Children and Society, 22(5), September 2008, pp.393-399.
Publisher:
Wiley
Increasingly, Information Technology is being used to identify, record and track children in England under the banners of child protection, reducing risk and improving outcomes. Discussions about the importance of a child's right to privacy have been sidelined in the rush to embrace systems that seek to expand the amount and types of information held on individuals. However, placing so much faith
Increasingly, Information Technology is being used to identify, record and track children in England under the banners of child protection, reducing risk and improving outcomes. Discussions about the importance of a child's right to privacy have been sidelined in the rush to embrace systems that seek to expand the amount and types of information held on individuals. However, placing so much faith in unproven technological solutions may inadvertently increase levels of risk to children.
Subject terms:
information management, information technology, privacy, childrens rights;
New monitoring technologies can help older people to continue to live independently in the community and at the same time can threaten their privacy, security, and autonomy. The author puts forward the principle 'no information about me without me' to ensure that informed consent is obtained and that it is clear who has access to the information.
New monitoring technologies can help older people to continue to live independently in the community and at the same time can threaten their privacy, security, and autonomy. The author puts forward the principle 'no information about me without me' to ensure that informed consent is obtained and that it is clear who has access to the information.
Subject terms:
information technology, older people, privacy, alarm systems, assistive technology;
Health and Social Care in the Community, 16(4), July 2008, pp.337-346.
Publisher:
Wiley
... of technology, such as safety alarms, are used at home. The aim of this study was to describe the experiences of elderly persons through testing a mobile safety alarm and their reasoning about safety, privacy and mobility. The mobile safety alarm tested was a prototype in development. Five elderly persons with functional limitations and four healthy elderly persons from a pensioners' organisation tested are more important than privacy" emerged. The mobile safety alarm was perceived to offer an increased opportunity for mobility in terms of being more active and as an aid for self-determination. The fact that the informants were located by means of the positioning device was not experienced as violating privacy as long as they could decide how to use the alarm. It was concluded that this mobile safety alarm was experienced as a tool to be active and mobile. As a way to keep self-determination and empowerment, the individual has to make a "cost–benefit" analysis where privacy is sacrificed to the benefit of mobility and safety. The participants were actively contributing to the development process.
The demographic development indicates an increased elderly population in Sweden in the future. One of the greatest challenges for a society with an ageing population is to provide high-quality health and social care. New information and communication technology and services can be used to further improve health care. To enable elderly persons to stay at home as long as possible, various kinds of technology, such as safety alarms, are used at home. The aim of this study was to describe the experiences of elderly persons through testing a mobile safety alarm and their reasoning about safety, privacy and mobility. The mobile safety alarm tested was a prototype in development. Five elderly persons with functional limitations and four healthy elderly persons from a pensioners' organisation tested the alarm. The mobile alarm with a drop sensor and a positioning device was tested for six weeks. This intervention was evaluated with qualitative interviews, and analysed with latent content analysis. The result showed four main categories: feeling safe, being positioned and supervised, being mobile, and reflecting on new technology. From these categories, the overarching category "Safety and mobility are more important than privacy" emerged. The mobile safety alarm was perceived to offer an increased opportunity for mobility in terms of being more active and as an aid for self-determination. The fact that the informants were located by means of the positioning device was not experienced as violating privacy as long as they could decide how to use the alarm. It was concluded that this mobile safety alarm was experienced as a tool to be active and mobile. As a way to keep self-determination and empowerment, the individual has to make a "cost–benefit" analysis where privacy is sacrificed to the benefit of mobility and safety. The participants were actively contributing to the development process.
Subject terms:
information technology, mobility, older people, privacy, alarm systems;
Journal of Social Issues, 59(2), July 2003, pp.301-322.
Publisher:
Wiley
This article examines the privacy issues that arise from the convergence of two trends: the computerization of medical records, and the increasingly detailed level of personal genetic information that will potentially be placed within the electronic medical record. The article discusses the privacy and public policy implications for medical care, group identity, and familial relationships arising
This article examines the privacy issues that arise from the convergence of two trends: the computerization of medical records, and the increasingly detailed level of personal genetic information that will potentially be placed within the electronic medical record. The article discusses the privacy and public policy implications for medical care, group identity, and familial relationships arising from the transition toward electronic medical records which will increasingly contain highly detailed genetic information. As such, the article focuses on the confidentiality of the electronic medical record, the increasing prevalence and sophistication of genetic testing and analysis, and the implications of electronic genetic information.
Subject terms:
information management, information technology, privacy, case records, confidentiality;
... the start; while privacy is very important, so too is data sharing; health IT systems must embrace user-centred design; going live with a health IT system is the beginning, not the end; a successful digital strategy must be multifaceted, and requires workforce development; and health IT entails both technical and adaptive change. Finally, the report list ten implementation recommendations
(Edited publisher abstract)
Sets out the findings of the National Advisory Group on Health Information Technology in England on the NHS efforts to digitise the secondary care system. The report begins by covering the relevant background, particularly in five areas: general policy/practical issues that relate to health IT; a brief history of National Programme for Information Technology (NPfIT) 3); a brief history of health IT in England’s GP sector; a brief history of the US experience with digitising its healthcare system, with some possible lessons for the NHS; and the recent consensus on digitising secondary care in England, reflected in the work of the National Information Board, the Five Year Forward View report, and the allocation of £4.2 billion to support digitisation. After exploring this background, the report describes ten overall findings and principles drawn from interviews, site visits, and deliberations. These are: digitise for the correct reasons; it is better to get digitisation right than to do it quickly; ‘return on investment’ from digitisation is not just financial; when it comes to centralisation, the NHS should learn, but not over-learn, the lessons of NPfIT; interoperability should be built in from the start; while privacy is very important, so too is data sharing; health IT systems must embrace user-centred design; going live with a health IT system is the beginning, not the end; a successful digital strategy must be multifaceted, and requires workforce development; and health IT entails both technical and adaptive change. Finally, the report list ten implementation recommendations and their rationales, covering stakeholders’ engagement, training of the workforce, funding allocation, implementation and improvement, ensuring interoperability and independent evaluation of the programme.
(Edited publisher abstract)
Subject terms:
information technology, health care, digital technology, information sharing, information management, privacy;
Ageing and Society, 30(6), August 2010, pp.1073-1088.
Publisher:
Cambridge University Press
... was inevitable but would bypass some carers who saw themselves as too old. Carers expressed a general enthusiasm for the benefits of ICT, but usually not for themselves, and they identified several key challenges including: establishing an appropriate balance between, on the one hand, privacy and autonomy and, on the other: maximising safety; establishing responsibility for and ownership of the equipment
Dementia is one of the greatest contemporary health and social care challenges, and novel approaches to the care of its sufferers are needed. New information and communication technologies (ICT) have the potential to assist those caring for people with dementia, through access to networked information and support, tracking and surveillance. This project sought to investigate the perspectives of carers of people with dementia about these new technologies. Semi-structured interviews were used to identify and explore in depth the views of 34 carers of people with dementia, and a group discussion with 9 carers for respondent validation was also held. The carers' actual use of new ICT was limited, although they thought a gradual increase in the use of networked technology in dementia care was inevitable but would bypass some carers who saw themselves as too old. Carers expressed a general enthusiasm for the benefits of ICT, but usually not for themselves, and they identified several key challenges including: establishing an appropriate balance between, on the one hand, privacy and autonomy and, on the other: maximising safety; establishing responsibility for and ownership of the equipment and who bears the costs; the possibility that technological help would mean a loss of valued personal contact; and the possibility that technology would substitute for existing services rather than be complementary.
Subject terms:
information technology, privacy, user views, assistive technology, carers, dementia;
Discusses the use of the National DNA database to store DNA samples of children and how changes in the law are seen as gradually encroaching on the privacy of young people.
Discusses the use of the National DNA database to store DNA samples of children and how changes in the law are seen as gradually encroaching on the privacy of young people.
Subject terms:
information management, information technology, privacy, young offenders, youth justice, children, childrens rights;
Journal of Social Issues, 59(2), July 2003, pp.263-282.
Publisher:
Wiley
This article explores the issues surrounding the harmonisation of privacy or data protection during the last 30 years. It begins with a history of the conflict over transborder data flows and then proceeds to analyse current national and regional policy debates about the feasibility of policy solutions to address problems that are integral to global communications and economic networks. Ongoing discussions between the European Union and the United States over Safe Harbour Principles provide data for exploring these issues. The article concludes with an analysis of whether harmonisation of privacy and data protection policies is likely to evolve through existing processes and institutions.
This article explores the issues surrounding the harmonisation of privacy or data protection during the last 30 years. It begins with a history of the conflict over transborder data flows and then proceeds to analyse current national and regional policy debates about the feasibility of policy solutions to address problems that are integral to global communications and economic networks. Ongoing discussions between the European Union and the United States over Safe Harbour Principles provide data for exploring these issues. The article concludes with an analysis of whether harmonisation of privacy and data protection policies is likely to evolve through existing processes and institutions.
Subject terms:
information management, information technology, privacy, regulation, communication, globalisation;
Journal of Social Issues, 59(2), July 2003, pp.323-342.
Publisher:
Wiley
Consumer privacy is at the center of an ongoing debate among business leaders, privacy activists, and government officials. Although corporations face competitive pressures to collect and use personal information about their customers, many consumers find some methods of collection and use of their personal information unfair. We present a justice theory framework that illustrates how consumer privacy concerns are shaped by the perceived fairness of corporate information practices. We describe a set of global principles, fair information practices, which were developed to balance consumer privacy concerns with an organization's need to use personal information. We conclude by discussing three alternatives for implementing fair information practices with particular attention to the Internet:
Consumer privacy is at the center of an ongoing debate among business leaders, privacy activists, and government officials. Although corporations face competitive pressures to collect and use personal information about their customers, many consumers find some methods of collection and use of their personal information unfair. We present a justice theory framework that illustrates how consumer privacy concerns are shaped by the perceived fairness of corporate information practices. We describe a set of global principles, fair information practices, which were developed to balance consumer privacy concerns with an organization's need to use personal information. We conclude by discussing three alternatives for implementing fair information practices with particular attention to the Internet: government regulation, industry self-regulation, and technological solutions.
Subject terms:
information management, information technology, internet, privacy, central government, confidentiality, economics;
... for cooperative work among politicians and officials in Danish local government; the political consequences of information and communication technologies in UK local government; democracy and virtual communication in Amsterdam; political parties in the digital era; information technology, openness of government and democracy; information superhighways and the privacy debate; and democracy and datacoupling.
Detailed exploration of the relationship between information and democracy. Includes a literature review and sections on: informatization and views of democracy; channeling democratic influences through bureaucracies; laying down the infrastructure for innovations in teledemocracy - the case of Scotland; community information systems; public administration and information; computer based tools for cooperative work among politicians and officials in Danish local government; the political consequences of information and communication technologies in UK local government; democracy and virtual communication in Amsterdam; political parties in the digital era; information technology, openness of government and democracy; information superhighways and the privacy debate; and democracy and datacoupling.
Subject terms:
information technology, literature reviews, local government, politics, privacy, social policy, central government;