scholarly journals Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns

2021 ◽  
Vol 14 (1) ◽  
pp. 205979912098776
Author(s):  
Joseph Da Silva

Interviews are an established research method across multiple disciplines. Such interviews are typically transcribed orthographically in order to facilitate analysis. Many novice qualitative researchers’ experiences of manual transcription are that it is tedious and time-consuming, although it is generally accepted within much of the literature that quality of analysis is improved through researchers performing this task themselves. This is despite the potential for the exhausting nature of bulk transcription to conversely have a negative impact upon quality. Other researchers have explored the use of automated methods to ease the task of transcription, more recently using cloud-computing services, but such services present challenges to ensuring confidentiality and privacy of data. In the field of cyber-security, these are particularly concerning; however, any researcher dealing with confidential participant speech should also be uneasy with third-party access to such data. As a result, researchers, particularly early-career researchers and students, may find themselves with no option other than manual transcription. This article presents a secure and effective alternative, building on prior work published in this journal, to present a method that significantly reduced, by more than half, interview transcription time for the researcher yet maintained security of audio data. It presents a comparison between this method and a fully manual method, drawing on data from 10 interviews conducted as part of my doctoral research. The method presented requires an investment in specific equipment which currently only supports the English language.

Author(s):  
Eges Egedigwe

Cloud computing-based technology is becoming increasingly popular as a way to deliver quality education to community colleges, universities, and other organizations. At the same time, compared with other industries, colleges have been slow on implementing and sustaining cloud computing services on an institutional level because of budget constraints facing many large community colleges, in addition to other obstacles. Faced with this challenge, key stakeholders are increasingly realizing the need to focus on service quality as a measure to improve their competitive position in today's highly competitive environment. Considering the amount of study done with cloud computing in education, very little has been done in examining the needs and the satisfactions of the instructor customer. The purpose of this chapter is to examine the expectations and perceptions of instructors' usage of cloud computing based technology on overall quality of service (QoS) in their respective institutions of higher education.


Author(s):  
Malay Kumar ◽  
Manu Vardhan

The growth of the cloud computing services and its proliferation in business and academia has triggered enormous opportunities for computation in third-party data management settings. This computing model allows the client to outsource their large computations to cloud data centers, where the cloud server conducts the computation on their behalf. But data privacy and computational integrity are the biggest concern for the client. In this article, the authors attempt to present an algorithm for secure outsourcing of a covariance matrix, which is the basic building block for many automatic classification systems. The algorithm first performs some efficient transformation to protect the privacy and verify the computed result produced by the cloud server. Further, an analytical and experimental analysis shows that the algorithm is simultaneously meeting the design goals of privacy, verifiability and efficiency. Also, found that the proposed algorithm is about 7.8276 times more efficient than the direct implementation.


2018 ◽  
Vol 12 (2) ◽  
pp. 1-25 ◽  
Author(s):  
Malay Kumar ◽  
Manu Vardhan

The growth of the cloud computing services and its proliferation in business and academia has triggered enormous opportunities for computation in third-party data management settings. This computing model allows the client to outsource their large computations to cloud data centers, where the cloud server conducts the computation on their behalf. But data privacy and computational integrity are the biggest concern for the client. In this article, the authors attempt to present an algorithm for secure outsourcing of a covariance matrix, which is the basic building block for many automatic classification systems. The algorithm first performs some efficient transformation to protect the privacy and verify the computed result produced by the cloud server. Further, an analytical and experimental analysis shows that the algorithm is simultaneously meeting the design goals of privacy, verifiability and efficiency. Also, found that the proposed algorithm is about 7.8276 times more efficient than the direct implementation.


2020 ◽  
Vol 4 (2) ◽  
pp. 77-86
Author(s):  
Sirli Agustiani ◽  
Arlina Dewi

Background: Discomfort often occurs when catheter placement and also the removal of catheter. In health sector, nursing practice focus on patient quality and safety. Feeling safe is a form of feeling that if not controlled of anxiety. Using urinary catheter will affect to quality of life of patients such as physical, psychological, socio cultural, environmental and spiritual aspects.Objective: The aims of this study to describe how the fulfillment of safety and comfort needs in urinary catheter patients.Method: This study use literature review. The database were PubMed, Google Scholar and ProQuest. The search was restricted to English language articles and limited to last 5 years (2014-2019). Articles should be related to research. This study use main keywords experience AND “urinary catheter*”. Only fourteen journals met the eligbility criteria and were review by two researchers.Result: The Results of article that urinary catheter impact on several aspect of patients such as social aspect patient have limited social interaction, and difficult to adaptation. In psychological aspect, patient feel embarrassed, dissatisfaction, frustation, anxiety, and low self esteem. In physical aspect, patient feel blocking their movement, increase the risk of infection, painful, discomfort, and iritation. In other aspect, the patient has economic problem.Conclusion: The findings of articles show positive and negative impact for patient’s life when urinary catheter inserted. The review provides insight that can be useful for nurses in concerning patient’s need about safety and comfort especially patients with urinary catheters.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

In recent era individuals and organizations are migrating towards the cloud computing services to store and retrieve the data or services. However, they have less confidence on cloud as all the task are handled by the service provider without any involvement of the data owner. Cloud system provides features to the owner, to store their data on some remote locations and allow only authorized users to access the data according to the role, access capability or attribute they possess. Storing the personal health records on cloud server (third party) is a promising model for healthcare services to exchange information with the help of cloud provider. In this chapter, we highlight the various security issues and concerns such as trust, privacy and access control in cloud based healthcare system that needs to be known while storing the patient's information over a cloud system.


2018 ◽  
Author(s):  
Mohammad Noormohammadpour ◽  
Cauligi S. Raghavendra ◽  
Sriram Rao ◽  
Asad M. Madni

Datacenter-based Cloud Computing services provide a flexible, scalable and yet economical infrastructure to host online services such as multimedia streaming, email and bulk storage. Many such services perform geo-replication to provide necessary quality of service and reliability to users resulting in frequent large inter-datacenter transfers. In order to meet tenant service level agreements (SLAs), these transfers have to be completed prior to a deadline. In addition, WAN resources are quite scarce and costly, meaning they should be fully utilized. Several recently proposed schemes, such as B4 [1], TEMPUS [2], and SWAN [3] have focused on improving the utilization of inter-datacenter transfers through centralized scheduling, however, they fail to provide a mechanism to guarantee that admitted requests meet their deadlines. Also, in a recent study, authors propose Amoeba [4], a system that allows tenants to define deadlines and guarantees that the specified deadlines are met, however, to admit new traffic, the proposed system has to modify the allocation of already admitted transfers. In this paper, we propose Rapid Close to Deadline Scheduling (RCD), a close to deadline traffic allocation technique that is fast and efficient. Through simulations, we show that RCD is up to 15 times faster than Amoeba, provides high link utilization along with deadline guarantees, and is able to make quick decisions on whether a new request can be fully satisfied before its deadline.


Author(s):  
Vaikunth Pai T. ◽  
P.S. Aithal

Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing noncore activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. This model enables convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services. Cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Even though organizations get many benefits of cloud computing services, many organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security, being the major issues which hinder the growth of cloud computing service model due to the provision of handling confidential data by the third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. In this paper, we have discussed the security issues, the challenges and the opportunities in the adoption and management of cloud computing services model in an organization.


Author(s):  
Mohammad Nabil Almunawar ◽  
Hasan Jawwad Almunawar

We are witnessing the business prospects of cloud computing becoming apparent as many cloud computing services have been made available online. Previously, outsourcing of computing resources employs a third party to set up, develop, and maintain the infrastructure within or outside the business organization. However, nowadays many business organizations all over the world see that outsourcing their computing resources through cloud computing is a highly viable option as it saves a business organization from the complicated setup and maintenance costs of computer infrastructure. There are three generally known types cloud computing, namely public cloud, private cloud, and hybrid cloud. There also three generally service models namely software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). This chapter highlights the development of cloud computing technology, benefits and issues of outsourcing an organization's computing resources through cloud computing.


Sign in / Sign up

Export Citation Format

Share Document