49 results on '"surveillance technology"'
Search Results
2. Infrastructuring ethical use of surveillance technology in dementia care.
- Author
-
Ballegaard, Stinne Aaløkke, Meyer, Astrid, Dindler, Christian, and Albrechtslund, Anders
- Subjects
- *
DEMENTIA , *MOTION detectors , *MORAL development , *NURSING care facilities , *MONITOR alarms (Medicine) , *NEGOTIATION - Abstract
While surveillance technology, such as GPS and motion sensors, is increasingly used in dementia care to heighten safety, it also poses new risks and ethical concerns. This paper explores the development of ethical practices around technology and presents a case study of infrastructuring the ethical use of surveillance technology in dementia care. Our ethnographic fieldwork at a Danish nursing home identified surveillance practices based on continuous tinkering and distributed negotiations to manage risks. However, new legislation and subsequent increased use of surveillance technology challenged care workers’ tinkering, resulting in both false, redundant, and failing alarms. The misleading alarms potentially jeopardise the safety of residents and result in a breakdown of the ethical commitment of care workers to care for residents. Drawing on the notion of infrastructuring, we demonstrate how new ethical surveillance practices were developed through a codesign process. The codesign process creates an organisational framework and space for reflection, which supports care workers in creative tinkering and safe implementation of large-scale strategies in a local context. Through our case, we argue for the need to more broadly address the infrastructuring of ethics and suggest that codesign lends itself as a promising approach to this endeavour. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Between Technological Utopia and Dystopia: Online Expression of Compulsory Use of Surveillance Technology.
- Author
-
Ng, Yu-Leung and Lin, Zhihuai
- Abstract
This study investigated people’s ethical concerns of surveillance technology. By adopting the spectrum of technological utopian and dystopian narratives, how people perceive a society constructed through the compulsory use of surveillance technology was explored. This study empirically examined the anonymous online expression of attitudes toward the society-wide, compulsory adoption of a contact tracing app that affected almost every aspect of all people’s everyday lives at a societal level. By applying the structural topic modeling approach to analyze comments on four Hong Kong anonymous discussion forums, topics concerning the technological utopian, dystopian, and pragmatic views on the surveillance app were discovered. The findings showed that people with a technological utopian view on this app believed that the implementation of compulsory app use can facilitate social good and maintain social order. In contrast, individuals who had a technological dystopian view expressed privacy concerns and distrust of this surveillance technology. Techno-pragmatists took a balanced approach and evaluated its implementation practically. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Is Managerial Homeworking New? Assessing strategic, technological and political influences before, during and after coronavirus.
- Author
-
Hassard, John and Morris, Jonathan
- Subjects
CORONAVIRUSES ,TECHNOLOGICAL innovations ,COVID-19 pandemic ,CORPORATE reorganizations ,COVID-19 ,TELECOMMUTING - Abstract
In light of the Covid-19 pandemic, it is often assumed that working at home represents a fundamental transformation in the way managers work. But is managerial homeworking that new? To answer this question, we draw on labour process theory and three empirical studies to place post-pandemic homeworking in historical sociological perspective. Overall, we find that homeworking is not a novel phenomenon, but has been driven by various logics. Explaining these, we contend initially that recent studies of managers working at home have focused on the mandated temporal present of the practice under Covid-19, which has resulted in homeworking being portrayed idiosyncratically. In contrast, and to attain a more comprehensive understanding of what homeworking means for managers, we argue that it is necessary also to understand both the underappreciated past of the phenomenon as well as options for its projected future. A comparative – past, present, future – inquiry therefore portrays how a range of explicit (e.g. corporate restructuring, digital technology, government legislation) and implicit (e.g. responsible autonomy, cultural resistance, work–life balance) factors have influenced and affected the practice of managers working at home in recent times. Through content analysis, these factors are related to broader forces of strategic change, technological innovation and political regulation in describing the 'contested terrain' of modern managerial work. Amid a context of economic neoliberalism, work extensification and shifting spatio-temporal (home/work) boundaries, the paradoxical nature of homeworking – symptomatic of managers' contemporary 'struggle for a normal working day' – is documented through a series of interview-based narrative investigations (conducted in 2002–2006, 2015–2019 and 2020–2021). Ultimately, the paper makes a case not only for greater historical retrospection, but also for deeper critical reflection, in studies of managerial homeworking, and notably when considering whether the practice will likely be extended, ended or otherwise in the coming decades. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Exploring the surveillance technology discourse: a bibliometric analysis and topic modeling approach
- Author
-
Kalle Karlsson and Fisnik Dalipi
- Subjects
topic modeling ,machine learning ,surveillance technology ,social media ,security ,privacy ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The prevention of crime is a multifaceted challenge with legal, political, and cultural implications. Surveillance technologies play a crucial role in assisting law enforcement and other relevant parties in this mission. Drones, cameras, and wiretaps are examples of such devices. As their use increases, it becomes essential to address related challenges involving various stakeholders and consider cultural, political, and legal aspects. The objective of this study was to analyze the impact of surveillance technologies and identify commonalities and differences in perspectives among social media users and researchers. Data extraction was performed from two platforms: Scopus (for academic research papers) and platform X (formerly known as Twitter). The dataset included 88,989 tweets and 4,874 research papers. Topic modeling, an unsupervised machine learning approach, was applied to analyze the content. The research results revealed that privacy received little attention across the datasets, indicating its relatively low prominence. The military applications and their usage have been documented in academic research articles as well as tweets. Based on the empirical evidence, it seems that contemporary surveillance technology may be accurately described as possessing a bi-directional nature, including both sousveillance and surveillance, which aligns with Deleuzian ideas on the Panopticon. The study’s findings also indicate that there was a greater level of interest in actual applications of surveillance technologies as opposed to more abstract concepts like ethics and privacy.
- Published
- 2024
- Full Text
- View/download PDF
6. Human, Object and Pose Detection for Theft Prevention through Surveillance System.
- Author
-
K. G. S., Chathuranga, K. H., Vidanage, Fernando, Harinda, and Abeywardhana, Lakmini
- Subjects
THEFT prevention ,ARTIFICIAL intelligence ,MACHINE learning ,DIGITAL learning ,TECHNOLOGICAL innovations - Abstract
The rise in theft incidents within institutional spaces has prompted the need for innovative security solutions. In response to this challenge, our research focuses on the development and implementation of a comprehensive theft prevention system through object and pose detection technologies. We employ cutting-edge techniques and models to safeguard institutional property and create a secure environment. For object detection, we leverage the powerful "Segment Anything" model, which enables us to identify and track objects within the institutional space. This model provides us with a robust foundation for monitoring and safeguarding valuable items. In our pursuit of advanced object detection and classification, we explore the capabilities of multiple machine learning models, including Ridge, Logistic, Random Forest, and Gradient Boosting. These models enhance our ability to accurately classify objects and further strengthen our theft prevention strategies. Additionally, we utilize the state-of-the-art Media pipe Holistic model for real-time pose detection, enabling us to identify human poses and behaviors within the institutional space. This valuable insight adds an extra layer of security by recognizing suspicious activities and potential threats. Our research encompasses a holistic approach to security, integrating object and pose detection to ensure the highest level of theft prevention. By combining these technologies, we aim to significantly reduce theft incidents and enhance security within institutional spaces. As we continue to advance our research, we anticipate future challenges and complexities related to the integration of these technologies. This research sets the stage for ongoing exploration and innovation in the realm of institutional security, ultimately contributing to safer and more secure environments. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. How Secrecy Leads to Bad Public Technology
- Author
-
Slupska, Julia, Lowrie, Jeanette, Irani, Lilly, and Stefan, Deian
- Subjects
public technology ,security ,privacy ,critical infrastructure ,surveillance technology ,smart cities - Published
- 2021
8. A passive ‘One Health’ surveillance system to track canine rabies in urban India
- Author
-
Abi Tamim Vanak, Neha Panchamia, Indrakshi Banerji, and Malvika Nair
- Subjects
public health ,neglected tropical disease ,zoonoses ,animal health ,surveillance technology ,rapid response ,Environmental sciences ,GE1-350 ,Public aspects of medicine ,RA1-1270 - Abstract
Abstract Robust and widely implementable ‘One Health’ surveillance systems are required to detect and control the spread of zoonotic infectious diseases. Using technological tools coupled with a rapid field response and rapid diagnostics can help in the surveillance of deadly diseases such as rabies, even in densely populated urban areas. Here, we describe the use of an animal rescue system (Hawk Data Pro) that was adapted as a passive surveillance tool for rabies in a large metropolis in India. We used a Webline and helpline that reported injured or sick animals to an animal rescue facility to determine possible rabies cases in street animals in Pune city in western India. Suspected rabid animals were tested using lateral flow assays and this information was used to direct awareness materials on rabies as well as in conducting mass dog vaccinations in areas that reported multiple cases. Over a ~4-year period, we received over 90,700 calls or reports, of which 1162 calls were for suspected rabies cases in dogs, and 6 for other animals (cats, goats and cattle). Of these, 749 dogs and 4 other animals tested positive for rabies. Most of the cases were reported from the densely human-populated central Pune region. In response, ~21,000 people were provided with educational materials on post-bite management, and ~23,000 dogs were vaccinated. We show that the adoption of the Hawk Data Pro system as a passive surveillance tool allowed us to document an ongoing outbreak of rabies in a large metropolis in India. Such systems can be modified or adapted to other areas as well to meet the surveillance and reporting requirements of the WHO’s Zeroby30 strategy to eliminate rabies globally. One Health impact statement India is a priority country for the action plan for rabies elimination by 2030. Yet, systematic surveillance for rabies in the primary reservoir remains weak. Here, we showcase a collaboration with an animal welfare organization and adaptation of their bespoke animal rescue system for passive surveillance of rabies in dogs and other animals in Pune city in western India. This method allowed us to improve the detection of potentially rabid animals, rapidly ensure post-exposure prophylaxis and provide awareness materials for exposed human victims. To the best of our knowledge, this collaboration between scientists and civil society organizations resulted in the detection of the largest number of rabies cases reported in an urban area anywhere in the world. The use of this system highlights the scope of the problem in urban India and also provides practical guidance on how to improve surveillance using basic technological tools.
- Published
- 2023
- Full Text
- View/download PDF
9. Transfer of Surveillance Technology and End-Use Human Rights Abuses: The International Responsibility of the Technology-Exporting State Between Complicity and Due Diligence.
- Author
-
Carpanelli, Elena
- Subjects
HUMAN rights violations ,DUE diligence ,TECHNOLOGY transfer ,GOVERNMENT liability ,HUMAN rights organizations - Abstract
This article focuses on the transfer of surveillance technology that is used to commit human rights violations and questions the international responsibility of the technology-exporting State, that is the State where the seller is based and that authorises the transfer. After having clarified that the technology-exporting State cannot be considered the principal wrongdoer for the human rights abuses committed in the receiving State, it investigates whether its international responsibility for end-use human rights abuses could be determined out of complicity or if due diligence may serve the same purpose. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. Establishing Privacy Advisory Commissions for the Regulation of Facial Recognition Systems at the Municipal Level
- Author
-
Jackson, Christopher, Livingston, Morgan, Velan, Vetri, Lee, Eric, Huynh, Kimberly, and Eckert, Regina
- Subjects
facial recognition ,law enforcement ,surveillance technology ,privacy - Abstract
As facial recognition systems (FRS) become widely available, a growing number of local governing bodies across the country have adopted these technologies. Without regulating how and when these technologies are used, the adoption of FRS by municipal governments has the potential to violate civil liberties and disproportionately harm marginalized groups. FRS may be an invaluable tool for law enforcement; however, best practices must be adopted to curb their misuse, specifically at the municipal level. We propose that cities considering procurement of FRS create an independent privacy advisory commission with a clear mandate, guaranteed cooperation from local government, technology expertise, and community stakeholder input.
- Published
- 2020
11. Invasive Yet Inevitable? Privacy Normalization Trends in Biometric Technology.
- Author
-
Paik, Sejin, Mays, Kate K., and Katz, James E.
- Abstract
As biometric technology relies on bodily, physical information, it is among the more intrusive technologies in the contemporary consumer market. Consumer products containing biometric technology are becoming more popular and normalized, yet little is known about public perceptions concerning its privacy implications, especially from the perspective of human agency. This study examines how people perceive biometric technologies in different societal contexts and via different agents in control. Our study revealed that, in large part, people's perceptions of biometric technology are context-dependent, based on who retrieves and who benefits from the information and the situation where the data are collected. Participants were much more comfortable with more intrusive biometric technology in airport security than in a grocery store, and if it was employed to improve their health. We conclude by considering the implications of the survey for new threats to personal privacy that arise out of emerging technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. People with dementia and carers online discussing surveillance
- Author
-
Vermeer, Yvette, van Santen, Joeke, Charlesworth, Georgina, and Higgs, Paul
- Published
- 2020
- Full Text
- View/download PDF
13. Wanting it all – public perceptions of the effectiveness, cost, and privacy of surveillance technology
- Author
-
Cayford, Michelle, Pieters, Wolter, and van Gelder, P.H.A.J.M
- Published
- 2020
- Full Text
- View/download PDF
14. Digital Neocolonialism: The Chinese Surveillance State in Africa.
- Author
-
Gravett, Willem H.
- Subjects
MASS surveillance ,NEOCOLONIALISM ,DEVELOPING countries ,HUMAN rights ,BOUNDARY disputes ,AUTHORITARIANISM ,INFANTS - Abstract
China has developed into a twenty-first-century surveillance state with unprecedented abilities to censor speech and infringe upon basic human rights. The effects of China's digital authoritarianism reach well beyond its national borders. The Chinese government has begun exporting its high-tech surveillance blueprint, and the censorship and surveillance technologies on which it is based, to authoritarian-leaning governments in Africa. This blueprint is suffused with the potential for developing surveillance societies in China's image, particularly in African countries with poor human rights records, where democratic institutions are either weak or still in their infancy. This may yield even greater repression, rather than liberalisation, in Africa. The consequences for human rights on the African continent are likely to be dire. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
15. Exploring the surveillance technology discourse: a bibliometric analysis and topic modeling approach.
- Author
-
Karlsson K and Dalipi F
- Abstract
The prevention of crime is a multifaceted challenge with legal, political, and cultural implications. Surveillance technologies play a crucial role in assisting law enforcement and other relevant parties in this mission. Drones, cameras, and wiretaps are examples of such devices. As their use increases, it becomes essential to address related challenges involving various stakeholders and consider cultural, political, and legal aspects. The objective of this study was to analyze the impact of surveillance technologies and identify commonalities and differences in perspectives among social media users and researchers. Data extraction was performed from two platforms: Scopus (for academic research papers) and platform X (formerly known as Twitter). The dataset included 88,989 tweets and 4,874 research papers. Topic modeling, an unsupervised machine learning approach, was applied to analyze the content. The research results revealed that privacy received little attention across the datasets, indicating its relatively low prominence. The military applications and their usage have been documented in academic research articles as well as tweets. Based on the empirical evidence, it seems that contemporary surveillance technology may be accurately described as possessing a bi-directional nature, including both sousveillance and surveillance, which aligns with Deleuzian ideas on the Panopticon. The study's findings also indicate that there was a greater level of interest in actual applications of surveillance technologies as opposed to more abstract concepts like ethics and privacy., Competing Interests: The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest., (Copyright © 2024 Karlsson and Dalipi.)
- Published
- 2024
- Full Text
- View/download PDF
16. The Politics of the Pandemic in South Korea.
- Author
-
Yoonkyung Lee and Myungji Yang
- Subjects
COVID-19 pandemic ,PANDEMICS ,COVID-19 ,PRACTICAL politics - Abstract
This study analyzes how South Korea was able to effectively control the outbreak of the COVID-19 pandemic from a critical perspective. It departs from cultural or regime-type arguments and instead pays attention to the political and institutional conditions under which the South Korean government was able to implement extensive testing, identify the infected, and quarantine them immediately. The study advances that infrastructural capacity and democratic accountability are necessary to preemptively and efficaciously respond to the pandemic. Yet, it also cautions against idealizing the Korean case without addressing critical questions about deeply penetrating surveillance-technology infrastructures and labor-market disparities that have worsened under the pandemic. Highlighting a multifaceted and complicated picture of the politics of the coronavirus in South Korea, the study aims to deepen understanding of the relationship between the political-institutional dynamics and the pandemic. [ABSTRACT FROM AUTHOR]
- Published
- 2020
17. The smart city as time-space cartographer in COVID-19 control: the South Korean strategy and democratic control of surveillance technology.
- Author
-
Sonn, Jung Won and Lee, Jae Kwang
- Subjects
- *
SMART cities , *COVID-19 , *CARTOGRAPHERS , *SOCIAL history , *STAY-at-home orders - Abstract
While the US, UK, France, Italy, and many other countries ended up implementing complete lockdown after tens of thousands of deaths from COVID-19, South Korea kept factories and offices running, flattened the curve, and maintained a low mortality rate. Extensive media coverage has focused on South Korea's testing capacity as the primary reason, but there has been little discussion of the vital role of the smart city. In this paper, we describe how smart city technologies form a crucial part of disease control in South Korea, explain the social conditions for the extensive use of smart city technology, and offer critical insights into contemporary discussions on the issue of smart cities and surveillance. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
18. 基于逆向定位技术的ADS-B电文真实性检测方法.
- Author
-
周隽, 苏志刚, 郝敬堂, and 韩冰
- Abstract
Copyright of Journal of Signal Processing is the property of Journal of Signal Processing and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
19. Accepting surveillance – An increased sense of security after terror strikes?
- Author
-
Wester, Misse and Giesecke, Johan
- Subjects
- *
TERRORISM , *SECURITY systems , *RISK perception , *ATTITUDE change (Psychology) - Abstract
• Perception of surveillance technologies. • Impact on perception after terror strikes. • Largest change in desire for transparency. • No trade-off between privacy and security. Over the last two decades, several large terror attacks have led to increased discussion of the use of different surveillance technologies. The use of novel technologies for pre-emptive security and surveillance has been discussed and criticized academically, but few studies have addressed the public. Studies that target the public tend to assume an oversimplified trade-off between privacy and security, i.e. how much privacy a person is willing to yield to attain greater security. We used three large surveys of random samples from the Swedish population to study public attitudes to a number of surveillance technologies. The last survey took place shortly after a terror attack in Stockholm, and an aim was to see how this affected acceptance. The main differences between 2009 and 2017 were that the demand for transparency (i.e. public scrutiny) had increased dramatically, and that the notion of risk posed by the new technologies had diminished. Beyond this, changes in attitudes were small. Technologies were perceived as contributing to making society safer – albeit not decisively. Also, acceptance was not only influenced by what data was collected, but also by who was collecting and owning it. In public discussions about security, two things are often assumed: that an increase of hard security measures will increase societal security, and that citizens are willing to do a trade-off between privacy and security. We find that this is not the case. Instead, citizens weigh the pros and cons of surveillance and also distinguish between different forms of surveillance. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
20. Weapons of mass distraction.
- Author
-
BARNES, ROBIN
- Abstract
The Circle invites an ever closer look at the ethos of current and emerging surveillance technology. Dave Eggers' novel foreshadowed the culminating moments in 2018, when high-powered social media platforms generated a maelstrom of controversy in the US and UK and then nothing changed. Concern over the integrity of electoral processes around the globe has risen to new heights, as privacy experts warn that unfettered growth of surveillance capitalism could change democracy forever. Far from a case of unintended consequences run amok, corporate tech executives admit that continual mining of personal data for unrestricted use by corporations and political operatives that specialise in psychological manipulation were part of the original design. The dark side of all this connectivity as highlighted by the ruckus over Cambridge Analytica places mainstream news producers squarely under the microscope. This article examines the wilderness between the goal of reporting in the public's interest and the current role of news organisations. [ABSTRACT FROM AUTHOR]
- Published
- 2018
21. OPEN SKIES READY FOR TAKEOFF.
- Author
-
Smithson, A.E.
- Subjects
- CONFERENCE on Security & Cooperation in Europe (Organization)
- Abstract
Recounts the history of the Open Skies treaty, and considers the possibility it will be signed at the March meeting of the Conference on Security and Cooperation in Europe in Helsinki. General increase in stability and trust; Aerial inspection's record of accomplishments; The Sinai as a major proving ground for aerial inspection; Use of overflights by the UN Special Commission in Iraq; Aerial inspections by UN aircraft in Yemen, Cyprus, Lebanon; Details of Open Skies.
- Published
- 1992
- Full Text
- View/download PDF
22. The Ethical, Care, and Client-Caregiver Relationship Impacts Resulting From Introduction of Digital Communication and Surveillance Technologies in the Home Setting: Qualitative Inductive Study.
- Author
-
de Ruiter HP, Clisbee D, Houston R, and Skärsäter I
- Subjects
- Humans, Aged, Quality of Life, Technology, Communication, Caregivers, Home Care Services
- Abstract
Background: Embedding communication and surveillance technology into the home health care setting has demonstrated the capacity for increased data efficiency, assumptions of convenience, and smart solutions to pressing problems such as caregiver shortages amid a rise in the aging population. The race to develop and implement these technologies within home care and public health nursing often leaves several ethical questions needing to be answered., Objective: The aim of this study was to understand the ethical and care implications of implementing digital communication and surveillance technologies in the home setting as perceived by health caregivers practicing in the region of Halland in Sweden with clients receiving home care services., Methods: A questionnaire was completed by 1260 home health caregivers and the written responses were evaluated by qualitative inductive content analysis. The researchers reviewed data independently and consensus was used to determine themes., Results: This study identified three main themes that illustrate ethical issues and unintended effects as perceived by caregivers of introducing digital communication and surveillance technologies in the home: (1) digital dependence vulnerability, (2) moral distress, and (3) interruptions to caregiving. This study highlights the consequences of technology developers and health systems leaders unintentionally ignoring the perspectives of caregivers who practice the intuitive artistry of providing care to other humans., Conclusions: Beyond the obtrusiveness of devices and impersonal data collection designed to emphasize health care system priorities, this study discovered a multifaceted shadow side of unintended consequences that arise from misalignment between system priorities and caregiver expertise, resulting in ethical issues. To develop communication and surveillance technologies that meet the needs of all stakeholders, it is important to involve caregivers who work with clients in the development process of new health care technology to improve both the quality of life of clients and the services offered by caregivers., (©Hans-Peter de Ruiter, David Clisbee, Rebecca Houston, Ingela Skärsäter. Originally published in JMIR Human Factors (https://humanfactors.jmir.org), 03.11.2023.)
- Published
- 2023
- Full Text
- View/download PDF
23. Increasing of the urban traffic surveillance by automatic information device
- Author
-
Mircea Moldovan and Nicolae Filip
- Subjects
vehicle count ,speed ,vehicle length ,traffic safety ,traffic flow ,surveillance technology ,information panel. ,Engineering (General). Civil engineering (General) ,TA1-2040 - Published
- 2014
- Full Text
- View/download PDF
24. Identification Through Technology in Contemporary Crime Narratives
- Author
-
Kocsis Ferenc
- Subjects
contemporary epistemology ,detective fiction ,subject theory ,surveillance technology ,English literature ,PR1-9680 - Abstract
I propose a somewhat new approach to examine the characteristic epistemological concerns that can be witnessed in Detective fiction. An approach that takes into account a constituent of the said model and was not dealt with in depth previously: the inevitable technological mediatedness between the Subjects taking part in the interpretative process that defines the subject
- Published
- 2014
- Full Text
- View/download PDF
25. The Mundane Politics of 'Security Research': Tailoring Research Problems.
- Author
-
Möllers, Norma
- Subjects
- *
MUNDANE astrology , *COMMERCIALIZATION , *UNIVERSITY research - Abstract
Since the late 20th century, Germany's federal science policy has shifted towards an emphasis on commercialization and/or applicability of academic research. University researchers working within such strategic funding schemes then have to balance commitments to their government commission, their research and their academic careers, which can often be at odds with each other. Drawing on an ethnographic study of the development of a 'smart' video surveillance system, I analyze some of the strategies which have helped a government-funded, transdisciplinary group of researchers to navigate confl icting expectations from their government, academia and the wider public in their everyday work. To varying degrees, they managed to align confl icting expectations from the government and their departments by tailoring research problems which were able to travel across diff erent social worlds. By drawing attention to work practices on the ground, this article contributes ethnographic detail to the question of how researchers construct scientifi c problems under pressures to make their work relevant for societal and commercial purposes. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
26. Prevalence and Predictors of Surveillance Cameras in Law Enforcement.
- Author
-
Schuck, Amie M.
- Subjects
- *
TELEVISION in security systems , *LAW enforcement , *STAKEHOLDERS , *DEMOCRATIZATION , *COMMUNITY policing , *POLICE accountability - Abstract
Using data from more than 2,500 law enforcement agencies, the goal of this study was to identify predictors of advanced surveillance technologies. The findings suggest that the adoption of modern surveillance cameras is neither uniform nor comprehensive and that the adoption process is ongoing with agency officials implementing and discontinuing technologies over time. Most important, stakeholders both inside and outside the organization have the greatest influence on the adoption process, and cameras in vehicles and mobile devices are most prevalent in improvised communities. As cameras become smaller and less expensive, they have the potential to democratize surveillance and equalize the relationship between the police and the public during encounters. However, the democratization effect will only occur if implementation is widespread and all segments of the community have an equal voice in the process. The research findings suggest that significant progress still needs to be made in these areas. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
27. Citizen verification.
- Author
-
Rotblat, J.
- Subjects
- *
ARMS control - Abstract
Declares the denial of nuclear weapons to all states by eliminating them will lead to a safer world. A nuclear weapons-free world is also preferable on moral grounds. Hallmark of civilized society is that it can control undesirable products of science and technology; Designing a system of verification to greatly reduce chances of undetected violation; Ever more interdependent world; Dismantling existing warheads.
- Published
- 1992
28. Views and Needs of Students, Parents, and Teachers on Closed-Circuit Television, Proximity Trackers, and Access Cards to Facilitate COVID-19 Contact Tracing in Schools: Thematic Analysis of Focus Groups and Interviews.
- Author
-
Chantziara S, Craddock IJ, Mccallum CH, and Brigden ALC
- Abstract
Background: Contact tracing is considered a key measure in preventing the spread of infectious diseases. Governments around the world adopted contact tracing to limit the spread of COVID-19 in schools. Contact tracing tools utilizing digital technology (eg, GPS chips, Bluetooth radios) can increase efficiency compared to manual methods. However, these technologies can introduce certain privacy challenges in relation to retention, tracking, and the using and sharing of personal data, and little is known about their applicability in schools., Objective: This is the second of two studies exploring the potential of digital tools and systems to help schools deal with the practical challenges of preventing and coping with an outbreak of COVID-19. The aim was to explore the views, needs, and concerns among secondary school stakeholders (parents, teachers, pupils) regarding the implementation of three digital tools for contact tracing: access cards, proximity tracking, and closed-circuit television (CCTV)., Methods: Focus groups and interviews were conducted with secondary school students, parents, and teachers. The topic guide was informed by the Unified Theory of Technology and Acceptance. Data-driven and theory-driven approaches were combined to identify themes and subthemes., Results: We recruited 22 participants. Findings showed that there is no single solution that is suitable for all schools, with each technology option having advantages and limitations. Existing school infrastructure (eg, CCTV and smart/access cards technology) and the geography of each school would determine which tools would be optimal for a particular school. Concerns regarding the cost of installing and maintaining equipment were prominent among all groups. Parents and teachers worried about how the application of these solutions will affect students' right to privacy. Parents also appeared not to have adequate knowledge of the surveillance technologies already available in schools (eg, CCTV). Students, who were mostly aware of the presence of surveillance technologies, were less concerned about any potential threats to their privacy, while they wanted reassurances that any solutions would be used for their intended purposes., Conclusions: Findings revealed that there is not one tool that would be suitable for every school and the context will determine which tool would be appropriate. This study highlights important ethical issues such as privacy concerns, balancing invasions of privacy against potential benefits, transparency of communication around surveillance technology and data use, and processes of consent. These issues need to be carefully considered when implementing contact tracing technologies in school settings. Communication, transparency, and consent within the school community could lead to acceptance and engagement with the new tools., (©Sofia Chantziara, Ian J Craddock, Claire H Mccallum, Amberly L C Brigden. Originally published in JMIR Formative Research (https://formative.jmir.org), 22.05.2023.)
- Published
- 2023
- Full Text
- View/download PDF
29. Shifting in and out of context: Technoscientific drama as technology of the self.
- Author
-
Möllers, Norma
- Subjects
- *
ETHNOLOGY research , *VIDEO surveillance , *THEATER research , *DRAMA , *SCIENTISTS - Abstract
Scientific and technological demonstrations are usually used to create credibility for scientific claims or to demonstrate the utility of technical devices. However, they can also function as dramatic instances of boundary work. Drawing on an ethnographic study of the development of an automated video surveillance system, I show how a government-funded, transdisciplinary group of researchers used theatrical practices when communicating to the funding institution, to stage their work as applicable. Their ‘technoscientific drama’ did not primarily produce credibility for their surveillance system’s utility, but more powerfully established the researchers’ credibility as ‘scientist-entrepreneurs’. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
30. Seeing Change in Environments and Behavior.
- Author
-
Hipp, J. Aaron
- Subjects
MASS surveillance ,URBAN planning - Published
- 2018
- Full Text
- View/download PDF
31. Safe at home: Acceptance of surveillance technology among caregivers for persons with dementia.
- Author
-
Xu YA, Wang Y, Kim SSY, Kim DOD, Sun Y, and McLaughlin ML
- Subjects
- Humans, Aged, Independent Living, Surveys and Questionnaires, Technology, Caregivers, Dementia
- Abstract
The increasing incidence of dementia calls for effective and innovative approaches to alleviate societal and personal burdens. Aging in place is a sustainable paradigm which ensures the best utilization of societal resources, supports caregivers, secures normalcy, and optimizes care for persons with dementia (PwD). Home-based surveillance technology can support PwD in safely aging in place. This study examines factors associated with the adoption of home-based surveillance technologies among unpaid dementia caregivers. Through an online survey ( N = 203), we apply ordinal logistic regression to identify five variables that predict the likelihood of caregivers' surveillance technology adoption for dementia care. The predictors are caregivers': (1) trouble concerns about PwD, (2) online support group membership, (3) perceived social norms regarding surveillance technology use, (4) perceived usefulness of surveillance devices, and (5) depth of information and communication technologies (ICT) use. Theoretical and practical implications for dementia healthcare are discussed.
- Published
- 2023
- Full Text
- View/download PDF
32. Technological Surveillance As A Tool For Information Management: A Literature Review.
- Author
-
Back, Luani, Kovaleski, Joao Luiz, and Andrade Junior, Pedro Paulo
- Abstract
An alternative to ease market barriers related to the accelerated technological growth is to make organizations accompany technological advancement through the dissemination of technology and information. The information survey of a technological nature may occur through technological surveillance. Thus, this study aims to build a theoretical framework on surveillance technology, identifying its application and benefits generated by its use, through a systematic literature. The survey was conducted in the databases Web of Science, Scopus, Science Direct, IEEE Xplore, Scielo and Scholar, using key words in English, Portuguese and Spanish. Through careful analysis of the acquired portfolio was possible to build a consistent benchmark for technological surveillance, concluding that this is a management practice that serves as a structured system that allows coordinate the collection, retrieval, processing, analysis and dissemination of information of technological nature, to guide for organizational strategies. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
33. Inteligencia estratégica: un sistema para gestionar la innovación.
- Author
-
Aguirre, Joao
- Subjects
INNOVATION management ,STRATEGIC planning ,ECONOMIC competition ,ECONOMIC development ,INDUSTRIAL productivity ,ECONOMIC forecasting ,ECONOMICS - Abstract
Copyright of Estudios Gerenciales is the property of Universidad ICESI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
- Full Text
- View/download PDF
34. The Use of Surveillance Technology in Residential Facilities for People with Dementia or Intellectual Disabilities: A Study Among Nurses and Support Staff.
- Author
-
Niemeijer, Alistair R., Depla, Marja, Hertogh, Cees, Frederiks, Brenda, and Francke, Anneke L.
- Subjects
- *
BEHAVIOR disorders , *DECISION making , *DEMENTIA , *ELECTRONIC security systems , *GEOGRAPHIC information systems , *HEALTH care teams , *INTERVIEWING , *PATIENT-professional relations , *PEOPLE with intellectual disabilities , *NURSES , *NURSING home patients , *NURSING care facilities , *NURSING home employees , *LEGAL status of patients , *PATIENT safety , *PERSONNEL management , *RESTRAINT of patients , *WORK environment , *ETHNOLOGY research , *PROFESSIONAL practice , *DATA analysis , *FIELD research , *THEMATIC analysis , *RESIDENTIAL care , *CONTINUING education units , *HOSPITAL rounds , *MEDICAL equipment reliability , *WANDERING behavior , *PREVENTION - Abstract
Background: The use of surveillance technology in residential care facilities for people with dementia or intellectual disabilities is often promoted both as a solution to understaffing and as a means to increasing clients' autonomy. But there are fears that such use might attenuate the care relationship. Objective:To investigate how surveillance technology is actually being used by nurses and support staff in residential care facilities for people with dementia or intellectual disabilities, in order to explore the possible benefits and drawbacks of this technology in practice. Methods: An ethnographic field study was carried out in two residential care facilities: a nursing home for people with dementia and a facility for people with intellectual disabilities. Data were collected through field observations and informal conversations as well as through formal interviews. Results: Five overarching themes on the use o f surveillance technology emerged from the data: continuing to do rounds, alarm fatigue, keeping clients in close proximity, locking the doors, and forgetting to take certain devices off. Despite the presence of surveillance technology, participants still continued their rounds. Alarm fatigue sometimes led participants to turn devices off. Though the technology allowed wandering clients to be tracked more easily, participants often preferred keeping clients nearby, and preferably behind locked doors at night. At times participants forgot to remove less visible devices (such as electronic bracelets) when the original reason for use expired. Conclusions: A more nuanced view of the benefits and drawbacks of surveillance technology is called for. Study participants tended to incorporate surveillance technology into existing care routines and to do so with some reluctance and reservation. They also tended to favor certain technologies, for example, making intensive use of certain devices (such as digital enhanced cordless telecommunications phones) while demonstrating ambivalence about others (such as the tagging and tracking systems). Client safety and physical proximity seemed to be dominant values, suggesting that the fear that surveillance technology will cause attenuation of the care relationship is unfounded. On the other hand, the values of client freedom and autonomy seemed less influential; participants often appeared unwilling to take risks with the technology. Care facilities wishing to implement surveillance technology should encourage ongoing dialogue on how staff members view and understand the concepts o f autonomy and risk. A clear and well-formulated vision for the use of surveillance technology--one understood and supported by all stakeholders--seems imperative to successful implementation. [ABSTRACT FROM AUTHOR]
- Published
- 2014
35. Verdacht auf See -- Zwischen Befugnissen und Signalen.
- Author
-
Ellebrecht, Sabrina
- Abstract
Copyright of Kriminologisches Journal is the property of Julius Beltz GmbH & Co. KG Beltz Juventa and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2014
36. Increasing of the urban traffic surveillance by automatic information device.
- Author
-
Mircea, Moldovan and Nicolae, Filip
- Abstract
Our work consists in the development and setting of an electronic information panel designed to monitor road traffic informational characteristics (velocity, vehicle length and flow density). This information is available using two displays installed above the monitored traffic line. Wishing a 'just in time' warning for the driver, the display of the instantaneous speed was represented by the green light if it falls within the legal speed and red light if it is over the legal speed. Our aim was to develop an informing, monitoring and data storing equipment, able to record the time, the speed and the length of crossing vehicles. A test version, which consists of three main modules: the detection module, a programmable controller and an information panel, was designed and a complex hardware and software equipment was manufactured. The efficiency, reliability and stability in operation were the chosen criteria for the detection module. The programmable controller processes the data collected from detectors and displays it. In the future, the hardware platform will allow the connection to other devices (eg. GPRS modem), aiming to achieve the possibility to operate independently or integrated into a system of remote macro-monitoring (idea for further development). [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
37. Quality of life of nursing-home residents with dementia subject to surveillance technology versus physical restraints: an explorative study.
- Author
-
Boekhorst, S., Depla, M. F. I. A., Francke, A. L., Twisk, J. W. R., Zwijsen, S. A., and Hertogh, C. M. P. M.
- Subjects
- *
NURSING home patients -- Restraint , *ELECTRONIC surveillance , *QUALITY of life , *NURSING home patients , *DEMENTIA patients , *EQUIPMENT & supplies , *PSYCHOLOGY - Abstract
Objective As physical restraints should only be used in exceptional cases, there is an urgent need for alternatives to restraint use. Surveillance technology could be such an alternative. This study explored whether nursing-home residents with dementia subjected to surveillance technology had better quality of life scores for mood, behavioral and societal dimensions than residents with physical restraints. Methods Quality of life was assessed longitudinally, with three measurements in six psychogeriatric nursing homes of residents with surveillance technology ( n = 170) and residents with physical restraints ( n = 22). QUALIDEM subscales were used to measure five dimensions of quality of life. Multilevel longitudinal univariate and multivariate regression techniques were used to analyze the data. Results Because physical restraints were almost exclusively used in residents with low activities of daily living (ADL) independency (18 of the 22), we restricted the regression analyses to residents with a Barthel Index score ≤ 5 (overall n = 53). Univariate results showed that highly ADL-dependent residents with surveillance technology had significantly more positive affect than highly ADL-dependent residents with physical restraints. However, this difference proved to be no longer significant after adjustment for the confounders: age, sex and stage of dementia. Conclusions Quality of life of highly ADL-dependent nursing-home residents with dementia seems to be unrelated to the use of surveillance technology as opposed to physical restraints. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
38. The place of surveillance technology in residential care for people with intellectual disabilities: is there an ideal model of application.
- Author
-
Niemeijer, A., Frederiks, B., Depla, M., Eefsting, J., and Hertogh, C.
- Subjects
- *
TECHNOLOGY & ethics , *TECHNOLOGY equipment , *BRAINSTORMING , *COMPARATIVE studies , *DEMENTIA , *ETHICISTS , *INTELLECTUAL disabilities , *PEOPLE with intellectual disabilities , *PHYSICIANS , *SAFETY , *RESIDENTIAL care , *CONCEPT mapping , *DESCRIPTIVE statistics - Abstract
Background The demand for (care) services for people with intellectual disabilities (ID) is on the rise, because of an expanding population of people with ID as resources are concurrently diminishing. As a result, service providers are increasingly turning to technology as a potential answer to this problem. However, the use and application of surveillance technology (ST) in the care for people with ID provokes conflicting reactions among ethicists and healthcare professionals, and no ethical consensus has been reached as of yet. The aim of this study was thus to provide an overview of how ST is viewed by (care) professionals and ethicists working in the field by investigating what the ideal application of ST in the residential care for people with ID might entail. Methods Use was made of the concept mapping method as developed by Trochim; a computer-assisted procedure consisting of five subsequent steps: brainstorming, prioritising, clustering, processing by the computer and finally analysis. Various participants (ranging from ethicists, physicians to support workers) were invited on the basis of their intended (professional) background. Prior to this study, the views of care professionals on the (ideal) application of ST in the residential care of people with dementia have been consulted and analysed using concept mapping. A comparison between the two studies has been made. Results Results show that the generated views represent six categories, varying from it being beneficial to the client; reducing restraints and it being based on a clear vision to (the need for) staff to be equipped; user friendliness and attending to the client. The results are presented in the form of a graphic chart. Both studies have produced very similar results, but there are some differences, as there appears to be more fear for ST among care professionals in the care for people with ID and views are expressed from a more developmental perspective rather than a person-centred perspective with regard to people with dementia. Conclusions When it comes to views on using technology both in dementia care and the care for people with ID, there appears to be an inherent duality, often rooted in the moral conflict between safety versus freedom or autonomy. What is more, elaboration on abstract concepts often presumed to be self-evident, whether ethical or not, has proven to be difficult. How ST is viewed and apprehended is not so much dependent of the care setting and care needs, but rather whether it is clear to everyone affected by ST, what one wants to achieve with ST. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
39. Deviance and Control in Communities with Perfect Surveillance - The Case of Second Life.
- Author
-
Victoria Wang, Haines, Kevin, and Tucker, John V.
- Subjects
SOCIAL media ,MASS surveillance ,SOCIAL control ,SOCIAL bonds ,SOFTWARE development tools ,SOCIAL conflict ,ONLINE data processing - Abstract
Advanced cybercommunities are communities in which perfect surveillance is possible - software tools allow everything to be observed, recorded, archived, pored over at a later date and acted upon. Hence, one expects that these surveillance technologies ought to be heavily used and effective in controlling deviance in these cybercommunities. Drawing on our research in the cybercommunity Second Life, we observe that surveillance technologies are not heavily used to deal with deviance; instead, it is the power of relationships that form the fabric of social control and the regulation of deviance. This discovery questions the effectiveness of technology as a regulator, both in Second Life and in the real world, as well as evidences the importance of social bond as a mediator of deviance. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
40. Veneno de abeja: Vigilancia tecnológica mediante el estudio de las citas de patentes.
- Author
-
Delgado, Beatriz García, Suárez, Dámarys, Zayas, Daniel, Ali, Alfonso, and Oliva, Mairelys
- Subjects
- *
BEEHIVES , *BEE venom , *PHARMACOLOGY , *IMMUNOGLOBULINS , *IMMUNOLOGIC diseases , *THERAPEUTIC use of venom , *THERAPEUTICS - Abstract
The products of the beehive, particularly the bee venom, are among the products with very important pharmacological properties. Nowadays, the use of beehive's products is diversified, and it's necessary to carry out systematic studies of technological surveillance related to this topic. This article presents a study from twenty-eight patents (granted by the United States Patents and Trades Office), that claim the bee venom, and the citations corresponding to these inventions. This information was processed with an automated system developed for processing patents and its citations, which generates a file that contains the processed information and facilitates its later visualization with a "net" appearance on NetDraw System. The resulting is an effective and immediate identification of those groupings of interest related directly to the bee venom. It was determined that exists a positive tendency in the technological development of equipments and methods for the recollection of the venom of bees. Also was determined the continuous increasing of patents about processes and products that are related fundamentally to the isolation, purification and preparation of proteins, antibodies and diagnoses kits that are used in the identification and treatment of immunologic diseases. [ABSTRACT FROM AUTHOR]
- Published
- 2008
41. Postmodern Gargoyles, Simulated Power Aesthetics.
- Author
-
Kien, Grant
- Subjects
- *
GARGOYLES , *AESTHETICS , *ETHNOLOGY , *ELECTRONIC surveillance , *CAMERAS - Abstract
This work incorporates a camera as participant in the showing of experiences of surveillance, exploring some effects of defining power as the circulation of signifiers. This techno-ethnographic piece moves through numerous spaces, documenting how myth and aesthetics are experienced and play in everyday life, inducing performances that ultimately appear to stabilize and further legitimate a globally reaching network of surveillance. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
42. Little brother: could and should wearable computing technologies be applied to reducing older people’s fear of crime?
- Author
-
Blythe, Mark A., Wright, Peter C., and Monk, Andrew F.
- Subjects
- *
COMPUTER engineering , *TECHNOLOGICAL innovations , *CREATIVE ability in technology , *COMMUNICATION & technology , *WEBCAMS , *WEBSITES - Abstract
This paper considers whether emerging wearable computing technologies could and should be applied to reducing older people’s fear of crime. The paper begins by exploring the sociological and criminological literature, which debates why older people are most likely to fear crime, even though they are least likely to be victims. It goes on to report findings from ethnographic studies of key care and social service professionals in an English city. This field work reflects the ways in which assistive technologies for older people can function as signs of vulnerability, and also reports the uses of relatively simple information and communication technologies in providing critical backup and reassurance for elderly users. The fear of crime is then considered as an information problem centring on three questions: what’s going on, what can I do about it and can I get help? Possible applications of emerging wearable surveillance technologies are then explored through a design concept called the Cambadge. This is a wearable, wireless webcam for older people to broadcast video and audio data to police or community Web sites. This concept is situated with reference to a company developing a similar technology and to related fields. It is argued that the design problems of such surveillance technology are inherently political. The case is made with reference to the history and philosophy of surveillance and the massive demographic shifts of the ageing population. It is argued that utopian visions of the uses of such technology under-theorise power and accountability. The paper concludes that technological innovations will not adequately address older people’s fear of crime without accompanying social and cultural change. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
43. Iraq and the future of nuclear nonproliferation: The roles of inspections and treaties.
- Author
-
Pilat, J.F.
- Subjects
- *
NUCLEAR weapons - Abstract
Looks at the impact Iraq's extensive program to develop nuclear weapons may have on the future of the international nuclear nonproliferation regime. Violations of Iraqi obligations under the Treaty on the Nonproliferation of Nuclear Weapons; United Nations Security Council Resolutions; Possible failure of nonproliferation regime; Future of the regime; Arms control implications; Conclusions.
- Published
- 1992
- Full Text
- View/download PDF
44. Integrated day- and night care by the integration of technology.
- Author
-
Nap, Henk Herman, Lukkien, Dirk, Timmer, Sabine, Suijkerbuijk, Sandra, and van Hest, Annalies
- Subjects
- *
ELECTRONIC health records , *HEALTH planning , *NIGHT , *TECHNOLOGY - Abstract
Intramural care is provided by different teams of day- and night care workers. It can be a challenge to provide the necessary care and support, in particular whenever decisions need to be based on care plans and reports made by someone else. Clear communication and coordination between day- and night care professionals seems to be a prerequisite for guaranteeing 24-hour personalized care and support. Increasingly, this coordination between professionals takes place through information systems such as the Electronic Health Record EHR and digital surveillance technologies, of which the latter are mostly used during the night. These systems can provide professionals a better awareness of the client's care and support needs. However, automatic information exchange between the EHR and the surveillance technology is lacking. Thereby, these systems are used separately, forcing care professionals to manually transfer client data from one system to another. Meanwhile, both systems contain a great amount of possibly relevant data that can reinforce each other. Yet, it is unclear which minimum dataset is relevant to exchange and how the exchange of data can contribute to 24/7 care. Furthermore, care providers struggle with the balance between privacy legislations and the safety of their clients. Therefore, an explorative study was performed with the central question: How can it be ensured that care professionals have a good picture of the client's healthcare needs 24 hours a day, regardless of the different systems that are supporting them? Semi-structured interviews and focus groups were performed with day- and night care professionals of six care organizations and developers of six EHR suppliers and six surveillance technology suppliers. The interviews and focus groups were held to gather an insight in their perceptions in respect to the research question. From the study it appeared that standardization is lacking to enable the exchange of information between systems and that a vendor lock-in is quite common among care organizations. Care professionals and organizations have the need to be provided with relevant information at the right time through one central system, or as few solutions as possible. The communication and coordination between day- and night care professionals can - according to care professionals - be accomplished by: having and sharing a clear vision on the use of night care technology among all relevant stakeholders; active support for this vision by the board of directors; assigning key-users to support and promote exchange; and night care integration in EHR. The integrated use of data from various sources is an important condition for exploiting the predictive value of data and more proactively responding to potential risks and needs of clients. Information exchange and the optimal use of this information not only involves the integration of technology, but also the integration of services and work procedures. This requires a cultural change within healthcare organizations with support of all stakeholders. Thus, integrated care must be addressed both at the human and system level. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
45. What do we require from surveillance technology? A review of the needs of people with dementia and informal caregivers.
- Author
-
Vermeer Y, Higgs P, and Charlesworth G
- Abstract
Introduction: Dementia has become a major global concern and surveillance technology might provide support for informal caregivers and people with dementia. However, the needs of caregivers and people with dementia for surveillance technology have not been reviewed., Method: A scoping literature review was used to identify the needs of caregivers and/or people with dementia towards surveillance technology. Electronic database searching was undertaken on LexisNexis, PubMed, Scopus, EMBASE, MEDLINE, Cumulative Index to Nursing, Allied Health Literature, PsycINFO, Web of Science, Assistive Technology database, and Google Scholar. Eligible studies were synthesized by theme., Results: Twenty-eight eligible studies were identified, with the majority reporting the needs of caregivers rather than people with dementia. The predominant themes for caregivers were location accuracy, and increasing the safety of the person with dementia. People with dementia wanted simple useful technology that fits within their capacity and existing routines., Conclusions: The needs of people with dementia must be considered when designing surveillance products. Studies have mostly focused on caregivers and discount ST product requirements. Further work is required to establish effective use of surveillance technology in dementia care. Therefore, further research should cross analyze these results by examining both the needs of caregivers, and people with dementia., (© The Author(s) 2019.)
- Published
- 2019
- Full Text
- View/download PDF
46. The experiences of people with dementia and intellectual disabilities with surveillance technologies in residential care.
- Author
-
Niemeijer AR, Depla MF, Frederiks BJ, and Hertogh CM
- Subjects
- Humans, Long-Term Care methods, Netherlands, Personal Autonomy, Privacy, Safety Management ethics, Technology Assessment, Biomedical methods, Dementia psychology, Persons with Mental Disabilities psychology, Population Surveillance methods, Residential Facilities trends
- Abstract
Background: Surveillance technology such as tag and tracking systems and video surveillance could increase the freedom of movement and consequently autonomy of clients in long-term residential care settings, but is also perceived as an intrusion on autonomy including privacy., Objective: To explore how clients in residential care experience surveillance technology in order to assess how surveillance technology might influence autonomy., Setting: Two long-term residential care facilities: a nursing home for people with dementia and a care facility for people with intellectual disabilities., Methods: Ethnographic field study., Ethical Considerations: The boards representing clients and relatives/proxies of the clients were informed of the study and gave their written consent. The clients' assent was sought through a special information leaflet. At any time clients and/or proxy were given the option to withdraw from the study. The research protocol was also reviewed by a medical ethics committee., Findings: Our findings show a pattern of two themes: (1) coping with new spaces which entailed clients: wandering around, getting lost, being triggered, and retreating to new spaces and (2) resisting the surveillance technology measure because clients feel stigmatized, missed the company, and do not like being "watched.", Conclusion: Client experiences of surveillance technology appear to entail a certain ambivalence. This is in part due to the variety in surveillance technology devices, with each device bringing its own connotations and experiences. But it also lies in the devices' presupposition of an ideal user, which is at odds with the actual user who is inherently vulnerable. Surveillance technology can contribute to the autonomy of clients in long-term care, but only if it is set in a truly person-centered approach., (© The Author(s) 2014.)
- Published
- 2015
- Full Text
- View/download PDF
47. Assessment vs. appraisal of ethical aspects of health technology assessment: can the distinction be upheld?
- Author
-
Sandman L and Heintz E
- Abstract
An essential component of health technology assessment (HTA) is the assessment of ethical aspects. In some healthcare contexts, tasks are strictly relegated to different expert groups: the HTA-agencies are limited to assessment of the technology and other actors within the health care sector are responsible for appraisal and recommendations. Ethical aspects of health technologies are considered with reference to values or norms in such a way that may be prescriptive, or offer guidance as to how to act or relate to the issue in question. Given this internal prescriptivity, the distinction between assessment and appraisal seems difficult to uphold, unless the scrutiny stops short of a full ethical analysis of the technology. In the present article we analyse the distinction between assessment and appraisal, using as an example ethical aspects of implementation of GPS-bracelets for people with dementia. It is concluded that for HTA-agencies with a strictly delineated assessment role, the question of how to deal with the internal prescriptivity of ethics may be confusing. A full ethical analysis might result in a definite conclusion as to whether the technology in question is ethically acceptable or not, thereby limiting choices for decision-makers, who are required to uphold certain ethical values and norms. At the same time, depending on the exact nature of such a conclusion, different action strategies can be supported. A positive appraisal within HTA could result in a decision on mandatory implementation, or funding of the technology, thereby making it available to patients, or decisions to allow and even encourage the use of the technology (even if someone else will have to fund it). A neutral appraisal, giving no definite answer as to whether implementation is recommended or not, could result in a laissez-faire attitude towards the technology. A negative appraisal could result in a decision to discourage or even prohibit implementation. This paper presents an overview of the implications of different outcomes of the ethical analysis on appraisal of the technology. It is considered important to uphold the distinction between assessment and appraisal, primarily to avoid the influence of preconceived values and political interests on the assessment. Hence, as long as it is not based on the subjective value judgments of the HTA-agency (or its representative), such an appraising conclusion would not seem to conflict with the rationale for the separation of these tasks. Moreover, it should be noted that if HTA agencies abstain from including full ethical analyses because of the risk of issuing an appraisal, they may fail to provide the best possible basis for decision-makers. Hence, we argue that as long as the ethical analysis and its conclusions are presented transparently, disclosing how well-founded the conclusions are and/or whether there are alternative conclusions, the HTA-agencies should not avoid taking the ethical analysis as close as possible to a definite conclusion.
- Published
- 2014
- Full Text
- View/download PDF
48. Democracy, technology, and privacy
- Author
-
Lundstedt, Sven B.
- Published
- 1989
49. Suspect Technologies: Scrutinizing the Intersection of Science, Technology, and Policy
- Author
-
Campbell, Nancy D.
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.