IEM is assembled and used for meaningful societal applications. In particular, human biases and heuristics reflect adaptation and experiential learning to issues with frequent, sharply distinguished, feedbacks. Unfortunately, human behaviour is not adapted to the more diffusely experienced problems that IEM typically seeks to address. Twelve biases are identified that affect IEM (and science in general). These biases are supported by personal observations and by the findings of behavioural scientists. A process for critical analysis is proposed that addresses some human challenges of IEM and solicits explicit description of (1) represented processes and information, (2) unrepresented processes and information, and (3) accounting for, and cognizance of, potential human biases. Several other suggestions are also made that generally complement maintaining attitudes of watchful humility, open-mindedness, honesty and transparent accountability. These suggestions include (1) creating a new area of study in the behavioural biogeosciences, (2) using structured processes for engaging the modelling and stakeholder communities in IEM, and (3) using ‘red teams’ to increase resilience of IEM constructs and use.

  3. A vision-based system for intelligent monitoring: human behaviour analysis and privacy by context.

    Science.gov (United States)

    Chaaraoui, Alexandros Andre; Padilla-López, José Ramón; Ferrández-Pastor, Francisco Javier; Nieto-Hidalgo, Mario; Flórez-Revuelta, Francisco

    2014-05-20

    Due to progress and demographic change, society is facing a crucial challenge related to increased life expectancy and a higher number of people in situations of dependency. As a consequence, there exists a significant demand for support systems for personal autonomy. This article outlines the vision@home project, whose goal is to extend independent living at home for elderly and impaired people, providing care and safety services by means of vision-based monitoring. Different kinds of ambient-assisted living services are supported, from the detection of home accidents, to telecare services. In this contribution, the specification of the system is presented, and novel contributions are made regarding human behaviour analysis and privacy protection. By means of a multi-view setup of cameras, people's behaviour is recognised based on human action recognition. For this purpose, a weighted feature fusion scheme is proposed to learn from multiple views. In order to protect the right to privacy of the inhabitants when a remote connection occurs, a privacy-by-context method is proposed. The experimental results of the behaviour recognition method show an outstanding performance, as well as support for multi-view scenarios and real-time execution, which are required in order to provide the proposed services.

  4. A Vision-Based System for Intelligent Monitoring: Human Behaviour Analysis and Privacy by Context

    Directory of Open Access Journals (Sweden)

    Alexandros Andre Chaaraoui

    2014-05-01

    Full Text Available Due to progress and demographic change, society is facing a crucial challenge related to increased life expectancy and a higher number of people in situations of dependency. As a consequence, there exists a significant demand for support systems for personal autonomy. This article outlines the vision@home project, whose goal is to extend independent living at home for elderly and impaired people, providing care and safety services by means of vision-based monitoring. Different kinds of ambient-assisted living services are supported, from the detection of home accidents, to telecare services. In this contribution, the specification of the system is presented, and novel contributions are made regarding human behaviour analysis and privacy protection. By means of a multi-view setup of cameras, people’s behaviour is recognised based on human action recognition. For this purpose, a weighted feature fusion scheme is proposed to learn from multiple views. In order to protect the right to privacy of the inhabitants when a remote connection occurs, a privacy-by-context method is proposed. The experimental results of the behaviour recognition method show an outstanding performance, as well as support for multi-view scenarios and real-time execution, which are required in order to provide the proposed services.

  5. The Human Genome Project: Biology, Computers, and Privacy.

    Science.gov (United States)

    Cutter, Mary Ann G.; Drexler, Edward; Gottesman, Kay S.; Goulding, Philip G.; McCullough, Laurence B.; McInerney, Joseph D.; Micikas, Lynda B.; Mural, Richard J.; Murray, Jeffrey C.; Zola, John

    This module, for high school teachers, is the second of two modules about the Human Genome Project (HGP) produced by the Biological Sciences Curriculum Study (BSCS). The first section of this module provides background information for teachers about the structure and objectives of the HGP, aspects of the science and technology that underlie the…

  6. Engineering and lawyering privacy by design : understanding online privacy both as a technical and an international human rights issue

    NARCIS (Netherlands)

    Rachovitsa, Adamantia

    2016-01-01

    There is already evidence that “governmental mass surveillance emerges as a dangerous habit”. Despite the serious interests at stake, we are far from fully comprehending the ramifications of the systematic and pervasive violation of privacy online. This article underscores the reasons that

  7. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  8. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  9. Decision science a human-oriented perspective

    CERN Document Server

    Mengov, George

    2015-01-01

    This book offers a new perspective on human decision-making by comparing the established methods in decision science with innovative modelling at the level of neurons and neural interactions. The book presents a new generation of computer models, which can predict with astonishing accuracy individual economic choices when people make them by quick intuition rather than by effort. A vision for a new kind of social science is outlined, whereby neural models of emotion and cognition capture the dynamics of socioeconomic systems and virtual social networks. The exposition is approachable by experts as well as by advanced students. The author is an Associate Professor of Decision Science with a doctorate in Computational Neuroscience, and a former software consultant to banks in the City of London.  .

  10. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  11. Human-centric decision-making models for social sciences

    CERN Document Server

    Pedrycz, Witold

    2014-01-01

    The volume delivers a wealth of effective methods to deal with various types of uncertainty inherently existing in human-centric decision problems. It elaborates on  comprehensive decision frameworks to handle different decision scenarios, which help use effectively the explicit and tacit knowledge and intuition, model perceptions and preferences in a more human-oriented style. The book presents original approaches and delivers new results on fundamentals and applications related to human-centered decision making approaches to business, economics and social systems. Individual chapters cover multi-criteria (multiattribute) decision making, decision making with prospect theory, decision making with incomplete probabilistic information, granular models of decision making and decision making realized with the use of non-additive measures. New emerging decision theories being presented as along with a wide spectrum of ongoing research make the book valuable to all interested in the field of advanced decision-mak...

  12. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  13. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  14. Health information: reconciling personal privacy with the public good of human health.

    Science.gov (United States)

    Gostin, L O

    2001-01-01

    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and fragmented across the states. Constitutional law is highly general, without important specific safeguards. Finally, a case study is provided showing the important trade-offs that exist between public health and privacy. For a model public health law, see www.critpath.org/msphpa/privacy.

  15. Adaptable history biases in human perceptual decisions.

    Science.gov (United States)

    Abrahamyan, Arman; Silva, Laura Luz; Dakin, Steven C; Carandini, Matteo; Gardner, Justin L

    2016-06-21

    When making choices under conditions of perceptual uncertainty, past experience can play a vital role. However, it can also lead to biases that worsen decisions. Consistent with previous observations, we found that human choices are influenced by the success or failure of past choices even in a standard two-alternative detection task, where choice history is irrelevant. The typical bias was one that made the subject switch choices after a failure. These choice history biases led to poorer performance and were similar for observers in different countries. They were well captured by a simple logistic regression model that had been previously applied to describe psychophysical performance in mice. Such irrational biases seem at odds with the principles of reinforcement learning, which would predict exquisite adaptability to choice history. We therefore asked whether subjects could adapt their irrational biases following changes in trial order statistics. Adaptability was strong in the direction that confirmed a subject's default biases, but weaker in the opposite direction, so that existing biases could not be eradicated. We conclude that humans can adapt choice history biases, but cannot easily overcome existing biases even if irrational in the current context: adaptation is more sensitive to confirmatory than contradictory statistics.

  16. Dissociating sensory from decision processes in human perceptual decision making

    NARCIS (Netherlands)

    Mostert, P.; Kok, P.; Lange, F.P. de

    2015-01-01

    A key question within systems neuroscience is how the brain translates physical stimulation into a behavioral response: perceptual decision making. To answer this question, it is important to dissociate the neural activity underlying the encoding of sensory information from the activity underlying

  17. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  18. Protecting human health and security in digital Europe: how to deal with the "privacy paradox"?

    Science.gov (United States)

    Büschel, Isabell; Mehdi, Rostane; Cammilleri, Anne; Marzouki, Yousri; Elger, Bernice

    2014-09-01

    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals' motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the "privacy paradox"). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals' well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled "e-democracy" as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.

  19. Development of a statistical method for predicting human driver decisions.

    Science.gov (United States)

    2015-09-01

    As autonomous vehicles enter the fleet, there will be a long period when these vehicles will have to interact with : human drivers. One of the challenges for autonomous vehicles is that human drivers do not communicate their : decisions well. However...

  20. Human centred design of software agent in social network service against privacy concerns

    OpenAIRE

    Kim, Hojung

    2016-01-01

    This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University London The rapid growth and influence of social network services has led many scholars to focus on privacy issues. However, the research described in this thesis was motivated by the small number of design studies that have focused on practical approaches to identifying tacit information from users’ instant non-verbal responses to privacy issues. The research therefore aimed to propose pers...

  1. Human Decisions: Nitrogen Footprints and Environmental Effects

    Science.gov (United States)

    Leach, A. M.; Bleeker, A.; Galloway, J. N.; Erisman, J.

    2012-12-01

    would reduce the food N footprint by ~60%. Such a reduction would result in significant lessening of the impacts of societal use of food resources on both ecosystem and human health. The personal food nitrogen footprints will then be linked to environmental effects based on the N species of the nitrogen footprint. Environmental effects considered will include global warming, air quality, drinking water quality, eutrophication, and stratospheric ozone depletion. Each of the scenarios will be scaled up to represent the full population of the United States, and the total national nitrogen reductions and the impact on environmental effects will be reported. The results of this analysis will help us begin to solve the human dimension of the nitrogen challenge by showing how different personal choices impact nitrogen losses and the environment. This information can then educate and empower consumers to make informed decisions about their food choices.

  2. Assessment of human decision reliability - a case study

    International Nuclear Information System (INIS)

    Pyy, P

    1998-01-01

    In his discussion of this case study, the author indicates that human beings are not merely machines who use rules. Thus, more focus needs to be put on studying decision making situations and their contexts. Decision theory (both normative and descriptive) and contextual psychological approaches may offer tools to cope with operator decision making. Further an ideal decision space needs to be defined for operators. The case study specifically addressed a loss of feedwater scenario and the various operator decisions that were involved in that scenario. It was concluded from this particular study that there are significant differences in the crew decision behaviours that are not explained by process variables. Through use of evidence from simulator tests with expert judgement, an approach to estimate probabilities has been developed. The modelling approach presented in this discussion is an extension of current HRA paradigms, but a natural one since all human beings make decisions

  3. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  4. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  5. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  6. Modelling human emotions for tactical decision-making games

    NARCIS (Netherlands)

    Visschedijk, G.; Lazonder, Adrianus W.; van der Hulst, A.; Vink, N.; Leemkuil, Hendrik H.

    2013-01-01

    The training of tactical decision making increasingly occurs through serious computer games. A challenging aspect of designing such games is the modelling of human emotions. Two studies were performed to investigate the relation between fidelity and human emotion recognition in virtual human

  7. Modelling human emotions for tactical decision-making games

    NARCIS (Netherlands)

    Visschedijk, G.C.; Lazonder, A.W.; Hulst, A.H. van der; Vink, N.; Leemkuil, H.

    2013-01-01

    The training of tactical decision making increasingly occurs through serious computer games. A challenging aspect of designing such games is the modelling of human emotions. Two studieswere performed to investigate the relation between fidelity and human emotion recognition in virtual human

  8. Modelling Human Emotions for Tactical Decision-Making Games

    Science.gov (United States)

    Visschedijk, Gillian C.; Lazonder, Ard W.; van der Hulst, Anja; Vink, Nathalie; Leemkuil, Henny

    2013-01-01

    The training of tactical decision making increasingly occurs through serious computer games. A challenging aspect of designing such games is the modelling of human emotions. Two studies were performed to investigate the relation between fidelity and human emotion recognition in virtual human characters. Study 1 compared five versions of a virtual…

  9. Anonymity versus privacy in the dictator game: revealing donor decisions to recipients does not substantially impact donor behavior.

    Directory of Open Access Journals (Sweden)

    Jeffrey Winking

    Full Text Available Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006 in which recipients were left unaware of the Dictator Game and given donations as "bonuses" to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006 and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories-one in which the recipient knew of (1 any donation by an anonymous donor (including zero donations, (2 nothing at all, (3 only zero donations, and (4 and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior.

  10. Simulation Models of Human Decision-Making Processes

    Directory of Open Access Journals (Sweden)

    Nina RIZUN

    2014-10-01

    Full Text Available The main purpose of the paper is presentation of the new concept of human decision-making process modeling via using the analogy with Automatic Control Theory. From the author's point of view this concept allows to develop and improve the theory of decision-making in terms of the study and classification of specificity of the human intellectual processes in different conditions. It was proved that the main distinguishing feature between the Heuristic / Intuitive and Rational Decision-Making Models is the presence of so-called phenomenon of "enrichment" of the input information with human propensity, hobbies, tendencies, expectations, axioms and judgments, presumptions or bias and their justification. In order to obtain additional knowledge about the basic intellectual processes as well as the possibility of modeling the decision results in various parameters characterizing the decision-maker, the complex of the simulation models was developed. These models are based on the assumptions that:  basic intellectual processes of the Rational Decision-Making Model can be adequately simulated and identified by the transient processes of the proportional-integral-derivative controller; basic intellectual processes of the Bounded Rationality and Intuitive Models can be adequately simulated and identified by the transient processes of the nonlinear elements.The taxonomy of the most typical automatic control theory elements and their compliance with certain decision-making models with a point of view of decision-making process specificity and decision-maker behavior during a certain time of professional activity was obtained.

  11. The "GeneTrustee": a universal identification system that ensures privacy and confidentiality for human genetic databases.

    Science.gov (United States)

    Burnett, Leslie; Barlow-Stewart, Kris; Proos, Anné L; Aizenberg, Harry

    2003-05-01

    This article describes a generic model for access to samples and information in human genetic databases. The model utilises a "GeneTrustee", a third-party intermediary independent of the subjects and of the investigators or database custodians. The GeneTrustee model has been implemented successfully in various community genetics screening programs and has facilitated research access to genetic databases while protecting the privacy and confidentiality of research subjects. The GeneTrustee model could also be applied to various types of non-conventional genetic databases, including neonatal screening Guthrie card collections, and to forensic DNA samples.

  12. Methodology for eliciting, encoding and simulating human decision making behaviour

    OpenAIRE

    Rider, Conrad Edgar Scott

    2012-01-01

    Agent-based models (ABM) are an increasingly important research tool for describing and predicting interactions among humans and their environment. A key challenge for such models is the ability to faithfully represent human decision making with respect to observed behaviour. This thesis aims to address this challenge by developing a methodology for empirical measurement and simulation of decision making in humanenvironment systems. The methodology employs the Beliefs-Desires-I...

  13. Emotion-affected decision making in human simulation.

    Science.gov (United States)

    Zhao, Y; Kang, J; Wright, D K

    2006-01-01

    Human modelling is an interdisciplinary research field. The topic, emotion-affected decision making, was originally a cognitive psychology issue, but is now recognized as an important research direction for both computer science and biomedical modelling. The main aim of this paper is to attempt to bridge the gap between psychology and bioengineering in emotion-affected decision making. The work is based on Ortony's theory of emotions and bounded rationality theory, and attempts to connect the emotion process with decision making. A computational emotion model is proposed, and the initial framework of this model in virtual human simulation within the platform of Virtools is presented.

  14. Life Written in Bytes . The Superinformacional and New Technologies Company : Will the End of Privacy and Human Dignity ?

    Directory of Open Access Journals (Sweden)

    Cleide Aparecida Gomes Rodrigues Fermentão

    2015-12-01

    Full Text Available Recent technologies have changed the way media of the human being, which shall establish direct contact with many people anywhere in the world. Allied to this fact, there is a virtualization increasing the human person, culminating in an immersion in the virtual world, which ultimately creates an increasing dependence on technology in order to exist socially. This transformation in the world of concepts makes the virtual pass to have direct impact in the real world. Attracted by the glitter and glamor of virtual network, the person finds no limits to their self-promotion. The private life is increasingly exposed to an undetermined number of people. So the person who is exposed in the virtual media in search of acceptance, forgets that it is not only stripping of his clothes or his privacy, but mainly is stripped of his dignity. The frantic search for some "tanned" finds no limit on common sense, coisificando the person and transforming it into mere virtual profile. The human person is in this state, the total lack of dignity, without realizing it, it becomes an object on display. The internet is a stage conducive to the spectacle of the self virtual, making it fertile ground for the indignity. The history of civilization dating back to fighting and winning the dignity of the human person, however, the time in which we live watch a reverse movement. Contemporaneously it is no longer the state or private to be constant threat to human dignity. Those who, seduced by the possibility of becoming the personality of the time, voluntarily abdicate their dignity in a process whose reversibility is questionable. The legislation can not keep up the speed of the transformations occurred in the virtual world and this mismatch can leave unprotected person especially in relation to their rights to intimacy, privacy and human dignity itself.

  15. I am not that interesting. Social media, privacy literacy, and the interplay between knowledge and experience

    OpenAIRE

    Rundhovde, Heidi Molvik

    2013-01-01

    Sharing of personal information on the Internet has become increasingly popular. In social media interactions users face a trade-off between the pleasure and usefulness of sharing and the need to protect their privacy. This study employs recent theory in the research area Human-Computer interaction to investigate users' privacy decisions on the social networking service Facebook from a holistic view, including aspects like emotions, dialectics, and social and temporal context. The purpose is ...

  16. Where is the harm in a privacy violation : Calculating the damages afforded in privacy cases by the European Court of Human Rights

    NARCIS (Netherlands)

    van der Sloot, Bart

    2017-01-01

    It has always been difficult to pinpoint what harm follows a privacy violation. What harm is done by someone entering your home without permission, or by the state eavesdropping on a telephone conversation when no property is stolen or information disclosed to third parties? The question is becoming

  17. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  18. Emotion-affected decision making in human simulation

    OpenAIRE

    Zhao, Y; Kang, J; Wright, D K

    2006-01-01

    Human modelling is an interdisciplinary research field. The topic, emotion-affected decision making, was originally a cognitive psychology issue, but is now recognized as an important research direction for both computer science and biomedical modelling. The main aim of this paper is to attempt to bridge the gap between psychology and bioengineering in emotion-affected decision making. The work is based on Ortony's theory of emotions and bounded rationality theory, and attempts to connect the...

  19. Metabolic state alters economic decision making under risk in humans.

    Directory of Open Access Journals (Sweden)

    Mkael Symmonds

    2010-06-01

    Full Text Available Animals' attitudes to risk are profoundly influenced by metabolic state (hunger and baseline energy stores. Specifically, animals often express a preference for risky (more variable food sources when below a metabolic reference point (hungry, and safe (less variable food sources when sated. Circulating hormones report the status of energy reserves and acute nutrient intake to widespread targets in the central nervous system that regulate feeding behaviour, including brain regions strongly implicated in risk and reward based decision-making in humans. Despite this, physiological influences per se have not been considered previously to influence economic decisions in humans. We hypothesised that baseline metabolic reserves and alterations in metabolic state would systematically modulate decision-making and financial risk-taking in humans.We used a controlled feeding manipulation and assayed decision-making preferences across different metabolic states following a meal. To elicit risk-preference, we presented a sequence of 200 paired lotteries, subjects' task being to select their preferred option from each pair. We also measured prandial suppression of circulating acyl-ghrelin (a centrally-acting orexigenic hormone signalling acute nutrient intake, and circulating leptin levels (providing an assay of energy reserves. We show both immediate and delayed effects on risky decision-making following a meal, and that these changes correlate with an individual's baseline leptin and changes in acyl-ghrelin levels respectively.We show that human risk preferences are exquisitely sensitive to current metabolic state, in a direction consistent with ecological models of feeding behaviour but not predicted by normative economic theory. These substantive effects of state changes on economic decisions perhaps reflect shared evolutionarily conserved neurobiological mechanisms. We suggest that this sensitivity in human risk-preference to current metabolic state has

  20. Accommodating complexity and human behaviors in decision analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Siirola, John Daniel; Schoenwald, David Alan; Strip, David R.; Hirsch, Gary B.; Bastian, Mark S.; Braithwaite, Karl R.; Homer, Jack [Homer Consulting

    2007-11-01

    This is the final report for a LDRD effort to address human behavior in decision support systems. One sister LDRD effort reports the extension of this work to include actual human choices and additional simulation analyses. Another provides the background for this effort and the programmatic directions for future work. This specific effort considered the feasibility of five aspects of model development required for analysis viability. To avoid the use of classified information, healthcare decisions and the system embedding them became the illustrative example for assessment.

  1. Human Decision Processes: Implications for SSA Support Tools

    Science.gov (United States)

    Picciano, P.

    2013-09-01

    Despite significant advances in computing power and artificial intelligence (AI), few critical decisions are made without a human decision maker in the loop. Space Situational Awareness (SSA) missions are both critical and complex, typically adhering to the human-in-the-loop (HITL) model. The collection of human operators injects a needed diversity of expert knowledge, experience, and authority required to successfully fulfill SSA tasking. A wealth of literature on human decision making exists citing myriad empirical studies and offering a varied set of prescriptive and descriptive models of judgment and decision making (Hastie & Dawes, 2001; Baron, 2000). Many findings have been proven sufficiently robust to allow information architects or system/interface designers to take action to improve decision processes. For the purpose of discussion, these concepts are bifurcated in two groups: 1) vulnerabilities to mitigate, and 2) capabilities to augment. These vulnerabilities and capabilities refer specifically to the decision process and should not be confused with a shortcoming or skill of a specific human operator. Thus the framing of questions and orders, the automated tools with which to collaborate, priming and contextual data, and the delivery of information all play a critical role in human judgment and choice. Evaluating the merits of any decision can be elusive; in order to constrain this discussion, ‘rational choice' will tend toward the economic model characteristics such as maximizing utility and selection consistency (e.g., if A preferred to B, and B preferred to C, than A should be preferred to C). Simple decision models often encourage one to list the pros and cons of a decision, perhaps use a weighting schema, but one way or another weigh the future benefit (or harm) of making a selection. The result (sought by the rationalist models) should drive toward higher utility. Despite notable differences in researchers' theses (to be discussed in the full

  2. Neural mechanisms underlying human consensus decision-making.

    Science.gov (United States)

    Suzuki, Shinsuke; Adachi, Ryo; Dunne, Simon; Bossaerts, Peter; O'Doherty, John P

    2015-04-22

    Consensus building in a group is a hallmark of animal societies, yet little is known about its underlying computational and neural mechanisms. Here, we applied a computational framework to behavioral and fMRI data from human participants performing a consensus decision-making task with up to five other participants. We found that participants reached consensus decisions through integrating their own preferences with information about the majority group members' prior choices, as well as inferences about how much each option was stuck to by the other people. These distinct decision variables were separately encoded in distinct brain areas-the ventromedial prefrontal cortex, posterior superior temporal sulcus/temporoparietal junction, and intraparietal sulcus-and were integrated in the dorsal anterior cingulate cortex. Our findings provide support for a theoretical account in which collective decisions are made through integrating multiple types of inference about oneself, others, and environments, processed in distinct brain modules. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. The human factor: behavioral and neural correlates of humanized perception in moral decision making.

    Science.gov (United States)

    Majdandžić, Jasminka; Bauer, Herbert; Windischberger, Christian; Moser, Ewald; Engl, Elisabeth; Lamm, Claus

    2012-01-01

    The extent to which people regard others as full-blown individuals with mental states ("humanization") seems crucial for their prosocial motivation towards them. Previous research has shown that decisions about moral dilemmas in which one person can be sacrificed to save multiple others do not consistently follow utilitarian principles. We hypothesized that this behavior can be explained by the potential victim's perceived humanness and an ensuing increase in vicarious emotions and emotional conflict during decision making. Using fMRI, we assessed neural activity underlying moral decisions that affected fictitious persons that had or had not been experimentally humanized. In implicit priming trials, participants either engaged in mentalizing about these persons (Humanized condition) or not (Neutral condition). In subsequent moral dilemmas, participants had to decide about sacrificing these persons' lives in order to save the lives of numerous others. Humanized persons were sacrificed less often, and the activation pattern during decisions about them indicated increased negative affect, emotional conflict, vicarious emotions, and behavioral control (pgACC/mOFC, anterior insula/IFG, aMCC and precuneus/PCC). Besides, we found enhanced effective connectivity between aMCC and anterior insula, which suggests increased emotion regulation during decisions affecting humanized victims. These findings highlight the importance of others' perceived humanness for prosocial behavior - with aversive affect and other-related concern when imagining harming more "human-like" persons acting against purely utilitarian decisions.

  4. The human factor: behavioral and neural correlates of humanized perception in moral decision making.

    Directory of Open Access Journals (Sweden)

    Jasminka Majdandžić

    Full Text Available The extent to which people regard others as full-blown individuals with mental states ("humanization" seems crucial for their prosocial motivation towards them. Previous research has shown that decisions about moral dilemmas in which one person can be sacrificed to save multiple others do not consistently follow utilitarian principles. We hypothesized that this behavior can be explained by the potential victim's perceived humanness and an ensuing increase in vicarious emotions and emotional conflict during decision making. Using fMRI, we assessed neural activity underlying moral decisions that affected fictitious persons that had or had not been experimentally humanized. In implicit priming trials, participants either engaged in mentalizing about these persons (Humanized condition or not (Neutral condition. In subsequent moral dilemmas, participants had to decide about sacrificing these persons' lives in order to save the lives of numerous others. Humanized persons were sacrificed less often, and the activation pattern during decisions about them indicated increased negative affect, emotional conflict, vicarious emotions, and behavioral control (pgACC/mOFC, anterior insula/IFG, aMCC and precuneus/PCC. Besides, we found enhanced effective connectivity between aMCC and anterior insula, which suggests increased emotion regulation during decisions affecting humanized victims. These findings highlight the importance of others' perceived humanness for prosocial behavior - with aversive affect and other-related concern when imagining harming more "human-like" persons acting against purely utilitarian decisions.

  5. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  6. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    analysis. The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based on systems' measured features. The trust attributes that were developed describe the level systems for support awareness and transparency, and how they follow general and domain-specific regulations and laws. The monitoring component of the architecture offers dynamic feedback concerning how the system enforces the polices of DS. The privacy management architecture developed in this study enables the DS to dynamically manage information privacy in ubiquitous health and to define individual policies for all systems considering their trust value and corresponding attributes. The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. Although the architecture is targeted to ubiquitous health, it can easily be modified to other ubiquitous applications.

  7. The Human Factor: Behavioral and Neural Correlates of Humanized Perception in Moral Decision Making

    Science.gov (United States)

    Majdandžić, Jasminka; Bauer, Herbert; Windischberger, Christian; Moser, Ewald; Engl, Elisabeth; Lamm, Claus

    2012-01-01

    The extent to which people regard others as full-blown individuals with mental states (“humanization”) seems crucial for their prosocial motivation towards them. Previous research has shown that decisions about moral dilemmas in which one person can be sacrificed to save multiple others do not consistently follow utilitarian principles. We hypothesized that this behavior can be explained by the potential victim’s perceived humanness and an ensuing increase in vicarious emotions and emotional conflict during decision making. Using fMRI, we assessed neural activity underlying moral decisions that affected fictitious persons that had or had not been experimentally humanized. In implicit priming trials, participants either engaged in mentalizing about these persons (Humanized condition) or not (Neutral condition). In subsequent moral dilemmas, participants had to decide about sacrificing these persons’ lives in order to save the lives of numerous others. Humanized persons were sacrificed less often, and the activation pattern during decisions about them indicated increased negative affect, emotional conflict, vicarious emotions, and behavioral control (pgACC/mOFC, anterior insula/IFG, aMCC and precuneus/PCC). Besides, we found enhanced effective connectivity between aMCC and anterior insula, which suggests increased emotion regulation during decisions affecting humanized victims. These findings highlight the importance of others’ perceived humanness for prosocial behavior - with aversive affect and other-related concern when imagining harming more “human-like” persons acting against purely utilitarian decisions. PMID:23082194

  8. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  9. Management and Decisions in the Structures of Human Activities

    Directory of Open Access Journals (Sweden)

    Tadeusz Galanc

    2017-01-01

    Full Text Available This article has been devoted to the key dimensions of decision-making. The main goal of the authors was to point out the role and effect of invariants of nature, logic and conceptual systems of science and management, which are extremely important in decision-making processes. The research hypothesis has been tested that the complexity of decision-making and management are determined by the state of reality (Nature. This hypothesis is related to the fact that in science there is currently no uniform methodology associated with decision-making, just as science is not methodologically uniform. One can even doubt whether it is possible to describe the essential dimensions of decisions undertaken by Man, as discussed in this article. These problems are not a novelty to science, since they have been analysed by many scientists in the past. The authors of the article present the complexity and diversity of concepts defining systems of decision-making and management, based on selected fields of knowledge which are generally relevant to this issue, in particular fields associated with ontology and epistemology. Therefore, the text refers broadly to investigating the reality of basic areas of human knowledge and the overlapping relationships between them. This applies to the so-called circle of the sciences proposed and examined by the psychologist J. Piaget. An additional aim of the authors was to create a text presenting contemporary human knowledge about the reality which surrounds us. To understand reality means to be in relative equilibrium with it. (original abstract

  10. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  11. Incorporating BDI Agents into Human-Agent Decision Making Research

    Science.gov (United States)

    Kamphorst, Bart; van Wissen, Arlette; Dignum, Virginia

    Artificial agents, people, institutes and societies all have the ability to make decisions. Decision making as a research area therefore involves a broad spectrum of sciences, ranging from Artificial Intelligence to economics to psychology. The Colored Trails (CT) framework is designed to aid researchers in all fields in examining decision making processes. It is developed both to study interaction between multiple actors (humans or software agents) in a dynamic environment, and to study and model the decision making of these actors. However, agents in the current implementation of CT lack the explanatory power to help understand the reasoning processes involved in decision making. The BDI paradigm that has been proposed in the agent research area to describe rational agents, enables the specification of agents that reason in abstract concepts such as beliefs, goals, plans and events. In this paper, we present CTAPL: an extension to CT that allows BDI software agents that are written in the practical agent programming language 2APL to reason about and interact with a CT environment.

  12. Selective attention increases choice certainty in human decision making.

    Science.gov (United States)

    Zizlsperger, Leopold; Sauvigny, Thomas; Haarmeier, Thomas

    2012-01-01

    Choice certainty is a probabilistic estimate of past performance and expected outcome. In perceptual decisions the degree of confidence correlates closely with choice accuracy and reaction times, suggesting an intimate relationship to objective performance. Here we show that spatial and feature-based attention increase human subjects' certainty more than accuracy in visual motion discrimination tasks. Our findings demonstrate for the first time a dissociation of choice accuracy and certainty with a significantly stronger influence of voluntary top-down attention on subjective performance measures than on objective performance. These results reveal a so far unknown mechanism of the selection process implemented by attention and suggest a unique biological valence of choice certainty beyond a faithful reflection of the decision process.

  13. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Science.gov (United States)

    2010-07-01

    ...) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...-347) directs agencies to conduct reviews of how privacy issues are considered when purchasing or... a PIA to effectively address privacy factors. Guidance is provided at http://www.doncio.navy.mil. (f...

  14. Privacy Impact Assessment for the Medical and Research Study Records of Human Volunteers

    Science.gov (United States)

    The Medical & Research Study Records of Human Volunteers System collects demographic and medical information on subjects who participate in research. Learn how this data is collected, used, access to the data, and the purpose of data collection.

  15. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  16. The Hidden Human Rights Curriculum of Surveillance Cameras in Schools: Due Process, Privacy and Trust

    Science.gov (United States)

    Perry-Hazan, Lotem; Birnhack, Michael

    2018-01-01

    This article explores how school principals integrate Closed Circuit TV systems (CCTVs) in educational practices and analyses the pedagogical implications of these practices through the lens of human rights. Drawing on interviews with school principals and municipality officials, we found that schools use CCTVs for three main purposes: (1)…

  17. Use of Human Reliability Insights to Improve Decision-Making

    International Nuclear Information System (INIS)

    Julius, J. A.; Moieni, P.; Grobbelaar, J.; Kohlhepp, K.

    2016-01-01

    This paper describes the use of insights obtained during the development and application of human reliability analysis (HRA) as part of a probabilistic risk assessment (PRA) to support decision-making, including improvements to operations, training, and safety culture. Insights have been gained from the development and application of HRA as part of a PRA for nuclear power plants in the USA, Europe and Asia over the last two decades. These models consist of Level 1 and Level 2 PRA models of internal and external events, during full power and shutdown modes of plant operation. These insights include the use of human factors information to improve the qualitative portion of the HRA. The subsequent quantification in the HRA effectively prioritises the contributors to the unreliability of operator actions, and the process facilitates the identification of the factors that are important to the success of the operator actions. Additionally, the tools and techniques also allow for the evaluation of key assumptions and sources of uncertainty. The end results have been used to effectively support decision-making for day-to-day plant operations as well as licensing issues. HRA results have been used to provide feedback and improvements to plant procedures, operator training and other areas contributing the plant safety culture. Examples of the types of insights are presented in this paper. (author)

  18. Privacy in Sensor-Driven Human Data Collection: A Guide for Practitioners

    OpenAIRE

    Stopczynski, Arkadiusz; Pietri, Riccardo; Pentland, Alex; Lazer, David; Lehmann, Sune

    2014-01-01

    In recent years, the amount of information collected about human beings has increased dramatically. This development has been partially driven by individuals posting and storing data about themselves and friends using online social networks or collecting their data for self-tracking purposes (quantified-self movement). Across the sciences, researchers conduct studies collecting data with an unprecedented resolution and scale. Using computational power combined with mathematical models, such r...

  19. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  20. Privacy proof in the cloud

    NARCIS (Netherlands)

    Jessen, Veerle; Weigand, Hans; Mouratidis, Haris

    Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go `into the cloud' or to `stay inside'

  1. The Human Factor: Behavioral and Neural Correlates of Humanized Perception in Moral Decision Making

    OpenAIRE

    Majdandžić, Jasminka; Bauer, Herbert; Windischberger, Christian; Moser, Ewald; Engl, Elisabeth; Lamm, Claus

    2012-01-01

    The extent to which people regard others as full-blown individuals with mental states ("humanization") seems crucial for their prosocial motivation towards them. Previous research has shown that decisions about moral dilemmas in which one person can be sacrificed to save multiple others do not consistently follow utilitarian principles. We hypothesized that this behavior can be explained by the potential victim's perceived humanness and an ensuing increase in vicarious emotions and emotional ...

  2. Mandatory Submission to The Identification of Genetic Profile for Criminal Purpose: A Broach Pursuant to the Right to Privacy and Dignity of the Human Person

    Directory of Open Access Journals (Sweden)

    George Maia Santos

    2015-12-01

    Full Text Available This article aims to demonstrate that the mandatory submission convicted of a crime committed, intentionally, with serious violence against person or heinous crime, to identify the genetic profile by DNA extraction - deoxyribonucleic acid, although by proper and painless technique is offensive to fundamental rights. For this purpose, it is part of the overall concept of the right to privacy, which is configured as a negative right or protection against unlawful state mismanagement, in order to protect a need or a basic right to the free individual self-determination. Then genetic intimacy is defined as an asset able to reveal the physical, psychological, behavioral and disease features, which, if disclosed or accessed without the consent of the accused, may generate stigmatization and discrimination of the subject involved, violating in this way, therefore, the right to privacy. In conclusion, we move towards emphasizing besides the right to privacy, compulsory provision of biological material to identify the genetic profile is offensive to fundamental rights to physical liberty or outpatient; physical integrity; to the freedom of religion or conscience; non-discrimination; the silence and non-production of evidences against himself, and in last instance, the biggest vector of all fundamental rights: the dignity of the human person.

  3. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  4. Governance Through Privacy, Fairness, and Respect for Individuals.

    Science.gov (United States)

    Baker, Dixie B; Kaye, Jane; Terry, Sharon F

    2016-01-01

    Individuals have a moral claim to be involved in the governance of their personal data. Individuals' rights include privacy, autonomy, and the ability to choose for themselves how they want to manage risk, consistent with their own personal values and life situations. The Fair Information Practices principles (FIPPs) offer a framework for governance. Privacy-enhancing technology that complies with applicable law and FIPPs offers a dynamic governance tool for enabling the fair and open use of individual's personal data. Any governance model must protect against the risks posed by data misuse. Individual perceptions of risks are a subjective function involving individuals' values toward self, family, and society, their perceptions of trust, and their cognitive decision-making skills. Individual privacy protections and individuals' right to choose are codified in the HIPAA Privacy Rule, which attempts to strike a balance between the dual goals of information flow and privacy protection. The choices most commonly given individuals regarding the use of their health information are binary ("yes" or "no") and immutable. Recent federal recommendations and law recognize the need for granular, dynamic choices. Individuals expect that they will govern the use of their own health and genomic data. Failure to build and maintain individuals' trust increases the likelihood that they will refuse to grant permission to access or use their data. The "no surprises principle" asserts that an individual's personal information should never be collected, used, transmitted, or disclosed in a way that would surprise the individual were she to learn about it. The FIPPs provide a powerful framework for enabling data sharing and use, while maintaining trust. We introduce the eight FIPPs adopted by the Department of Health and Human Services, and provide examples of their interpretation and implementation. Privacy risk and health risk can be reduced by giving consumers control, autonomy, and

  5. Designing Human-Centered Systems for Reflective Decision Making

    NARCIS (Netherlands)

    Pommeranz, A.

    2012-01-01

    Taking major life decisions, e.g. what career to follow, is difficult and sometimes emotional. One has to find out what exactly one wants, consider the long-term consequences of the decisions and be empathetic for loved ones affected by the decisions. Decision making also deals with establishing and

  6. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  7. 77 FR 18247 - Request for Comments on Issues of Privacy and Access With Regard to Human Genome Sequence Data

    Science.gov (United States)

    2012-03-27

    ... regards genomic information and evolving notions of privacy, as evidenced and influenced by social media... Presidential Commission for the Study of Bioethical Issues is requesting public comment on the ethical issues.... Undertaking these duties, the Commission seeks to identify and examine specific bioethical, legal, and social...

  8. Envisioning a Future Decision Support System for Requirements Engineering : A Holistic and Human-centred Perspective

    OpenAIRE

    Alenljung, Beatrice

    2008-01-01

    Complex decision-making is a prominent aspect of requirements engineering (RE) and the need for improved decision support for RE decision-makers has been identified by a number of authors in the research literature. The fundamental viewpoint that permeates this thesis is that RE decision-making can be substantially improved by RE decision support systems (REDSS) based on the actual needs of RE decision-makers as well as the actual generic human decision-making activities that take place in th...

  9. Rethinking the Privacy Calculus: On the Role of Dispositional Factors and Affect

    OpenAIRE

    Kehr, Flavius; Wentzel, Daniel; Mayer, Peter

    2013-01-01

    Existing research on information privacy has mostly relied on the privacy calculus model which views privacy-related decision making as a rational process where individuals weigh the anticipated risks of disclosing personal data against the potential benefits. However, scholars have recently challenged two basic propositions of the privacy calculus model. First, some authors have distinguished between general and situational factors in the context of privacy calculus and have argued that ...

  10. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  11. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  12. Decision making in a human population living sustainably.

    Science.gov (United States)

    Hicks, John S; Burgman, Mark A; Marewski, Julian N; Fidler, Fiona; Gigerenzer, Gerd

    2012-10-01

    The Tiwi people of northern Australia have managed natural resources continuously for 6000-8000 years. Tiwi management objectives and outcomes may reflect how they gather information about the environment. We qualitatively analyzed Tiwi documents and management techniques to examine the relation between the social and physical environment of decision makers and their decision-making strategies. We hypothesized that principles of bounded rationality, namely, the use of efficient rules to navigate complex decision problems, explain how Tiwi managers use simple decision strategies (i.e., heuristics) to make robust decisions. Tiwi natural resource managers reduced complexity in decision making through a process that gathers incomplete and uncertain information to quickly guide decisions toward effective outcomes. They used management feedback to validate decisions through an information loop that resulted in long-term sustainability of environmental use. We examined the Tiwi decision-making processes relative to management of barramundi (Lates calcarifer) fisheries and contrasted their management with the state government's management of barramundi. Decisions that enhanced the status of individual people and their attainment of aspiration levels resulted in reliable resource availability for Tiwi consumers. Different decision processes adopted by the state for management of barramundi may not secure similarly sustainable outcomes. ©2012 Society for Conservation Biology.

  13. Posterior Probability Matching and Human Perceptual Decision Making.

    Directory of Open Access Journals (Sweden)

    Richard F Murray

    2015-06-01

    Full Text Available Probability matching is a classic theory of decision making that was first developed in models of cognition. Posterior probability matching, a variant in which observers match their response probabilities to the posterior probability of each response being correct, is being used increasingly often in models of perception. However, little is known about whether posterior probability matching is consistent with the vast literature on vision and hearing that has developed within signal detection theory. Here we test posterior probability matching models using two tools from detection theory. First, we examine the models' performance in a two-pass experiment, where each block of trials is presented twice, and we measure the proportion of times that the model gives the same response twice to repeated stimuli. We show that at low performance levels, posterior probability matching models give highly inconsistent responses across repeated presentations of identical trials. We find that practised human observers are more consistent across repeated trials than these models predict, and we find some evidence that less practised observers more consistent as well. Second, we compare the performance of posterior probability matching models on a discrimination task to the performance of a theoretical ideal observer that achieves the best possible performance. We find that posterior probability matching is very inefficient at low-to-moderate performance levels, and that human observers can be more efficient than is ever possible according to posterior probability matching models. These findings support classic signal detection models, and rule out a broad class of posterior probability matching models for expert performance on perceptual tasks that range in complexity from contrast discrimination to symmetry detection. However, our findings leave open the possibility that inexperienced observers may show posterior probability matching behaviour, and our methods

  14. Resources, attractiveness, family commitment; reproductive decisions in human mate choice.

    Science.gov (United States)

    Bereczkei, T; Voros, S; Gal, A; Bernath, L

    1997-08-01

    This study of reproductive decisions in human mate selection used data from "lonely hearts" advertisements to examine a series of predictions based on the mate preferences of male and females relating to age; physical appearance; financial condition and socioeconomic status; family commitment and personal traits; short- and long-term mating; and marital status and preexisting children. The sample consisted of 1000 personal advertisements (500 male) placed in two daily, national papers between February and October 1994 in Hungary. The research procedure included a pilot study of 150 advertisers (75 male) to refine the categories examined. Analysis was performed using 1) a matrix with one axis referring to offers and the other to demands of males and females separately; 2) a matrix of offers only to derive correlated traits of claims by males and females; and 3) a matrix with columns describing sex, offers, demands, advertiser's age, and required age and a row for each of the 1000 samples. It was found that men preferred younger mates, while women preferred older ones. Men were more likely to seek physical attractiveness, while women were more likely to seek financial resources (ranked 7th) and high status (ranked 6th). Women strongly preferred male domestic virtue and family commitment, and twice as many women as men demanded long-term relationships. Women more frequently declared preexisting children, and men exhibited a reluctance to accept these children. Both males and females employed "trade-off" strategies, making greater demands if they felt they had attractive offers.

  15. Explicable Planning and Replanning for Human-in-the-loop Decision Support

    Data.gov (United States)

    National Aeronautics and Space Administration — For the decision support scenarios that are particularly relevant to NASA, such as planning for human space missions, human operators will need a system that can (i)...

  16. Data Fusion Research of Triaxial Human Body Motion Gesture based on Decision Tree

    Directory of Open Access Journals (Sweden)

    Feihong Zhou

    2014-05-01

    Full Text Available The development status of human body motion gesture data fusion domestic and overseas has been analyzed. A triaxial accelerometer is adopted to develop a wearable human body motion gesture monitoring system aimed at old people healthcare. On the basis of a brief introduction of decision tree algorithm, the WEKA workbench is adopted to generate a human body motion gesture decision tree. At last, the classification quality of the decision tree has been validated through experiments. The experimental results show that the decision tree algorithm could reach an average predicting accuracy of 97.5 % with lower time cost.

  17. Monitoring Employee Behavior Through the Use of Technology and Issues of Employee Privacy in America

    Directory of Open Access Journals (Sweden)

    Mahmoud Moussa

    2015-04-01

    Full Text Available Despite the historic American love for privacy that has enhanced innovation and creativity throughout the country, encroachments on privacy restrain individual freedom. Noticeable, advances in technology have offered decision makers remarkable monitoring aptitudes that can be used in numerous tasks for multiple reasons. This has led scholars and practitioners to pose a significant number of questions about what is legitimate and illegitimate in the day-to-day affairs of a business. This article is composed of (a research about electronic monitoring and privacy concerns; (b definitions of, critiques of, and alternatives to electronic performance monitoring (EPM; (c motives behind employee monitoring and leadership behaviors; (d advice that makes monitoring less distressful; (e employee monitoring policies; (f reviewing policies and procedures; (g the role of human resource development (HRD in employee assessment and development; and (h conclusion and recommendations for further studies.

  18. A dataset of human decision-making in teamwork management

    Science.gov (United States)

    Yu, Han; Shen, Zhiqi; Miao, Chunyan; Leung, Cyril; Chen, Yiqiang; Fauvel, Simon; Lin, Jun; Cui, Lizhen; Pan, Zhengxiang; Yang, Qiang

    2017-01-01

    Today, most endeavours require teamwork by people with diverse skills and characteristics. In managing teamwork, decisions are often made under uncertainty and resource constraints. The strategies and the effectiveness of the strategies different people adopt to manage teamwork under different situations have not yet been fully explored, partially due to a lack of detailed large-scale data. In this paper, we describe a multi-faceted large-scale dataset to bridge this gap. It is derived from a game simulating complex project management processes. It presents the participants with different conditions in terms of team members' capabilities and task characteristics for them to exhibit their decision-making strategies. The dataset contains detailed data reflecting the decision situations, decision strategies, decision outcomes, and the emotional responses of 1,144 participants from diverse backgrounds. To our knowledge, this is the first dataset simultaneously covering these four facets of decision-making. With repeated measurements, the dataset may help establish baseline variability of decision-making in teamwork management, leading to more realistic decision theoretic models and more effective decision support approaches.

  19. 45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.

    Science.gov (United States)

    2010-10-01

    ... privacy standards. 164.534 Section 164.534 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...

  20. Human aspects in software architecture decision making : a literature review

    NARCIS (Netherlands)

    Tang, A.; Razavian, M.; Paech, Barbara; Hesse, T.M.

    2017-01-01

    Despite past efforts, we have little understanding and limited research efforts on how architects make decisions in the real-world settings. It seems that software architecture researchers make implicit assumption that decision making by software architects can be a rational and prescribed process.

  1. Interpretation and Analysis of Privacy Policies of Websites in India

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2016-01-01

    the conditions specified in the policy document. So, ideally the privacy policies should be readable and provide sufficient information to empower users to make knowledgeable decisions. Thus, we have examined more than 50 privacy policies and discussed the content analysis in this paper. We discovered...... on information collection methods, purpose, sharing entities names and data transit. In this study, the 11 % privacy policies are compliance with privacy standards which denotes other privacy policies are less committed to support transparency, choice, and accountability in the process of information collection...... that the policies are not only unstructured but also described in complicated language. Our analysis shows that the user data security measures are nonspecific and unsatisfactory in 57% privacy policies. In spite of huge amount of information collection, the privacy policies does not have clear description...

  2. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user......’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal data. However, scant attention has been paid on a virtue ethics approach of information privacy. Plotinus’ discussion of self......-determination is related to ethical virtue, human freedom and intellectual autonomy. The Plotinian virtue ethics approach of self-determination is not primarily related to the sphere of moral action, but to the quality of the self prior to moral practice. In this paper, it is argued that the problem of information privacy...

  3. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  4. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  5. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  6. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  7. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  8. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  9. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  10. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  11. Decision Support System Development for Human Extravehicular Activity

    Data.gov (United States)

    National Aeronautics and Space Administration — The extension of human presence into deep space will depend on how successfully human planetary extravehicular activities (EVAs) are conducted without real-time...

  12. Social cobots: Anticipatory decision-making for collaborative robots incorporating unexpected human behaviors

    CSIR Research Space (South Africa)

    Can Görür, O

    2018-03-01

    Full Text Available We propose an architecture as a robot’s decision-making mechanism to anticipate a human’s state of mind, and so plan accordingly during a human-robot collaboration task. At the core of the architecture lies a novel stochastic decision...

  13. How awareness changes the relative weights of evidence during human decision-making

    NARCIS (Netherlands)

    de Lange, F.P.; van Gaal, S.; Lamme, V.A.F.; Dehaene, S.

    2011-01-01

    Human decisions are based on accumulating evidence over time for different options. Here we ask a simple question: How is the accumulation of evidence affected by the level of awareness of the information? We examined the influence of awareness on decision-making using combined behavioral methods

  14. Rational behavior in decision making. A comparison between humans, computers and fast and frugal strategies

    NARCIS (Netherlands)

    Snijders, C.C.P.

    2007-01-01

    Rational behavior in decision making. A comparison between humans, computers, and fast and frugal strategies Chris Snijders and Frits Tazelaar (Eindhoven University of Technology, The Netherlands) Real life decisions often have to be made in "noisy" circumstances: not all crucial information is

  15. Privacy Challenges of Genomic Big Data.

    Science.gov (United States)

    Shen, Hong; Ma, Jian

    2017-01-01

    With the rapid advancement of high-throughput DNA sequencing technologies, genomics has become a big data discipline where large-scale genetic information of human individuals can be obtained efficiently with low cost. However, such massive amount of personal genomic data creates tremendous challenge for privacy, especially given the emergence of direct-to-consumer (DTC) industry that provides genetic testing services. Here we review the recent development in genomic big data and its implications on privacy. We also discuss the current dilemmas and future challenges of genomic privacy.

  16. Blood rights: the body and information privacy.

    Science.gov (United States)

    Alston, Bruce

    2005-05-01

    Genetic and other medical technology makes blood, human tissue and other bodily samples an immediate and accessible source of comprehensive personal and health information about individuals. Yet, unlike medical records, bodily samples are not subject to effective privacy protection or other regulation to ensure that individuals have rights to control the collection, use and transfer of such samples. This article examines the existing coverage of privacy legislation, arguments in favour of baseline protection for bodily samples as sources of information and possible approaches to new regulation protecting individual privacy rights in bodily samples.

  17. Decision-making in the inductive mode : The role of human behavior

    OpenAIRE

    Nobel, Johan

    2013-01-01

    Economists have convulsively maintained the assumption that humans are able to arrive at decisions by perfect deductive rationality, despite the fact empirical evidences are showing otherwise. The contradicting evidences have resulted in a personal view that instead of finding a unified theory about decision-making, a sound approach would be to study how humans in fact are reasoning in specific contexts. The context of interest for this paper is where it could be assumed humans’ persistence o...

  18. The Insertion of Human Factors Concerns into NextGen Programmatic Decisions

    Science.gov (United States)

    Beard, Bettina L.; Holbrook, Jon Brian; Seely, Rachel

    2013-01-01

    Since the costs of proposed improvements in air traffic management exceed available funding, FAA decision makers must select and prioritize what actually gets implemented. We discuss a set of methods to help forecast operational and human performance issues and benefits before new automation is introduced. This strategy could minimize the impact of politics, assist decision makers in selecting and prioritizing potential improvements, make the process more transparent and strengthen the link between the engineering and human factors domains.

  19. Factor Of Vendor Selection And Employees’ Morale Towards Human Resource Outsourcing Decision In Organization

    Directory of Open Access Journals (Sweden)

    Hiean Tan Kok

    2018-01-01

    Full Text Available The purpose of this study is to investigate factor of vendor selection and employees’ morale towards human resource outsourcing decision in organization. Study was conducted in Melaka within private organizations. Questionnaire was distributed and only 60 respondents were collected back. Data analysis was perform using SPSS version 21. Findings shows that employee’s morale show high significant relationship (r=0.761, p <0.05 with human resource outsourcing decision. Limitation and conclusion were discussed in this study.

  20. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future.

  1. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  2. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  3. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  4. Evidence Accumulation and Choice Maintenance Are Dissociated in Human Perceptual Decision Making.

    Directory of Open Access Journals (Sweden)

    Mads Lund Pedersen

    Full Text Available Perceptual decision making in monkeys relies on decision neurons, which accumulate evidence and maintain choices until a response is given. In humans, several brain regions have been proposed to accumulate evidence, but it is unknown if these regions also maintain choices. To test if accumulator regions in humans also maintain decisions we compared delayed and self-paced responses during a face/house discrimination decision making task. Computational modeling and fMRI results revealed dissociated processes of evidence accumulation and decision maintenance, with potential accumulator activations found in the dorsomedial prefrontal cortex, right inferior frontal gyrus and bilateral insula. Potential maintenance activation spanned the frontal pole, temporal gyri, precuneus and the lateral occipital and frontal orbital cortices. Results of a quantitative reverse inference meta-analysis performed to differentiate the functions associated with the identified regions did not narrow down potential accumulation regions, but suggested that response-maintenance might rely on a verbalization of the response.

  5. A Case Study on Differential Privacy

    OpenAIRE

    Asseffa, Samrawit; Seleshi, Bihil

    2017-01-01

    Throughout the ages, human beings prefer to keep most things secret and brand this overall state with the title of privacy. Like most significant terms, privacy tends to create controversy regarding the extent of its flexible boundaries, since various technological advancements are slowly leaching away the power people have over their own information. Even as cell phone brands release new upgrades, the ways in which information is communicated has drastically increased, in turn facilitating t...

  6. Valuating Privacy with Option Pricing Theory

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer

    One of the key challenges in the information society is responsible handling of personal data. An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today. This chapter builds an analogy to financial options and draws on principles of option pricing to account for this uncertainty in the valuation of privacy. For this purpose, the development of a data subject's personal attributes over time and the development of the attribute distribution in the population are modeled as two stochastic processes, which fit into the Binomial Option Pricing Model (BOPM). Possible applications of such valuation methods to guide decision support in future privacy-enhancing technologies (PETs) are sketched.

  7. Respecting an Individual's Privacy Critical in Making Difficult Journalistic Judgments.

    Science.gov (United States)

    Adams, Julian

    1984-01-01

    Discusses the criteria of "newsworthy" regarding news reporting and the right to privacy. Examines the thin line between what is legal and what is ethical to print and some components of the law to consider when making such decisions. (HTH)

  8. Framework for Human Health Risk Assessment to Inform Decision Making

    Science.gov (United States)

    The purpose of this document is to describe a Framework for conducting human health risk assessments that are responsive to the needs of decision‐making processes in the U.S. Environmental Protection Agency (EPA).

  9. A naturalistic decision making model for simulated human combatants

    International Nuclear Information System (INIS)

    HUNTER, KEITH O.; HART, WILLIAM E.; FORSYTHE, JAMES C.

    2000-01-01

    The authors describe a naturalistic behavioral model for the simulation of small unit combat. This model, Klein's recognition-primed decision making (RPD) model, is driven by situational awareness rather than a rational process of selecting from a set of action options. They argue that simulated combatants modeled with RPD will have more flexible and realistic responses to a broad range of small-scale combat scenarios. Furthermore, they note that the predictability of a simulation using an RPD framework can be easily controlled to provide multiple evaluations of a given combat scenario. Finally, they discuss computational issues for building an RPD-based behavior engine for fully automated combatants in small conflict scenarios, which are being investigated within Sandia's Next Generation Site Security project

  10. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  11. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  12. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  13. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  14. [Human body meridian spatial decision support system for clinical treatment and teaching of acupuncture and moxibustion].

    Science.gov (United States)

    Wu, Dehua

    2016-01-01

    The spatial position and distribution of human body meridian are expressed limitedly in the decision support system (DSS) of acupuncture and moxibustion at present, which leads to the failure to give the effective quantitative analysis on the spatial range and the difficulty for the decision-maker to provide a realistic spatial decision environment. Focusing on the limit spatial expression in DSS of acupuncture and moxibustion, it was proposed that on the basis of the geographic information system, in association of DSS technology, the design idea was developed on the human body meridian spatial DSS. With the 4-layer service-oriented architecture adopted, the data center integrated development platform was taken as the system development environment. The hierarchical organization was done for the spatial data of human body meridian via the directory tree. The structured query language (SQL) server was used to achieve the unified management of spatial data and attribute data. The technologies of architecture, configuration and plug-in development model were integrated to achieve the data inquiry, buffer analysis and program evaluation of the human body meridian spatial DSS. The research results show that the human body meridian spatial DSS could reflect realistically the spatial characteristics of the spatial position and distribution of human body meridian and met the constantly changeable demand of users. It has the powerful spatial analysis function and assists with the scientific decision in clinical treatment and teaching of acupuncture and moxibustion. It is the new attempt to the informatization research of human body meridian.

  15. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  16. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  17. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  18. Better decision making in complex, dynamic tasks training with human-facilitated interactive learning environments

    CERN Document Server

    Qudrat-Ullah, Hassan

    2015-01-01

    This book describes interactive learning environments (ILEs) and their underlying concepts. It explains how ILEs can be used to improve the decision-making process and how these improvements can be empirically verified. The objective of this book is to enhance our understanding of and to gain insights into the process by which human facilitated ILEs are effectively designed and used in improving users’ decision making in complex, dynamic tasks. This book is divided into four major parts. Part I serves as an introduction to the importance and complexity of decision making in dynamic tasks. Part II provides background material, drawing upon relevant literature, for the development of an integrated process model on the effectiveness of human facilitated ILEs in improving decision making in dynamic tasks. Part III focuses on the design, development, and application of FishBankILE in laboratory experiments to gather empirical evidence for the validity of the process model. Finally, part IV presents a comprehensi...

  19. Heuristic and optimal policy computations in the human brain during sequential decision-making.

    Science.gov (United States)

    Korn, Christoph W; Bach, Dominik R

    2018-01-23

    Optimal decisions across extended time horizons require value calculations over multiple probabilistic future states. Humans may circumvent such complex computations by resorting to easy-to-compute heuristics that approximate optimal solutions. To probe the potential interplay between heuristic and optimal computations, we develop a novel sequential decision-making task, framed as virtual foraging in which participants have to avoid virtual starvation. Rewards depend only on final outcomes over five-trial blocks, necessitating planning over five sequential decisions and probabilistic outcomes. Here, we report model comparisons demonstrating that participants primarily rely on the best available heuristic but also use the normatively optimal policy. FMRI signals in medial prefrontal cortex (MPFC) relate to heuristic and optimal policies and associated choice uncertainties. Crucially, reaction times and dorsal MPFC activity scale with discrepancies between heuristic and optimal policies. Thus, sequential decision-making in humans may emerge from integration between heuristic and optimal policies, implemented by controllers in MPFC.

  20. Temporal characteristics of the influence of punishment on perceptual decision making in the human brain

    OpenAIRE

    Blank, H.; Guido, B.; Heekeren, H.R.; Philiastides, M.G.

    2013-01-01

    Perceptual decision making is the process by which information from sensory systems is combined and used to influence our behavior. In addition to the sensory input, this process can be affected by other factors, such as reward and punishment for correct and incorrect responses. To investigate the temporal dynamics of how monetary punishment influences perceptual decision making in humans, we collected electroencephalography (EEG) data during a perceptual categorization task whereby the punis...

  1. Value encoding in single neurons in the human amygdala during decision making.

    Science.gov (United States)

    Jenison, Rick L; Rangel, Antonio; Oya, Hiroyuki; Kawasaki, Hiroto; Howard, Matthew A

    2011-01-05

    A growing consensus suggests that the brain makes simple choices by assigning values to the stimuli under consideration and then comparing these values to make a decision. However, the network involved in computing the values has not yet been fully characterized. Here, we investigated whether the human amygdala plays a role in the computation of stimulus values at the time of decision making. We recorded single neuron activity from the amygdala of awake patients while they made simple purchase decisions over food items. We found 16 amygdala neurons, located primarily in the basolateral nucleus that responded linearly to the values assigned to individual items.

  2. Reasoning, learning, and creativity: frontal lobe function and human decision-making.

    Directory of Open Access Journals (Sweden)

    Anne Collins

    Full Text Available The frontal lobes subserve decision-making and executive control--that is, the selection and coordination of goal-directed behaviors. Current models of frontal executive function, however, do not explain human decision-making in everyday environments featuring uncertain, changing, and especially open-ended situations. Here, we propose a computational model of human executive function that clarifies this issue. Using behavioral experiments, we show that unlike others, the proposed model predicts human decisions and their variations across individuals in naturalistic situations. The model reveals that for driving action, the human frontal function monitors up to three/four concurrent behavioral strategies and infers online their ability to predict action outcomes: whenever one appears more reliable than unreliable, this strategy is chosen to guide the selection and learning of actions that maximize rewards. Otherwise, a new behavioral strategy is tentatively formed, partly from those stored in long-term memory, then probed, and if competitive confirmed to subsequently drive action. Thus, the human executive function has a monitoring capacity limited to three or four behavioral strategies. This limitation is compensated by the binary structure of executive control that in ambiguous and unknown situations promotes the exploration and creation of new behavioral strategies. The results support a model of human frontal function that integrates reasoning, learning, and creative abilities in the service of decision-making and adaptive behavior.

  3. Reasoning, learning, and creativity: frontal lobe function and human decision-making.

    Science.gov (United States)

    Collins, Anne; Koechlin, Etienne

    2012-01-01

    The frontal lobes subserve decision-making and executive control--that is, the selection and coordination of goal-directed behaviors. Current models of frontal executive function, however, do not explain human decision-making in everyday environments featuring uncertain, changing, and especially open-ended situations. Here, we propose a computational model of human executive function that clarifies this issue. Using behavioral experiments, we show that unlike others, the proposed model predicts human decisions and their variations across individuals in naturalistic situations. The model reveals that for driving action, the human frontal function monitors up to three/four concurrent behavioral strategies and infers online their ability to predict action outcomes: whenever one appears more reliable than unreliable, this strategy is chosen to guide the selection and learning of actions that maximize rewards. Otherwise, a new behavioral strategy is tentatively formed, partly from those stored in long-term memory, then probed, and if competitive confirmed to subsequently drive action. Thus, the human executive function has a monitoring capacity limited to three or four behavioral strategies. This limitation is compensated by the binary structure of executive control that in ambiguous and unknown situations promotes the exploration and creation of new behavioral strategies. The results support a model of human frontal function that integrates reasoning, learning, and creative abilities in the service of decision-making and adaptive behavior.

  4. Post-event human decision errors: operator action tree/time reliability correlation

    Energy Technology Data Exchange (ETDEWEB)

    Hall, R E; Fragola, J; Wreathall, J

    1982-11-01

    This report documents an interim framework for the quantification of the probability of errors of decision on the part of nuclear power plant operators after the initiation of an accident. The framework can easily be incorporated into an event tree/fault tree analysis. The method presented consists of a structure called the operator action tree and a time reliability correlation which assumes the time available for making a decision to be the dominating factor in situations requiring cognitive human response. This limited approach decreases the magnitude and complexity of the decision modeling task. Specifically, in the past, some human performance models have attempted prediction by trying to emulate sequences of human actions, or by identifying and modeling the information processing approach applicable to the task. The model developed here is directed at describing the statistical performance of a representative group of hypothetical individuals responding to generalized situations.

  5. Post-event human decision errors: operator action tree/time reliability correlation

    International Nuclear Information System (INIS)

    Hall, R.E.; Fragola, J.; Wreathall, J.

    1982-11-01

    This report documents an interim framework for the quantification of the probability of errors of decision on the part of nuclear power plant operators after the initiation of an accident. The framework can easily be incorporated into an event tree/fault tree analysis. The method presented consists of a structure called the operator action tree and a time reliability correlation which assumes the time available for making a decision to be the dominating factor in situations requiring cognitive human response. This limited approach decreases the magnitude and complexity of the decision modeling task. Specifically, in the past, some human performance models have attempted prediction by trying to emulate sequences of human actions, or by identifying and modeling the information processing approach applicable to the task. The model developed here is directed at describing the statistical performance of a representative group of hypothetical individuals responding to generalized situations

  6. MoCog1: A computer simulation of recognition-primed human decision making

    Science.gov (United States)

    Gevarter, William B.

    1991-01-01

    The results of the first stage of a research effort to develop a 'sophisticated' computer model of human cognitive behavior are described. Most human decision making is an experience-based, relatively straight-forward, largely automatic response to internal goals and drives, utilizing cues and opportunities perceived from the current environment. The development of the architecture and computer program (MoCog1) associated with such 'recognition-primed' decision making is discussed. The resultant computer program was successfully utilized as a vehicle to simulate earlier findings that relate how an individual's implicit theories orient the individual toward particular goals, with resultant cognitions, affects, and behavior in response to their environment.

  7. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  8. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  9. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  10. Human monitoring and decision-making in man/machine systems

    International Nuclear Information System (INIS)

    Johannsen, G.

    1979-01-01

    Monitoring and decision-making together are very well characterizing the role of the human operator in highly automated systems. In this report, the analysis of human monitoring and decision-making behavior as well as its modeling are described. The goal is to present a survey. 'Classic' and optimal control theoretic monitoring models are dealt with. The relationship between attention allocation and eye movements is discussed. As an example for applications, the evaluation of predictor displays by means of the optimal control model is explained. Fault detection in continuous signals and decision-making behavior of the human operator in fault diagnosis during different operation and maintenance situations are illustrated. The computer-aided decision-making is considered as a queueing problem. It is shown to what extent computer-aiding may be based on the state of human activity as measured by psychophysiological quantities. Finally, management information systems for different application areas are mentioned. As an appendix, the report includes an English-written paper in which the possibilities of mathematical modeling of human behavior in complex man-machine systems are critically assessed. (orig.) 891 GL/orig. 892 MKO [de

  11. Privacy in Digital Age: Dead or Alive?! Regarding the New EU Data Protection Regulations

    Directory of Open Access Journals (Sweden)

    Seyed Ebrahim Dorraji

    2015-02-01

    Full Text Available Purpose – To review and critically discuss the current state of privacy in the context of constant technological changes and to emphasize the pace of technological advancements and developments reached over the time when the last EU data protection laws came into effect. These facts inevitably affect the perception of privacy and raise the question of whether privacy is dead or takes the last breath in the digital age? This paper is an attempt to address this question.Design/Methodology/Approach – Based on the comparison and systematic analysis of scientific literature, the authors discuss problematic issues related to privacy and data protection in the technology era – where these issues are too complicated to be clearly regulated by laws and rules since “laws move as a function of years and technology moves as a function of months” (Ron Rivest. Therefore, this analytical approach towards the issue may help to facilitate reaching the best-fit decision in this area.Findings – The authors emphasize the change of perception of privacy, which originated and grew on the idea of “an integral part of our humanity”, the “heart of our liberty” and “the beginning of all freedoms” (Solove, 2008, leading to the recently raised idea that privacy is severely hanging with threat. The authors are of the opinion that legislation and regulation may be one of the best and effective techniques for protecting privacy in the twenty-first century, but it is not currently adequate (Wacks, 2012. One of the solutions lies in technology design.Research limitations/implications – The aspects of privacy and data protection in the European Union have been widely discussed recently because of their broad applicability. Therefore, it is hardly possible to review and cover all the important aspects of the issue. This article focuses on the roles of technology and legislation in securing privacy. The authors examine and provide their own views based on

  12. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  13. Control use of data to protect privacy.

    Science.gov (United States)

    Landau, Susan

    2015-01-30

    Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy principle in a different era, makes little sense in situations where collection consists of lots and lots of small amounts of information, whereas consent is no longer realistic, given the complexity and number of decisions that must be made. Thus, efforts to protect privacy by controlling use of data are gaining more attention. I discuss relevant technology, policy, and law, as well as some examples that can illuminate the way. Copyright © 2015, American Association for the Advancement of Science.

  14. 76 FR 72325 - Privacy Act; Exempt Record System

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES 45 CFR Part 5b RIN 0906-AA91 Privacy Act; Exempt Record... are guaranteed access to, and correction rights for, substantive information reported to the NPDB. The procedures, appearing in 45 CFR part 60, use the Privacy Act access and correction procedures as a basic...

  15. 78 FR 69076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-18

    ... Medical Human Resources System internet (DMHRSi). DHA 12 EDHA 12 Third Party Collection System. DHA 16 DoD... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0216] Privacy Act of 1974... Defense Health Agency's compilation of Privacy Act SORNS. The realignment of the nineteen system...

  16. 77 FR 48984 - Privacy Act of 1974; System of Records Notice

    Science.gov (United States)

    2012-08-15

    ... Privacy Act systems, to facilitate their ability to respond to data security breach incidents (see OMB... DEPARTMENT OF HEALTH AND HUMAN SERVICES Privacy Act of 1974; System of Records Notice AGENCY...: In accordance with the requirements of the Privacy Act of 1974, HHS gives notice of a proposed...

  17. Human Cognitive Limitations. Broad, Consistent, Clinical Application of Physiological Principles Will Require Decision Support.

    Science.gov (United States)

    Morris, Alan H

    2018-02-01

    Our education system seems to fail to enable clinicians to broadly understand core physiological principles. The emphasis on reductionist science, including "omics" branches of research, has likely contributed to this decrease in understanding. Consequently, clinicians cannot be expected to consistently make clinical decisions linked to best physiological evidence. This is a large-scale problem with multiple determinants, within an even larger clinical decision problem: the failure of clinicians to consistently link their decisions to best evidence. Clinicians, like all human decision-makers, suffer from significant cognitive limitations. Detailed context-sensitive computer protocols can generate personalized medicine instructions that are well matched to individual patient needs over time and can partially resolve this problem.

  18. Frames, Biases, and Rational Decision-Making in the Human Brain

    OpenAIRE

    De Martino, Benedetto; Kumaran, Dharshan; Seymour, Ben; Dolan, Raymond J.

    2006-01-01

    Human choices are remarkably susceptible to the manner in which options are presented. This so-called “framing effect” represents a striking violation of standard economic accounts of human rationality, although its underlying neurobiology is not understood. We found that the framing effect was specifically associated with amygdala activity, suggesting a key role for an emotional system in mediating decision biases. Moreover, across individuals, orbital and medial prefrontal cortex activity p...

  19. Frames, biases, and rational decision-making in the human brain

    OpenAIRE

    De Martino, B.; Kumaran, D.; Seymour, B.; Dolan, R. J.

    2006-01-01

    Human choices are remarkably susceptible to the manner in which options are presented. This so-called "framing effect" represents a striking violation of standard economic accounts of human rationality, although its underlying neurobiology is not understood. We found that the framing effect was specifically associated with amygdala activity, suggesting a key role for an emotional system in mediating decision biases. Moreover, across individuals, orbital and medial prefrontal cortex activity p...

  20. Educational Pluralism and Freedom of Religion: Recent Decisions of the European Court of Human Rights

    Science.gov (United States)

    Relano, Eugenia

    2010-01-01

    This paper addresses the sensitive issue of the teaching of religions and beliefs in schools by analysing two recent decisions of the European Court of Human Rights. In these cases, the Court asserts that students should be exempted from compulsory courses on religion or from courses that are not conveyed in an objective, critical and pluralist…

  1. Proceedings of the eighth European annual conference on human decision making and manual control

    International Nuclear Information System (INIS)

    Lind, M.; Hollnagel, E.

    1989-01-01

    The papers contributed at the eighth European annual conference on human decision making and manual control cover the subject areas of vehicle control, robotics, modeling, operator support and cognitive engineering, artificial intelligence and neural network. Some of the papers are relevant to power plant control and in this respect to nuclear safety. (AB)

  2. The roles of dopamine and serotonin in decision making: evidence from pharmacological experiments in humans.

    Science.gov (United States)

    Rogers, Robert D

    2011-01-01

    Neurophysiological experiments in primates, alongside neuropsychological and functional magnetic resonance investigations in humans, have significantly enhanced our understanding of the neural architecture of decision making. In this review, I consider the more limited database of experiments that have investigated how dopamine and serotonin activity influences the choices of human adults. These include those experiments that have involved the administration of drugs to healthy controls, experiments that have tested genotypic influences upon dopamine and serotonin function, and, finally, some of those experiments that have examined the effects of drugs on the decision making of clinical samples. Pharmacological experiments in humans are few in number and face considerable methodological challenges in terms of drug specificity, uncertainties about pre- vs post-synaptic modes of action, and interactions with baseline cognitive performance. However, the available data are broadly consistent with current computational models of dopamine function in decision making and highlight the dissociable roles of dopamine receptor systems in the learning about outcomes that underpins value-based decision making. Moreover, genotypic influences on (interacting) prefrontal and striatal dopamine activity are associated with changes in choice behavior that might be relevant to understanding exploratory behaviors and vulnerability to addictive disorders. Manipulations of serotonin in laboratory tests of decision making in human participants have provided less consistent results, but the information gathered to date indicates a role for serotonin in learning about bad decision outcomes, non-normative aspects of risk-seeking behavior, and social choices involving affiliation and notions of fairness. Finally, I suggest that the role played by serotonin in the regulation of cognitive biases, and representation of context in learning, point toward a role in the cortically mediated cognitive

  3. Cyber Espionage in the International and Costa Rican Law: A Form of Violation of the Human Right to Privacy

    Directory of Open Access Journals (Sweden)

    Jonathan Masís Solís

    2016-08-01

    Full Text Available Cybercrime is a dangerous consequence of the evolution of information technology. This is how it is conceptualized the issues addressed in this paper. As a methodology, it is discussed and analysed published articles, Costa Rican law, and international regulations concerning cybercrime –such as the Convention on Cybercrime of 2001–, and introduce case law connected to the topic. In this paper, cyber espionage is viewed as an example of the way in which cybercrime jeopardizes and radically affects the human and fundamental right to intimacy. Finally, it is presented a number of conclusions in which it is underscored the importance of international cooperation for the investigation and punishment of cybercrime, as well as to locate the offenders. It is also suggested that it is crucial that due process is respected in the phase of investigation, as well as the human rights of the persons involved.

  4. The Models of Applying Online Privacy Literacy Strategies: A Case Study of Instagram Girl Users

    OpenAIRE

    Abdollah Bicharanlou; Seyedeh farzaneh Siasi rad

    2017-01-01

    Social networks affect remarkably in the lives of virtual space users. These networks like most human relations involve compromising between self-disclosure and privacy protection. A process which is realized through improving privacy and empowering the user at the personal level. This study aimed to assess strategies based on online privacy literacy. In particular, strategies that Instagram young girls users should employ to achieve the optimum level of privacy. For this purpose, firstly the...

  5. Cyberbullying: Should Schools choose between Safety and Privacy?

    Directory of Open Access Journals (Sweden)

    Michael Laubscher

    2015-12-01

    Full Text Available In this theoretical article, we explore the tangled messiness of the application of human rights versus the 21st-century monster called "cyberbullying" in schools and focus on some of the challenges schools face daily. The research will reveal that cyberbullying victims were almost twice as likely to attempt suicide as youth who had not experienced cyberbullying, which implies that this is a phenomenon schools ought not to take lightly. We argue that everyone has a right to the freedom of expression, including in cyberspace, and begin by exploring how legal principles evolved in an attempt to deal with the limitations placed on an individual's right to freedom of expression. As we are about to reveal, though, matters become even more complicated when this freedom of expression relates to cyberspace, a space where users might have an expectation of privacy and even enjoy a state of anonymity. Clearly, the right to privacy and the right to freedom of expression need to be balanced and respected should school authorities be called upon to identify and discipline a cyberbully. This balancing act is one that needs to be investigated and carefully expounded upon, and is an issue that has not yet been sufficiently addressed in South Africa. Seeing that countries such as the United States of America and Canada have attempted to deal with this issue, it would be prudent to discuss the strides these countries have made, the challenges they have faced, and the insights they have gained, in an attempt to alert South Africa to the complex issues cyberbullying could raise. Working from this premise, this article will focus on the right to privacy, specifically in relation to Bill C-13 recently passed in Canada and the resultant Canadian Supreme Court decision in the case R v Spencer, a case that shed further light on the issue of privacy in cyberspace. We conclude the discussion by highlighting several potential pitfalls legislation such as Bill C-13 could

  6. Influence of biases in numerical magnitude allocation on human prosocial decision making.

    Science.gov (United States)

    Arshad, Qadeer; Nigmatullina, Yuliya; Siddiqui, Shuaib; Franka, Mustafa; Mediratta, Saniya; Ramachandaran, Sanjeev; Lobo, Rhannon; Malhotra, Paresh A; Roberts, R E; Bronstein, Adolfo M

    2017-12-01

    Over the past decade neuroscientific research has attempted to probe the neurobiological underpinnings of human prosocial decision making. Such research has almost ubiquitously employed tasks such as the dictator game or similar variations (i.e., ultimatum game). Considering the explicit numerical nature of such tasks, it is surprising that the influence of numerical cognition on decision making during task performance remains unknown. While performing these tasks, participants typically tend to anchor on a 50:50 split that necessitates an explicit numerical judgement (i.e., number-pair bisection). Accordingly, we hypothesize that the decision-making process during the dictator game recruits overlapping cognitive processes to those known to be engaged during number-pair bisection. We observed that biases in numerical magnitude allocation correlated with the formulation of decisions during the dictator game. That is, intrinsic biases toward smaller numerical magnitudes were associated with the formulation of less favorable decisions, whereas biases toward larger magnitudes were associated with more favorable choices. We proceeded to corroborate this relationship by subliminally and systematically inducing biases in numerical magnitude toward either higher or lower numbers using a visuo-vestibular stimulation paradigm. Such subliminal alterations in numerical magnitude allocation led to proportional and corresponding changes to an individual's decision making during the dictator game. Critically, no relationship was observed between neither intrinsic nor induced biases in numerical magnitude on decision making when assessed using a nonnumerical-based prosocial questionnaire. Our findings demonstrate numerical influences on decisions formulated during the dictator game and highlight the necessity to control for confounds associated with numerical cognition in human decision-making paradigms. NEW & NOTEWORTHY We demonstrate that intrinsic biases in numerical magnitude

  7. Decision making under explicit risk is impaired in individuals with human immunodeficiency virus (HIV).

    Science.gov (United States)

    Fujiwara, Esther; Tomlinson, Sara E; Purdon, Scot E; Gill, M John; Power, Christopher

    2015-01-01

    Human immunodeficiency virus (HIV) can affect the frontal-striatal brain regions, which are known to subserve decision-making functions. Previous studies have reported impaired decision making among HIV+ individuals using the Iowa Gambling Task, a task that assesses decision making under ambiguity. Previous study populations often had significant comorbidities such as past or present substance use disorders and/or hepatitis C virus coinfection, complicating conclusions about the unique contributions of HIV-infection to decision making. Decision making under explicit risk has very rarely been examined in HIV+ individuals and was tested here using the Game of Dice Task (GDT). We examined decision making under explicit risk in the GDT in 20 HIV+ individuals without substance use disorder or HCV coinfection, including a demographically matched healthy control group (n = 20). Groups were characterized on a standard neuropsychological test battery. For the HIV+ group, several disease-related parameters (viral load, current and nadir CD4 T-cell count) were included. Analyses focused on the GDT and spanned between-group (t-tests; analysis of covariance, ANCOVA) as well as within-group comparisons (Pearson/Spearman correlations). HIV+ individuals were impaired in the GDT, compared to healthy controls (p = .02). Their decision-making impairments were characterized by less advantageous choices and more random choice strategies, especially towards the end of the task. Deficits in the GDT in the HIV+ group were related to executive dysfunctions, slowed processing/motor speed, and current immune system status (CD4+ T-cell levels, ps Decision making under explicit risk in the GDT can occur in HIV-infected individuals without comorbidities. The correlational patterns may point to underlying fronto-subcortical dysfunctions in HIV+ individuals. The GDT provides a useful measure to assess risky decision making in this population and should be tested in larger studies.

  8. Exercising privacy rights in medical science.

    Science.gov (United States)

    Hillmer, Michael; Redelmeier, Donald A

    2007-12-04

    Privacy laws are intended to preserve human well-being and improve medical outcomes. We used the Sportstats website, a repository of competitive athletic data, to test how easily these laws can be circumvented. We designed a haphazard, unrepresentative case-series analysis and applied unscientific methods based on an Internet connection and idle time. We found it both feasible and titillating to breach anonymity, stockpile personal information and generate misquotations. We extended our methods to snoop on celebrities, link to outside databases and uncover refusal to participate. Throughout our study, we evaded capture and public humiliation despite violating these 6 privacy fundamentals. We suggest that the legitimate principle of safeguarding personal privacy is undermined by the natural human tendency toward showing off.

  9. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  10. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  11. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  12. The Role of Intuition in Risk/Benefit Decision-Making in Human Subjects Research.

    Science.gov (United States)

    Resnik, David B

    2017-01-01

    One of the key principles of ethical research involving human subjects is that the risks of research to should be acceptable in relation to expected benefits. Institutional review board (IRB) members often rely on intuition to make risk/benefit decisions concerning proposed human studies. Some have objected to using intuition to make these decisions because intuition is unreliable and biased and lacks transparency. In this article, I examine the role of intuition in IRB risk/benefit decision-making and argue that there are practical and philosophical limits to our ability to reduce our reliance on intuition in this process. The fact that IRB risk/benefit decision-making involves intuition need not imply that it is hopelessly subjective or biased, however, since there are strategies that IRBs can employ to improve their decisions, such as using empirical data to estimate the probability of potential harms and benefits, developing classification systems to guide the evaluation of harms and benefits, and engaging in moral reasoning concerning the acceptability of risks.

  13. Treatment of human-computer interface in a decision support system

    International Nuclear Information System (INIS)

    Heger, A.S.; Duran, F.A.; Cox, R.G.

    1992-01-01

    One of the most challenging applications facing the computer community is development of effective adaptive human-computer interface. This challenge stems from the complex nature of the human part of this symbiosis. The application of this discipline to the environmental restoration and waste management is further complicated due to the nature of environmental data. The information that is required to manage environmental impacts of human activity is fundamentally complex. This paper will discuss the efforts at Sandia National Laboratories in developing the adaptive conceptual model manager within the constraint of the environmental decision-making. A computer workstation, that hosts the Conceptual Model Manager and the Sandia Environmental Decision Support System will also be discussed

  14. Development of Human-level Decision Making Algorithm for NPPs through Deep Neural Networks : Conceptual Approach

    International Nuclear Information System (INIS)

    Kim, Seung Geun; Seong, Poong Hyun

    2017-01-01

    Development of operation support systems and automation systems are closely related to machine learning field. However, since it is hard to achieve human-level delicacy and flexibility for complex tasks with conventional machine learning technologies, only operation support systems with simple purposes were developed and high-level automation related studies were not actively conducted. As one of the efforts for reducing human error in NPPs and technical advance toward automation, the ultimate goal of this research is to develop human-level decision making algorithm for NPPs during emergency situations. The concepts of SL, RL, policy network, value network, and MCTS, which were applied to decision making algorithm for other fields are introduced and combined with nuclear field specifications. Since the research is currently at the conceptual stage, more research is warranted.

  15. Frames, biases, and rational decision-making in the human brain.

    Science.gov (United States)

    De Martino, Benedetto; Kumaran, Dharshan; Seymour, Ben; Dolan, Raymond J

    2006-08-04

    Human choices are remarkably susceptible to the manner in which options are presented. This so-called "framing effect" represents a striking violation of standard economic accounts of human rationality, although its underlying neurobiology is not understood. We found that the framing effect was specifically associated with amygdala activity, suggesting a key role for an emotional system in mediating decision biases. Moreover, across individuals, orbital and medial prefrontal cortex activity predicted a reduced susceptibility to the framing effect. This finding highlights the importance of incorporating emotional processes within models of human choice and suggests how the brain may modulate the effect of these biasing influences to approximate rationality.

  16. Privacy and security in the digital age: Contemporary ethical challenges and future directions

    DEFF Research Database (Denmark)

    Hiranandani, Vanmala Sunder

    2011-01-01

    Privacy is at the core of civil rights from which all other human rights and freedoms flow. Since the twentieth century, and particularly since 9/11, rapid deployment of information and surveillance technologies in the name of national security has grave implications for individual privacy...... and human rights. This article reviews major strands in contemporary privacy-security debate, while critiquing existing conceptualisations of privacy that are inadequate in the context of multifaceted and ubiquitous surveillance technologies post 9/11. Further, this paper contends most privacy...

  17. BORDERS OF COMMUNICATION PRIVACY IN SLOVENIAN CRIMINAL PROCEDURE – CONSTITUTIONAL CHALLENGES

    Directory of Open Access Journals (Sweden)

    Sabina Zgaga

    2015-01-01

    Full Text Available Due to fast technological development and our constant communication protection of communication privacy in every aspect of our (legal life has become more important than ever before. Regarding protection of privacy in criminal procedure special emphasis should be given to the regulation of privacy in Slovenian Constitution and its interpretation in the case law of the Constitutional Court. This paper presents the definition of privacy and communication privacy in Slovenian constitutional law and exposes the main issues of communication privacy that have been discussed in the case law of the Constitutional Court in the last twenty years. Thereby the paper tries to show the general trend in the case law of Constitutional Court regarding the protection of communication privacy and to expose certain unsolved issues and unanswered challenges. Slovenian constitutional regulation of communication privacy is very protective, considering the broad definition of privacy and the strict conditions for encroachment of communication privacy. The case law of Slovenian Constitutional Court has also shown such trend, with the possible exception of the recent decision on a dynamic IP address. The importance of this decision is however significant, since it could be applicable to all forms of communication via internet, the prevailing form of communication nowadays. Certain challenges still lay ahead, such as the current proposal for the amendment of Criminal Procedure Act-M, which includes the use of IMSI catchers and numerous unanswered issues regarding data retention after the decisive annulment of its partial legal basis by the Constitutional Court.

  18. Opioid Modulation of Value-Based Decision-Making in Healthy Humans.

    Science.gov (United States)

    Eikemo, Marie; Biele, Guido; Willoch, Frode; Thomsen, Lotte; Leknes, Siri

    2017-08-01

    Modifying behavior to maximize reward is integral to adaptive decision-making. In rodents, the μ-opioid receptor (MOR) system encodes motivation and preference for high-value rewards. Yet it remains unclear whether and how human MORs contribute to value-based decision-making. We reasoned that if the human MOR system modulates value-based choice, this would be reflected by opposite effects of agonist and antagonist drugs. In a double-blind pharmacological cross-over study, 30 healthy men received morphine (10 mg), placebo, and the opioid antagonist naltrexone (50 mg). They completed a two-alternative decision-making task known to induce a considerable bias towards the most frequently rewarded response option. To quantify MOR involvement in this bias, we fitted accuracy and reaction time data with the drift-diffusion model (DDM) of decision-making. The DDM analysis revealed the expected bidirectional drug effects for two decision subprocesses. MOR stimulation with morphine increased the preference for the stimulus with high-reward probability (shift in starting point). Compared to placebo, morphine also increased, and naltrexone reduced, the efficiency of evidence accumulation. Since neither drug affected motor-coordination, speed-accuracy trade-off, or subjective state (indeed participants were still blinded after the third session), we interpret the MOR effects on evidence accumulation efficiency as a consequence of changes in effort exerted in the task. Together, these findings support a role for the human MOR system in value-based choice by tuning decision-making towards high-value rewards across stimulus domains.

  19. Theoretical foundations of human decision-making in agent-based land use models – A review

    NARCIS (Netherlands)

    Groeneveld, Geert J.; Müller, B.; Buchmann, C.M.; Dressler, Gunnar; Guo, C.; Hase, N.; Hoffmann, F.; John, F.; Klassert, C.; Lauf, T.; Liebelt, V.; Nolzen, H.; Pannicke, N.; Schulze, J.; Weise, H.; Schwarz, N.

    2017-01-01

    Recent reviews stated that the complex and context-dependent nature of human decision-making resulted in ad-hoc representations of human decision in agent-based land use change models (LUCC ABMs) and that these representations are often not explicitly grounded in theory. However, a systematic survey

  20. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  1. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  2. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  3. The Different Functions of Speech in Defamation and Privacy Cases.

    Science.gov (United States)

    Kebbel, Gary

    1984-01-01

    Reviews United States Supreme Court decisions since 1900 to show that free speech decisions often rest on the circumstances surrounding the speech. Indicates that freedom of speech wins out over privacy when social or political function but not when personal happiness is the issue.

  4. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  5. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  6. MEDICAL AND LEGAL ISSUES OF THE DECISIONS RENDERED BY THE EUROPEAN COURT OF HUMAN RIGHTS.

    Science.gov (United States)

    Chakhvadze, B; Chakhvadze, G

    2017-01-01

    The European Convention on Human rights is a document that protects human rights and fundamental freedoms of individuals, and the European Court of Human Rights and its case-law makes a convention a powerful instrument to meet the new challenges of modernity and protect the principles of rule of law and democracy. This is important, particularly for young democracies, including Georgia. The more that Georgia is a party to this convention. Article 3 of the convention deals with torture, inhuman and degrading treatment, while article 8 deals with private life, home and correspondence. At the same time, the international practice of the European court of human rights shows that these articles are often used with regard to medical rights. The paper highlights the most recent and interesting cases from the case-law of the ECHR, in which the courts conclusions are based solely on the European Convention on Human Rights. In most instances, the European Court of Human Rights uses the principle of democracy with regard to medical rights. The European court of human rights considers medical rights as moral underpinning rights. Particularly in every occasion, the European Court of Human Rights acknowledges an ethical dimension of these rights. In most instances, it does not matter whether a plaintiff is a free person or prisoner, the European court of human rights make decisions based on fundamental human rights and freedoms of individuals.

  7. The First Flight Decision for New Human Spacecraft Vehicles - A General Approach

    Science.gov (United States)

    Schaible, Dawn M.; Sumrall, John Phillip

    2011-01-01

    Determining when it is safe to fly a crew on a launch vehicle/spacecraft for the first time, especially when the test flight is a part of the overall system certification process, has long been a challenge for program decision makers. The decision on first flight is ultimately the judgment of the program and agency management in conjunction with the design and operations team. To aid in this decision process, a NASA team undertook the task to develop a generic framework for evaluating whether any given program or commercial provider has sufficiently complete and balanced plans in place to allow crewmembers to safely fly on human spaceflight systems for the first time. It was the team s goal to establish a generic framework that could easily be applied to any new system, although the system design and intended mission would require specific assessment. Historical data shows that there are multiple approaches that have been successful in first flight with crew. These approaches have always been tailored to the specific system design, mission objectives, and launch environment. Because specific approaches may vary significantly between different system designs and situations, prescriptive instructions or thorough checklists cannot be provided ahead of time. There are, however, certain general approaches that should be applied in thinking through the decision for first flight. This paper addresses some of the most important factors to consider when developing a new system or evaluating an existing system for whether or not it is safe to fly humans to/from space. In the simplest terms, it is time to fly crew for the first time when it is safe to do so and the benefit of the crewed flight is greater than the residual risk. This is rarely a straight-forward decision. The paper describes the need for experience, sound judgment, close involvement of the technical and management teams, and established decision processes. In addition, the underlying level of confidence the

  8. Predicting judicial decisions of the European Court of Human Rights: a Natural Language Processing perspective

    Directory of Open Access Journals (Sweden)

    Nikolaos Aletras

    2016-10-01

    Full Text Available Recent advances in Natural Language Processing and Machine Learning provide us with the tools to build predictive models that can be used to unveil patterns driving judicial decisions. This can be useful, for both lawyers and judges, as an assisting tool to rapidly identify cases and extract patterns which lead to certain decisions. This paper presents the first systematic study on predicting the outcome of cases tried by the European Court of Human Rights based solely on textual content. We formulate a binary classification task where the input of our classifiers is the textual content extracted from a case and the target output is the actual judgment as to whether there has been a violation of an article of the convention of human rights. Textual information is represented using contiguous word sequences, i.e., N-grams, and topics. Our models can predict the court’s decisions with a strong accuracy (79% on average. Our empirical analysis indicates that the formal facts of a case are the most important predictive factor. This is consistent with the theory of legal realism suggesting that judicial decision-making is significantly affected by the stimulus of the facts. We also observe that the topical content of a case is another important feature in this classification task and explore this relationship further by conducting a qualitative analysis.

  9. Absolutely relative or relatively absolute: violations of value invariance in human decision making.

    Science.gov (United States)

    Teodorescu, Andrei R; Moran, Rani; Usher, Marius

    2016-02-01

    Making decisions based on relative rather than absolute information processing is tied to choice optimality via the accumulation of evidence differences and to canonical neural processing via accumulation of evidence ratios. These theoretical frameworks predict invariance of decision latencies to absolute intensities that maintain differences and ratios, respectively. While information about the absolute values of the choice alternatives is not necessary for choosing the best alternative, it may nevertheless hold valuable information about the context of the decision. To test the sensitivity of human decision making to absolute values, we manipulated the intensities of brightness stimuli pairs while preserving either their differences or their ratios. Although asked to choose the brighter alternative relative to the other, participants responded faster to higher absolute values. Thus, our results provide empirical evidence for human sensitivity to task irrelevant absolute values indicating a hard-wired mechanism that precedes executive control. Computational investigations of several modelling architectures reveal two alternative accounts for this phenomenon, which combine absolute and relative processing. One account involves accumulation of differences with activation dependent processing noise and the other emerges from accumulation of absolute values subject to the temporal dynamics of lateral inhibition. The potential adaptive role of such choice mechanisms is discussed.

  10. HIPPA privacy regulations: practical information for physicians.

    Science.gov (United States)

    McMahon, E B; Lee-Huber, T

    2001-07-01

    After much debate and controversy, the Bush administration announced on April 12, 2001, that it would implement the Health Insurance Portability and Accountability Act (HIPAA) privacy regulations issued by the Clinton administration in December of 2000. The privacy regulations became effective on April 14, 2001. Although the regulations are considered final, the Secretary of the Department of Health and Human Services has the power to modify the regulations at any time during the first year of implementation. These regulations affect how a patient's health information is used and disclosed, as well as how patients are informed of their privacy rights. As "covered entities," physicians have until April 14, 2003, to comply fully with the HIPAA privacy regulations, which are more than 1,500 pages in length. This article presents a basic overview of the new and complex regulations and highlights practical information about physicians' compliance with the regulations. However, this summary of the HIPAA privacy regulations should not be construed as legal advice or an opinion on specific situations. Please consult an attorney concerning your compliance with HIPAA and the regulations promulgated thereunder.

  11. How awareness changes the relative weights of evidence during human decision-making.

    Science.gov (United States)

    de Lange, Floris P; van Gaal, Simon; Lamme, Victor A F; Dehaene, Stanislas

    2011-11-01

    Human decisions are based on accumulating evidence over time for different options. Here we ask a simple question: How is the accumulation of evidence affected by the level of awareness of the information? We examined the influence of awareness on decision-making using combined behavioral methods and magneto-encephalography (MEG). Participants were required to make decisions by accumulating evidence over a series of visually presented arrow stimuli whose visibility was modulated by masking. Behavioral results showed that participants could accumulate evidence under both high and low visibility. However, a top-down strategic modulation of the flow of incoming evidence was only present for stimuli with high visibility: once enough evidence had been accrued, participants strategically reduced the impact of new incoming stimuli. Also, decision-making speed and confidence were strongly modulated by the strength of the evidence for high-visible but not low-visible evidence, even though direct priming effects were identical for both types of stimuli. Neural recordings revealed that, while initial perceptual processing was independent of visibility, there was stronger top-down amplification for stimuli with high visibility than low visibility. Furthermore, neural markers of evidence accumulation over occipito-parietal cortex showed a strategic bias only for highly visible sensory information, speeding up processing and reducing neural computations related to the decision process. Our results indicate that the level of awareness of information changes decision-making: while accumulation of evidence already exists under low visibility conditions, high visibility allows evidence to be accumulated up to a higher level, leading to important strategical top-down changes in decision-making. Our results therefore suggest a potential role of awareness in deploying flexible strategies for biasing information acquisition in line with one's expectations and goals.

  12. How awareness changes the relative weights of evidence during human decision-making.

    Directory of Open Access Journals (Sweden)

    Floris P de Lange

    2011-11-01

    Full Text Available Human decisions are based on accumulating evidence over time for different options. Here we ask a simple question: How is the accumulation of evidence affected by the level of awareness of the information? We examined the influence of awareness on decision-making using combined behavioral methods and magneto-encephalography (MEG. Participants were required to make decisions by accumulating evidence over a series of visually presented arrow stimuli whose visibility was modulated by masking. Behavioral results showed that participants could accumulate evidence under both high and low visibility. However, a top-down strategic modulation of the flow of incoming evidence was only present for stimuli with high visibility: once enough evidence had been accrued, participants strategically reduced the impact of new incoming stimuli. Also, decision-making speed and confidence were strongly modulated by the strength of the evidence for high-visible but not low-visible evidence, even though direct priming effects were identical for both types of stimuli. Neural recordings revealed that, while initial perceptual processing was independent of visibility, there was stronger top-down amplification for stimuli with high visibility than low visibility. Furthermore, neural markers of evidence accumulation over occipito-parietal cortex showed a strategic bias only for highly visible sensory information, speeding up processing and reducing neural computations related to the decision process. Our results indicate that the level of awareness of information changes decision-making: while accumulation of evidence already exists under low visibility conditions, high visibility allows evidence to be accumulated up to a higher level, leading to important strategical top-down changes in decision-making. Our results therefore suggest a potential role of awareness in deploying flexible strategies for biasing information acquisition in line with one's expectations and goals.

  13. Toward a synthesis of cognitive biases: how noisy information processing can bias human decision making.

    Science.gov (United States)

    Hilbert, Martin

    2012-03-01

    A single coherent framework is proposed to synthesize long-standing research on 8 seemingly unrelated cognitive decision-making biases. During the past 6 decades, hundreds of empirical studies have resulted in a variety of rules of thumb that specify how humans systematically deviate from what is normatively expected from their decisions. Several complementary generative mechanisms have been proposed to explain those cognitive biases. Here it is suggested that (at least) 8 of these empirically detected decision-making biases can be produced by simply assuming noisy deviations in the memory-based information processes that convert objective evidence (observations) into subjective estimates (decisions). An integrative framework is presented to show how similar noise-based mechanisms can lead to conservatism, the Bayesian likelihood bias, illusory correlations, biased self-other placement, subadditivity, exaggerated expectation, the confidence bias, and the hard-easy effect. Analytical tools from information theory are used to explore the nature and limitations that characterize such information processes for binary and multiary decision-making exercises. The ensuing synthesis offers formal mathematical definitions of the biases and their underlying generative mechanism, which permits a consolidated analysis of how they are related. This synthesis contributes to the larger goal of creating a coherent picture that explains the relations among the myriad of seemingly unrelated biases and their potential psychological generative mechanisms. Limitations and research questions are discussed.

  14. Cortical Network Dynamics of Perceptual Decision-Making in the Human Brain

    Directory of Open Access Journals (Sweden)

    Markus eSiegel

    2011-02-01

    Full Text Available Goal-directed behavior requires the flexible transformation of sensory evidence about our environment into motor actions. Studies of perceptual decision-making have shown that this transformation is distributed across several widely separated brain regions. Yet, little is known about how decision-making emerges from the dynamic interactions among these regions. Here, we review a series of studies, in which we characterized the cortical network interactions underlying a perceptual decision process in the human brain. We used magnetoencephalography (MEG to measure the large-scale cortical population dynamics underlying each of the sub-processes involved in this decision: the encoding of sensory evidence and action plan, the mapping between the two, and the attentional selection of task-relevant evidence. We found that these sub-processes are mediated by neuronal oscillations within specific frequency ranges. Localized gamma-band oscillations in sensory and motor cortices reflect the encoding of the sensory evidence and motor plan. Large-scale oscillations across widespread cortical networks mediate the integrative processes connecting these local networks: Gamma- and beta-band oscillations across frontal, parietal and sensory cortices serve the selection of relevant sensory evidence and its flexible mapping onto action plans. In sum, our results suggest that perceptual decisions are mediated by oscillatory interactions within overlapping local and large-scale cortical networks.

  15. Human Factors Effecting Forensic Decision Making: Workplace Stress and Well-being.

    Science.gov (United States)

    Jeanguenat, Amy M; Dror, Itiel E

    2018-01-01

    Over the past decade, there has been a growing openness about the importance of human factors in forensic work. However, most of it focused on cognitive bias, and neglected issues of workplace wellness and stress. Forensic scientists work in a dynamic environment that includes common workplace pressures such as workload volume, tight deadlines, lack of advancement, number of working hours, low salary, technology distractions, and fluctuating priorities. However, in addition, forensic scientists also encounter a number of industry-specific pressures, such as technique criticism, repeated exposure to crime scenes or horrific case details, access to funding, working in an adversarial legal system, and zero tolerance for "errors". Thus, stress is an important human factor to mitigate for overall error management, productivity and decision quality (not to mention the well-being of the examiners themselves). Techniques such as mindfulness can become powerful tools to enhance work and decision quality. © 2017 American Academy of Forensic Sciences.

  16. MoCog1: A computer simulation of recognition-primed human decision making, considering emotions

    Science.gov (United States)

    Gevarter, William B.

    1992-01-01

    The successful results of the first stage of a research effort to develop a versatile computer model of motivated human cognitive behavior are reported. Most human decision making appears to be an experience-based, relatively straightforward, largely automatic response to situations, utilizing cues and opportunities perceived from the current environment. The development, considering emotions, of the architecture and computer program associated with such 'recognition-primed' decision-making is described. The resultant computer program (MoCog1) was successfully utilized as a vehicle to simulate earlier findings that relate how an individual's implicit theories orient the individual toward particular goals, with resultant cognitions, affects, and behavior in response to their environment.

  17. Privacy Attitudes among Early Adopters of Emerging Health Technologies.

    Directory of Open Access Journals (Sweden)

    Cynthia Cheung

    Full Text Available Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters.This study sought to understand privacy attitudes of early adopters of emerging health technologies.Transcripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis.Although interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science.Early adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research.

  18. Privacy Attitudes among Early Adopters of Emerging Health Technologies.

    Science.gov (United States)

    Cheung, Cynthia; Bietz, Matthew J; Patrick, Kevin; Bloss, Cinnamon S

    2016-01-01

    Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters. This study sought to understand privacy attitudes of early adopters of emerging health technologies. Transcripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis. Although interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science. Early adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research.

  19. A decision model for the sustainable protection of human rights in Italian Prison System

    Directory of Open Access Journals (Sweden)

    Antonio Maturo

    2014-12-01

    Full Text Available The work starts from an analysis of the critical problems of the prison system in Italy. It aims to develop a decision-making model to address the issue of sustainable protection of human rights in prisons. It shows how, using the Saaty AHP procedure, it is possible to have an analytical reasoning guideline for the understanding of the validity of the various alternative choices, in order to facilitate the situation of the prisoners and their reintegration into society.

  20. Formal Process Modeling to Improve Human Decision-Making in Test and Evaluation Acoustic Range Control

    Science.gov (United States)

    2017-09-01

    MODELING TO IMPROVE HUMAN DECISION-MAKING DURING TEST AND EVALUATION RANGE CONTROL by William Carlson September 2017 Thesis Advisor...the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...MAKING DURING TEST AND EVALUATION RANGE CONTROL 5. FUNDING NUMBERS 6. AUTHOR(S) William Carlson 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES

  1. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    Science.gov (United States)

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  2. A conceptual and computational model of moral decision making in human and artificial agents.

    Science.gov (United States)

    Wallach, Wendell; Franklin, Stan; Allen, Colin

    2010-07-01

    Recently, there has been a resurgence of interest in general, comprehensive models of human cognition. Such models aim to explain higher-order cognitive faculties, such as deliberation and planning. Given a computational representation, the validity of these models can be tested in computer simulations such as software agents or embodied robots. The push to implement computational models of this kind has created the field of artificial general intelligence (AGI). Moral decision making is arguably one of the most challenging tasks for computational approaches to higher-order cognition. The need for increasingly autonomous artificial agents to factor moral considerations into their choices and actions has given rise to another new field of inquiry variously known as Machine Morality, Machine Ethics, Roboethics, or Friendly AI. In this study, we discuss how LIDA, an AGI model of human cognition, can be adapted to model both affective and rational features of moral decision making. Using the LIDA model, we will demonstrate how moral decisions can be made in many domains using the same mechanisms that enable general decision making. Comprehensive models of human cognition typically aim for compatibility with recent research in the cognitive and neural sciences. Global workspace theory, proposed by the neuropsychologist Bernard Baars (1988), is a highly regarded model of human cognition that is currently being computationally instantiated in several software implementations. LIDA (Franklin, Baars, Ramamurthy, & Ventura, 2005) is one such computational implementation. LIDA is both a set of computational tools and an underlying model of human cognition, which provides mechanisms that are capable of explaining how an agent's selection of its next action arises from bottom-up collection of sensory data and top-down processes for making sense of its current situation. We will describe how the LIDA model helps integrate emotions into the human decision-making process, and we

  3. Foundations for Reasoning in Cognition-Based Computational Representations of Human Decision Making; TOPICAL

    International Nuclear Information System (INIS)

    SENGLAUB, MICHAEL E.; HARRIS, DAVID L.; RAYBOURN, ELAINE M.

    2001-01-01

    In exploring the question of how humans reason in ambiguous situations or in the absence of complete information, we stumbled onto a body of knowledge that addresses issues beyond the original scope of our effort. We have begun to understand the importance that philosophy, in particular the work of C. S. Peirce, plays in developing models of human cognition and of information theory in general. We have a foundation that can serve as a basis for further studies in cognition and decision making. Peircean philosophy provides a foundation for understanding human reasoning and capturing behavioral characteristics of decision makers due to cultural, physiological, and psychological effects. The present paper describes this philosophical approach to understanding the underpinnings of human reasoning. We present the work of C. S. Peirce, and define sets of fundamental reasoning behavior that would be captured in the mathematical constructs of these newer technologies and would be able to interact in an agent type framework. Further, we propose the adoption of a hybrid reasoning model based on his work for future computational representations or emulations of human cognition

  4. Trends in control and decision-making for human-robot collaboration systems

    CERN Document Server

    Zhang, Fumin

    2017-01-01

    This book provides an overview of recent research developments in the automation and control of robotic systems that collaborate with humans. A measure of human collaboration being necessary for the optimal operation of any robotic system, the contributors exploit a broad selection of such systems to demonstrate the importance of the subject, particularly where the environment is prone to uncertainty or complexity. They show how such human strengths as high-level decision-making, flexibility, and dexterity can be combined with robotic precision, and ability to perform task repetitively or in a dangerous environment. The book focuses on quantitative methods and control design for guaranteed robot performance and balanced human experience. Its contributions develop and expand upon material presented at various international conferences. They are organized into three parts covering: one-human–one-robot collaboration; one-human–multiple-robot collaboration; and human–swarm collaboration. Individual topic ar...

  5. Policy recommendations for addressing privacy challenges associated with cell-based research and interventions.

    Science.gov (United States)

    Ogbogu, Ubaka; Burningham, Sarah; Ollenberger, Adam; Calder, Kathryn; Du, Li; El Emam, Khaled; Hyde-Lay, Robyn; Isasi, Rosario; Joly, Yann; Kerr, Ian; Malin, Bradley; McDonald, Michael; Penney, Steven; Piat, Gayle; Roy, Denis-Claude; Sugarman, Jeremy; Vercauteren, Suzanne; Verhenneman, Griet; West, Lori; Caulfield, Timothy

    2014-02-03

    The increased use of human biological material for cell-based research and clinical interventions poses risks to the privacy of patients and donors, including the possibility of re-identification of individuals from anonymized cell lines and associated genetic data. These risks will increase as technologies and databases used for re-identification become affordable and more sophisticated. Policies that require ongoing linkage of cell lines to donors' clinical information for research and regulatory purposes, and existing practices that limit research participants' ability to control what is done with their genetic data, amplify the privacy concerns. To date, the privacy issues associated with cell-based research and interventions have not received much attention in the academic and policymaking contexts. This paper, arising out of a multi-disciplinary workshop, aims to rectify this by outlining the issues, proposing novel governance strategies and policy recommendations, and identifying areas where further evidence is required to make sound policy decisions. The authors of this paper take the position that existing rules and norms can be reasonably extended to address privacy risks in this context without compromising emerging developments in the research environment, and that exceptions from such rules should be justified using a case-by-case approach. In developing new policies, the broader framework of regulations governing cell-based research and related areas must be taken into account, as well as the views of impacted groups, including scientists, research participants and the general public. This paper outlines deliberations at a policy development workshop focusing on privacy challenges associated with cell-based research and interventions. The paper provides an overview of these challenges, followed by a discussion of key themes and recommendations that emerged from discussions at the workshop. The paper concludes that privacy risks associated with cell

  6. Decision Analysis Methods Used to Make Appropriate Investments in Human Exploration Capabilities and Technologies

    Science.gov (United States)

    Williams-Byrd, Julie; Arney, Dale C.; Hay, Jason; Reeves, John D.; Craig, Douglas

    2016-01-01

    NASA is transforming human spaceflight. The Agency is shifting from an exploration-based program with human activities in low Earth orbit (LEO) and targeted robotic missions in deep space to a more sustainable and integrated pioneering approach. Through pioneering, NASA seeks to address national goals to develop the capacity for people to work, learn, operate, live, and thrive safely beyond Earth for extended periods of time. However, pioneering space involves daunting technical challenges of transportation, maintaining health, and enabling crew productivity for long durations in remote, hostile, and alien environments. Prudent investments in capability and technology developments, based on mission need, are critical for enabling a campaign of human exploration missions. There are a wide variety of capabilities and technologies that could enable these missions, so it is a major challenge for NASA's Human Exploration and Operations Mission Directorate (HEOMD) to make knowledgeable portfolio decisions. It is critical for this pioneering initiative that these investment decisions are informed with a prioritization process that is robust and defensible. It is NASA's role to invest in targeted technologies and capabilities that would enable exploration missions even though specific requirements have not been identified. To inform these investments decisions, NASA's HEOMD has supported a variety of analysis activities that prioritize capabilities and technologies. These activities are often based on input from subject matter experts within the NASA community who understand the technical challenges of enabling human exploration missions. This paper will review a variety of processes and methods that NASA has used to prioritize and rank capabilities and technologies applicable to human space exploration. The paper will show the similarities in the various processes and showcase instances were customer specified priorities force modifications to the process. Specifically

  7. Parent-son decision-making about human papillomavirus vaccination: a qualitative analysis

    Directory of Open Access Journals (Sweden)

    Alexander Andreia B

    2012-12-01

    Full Text Available Abstract Background Licensed for use in males in 2009, Human Papillomavirus (HPV vaccination rates in adolescent males are extremely low. Literature on HPV vaccination focuses on females, adult males, or parents of adolescent males, without including adolescent males or the dynamics of the parent-son interaction that may influence vaccine decision-making. The purpose of this paper is to examine the decision-making process of parent-son dyads when deciding whether or not to get vaccinated against HPV. Methods Twenty-one adolescent males (ages 13–17, with no previous HPV vaccination, and their parents/guardians were recruited from adolescent primary care clinics serving low to middle income families in a large Midwestern city. Dyad members participated in separate semi-structured interviews assessing the relative role of the parent and son in the decision regarding HPV vaccination. Interviews were recorded, transcribed, and coded using inductive content analysis. Results Parents and sons focused on protection as a reason for vaccination; parents felt a need to protect their child, while sons wanted to protect their own health. Parents and sons commonly misinterpreted the information about the vaccine. Sons were concerned about an injection in the penis, while some parents and sons thought the vaccine would protect them against other sexually transmitted infections including Herpes, Gonorrhea, and HIV. Parents and sons recalled that the vaccine prevented genital warts rather than cancer. The vaccine decision-making process was rapid and dynamic, including an initial reaction to the recommendation for HPV vaccine, discussion between parent and son, and the final vaccine decision. Provider input was weighed in instances of initial disagreement. Many boys felt that this was the first health care decision that they had been involved in. Dyads which reported shared decision-making were more likely to openly communicate about sexual issues than those

  8. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  9. A Cross-Cultural Perspective on the Privacy Calculus

    Directory of Open Access Journals (Sweden)

    Sabine Trepte

    2017-01-01

    Full Text Available The “privacy calculus” approach to studying online privacy implies that willingness to engage in disclosures on social network sites (SNSs depends on evaluation of the resulting risks and benefits. In this article, we propose that cultural factors influence the perception of privacy risks and social gratifications. Based on survey data collected from participants from five countries (Germany [n = 740], the Netherlands [n = 89], the United Kingdom [n = 67], the United States [n = 489], and China [n = 165], we successfully replicated the privacy calculus. Furthermore, we found that culture plays an important role: As expected, people from cultures ranking high in individualism found it less important to generate social gratifications on SNSs as compared to people from collectivist-oriented countries. However, the latter placed greater emphasis on privacy risks—presumably to safeguard the collective. Furthermore, we identified uncertainty avoidance to be a cultural dimension crucially influencing the perception of SNS risks and benefits. As expected, people from cultures ranking high in uncertainty avoidance found privacy risks to be more important when making privacy-related disclosure decisions. At the same time, these participants ascribed lower importance to social gratifications—possibly because social encounters are perceived to be less controllable in the social media environment.

  10. Privacy preserving interactive record linkage (PPIRL).

    Science.gov (United States)

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human-machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human-machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility.

  11. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  12. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  13. Quantifying human and organizational factors in accident management using decision trees: the HORAAM method

    International Nuclear Information System (INIS)

    Baumont, G.; Menage, F.; Schneiter, J.R.; Spurgin, A.; Vogel, A.

    2000-01-01

    In the framework of the level 2 Probabilistic Safety Study (PSA 2) project, the Institute for Nuclear Safety and Protection (IPSN) has developed a method for taking into account Human and Organizational Reliability Aspects during accident management. Actions are taken during very degraded installation operations by teams of experts in the French framework of Crisis Organization (ONC). After describing the background of the framework of the Level 2 PSA, the French specific Crisis Organization and the characteristics of human actions in the Accident Progression Event Tree, this paper describes the method developed to introduce in PSA the Human and Organizational Reliability Analysis in Accident Management (HORAAM). This method is based on the Decision Tree method and has gone through a number of steps in its development. The first one was the observation of crisis center exercises, in order to identify the main influence factors (IFs) which affect human and organizational reliability. These IFs were used as headings in the Decision Tree method. Expert judgment was used in order to verify the IFs, to rank them, and to estimate the value of the aggregated factors to simplify the quantification of the tree. A tool based on Mathematica was developed to increase the flexibility and the efficiency of the study

  14. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  15. High-frequency oscillations in distributed neural networks reveal the dynamics of human decision making

    Directory of Open Access Journals (Sweden)

    Adrian G Guggisberg

    2008-03-01

    Full Text Available We examine the relative timing of numerous brain regions involved in human decisions that are based on external criteria, learned information, personal preferences, or unconstrained internal considerations. Using magnetoencephalography (MEG and advanced signal analysis techniques, we were able to non-invasively reconstruct oscillations of distributed neural networks in the high-gamma frequency band (60–150 Hz. The time course of the observed neural activity suggested that two-alternative forced choice tasks are processed in four overlapping stages: processing of sensory input, option evaluation, intention formation, and action execution. Visual areas are activated fi rst, and show recurring activations throughout the entire decision process. The temporo-occipital junction and the intraparietal sulcus are active during evaluation of external values of the options, 250–500 ms after stimulus presentation. Simultaneously, personal preference is mediated by cortical midline structures. Subsequently, the posterior parietal and superior occipital cortices appear to encode intention, with different subregions being responsible for different types of choice. The cerebellum and inferior parietal cortex are recruited for internal generation of decisions and actions, when all options have the same value. Action execution was accompanied by activation peaks in the contralateral motor cortex. These results suggest that high-gamma oscillations as recorded by MEG allow a reliable reconstruction of decision processes with excellent spatiotemporal resolution.

  16. Temporal characteristics of the influence of punishment on perceptual decision making in the human brain.

    Science.gov (United States)

    Blank, Helen; Biele, Guido; Heekeren, Hauke R; Philiastides, Marios G

    2013-02-27

    Perceptual decision making is the process by which information from sensory systems is combined and used to influence our behavior. In addition to the sensory input, this process can be affected by other factors, such as reward and punishment for correct and incorrect responses. To investigate the temporal dynamics of how monetary punishment influences perceptual decision making in humans, we collected electroencephalography (EEG) data during a perceptual categorization task whereby the punishment level for incorrect responses was parametrically manipulated across blocks of trials. Behaviorally, we observed improved accuracy for high relative to low punishment levels. Using multivariate linear discriminant analysis of the EEG, we identified multiple punishment-induced discriminating components with spatially distinct scalp topographies. Compared with components related to sensory evidence, components discriminating punishment levels appeared later in the trial, suggesting that punishment affects primarily late postsensory, decision-related processing. Crucially, the amplitude of these punishment components across participants was predictive of the size of the behavioral improvements induced by punishment. Finally, trial-by-trial changes in prestimulus oscillatory activity in the alpha and gamma bands were good predictors of the amplitude of these components. We discuss these findings in the context of increased motivation/attention, resulting from increases in punishment, which in turn yields improved decision-related processing.

  17. A cortical network model of cognitive and emotional influences in human decision making.

    Science.gov (United States)

    Nazir, Azadeh Hassannejad; Liljenström, Hans

    2015-10-01

    Decision making (DM)(2) is a complex process that appears to involve several brain structures. In particular, amygdala, orbitofrontal cortex (OFC) and lateral prefrontal cortex (LPFC) seem to be essential in human decision making, where both emotional and cognitive aspects are taken into account. In this paper, we present a computational network model representing the neural information processing of DM, from perception to behavior. We model the population dynamics of the three neural structures (amygdala, OFC and LPFC), as well as their interaction. In our model, the neurodynamic activity of amygdala and OFC represents the neural correlates of secondary emotion, while the activity of certain neural populations in OFC alone represents the outcome expectancy of different options. The cognitive/rational aspect of DM is associated with LPFC. Our model is intended to give insights on the emotional and cognitive processes involved in DM under various internal and external contexts. Different options for actions are represented by the oscillatory activity of cell assemblies, which may change due to experience and learning. Knowledge and experience of the outcome of our decisions and actions can eventually result in changes in our neural structures, attitudes and behaviors. Simulation results may have implications for how we make decisions for our individual actions, as well as for societal choices, where we take examples from transport and its impact on CO2 emissions and climate change. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  19. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  20. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  1. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  2. Human Capital and Export Decisions: The Case of Small and Medium Enterprises in Kosovo

    Directory of Open Access Journals (Sweden)

    Petrit Gashi

    2014-12-01

    Full Text Available Following the propositions of firm internationalization theories including the Melit’z dynamic model of export participation, this paper investigates the effects of human capital on the export decisions of Kosovo’s firms. Using a unique dataset of around 500 Small and Medium Enterprises, econometric estimates show mixed indications regarding the relationship between the propensity to export and longevity in export markets and human capital variables, measured by the education of the workforce, and investment in training. While education generally has a negative effect on exporting decisions, the latter shows a consistent positive effect. In the context of Kosovo, this dichotomy may reflect in part the effect of the underperforming education system in Kosovo, which does not produce the right level and/or mix of skills required by the private sector; this, in turn, forces SMEs to invest in increasing workforce capacities. Another explanation may indicate the lack of demand for a better skilled workforce, either because of associated high costs, or because a significant number of firms in Kosovo operate in low-value activities that do not require advanced skills and knowledge. Other factors that affect the decisions of firms to enter and serve export markets are found to be firm size, experience, growth, and adoption of quality standards.

  3. Desperately seeking donors: the 'saviour sibling' decision in Quintavalle v Human Fertilisation and Embryology Authority (UK).

    Science.gov (United States)

    Hocking, Barbara Ann; Guy, Scott

    2005-08-01

    The recent House of Lords decision in Quintavalle v Human Fertilisation and Embryology Authority has raised difficult and complex issues regarding the extent to which embryo selection and reproductive technology can be used as a means of rectifying genetic disorders and treating critically ill children. This comment outlines the facts of Quintavalle and explores how the House of Lords approached the legal, ethical and policy issues that arose out of the Human Fertilisation and Embryology Authority's (UK) decision to allow reproductive and embryo technology to be used to produce a 'saviour sibling' whose tissue could be used to save the life of a critically ill child. Particular attention will be given to the implications of the decision in Quintavalle for Australian family and medical law and policy. As part of this focus, the comment explores the current Australian legislative and policy framework regarding the use of genetic and reproductive technology as a mechanism through which to assist critically ill siblings. It is argued that the present Australian framework would appear to impose significant limits on the medical uses of genetic technology and, in this context, would seem to reflect many of the principles that were articulated by the House of Lords in Quintavalle.

  4. An examination of electronic health information privacy in older adults.

    Science.gov (United States)

    Le, Thai; Thompson, Hilaire; Demiris, George

    2013-01-01

    Older adults are the quickest growing demographic group and are key consumers of health services. As the United States health system transitions to electronic health records, it is important to understand older adult perceptions of privacy and security. We performed a secondary analysis of the Health Information National Trends Survey (2012, Cycle 1), to examine differences in perceptions of electronic health information privacy between older adults and the general population. We found differences in the level of importance placed on access to electronic health information (older adults placed greater emphasis on provider as opposed to personal access) and tendency to withhold information out of concerns for privacy and security (older adults were less likely to withhold information). We provide recommendations to alleviate some of these privacy concerns. This may facilitate greater use of electronic health communication between patient and provider, while promoting shared decision making.

  5. Toxicology research for precautionary decision-making and the role of Human & Experimental Toxicology

    DEFF Research Database (Denmark)

    Grandjean, P

    2015-01-01

    being the strict criteria for scientific proof usually required for decision-making in regard to prevention. The present study ascertains the coverage of environmental chemicals in four volumes of Human & Experimental Toxicology and the presentation and interpretation of research findings in published...... is particularly prone to bias because of the known paucity of false positives and, in particular, the existence of a vast number of toxic hazards which by default are considered innocuous due to lack of documentation. The Precautionary Principle could inspire decision-making on the basis of incomplete...... articles. Links in SciFinder showed that the 530 articles published in four selected volumes between 1984 and 2014 primarily dealt with metals (126 links) and other toxicants that have received substantial attention in the past. Thirteen compounds identified by US authorities in 2006 as high...

  6. From Performance to Decision Processes in 33 Years: A History of Organizational Behavior and Human Decision Processes under James C. Naylor.

    Science.gov (United States)

    Weber

    1998-12-01

    For the past 33 years, Organizational Behavior and Human Decision Processes has thrived under a single editor. That editor, James C. Naylor, is retiring from his long stewardship. This article chronicles the course of the journal under Jim's direction and marks some of the accomplishments and changes over the past three decades that go to his credit. Copyright 1998 Academic Press.

  7. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    Science.gov (United States)

    Suter, Sonia M

    2004-04-01

    With the mapping of the human genome, genetic privacy has become a concern to many. People care about genetic privacy because genes play an important role in shaping us--our genetic information is about us, and it is deeply connected to our sense of ourselves. In addition, unwanted disclosure of our genetic information, like a great deal of other personal information, makes us vulnerable to unwanted exposure, stigmatization, and discrimination. One recent approach to protecting genetic privacy is to create property rights in genetic information. This Article argues against that approach. Privacy and property are fundamentally different concepts. At heart, the term "property" connotes control within the marketplace and over something that is disaggregated or alienable from the self. "Privacy," in contrast, connotes control over access to the self as well as things close to, intimately connected to, and about the self. Given these different meanings, a regime of property rights in genetic information would impoverish our understanding of that information, ourselves, and the relationships we hope will be built around and through its disclosure. This Article explores our interests in genetic information in order to deepen our understanding of the ongoing discourse about the distinction between property and privacy. It develops a conception of genetic privacy with a strong relational component. We ordinarily share genetic information in the context of relationships in which disclosure is important to the relationship--family, intimate, doctor-patient, researcher-participant, employer-employee, and insurer-insured relationships. Such disclosure makes us vulnerable to and dependent on the person to whom we disclose it. As a result, trust is essential to the integrity of these relationships and our sharing of genetic information. Genetic privacy can protect our vulnerability in these relationships and enhance the trust we hope to have in them. Property, in contrast, by

  8. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  9. Privacy, autonomy, and public policy: French and North American perspectives.

    Science.gov (United States)

    Merchant, Jennifer

    2016-12-01

    This article raises the question of whether in both the United States and in France, an individual's autonomy and private decision-making right(s) in matters of health care and access to reproductive technologies can be conciliated with the general interest, and more specifically, the role of the State. Can a full-fledged right to privacy, the ability to exercise one's autonomy, exist alongside the general interest, and depend neither on financial resources like in the United States nor on centralised government decisions or the medical hierarchy like in France? The contrast between these two modern democracies justify the importance of comparing them. I will demonstrate that overlaps do exist: the free exercise of religion and opinion, freedom of expression, the inherent value of each individual. What differs, however, are the institutions and how they provide, protect, promote, or frame access to and expressions of these democratic principles. The impact of the global economy, the exposure of people around the world to each other via the internet, and the mirror effects of social media, blogs, and other such forums, have created new perspectives that countries project onto one another. For example, does France now seem to tout 'autonomy' as a new and important value because it appears to be an 'American success story'? Does the United States now seem to value human rights and a social-democratic approach because of the 'French model'? There seems to be some truth behind these assertions, but as this article will demonstrate, the portrayals of what the 'right to privacy' is in the United States and what 'socialised medicine' is in France are not necessarily fully accurate.

  10. Critical Factors Influencing Decision to Adopt Human Resource Information System (HRIS) in Hospitals

    Science.gov (United States)

    Alam, Md Golam Rabiul; Masum, Abdul Kadar Muhammad; Beh, Loo-See; Hong, Choong Seon

    2016-01-01

    The aim of this research is to explore factors influencing the management decisions to adopt human resource information system (HRIS) in the hospital industry of Bangladesh—an emerging developing country. To understand this issue, this paper integrates two prominent adoption theories—Human-Organization-Technology fit (HOT-fit) model and Technology-Organization-Environment (TOE) framework. Thirteen factors under four dimensions were investigated to explore their influence on HRIS adoption decisions in hospitals. Employing non-probability sampling method, a total of 550 copies of structured questionnaires were distributed among HR executives of 92 private hospitals in Bangladesh. Among the respondents, usable questionnaires were 383 that suggesting a valid response rate of 69.63%. We classify the sample into 3 core groups based on the HRIS initial implementation, namely adopters, prospectors, and laggards. The obtained results specify 5 most critical factors i.e. IT infrastructure, top management support, IT capabilities of staff, perceived cost, and competitive pressure. Moreover, the most significant dimension is technological dimension followed by organisational, human, and environmental among the proposed 4 dimensions. Lastly, the study found existence of significant differences in all factors across different adopting groups. The study results also expose constructive proposals to researchers, hospitals, and the government to enhance the likelihood of adopting HRIS. The present study has important implications in understanding HRIS implementation in developing countries. PMID:27494334

  11. Critical Factors Influencing Decision to Adopt Human Resource Information System (HRIS in Hospitals.

    Directory of Open Access Journals (Sweden)

    Md Golam Rabiul Alam

    Full Text Available The aim of this research is to explore factors influencing the management decisions to adopt human resource information system (HRIS in the hospital industry of Bangladesh-an emerging developing country. To understand this issue, this paper integrates two prominent adoption theories-Human-Organization-Technology fit (HOT-fit model and Technology-Organization-Environment (TOE framework. Thirteen factors under four dimensions were investigated to explore their influence on HRIS adoption decisions in hospitals. Employing non-probability sampling method, a total of 550 copies of structured questionnaires were distributed among HR executives of 92 private hospitals in Bangladesh. Among the respondents, usable questionnaires were 383 that suggesting a valid response rate of 69.63%. We classify the sample into 3 core groups based on the HRIS initial implementation, namely adopters, prospectors, and laggards. The obtained results specify 5 most critical factors i.e. IT infrastructure, top management support, IT capabilities of staff, perceived cost, and competitive pressure. Moreover, the most significant dimension is technological dimension followed by organisational, human, and environmental among the proposed 4 dimensions. Lastly, the study found existence of significant differences in all factors across different adopting groups. The study results also expose constructive proposals to researchers, hospitals, and the government to enhance the likelihood of adopting HRIS. The present study has important implications in understanding HRIS implementation in developing countries.

  12. Critical Factors Influencing Decision to Adopt Human Resource Information System (HRIS) in Hospitals.

    Science.gov (United States)

    Alam, Md Golam Rabiul; Masum, Abdul Kadar Muhammad; Beh, Loo-See; Hong, Choong Seon

    2016-01-01

    The aim of this research is to explore factors influencing the management decisions to adopt human resource information system (HRIS) in the hospital industry of Bangladesh-an emerging developing country. To understand this issue, this paper integrates two prominent adoption theories-Human-Organization-Technology fit (HOT-fit) model and Technology-Organization-Environment (TOE) framework. Thirteen factors under four dimensions were investigated to explore their influence on HRIS adoption decisions in hospitals. Employing non-probability sampling method, a total of 550 copies of structured questionnaires were distributed among HR executives of 92 private hospitals in Bangladesh. Among the respondents, usable questionnaires were 383 that suggesting a valid response rate of 69.63%. We classify the sample into 3 core groups based on the HRIS initial implementation, namely adopters, prospectors, and laggards. The obtained results specify 5 most critical factors i.e. IT infrastructure, top management support, IT capabilities of staff, perceived cost, and competitive pressure. Moreover, the most significant dimension is technological dimension followed by organisational, human, and environmental among the proposed 4 dimensions. Lastly, the study found existence of significant differences in all factors across different adopting groups. The study results also expose constructive proposals to researchers, hospitals, and the government to enhance the likelihood of adopting HRIS. The present study has important implications in understanding HRIS implementation in developing countries.

  13. Human mammary progenitor cell fate decisions are products of interactions with combinatorial microenvironments

    Energy Technology Data Exchange (ETDEWEB)

    LaBarge, Mark A; Nelson, Celeste M; Villadsen, Rene; Fridriksdottir, Agla; Ruth, Jason R; Stampfer, Martha R; Petersen, Ole W; Bissell, Mina J

    2008-09-19

    In adult tissues, multi-potent progenitor cells are some of the most primitive members of the developmental hierarchies that maintain homeostasis. That progenitors and their more mature progeny share identical genomes, suggests that fate decisions are directed by interactions with extrinsic soluble factors, ECM, and other cells, as well as physical properties of the ECM. To understand regulation of fate decisions, therefore, would require a means of understanding carefully choreographed combinatorial interactions. Here we used microenvironment protein microarrays to functionally identify combinations of cell-extrinsic mammary gland proteins and ECM molecules that imposed specific cell fates on bipotent human mammary progenitor cells. Micropatterned cell culture surfaces were fabricated to distinguish between the instructive effects of cell-cell versus cell-ECM interactions, as well as constellations of signaling molecules; and these were used in conjunction with physiologically relevant 3 dimensional human breast cultures. Both immortalized and primary human breast progenitors were analyzed. We report on the functional ability of those proteins of the mammary gland that maintain quiescence, maintain the progenitor state, and guide progenitor differentiation towards myoepithelial and luminal lineages.

  14. Statistical Learning and Adaptive Decision-Making Underlie Human Response Time Variability in Inhibitory Control

    Directory of Open Access Journals (Sweden)

    Ning eMa

    2015-08-01

    Full Text Available Response time (RT is an oft-reported behavioral measure in psychological and neurocognitive experiments, but the high level of observed trial-to-trial variability in this measure has often limited its usefulness. Here, we combine computational modeling and psychophysics to examine the hypothesis that fluctuations in this noisy measure reflect dynamic computations in human statistical learning and corresponding cognitive adjustments. We present data from the stop-signal task, in which subjects respond to a go stimulus on each trial, unless instructed not to by a subsequent, infrequently presented stop signal. We model across-trial learning of stop signal frequency, P(stop, and stop-signal onset time, SSD (stop-signal delay, with a Bayesian hidden Markov model, and within-trial decision-making with an optimal stochastic control model. The combined model predicts that RT should increase with both expected P(stop and SSD. The human behavioral data (n=20 bear out this prediction, showing P(stop and SSD both to be significant, independent predictors of RT, with P(stop being a more prominent predictor in 75% of the subjects, and SSD being more prominent in the remaining 25%. The results demonstrate that humans indeed readily internalize environmental statistics and adjust their cognitive/behavioral strategy accordingly, and that subtle patterns in RT variability can serve as a valuable tool for validating models of statistical learning and decision-making. More broadly, the modeling tools presented in this work can be generalized to a large body of behavioral paradigms, in order to extract insights about cognitive and neural processing from apparently quite noisy behavioral measures. We also discuss how this behaviorally validated model can then be used to conduct model-based analysis of neural data, in order to help identify specific brain areas for representing and encoding key computational quantities in learning and decision-making.

  15. Statistical learning and adaptive decision-making underlie human response time variability in inhibitory control.

    Science.gov (United States)

    Ma, Ning; Yu, Angela J

    2015-01-01

    Response time (RT) is an oft-reported behavioral measure in psychological and neurocognitive experiments, but the high level of observed trial-to-trial variability in this measure has often limited its usefulness. Here, we combine computational modeling and psychophysics to examine the hypothesis that fluctuations in this noisy measure reflect dynamic computations in human statistical learning and corresponding cognitive adjustments. We present data from the stop-signal task (SST), in which subjects respond to a go stimulus on each trial, unless instructed not to by a subsequent, infrequently presented stop signal. We model across-trial learning of stop signal frequency, P(stop), and stop-signal onset time, SSD (stop-signal delay), with a Bayesian hidden Markov model, and within-trial decision-making with an optimal stochastic control model. The combined model predicts that RT should increase with both expected P(stop) and SSD. The human behavioral data (n = 20) bear out this prediction, showing P(stop) and SSD both to be significant, independent predictors of RT, with P(stop) being a more prominent predictor in 75% of the subjects, and SSD being more prominent in the remaining 25%. The results demonstrate that humans indeed readily internalize environmental statistics and adjust their cognitive/behavioral strategy accordingly, and that subtle patterns in RT variability can serve as a valuable tool for validating models of statistical learning and decision-making. More broadly, the modeling tools presented in this work can be generalized to a large body of behavioral paradigms, in order to extract insights about cognitive and neural processing from apparently quite noisy behavioral measures. We also discuss how this behaviorally validated model can then be used to conduct model-based analysis of neural data, in order to help identify specific brain areas for representing and encoding key computational quantities in learning and decision-making.

  16. A decision support system prototype including human factors based on the TOGA meta-theory approach

    International Nuclear Information System (INIS)

    Cappelli, M.; Memmi, F.; Gadomski, A. M.; Sepielli, M.

    2012-01-01

    The human contribution to the risk of operation of complex technological systems is often not negligible and sometimes tends to become significant, as shown by many reports on incidents and accidents occurred in the past inside Nuclear Power Plants (NPPs). An error of a human operator of a NPP can derive by both omission and commission. For instance, complex commission errors can also lead to significant catastrophic technological accidents, as for the case of the Three Mile Island accident. Typically, the problem is analyzed by focusing on the single event chain that has provoked the incident or accident. What is needed is a general framework able to include as many parameters as possible, i.e. both technological and human factors. Such a general model could allow to envisage an omission or commission error before it can happen or, alternatively, suggest preferred actions to do in order to take countermeasures to neutralize the effect of the error before it becomes critical. In this paper, a preliminary Decision Support System (DSS) based on the so-called (-) TOGA meta-theory approach is presented. The application of such a theory to the management of nuclear power plants has been presented in the previous ICAPP 2011. Here, a human factor simulator prototype is proposed in order to include the effect of human errors in the decision path. The DSS has been developed using a TRIGA research reactor as reference plant, and implemented using the LabVIEW programming environment and the Finite State Machine (FSM) model The proposed DSS shows how to apply the Universal Reasoning Paradigm (URP) and the Universal Management Paradigm (UMP) to a real plant context. The DSS receives inputs from instrumentation data and gives as output a suggested decision. It is obtained as the result of an internal elaborating process based on a performance function. The latter, describes the degree of satisfaction and efficiency, which are dependent on the level of responsibility related to

  17. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  18. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  19. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  20. The Value of Human Capital Signals for Investment Decision Making under Uncertainty

    DEFF Research Database (Denmark)

    Hain, Daniel; Christensen, Jesper Lindgaard; Jurowetzki, Roman

    environments as our empirical setting. A large body of research from behavioral economics illustrates that when faced with uncertain and complex decision problems, investors tend to rely on simple heuristics and rules-of thumb, derived by easily accessible and assessable signals. Yet, with increasing...... with a similar pair that did lead to an investment. Based on Crunchbase investment data, we gather via LinkedIn and further sources detailed information on the founders professional and education background. We find human capital signals from the entrepreneurs to be of higher importance for investors when...

  1. Human mammary progenitor cell fate decisions are productsof interactions with combinatorial microenvironments

    DEFF Research Database (Denmark)

    LaBarge, Mark A.; Nelson, Celeste M.; Villadsen, René

    2009-01-01

    factors, ECM, and other cells, as well as physical properties of the ECM. To understand regulation of fate decisions, therefore, would require a means of understanding carefully choreographed combinatorial interactions. Here we used microenvironment protein microarrays to functionally identify...... combinations of cell-extrinsic mammary gland proteins and ECM molecules that imposed specific cell fates on bipotent human mammary progenitor cells.Micropatterned cell culture surfaces were fabricated to distinguish between the instructive effects of cell-cell versus cell-ECM interactions, as well...

  2. Decision Support System Requirements Definition for Human Extravehicular Activity Based on Cognitive Work Analysis.

    Science.gov (United States)

    Miller, Matthew James; McGuire, Kerry M; Feigh, Karen M

    2017-06-01

    The design and adoption of decision support systems within complex work domains is a challenge for cognitive systems engineering (CSE) practitioners, particularly at the onset of project development. This article presents an example of applying CSE techniques to derive design requirements compatible with traditional systems engineering to guide decision support system development. Specifically, it demonstrates the requirements derivation process based on cognitive work analysis for a subset of human spaceflight operations known as extravehicular activity . The results are presented in two phases. First, a work domain analysis revealed a comprehensive set of work functions and constraints that exist in the extravehicular activity work domain. Second, a control task analysis was performed on a subset of the work functions identified by the work domain analysis to articulate the translation of subject matter states of knowledge to high-level decision support system requirements. This work emphasizes an incremental requirements specification process as a critical component of CSE analyses to better situate CSE perspectives within the early phases of traditional systems engineering design.

  3. Ratio Utility and Cost Analysis for Privacy Preserving Subspace Projection

    OpenAIRE

    Al, Mert; Wan, Shibiao; Kung, Sun-Yuan

    2017-01-01

    With a rapidly increasing number of devices connected to the internet, big data has been applied to various domains of human life. Nevertheless, it has also opened new venues for breaching users' privacy. Hence it is highly required to develop techniques that enable data owners to privatize their data while keeping it useful for intended applications. Existing methods, however, do not offer enough flexibility for controlling the utility-privacy trade-off and may incur unfavorable results when...

  4. From Trust in Automation to Decision Neuroscience: Applying Cognitive Neuroscience Methods to Understand and Improve Interaction Decisions Involved in Human Automation Interaction

    Science.gov (United States)

    Drnec, Kim; Marathe, Amar R.; Lukos, Jamie R.; Metcalfe, Jason S.

    2016-01-01

    Human automation interaction (HAI) systems have thus far failed to live up to expectations mainly because human users do not always interact with the automation appropriately. Trust in automation (TiA) has been considered a central influence on the way a human user interacts with an automation; if TiA is too high there will be overuse, if TiA is too low there will be disuse. However, even though extensive research into TiA has identified specific HAI behaviors, or trust outcomes, a unique mapping between trust states and trust outcomes has yet to be clearly identified. Interaction behaviors have been intensely studied in the domain of HAI and TiA and this has led to a reframing of the issues of problems with HAI in terms of reliance and compliance. We find the behaviorally defined terms reliance and compliance to be useful in their functionality for application in real-world situations. However, we note that once an inappropriate interaction behavior has occurred it is too late to mitigate it. We therefore take a step back and look at the interaction decision that precedes the behavior. We note that the decision neuroscience community has revealed that decisions are fairly stereotyped processes accompanied by measurable psychophysiological correlates. Two literatures were therefore reviewed. TiA literature was extensively reviewed in order to understand the relationship between TiA and trust outcomes, as well as to identify gaps in current knowledge. We note that an interaction decision precedes an interaction behavior and believe that we can leverage knowledge of the psychophysiological correlates of decisions to improve joint system performance. As we believe that understanding the interaction decision will be critical to the eventual mitigation of inappropriate interaction behavior, we reviewed the decision making literature and provide a synopsis of the state of the art understanding of the decision process from a decision neuroscience perspective. We forward

  5. From Trust in Automation to Decision Neuroscience: Applying Cognitive Neuroscience Methods to Understand and Improve Interaction Decisions Involved in Human Automation Interaction.

    Science.gov (United States)

    Drnec, Kim; Marathe, Amar R; Lukos, Jamie R; Metcalfe, Jason S

    2016-01-01

    Human automation interaction (HAI) systems have thus far failed to live up to expectations mainly because human users do not always interact with the automation appropriately. Trust in automation (TiA) has been considered a central influence on the way a human user interacts with an automation; if TiA is too high there will be overuse, if TiA is too low there will be disuse. However, even though extensive research into TiA has identified specific HAI behaviors, or trust outcomes, a unique mapping between trust states and trust outcomes has yet to be clearly identified. Interaction behaviors have been intensely studied in the domain of HAI and TiA and this has led to a reframing of the issues of problems with HAI in terms of reliance and compliance. We find the behaviorally defined terms reliance and compliance to be useful in their functionality for application in real-world situations. However, we note that once an inappropriate interaction behavior has occurred it is too late to mitigate it. We therefore take a step back and look at the interaction decision that precedes the behavior. We note that the decision neuroscience community has revealed that decisions are fairly stereotyped processes accompanied by measurable psychophysiological correlates. Two literatures were therefore reviewed. TiA literature was extensively reviewed in order to understand the relationship between TiA and trust outcomes, as well as to identify gaps in current knowledge. We note that an interaction decision precedes an interaction behavior and believe that we can leverage knowledge of the psychophysiological correlates of decisions to improve joint system performance. As we believe that understanding the interaction decision will be critical to the eventual mitigation of inappropriate interaction behavior, we reviewed the decision making literature and provide a synopsis of the state of the art understanding of the decision process from a decision neuroscience perspective. We forward

  6. On the Theory of Human Decisions in the Age of “beneficial globalization”

    Directory of Open Access Journals (Sweden)

    Katalin Martinás

    2010-12-01

    Full Text Available The globalisation is a complex phenomenon with many advantageous and disadvantageous consequences. In this paper we investigate the linkage between globalised market economy and the happiness through the ethical implications of the greatest happiness principle in a system approach. We also investigate the terms of the beneficial globalisation. Our proposition is that: the main condition of the good globalisation should be Bentham’s principle: the greatest happiness for the greatest number and the United States Declaration of Independence’s famous phrase pursuit of happiness.We face the following problem: the globalization assures – due to its Nature – the growth of Z, which is the marketed part of the globalization, but not the total happiness.The main question in political philosophy is: What do we need to do in order to live together well? In complex approach, based on the wealth increase law we take into account the parameters, which will be changed by the human decisions (i as well as the long-term expectations, which are motivating the decisions themselves (ii. Factors (i are the followings: material goods, money, parameters of human physiology (e.g. health, psychology (knowledge, sociology (e.g. friends, power. These quantities are measurable in principle, i.e. they can be mapped into the set of real numbers. The changes are exchanges between two agents or with the nature, and there is production/consumption inside the agent.

  7. Fuzzy Simple Additive Weighting Method in the Decision Making of Human Resource Recruitment

    Directory of Open Access Journals (Sweden)

    Budi Prasetiyo

    2016-12-01

    Full Text Available The Company is one of the jobs that was founded to reduce unemployment. The progress of a company is determined by the human resources that exist within the company. So, the selection of workers will join the company need to be selected first. The hardest thing in making a selection factor is the effort to eliminate the subjectivity of the personnel manager so that every choice made is objective based on the criteria expected by the company. To help determine who is accepted as an employee in the company, we need a method that can provide a valid decision. Therefore, we use Fuzzy Multiple Attribute Decision Making with Simple Additive Weighting method (SAW to decide to make in human resource recruitment. This method was chosen because it can provide the best alternative from several alternatives. In this case, the alternative is that the applicants or candidates. This research was conducted by finding the weight values for each attribute. Then do the ranking process that determines the optimal alternative to the best applicants who qualify as employees of the company. Based on calculations by the SAW obtained the two highest ranking results are A5 (alternative 5 and A1 (alternative 1, to obtain two candidates received.

  8. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  9. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  10. Design strategies for human & earth systems modeling to meet emerging multi-scale decision support needs

    Science.gov (United States)

    Spak, S.; Pooley, M.

    2012-12-01

    The next generation of coupled human and earth systems models promises immense potential and grand challenges as they transition toward new roles as core tools for defining and living within planetary boundaries. New frontiers in community model development include not only computational, organizational, and geophysical process questions, but also the twin objectives of more meaningfully integrating the human dimension and extending applicability to informing policy decisions on a range of new and interconnected issues. We approach these challenges by posing key policy questions that require more comprehensive coupled human and geophysical models, identify necessary model and organizational processes and outputs, and work backwards to determine design criteria in response to these needs. We find that modular community earth system model design must: * seamlessly scale in space (global to urban) and time (nowcasting to paleo-studies) and fully coupled on all component systems * automatically differentiate to provide complete coupled forward and adjoint models for sensitivity studies, optimization applications, and 4DVAR assimilation across Earth and human observing systems * incorporate diagnostic tools to quantify uncertainty in couplings, and in how human activity affects them * integrate accessible community development and application with JIT-compilation, cloud computing, game-oriented interfaces, and crowd-sourced problem-solving We outline accessible near-term objectives toward these goals, and describe attempts to incorporate these design objectives in recent pilot activities using atmosphere-land-ocean-biosphere-human models (WRF-Chem, IBIS, UrbanSim) at urban and regional scales for policy applications in climate, energy, and air quality.

  11. Redefining Genomic Privacy: Trust and Empowerment

    OpenAIRE

    Erlich, Yaniv; Williams, James B.; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D.; Witkowski, Jan A.; Kain, Robert C.

    2014-01-01

    Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we int...

  12. Exercising privacy rights in medical science

    OpenAIRE

    Hillmer, Michael; Redelmeier, Donald A.

    2007-01-01

    Privacy laws are intended to preserve human well-being and improve medical outcomes. We used the Sportstats website, a repository of competitive athletic data, to test how easily these laws can be circumvented. We designed a haphazard, unrepresentative case-series analysis and applied unscientific methods based on an Internet connection and idle time. We found it both feasible and titillating to breach anonymity, stockpile personal information and generate misquotations. We extended our metho...

  13. The Common Law Threesome: Libel, Slander, and Invasion of Privacy.

    Science.gov (United States)

    Anapol, Malthon M.

    Unlike most of the regulatory constraints which have impact on the media, libel, slander, and invasion of privacy are common law concepts developed from the precedents of previous court decisions and from reasoning employed in the written judicial opinions of appellate courts. Since common law is thus both traditional in nature and subject to…

  14. Designing Privacy Notices: Supporting User Understanding and Control

    Science.gov (United States)

    Kelley, Patrick Gage

    2013-01-01

    Users are increasingly expected to manage complex privacy settings in their normal online interactions. From shopping to social networks, users make decisions about sharing their personal information with corporations and contacts, frequently with little assistance. Current solutions require consumers to read long documents or go out of their way…

  15. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  16. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  17. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  18. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  19. Modeling Feedbacks Between Individual Human Decisions and Hydrology Using Interconnected Physical and Social Models

    Science.gov (United States)

    Murphy, J.; Lammers, R. B.; Proussevitch, A. A.; Ozik, J.; Altaweel, M.; Collier, N. T.; Alessa, L.; Kliskey, A. D.

    2014-12-01

    The global hydrological cycle intersects with human decision making at multiple scales, from dams and irrigation works to the taps in individuals' homes. Residential water consumers are commonly encouraged to conserve; these messages are heard against a background of individual values and conceptions about water quality, uses, and availability. The degree to which these values impact the larger-hydrological dynamics, the way that changes in those values have impacts on the hydrological cycle through time, and the feedbacks by which water availability and quality in turn shape those values, are not well explored. To investigate this domain we employ a global-scale water balance model (WBM) coupled with a social-science-grounded agent-based model (ABM). The integration of a hydrological model with an agent-based model allows us to explore driving factors in the dynamics in coupled human-natural systems. From the perspective of the physical hydrologist, the ABM offers a richer means of incorporating the human decisions that drive the hydrological system; from the view of the social scientist, a physically-based hydrological model allows the decisions of the agents to play out against constraints faithful to the real world. We apply the interconnected models to a study of Tucson, Arizona, USA, and its role in the larger Colorado River system. Our core concept is Technology-Induced Environmental Distancing (TIED), which posits that layers of technology can insulate consumers from direct knowledge of a resource. In Tucson, multiple infrastructure and institutional layers have arguably increased the conceptual distance between individuals and their water supply, offering a test case of the TIED framework. Our coupled simulation allows us to show how the larger system transforms a resource with high temporal and spatial variability into a consumer constant, and the effects of this transformation on the regional system. We use this to explore how pricing, messaging, and

  20. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  1. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  2. Privacy preserving processing of genomic data: A survey.

    Science.gov (United States)

    Akgün, Mete; Bayrak, A Osman; Ozer, Bugra; Sağıroğlu, M Şamil

    2015-08-01

    Recently, the rapid advance in genome sequencing technology has led to production of huge amount of sensitive genomic data. However, a serious privacy challenge is confronted with increasing number of genetic tests as genomic data is the ultimate source of identity for humans. Lately, privacy threats and possible solutions regarding the undesired access to genomic data are discussed, however it is challenging to apply proposed solutions to real life problems due to the complex nature of security definitions. In this review, we have categorized pre-existing problems and corresponding solutions in more understandable and convenient way. Additionally, we have also included open privacy problems coming with each genomic data processing procedure. We believe our classification of genome associated privacy problems will pave the way for linking of real-life problems with previously proposed methods. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Space in Space: Designing for Privacy in the Workplace

    Science.gov (United States)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of

  4. Animal to human translational paradigms relevant for approach avoidance conflict decision making.

    Science.gov (United States)

    Kirlic, Namik; Young, Jared; Aupperle, Robin L

    2017-09-01

    Avoidance behavior in clinical anxiety disorders is often a decision made in response to approach-avoidance conflict, resulting in a sacrifice of potential rewards to avoid potential negative affective consequences. Animal research has a long history of relying on paradigms related to approach-avoidance conflict to model anxiety-relevant behavior. This approach includes punishment-based conflict, exploratory, and social interaction tasks. There has been a recent surge of interest in the translation of paradigms from animal to human, in efforts to increase generalization of findings and support the development of more effective mental health treatments. This article briefly reviews animal tests related to approach-avoidance conflict and results from lesion and pharmacologic studies utilizing these tests. We then provide a description of translational human paradigms that have been developed to tap into related constructs, summarizing behavioral and neuroimaging findings. Similarities and differences in findings from analogous animal and human paradigms are discussed. Lastly, we highlight opportunities for future research and paradigm development that will support the clinical utility of this translational work. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Modelling Interactions between forest pest invasions and human decisions regarding firewood transport restrictions.

    Science.gov (United States)

    Barlow, Lee-Ann; Cecile, Jacob; Bauch, Chris T; Anand, Madhur

    2014-01-01

    The invasion of nonnative, wood-boring insects such as the Asian longhorned beetle (A. glabripennis) and the emerald ash borer (A. planipennis) is a serious ecological and economic threat to Canadian deciduous and mixed-wood forests. Humans act as a major vector for the spread of these pests via firewood transport, although existing models do not explicitly capture human decision-making regarding firewood transport. In this paper we present a two-patch coupled human-environment system model that includes social influence and long-distance firewood transport and examines potential strategies for mitigating pest spread. We found that increasing concern regarding infestations (f) significantly reduced infestation. Additionally it resulted in multiple thresholds at which the intensity of infestation in a patch was decreased. It was also found that a decrease in the cost of firewood purchased in the area where it is supposed to be burned (Cl) resulted in an increased proportion of local-firewood strategists, and a 67% decrease in Cl from $6.75 to $4.50 was sufficient to eliminate crosspatch infestation. These effects are synergistic: increasing concern through awareness and education campaigns acts together with reduced firewood costs, thereby reducing the required threshold of both awareness and economic incentives. Our results indicate that the best management strategy includes a combination of public education paired with firewood subsidization.

  6. Nonlinear impacts of small-scale natural events on Nineteenth Century human decision-making

    Science.gov (United States)

    McCormack, S. M.; Schlichting, K. M.; Urbanova, T.; Allen, T. L.; Ruffing, C. M.; Hermans, C. M.

    2009-12-01

    Natural climatological events that occurred throughout the Nineteenth Century, such as floods, droughts and hurricanes had long-lived, far-reaching consequences on the human decision-making processes occurring in the northeast United States. These events impacted the hydrological cycle, both directly -though the building of various structures- and indirectly - through an increased understanding of science; and the changing relationship between humans and their environment. This paper examines these events and associated processes through: 1) identifying specific natural events throughout the time period, occurring globally, with initial conditions conducive to long-lived consequences; 2) examining the relationship between scientific enquiry, natural events and the proliferation of dams in the northeast landscape; and 3) the growth of public health concerns, awareness of bacteriology, and municipal water supply systems. Results of this research indicate that the relationship between knowledge systems, natural events and subsequent engineering or technological fixes is complex and highly dependent on initial conditions. It highlights the time period where humans became increasingly dependent on engineered solutions to environmental problems, many of which still hold fast in our contemporary landscape. It is relevant to natural, social and governance structures in place today. The principles behind the occurrence of the natural phenomena and subsequent research and design have not changed; and understanding key events or stages in the past is tantamount to making predictions for the future.

  7. Valence and Efficacy: The Affective Meanings of Human Values and their Relationship to Moral Decisions

    Directory of Open Access Journals (Sweden)

    Walter Renner

    2015-07-01

    Full Text Available Human values and value based judgments are not only based on rationality but are highly emotional by their nature. Like other emotional concepts, human values can not only be rated by their desirability or subjective evaluation, but also by their perceived power, effectiveness, or activity. This aspect has been omitted in previous research. We therefore employed the Semantic Differential to examine the factorial structure of the affective meanings of 15 German-language value terms. The demographically heterogeneous sample comprised N = 274 (N = 136 female; mean age 39.14 years, s = 18.35, range 16...88 years Austrian and German respondents. In line with our expectations we found two affective dimensions, Valence and Efficacy, which predicted central aspects of value related moral or ethical judgments. We conclude that the previously neglected dimension of Efficacy should be considered in future research on human values. Possible implications for studying consumer decisions or political voting as well as ethical aspects are discussed.

  8. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  9. Predicting decisions in human social interactions using real-time fMRI and pattern classification.

    Science.gov (United States)

    Hollmann, Maurice; Rieger, Jochem W; Baecke, Sebastian; Lützkendorf, Ralf; Müller, Charles; Adolf, Daniela; Bernarding, Johannes

    2011-01-01

    Negotiation and trade typically require a mutual interaction while simultaneously resting in uncertainty which decision the partner ultimately will make at the end of the process. Assessing already during the negotiation in which direction one's counterpart tends would provide a tremendous advantage. Recently, neuroimaging techniques combined with multivariate pattern classification of the acquired data have made it possible to discriminate subjective states of mind on the basis of their neuronal activation signature. However, to enable an online-assessment of the participant's mind state both approaches need to be extended to a real-time technique. By combining real-time functional magnetic resonance imaging (fMRI) and online pattern classification techniques, we show that it is possible to predict human behavior during social interaction before the interacting partner communicates a specific decision. Average accuracy reached approximately 70% when we predicted online the decisions of volunteers playing the ultimatum game, a well-known paradigm in economic game theory. Our results demonstrate the successful online analysis of complex emotional and cognitive states using real-time fMRI, which will enable a major breakthrough for social fMRI by providing information about mental states of partners already during the mutual interaction. Interestingly, an additional whole brain classification across subjects confirmed the online results: anterior insula, ventral striatum, and lateral orbitofrontal cortex, known to act in emotional self-regulation and reward processing for adjustment of behavior, appeared to be strong determinants of later overt behavior in the ultimatum game. Using whole brain classification we were also able to discriminate between brain processes related to subjective emotional and motivational states and brain processes related to the evaluation of objective financial incentives.

  10. Predicting decisions in human social interactions using real-time fMRI and pattern classification.

    Directory of Open Access Journals (Sweden)

    Maurice Hollmann

    Full Text Available Negotiation and trade typically require a mutual interaction while simultaneously resting in uncertainty which decision the partner ultimately will make at the end of the process. Assessing already during the negotiation in which direction one's counterpart tends would provide a tremendous advantage. Recently, neuroimaging techniques combined with multivariate pattern classification of the acquired data have made it possible to discriminate subjective states of mind on the basis of their neuronal activation signature. However, to enable an online-assessment of the participant's mind state both approaches need to be extended to a real-time technique. By combining real-time functional magnetic resonance imaging (fMRI and online pattern classification techniques, we show that it is possible to predict human behavior during social interaction before the interacting partner communicates a specific decision. Average accuracy reached approximately 70% when we predicted online the decisions of volunteers playing the ultimatum game, a well-known paradigm in economic game theory. Our results demonstrate the successful online analysis of complex emotional and cognitive states using real-time fMRI, which will enable a major breakthrough for social fMRI by providing information about mental states of partners already during the mutual interaction. Interestingly, an additional whole brain classification across subjects confirmed the online results: anterior insula, ventral striatum, and lateral orbitofrontal cortex, known to act in emotional self-regulation and reward processing for adjustment of behavior, appeared to be strong determinants of later overt behavior in the ultimatum game. Using whole brain classification we were also able to discriminate between brain processes related to subjective emotional and motivational states and brain processes related to the evaluation of objective financial incentives.

  11. The impact of decisions the european court of human rights on the legal system of Ukraine

    Directory of Open Access Journals (Sweden)

    О. О. Сидоренко

    2015-11-01

    Full Text Available The article describes the identifying areas of influence of the European Court on the legal system of Ukraine, as well as the enforcement mechanism of decisions. Analyzes the problems that affect the designated question and points of view of different scholars and practitioners. In Europe there are different documents – convention covenants, charters that provide and ensure the inclusion of a special protection mechanism in case of violation of human rights. These documents Convention on Human Rights and Fundamental Freedoms (Rome, 1950, hereinafter - the Convention, which provides the most effective and real protection mechanism for human rights. Convention not only proclaimed fundamental human rights, but also created a special mechanism to protect them. The key to this mechanism is the European Court of Human Rights. European Court of Human Rights (hereinafter - the Court located in Strasbourg, France. Its jurisdiction extends to forty-seven European states that are members of the Council of Europe and signatories. Article 9 of the Constitution of Ukraine clearly states that international treaties, ratified by the Verkhovna Rada of Ukraine are part of the national legislation of Ukraine. The Court can not apply the law that governs the legal relationship in question, other than an international agreement. However, international agreements apply if they do not contradict the Constitution of Ukraine. Urgency of the problem by the growth requirements of the rule of law in the judiciary, increasing legal awareness of citizens and their activity to protect their rights and freedoms, the presence of non judicial legislation with international legal acts. Procedural legislation of Ukraine in many aspects not harmonized not only in line with the decisions of the European Court, but also to the current constitution. Ukraine ratified the Convention for the Protection of Human Rights and Fundamental Freedoms July 17, 1997. Since then, the citizens of

  12. Fuzzy Decision-Making Fuser (FDMF for Integrating Human-Machine Autonomous (HMA Systems with Adaptive Evidence Sources

    Directory of Open Access Journals (Sweden)

    Yu-Ting Liu

    2017-06-01

    Full Text Available A brain-computer interface (BCI creates a direct communication pathway between the human brain and an external device or system. In contrast to patient-oriented BCIs, which are intended to restore inoperative or malfunctioning aspects of the nervous system, a growing number of BCI studies focus on designing auxiliary systems that are intended for everyday use. The goal of building these BCIs is to provide capabilities that augment existing intact physical and mental capabilities. However, a key challenge to BCI research is human variability; factors such as fatigue, inattention, and stress vary both across different individuals and for the same individual over time. If these issues are addressed, autonomous systems may provide additional benefits that enhance system performance and prevent problems introduced by individual human variability. This study proposes a human-machine autonomous (HMA system that simultaneously aggregates human and machine knowledge to recognize targets in a rapid serial visual presentation (RSVP task. The HMA focuses on integrating an RSVP BCI with computer vision techniques in an image-labeling domain. A fuzzy decision-making fuser (FDMF is then applied in the HMA system to provide a natural adaptive framework for evidence-based inference by incorporating an integrated summary of the available evidence (i.e., human and machine decisions and associated uncertainty. Consequently, the HMA system dynamically aggregates decisions involving uncertainties from both human and autonomous agents. The collaborative decisions made by an HMA system can achieve and maintain superior performance more efficiently than either the human or autonomous agents can achieve independently. The experimental results shown in this study suggest that the proposed HMA system with the FDMF can effectively fuse decisions from human brain activities and the computer vision techniques to improve overall performance on the RSVP recognition task. This

  13. Fuzzy Decision-Making Fuser (FDMF) for Integrating Human-Machine Autonomous (HMA) Systems with Adaptive Evidence Sources.

    Science.gov (United States)

    Liu, Yu-Ting; Pal, Nikhil R; Marathe, Amar R; Wang, Yu-Kai; Lin, Chin-Teng

    2017-01-01

    A brain-computer interface (BCI) creates a direct communication pathway between the human brain and an external device or system. In contrast to patient-oriented BCIs, which are intended to restore inoperative or malfunctioning aspects of the nervous system, a growing number of BCI studies focus on designing auxiliary systems that are intended for everyday use. The goal of building these BCIs is to provide capabilities that augment existing intact physical and mental capabilities. However, a key challenge to BCI research is human variability; factors such as fatigue, inattention, and stress vary both across different individuals and for the same individual over time. If these issues are addressed, autonomous systems may provide additional benefits that enhance system performance and prevent problems introduced by individual human variability. This study proposes a human-machine autonomous (HMA) system that simultaneously aggregates human and machine knowledge to recognize targets in a rapid serial visual presentation (RSVP) task. The HMA focuses on integrating an RSVP BCI with computer vision techniques in an image-labeling domain. A fuzzy decision-making fuser (FDMF) is then applied in the HMA system to provide a natural adaptive framework for evidence-based inference by incorporating an integrated summary of the available evidence (i.e., human and machine decisions) and associated uncertainty. Consequently, the HMA system dynamically aggregates decisions involving uncertainties from both human and autonomous agents. The collaborative decisions made by an HMA system can achieve and maintain superior performance more efficiently than either the human or autonomous agents can achieve independently. The experimental results shown in this study suggest that the proposed HMA system with the FDMF can effectively fuse decisions from human brain activities and the computer vision techniques to improve overall performance on the RSVP recognition task. This conclusion

  14. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  15. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  16. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  17. The Integrated Medical Model: A Risk Assessment and Decision Support Tool for Human Space Flight Missions

    Science.gov (United States)

    Kerstman, Eric L.; Minard, Charles; FreiredeCarvalho, Mary H.; Walton, Marlei E.; Myers, Jerry G., Jr.; Saile, Lynn G.; Lopez, Vilma; Butler, Douglas J.; Johnson-Throop, Kathy A.

    2011-01-01

    This slide presentation reviews the Integrated Medical Model (IMM) and its use as a risk assessment and decision support tool for human space flight missions. The IMM is an integrated, quantified, evidence-based decision support tool useful to NASA crew health and mission planners. It is intended to assist in optimizing crew health, safety and mission success within the constraints of the space flight environment for in-flight operations. It uses ISS data to assist in planning for the Exploration Program and it is not intended to assist in post flight research. The IMM was used to update Probability Risk Assessment (PRA) for the purpose of updating forecasts for the conditions requiring evacuation (EVAC) or Loss of Crew Life (LOC) for the ISS. The IMM validation approach includes comparison with actual events and involves both qualitative and quantitaive approaches. The results of these comparisons are reviewed. Another use of the IMM is to optimize the medical kits taking into consideration the specific mission and the crew profile. An example of the use of the IMM to optimize the medical kits is reviewed.

  18. Brain pathways for cognitive-emotional decision making in the human animal.

    Science.gov (United States)

    Levine, Daniel S

    2009-04-01

    As roles for different brain regions become clearer, a picture emerges of how primate prefrontal cortex executive circuitry influences subcortical decision making pathways inherited from other mammals. The human's basic needs or drives can be interpreted as residing in an on-center off-surround network in motivational regions of the hypothalamus and brain stem. Such a network has multiple attractors that, in this case, represent the amount of satisfaction of these needs, and we consider and interpret neurally a continuous-time simulated annealing algorithm for moving between attractors under the influence of noise that represents "discontent" combined with "initiative." For decision making on specific tasks, we employ a variety of rules whose neural circuitry appears to involve the amygdala and the orbital, cingulate, and dorsolateral regions of prefrontal cortex. These areas can be interpreted as connected in a three-layer adaptive resonance network. The vigilance of the network, which is influenced by the state of the hypothalamic needs network, determines the level of sophistication of the rule being utilized.

  19. Computer simulation of leadership, consensus decision making and collective behaviour in humans.

    Directory of Open Access Journals (Sweden)

    Song Wu

    Full Text Available The aim of this study is to evaluate the reliability of a crowd simulation model developed by the authors by reproducing Dyer et al.'s experiments (published in Philosophical Transactions in 2009 on human leadership and consensus decision making in a computer-based environment. The theoretical crowd model of the simulation environment is presented, and its results are compared and analysed against Dyer et al.'s original experiments. It is concluded that the simulation results are largely consistent with the experiments, which demonstrates the reliability of the crowd model. Furthermore, the simulation data also reveals several additional new findings, namely: 1 the phenomena of sacrificing accuracy to reach a quicker consensus decision found in ants colonies was also discovered in the simulation; 2 the ability of reaching consensus in groups has a direct impact on the time and accuracy of arriving at the target position; 3 the positions of the informed individuals or leaders in the crowd could have significant impact on the overall crowd movement; and 4 the simulation also confirmed Dyer et al.'s anecdotal evidence of the proportion of the leadership in large crowds and its effect on crowd movement. The potential applications of these findings are highlighted in the final discussion of this paper.

  20. A Simple Decision Rule for Recognition of Poly(A) Tail Signal Motifs in Human Genome

    KAUST Repository

    AbouEisha, Hassan M.

    2015-05-12

    Background is the numerous attempts were made to predict motifs in genomic sequences that correspond to poly (A) tail signals. Vast portion of this effort has been directed to a plethora of nonlinear classification methods. Even when such approaches yield good discriminant results, identifying dominant features of regulatory mechanisms nevertheless remains a challenge. In this work, we look at decision rules that may help identifying such features. Findings are we present a simple decision rule for classification of candidate poly (A) tail signal motifs in human genomic sequence obtained by evaluating features during the construction of gradient boosted trees. We found that values of a single feature based on the frequency of adenine in the genomic sequence surrounding candidate signal and the number of consecutive adenine molecules in a well-defined region immediately following the motif displays good discriminative potential in classification of poly (A) tail motifs for samples covered by the rule. Conclusions is the resulting simple rule can be used as an efficient filter in construction of more complex poly(A) tail motifs classification algorithms.

  1. Evaluating the link between human resource management decisions and patient satisfaction with quality of care.

    Science.gov (United States)

    Oppel, Eva-Maria; Winter, Vera; Schreyögg, Jonas

    Patient satisfaction with quality of care is becoming increasingly important in the competitive hospital market. Simultaneously, the growing shortage of clinical staff poses a considerable challenge to ensuring a high quality of care. In this context, a question emerges regarding whether and how human resource management (HRM) might serve as a means to reduce staff shortage problems and to increase patient satisfaction. Although considerable efforts have been devoted to understanding the concepts of patient satisfaction and HRM, little is known about the interrelationships between these concepts or about the link between staff shortage problems and patients' satisfaction with quality of care. The aim of this study was to investigate the relationship between strategic human resource management (SHRM), staff shortage problems, and patients' satisfaction with care. Furthermore, we analyze how the HRM decision to fill short-term vacancies through temporary staffing affects patient satisfaction. We differentiate between physicians and nurses. We develop and empirically test a theoretical model. The data (n = 165) are derived from a survey on SHRM that was sent to 732 German hospitals and from a survey on patient satisfaction that comprises 436,848 patient satisfaction ratings. We use a structural equation modeling approach to test the model. The results indicate that SHRM significantly reduces staff shortage problems for both occupational groups. Having fewer physician shortage problems is significantly associated with higher levels of patient satisfaction, whereas this effect is not significant for nurses. Furthermore, the use of temporary staffing considerably reduces patients' satisfaction with care. Hospital managers are advised to consider the effects of HRM decisions on patients' satisfaction with care. In particular, investments in SHRM targeted at physicians have significantly positive effects on patient satisfaction, whereas the temporary staffing of physicians

  2. Flood Protection Decision Making Within a Coupled Human and Natural System

    Science.gov (United States)

    O'Donnell, Greg; O'Connell, Enda

    2013-04-01

    Due to the perceived threat from climate change, prediction under changing climatic and hydrological conditions has become a dominant theme of hydrological research. Much of this research has been climate model-centric, in which GCM/RCM climate projections have been used to drive hydrological system models to explore potential impacts that should inform adaptation decision-making. However, adaptation fundamentally involves how humans may respond to increasing flood and drought hazards by changing their strategies, activities and behaviours which are coupled in complex ways to the natural systems within which they live and work. Humans are major agents of change in hydrological systems, and representing human activities and behaviours in coupled human and natural hydrological system models is needed to gain insight into the complex interactions that take place, and to inform adaptation decision-making. Governments and their agencies are under pressure to make proactive investments to protect people living in floodplains from the perceived increasing flood hazard. However, adopting this as a universal strategy everywhere is not affordable, particularly in times of economic stringency and given uncertainty about future climatic conditions. It has been suggested that the assumption of stationarity, which has traditionally been invoked in making hydrological risk assessments, is no longer tenable. However, before the assumption of hydrologic nonstationarity is accepted, the ability to cope with the uncertain impacts of global warming on water management via the operational assumption of hydrologic stationarity should be carefully examined. Much can be learned by focussing on natural climate variability and its inherent changes in assessing alternative adaptation strategies. A stationary stochastic multisite flood hazard model has been developed that can exhibit increasing variability/persistence in annual maximum floods, starting with the traditional assumption of

  3. Big Data and Consumer Participation in Privacy Contracts: Deciding who Decides on Privacy

    Directory of Open Access Journals (Sweden)

    Michiel Rhoen

    2015-02-01

    Full Text Available Big data puts data protection to the test. Consumers granting permission to process their personal data are increasingly opening up their personal lives, thanks to the “datafication” of everyday life, indefinite data retention and the increasing sophistication of algorithms for analysis.The privacy implications of big data call for serious consideration of consumers’ opportunities to participate in decision-making processes about their contracts. If these opportunities are insufficient, the resulting rules may represent special interests rather than consumers’ needs. This may undermine the legitimacy of big data applications.This article argues that providing sufficient consumer participation in privacy matters requires choosing the best available decision making mechanism. Is a consumer to negotiate his own privacy terms in the market, will lawmakers step in on his behalf, or is he to seek protection through courts? Furthermore is this a matter of national law or European law? These choices will affect the opportunities for achieving different policy goals associated with the possible benefits of the “big data revolution”.

  4. Towards representing human behavior and decision making in Earth system models - an overview of techniques and approaches

    Science.gov (United States)

    Müller-Hansen, Finn; Schlüter, Maja; Mäs, Michael; Donges, Jonathan F.; Kolb, Jakob J.; Thonicke, Kirsten; Heitzig, Jobst

    2017-11-01

    Today, humans have a critical impact on the Earth system and vice versa, which can generate complex feedback processes between social and ecological dynamics. Integrating human behavior into formal Earth system models (ESMs), however, requires crucial modeling assumptions about actors and their goals, behavioral options, and decision rules, as well as modeling decisions regarding human social interactions and the aggregation of individuals' behavior. Here, we review existing modeling approaches and techniques from various disciplines and schools of thought dealing with human behavior at different levels of decision making. We demonstrate modelers' often vast degrees of freedom but also seek to make modelers aware of the often crucial consequences of seemingly innocent modeling assumptions. After discussing which socioeconomic units are potentially important for ESMs, we compare models of individual decision making that correspond to alternative behavioral theories and that make diverse modeling assumptions about individuals' preferences, beliefs, decision rules, and foresight. We review approaches to model social interaction, covering game theoretic frameworks, models of social influence, and network models. Finally, we discuss approaches to studying how the behavior of individuals, groups, and organizations can aggregate to complex collective phenomena, discussing agent-based, statistical, and representative-agent modeling and economic macro-dynamics. We illustrate the main ingredients of modeling techniques with examples from land-use dynamics as one of the main drivers of environmental change bridging local to global scales.

  5. Redefining genomic privacy: trust and empowerment.

    Directory of Open Access Journals (Sweden)

    Yaniv Erlich

    2014-11-01

    Full Text Available Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.

  6. Redefining genomic privacy: trust and empowerment.

    Science.gov (United States)

    Erlich, Yaniv; Williams, James B; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D; Witkowski, Jan A; Kain, Robert C

    2014-11-01

    Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.

  7. Second thoughts about privacy, safety and deception

    Science.gov (United States)

    Sorell, Tom; Draper, Heather

    2017-07-01

    In this paper, we point out some difficulties with interpreting three of five principles formulated at a retreat on robot ethics sponsored by the Arts and Humanities Council and the Engineering and Physical Sciences Research Council. We also attempt to iron out some conflicts between the principles. Some of the difficulties arise from the way that the autonomy of robot users - their capacity to live by their own choices - can be a goal in the design of care robots. We discuss (a) problems for Principle 2 that arise from competing legal and philosophical understandings of privacy; (b) a tension between privacy and safety (Principles 2 and 3) and (c) some scepticism about the application of Principle 4, which addresses robot design that might result in the deception of vulnerable users.

  8. Work-life Balance Decision-making of Norwegian Students: Implications for Human Resources Management

    Directory of Open Access Journals (Sweden)

    Remigiusz Gawlik

    2016-12-01

    Full Text Available Objective: The paper aims at identifying and assessing the significance of work-life balance determinants between the Youth of highly developed societies and its implications for human resources management on the example of Norway. Research Design & Methods: The research target group consists of 236 respondents recruited among Norwegian tertiary education students. It employed literature analysis, two-stage exploratory research: direct individual in-depth interviews, survey based on a self-administered, web-based questionnaire with single-answer, limited choice qualitative & quantitative, as well as explanatory research (informal moderated group discussions. Findings: The research on perceptions of determinants of quality of life and attractiveness of life strategies shows that in a country with relatively high socio-economic development level, such as Norway, differences in rankings do exist. They can be observed in relevance to both material and non-material QoL determinants. Implications & Recommendations: The study revealed a need for deeper research on individually driven early decision-making of future employees and entrepreneurs. This will result in closer modelling of socio-economic phenomena, including more accurate adaptation to trends on the labour market and creation of new business models. Contribution & Value Added: Research value added comes from the comparison of perceptions of quality of life determinants between countries at various stages of socio-economic development and its implications for human resource management.

  9. Communication and US-Somali Immigrant Human Papillomavirus (HPV) Vaccine Decision-Making.

    Science.gov (United States)

    Dailey, Phokeng M; Krieger, Janice L

    2017-09-01

    The current study uses a multiple goal theoretical perspective to explore how Somali immigrant families living in Ohio, USA, make decisions regarding whether to vaccinate their children against human papillomavirus (HPV)-a leading cause of cervical cancer. A focus was placed on the communication goals of parents in HPV vaccine discussions with their child and health care provider. Semi-structured interviews were audiotaped, transcribed, and analyzed using a grounded theory approach. Key themes are the implications of the vaccine for early sexual activity, confusion between HPV and HIV (human immunodeficiency virus), the perception that the HPV vaccine is unnecessary, uncertainty about the vaccine's efficacy and side effects, avoidance of parent-child communication about the vaccine, and a preference for framing the vaccine as a health promotion behavior. Framing the threat of HPV in the context of initiation of sexual activity, uncertainty regarding vaccine efficacy, and anticipated regret account for the inconsistency in HPV vaccine uptake among Somali parents. Clinicians should consider talking about HPV as a distal versus an immediate threat and HPV vaccine uptake as a health-promotion behavior rather than a sexually transmitted infection prevention behavior.

  10. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  11. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  12. How we learn to make decisions: rapid propagation of reinforcement learning prediction errors in humans.

    Science.gov (United States)

    Krigolson, Olav E; Hassall, Cameron D; Handy, Todd C

    2014-03-01

    Our ability to make decisions is predicated upon our knowledge of the outcomes of the actions available to us. Reinforcement learning theory posits that actions followed by a reward or punishment acquire value through the computation of prediction errors-discrepancies between the predicted and the actual reward. A multitude of neuroimaging studies have demonstrated that rewards and punishments evoke neural responses that appear to reflect reinforcement learning prediction errors [e.g., Krigolson, O. E., Pierce, L. J., Holroyd, C. B., & Tanaka, J. W. Learning to become an expert: Reinforcement learning and the acquisition of perceptual expertise. Journal of Cognitive Neuroscience, 21, 1833-1840, 2009; Bayer, H. M., & Glimcher, P. W. Midbrain dopamine neurons encode a quantitative reward prediction error signal. Neuron, 47, 129-141, 2005; O'Doherty, J. P. Reward representations and reward-related learning in the human brain: Insights from neuroimaging. Current Opinion in Neurobiology, 14, 769-776, 2004; Holroyd, C. B., & Coles, M. G. H. The neural basis of human error processing: Reinforcement learning, dopamine, and the error-related negativity. Psychological Review, 109, 679-709, 2002]. Here, we used the brain ERP technique to demonstrate that not only do rewards elicit a neural response akin to a prediction error but also that this signal rapidly diminished and propagated to the time of choice presentation with learning. Specifically, in a simple, learnable gambling task, we show that novel rewards elicited a feedback error-related negativity that rapidly decreased in amplitude with learning. Furthermore, we demonstrate the existence of a reward positivity at choice presentation, a previously unreported ERP component that has a similar timing and topography as the feedback error-related negativity that increased in amplitude with learning. The pattern of results we observed mirrored the output of a computational model that we implemented to compute reward

  13. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  14. Speech Privacy Problems

    Science.gov (United States)

    1945-08-18

    eondwious, «ach AnvoWnc either one or tiro staple m^aSattoa processes. The British teo -dimensioaai privacy system eUiissd both ire- oasaay ana time...of the 884 gas tube and ground showed that the tubs did not re- main fired throughout the duration of the 4- kc puls.e. Instead, the tube fired on...ouri’ent through the relay circuit was not sufficient to: permit its firm operation, especially when the amplitude of the 4~ kc pulse was low. This

  15. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  16. A simple artificial life model explains irrational behavior in human decision-making.

    Directory of Open Access Journals (Sweden)

    Carolina Feher da Silva

    Full Text Available Although praised for their rationality, humans often make poor decisions, even in simple situations. In the repeated binary choice experiment, an individual has to choose repeatedly between the same two alternatives, where a reward is assigned to one of them with fixed probability. The optimal strategy is to perseverate with choosing the alternative with the best expected return. Whereas many species perseverate, humans tend to match the frequencies of their choices to the frequencies of the alternatives, a sub-optimal strategy known as probability matching. Our goal was to find the primary cognitive constraints under which a set of simple evolutionary rules can lead to such contrasting behaviors. We simulated the evolution of artificial populations, wherein the fitness of each animat (artificial animal depended on its ability to predict the next element of a sequence made up of a repeating binary string of varying size. When the string was short relative to the animats' neural capacity, they could learn it and correctly predict the next element of the sequence. When it was long, they could not learn it, turning to the next best option: to perseverate. Animats from the last generation then performed the task of predicting the next element of a non-periodical binary sequence. We found that, whereas animats with smaller neural capacity kept perseverating with the best alternative as before, animats with larger neural capacity, which had previously been able to learn the pattern of repeating strings, adopted probability matching, being outperformed by the perseverating animats. Our results demonstrate how the ability to make predictions in an environment endowed with regular patterns may lead to probability matching under less structured conditions. They point to probability matching as a likely by-product of adaptive cognitive strategies that were crucial in human evolution, but may lead to sub-optimal performances in other environments.

  17. A simple artificial life model explains irrational behavior in human decision-making.

    Science.gov (United States)

    Feher da Silva, Carolina; Baldo, Marcus Vinícius Chrysóstomo

    2012-01-01

    Although praised for their rationality, humans often make poor decisions, even in simple situations. In the repeated binary choice experiment, an individual has to choose repeatedly between the same two alternatives, where a reward is assigned to one of them with fixed probability. The optimal strategy is to perseverate with choosing the alternative with the best expected return. Whereas many species perseverate, humans tend to match the frequencies of their choices to the frequencies of the alternatives, a sub-optimal strategy known as probability matching. Our goal was to find the primary cognitive constraints under which a set of simple evolutionary rules can lead to such contrasting behaviors. We simulated the evolution of artificial populations, wherein the fitness of each animat (artificial animal) depended on its ability to predict the next element of a sequence made up of a repeating binary string of varying size. When the string was short relative to the animats' neural capacity, they could learn it and correctly predict the next element of the sequence. When it was long, they could not learn it, turning to the next best option: to perseverate. Animats from the last generation then performed the task of predicting the next element of a non-periodical binary sequence. We found that, whereas animats with smaller neural capacity kept perseverating with the best alternative as before, animats with larger neural capacity, which had previously been able to learn the pattern of repeating strings, adopted probability matching, being outperformed by the perseverating animats. Our results demonstrate how the ability to make predictions in an environment endowed with regular patterns may lead to probability matching under less structured conditions. They point to probability matching as a likely by-product of adaptive cognitive strategies that were crucial in human evolution, but may lead to sub-optimal performances in other environments.

  18. Mathematical Decision Models Applied for Qualifying and Planning Areas Considering Natural Hazards and Human Dealing

    Science.gov (United States)

    Anton, Jose M.; Grau, Juan B.; Tarquis, Ana M.; Sanchez, Elena; Andina, Diego

    2014-05-01

    The authors were involved in the use of some Mathematical Decision Models, MDM, to improve knowledge and planning about some large natural or administrative areas for which natural soils, climate, and agro and forest uses where main factors, but human resources and results were important, natural hazards being relevant. In one line they have contributed about qualification of lands of the Community of Madrid, CM, administrative area in centre of Spain containing at North a band of mountains, in centre part of Iberian plateau and river terraces, and also Madrid metropolis, from an official study of UPM for CM qualifying lands using a FAO model from requiring minimums of a whole set of Soil Science criteria. The authors set first from these criteria a complementary additive qualification, and tried later an intermediate qualification from both using fuzzy logic. The authors were also involved, together with colleagues from Argentina et al. that are in relation with local planners, for the consideration of regions and of election of management entities for them. At these general levels they have adopted multi-criteria MDM, used a weighted PROMETHEE, and also an ELECTRE-I with the same elicited weights for the criteria and data, and at side AHP using Expert Choice from parallel comparisons among similar criteria structured in two levels. The alternatives depend on the case study, and these areas with monsoon climates have natural hazards that are decisive for their election and qualification with an initial matrix used for ELECTRE and PROMETHEE. For the natural area of Arroyos Menores at South of Rio Cuarto town, with at North the subarea of La Colacha, the loess lands are rich but suffer now from water erosions forming regressive ditches that are spoiling them, and use of soils alternatives must consider Soil Conservation and Hydraulic Management actions. The use of soils may be in diverse non compatible ways, as autochthonous forest, high value forest, traditional

  19. Evidence for the speed-value trade-off: human and monkey decision making is magnitude sensitive.

    Science.gov (United States)

    Pirrone, Angelo; Azab, Habiba; Hayden, Benjamin Y; Stafford, Tom; Marshall, James A R

    2018-04-01

    Complex natural systems from brains to bee swarms have evolved to make adaptive multifactorial decisions. Recent theoretical and empirical work suggests that many evolved systems may take advantage of common motifs across multiple domains. We are particularly interested in value sensitivity (i.e., sensitivity to the magnitude or intensity of the stimuli or reward under consideration) as a mechanism to resolve deadlocks adaptively. This mechanism favours long-term reward maximization over accuracy in a simple manner, because it avoids costly delays associated with ambivalence between similar options; speed-value trade-offs have been proposed to be evolutionarily advantageous for many kinds of decision. A key prediction of the value-sensitivity hypothesis is that choices between equally-valued options will proceed faster when the options have a high value than when they have a low value. However, value-sensitivity is not part of idealised choice models such as diffusion to bound. Here we examine two different choice behaviours in two different species, perceptual decisions in humans and economic choices in rhesus monkeys, to test this hypothesis. We observe the same value sensitivity in both human perceptual decisions and monkey value-based decisions. These results endorse the idea that neural decision systems make use of the same basic principle of value-sensitivity in order to resolve costly deadlocks and thus improve long-term reward intake.

  20. 78 FR 47210 - National Practitioner Data Bank and Privacy Act; Exempt Records System; Technical Correction

    Science.gov (United States)

    2013-08-05

    ... reference cited in the Privacy Act regulations. The National Practitioner Data Bank (NPDB) system of records... DEPARTMENT OF HEALTH AND HUMAN SERVICES 45 CFR Part 5b RIN 0906-AA97 National Practitioner Data Bank and Privacy Act; Exempt Records System; Technical Correction AGENCY: Health Resources and Services...

  1. 75 FR 5604 - Privacy Act of 1974; Report of an Altered System of Records

    Science.gov (United States)

    2010-02-03

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Health Resources and Services Administration Privacy Act...). SUMMARY: In accordance with the requirements of the Privacy Act of 1974, the Health Resources and Services... to include breach notification language required by Memoranda (M) 07-16, Safeguarding Against and...

  2. Friends, Connections, and Social Norms of Privacy. Do Social Network Sites Change Our Conception of Friendship?

    NARCIS (Netherlands)

    Roessler, B.

    2013-01-01

    Technological changes have always had an influence on human relationships in general, as well as more particularly on social norms of privacy - think only of Georg Simmel's observations on changing norms of privacy after the invention of the metropolitan subway and its influence on our behaviour

  3. The Nature of Belief-Directed Exploratory Choice in Human Decision-Making

    Directory of Open Access Journals (Sweden)

    W. Bradley Knox

    2012-01-01

    Full Text Available In non-stationary environments, there is a conflict between exploiting currently favored options and gaining information by exploring lesser-known options that in the past have proven less rewarding. Optimal decision making in such tasks requires considering future states of the environment (i.e., planning and properly updating beliefs about the state of environment after observing outcomes associated with choices. Optimal belief-updating is reflective in that beliefs can change without directly observing environmental change. For example, after ten seconds elapse, one might correctly believe that a traffic light last observed to be red is now more likely to be green. To understand human decision-making when rewards associated with choice options change over time, we develop a variant of the classic bandit task that is both rich enough to encompass relevant phenomena and sufficiently tractable to allow for ideal actor analysis of sequential choice behavior. We evaluate whether people update beliefs about the state of environment in a reflexive (i.e., only in response to observed changes in reward structure or reflective manner. In contrast to purely "random" accounts of exploratory behavior, model-based analyses of the subjects’ choices and latencies indicate that people are reflective belief-updaters. However, unlike the Ideal Actor model, our analyses indicate that people's choice behavior does not reflect consideration of future environmental states. Thus, although people update beliefs in a reflective manner consistent with the ideal actor, they do not engage in optimal long-term planning, but instead myopically choose the option on every trial that is believed to have the highest immediate payoff.

  4. The Nature of Belief-Directed Exploratory Choice in Human Decision-Making

    Science.gov (United States)

    Knox, W. Bradley; Otto, A. Ross; Stone, Peter; Love, Bradley C.

    2011-01-01

    In non-stationary environments, there is a conflict between exploiting currently favored options and gaining information by exploring lesser-known options that in the past have proven less rewarding. Optimal decision-making in such tasks requires considering future states of the environment (i.e., planning) and properly updating beliefs about the state of the environment after observing outcomes associated with choices. Optimal belief-updating is reflective in that beliefs can change without directly observing environmental change. For example, after 10 s elapse, one might correctly believe that a traffic light last observed to be red is now more likely to be green. To understand human decision-making when rewards associated with choice options change over time, we develop a variant of the classic “bandit” task that is both rich enough to encompass relevant phenomena and sufficiently tractable to allow for ideal actor analysis of sequential choice behavior. We evaluate whether people update beliefs about the state of environment in a reflexive (i.e., only in response to observed changes in reward structure) or reflective manner. In contrast to purely “random” accounts of exploratory behavior, model-based analyses of the subjects’ choices and latencies indicate that people are reflective belief updaters. However, unlike the Ideal Actor model, our analyses indicate that people’s choice behavior does not reflect consideration of future environmental states. Thus, although people update beliefs in a reflective manner consistent with the Ideal Actor, they do not engage in optimal long-term planning, but instead myopically choose the option on every trial that is believed to have the highest immediate payoff. PMID:22319503

  5. Toxicology research for precautionary decision-making and the role of Human & Experimental Toxicology.

    Science.gov (United States)

    Grandjean, P

    2015-12-01

    A key aim of toxicology is the prevention of adverse effects due to toxic hazards. Therefore, the dissemination of toxicology research findings must confront two important challenges: one being the lack of information on the vast majority of potentially toxic industrial chemicals and the other being the strict criteria for scientific proof usually required for decision-making in regard to prevention. The present study ascertains the coverage of environmental chemicals in four volumes of Human & Experimental Toxicology and the presentation and interpretation of research findings in published articles. Links in SciFinder showed that the 530 articles published in four selected volumes between 1984 and 2014 primarily dealt with metals (126 links) and other toxicants that have received substantial attention in the past. Thirteen compounds identified by US authorities in 2006 as high-priority substances, for which toxicology documentation is badly needed, were not covered in the journal issues at all. When reviewing published articles, reliance on p values was standard, and non-significant findings were often called 'negative.' This tradition may contribute to the perceived need to extend existing research on toxic hazards that have already been well characterized. Several sources of bias towards the null hypothesis can affect toxicology research, but are generally not considered, thus adding to the current inclination to avoid false positive findings. In this regard, toxicology is particularly prone to bias because of the known paucity of false positives and, in particular, the existence of a vast number of toxic hazards which by default are considered innocuous due to lack of documentation. The Precautionary Principle could inspire decision-making on the basis of incomplete documentation and should stimulate a change in toxicology traditions and in toxicology research publication. © The Author(s) 2015.

  6. Restructuring of Values and Probabilities: Psychological Processes in Human Decision Making under Risk

    International Nuclear Information System (INIS)

    Svenson, Ola; Salo, Ilkka

    2001-01-01

    According to Differentiation and Consolidation Theory (Diff Con), the decision maker's representations of values and probabilities are interdependent and changing over time in risky decision making. This is a clear violation of most normative theories of decision making. The present contribution will present Diff Con and provide empirical illustrations of how mental representations of values and probabilities change over time. The paper concludes with a discussion of the implications of these findings concerning expert and lay people decision making about risks and hazards

  7. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  8. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  9. Youth, Privacy and Online Media: Framing the right to privacy in public policy-making

    DEFF Research Database (Denmark)

    Hasselbalch, Gry; Jørgensen, Rikke Frank

    2015-01-01

    debate. It presents the results of a qualitative study amongst 68 Danish high school students concerning how they perceive, negotiate and control their private sphere when using social media and builds a case for utilizing the results of studies as this to inform the ongoing policy discourses concerning...... policy making that the right to privacy is challenged in new ways in a structurally transformed online public sphere, the way in which it has been framed does not seem to acknowledge this transformation. This paper therefore argues for a reformulation of “online privacy” in the current global policy......The right to privacy is a fundamental human right defined in international and regional human rights instruments. As such it has been included as a core component of key legislature and policy proceedings throughout the brief history of the World Wide Web. While it is generally recognized in public...

  10. The Role of Human Papillomavirus (HPV)-Related Stigma on HPV Vaccine Decision-Making among College Males

    Science.gov (United States)

    Jones, Georden; Perez, Samara; Huta, Veronika; Rosberger, Zeev; Lebel, Sophie

    2016-01-01

    Objective: The goals of the present study are (1) to identify sociodemographic and psychosocial predictors of human papillomavirus (HPV)-related stigma and (2) to examine the relationship between HPV-related stigma in predicting HPV vaccine decision-making among college males. Participants: Six hundred and eighty college males aged 18--26 from 3…

  11. Challenges and opportunities for judicial protection of human rights against decisions of the United Nations Security Council

    NARCIS (Netherlands)

    Hollenberg, S.J.

    2013-01-01

    The thesis deals with the responses of domestic and regional courts when they are confronted with cases concerning individuals whose human rights are interfered with due to the implementation of UNSC decisions. The UNSC may impose, for example, economic sanction measures, or place specifically

  12. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  13. Commodification and privacy: a Lockean perspective.

    Science.gov (United States)

    Volkman, Richard

    2010-09-01

    This paper defends the thesis that privacy as a right is derived from fundamental rights to life, liberty, and property and does not permit restricting the commodification of bodily material; however, privacy as life, liberty, property does require conventions that ensure a robust and just market in bodily material. The analysis proceeds by defending a general commitment to liberty and markets, but not in the manner one might expect from a 'doctrinaire' libertarian. Ethical concerns about commodification are legitimate in the context of new medical and information technologies, but these concerns are not sufficiently well defined to justify political conclusions, since not every ethical concern is in itself a political concern, and the best way to resolve certain ethical difficulties is to draw up political boundaries that facilitate the discovery and testing of various solutions to our ethical puzzles. To illustrate the point, I will indicate how privacy as life, liberty, property defines such a dynamic solution to the problems of commodification of human bodily material and slippery information in insurance markets.

  14. The Genetic Privacy Act and commentary

    Energy Technology Data Exchange (ETDEWEB)

    Annas, G.J.; Glantz, L.H.; Roche, P.A.

    1995-02-28

    The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. The DNA molecule holds an extensive amount of currently indecipherable information. The major goal of the Human Genome Project is to decipher this code so that the information it contains is accessible. The privacy question is, accessible to whom? The highly personal nature of the information contained in DNA can be illustrated by thinking of DNA as containing an individual`s {open_quotes}future diary.{close_quotes} A diary is perhaps the most personal and private document a person can create. It contains a person`s innermost thoughts and perceptions, and is usually hidden and locked to assure its secrecy. Diaries describe the past. The information in one`s genetic code can be thought of as a coded probabilistic future diary because it describes an important part of a unique and personal future. This document presents an introduction to the proposal for federal legislation `the Genetic Privacy Act`; a copy of the proposed act; and comment.

  15. The medical examination in United States immigration applications: the potential use of genetic testing leads to heightened privacy concerns.

    Science.gov (United States)

    Burroughs, A Maxwell

    2005-01-01

    The medical examination has been an integral part of the immigration application process since the passing of the Immigration Act of 1891. Failing the medical examination can result in denial of the application. Over the years the medical examination has been expanded to include questioning about diseases that are scientifically shown to be rooted in an individual's genetic makeup. Recent advances in the fields of genomics and bioinformatics are making accurate and precise screening for these conditions a reality. Government policymakers will soon be faced with decisions regarding whether or not to sanction the use of these newly-developed genetic tests in the immigration application procedure. The terror threat currently facing the United States may ultimately bolster the argument in favor of genetic testing and/or DNA collection of applicants. However, the possibility of a government mandate requiring genetic testing raises a host of ethical issues; including the threat of eugenics and privacy concerns. Genetic testing has the ability to uncover a wealth of sensitive medical information about an individual and currently there are no medical information privacy protections afforded to immigration applicants. This article examines the potential for genetic testing in the immigration application process and the ethical issues surrounding this testing. In particular, this article explores the existing framework of privacy protections afforded to individuals living in the United States and how this and newly-erected standards like those released by the Health and Human Services (HHS) might apply to individuals seeking to immigrate to the United States.

  16. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  17. Reduced sensitivity to sooner reward during intertemporal decision-making following insula damage in humans

    Directory of Open Access Journals (Sweden)

    Manuela eSellitto

    2016-01-01

    Full Text Available During intertemporal choice, humans tend to prefer small-sooner rewards over larger-delayed rewards, reflecting temporal discounting (TD of delayed outcomes. Functional neuroimaging evidence has implicated the insular cortex in time-sensitive decisions, yet it is not clear whether activity in this brain region is crucial for, or merely associated with, TD behaviour. Here, patients with damage to the insula (Insular patients, control patients with lesions outside the insula, and healthy individuals chose between smaller-sooner and larger-later monetary rewards. Insular patients were less sensitive to sooner rewards than were the control groups, exhibiting reduced TD. A Voxel-based Lesion-Symptom Mapping (VLSM analysis confirmed a statistically significant association between insular damage and reduced TD. These results indicate that the insular cortex is crucial for intertemporal choice. We suggest that he insula may be necessary to anticipate the bodily/emotional effects of receiving rewards at different delays, influencing the computation of their incentive value. Devoid of such input, insular patients’ choices would be governed by a heuristic of quantity, allowing patients to wait for larger options.

  18. Privacy at end of life in ICU: A review of the literature.

    Science.gov (United States)

    Timmins, Fiona; Parissopoulos, Stelios; Plakas, Sotirios; Naughton, Margaret T; de Vries, Jan Ma; Fouka, Georgia

    2018-06-01

    To explore the issues surrounding privacy during death in ICU. While the provision of ICU care is vital, the nature and effect of the potential lack of privacy during death and dying in ICUs have not been extensively explored. A literature search using CINAHL and Pubmed revealed articles related to privacy, death and dying in ICU. Keywords used in the search were "ICU," "Privacy," "Death" and "Dying." A combination of these terms using Boolean operators "or" or "and" revealed a total of 23 citations. Six papers were ultimately deemed suitable for inclusion in the review and were subjected to code analysis with Atlas.ti v8 QDA software. The analysis of the studies revealed eight themes, and this study presents the three key themes that were found to be recurring and strongly interconnected to the experience of privacy and death in ICU: "Privacy in ICU," "ICU environment" and "End-of-Life Care". Research has shown that patient and family privacy during the ICU hospitalisation and the provision of the circumstances that lead to an environment of privacy during and after death remains a significant challenge for ICU nurses. Family members have little or no privacy in shared room and cramped waiting rooms, while they wish to be better informed and involved in end-of-life decisions. Hence, death and dying for many patients takes place in open and/or shared spaces which is problematic in terms of both the level of privacy and respect that death ought to afford. It is best if end-of-life care in the ICU is planned and coordinated, where possible. Nurses need to become more self-reflective and aware in relation to end-of-life situations in ICU in order to develop privacy practices that are responsive to family and patient needs. © 2018 John Wiley & Sons Ltd.

  19. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  20. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  1. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  2. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  3. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  4. Investigation of the Ethical Concepts that Inform the Laws Limiting Genetic Screening in Employment Decisions: Privacy, Human Dignity, Equality, Autonomy, Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Pasquerella, Lynn; Rothstein, Lawrence E.

    2003-01-16

    The broad question addressed in our research is : What is the influence of ethical concepts on legislative outcomes? The research focuses on the important ethical concerns that surround the use of genetic information in employment matters and in American state legislatures. By analyzing the contents of hearings, interviews and advocacy documents involved in the legislative process, the research seeks to answer the question: How might the dominance of a particular ethical concept informing the discussion of a bill influence the legislative outcome?

  5. Leaking privacy and shadow profiles in online social networks.

    Science.gov (United States)

    Garcia, David

    2017-08-01

    Social interaction and data integration in the digital society can affect the control that individuals have on their privacy. Social networking sites can access data from other services, including user contact lists where nonusers are listed too. Although most research on online privacy has focused on inference of personal information of users, this data integration poses the question of whether it is possible to predict personal information of nonusers. This article tests the shadow profile hypothesis, which postulates that the data given by the users of an online service predict personal information of nonusers. Using data from a disappeared social networking site, we perform a historical audit to evaluate whether personal data of nonusers could have been predicted with the personal data and contact lists shared by the users of the site. We analyze personal information of sexual orientation and relationship status, which follow regular mixing patterns in the social network. Going back in time over the growth of the network, we measure predictor performance as a function of network size and tendency of users to disclose their contact lists. This article presents robust evidence supporting the shadow profile hypothesis and reveals a multiplicative effect of network size and disclosure tendencies that accelerates the performance of predictors. These results call for new privacy paradigms that take into account the fact that individual privacy decisions do not happen in isolation and are mediated by the decisions of others.

  6. Privacy Analysis in Mobile Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    2012-01-01

    disclosure decisions happening in ordinary human communication. Consequently, in this paper we provide insight into influential factors of human data disclosure decisions, by presenting and analysing results of an empirical investigation comprising two online surveys. We focus on the following influential...

  7. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  8. Quantifying the costs and benefits of privacy-preserving health data publishing.

    Science.gov (United States)

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. FROM ENFORCEMENT TO INTEGRATION: INFUSING ADMINISTRATIVE DECISION-MAKING WITH HUMAN RIGHTS VALUES

    Directory of Open Access Journals (Sweden)

    Jennifer Raso

    2015-02-01

    Full Text Available This article proposes an integration approach to realize human rights values within administrative agencies.  Using social assistance as a factual context, it examines how rights enforcement has become the dominant mechanism for reforming government benefits programs.  Rights enforcement is ineffective at achieving the values underlying human rights codes, however, even where enforcement occurs at administrative tribunals.  Attention must therefore be directed towards efforts to infuse individual and institutional discretion with human rights values.  Given their quasi-constitutional status, such values have a key role to play in shaping the design of administrative agencies and the everyday decisions of front-line workers.    Dans ce document, l’auteur propose une approche axée sur l’intégration des droits afin d’assurer le respect des valeurs qui sous-tendent les droits de la personne à l’intérieur des organismes administratifs. En se servant de l’aide sociale comme toile de fond, l’auteur explique que la plupart des décisions discrétionnaires prises dans le cadre de l’exécution des droits ne sont pas contestées.  Les mécanismes d’exécution des droits ne permettent pas d’assurer le respect des valeurs qui sous-tendent les droits de la personne, notamment en ce qui concerne les programmes d’avantages sociaux du gouvernement. En conséquence, il faut tenter d’intégrer ces valeurs aux décisions administratives discrétionnaires prises au niveau tant personnel qu’institutionnel. En raison de leur statut quasi constitutionnel, ces valeurs ont un rôle clé à jouer pour façonner la conception des organismes administratifs et les décisions que les travailleurs de première ligne sont appelés à prendre tous les jours.

  10. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  11. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  12. A Meta-Analysis of Blood Glucose Effects on Human Decision Making

    DEFF Research Database (Denmark)

    Orquin, Jacob L.; Kurzban, Robert

    2016-01-01

    identified 42 studies relating to 4 dimensions of decision making: willingness to pay, willingness to work, time discounting, and decision style. We did not find a uniform influence of blood glucose on decision making. Instead, we found that low levels of blood glucose increase the willingness to pay...... and willingness to work when a situation is food related, but decrease willingness to pay and work in all other situations. Low levels of blood glucose increase the future discount rate for food; that is, decision makers become more impatient, and to a lesser extent increase the future discount rate for money....... Low levels of blood glucose also increase the tendency to make more intuitive rather than deliberate decisions. However, this effect was only observed in situations unrelated to food. We conclude that blood glucose has domain-specific effects, influencing decision making differently depending...

  13. Patient Privacy in the Era of Big Data.

    Science.gov (United States)

    Kayaalp, Mehmet

    2018-01-20

    Privacy was defined as a fundamental human right in the Universal Declaration of Human Rights at the 1948 United Nations General Assembly. However, there is still no consensus on what constitutes privacy. In this review, we look at the evolution of privacy as a concept from the era of Hippocrates to the era of social media and big data. To appreciate the modern measures of patient privacy protection and correctly interpret the current regulatory framework in the United States, we need to analyze and understand the concepts of individually identifiable information, individually identifiable health information, protected health information, and de-identification. The Privacy Rule of the Health Insurance Portability and Accountability Act defines the regulatory framework and casts a balance between protective measures and access to health information for secondary (scientific) use. The rule defines the conditions when health information is protected by law and how protected health information can be de-identified for secondary use. With the advents of artificial intelligence and computational linguistics, computational text de-identification algorithms produce de-identified results nearly as well as those produced by human experts, but much faster, more consistently and basically for free. Modern clinical text de-identification systems now pave the road to big data and enable scientists to access de-identified clinical information while firmly protecting patient privacy. However, clinical text de-identification is not a perfect process. In order to maximize the protection of patient privacy and to free clinical and scientific information from the confines of electronic healthcare systems, all stakeholders, including patients, health institutions and institutional review boards, scientists and the scientific communities, as well as regulatory and law enforcement agencies must collaborate closely. On the one hand, public health laws and privacy regulations define rules

  14. Neural Systems Responding to Degrees of Uncertainty in Human Decision-Making

    OpenAIRE

    Hsu, Ming; Bhatt, Meghana; Adolphs, Ralph; Tranel, Daniel; Camerer, Colin F.

    2005-01-01

    Much is known about how people make decisions under varying levels of probability (risk). Less is known about the neural basis of decision-making when probabilities are uncertain because of missing information (ambiguity). In decision theory, ambiguity about probabilities should not affect choices. Using functional brain imaging, we show that the level of ambiguity in choices correlates positively with activation in the amygdala and orbitofrontal cortex, and negatively with a striatal system....

  15. Information processing and strategic decision-making in small and medium-sized enterprises : The role of human and social capital in attaining decision effectiveness

    NARCIS (Netherlands)

    Jansen, R.J.G.; Curseu, P.L.; Vermeulen, P.A.M.; Geurts, J.L.A.; Gibcus, P.

    2013-01-01

    The decision-making literature emphasizes that in high-stake decisions the characteristics of individual decision-makers, their interpretation of decision situations, and their social ties play an important role in decision outcomes. Despite these results, research on small- and medium-sized

  16. Restructuring of Values and Probabilities: Psychological Processes in Human Decision Making under Risk

    Energy Technology Data Exchange (ETDEWEB)

    Svenson, Ola; Salo, Ilkka [Stockholm Univ. (Sweden). Dept. of Psychology

    2001-07-01

    According to Differentiation and Consolidation Theory (Diff Con), the decision maker's representations of values and probabilities are interdependent and changing over time in risky decision making. This is a clear violation of most normative theories of decision making. The present contribution will present Diff Con and provide empirical illustrations of how mental representations of values and probabilities change over time. The paper concludes with a discussion of the implications of these findings concerning expert and lay people decision making about risks and hazards.

  17. (IN-PRIVACY IN MOBILE APPS. CUSTOMER OPPORTUNITIES

    Directory of Open Access Journals (Sweden)

    Yu.S. Chemerkina

    2016-01-01

    Full Text Available Subject of Study. The paper presents the results of an investigation of cross-platform mobile applications. This paper focuses on a cross-platform app data investigation in purpose of creating a database that helps to make decisions from data privacy viewpoint. These decisions refer to knowledge about mobile apps that are available to the public, especially on how consumer data is protected while it is stored locally or transferred via network as well as what type of data may leak. Methods. This paper proposes a forensics methodology as a cornerstone of an app data investigation process. The object of research is an application data protection under different security control types among modern mobile OS. The subject of research is a modification of forensics approach and behavioral analysis to examine application data privacy in order to find data that are not properly handled by applications which lead to data leakages, defining protection control type without forensics limits. In addition, this paper relies on using the simplest tools, proposing a limit to examine locally stored data and transmitted over the network to cover all data, excluding memory and code analysis unless it is valuable (behavioral analysis. The research methods of the tasks set in the paper include digital forensics approach methods depending on data conception (at-rest, in-use/memory, in-transit with behavioral analysis of application, and static and dynamic application code analysis. Main Results. The research was carried out for the scope of that thesis, and the following scientific results were obtained. First, the methods used to investigate the privacy of application data allow considering application features and protection code design and flaws in the context of incomplete user awareness about the privacy state due to external activity of the developer. Second, the knowledge set about facts of application data protection that allows making a knowledge database to

  18. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  19. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang; Papadimitriou, Panagiotis D.; Raï ssi, Chedy; Kalnis, Panos; Pung, Hungkeng

    2011-01-01

    an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data

  20. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  1. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  2. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  3. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  4. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  5. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  6. Privacy concerns in smart cities

    OpenAIRE

    van Zoonen, Liesbet

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in research about people's concerns about privacy: one dimensions represents that people perceive particular data as more personal and sensitive than others, the other dimension represents that people'...

  7. Minocycline Modulates Human Social Decision-Making: Possible Impact of Microglia on Personality-Oriented Social Behaviors

    Science.gov (United States)

    Tsuboi, Sho; Ishikawa, Katsuhiko; Hashiya, Kazuhide; Monji, Akira; Utsumi, Hideo; Kanba, Shigenobu

    2012-01-01

    Background Microglia, one of the glial cells, play important roles in various brain pathologies including psychiatric disorders. In addition, microglia have recently been proved to monitor synaptic reactions via direct-touching even in normal brain. Human microglia may modulate various social/mental functions, while microglial social/mental roles remain unresolved especially in healthy humans. There is no known drug with the specific effect of modulating microglia. Therefore, using minocycline, a tetracycline antibiotic and the most famous microglial inhibitor, is one of the best alternative approaches to clarify microglial functions on human social/mental activities. Methodology/Principal Findings We conducted a double-blind randomized trial of trust game, a monetary decision-making experiment, with ninety-nine human adult males who decided how much to trust an anonymous partner after a four-day administration of minocycline. Our previous pilot trial indicated a positive effect of minocycline, while the underlying mechanisms were not clarified. Therefore, in this trial with larger samples, we additionally measured the effects of anxiety and personality. The monetary score in trust game was significantly lower in the minocycline group. Interestingly, participants’ ways of decision-making were significantly shifted; cooperativeness, one component of personality, proved to be the main modulating factor of decision-making in the placebo group, on the other hand, the minocycline group was mainly modulated by state anxiety and trustworthiness. Conclusions/Significance Our results suggest that minocycline led to more situation-oriented decision-making, possibly by suppressing the effects of personality traits, and furthermore that personality and social behaviors might be modulated by microglia. Early-life events may activate human microglia, establish a certain neuro-synaptic connection, and this formation may determine each human’s personality and personality

  8. Cortical and hippocampal correlates of deliberation during model-based decisions for rewards in humans.

    Directory of Open Access Journals (Sweden)

    Aaron M Bornstein

    Full Text Available How do we use our memories of the past to guide decisions we've never had to make before? Although extensive work describes how the brain learns to repeat rewarded actions, decisions can also be influenced by associations between stimuli or events not directly involving reward - such as when planning routes using a cognitive map or chess moves using predicted countermoves - and these sorts of associations are critical when deciding among novel options. This process is known as model-based decision making. While the learning of environmental relations that might support model-based decisions is well studied, and separately this sort of information has been inferred to impact decisions, there is little evidence concerning the full cycle by which such associations are acquired and drive choices. Of particular interest is whether decisions are directly supported by the same mnemonic systems characterized for relational learning more generally, or instead rely on other, specialized representations. Here, building on our previous work, which isolated dual representations underlying sequential predictive learning, we directly demonstrate that one such representation, encoded by the hippocampal memory system and adjacent cortical structures, supports goal-directed decisions. Using interleaved learning and decision tasks, we monitor predictive learning directly and also trace its influence on decisions for reward. We quantitatively compare the learning processes underlying multiple behavioral and fMRI observables using computational model fits. Across both tasks, a quantitatively consistent learning process explains reaction times, choices, and both expectation- and surprise-related neural activity. The same hippocampal and ventral stream regions engaged in anticipating stimuli during learning are also engaged in proportion to the difficulty of decisions. These results support a role for predictive associations learned by the hippocampal memory system to

  9. Mum's the Word: Feds Are Serious About Protecting Patients' Privacy.

    Science.gov (United States)

    Conde, Crystal

    2010-08-01

    The Health Information Technology for Economic and Clinical Health (HITECH) Act significantly changes HIPAA privacy and security policies that affect physicians. Chief among the changes are the new breach notification regulations, developed by the U.S. Department of Health and Human Services Office for Civil Rights. The Texas Medical Association has developed resources to help physicians comply with the new HIPAA regulations.

  10. Environmental psychology, Privacy in the workplace (analysis of ...

    African Journals Online (AJOL)

    Work environment in the organization is one of important issues that is important all the time and the importance of and how to create a conducive environment and efficient human resources is emphasized; An environment with the proper definition of privacy and jurisdiction, can increase the growth and productivity of ...

  11. Security and privacy issues in implantable medical devices: A comprehensive survey.

    Science.gov (United States)

    Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E

    2015-06-01

    Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Predicting human decisions in socioeconomic interaction using real-time functional magnetic resonance imaging (rtfMRI)

    Science.gov (United States)

    Hollmann, Maurice; Mönch, Tobias; Müller, Charles; Bernarding, Johannes

    2009-02-01

    A major field in cognitive neuroscience investigates neuronal correlates of human decision-making processes [1, 2]. Is it possible to predict a decision before it is actually revealed by the volunteer? In the presented manuscript we use a standard paradigm from economic behavioral research that proved emotional influences on human decision making: the Ultimatum Game (UG). In the UG, two players have the opportunity to split a sum of money. One player is deemed the proposer and the other, the responder. The proposer makes an offer as to how this money should be split between the two. The second player can either accept or reject this offer. If it is accepted, the money is split as proposed. If rejected, then neither player receives anything. In the presented study a real-time fMRI system was used to derive the brain activation of the responder. Using a Relevance-Vector-Machine classifier it was possible to predict if the responder will accept or reject an offer. The classification result was presented to the operator 1-2 seconds before the volunteer pressed a button to convey his decision. The classification accuracy reached about 70% averaged over six subjects.

  13. Going it Alone or Working as Part of a Team: The Impact of Human Capital on Entrepreneurial Decision Making

    Directory of Open Access Journals (Sweden)

    Esther Hormiga

    2017-01-01

    Full Text Available This paper endeavours to measure the effect that human capital has on the decision taken by the entrepreneur to pursue new venture creation either in a lone capacity or collaboratively. Based on a survey of 130 entrepreneurs from 130 new ventures in Canary Island, Spain, this study applies a logit model to investigate the research relationships. The results show that three factors (experience, social perception and extrinsic motivation are significant in the decision to initiate a new venture either in a lone capacity or as part of a collaborative undertaking. The results indicate that previous experience holds the greatest significance on the decision taken by entrepreneurs to ‘go it alone’, with factors relating to social perception and extrinsic motivation chiefly predicting a decision to work collaboratively. The findings of this study provide new insight and evidence with regard to the factors that influence a key decision in the start-up process: that of continuing in a lone capacity, or proceeding as part of an entrepreneurial team.

  14. 76 FR 4436 - Privacy Act of 1974; Report of Modified or Altered System of Records

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Privacy Act of... following Breach Response Routine Use Language to comply with the Office of Management and Budget [[Page 4437

  15. 75 FR 17937 - Privacy Act of 1974; Deletion of an Existing System of Records

    Science.gov (United States)

    2010-04-08

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Health Resources and Services Administration Privacy Act... Clinician Recruitment and Service (BCRS), Health Resources and Services Administration (HRSA), 5600 Fishers... Administrator, Bureau of Clinician Recruitment and Service (BCRS), Health Resources and Services Administration...

  16. Forensic DNA phenotyping: Developing a model privacy impact assessment.

    Science.gov (United States)

    Scudder, Nathan; McNevin, Dennis; Kelty, Sally F; Walsh, Simon J; Robertson, James

    2018-05-01

    Forensic scientists around the world are adopting new technology platforms capable of efficiently analysing a larger proportion of the human genome. Undertaking this analysis could provide significant operational benefits, particularly in giving investigators more information about the donor of genetic material, a particularly useful investigative lead. Such information could include predicting externally visible characteristics such as eye and hair colour, as well as biogeographical ancestry. This article looks at the adoption of this new technology from a privacy perspective, using this to inform and critique the application of a Privacy Impact Assessment to this emerging technology. Noting the benefits and limitations, the article develops a number of themes that would influence a model Privacy Impact Assessment as a contextual framework for forensic laboratories and law enforcement agencies considering implementing forensic DNA phenotyping for operational use. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. A Meta-Analysis of Blood Glucose Effects on Human Decision Making

    DEFF Research Database (Denmark)

    Orquin, Jacob L.; Kurzban, Robert

    2016-01-01

    The academic and public interest in blood glucose and its relationship to decision making has been increasing over the last decade. To investigate and evaluate competing theories about this relationship, we conducted a psychometric meta-analysis on the effect of blood glucose on decision making. We...... and willingness to work when a situation is food related, but decrease willingness to pay and work in all other situations. Low levels of blood glucose increase the future discount rate for food; that is, decision makers become more impatient, and to a lesser extent increase the future discount rate for money...

  18. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.

    Science.gov (United States)

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-06-12

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan-Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities.

  19. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection †

    Science.gov (United States)

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-01-01

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan–Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities. PMID:28604628

  20. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  1. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  2. Human factors issues in severe accident management: Training for decision-making under stress

    International Nuclear Information System (INIS)

    Mumaw, R.J.; Roth, E.M.; Schoenfeld, I.

    1994-01-01

    Training for operator and other technical positions in the commercial nuclear power industry traditionally has focused on mastery of the formal procedures used to control plant systems and processes. However, there is a growing awareness that the decision-making tasks required for selecting appropriate control actions, in addition to guidance from formal procedures, also involve cognitive activities commonly referred to as judgment or reasoning. A project was completed to address the nature of the cognitive skills that may be important to decision-making in the nuclear power plant environment, especially during severe accident management. The project identified a model of decision-making that could account for both rule-based and knowledge-based decision-making and used it to identify cognitive skills for both individuals and operational crews. This analysis was then used to identify existing training techniques for cognitive skills and the general characteristics of successful training techniques

  3. Studies and Analyses of Aided Adversarial Decision Making. Phase 2: Research on Human Trust in Automation

    National Research Council Canada - National Science Library

    Llinas, James

    1998-01-01

    .... Given that offensive IW operations may interfere with automated, data-fusion based decision aids, it is necessary to understand how personnel may rely on or trust these aids when appropriate (e.g...

  4. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.

    Science.gov (United States)

    De Moor, G J E; Claerhout, B; De Meyer, F

    2003-01-01

    To introduce some of the privacy protection problems related to genomics based medicine and to highlight the relevance of Trusted Third Parties (TTPs) and of Privacy Enhancing Techniques (PETs) in the restricted context of clinical research and statistics. Practical approaches based on two different pseudonymisation models, both for batch and interactive data collection and exchange, are described and analysed. The growing need of managing both clinical and genetic data raises important legal and ethical challenges. Protecting human rights in the realm of privacy, while optimising research potential and other statistical activities is a challenge that can easily be overcome with the assistance of a trust service provider offering advanced privacy enabling/enhancing solutions. As such, the use of pseudonymisation and other innovative Privacy Enhancing Techniques can unlock valuable data sources.

  5. How do principles for human-centred automation apply to Disruption Management Decision Support?

    OpenAIRE

    Golightly, David; Dadashi, Nastaran

    2016-01-01

    While automation of signal and route setting is routine, the use of automation or decision support in disruption management processes is far less common. Such support offers significant advantages in optimising re-planning of both timetable and resources (crew and rolling stock), and has value in offering a 'shared view' of re-planning across the many actors manage disruption. If this vision is to be realised, however, disruption management decision support and automation must adhere to prove...

  6. Metric Sex Determination of the Human Coxal Bone on a Virtual Sample using Decision Trees.

    Science.gov (United States)

    Savall, Frédéric; Faruch-Bilfeld, Marie; Dedouit, Fabrice; Sans, Nicolas; Rousseau, Hervé; Rougé, Daniel; Telmon, Norbert

    2015-11-01

    Decision trees provide an alternative to multivariate discriminant analysis, which is still the most commonly used in anthropometric studies. Our study analyzed the metric characterization of a recent virtual sample of 113 coxal bones using decision trees for sex determination. From 17 osteometric type I landmarks, a dataset was built with five classic distances traditionally reported in the literature and six new distances selected using the two-step ratio method. A ten-fold cross-validation was performed, and a decision tree was established on two subsamples (training and test sets). The decision tree established on the training set included three nodes and its application to the test set correctly classified 92% of individuals. This percentage was similar to the data of the literature. The usefulness of decision trees has been demonstrated in numerous fields. They have been already used in sex determination, body mass prediction, and ancestry estimation. This study shows another use of decision trees enabling simple and accurate sex determination. © 2015 American Academy of Forensic Sciences.

  7. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  8. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  9. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-093)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  10. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  11. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  12. 78 FR 77503 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-23

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-149] Privacy Act of 1974; Privacy Act... proposed revisions to existing Privacy Act systems of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  13. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2012-11-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-100] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  14. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  15. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  16. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  17. SIED, a Data Privacy Engineering Framework

    OpenAIRE

    Mivule, Kato

    2013-01-01

    While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holist...

  18. Privacy and Data-Based Research

    OpenAIRE

    Ori Heffetz; Katrina Ligett

    2013-01-01

    What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases...

  19. PriBots: Conversational Privacy with Chatbots

    OpenAIRE

    Harkous, Hamza; Fawaz, Kassem; Shin, Kang G.; Aberer, Karl

    2016-01-01

    Traditional mechanisms for delivering notice and enabling choice have so far failed to protect users’ privacy. Users are continuously frustrated by complex privacy policies, unreachable privacy settings, and a multitude of emerging standards. The miniaturization trend of smart devices and the emergence of the Internet of Things (IoTs) will exacerbate this problem further. In this paper, we propose Conversational Privacy Bots (PriBots) as a new way of delivering notice and choice through a two...

  20. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  1. Reward and decision processes in the brains of humans and nonhuman primates.

    Science.gov (United States)

    Sirigu, Angela; Duhamel, Jean-René

    2016-03-01

    Choice behavior requires weighing multiple decision variables, such as utility, uncertainty, delay, or effort, that combine to define a subjective value for each considered option or course of action. This capacity is based on prior learning about potential rewards (and punishments) that result from prior actions. When made in a social context, decisions can involve strategic thinking about the intentions of others and about the impact of others' behavior on one's own outcome. Valuation is also influenced by different emotions that serve to adaptively regulate our choices in order to, for example, stay away from excessively risky gambles, prevent future regrets, or avoid personal rejection or conflicts. Drawing on economic theory and on advances in the study of neuronal mechanisms, we review relevant recent experiments in nonhuman primates and clinical observations made in neurologically impaired patients suffering from impaired decision-making capacities.

  2. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  3. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  4. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  5. Human Decisions in Moral Dilemmas are Largely Described by Utilitarianism: Virtual Car Driving Study Provides Guidelines for Autonomous Driving Vehicles.

    Science.gov (United States)

    Faulhaber, Anja K; Dittmer, Anke; Blind, Felix; Wächter, Maximilian A; Timm, Silja; Sütfeld, Leon R; Stephan, Achim; Pipa, Gordon; König, Peter

    2018-01-22

    Ethical thought experiments such as the trolley dilemma have been investigated extensively in the past, showing that humans act in utilitarian ways, trying to cause as little overall damage as possible. These trolley dilemmas have gained renewed attention over the past few years, especially due to the necessity of implementing moral decisions in autonomous driving vehicles (ADVs). We conducted a set of experiments in which participants experienced modified trolley dilemmas as drivers in virtual reality environments. Participants had to make decisions between driving in one of two lanes where different obstacles came into view. Eventually, the participants had to decide which of the objects they would crash into. Obstacles included a variety of human-like avatars of different ages and group sizes. Furthermore, the influence of sidewalks as potential safe harbors and a condition implicating self-sacrifice were tested. Results showed that participants, in general, decided in a utilitarian manner, sparing the highest number of avatars possible with a limited influence by the other variables. Derived from these findings, which are in line with the utilitarian approach in moral decision making, it will be argued for an obligatory ethics setting implemented in ADVs.

  6. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  7. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  8. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  9. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  10. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  11. 49 CFR 10.13 - Privacy Officer.

    Science.gov (United States)

    2010-10-01

    ... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13...

  12. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  13. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  14. Human-factors engineering for smart transport: Decision support for car drivers and train traffic controllers

    NARCIS (Netherlands)

    Lenior, D.; Janssen, W.H.; Neerincx, M.A.; Schreibers, K.

    2006-01-01

    The theme Smart Transport can be described as adequate human-system symbiosis to realize effective, efficient and human-friendly transport of goods and information. This paper addresses how to attune automation to human (cognitive) capacities (e.g. to take care of information uncertainty, operator

  15. Workload-Adaptive Human Interface to Aid Robust Decision Making in Human-System Interface. Year 1 Report

    Science.gov (United States)

    2014-04-30

    communicates the recommended films to the human before the human can complete the subsequent movie selection task (i.e., displays this information on...route creation game–titled Space Navigator, shown in Figure 6–inspired by others in the genre such as Harbor Master (Imangi Studios, L.L.C., 2011

  16. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  17. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  18. Location Privacy with Randomness Consistency

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-10-01

    Full Text Available Location-Based Social Network (LBSN applications that support geo-location-based posting and queries to provide location-relevant information to mobile users are increasingly popular, but pose a location-privacy risk to posts. We investigated existing LBSNs and location privacy mechanisms, and found a powerful potential attack that can accurately locate users with relatively few queries, even when location data is well secured and location noise is applied. Our technique defeats previously proposed solutions including fake-location detection and query rate limits.

  19. Beyond Lawrence v. Texas: crafting a fundamental right to sexual privacy.

    Science.gov (United States)

    Fasullo, Kristin

    2009-05-01

    After the watershed 2003 U.S. Supreme Court decision Lawrence v.Texas, courts are faced with the daunting task of navigating the bounds of sexual privacy in light of Lawrence's sweeping language and unconventional structure. This Note focuses on the specific issue of state governments regulating sexual device distribution. Evaluating the substantive due process rights of sexual device retailers and users, this Note ultimately argues that the privacy interest identified in Lawrence is sufficiently broad to protect intimate decisions to engage in adult consensual sexual behavior, including the liberty to sell, purchase, and use a sexual device.

  20. 75 FR 9012 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/U.S. Department of Health and...

    Science.gov (United States)

    2010-02-26

    ... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0052] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ U.S. Department of Health and Human Services (HHS), Administration for...

  1. The Influence of Religiosity and Spirituality on Rural Parents' Health Decision Making and Human Papillomavirus Vaccine Choices.

    Science.gov (United States)

    Thomas, Tami; Blumling, Amy; Delaney, Augustina

    2015-01-01

    General health implications of religiosity and spirituality on health have been associated with health promotion, so the purpose of this study was to examine the influence of religiosity and spirituality on rural parents' decision making to vaccinate their children against human papillomavirus (HPV). The associations of religiosity and spirituality with parental HPV vaccine decisions were examined in a sample of parents residing in small rural communities (N = 37). Parents of children aged 9 to 13 years participated in focus groups held in rural community contexts. Religiosity (i.e., participation in religious social structures) was a recurring and important theme when discussing HPV vaccination. Spirituality (i.e., subjective commitment to spiritual or religious beliefs) was found to influence the ways in which parents perceived their control over and coping with health issues potentially related to HPV vaccination. Together, religiosity and spirituality were found to play integral roles in these parents' lives and influenced their attitudes toward HPV vaccination uptake for their children.

  2. Information transmission via movement behaviour improves decision accuracy in human groups

    NARCIS (Netherlands)

    Clément, R.J.G.; Wolf, Max; Snijders, Lysanne; Krause, Jens; Kurvers, R.H.J.M.

    2015-01-01

    A major advantage of group living is increased decision accuracy. In animal groups information is often transmitted via movement. For example, an individual quickly moving away from its group may indicate approaching predators. However, individuals also make mistakes which can initiate

  3. Information transmission via movement behaviour improves decision accuracy in human groups

    NARCIS (Netherlands)

    Clément, Romain J.G.; Wolf, Max; Snijders, Lysanne; Krause, Jens; Kurvers, Ralf H.J.M.

    2015-01-01

    A major advantage of group living is increased decision accuracy. In animal groups information is often transmitted via movement. For example, an individual quickly moving away from its group may indicate approaching predators. However, individuals also make mistakes which can initiate information

  4. Overview 2010 of ARL Program on Network Science for Human Decision Making

    Science.gov (United States)

    2011-01-01

    pressure and subliminal seduction; but always through a sequence of decisions, either conscious or not. Network characteristics cannot be deduced from the...Time, Communication , and the Nervous System”, in Norbert Wiener: Collected Works, Volume IV, pp.220-252, The MIT Press, Cambridge, MA (1985). 16. P

  5. What changes are there in decisions by the Wits Human Research ...

    African Journals Online (AJOL)

    Objective. A retrospective examination of numbers of applications, decision rates, and process errors in 2015 was done for comparison with earlier studies to understand current ethics secretariat workload. Methods. In December 2015 information from committee minutes of all the meetings (N=11) in 2015 (January ...

  6. Cortical network dynamics of perceptual decision-making in the human brain

    NARCIS (Netherlands)

    Siegel, M.; Engel, A.K.; Donner, T.H.

    2011-01-01

    Goal-directed behavior requires the flexible transformation of sensory evidence about our environment into motor actions. Studies of perceptual decision-making have shown that this transformation is distributed across several widely separated brain regions. Yet, little is known about how

  7. Heuristic Decision-Making for Human-aware Navigation in Domestic Environments

    OpenAIRE

    Kirsch , Alexandra

    2016-01-01

    International audience; Robot navigation in domestic environments is still a challenge. This paper introduces a cognitively inspired decision-making method and an instantiation of it for (local) robot navigation in spatially constrained environments. We compare the method to two existing local planners with respect to efficiency, safety and legibility.

  8. Sex differences in the functional lateralization of emotion and decision making in the human brain.

    Science.gov (United States)

    Reber, Justin; Tranel, Daniel

    2017-01-02

    Dating back to the case of Phineas Gage, decades of neuropsychological research have shown that the ventromedial prefrontal cortex (vmPFC) is crucial to both real-world social functioning and abstract decision making in the laboratory (see, e.g., Stuss et al., ; Bechara et al., 1994; Damasio et al., ). Previous research has shown that the relationship between the laterality of individuals' vmPFC lesions and neuropsychological performance is moderated by their sex, whereby there are more severe social, emotional, and decision-making impairments in men with right-side vmPFC lesions and in women with left-side vmPFC lesions (Tranel et al., 2005; Sutterer et al., 2015). We conducted a selective review of studies examining the effect of vmPFC lesions on emotion and decision making and found further evidence of sex-related differences in the lateralization of function not only in the vmPFC but also in other neurological structures associated with decision making and emotion. This Mini-Review suggests that both sex and laterality effects warrant more careful consideration in the scientific literature. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  9. A decision support system and rule-based algorithm to augment the human interpretation of the 12-lead electrocardiogram.

    Science.gov (United States)

    Cairns, Andrew W; Bond, Raymond R; Finlay, Dewar D; Guldenring, Daniel; Badilini, Fabio; Libretti, Guido; Peace, Aaron J; Leslie, Stephen J

    The 12-lead Electrocardiogram (ECG) has been used to detect cardiac abnormalities in the same format for more than 70years. However, due to the complex nature of 12-lead ECG interpretation, there is a significant cognitive workload required from the interpreter. This complexity in ECG interpretation often leads to errors in diagnosis and subsequent treatment. We have previously reported on the development of an ECG interpretation support system designed to augment the human interpretation process. This computerised decision support system has been named 'Interactive Progressive based Interpretation' (IPI). In this study, a decision support algorithm was built into the IPI system to suggest potential diagnoses based on the interpreter's annotations of the 12-lead ECG. We hypothesise semi-automatic interpretation using a digital assistant can be an optimal man-machine model for ECG interpretation. To improve interpretation accuracy and reduce missed co-abnormalities. The Differential Diagnoses Algorithm (DDA) was developed using web technologies where diagnostic ECG criteria are defined in an open storage format, Javascript Object Notation (JSON), which is queried using a rule-based reasoning algorithm to suggest diagnoses. To test our hypothesis, a counterbalanced trial was designed where subjects interpreted ECGs using the conventional approach and using the IPI+DDA approach. A total of 375 interpretations were collected. The IPI+DDA approach was shown to improve diagnostic accuracy by 8.7% (although not statistically significant, p-value=0.1852), the IPI+DDA suggested the correct interpretation more often than the human interpreter in 7/10 cases (varying statistical significance). Human interpretation accuracy increased to 70% when seven suggestions were generated. Although results were not found to be statistically significant, we found; 1) our decision support tool increased the number of correct interpretations, 2) the DDA algorithm suggested the correct

  10. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  11. Reinforcement learning signals in the human striatum distinguish learners from nonlearners during reward-based decision making.

    Science.gov (United States)

    Schönberg, Tom; Daw, Nathaniel D; Joel, Daphna; O'Doherty, John P

    2007-11-21

    The computational framework of reinforcement learning has been used to forward our understanding of the neural mechanisms underlying reward learning and decision-making behavior. It is known that humans vary widely in their performance in decision-making tasks. Here, we used a simple four-armed bandit task in which subjects are almost evenly split into two groups on the basis of their performance: those who do learn to favor choice of the optimal action and those who do not. Using models of reinforcement learning we sought to determine the neural basis of these intrinsic differences in performance by scanning both groups with functional magnetic resonance imaging. We scanned 29 subjects while they performed the reward-based decision-making task. Our results suggest that these two groups differ markedly in the degree to which reinforcement learning signals in the striatum are engaged during task performance. While the learners showed robust prediction error signals in both the ventral and dorsal striatum during learning, the nonlearner group showed a marked absence of such signals. Moreover, the magnitude of prediction error signals in a region of dorsal striatum correlated significantly with a measure of behavioral performance across all subjects. These findings support a crucial role of prediction error signals, likely originating from dopaminergic midbrain neurons, in enabling learning of action selection preferences on the basis of obtained rewards. Thus, spontaneously observed individual differences in decision making performance demonstrate the suggested dependence of this type of learning on the functional integrity of the dopaminergic striatal system in humans.

  12. A clinical decision support system for integrating tuberculosis and HIV care in Kenya: a human-centered design approach.

    Science.gov (United States)

    Catalani, Caricia; Green, Eric; Owiti, Philip; Keny, Aggrey; Diero, Lameck; Yeung, Ada; Israelski, Dennis; Biondich, Paul

    2014-01-01

    With the aim of integrating HIV and tuberculosis care in rural Kenya, a team of researchers, clinicians, and technologists used the human-centered design approach to facilitate design, development, and deployment processes of new patient-specific TB clinical decision support system for medical providers. In Kenya, approximately 1.6 million people are living with HIV and have a 20-times higher risk of dying of tuberculosis. Although tuberculosis prevention and treatment medication is widely available, proven to save lives, and prioritized by the World Health Organization, ensuring that it reaches the most vulnerable communities remains challenging. Human-centered design, used in the fields of industrial design and information technology for decades, is an approach to improving the effectiveness and impact of innovations that has been scarcely used in the health field. Using this approach, our team followed a 3-step process, involving mixed methods assessment to (1) understand the situation through the collection and analysis of site observation sessions and key informant interviews; (2) develop a new clinical decision support system through iterative prototyping, end-user engagement, and usability testing; and, (3) implement and evaluate the system across 24 clinics in rural West Kenya. Through the application of this approach, we found that human-centered design facilitated the process of digital innovation in a complex and resource-constrained context.

  13. A clinical decision support system for integrating tuberculosis and HIV care in Kenya: a human-centered design approach.

    Directory of Open Access Journals (Sweden)

    Caricia Catalani

    Full Text Available With the aim of integrating HIV and tuberculosis care in rural Kenya, a team of researchers, clinicians, and technologists used the human-centered design approach to facilitate design, development, and deployment processes of new patient-specific TB clinical decision support system for medical providers. In Kenya, approximately 1.6 million people are living with HIV and have a 20-times higher risk of dying of tuberculosis. Although tuberculosis prevention and treatment medication is widely available, proven to save lives, and prioritized by the World Health Organization, ensuring that it reaches the most vulnerable communities remains challenging. Human-centered design, used in the fields of industrial design and information technology for decades, is an approach to improving the effectiveness and impact of innovations that has been scarcely used in the health field. Using this approach, our team followed a 3-step process, involving mixed methods assessment to (1 understand the situation through the collection and analysis of site observation sessions and key informant interviews; (2 develop a new clinical decision support system through iterative prototyping, end-user engagement, and usability testing; and, (3 implement and evaluate the system across 24 clinics in rural West Kenya. Through the application of this approach, we found that human-centered design facilitated the process of digital innovation in a complex and resource-constrained context.

  14. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  15. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  16. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  17. Toward a Model of Human Information Processing for Decision-Making and Skill Acquisition in Laparoscopic Colorectal Surgery.

    Science.gov (United States)

    White, Eoin J; McMahon, Muireann; Walsh, Michael T; Coffey, J Calvin; O Sullivan, Leonard

    To create a human information-processing model for laparoscopic surgery based on already established literature and primary research to enhance laparoscopic surgical education in this context. We reviewed the literature for information-processing models most relevant to laparoscopic surgery. Our review highlighted the necessity for a model that accounts for dynamic environments, perception, allocation of attention resources between the actions of both hands of an operator, and skill acquisition and retention. The results of the literature review were augmented through intraoperative observations of 7 colorectal surgical procedures, supported by laparoscopic video analysis of 12 colorectal procedures. The Wickens human information-processing model was selected as the most relevant theoretical model to which we make adaptions for this specific application. We expanded the perception subsystem of the model to involve all aspects of perception during laparoscopic surgery. We extended the decision-making system to include dynamic decision-making to account for case/patient-specific and surgeon-specific deviations. The response subsystem now includes dual-task performance and nontechnical skills, such as intraoperative communication. The memory subsystem is expanded to include skill acquisition and retention. Surgical decision-making during laparoscopic surgery is the result of a highly complex series of processes influenced not only by the operator's knowledge, but also patient anatomy and interaction with the surgical team. Newer developments in simulation-based education must focus on the theoretically supported elements and events that underpin skill acquisition and affect the cognitive abilities of novice surgeons. The proposed human information-processing model builds on established literature regarding information processing, accounting for a dynamic environment of laparoscopic surgery. This revised model may be used as a foundation for a model describing robotic

  18. Student Data Privacy Communications Toolkit

    Science.gov (United States)

    Foundation for Excellence in Education, 2016

    2016-01-01

    Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…

  19. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  20. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  1. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  2. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  3. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  4. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  5. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of 1954.'' are added at the end of the definition of Act. [FR Doc. 2013-18535 Filed 7...

  6. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  7. Protecting Your Child's Privacy Online

    Science.gov (United States)

    ... Keeping Up With Kids' Apps infographic Kids and Computer Security Kids and Mobile Phones Kids and Socializing Online ... email Looking for business guidance on privacy and ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...

  8. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  9. Workshop--E-leaks: the privacy of health information in the age of electronic information.

    Science.gov (United States)

    Vonn, Michael; Lang, Renée; Perras, Maude

    2011-10-01

    This workshop examined some of the new challenges to health-related privacy emerging as a result of the proliferation of electronic communications and data storage, including through social media, electronic health records and ready access to personal information on the internet. The right to privacy is a human right. As such, protecting privacy and enforcing the duty of confidentiality regarding health information are fundamental to treating people with autonomy, dignity and respect. For people living with HIV, unauthorized disclosure of their status can lead to discrimination and breaches of other human rights. While this is not new, in this information age a new breed of privacy violation is emerging and our legal protections are not necessarily keeping pace.

  10. The social life of genes: privacy, property and the new genetics.

    Science.gov (United States)

    Everett, Margaret

    2003-01-01

    With the advent of the Human Genome Project and widespread fears over human cloning and medical privacy, a number of states have moved to protect genetic privacy. Oregon's unique Genetic Privacy Act of 1995, which declared that an individual had property rights to their DNA, has provoked national and international interest and controversy. This paper critically reviews the literature on genetic privacy and gene patenting from law, philosophy, science and anthropology. The debate in Oregon, from 1995 to 2001, illustrates many of the key issues in this emerging area. Both sides of the debate invoke the property metaphor, reinforcing deterministic assumptions and avoiding more fundamental questions about the integrity of the body and self-identity. The anthropological critique of the commodification of the body, and the concept of 'embodiment' are useful in analyzing the debate over DNA as property.

  11. Does fertility status influence impulsivity and risk taking in human females? Adaptive influences on intertemporal choice and risky decision making.

    Science.gov (United States)

    Kaighobadi, Farnaz; Stevens, Jeffrey R

    2013-07-18

    Informed by the research on adaptive decision making in other animal species, this study investigated human females' intertemporal and risky choices across the ovulatory cycle. We tested the hypothesis that at peak fertility, women who are exposed to environments that signal availability of higher quality mates (by viewing images of attractive males), become more impulsive and risk-seeking in economic decision tasks. To test this, we collected intertemporal and risky choice measures before and after exposure to images of either attractive males or neutral landscapes both at peak and low fertility conditions. The results showed an interaction between women's fertility status and image type, such that women at peak fertility viewing images of attractive men chose the smaller, sooner monetary reward option less than women at peak fertility viewing neutral images. Neither fertility status nor image type influenced risky choice. Thus, though exposure to images of men altered intertemporal choices at peak fertility, this occurred in the opposite direction than predicted--i.e., women at peak fertility became less impulsive. Nevertheless, the results of the current study provide evidence for shifts in preferences over the ovulatory cycle and opens future research on economic decision making.

  12. Does Fertility Status Influence Impulsivity and Risk Taking in Human Females? Adaptive Influences on Intertemporal Choice and Risky Decision Making

    Directory of Open Access Journals (Sweden)

    Farnaz Kaighobadi

    2013-07-01

    Full Text Available Informed by the research on adaptive decision making in other animal species, this study investigated human females' intertemporal and risky choices across the ovulatory cycle. We tested the hypothesis that at peak fertility, women who are exposed to environments that signal availability of higher quality mates (by viewing images of attractive males, become more impulsive and risk-seeking in economic decision tasks. To test this, we collected intertemporal and risky choice measures before and after exposure to images of either attractive males or neutral landscapes both at peak and low fertility conditions. The results showed an interaction between women's fertility status and image type, such that women at peak fertility viewing images of attractive men chose the smaller, sooner monetary reward option less than women at peak fertility viewing neutral images. Neither fertility status nor image type influenced risky choice. Thus, though exposure to images of men altered intertemporal choices at peak fertility, this occurred in the opposite direction than predicted—i.e., women at peak fertility became less impulsive. Nevertheless, the results of the current study provide evidence for shifts in preferences over the ovulatory cycle and opens future research on economic decision making.

  13. When Should We Care About Sustainability? Applying Human Security as the Decisive Criterion

    Directory of Open Access Journals (Sweden)

    Alexander K. Lautensach

    2012-05-01

    Full Text Available It seems intuitively clear that not all human endeavours warrant equal concern over the extent of their sustainability. This raises the question about what criteria might best serve for their prioritisation. We refute, on empirical and theoretical grounds, the counterclaim that sustainability should be of no concern regardless of the circumstances. Human security can serve as a source of criteria that are both widely shared and can be assessed in a reasonably objective manner. Using established classifications, we explore how four forms of sustainability (environmental, economic, social, and cultural relate to the four pillars of human security (environmental, economic, sociopolitical, and health-related. Our findings, based on probable correlations, suggest that the criteria of human security allow for a reliable discrimination between relatively trivial incidences of unsustainable behavior and those that warrant widely shared serious concern. They also confirm that certain sources of human insecurity, such as poverty or violent conflict, tend to perpetuate unsustainable behavior, a useful consideration for the design of development initiatives. Considering that human security enjoys wide and increasing political support among the international community, it is to be hoped that by publicizing the close correlation between human security and sustainability greater attention will be paid to the latter and to its careful definition.

  14. IoT Privacy and Security Challenges for Smart Home Environments

    OpenAIRE

    Huichen Lin; Neil W. Bergmann

    2016-01-01

    Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic enviro...

  15. Privacy protectionism and health information: is there any redress for harms to health?

    Science.gov (United States)

    Allen, Judy; Holman, C D'arcy J; Meslin, Eric M; Stanley, Fiona

    2013-12-01

    Health information collected by governments can be a valuable resource for researchers seeking to improve diagnostics, treatments and public health outcomes. Responsible use requires close attention to privacy concerns and to the ethical acceptability of using personal health information without explicit consent. Less well appreciated are the legal and ethical issues that are implicated when privacy protection is extended to the point where the potential benefits to the public from research are lost. Balancing these issues is a delicate matter for data custodians. This article examines the legal, ethical and structural context in which data custodians make decisions about the release of data for research. It considers the impact of those decisions on individuals. While there is strong protection against risks to privacy and multiple avenues of redress, there is no redress where harms result from a failure to release data for research.

  16. Enabling Collaborative Human-Machine (H-M) Decision Making in Time-critical Activities

    Data.gov (United States)

    National Aeronautics and Space Administration — Self-adjusting autonomous systems (SAS) are spreading from well-defined control activities, such as manufacturing, to complex activities with multi-faceted human...

  17. Knowledge, perceptions, and decision making about human papillomavirus vaccination among Korean American women: a focus group study.

    Science.gov (United States)

    Kim, Kyounghae; Kim, Boyoung; Choi, Eunsuk; Song, Youngshin; Han, Hae-Ra

    2015-01-01

    As one of the fastest growing ethnic minority groups in the United States, Korean American (KA) women experience a heightened cervical cancer burden. The advent of the human papillomavirus (HPV) vaccine offers an unprecedented opportunity to eliminate cervical cancer disparities in KA women. However, the uptake of HPV vaccine among KA adolescents remains suboptimal. Hence, we set out to explore knowledge, perceptions, and decision making about HPV vaccination among KA women. We conducted four focus groups of 26 KA women who participated in a community-based, randomized, controlled trial to promote breast and cervical cancer screening. Focus group data were analyzed using qualitative content analysis. Four main themes emerged from the focus groups: 1) limited awareness and knowledge of HPV vaccine, 2) perceptions and beliefs about HPV vaccination (acceptance, negative perceptions, ambivalence), 3) patterns of decision making about HPV vaccination (hierarchical, peer influenced, autonomous, and collaborative), and 4) promoting HPV education and information sharing in the Korean community. KA women are generally positive toward HPV vaccination, but lack awareness and knowledge about HPV. Culturally tailored HPV education programs based on KA women's decision-making patterns and effective information sharing by trustworthy sources in comfortable environments are suggested strategies to promote HPV vaccination in the KA community. The findings point to the need for a multilevel approach to addressing linguistic, cultural, and system barriers that the recent immigrant community faces in promoting HPV vaccinations. In the development of targeted interventions for KA women, educational strategies and patterns of decision making need to be considered. Copyright © 2015 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  18. Rapid tryptophan depletion improves decision-making cognition in healthy humans without affecting reversal learning or set shifting.

    Science.gov (United States)

    Talbot, Peter S; Watson, David R; Barrett, Suzanne L; Cooper, Stephen J

    2006-07-01

    Rapid tryptophan (Trp) depletion (RTD) has been reported to cause deterioration in the quality of decision making and impaired reversal learning, while leaving attentional set shifting relatively unimpaired. These findings have been attributed to a more powerful neuromodulatory effect of reduced 5-HT on ventral prefrontal cortex (PFC) than on dorsolateral PFC. In view of the limited number of reports, the aim of this study was to independently replicate these findings using the same test paradigms. Healthy human subjects without a personal or family history of affective disorder were assessed using a computerized decision making/gambling task and the CANTAB ID/ED attentional set-shifting task under Trp-depleted (n=17; nine males and eight females) or control (n=15; seven males and eight females) conditions, in a double-blind, randomized, parallel-group design. There was no significant effect of RTD on set shifting, reversal learning, risk taking, impulsivity, or subjective mood. However, RTD significantly altered decision making such that depleted subjects chose the more likely of two possible outcomes significantly more often than controls. This is in direct contrast to the previous report that subjects chose the more likely outcome significantly less often following RTD. In the terminology of that report, our result may be interpreted as improvement in the quality of decision making following RTD. This contrast between studies highlights the variability in the cognitive effects of RTD between apparently similar groups of healthy subjects, and suggests the need for future RTD studies to control for a range of personality, family history, and genetic factors that may be associated with 5-HT function.

  19. Humans and Autonomy: Implications of Shared Decision Making for Military Operations

    Science.gov (United States)

    2017-01-01

    before such systems become part of large-scale operational environments. Effects of emotional response to autonomous systems, ethical software constraints...consolidation and software constructs to represent emotions and temperament to make the robotic agent more accessible to its human teammate (Kelley 2014...agent’s human-like qualities (Rao and Georgeff 1995; Chen and Barnes 2014). Two recent ARL-sponsored projects demonstrate progress toward more- mature

  20. Assessment of the Potential for Human Resource Accounting in Venezuelan Navy Management Decision Making.

    Science.gov (United States)

    1981-12-01

    Accounting Association, 1957, op. cit, p. 6. 23. Horngren , Charles, " Cost Accounting : A Managerial Emphasis," Solutions Manual, Prentice-Hall...Model," Management Accounting , December 1977. Savich, R. S . and Ehrenreich, K. E., " Cost /Benefits Analysis of Human Resource Accounting Alternatives...A0A112 T40 NAVAL POSTGRADUATE SCHOOL MONTEREY CA F/ S S / ASSESS1ENT OF THE POTENTIAL FOR HUMAN RESOURCE ACCOUNTING IN VE-ETC(Ul EC GS K FI MARN

  1. A web-based feedback study on optimization-based training and analysis of human decision making

    Directory of Open Access Journals (Sweden)

    Michael Engelhart

    2017-05-01

    Full Text Available The question “How can humans learn efficiently to make decisions in a complex, dynamic, and uncertain environment” is still a very open question. We investigate what effects arise when feedback is given in a computer-simulated microworld that is controlled by participants. This has a direct impact on training simulators that are already in standard use in many professions, e.g., for flight simulators for pilots, and a potential impact on a better understanding of human decision making in general. Our study is based on a benchmark microworld with an economic framing, the IWR Tailorshop. N=94 participants played four rounds of the microworld, each 10 months, via a web interface. We propose a new approach to quantify performance and learning, which is based on a mathematical model of the microworld and optimization. Six participant groups receive different kinds of feedback in a training phase, then results in a performance phase without feedback are analyzed. As a main result, feedback of optimal solutions in training rounds improved model knowledge, early learning, and performance, especially when this information is encoded in a graphical representation (arrows.

  2. A quantitative impact analysis of sensor failures on human operator's decision making in nuclear power plants

    International Nuclear Information System (INIS)

    Seong, Poong Hyun

    2004-01-01

    In emergency or accident situations in nuclear power plants, human operators take important roles in generating appropriate control signals to mitigate accident situation. In human reliability analysis (HRA) in the framework of probabilistic safety assessment (PSA), the failure probabilities of such appropriate actions are estimated and used for the safety analysis of nuclear power plants. Even though understanding the status of the plant is basically the process of information seeking and processing by human operators, it seems that conventional HRA methods such as THERP, HCR, and ASEP does not pay a lot of attention to the possibilities of providing wrong information to human operators. In this paper, a quantitative impact analysis of providing wrong information to human operators due to instrument faults or sensor failures is performed. The quantitative impact analysis is performed based on a quantitative situation assessment model. By comparing the situation in which there are sensor failures and the situation in which there are not sensor failures, the impact of sensor failures can be evaluated quantitatively. It is concluded that the impact of sensor failures are quite significant at the initial stages, but the impact is gradually reduced as human operators make more and more observations. Even though the impact analysis is highly dependent on the situation assessment model, it is expected that the conclusions made based on other situation assessment models with be consistent with the conclusion made in this paper. (author)

  3. Flawed Assumptions, Models and Decision Making: Misconceptions Concerning Human Elements in Complex System

    International Nuclear Information System (INIS)

    FORSYTHE, JAMES C.; WENNER, CAREN A.

    1999-01-01

    The history of high consequence accidents is rich with events wherein the actions, or inaction, of humans was critical to the sequence of events preceding the accident. Moreover, it has been reported that human error may contribute to 80% of accidents, if not more (dougherty and Fragola, 1988). Within the safety community, this reality is widely recognized and there is a substantially greater awareness of the human contribution to system safety today than has ever existed in the past. Despite these facts, and some measurable reduction in accident rates, when accidents do occur, there is a common lament. No matter how hard we try, we continue to have accidents. Accompanying this lament, there is often bewilderment expressed in statements such as, ''There's no explanation for why he/she did what they did''. It is believed that these statements are a symptom of inadequacies in how they think about humans and their role within technological systems. In particular, while there has never been a greater awareness of human factors, conceptual models of human involvement in engineered systems are often incomplete and in some cases, inaccurate

  4. Building a prototype using Human-Centered design to engage older adults in healthcare decision-making.

    Science.gov (United States)

    Kumar, Ajit; Maskara, Sanjeev; Chiang, I-Jen

    2014-01-01

    The prevalence of chronic diseases and disabilities are higher in older adults, which is one of the key factors of rising health care costs. Health care stakeholders wish older adults to take more control of their health to delay the onset of age-related disabilities and chronic diseases. Engaging older adults in their health care decision making would cut down health care costs and prepare a health care system to be more sustainable. We used the Human-Centered Design approach to propose a prototype that more effectively engages older adults in their health care decision-making. Four participants from four different countries - Taiwan, USA, Austria, and Germany; and two facilitators from the USA participated in this study. The participants interviewed a total of four subjects in their respective countries. This study used the Human-Centered Design approach, which embraced three main phases - observation, identification, and ideation. Each phase involved brainstorming, voting, and consensus among participants. This study derived 14 insights, 20 categories, 4 themes, a conceptual framework, some potential solutions, and a prototype. This study showed that older adults could be engaged in their health care decision-making by offering them health care products and services that were user-friendly and technology enabled. A 'gradual change management plan' could assist older adults to adopt technologies more effectively. The health care products and services should be centered on the needs of older adults. Moreover, the possibilities of older adults maintaining control over their own health may rely on proper timing, a personal approach, right products, and services.

  5. The Models of Applying Online Privacy Literacy Strategies: A Case Study of Instagram Girl Users

    Directory of Open Access Journals (Sweden)

    Abdollah Bicharanlou

    2017-09-01

    Full Text Available Social networks affect remarkably in the lives of virtual space users. These networks like most human relations involve compromising between self-disclosure and privacy protection. A process which is realized through improving privacy and empowering the user at the personal level. This study aimed to assess strategies based on online privacy literacy. In particular, strategies that Instagram young girls users should employ to achieve the optimum level of privacy. For this purpose, firstly the paradox of privacy, benefits and risks of self-disclosure are explained, then according to online privacy literacy, some social and technological strategies are introduced by which users can solve the “paradox of privacy.” In the result section, after describing the main benefits and risks of self-disclosure by girl users, the current models of using these social and technological strategies to solve the mentioned paradox are discussed. The research method is ethnography based on non-collaborative observation of Instagram pages and semi-structured interviews with 20 girl users of social networks.

  6. Privacy of genetic information: a review of the laws in the United States.

    Science.gov (United States)

    Fuller, B; Ip, M

    2001-01-01

    This paper examines the privacy of genetic information and the laws in the United States designed to protect genetic privacy. While all 50 states have laws protecting the privacy of health information, there are many states that have additional laws that carve out additional protections specifically for genetic information. The majority of the individual states have enacted legislation to protect individuals from discrimination on the basis of genetic information, and most of this legislation also has provisions to protect the privacy of genetic information. On the Federal level, there has been no antidiscrimination or genetic privacy legislation. Secretary Donna Shalala of the Department of Health and Human Services has issued proposed regulations to protect the privacy of individually identifiable health information. These regulations encompass individually identifiable health information and do not make specific provisions for genetic information. The variety of laws regarding genetic privacy, some found in statutes to protect health information and some found in statutes to prevent genetic discrimination, presents challenges to those charged with administering and executing these laws.

  7. Virtual Human Role Players for Studying Social Factors in Organizational Decision Making.

    Science.gov (United States)

    Khooshabeh, Peter; Lucas, Gale

    2018-01-01

    The cyber domain of military operations presents many challenges. A unique element is the social dynamic between cyber operators and their leadership because of the novel subject matter expertise involved in conducting technical cyber tasks, so there will be situations where senior leaders might have much less domain knowledge or no experience at all relative to the warfighters who report to them. Nonetheless, it will be important for junior cyber operators to convey convincing information relevant to a mission in order to persuade or influence a leader to make informed decisions. The power dynamic will make it difficult for the junior cyber operator to successfully influence a higher ranking leader. Here we present a perspective with a sketch for research paradigm(s) to study how different factors (normative vs. informational social influence, degree of transparency, and perceived appropriateness of making suggestions) might interact with differential social power dynamics of individuals in cyber decision-making contexts. Finally, we contextualize this theoretical perspective for the research paradigms in viable training technologies.

  8. Contralateral white noise selectively changes left human auditory cortex activity in a lexical decision task.

    Science.gov (United States)

    Behne, Nicole; Wendt, Beate; Scheich, Henning; Brechmann, André

    2006-04-01

    In a previous study, we hypothesized that the approach of presenting information-bearing stimuli to one ear and noise to the other ear may be a general strategy to determine hemispheric specialization in auditory cortex (AC). In that study, we confirmed the dominant role of the right AC in directional categorization of frequency modulations by showing that fMRI activation of right but not left AC was sharply emphasized when masking noise was presented to the contralateral ear. Here, we tested this hypothesis using a lexical decision task supposed to be mainly processed in the left hemisphere. Subjects had to distinguish between pseudowords and natural words presented monaurally to the left or right ear either with or without white noise to the other ear. According to our hypothesis, we expected a strong effect of contralateral noise on fMRI activity in left AC. For the control conditions without noise, we found that activation in both auditory cortices was stronger on contralateral than on ipsilateral word stimulation consistent with a more influential contralateral than ipsilateral auditory pathway. Additional presentation of contralateral noise did not significantly change activation in right AC, whereas it led to a significant increase of activation in left AC compared with the condition without noise. This is consistent with a left hemispheric specialization for lexical decisions. Thus our results support the hypothesis that activation by ipsilateral information-bearing stimuli is upregulated mainly in the hemisphere specialized for a given task when noise is presented to the more influential contralateral ear.

  9. Virtual Human Role Players for Studying Social Factors in Organizational Decision Making

    Directory of Open Access Journals (Sweden)

    Peter Khooshabeh

    2018-03-01

    Full Text Available The cyber domain of military operations presents many challenges. A unique element is the social dynamic between cyber operators and their leadership because of the novel subject matter expertise involved in conducting technical cyber tasks, so there will be situations where senior leaders might have much less domain knowledge or no experience at all relative to the warfighters who report to them. Nonetheless, it will be important for junior cyber operators to convey convincing information relevant to a mission in order to persuade or influence a leader to make informed decisions. The power dynamic will make it difficult for the junior cyber operator to successfully influence a higher ranking leader. Here we present a perspective with a sketch for research paradigm(s to study how different factors (normative vs. informational social influence, degree of transparency, and perceived appropriateness of making suggestions might interact with differential social power dynamics of individuals in cyber decision-making contexts. Finally, we contextualize this theoretical perspective for the research paradigms in viable training technologies.

  10. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  11. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  12. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  13. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  14. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  15. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  16. Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity

    Directory of Open Access Journals (Sweden)

    Bello-Ogunu Emmanuel

    2016-07-01

    Full Text Available Research shows that context is important to the privacy perceptions associated with technology. With Bluetooth Low Energy beacons, one of the latest technologies for providing proximity and indoor tracking, the current identifiers that characterize a beacon are not sufficient for ordinary users to make informed privacy decisions about the location information that could be shared. One solution would be to have standardized category and privacy labels, produced by beacon providers or an independent third-party. An alternative solution is to find an approach driven by users, for users. In this paper, we propose a novel crowdsourcing based approach to introduce elements of context in beacon encounters.We demonstrate the effectiveness of this approach through a user study, where participants use a crowd-based mobile app designed to collect beacon category and privacy information as a scavenger hunt game. Results show that our approach was effective in helping users label beacons according to the specific context of a given beacon encounter, as well as the privacy perceptions associated with it. This labeling was done with an accuracy of 92%, and with an acceptance rate of 82% of all recommended crowd labels. Lastly, we conclusively show how crowdsourcing for context can be used towards a user-centric framework for privacy management during beacon encounters.

  17. A Survey on Security, Privacy and Trust in Mobile Crowdsourcing

    OpenAIRE

    Feng, Wei; Yan, Zheng; Zhang, Hengrun; Zeng, Kai; Xiao, Yu; Hou, Thomas

    2017-01-01

    With the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), Mobile Crowdsourcing (MCS) has emerged as an effective method for data collection and processing. Compared with traditional Wireless Sensor Networking (WSN), MCS holds many advantages such as mobility, scalability, cost-efficiency, and human intelligence. However, MCS still faces many challenges with regard to security, privacy and trust. This paper provides a survey of these challenges and discusses ...

  18. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    OpenAIRE

    Liu, Yujia; Zhang, Weiming; Yu, Nenghai

    2017-01-01

    Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN). To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic det...

  19. Tales from the dark side: Privacy dark strategies and privacy dark patterns

    DEFF Research Database (Denmark)

    Bösch, Christoph; Erb, Benjamin; Kargl, Frank

    2016-01-01

    Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue...... that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from...... a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from...

  20. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  1. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  2. Trust and Privacy in Healthcare

    Science.gov (United States)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  3. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  4. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  5. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  6. Can the obstacles to privacy self-management be overcome? Exploring the consent intermediary approach

    Directory of Open Access Journals (Sweden)

    Tuukka Lehtiniemi

    2017-07-01

    Full Text Available In privacy self-management, people are expected to perform cost–benefit analysis on the use of their personal data, and only consent when their subjective benefits outweigh the costs. However, the ubiquitous collection of personal data and Big Data analytics present increasing challenges to successful privacy management. A number of services and research initiatives have proposed similar solutions to provide people with more control over their data by consolidating consent decisions under a single interface. We have named this the ‘ consent intermediary ’ approach. In this paper, we first identify the eight obstacles to privacy self-management which make cost–benefit analysis conceptually and practically challenging. We then analyse to which extent consent intermediaries can help overcome the obstacles. We argue that simply bringing consent decisions under one interface offers limited help, but that the potential of this approach lies in leveraging the intermediary position to provide aides for privacy management. We find that with suitable tools, some of the more practical obstacles indeed can become solvable, while others remain fundamentally insuperable within the individuated privacy self-management model. Attention should also be paid to how the consent intermediaries may take advantage of the power vested in the intermediary positions between users and other services.

  7. Privacy-preserving techniques of genomic data-a survey.

    Science.gov (United States)

    Aziz, Md Momin Al; Sadat, Md Nazmus; Alhadidi, Dima; Wang, Shuang; Jiang, Xiaoqian; Brown, Cheryl L; Mohammed, Noman

    2017-11-07

    Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an individual from a specific genomic data set. This can reveal the current association or future susceptibility of some diseases for that individual (and sometimes the kinship between individuals) resulting in a privacy violation. Regardless of these risks, our genomic data hold much importance in analyzing the well-being of us and the future generation. Thus, in this article, we discuss the different privacy and security-related problems revolving around human genomic data. In addition, we will explore some of the cardinal cryptographic concepts, which can bring efficacy in secure and private genomic data computation. This article will relate the gaps between these two research areas-Cryptography and Genomics. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  9. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  10. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  11. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  12. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  13. Facebook: Personality and privacy on profiles

    OpenAIRE

    Casado Riera, Carla; Oberst, Ursula; Carbonell, Xavier

    2015-01-01

    The aim of this study was to study the possible relationship between the privacy settings in Facebook profiles and two personality dimensions, extraversion and neuroticism, in relation to gender. The Privacy on Facebook Questionnaire and the Eysenck Personality Inventory was applied to a sample of 92 womenand 70 men, all users of Facebook. No significant relationship was found between extraversion or neuroticism and the privacy settings of Facebook profiles, but the results showed significant...

  14. Toward sensitive document release with privacy guarantees

    OpenAIRE

    David Sánchez; Montserrat Batet

    2017-01-01

    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: http://www.sciencedirect.com/science/article/pii/S0952197616302408 Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  15. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  16. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  17. A Model-Based Privacy Compliance Checker

    OpenAIRE

    Siani Pearson; Damien Allison

    2009-01-01

    Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance ...

  18. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  19. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  20. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.