It is important that privacy is respected in all care settings so that people can maintain their dignity. This includes privacy regarding personal information; rooms; using the bathroom; post; phone calls; and relationships. These are some of the things that this film looks at when discussing privacy and its role as a major contributor to providing dignity in care. The film shows that if staff need to see someone's mail for administrative reasons, that event is signed and dated. Privacy in practice can mean making sure that a confidentiality policy is in place and followed by all staff; making issues of privacy and dignity a fundamental part of staff induction and training; and making sure that only those who need information to carry out their work have access to people's personal records
(Edited publisher abstract)
It is important that privacy is respected in all care settings so that people can maintain their dignity. This includes privacy regarding personal information; rooms; using the bathroom; post; phone calls; and relationships. These are some of the things that this film looks at when discussing privacy and its role as a major contributor to providing dignity in care. The film shows that if staff need to see someone's mail for administrative reasons, that event is signed and dated. Privacy in practice can mean making sure that a confidentiality policy is in place and followed by all staff; making issues of privacy and dignity a fundamental part of staff induction and training; and making sure that only those who need information to carry out their work have access to people's personal records or financial information.
(Edited publisher abstract)
Subject terms:
privacy, dignity, confidentiality, service users, access to information, interpersonal relationships;
Journal of Technology in Human Services, 28(1-2), January 2010, pp.74-94.
Publisher:
Taylor and Francis
Place of publication:
Philadelphia, USA
This paper reviews, with the growth of the internet and commonality of Web 2.0 applications, the history and development of social networking sites (SNS) in the last decade, and the consequent information sharing between ‘friends’ and privacy issues that have evolved, under headings of ‘social networking and privacy’, ‘privacy and new technology’, privacy of social networking sites’ and ‘types of relationship tie’. It also details a study, using an open and unstructured approach, of 8 individuals (aged 24 to 32 years) asked to define friendship, privacy and privacy violations with regard to their use of SNS, and analyses their responses thematically. Of the 8 privacy violations tabulated in detail, 5 specifically related to SNS and 3 to off line violations (which did involve technology in some form). From the range of privacy issues discussed thematic analysis revealed broader categories, or recurring themes of privacy violations, and concepts of friendship, which are also tabulated and are further discussed under ‘issues of control’, ‘boundary expectancies and uncertainties’, ‘initial startle/shock reaction’, ‘time and a temporal component’, ‘friendship aspects’ (including reference to different types of “ties to friends”), ‘trust’, and ‘reciprocal interaction’ headings. Many participants experienced privacy issues using Facebook, for example, but along with LinkedIn these are the only SNS to allow users to view their profiles as others will see them, say the authors.
This paper reviews, with the growth of the internet and commonality of Web 2.0 applications, the history and development of social networking sites (SNS) in the last decade, and the consequent information sharing between ‘friends’ and privacy issues that have evolved, under headings of ‘social networking and privacy’, ‘privacy and new technology’, privacy of social networking sites’ and ‘types of relationship tie’. It also details a study, using an open and unstructured approach, of 8 individuals (aged 24 to 32 years) asked to define friendship, privacy and privacy violations with regard to their use of SNS, and analyses their responses thematically. Of the 8 privacy violations tabulated in detail, 5 specifically related to SNS and 3 to off line violations (which did involve technology in some form). From the range of privacy issues discussed thematic analysis revealed broader categories, or recurring themes of privacy violations, and concepts of friendship, which are also tabulated and are further discussed under ‘issues of control’, ‘boundary expectancies and uncertainties’, ‘initial startle/shock reaction’, ‘time and a temporal component’, ‘friendship aspects’ (including reference to different types of “ties to friends”), ‘trust’, and ‘reciprocal interaction’ headings. Many participants experienced privacy issues using Facebook, for example, but along with LinkedIn these are the only SNS to allow users to view their profiles as others will see them, say the authors.
Subject terms:
internet, interpersonal relationships, privacy, social media, social networks, communities, friendship;
Journal of Social Issues, 59(2), July 2003, pp.391-410.
Publisher:
Wiley
The authors discuss the ways in which deception can be used to protect privacy, as well as the ways in which claims to privacy can provide the latitude to lie. In their attempts to maintain their own privacy and their secrets, people can be assisted by others who overlook their lies. Habits of honoring other people's verbal and nonverbal claims about themselves, even when they are not totally
The authors discuss the ways in which deception can be used to protect privacy, as well as the ways in which claims to privacy can provide the latitude to lie. In their attempts to maintain their own privacy and their secrets, people can be assisted by others who overlook their lies. Habits of honoring other people's verbal and nonverbal claims about themselves, even when they are not totally convincing, and expectations of similar indulgences from others can keep interactions from getting derailed by small interpersonal bumps. But they also enable exploitation in the form of frauds and scams.
Staff. anxious about allegations of inappropriate physical contact with children are sometimes given directives about how they can cover themselves, for example 'you can pat but not stroke'. In considering when to touch staff should consider the who, the where and the when.
Staff. anxious about allegations of inappropriate physical contact with children are sometimes given directives about how they can cover themselves, for example 'you can pat but not stroke'. In considering when to touch staff should consider the who, the where and the when.
... affect user's privacy and autonomy. This paper aims (a) to describe the development of home-based surveillance technologies; (b) to examine how surveillance is being restructured with the use of this technology; and (c) to explore the potential outcomes associated with the adoption of AAL as a means of surveillance by drawing upon the theoretical work of Foucault and Goffman. The discussion suggests
(Edited publisher abstract)
New surveillance technologies that include activity monitoring, and ubiquitous computing, which are described as ambient assisted living (AAL), are being developed to provide unobtrusive monitoring and support of activities of daily living and to extend the quality and length of time older people can live in their homes. However, concerns have been raised with how these kinds of technologies may affect user's privacy and autonomy. This paper aims (a) to describe the development of home-based surveillance technologies; (b) to examine how surveillance is being restructured with the use of this technology; and (c) to explore the potential outcomes associated with the adoption of AAL as a means of surveillance by drawing upon the theoretical work of Foucault and Goffman. The discussion suggests that future research needs to consider two key areas beyond the current discourse on technology and ageing, specifically: (a) how the new technology will encroach upon the private lived space of the individual, and (b) how it will affect formal and informal caring relationships. This is critical to ensure that the introduction of AAL does not contribute to the disempowerment of residents who receive this technology.
(Edited publisher abstract)
Subject terms:
assistive technology, alarm systems, older people, privacy, information technology, community care, monitoring, interpersonal relationships;
Home computers, personal organizers, cell phones and microwave ovens are now commonplace. We are increasing the use of technology to make our lives easier. Technology also has the potential to offer the same, or even greater, benefits to people with both physical and cognitive impairments. People with a diagnosis of dementia experience progressive cognitive impairments that typically start with working memory problems but can encompass speech production, planning, monitoring and visuospatial difficulties as the condition advances. Dementia makes a person exceptionally dependent on others: not only in the physical sense, but in a psychological sense as well. Technology offers potential interventions for people with dementia to maintain their independence and maximize their retained abilities for as long as possible. This includes both practical solutions to managing the activities of everyday life and interventions geared to meeting psychological needs.
Home computers, personal organizers, cell phones and microwave ovens are now commonplace. We are increasing the use of technology to make our lives easier. Technology also has the potential to offer the same, or even greater, benefits to people with both physical and cognitive impairments. People with a diagnosis of dementia experience progressive cognitive impairments that typically start with working memory problems but can encompass speech production, planning, monitoring and visuospatial difficulties as the condition advances. Dementia makes a person exceptionally dependent on others: not only in the physical sense, but in a psychological sense as well. Technology offers potential interventions for people with dementia to maintain their independence and maximize their retained abilities for as long as possible. This includes both practical solutions to managing the activities of everyday life and interventions geared to meeting psychological needs.
Critical Social Policy, 26(4), November 2006, pp.888-909.
Publisher:
Sage
... and privacy and, controversially, as a replacement for human support. It is argued that the development of relevant policy and practice in respect of telecare has to pay close and careful attention to concerns held by all stakeholders, particularly in regard to individual choice, surveillance, risk-taking and quality of service.
Telecare is advocated as a means of effectively and economically delivering health and social care services in people’s homes, using technology that can monitor activities and safety, provide virtual home visiting, activate reminder systems, increase home security and convey information. Significant planned investment by central government will be rewarded if telecare results in fewer older people requiring institutional care, and more remaining independent in their own homes longer than would otherwise be the case. This paper, which reports on focus group work with older people, carers and professional stakeholders, considers key issues rarely addressed in provider-led studies. Emerging social policy implications centre on the potential impact of telecare on service users’ autonomy and privacy and, controversially, as a replacement for human support. It is argued that the development of relevant policy and practice in respect of telecare has to pay close and careful attention to concerns held by all stakeholders, particularly in regard to individual choice, surveillance, risk-taking and quality of service.
This book is a practical guide for people working in care homes for older people. It sets out to provide help to staff facing daily dilemmas in the way they respond to residents' thoughts, feelings and actions relating to love, sex and intimacy.
This book is a practical guide for people working in care homes for older people. It sets out to provide help to staff facing daily dilemmas in the way they respond to residents' thoughts, feelings and actions relating to love, sex and intimacy.
Subject terms:
interpersonal relationships, older people, privacy, residential care, sexuality, staff, access to services, care homes, confidentiality;
Includes guidance and commentary on the Act and related legislation and codes, including the the Freedom of Information Act 2000, the Regulation of Investigatory Powers Act 2000, the Lawful Business Practice Regulations 2000, and the forthcoming code of practice on the use of personal data in employer/employee relationships
Includes guidance and commentary on the Act and related legislation and codes, including the the Freedom of Information Act 2000, the Regulation of Investigatory Powers Act 2000, the Lawful Business Practice Regulations 2000, and the forthcoming code of practice on the use of personal data in employer/employee relationships
Subject terms:
information technology, human rights, interpersonal relationships, law, privacy, confidentiality, data protection, employment;
Social Service Review, 72(2), June 1998, pp.234-250.
Publisher:
University of Chicago Press
... a thorough examination of the way deception is typically used in negotiating identity, maintaining self-esteem, protecting privacy, and redressing imbalances in power.
Deception is usually considered a deviation from the norm and a violation of trust. However, deception is actually a common and accepted way of establishing personal boundaries and managing interpersonal relationships. This article defines and provides examples of various uses of deception in interpersonal relationships in general and social worker - client relationships in particular. It offers a thorough examination of the way deception is typically used in negotiating identity, maintaining self-esteem, protecting privacy, and redressing imbalances in power.
Subject terms:
interpersonal relationships, privacy, self-concept, self-esteem, service users, social work methods, social work theories, social workers, social worker-service user relationships, disclosure;