首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The incremental adoption of electronic media in U.S. health care has created increased risk of security and privacy violations in provider organizations. Protective regulatory efforts have been proposed to address ineffective security of patient information, with severe noncompliance penalties. Using data from a nationwide survey of health information managers, this study examines how industry-wide knowledge management trends may influence the degree of security program adoption in health-care organizations. Results suggest that significant nonadoption of mandated security measures continues to occur across the health-care industry. Paper-based systems still prevail, and computerized settings tend to have less security measures. Implications for document management and knowledge policy are discussed.  相似文献   

2.
基于PBAC模型和IBE的医疗数据访问控制方案   总被引:1,自引:0,他引:1  
张怡婷  傅煜川  杨明  罗军舟 《通信学报》2015,36(12):200-211
医疗卫生领域形成的医疗大数据中包含了大量的个人隐私信息,面临着外部攻击和内部泄密的潜在安全隐患。传统的访问控制模型没有考虑用户访问目的在侧重数据隐私的访问控制中的重要作用,现有的对称、非对称加密技术又都存在密钥管理、证书管理复杂的问题。针对这些问题,提出了综合应用PBAC模型和IBE加密技术的访问控制方案,支持针对医疗数据密文的灵活访问控制。通过加入条件目的概念对PBAC模型进行扩展,实现了对目的树的全覆盖;以病患ID、条件访问位和预期目的作为IBE身份公钥进行病患数据加密,只有通过认证并且访问目的符合预期的用户才能获得相应的私钥和加密数据,从而实现对病患信息的访问。实验结果证明,该方案达到了细粒度访问控制和隐私保护的目的,并具有较好的性能。  相似文献   

3.
视频监控的设计目的是维护社会稳定,对于违法犯罪行为能够及时发现并且采取有效措施.然而这类系统在设计之初却忽略了对于个人隐私的保护问题.视频在传递过程中的泄露或者不法分子非法获取视频很容易侵犯个人隐私,造成不良后果.文章研究了基于混沌序列的图像加密解密算法对视频监控中的人脸进行加密,从而保护个人隐私.本系统有两点功能,一...  相似文献   

4.
The events of September 11, 2001, seem likely to have reverberating implications for U.S. race relations, in particular the relative hierarchy of differing racial and ethnic groups. With this in mind, in this study the researchers focused on the manner in which "racial profiling" was talked about—by government and societal leaders, nongovernment opinion leaders, and average citizens—in several leading U.S. news outlets for the 5 months prior to September 11 and for the 5 months afterward. The findings indicate that (a) citizens increased markedly as sources in news coverage after September 11; (b) Arab Americans spoke from more favorable positions of status than African Americans; and (c) racial minorities may face a situation in which they de facto "compete" with other minorities for space in news coverage. The authors discuss implications for the role of news media in race relations.  相似文献   

5.
The research examined the impacts of psychological distance and message type on social media by cultural orientation. This research assessed social media usage and construal levels on Facebook pages in two cultures (Individualism – the U.S. vs. Collectivism – South Korea). While the U.S. participants had different levels of construals in two Facebook pages (News Feed vs. Timeline), the Korean participants did not. Further, the results demonstrated that for U.S. Facebook users, the different distances from the two Facebook pages impact their evaluation of ad messages framed with different construal terms: In News Feed that U.S. users feel distant from, an ad message framed with high construal terms (vs. low construal terms) was more effective. In Timeline that U.S. users feel proximal to, an ad message focusing on low construal terms (vs. high construal terms) led to more favorable response. However, Korean Facebook users did not exhibit varying psychological distances from those two Facebook pages. Rather, they consistently preferred high-level construal messages regardless of where the ad messages were posted. The importance of this study is the suggestion that cultural orientation and social media usage need to be considered for the development of particular ad messages that engage social media users across the globe.  相似文献   

6.
查看视频监控的过程中,一些场景存在因为人脸面部信息暴露在监控视频中导致个人隐私信息泄露的风险,有必要对实时视频流中的行人隐私信息进行马赛克处理。目前市面上常见的基于人脸检测的打码方法在实时监控视频流上打码效果受行人姿态、光线影响较大,存在实时性差、漏检较多等问题。针对以上问题,提出了融合人脸检测算法、目标物体检测算法和前置帧关联检测方法的多检测模型,并与传统的人脸检测模型进行对比。实验结果表明,在人脸检测召回率上,所提模型相较于传统人脸检测算法提高了532%。  相似文献   

7.
Aiming at dealing with prospect knowledge and complex combinatorial attack,a new location big data publishing mechanism under differential privacy technology was given.And innovative usability evaluation feedback mechanism was designed.It gave corresponding solution details for the sensitive attributes and the identity recognition to analyze the quality of service,aimed at privacy protecting for location based big data under situations like combination of location information and non-location information and attacker’s arbitrary background knowledge.Simulation results based on different spatial indexing technology proved that the new publishing model has a higher accuracy under specified privacy conditions for the location query service.  相似文献   

8.
The U.S. legislation at both the federal and state levels mandates certain organizations to inform customers about information uses and disclosures. Such disclosures are typically accomplished through privacy policies, both online and offline. Unfortunately, the policies are not easy to comprehend, and, as a result, online consumers frequently do not read the policies provided at healthcare Web sites. Because these policies are often required by law, they should be clear so that consumers are likely to read them and to ensure that consumers can comprehend these policies. This, in turn, may increase consumer trust and encourage consumers to feel more comfortable when interacting with online organizations. In this paper, we present results of an empirical study, involving 993 Internet users, which compared various ways to present privacy policy information to online consumers. Our findings suggest that users perceive typical, paragraph-form policies to be more secure than other forms of policy representation, yet user comprehension of such paragraph-form policies is poor as compared to other policy representations. The results of this study can help managers create more trustworthy policies, aid compliance officers in detecting deceptive organizations, and serve legislative bodies by providing tangible evidence as to the ineffectiveness of current privacy policies.   相似文献   

9.
A central question that has emerged with the advent of new information technology is how the federal government can operate our national information systems without violating the citizen's right to privacy. The main guarantor, the Privacy Act of 1974, is in need of considerable revision so as to reflect more fully the challenges posed to personal privacy by new applications of information technology. And while changes are being initiated through legislative action, it is essential that the larger issue of the establishment of a de facto national database, containing personal information on most Americans, be addressed.  相似文献   

10.
Recently, a remote-sensing platform based on wireless interconnection of tiny ECG sensors called Telecardiology Sensor Networks (TSN) provided a promising approach to perform low-cost real-time cardiac patient monitoring at any time in community areas (such as elder nursing homes or hospitals). The contribution of this research is the design of a practical TSN hardware/software platform for a typical U.S. healthcare community scenario (such as large nursing homes with many elder patients) to perform real-time healthcare data collections. On the other hand, due to the radio broadcasting nature of MANET, a TSN has the risk of losing the privacy of patients' data. Medical privacy has been highly emphasized by U.S. Department of Health and Human Services. This research also designs a medical security scheme with low communication overhead to achieve confidential electrocardiogram data transmission in wireless medium.  相似文献   

11.
手机恶意程序有对智能手机用户造成经济损失、数据丢失及隐私泄露等危害。在现有的Android入侵检测系统框架基础上,提出异常入侵检测中的主动响应系统,及时减轻手机恶意软件对用户造成的危害。该主动响应系统采用C/S架构,其中客户端收集手机中应用的程序信息,负责最后的响应措施;服务器端及时静态分析由客户端发来的可执行文件,锁定导致手机出现异常状态的恶意程序。测试结果表明,该系统可以主动对手机上已发现的异常行为做出及时有效响应。  相似文献   

12.
介绍了国外超大规模集成电路的发展趋势,列举了21世纪需要研究的7类集成电路新技术。阐述了超大规模集成电路在武器装备中的作用,美、欧、日、韩今后的发展对策及其集成电路生产厂的主流产品与生产状况。  相似文献   

13.
Pierre Trudel 《电信纪事》2006,61(7-8):950-974
Actualization of legal approaches are needed to protect effectively the right of privacy. In network environments, data circulates and it is persistent. Trying to prevent misuse by hindering circulation is less and less effective. Legal framework must be reframed in order to improve guarantees of quality of information used to take decisions about individuals. In network universe, information is persistent and circulating. Trying to prevent information circulation just in case that it would be misused is a costly and inefficient approach. Privacy protection is weakened by faulty targeting of privacy law based on approaches prevailing in the 1970s and 1980s. Those approaches deny that it is legitimate for some information to circulate in public spaces, but do not provide effective protection for information truly relevant to privacy. The risk of ending up with a set of rules incompatible with the requirements of government seems sufficiently serious to justify assessment of the current legal framework and approaches that could increase its effectiveness. Given the inflexibility resulting from inappropriate interpretations, both government officials and legislators have had to resort to expedients, such as consent management and legislation establishing exceptions, thereby weakening protection for personal information. Worse, by paying little attention to effective enforcement of privacy legislation in situations where there is great risk of violation, we have failed to strengthen regulations against practices that truly invade privacy. Effective modernization of privacy legislation requires a critical rereading of the legislation’s foundations and how it has been enforced. This demands a lucid evaluation of the contexts in which information circulates. We will only weaken privacy rights if we take refuge in a faint-hearted defence of formal mechanisms inherited from earlier times. If we take that approach, we will increase the risk of ending up with ever more illusory protection.  相似文献   

14.
A privacy metric based on mutual information was proposed to measure the privacy leakage occurred when location data owner trust data users at different levels and need to publish the distorted location data to each user according to her trust level,based on which an location privacy protection mechanism (LPPM)was generated to protect user’s location privacy.In addition,based on mutual information,a metric was proposed to measure the privacy leakage caused by attackers obtaining different levels of distorted location data and then performing inference attack on the original location data more accurately.Another privacy metric was also proposed to quantify the information leakage occurred in the scenario based on mutual information.In particular,the proposed privacy mechanism was designed by modifying Blahut-Arimoto algorithm in rate-distortion theory.Experimental results show the superiority of the proposed LPPM over an existing LPPM in terms of location privacyutility tradeoff in both scenarios,which is more conspicuous when there are highly popular locations.  相似文献   

15.
This meta-analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective measures. A total of 166 studies from 34 countries (n = 75,269) were included in the analysis. In line with the premise of privacy paradox, privacy concerns did not predict SNS use. However, users concerned about privacy were less likely to use online services and share information and were more likely to utilize privacy protective measures. Except for information sharing, the relationships were comparable for intentions and behavior. Analyses also confirm the role that privacy literacy plays in enhancing use of privacy protective measures. The findings can be generalized across gender, cultural orientation, and national legal systems.  相似文献   

16.
近年来,深度学习技术在基于视频和图像等可视数据的身份识别和认证任务(如人脸、行人识别等)中得到了广泛应用。然而,机器学习(特别是深度学习模型)容易受到特定的对抗攻击干扰,从而误导身份识别系统做出错误的判断。因此,针对身份识别系统的可信认证技术研究逐渐成为当前的研究热点。分别从基于信息空间和物理空间的可视数据身份识别和认证攻击方法展开介绍,分析了针对人脸检测与识别系统、行人重识别系统的攻击技术及进展,以及基于人脸活体伪造和可打印对抗图案的物理空间攻击方法,进而讨论了可视数据身份匿名化和隐私保护技术。最后,在简要介绍现有研究中采用的数据库、实验设置与性能分析的基础上,探讨了可能的未来研究方向。  相似文献   

17.
目前上海的家庭医生可提供面对面门诊服务、预约门诊服务、出诊或预约出诊服务、健康咨询服务、健康管理服务、转诊服务等。通过中国电信可以提供基于云计算的3G支撑解决方案,保障家庭医生在上门和移动过程中可以采集和调研相关居民的健康资料(健康档案)和就诊资料(电子病历)实现以上功能。  相似文献   

18.
随着社会的发展,物联网已成为社会发展的重要新兴产业,在各个领域中广泛应用。物联网是基于互联网技术产生的,在物联网的运行过程中势必会产生大量数据,这些数据都是客户的隐私,切实保护好客户隐私是物联网进一步发展的首要条件。在面向物联网的隐私数据安全问题时,相关技术人员一定要清楚威胁物联网隐私数据安全的主要途径,加大安全防护力度,保护人们的隐私。文章从信息获取、信息传输以及信息处理3个途径,对隐私数据安全问题进行探讨,并提出一些加大隐私安全防护的举措。  相似文献   

19.
This article seeks to reframe the selective exposure debate by demonstrating that people exhibit a preference for opinion‐reinforcing political information without systematically avoiding opinion challenges. The results are based on data collected in a national random‐digit‐dial telephone survey (n = 1,510) conducted prior to the 2004 U.S. presidential election. Analyses show that Americans use the control afforded by online information sources to increase their exposure to opinions consistent with their own views without sacrificing contact with other opinions. This observation contradicts the common assumption that reinforcement seeking and challenge avoidance are intrinsically linked aspects of the selective exposure phenomenon. This distinction is important because the consequences of challenge avoidance are significantly more harmful to democratic deliberation than those of reinforcement seeking.  相似文献   

20.
刘姿杉  程强  吕博 《电信科学》2020,36(11):18-27
随着信息通信技术的发展,机器学习已经成为多个研究领域与垂直行业必不可少的技术工具。然而,机器学习所需数据中往往包含了大量的个人信息,使其隐私保护面临风险与挑战,受到了越来越多的关注。对现有机器学习下隐私保护法规政策与标准化现状进行梳理,对适用于机器学习的隐私保护技术进行详细介绍与分析。隐私保护算法通常会对数据质量、通信开支与模型表现等造成影响,因此对于隐私保护算法的评估应当进行多维度的综合评估。总结了适用于机器学习应用的隐私保护性能评估指标,并指出隐私保护需要考虑对数据质量、通信开支以及模型准确率等之间的影响。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号