K-Anonymous Multi-party Secret Handshakes
NASA Astrophysics Data System (ADS)
Xu, Shouhuai; Yung, Moti
Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, authentication methods are also crucial for such interactions. Secret handshake is a relatively recent mechanism that facilitates privacy-preserving mutual authentication between communicating peers. In recent years, researchers have proposed a set of secret handshake schemes based on different assumptions about the credentials used: from one-time credentials to the more general PKI-like credentials. In this paper, we concentrate on k-anonymous secret handshake schemes based on PKI-like infrastructures. More specifically, we deal with the k-anonymous m-party (m > 2) secret handshake problem, which is significantly more involved than its two-party counterpart due to the following: When an honest user hand-shakes with m - 1 parties, it must be assured that these parties are distinct; otherwise, under the mask of anonymity a dishonest participant may clone itself in a single handshake session (i.e., assuming multiple personalities).
Anon-Pass: Practical Anonymous Subscriptions.
Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett
2013-12-31
We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.
Anon-Pass: Practical Anonymous Subscriptions
Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett
2014-01-01
We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081
Swarm autonomic agents with self-destruct capability
NASA Technical Reports Server (NTRS)
Hinchey, Michael G. (Inventor); Sterritt, Roy (Inventor)
2009-01-01
Systems, methods and apparatus are provided through which in some embodiments an autonomic entity manages a system by generating one or more stay alive signals based on the functioning status and operating state of the system. In some embodiments, an evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy. The evolvable neural interface receives and generates heartbeat monitor signals and pulse monitor signals that are used to generate a stay alive signal that is used to manage the operations of the synthetic neural system. In another embodiment an asynchronous Alice signal (Autonomic license) requiring valid credentials of an anonymous autonomous agent is initiated. An unsatisfactory Alice exchange may lead to self-destruction of the anonymous autonomous agent for self-protection.
Swarm autonomic agents with self-destruct capability
NASA Technical Reports Server (NTRS)
Hinchey, Michael G. (Inventor); Sterritt, Roy (Inventor)
2011-01-01
Systems, methods and apparatus are provided through which in some embodiments an autonomic entity manages a system by generating one or more stay alive signals based on the functioning status and operating state of the system. In some embodiments, an evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy. The evolvable neural interface receives and generates heartbeat monitor signals and pulse monitor signals that are used to generate a stay alive signal that is used to manage the operations of the synthetic neural system. In another embodiment an asynchronous Alice signal (Autonomic license) requiring valid credentials of an anonymous autonomous agent is initiated. An unsatisfactory Alice exchange may lead to self-destruction of the anonymous autonomous agent for self-protection.
Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.
2015-01-01
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349
Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F
2015-07-01
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.
dCache, towards Federated Identities & Anonymized Delegation
NASA Astrophysics Data System (ADS)
Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.
2017-10-01
For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.
Peterson, Shannon; Mayer, Allan; Nelson, Beth; Roland, Phillip
2015-08-01
Many community hospital gynecologic surgery training programs now include robotics.At St. Francis Hospital and Medical Center, we have integrated robotic surgical training since 2006. This study is designed to assess the success in training gynecology residents in robotic surgery. An anonymous web-based survey tool (www. survey monkey. com) was sent to all Ob/Gyn residency graduates from 2007-2010 (n = 17). From 2011-2014, we emailed three reevaluation questions to all 2007-2014 graduates (N = 32). Design Classification: II-3. The response rate was 95%, and 11 of 17 initial graduates (65%) indicated that they had received adequate robotic training. Currently, 24 of 32 (75%) graduates practice in hospitals with robotic availability. Twenty of the 32 graduates (63%) are using robotics in their surgical practices. Nine of these 20 graduates (45%) were fully credentialed following their residency. The other 11 graduates (55%)required further proctoring to obtain full robotic credentials. Robotic surgical training is a component of modern gynecologic surgical training. Postresidency robotic credentialing is a realistic graduation goal for residents who plan to practice gynecologic surgery.
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
2015-04-01
anonymous credentials. In CSF’14: 27th Computer Security Foundations Symposium. IEEE Computer Society, 2014. To appear. [22] David Chaum . Untraceable...electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. [23] David Chaum . Secret-ballot receipts...True voter-verifiable elections. IEEE Security and Privacy, 2(1):38–47, 2004. [24] David Chaum , Richard Carback, Jeremy Clark, Aleksander Essex, Stefan
Evaluation strategy for the I-95 CC electronic credentialing program
DOT National Transportation Integrated Search
1999-03-01
The electronic credentialing field operational test will undertake the model deployment of electronic credentialing for commercial vehicles. The project will involve the development of state-specific electronic credentialing systems.
Bellamkonda, Venkatesh R; Shokoohi, Hamid; Alsaawi, Abdulmohsen; Ding, Ru; Campbell, Ronna L; Liu, Yiju Teresa; Boniface, Keith S
2015-10-01
To describe the credentialing systems of North American emergency department systems (EDS) with emergency ultrasound (EUS) fellowship programmes. This is a prospective, cross-sectional, survey-based study of North American EUS fellowships using a 62-item, pilot-tested, web-based survey instrument assessing credentialing and training systems. The American College of Emergency Physicians (ACEP) distributed the surveys using SNAP survey (Snap Surveys Ltd, Portsmouth, New Hampshire, USA). Over 6 months, 75 eligible programmes were surveyed, 55 responded (73% response rate); 1 declined to participate leaving 54 participating programmes. Less than 20% of EDS credential nurses, physician assistants, nurse practitioners and students in EUS. Respondent EDS reported having an average of 4.2 ± 3.3 ultrasound faculty members (faculty identifying their career focus as EUS). The median number of annual point-of-care ultrasounds reported was 5000 (IQR 3000-8000). 30 EDS (56%) credential each examination individually and 48 EDS (89%) use ACEP credentialing criteria. 61% of fellowship leadership believe their credentialing system is either satisfactory or very satisfactory (Cronbach's coefficient α=0.84). The data show heterogeneity among North American EDS with EUS fellowship programmes with regard to credentialing systems despite published guidelines from the ACEP and Canadian Emergency Ultrasound Society. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
DOT National Transportation Integrated Search
2001-09-01
The State of New York received a grant from the I-95 Corridor Coalition to develop a proof-of-concept for an electronic credentialing system for the motor carrier industry. When fully developed, the system, which is a web-based solution, will enable ...
ERIC Educational Resources Information Center
Miller, Jerry W., Ed.; Mills, Olive, Ed.
The Task Force on Educational Credit and Credentials of the American Council on Education undertook a two-year study to determine how postsecondary education's system for awarding credit and credentials can be changed or its adequacy improved to meet today's educational and social needs. This book sets forth the Task Force's report and…
Leveraging Commercially Issued Multi-Factor Identification Credentials
NASA Technical Reports Server (NTRS)
Baldridge, Tim W.
2010-01-01
This slide presentation reviews the Identity, Credential and Access Management (ICAM) system. This system is a complete system of identity management, access to desktops and applications, use of smartcards, and building access throughout NASA.
The role of optics in secure credentials
NASA Astrophysics Data System (ADS)
Lichtenstein, Terri L.
2006-02-01
The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.
DOT National Transportation Integrated Search
2004-09-01
The following case study provides an in-depth view of the deployment of Commercial Vehicle Information Systems and Networks (CVISN) Electronic Credentialing in Washington State. It describes successful practices and lessons learned in operations and ...
CREDENTIALISM AND THE EDUCATION SYSTEM.
ERIC Educational Resources Information Center
MILLER, S.M.
EXISTING SOCIAL AND OCCUPATIONAL STRUCTURES SHOULD BE REMADE SO THAT CREDENTIALISM DOES NOT ARBITARILY BAR NEGROES AND THE POOR FROM ECONOMIC WELL-BEING AND SOCIAL MOBILITY. GRADUATION FROM A SCHOOL SIMPLY IMPLIES THAT ONE HAS FIT INTO THE PROPER EDUCATIONAL STRAITS AND DOES NOT NECESSARILY SIGNAL QUALITY PERFORMANCE. CREDENTIALISM AND ITS…
DOT National Transportation Integrated Search
2013-12-27
This report presents an analysis by Booz Allen Hamilton (Booz Allen) of the technical design for the Security Credentials Management System (SCMS) intended to support communications security for the connected vehicle system. The SCMS technical design...
Keystroke Dynamics-Based Credential Hardening Systems
NASA Astrophysics Data System (ADS)
Bartlow, Nick; Cukic, Bojan
abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.
Micro-Credentials for Impact: Holding Professional Learning to High Standards
ERIC Educational Resources Information Center
Crow, Tracy
2017-01-01
This paper seeks to chart a course for leveraging a micro-credentialing system to enable more educators to achieve the potential of professional learning. The paper uses the Standards for Professional Learning as a frame to provide guidance to everyone involved in micro-credentials to ensure that learners experience the research-based elements of…
Elements of Success: How Type of Secondary Education Credential Helps Predict Enlistee Attrition
ERIC Educational Resources Information Center
Burkhauser, Susan; Hanser, Lawrence M.; Hardison, Chaitra M.
2014-01-01
The U.S. military services have traditionally used a tiering system, including education credentials such as high school diplomas, in combination with Armed Forces Qualification Test (AFQT) scores to help gauge the likelihood of a recruit persevering through his or her first term of service. But what about less traditional credentials, such as…
Electronic credentialing for commercial vehicle operations : a cross-cutting analysis
DOT National Transportation Integrated Search
1999-06-10
This case study presents an analysis of how Maryland, Virginia, and Kentucky have used the Commercial Vehicle Information Systems & Networks (CVISN) Architecture to develop state CVISN systems designs for electronic credentialing. Focus is on the CVI...
DOT National Transportation Integrated Search
2017-09-01
MnDOT uses two online systems implemented in the 1990s to issue and manage permits for oversize/overweight (OS/OW) freight and motor carrier credentials: - RouteBuilder, an OS/OW permitting system with a routing component. - Motor Carrier Information...
Connect the Credentials: A New Effort Aims to Change the Nation's Fragmented Credentialing System
ERIC Educational Resources Information Center
Pierce, Dennis
2016-01-01
Over the past 30 years, the number of industry certificates awarded by colleges and universities has surged more than 800 percent, according to Lumina Foundation. At the same time, new forms of credentials--such as badges--also have emerged. And while there are more than 4,000 organizations granting certifications in the U.S., fewer than 10…
An Examination of Features of Evidence-Based Teacher Credentialing Systems
ERIC Educational Resources Information Center
Fallona, Catherine; Johnson, Amy
2017-01-01
As requested by the Maine Legislature's Joint Standing Committee on Education and Cultural Affairs, the Maine Education Policy Research Institute (MEPRI) has conducted a study with the purpose of examining current research and evidence-based policies related to teacher credentialing systems. The goal is to inform revisions to Maine's current…
77 FR 71177 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-29
... automated Tri-Service, Web- based database containing credentialing, privileging, risk management, and... credentialing, privileging, risk- management and adverse actions capabilities which support medical quality... submitting comments. Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd...
New York state proof-of-concept project one stop credentialing and registration
DOT National Transportation Integrated Search
2001-01-01
The I-95 Corridor Coalition initially awarded funding for the development of electronic credentialing systems for commercial vehicle operations to five states: New York, New Jersey, Pennsylvania, Delaware, and Massachusetts. The initial evaluation of...
DOT National Transportation Integrated Search
2001-05-01
The State of New York received a grant from the I-95 Corridor Coalition to develop a proof-of-concept for an electronic credentialing system for the motor carrier industry. When fully developed, the system, which is a web-based solution, will enable ...
The Australian Skills Agenda: Productivity versus Credentialism?
ERIC Educational Resources Information Center
Ashenden, Dean
1992-01-01
Discusses the rise of the concept of improved skills recognition in Australian industry. Highlights include the role of industrial relations; the Australian vocational education and training system; recognition, industrial relations, and workplace change; career and training paths; credentials; and future prospects. (10 references) (LRW)
Credentialism in Our Ignorant Society.
ERIC Educational Resources Information Center
Marien, Michael
All societies have procedures for selecting who will occupy important positions. The use of credentials characterizes our system of social selection, and our worship of them has created the following problems: an artificial demand for education, artificial restraints to learning, the overlooking of obsolescence, generational inversion (wherein the…
DOT National Transportation Integrated Search
1999-07-01
This report presents an examination of the process used in preparing electronic credentials for commercial vehicle operations in Kentucky Maryland, and Virginia. It describes the experience of using the Commercial Vehicle Information Systems & Networ...
Educational Authority in the ''Open Door'' Marketplace
ERIC Educational Resources Information Center
Deterding, Nicole M.; Pedulla, David S.
2016-01-01
In recent years, private for-profit education has been the fastest growing segment of the U.S. postsecondary system. Traditional hiring models suggest that employers clearly and efficiently evaluate college credentials, but this changing institutional landscape raises an important question: How do employers assess credentials from emerging…
ERIC Educational Resources Information Center
Crane, Stephen
The objective of this analysis is to outline in broad fashion the current trends and issues in the licensure of health manpower and to contrast two proposed alternative systems of credentialing that focus on licensure of health care institutions instead of individual health care providers. The argument of the analysis is that the current system of…
SU-E-P-02: Imaging and Radiation Oncology Core (IROC) Houston QA Center (RPC) Credentialing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Amador, C; Keith, T; Nguyen, T
2014-06-01
Purpose: To provide information pertaining to IROC Houston QA Center's (RPC) credentialing process for institutions participating in NCI-sponsored clinical trials. Methods: IROC Houston issues credentials for NCI sponsored study groups. Requirements for credentialing might include any combination of questionnaires, knowledge assessment forms, benchmarks, or phantom irradiations. Credentialing requirements for specific protocols can be found on IROC Houston's website (irochouston.mdanderson.org). The website also houses the credentialing status inquiry (CSI) form. Once an institution has reviewed the protocol's credentialing requirements, a CSI form should be completed and submitted to IROC Houston. This form is used both to request whether requirements have beenmore » met as well as to notify IROC Houston that the institution requests credentialing for a specific protocol. IROC Houston will contact the institution to discuss any delinquent requirements. Once the institution has met all requirements IROC Houston issues a credentialing letter to the institution and will inform study groups and other IROC offices of the credentials. Institutions can all phone the IROC Houston office to initiate credentialing or ask any credentialing related questions. Results: Since 2010 IROC has received 1313 credentialing status inquiry forms. We received 317 in 2010, 266 in 2011, 324 in 2012, and 406 in 2013. On average we receive 35 phone calls per week with multiple types of credentialing questions. Decisions regarding credentialing status are based on the protocol specifications and previous completed credentialing by the institution. In some cases, such as for general IMRT credentialing, up to 5 sites may be credentialed based on the credentialing of one main center. Each of these situations is handled individually. Conclusion: IROC Houston will issue radiation therapy credentials for the NCI trials in the National Clinical Trials Network. Credentialing requirements and the CSI form can be found online at the IROC Houston's website. Work supported by PHS grant CA10953 and CA081647 (NCI, DHHS)« less
ERIC Educational Resources Information Center
Reushle, Shirley, Ed.; Antonio, Amy, Ed.; Keppell, Mike, Ed.
2016-01-01
The discipline of education is a multi-faceted system that must constantly integrate new strategies and procedures to ensure successful learning experiences. Enhancements in education provide learners with greater opportunities for growth and advancement. "Open Learning and Formal Credentialing in Higher Education: Curriculum Models and…
ERIC Educational Resources Information Center
Kacenga, George F.
2017-01-01
Foreign educational credential assessment is responsive to assessors' social, economic, and cultural stimuli. Academic institutions, industries, and governmental bodies treat placement specialists' recommendations as signals of cross-cultural productive capacity, giving significance to the methodology of foreign education-system analysis. A…
Voluntary Professional Credentialing Programs. A Resource Handbook for Continuing Educators.
ERIC Educational Resources Information Center
Hanniford, Barbara, Ed.
This handbook describes 77 voluntary programs offering professional credentialing for people in a wide range of professional and occupational fields. Each description lists credentials, organization offering credentials, initial credentialing requirements, credential renewal requirements (if any), continuing education approval process, and other…
Certification, Accreditation, and Credentialing for 503A Compounding Pharmacies.
Pritchett, Jon; McCrory, Gary; Kraemer, Cheri; Jensen, Brenda; Allen, Loyd V
2018-01-01
The terms certification, accreditation, and credentialing are often used interchangeably when they apply to compounding-pharmacy qualifications, but they are not synonymous. The reasons for obtaining each, the requirements for each, and the benefits of each differ. Achieving such distinctions can negatively or positively affect the status of a pharmacy among peers and prescribers as well as a pharmacy's relationships with third-party payors. Changes in the third-party payor industry evolve constantly and, we suggest, will continue to do so. Compounding pharmacists must be aware of those changes to help ensure success in a highly competitive marketplace. To our knowledge at the time of this writing, there is no certification program for compounding pharmacists, although pharmacy technicians can achieve certification and may be required to do so by the state in which they practice (a topic beyond the scope of this article). For that reason, we primarily address accreditation and credentialing for 503A compounding pharmacies. In this article, the evolution of the third-party payment system for compounds is reviewed; the definitions of certification, accreditation, and credentialing are examined; and the benefits and recognition of obtaining accredited or credentialed status are discussed. Suggestions for selecting an appropriate agency that offers accreditation or credentialing, preparing for and undergoing an onsite survey, responding to findings, and maintaining a pharmacy practice that enables a successful survey outcome are presented. The personal experience of author CK during accreditation and credentialing is discussed, as is the role of a consultant (author BJ) in helping compounders prepare for the survey process. A list of agencies that offer accreditation and credentialing for compounding pharmacies is included for easy reference. Copyright© by International Journal of Pharmaceutical Compounding, Inc.
ERIC Educational Resources Information Center
Council for Early Childhood Professional Recognition, Washington, DC.
This Spanish-language booklet outlines the requirements of the Child Development Associate (CDA) credential for caregivers working in center-based infant and toddler day care programs. Part 1 provides an overview of the CDA credentialing system and the various options, settings, standards, and stages of the CDA assessment system. Part 2 explains…
Status of Credentialing Structures Related to Secondary Transition: A State-Level Policy Analysis
ERIC Educational Resources Information Center
Simonsen, Monica L.; Novak, Jeanne A.; Mazzotti, Valerie L.
2018-01-01
To understand the current status of transition-related credentialing systems in driving personnel preparation, it is necessary to identify which state education and rehabilitation services agencies are currently providing certification and licensure in the area of secondary transition. The purpose of this study was to examine the current state of…
ERIC Educational Resources Information Center
Panzer, Willa; Johnson, Mark; Lewis, Beth
2015-01-01
Wisconsinites interested in pursuing a high school credential rely on the unique collaboration between the State GED Administrator at the Wisconsin Department of Instruction (DPI), the State Director of Adult Basic Education (ABE) and staff of the Wisconsin Technical College System (WTCS), and the many providers of instruction throughout the…
Patient credentialing as a population health management strategy: a diabetes case study.
Watson, Lindsay L; Bluml, Benjamin M; Skoufalos, Alexandria
2015-06-01
When given the opportunity to become actively involved in the decision-making process, patients can positively impact their health outcomes. Understanding how to empower patients to become informed consumers of health care services is an important strategy for addressing disparities and variability in care. Patient credentialing identifies people who have a certain diagnosis and have achieved certain levels of competency in understanding and managing their disease. Patient credentialing was developed to meet 3 core purposes: (1) enhance patient engagement by increasing personal accountability for health outcomes, (2) create a mass customization strategy for providers to deliver high-quality, patient-centered collaborative care, and (3) provide payers with a foundation for properly aligning health benefit incentives. The Patient Self-Management Credential for Diabetes, a first-of-its-kind, psychometrically validated tool, has been deployed within 3 practice-based research initiatives as a component of innovative diabetes care. Results from these projects show improved clinical outcomes, reduced health care costs, and a relationship between credential achievement levels and clinical markers of diabetes. Implementing patient credentialing as part of collaborative care delivered within various settings across the health care system may be an effective way to reduce disparities, improve access to care and appropriate treatments, incentivize patient engagement in managing their health, and expend time and resources in a customized way to meet individual needs.
ERIC Educational Resources Information Center
Council for Early Childhood Professional Recognition, Washington, DC.
This Spanish-language booklet outlines the requirements of the Child Development Associate (CDA) credential for preschool teachers or caregivers who work in center-based preschool day care programs. Part 1 provides an overview of the CDA credentialing system and the various options, settings, standards, and stages of the CDA assessment system.…
Bringing Federated Identity to Grid Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Teheran, Jeny
The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Users in these collaborations are currently required to register as an FNAL user and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access formore » users from diverse experiments and collab orations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.« less
ERIC Educational Resources Information Center
Sandy, Mary Vixie
2006-01-01
Senate Bill (SB) 2042, authored by Senator Marion Bergeson, was passed to establish a new system for providing teacher preparation within the state of California. The credentialing reforms introduced in SB 2042 follow a tradition described by Irving Hendrik and stake their own claims regarding the locus of control over teacher quality, the role of…
Meet the new kids on the credentialing block.
1998-12-01
The Washington, DC-based American Nurses Credentialing Center's nurse case manager credential continues to get a rocky reception. Following difficulties with last year's test and controversy over the credential's eligibility criteria, the number of applicants remains small. Meanwhile, the inaugural test for the Center for Case Management's new case management administrator certified credential took place on Oct. 24, 1998. While results are not yet available, officials at the South Natick, MA-based Center report that the diversity of candidates for the credential reflected the exam's cross-continuum focus. The Oakbrook Terrace, IL-based Joint Commission on Accreditation of Healthcare Organizations is still developing its upcoming "Diplomate of the Academy" credential, which will feature a formal curriculum and course work.
ERIC Educational Resources Information Center
Assefa, A. Mariam
The purpose of this book is to explain French educational credentials to U.S. college and university admissions officers and credentials evaluators. Following introductory sections providing a map of France and an educational and historical overview of France, the following chapters are presented: (1) elementary and secondary education (including…
Drug Program Report: Credentialing.
ERIC Educational Resources Information Center
Contee, Jerome A., Ed.
This report contains several articles on drug abuse worker credentialing, and provides an update on information about credentialing policies and reciprocity efforts of the states. The first article reports on a meeting of the credentialing/reciprocity task force comprised of representatives from 10 states which have exhibited leadership in the…
ERIC Educational Resources Information Center
Guison-Dowdy, Anne; Patterson, Margaret Becker
2011-01-01
Since the 1990s, a wealth of literature has compared the benefits of having a GED[R] test credential versus a traditional high school diploma or no high school credential, with an early emphasis on economic impact. One advantage of passing the GED test lies in its ability to open doors to the postsecondary system. Nearly two-thirds of U.S.…
Setting Course: The Case for the Credentialing of Forensic Interviewers
ERIC Educational Resources Information Center
Haney, Mike; Vieth, Victor I.; Campos, Hector M.
2010-01-01
The article provides a history of efforts to develop a credentialing or certification process for forensic interviewers and reviews the multitiered credentialing process offered by the National Association of Certified Child Forensic Interviewers. The authors argue the benefits of a credentialing process for forensic interviewers and respond to…
42 CFR 422.204 - Provider selection and credentialing.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 3 2010-10-01 2010-10-01 false Provider selection and credentialing. 422.204... Provider selection and credentialing. (a) General rule. An MA organization must have written policies and procedures for the selection and evaluation of providers. These policies must conform with the credential and...
46 CFR 10.201 - General characteristics of the merchant mariner credential.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false General characteristics of the merchant mariner credential. 10.201 Section 10.201 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE... § 10.201 General characteristics of the merchant mariner credential. (a) A merchant mariner credential...
New Pathways to Credentialing: The Digital Badge
ERIC Educational Resources Information Center
DiSalvio, Philip
2016-01-01
With an increasing number of higher education institutions now offering "digital badges," some suggest that this credential has become a practical commodity in the world of college credentials. Colleges and universities are in a unique position to be the gatekeepers of many of those credentials. Among the many institutions of higher…
Virtual EPID standard phantom audit (VESPA) for remote IMRT and VMAT credentialing
NASA Astrophysics Data System (ADS)
Miri, Narges; Lehmann, Joerg; Legge, Kimberley; Vial, Philip; Greer, Peter B.
2017-06-01
A virtual EPID standard phantom audit (VESPA) has been implemented for remote auditing in support of facility credentialing for clinical trials using IMRT and VMAT. VESPA is based on published methods and a clinically established IMRT QA procedure, here extended to multi-vendor equipment. Facilities are provided with comprehensive instructions and CT datasets to create treatment plans. They deliver the treatment directly to their EPID without any phantom or couch in the beam. In addition, they deliver a set of simple calibration fields per instructions. Collected EPID images are uploaded electronically. In the analysis, the dose is projected back into a virtual cylindrical phantom. 3D gamma analysis is performed. 2D dose planes and linear dose profiles are provided and can be considered when needed for clarification. In addition, using a virtual flat-phantom, 2D field-by-field or arc-by-arc gamma analyses are performed. Pilot facilities covering a range of planning and delivery systems have performed data acquisition and upload successfully. Advantages of VESPA are (1) fast turnaround mainly driven by the facility’s capability of providing the requested EPID images, (2) the possibility for facilities performing the audit in parallel, as there is no need to wait for a phantom, (3) simple and efficient credentialing for international facilities, (4) a large set of data points, and (5) a reduced impact on resources and environment as there is no need to transport heavy phantoms or audit staff. Limitations of the current implementation of VESPA for trials credentialing are that it does not provide absolute dosimetry, therefore a Level I audit is still required, and that it relies on correctly delivered open calibration fields, which are used for system calibration. The implemented EPID based IMRT and VMAT audit system promises to dramatically improve credentialing efficiency for clinical trials and wider applications.
Virtual EPID standard phantom audit (VESPA) for remote IMRT and VMAT credentialing.
Miri, Narges; Lehmann, Joerg; Legge, Kimberley; Vial, Philip; Greer, Peter B
2017-06-07
A virtual EPID standard phantom audit (VESPA) has been implemented for remote auditing in support of facility credentialing for clinical trials using IMRT and VMAT. VESPA is based on published methods and a clinically established IMRT QA procedure, here extended to multi-vendor equipment. Facilities are provided with comprehensive instructions and CT datasets to create treatment plans. They deliver the treatment directly to their EPID without any phantom or couch in the beam. In addition, they deliver a set of simple calibration fields per instructions. Collected EPID images are uploaded electronically. In the analysis, the dose is projected back into a virtual cylindrical phantom. 3D gamma analysis is performed. 2D dose planes and linear dose profiles are provided and can be considered when needed for clarification. In addition, using a virtual flat-phantom, 2D field-by-field or arc-by-arc gamma analyses are performed. Pilot facilities covering a range of planning and delivery systems have performed data acquisition and upload successfully. Advantages of VESPA are (1) fast turnaround mainly driven by the facility's capability of providing the requested EPID images, (2) the possibility for facilities performing the audit in parallel, as there is no need to wait for a phantom, (3) simple and efficient credentialing for international facilities, (4) a large set of data points, and (5) a reduced impact on resources and environment as there is no need to transport heavy phantoms or audit staff. Limitations of the current implementation of VESPA for trials credentialing are that it does not provide absolute dosimetry, therefore a Level I audit is still required, and that it relies on correctly delivered open calibration fields, which are used for system calibration. The implemented EPID based IMRT and VMAT audit system promises to dramatically improve credentialing efficiency for clinical trials and wider applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lehmann, J; University of Sydney, Sydney, NSW; Miri, N
Purpose: Report on implementation of a Virtual EPID Standard Phantom Audit (VESPA) for IMRT to support credentialing of facilities for clinical trials. Data is acquired by local facility staff and transferred electronically. Analysis is performed centrally. Methods: VESPA is based on published methods and a clinically established IMRT QA procedure, here extended to multi-vendor equipment. Facilities, provided with web-based comprehensive instructions and CT datasets, create IMRT treatment plans. They deliver the treatments directly to their EPID without phantom or couch in the beam. They also deliver a set of simple calibration fields. Collected EPID images are uploaded electronically. In themore » analysis, the dose is projected back into a virtual phantom and 3D gamma analysis is performed. 2D dose planes and linear dose profiles can be analysed when needed for clarification. Results: Pilot facilities covering a range of planning and delivery systems have performed data acquisition and upload successfully. Analysis showed agreement comparable to local experience with the method. Advantages of VESPA are (1) fast turnaround mainly driven by the facility’s capability to provide the requested EPID images, (2) the possibility for facilities performing the audit in parallel, as there is no need to wait for a phantom, (3) simple and efficient credentialing for international facilities, (4) a large set of data points, and (5) a reduced impact on resources and environment as there is no need to transport heavy phantoms or audit staff. Limitations of the current implementation of VESPA for trials credentialing are that it does not provide absolute dosimetry, therefore a Level 1 audit still required, and that it relies on correctly delivered open calibration fields, which are used for system calibration. Conclusion: The implemented EPID based IMRT audit system promises to dramatically improve credentialing efficiency for clinical trials and wider applications. VESPA for VMAT will follow soon.« less
14 CFR 121.548 - Aviation safety inspector's credentials: Admission to pilot's compartment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector's credentials... Operations § 121.548 Aviation safety inspector's credentials: Admission to pilot's compartment. Whenever, in... presents form FAA 110A, “Aviation Safety Inspector's Credential,” to the pilot in command of an aircraft...
SU-F-J-49: IGRT Credentialing in NCTN Trials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowenstein, J; Molineu, A; Followill, D
Purpose: To make Image Guided Radiation Therapy (IGRT) credentialing a more unified, consistent and efficient process across the entire National Clinical Trial Network (NCTN). Methods: IGRT plays a role in several advanced NCTN trials. Previously an institution had to be IGRT credentialed for each protocol. When institutions were allowed to use previous credentials for new protocols it was limited to the same disease site as the original credentialing. The credentialing was analyzed by the physics PI of the protocol. We consulted with several of these physicists to determine what is important to consider when reviewing submissions and to learn waysmore » to apply credentialing more broadly. Results: For trials open in 2016, IGRT credentialing can be simplified to cover either boney anatomy or soft tissue. This revised credentialing will cover all disease sites based on the type of anatomy, unless otherwise stated within the protocol. Institutions will submit will complete an online questionnaire about their IGRT procedures. Boney anatomy requirements will include submission of data from 2 sequential fraction of both a patient aligned with boney anatomy and pelvic patient. Soft tissue will require similar submissions for a patient aligned using soft tissue and a pelvic patient. Institutions will only be required to submit the pelvic patient once. Data should be in DICOM format and includes planning CT set, RT structure set, RT plan file, RT dose file, localization images and spatial registration file (if available). Reviews will be done by IROC-Houston staff who will continue to provide feedback to the sites. Conclusion: This revised IGRT credentialing process will bring consistency, a savings in time and effort for both the IROC Houston QA office and to those institutions wanting to be credentialed to participate in NCTN Trials. Sponsored by NIH/NCI CA10953.« less
ERIC Educational Resources Information Center
Gallagher, Sean R.
2016-01-01
"The Future of University Credentials" offers a thorough and urgently needed overview of the burgeoning world of university degrees and credentials. At a time of heightened attention to how universities and colleges are preparing young people for the working world, questions about the meaning and value of university credentials have…
ERIC Educational Resources Information Center
Houston, W. Robert; And Others
The basic question addressed in this monograph is whether credentialing the preservice or inservice school based teacher educator is necessary and/or desirable. To study this question, a series of related issues were posed and investigated: (1) Is there a need for credentialing? (2) What institution would award the credential, and should…
ERIC Educational Resources Information Center
Morgan, Gwen G.
This discussion paper provides background information on credentialing, raises issues in the area of credentialing for out-of-school time programs, and suggests the important decisions that need to evolve in the out-of-school time field. The first part of the paper defines credentials, describes traditional and changing concepts of credentialing…
Credentials in Context: The Meaning and Use of Associate Degrees in the Employment of IT Technicians
ERIC Educational Resources Information Center
Van Noy, Michelle
2011-01-01
Educational credentials are clearly linked to economic success, but the reasons for this link are not clear. Common theoretical approaches provide explanations but lack direct employer perspectives on credentials' meaning and the context in which employers make sense of credentials. In this study, I used an alternative perspective based in Meyer's…
Four Ways to Avoid a Credentialing Cash Flow Crisis.
Toth, Cheryl
2015-01-01
Credentialing a physician for Medicare and private plans is a detailed and time-consuming process, but it must be completed before a plan will reimburse a practice's billed services. Assign a person with the right skills for this project, and insist on regular progress reports to be certain credentialing has been successfully completed. Submit credentialing applications three to six months ahead of opening your practice doors, moving to a new location, or merging with another organization. If you're considering outsourcing the credentialing process to a service, verify its reputation and work products with its customers.
The Need for National Credentialing Standards for Addiction Counselors
ERIC Educational Resources Information Center
Miller, Geri; Scarborough, Jim; Clark, Catherine; Leonard, Justin C.; Keziah, Tyler B.
2010-01-01
The authors review the current state of credentialing for addiction counselors in the United States and provide recommendations to the addiction counseling field regarding national standards for credentialing.
Credentialing, Licensing, and Education
... et al. Credentialing complementary practitioners in a large academic cancer center . Journal of the Society for Integrative ... al. A framework for credentialing naturopathic physicians in academic health centers: Oregon Health and Science University . Journal ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Giaddui, T; Chen, W; Yu, J
2014-06-15
Purpose: To review IGRT credentialing experience and unexpected technical issues encountered in connection with advanced radiotherapy technologies as implemented in RTOG clinical trials. To update IGRT credentialing procedures with the aim of improving the quality of the process, and to increase the proportion of IGRT credentialing compliance. To develop a living disease site-specific IGRT encyclopedia. Methods: Numerous technical issues were encountered during the IGRT credentialing process. The criteria used for credentialing review were based on: image quality; anatomy included in fused data sets and shift results. Credentialing requirements have been updated according to the AAPM task group reports for IGRTmore » to ensure that all required technical items are included in the quality review process. Implementation instructions have been updated and expanded for recent protocols. Results: Technical issues observed during the credentialing review process include, but are not limited to: poor quality images; inadequate image acquisition region; poor data quality; shifts larger than acceptable; no soft tissue surrogate. The updated IGRT credentialing process will address these issues and will also include the technical items required from AAPM: TG 104; TG 142 and TG 179 reports. An instruction manual has been developed describing a remote credentialing method for reviewers. Submission requirements are updated, including images/documents as well as facility questionnaire. The review report now includes summary of the review process and the parameters that reviewers check. We have reached consensus on the minimum IGRT technical requirement for a number of disease sites. RTOG 1311(NRG-BR002A Phase 1 Study of Stereotactic Body Radiotherapy (SBRT) for the Treatment of Multiple Metastases) is an example, here; the protocol specified the minimum requirement for each anatomical sites (with/without fiducials). Conclusion: Technical issues are identified and reported. IGRT guidelines are updated, with the corresponding credentialing requirements. An IGRT encyclopedia describing site-specific implementation issues is currently in development.« less
ERIC Educational Resources Information Center
Marginson, Simon
Since the 1960s there has been a major expansion in the number of people in Australia holding post school educational credentials and the proportion of the full time work force with those credentials. The penalties of not holding credentials, in terms of the incidence and duration of unemployment, are increasingly severe. At the same time, there…
Craig, Simon; Egerton-Warburton, Diana; Mellett, Tanya
2014-06-01
To describe current practice of EDUS by ACEM Trainees and Fellows; to describe potential barriers to US use in the Australasian setting; to determine compliance with current college guidelines regarding US credentialing. Data were collected by a cross-sectional online survey. Respondents were Trainees and Fellows of the ACEM. Outcome measures included the percentage of respondents currently undergoing or that had completed US credentialing for Focused Assessment with Sonography for Trauma (FAST) and assessment of abdominal aortic aneurysm (AAA) scans. The perceived barriers to use of emergency US were explored. There were 512 survey respondents, giving an overall response rate of 15%. Fellows were more likely to be credentialed compared with Trainees. There were 61% of respondents not credentialed for FAST and assessment of AAA scans. However, a significant proportion performed these scans regularly, and did not routinely seek independent confirmation of their findings. Barriers to credentialing included limited time and no credentialing programme at the individual's hospital. The present study showed that only a minority of ACEM Trainees and Fellows are credentialed to perform routine ED scans. Many non-credentialed ACEM Trainees and Fellows are performing scans, many without independent confirmation of their findings. © 2014 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC... Transportation Worker Identification Credential and must undergo a security threat assessment under 49 CFR part...
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Select Committee on Aging.
A House of Representatives report on the practice of a profession with fradulent credentials is presented. Attention is directed to the provision of medical care by unlicensed and unqualified people posing as doctors, fraudulent credentials across a range of occupations, especially those affecting the elderly, and fraudulent credentials held by…
Economic credentialing: the propriety of managing physician costs through privileging.
Dahl, B A
1999-01-01
Hospital executives face the unique task of managing the costs of an institution in which they have no direct managerial authority over the primary cost drivers, namely, the physicians who practice in the hospital. Perhaps the most controversial method of controlling physician costs consists of the application of economic factors to the credentialing process. Using the credentialing process as a technique to exert fiscal control over physicians affords hospital executives and their governing boards a tremendous cost-management opportunity. The legal propriety of economic credentialing remains unsettled. Many commentators, relying on limited case law, conclude that hospitals can engage in economic credentialing. Nevertheless, hospitals should exercise care when employing an economic rationale to restrict privileges lest they stir up legal challenges. Moreover, if hospitals use economic credentialing to limit medicaid patients' access to hospitals by excluding these patients' physicians from the hospital, the federal government may have the last word on the propriety of the practice.
Wang, Victor
2004-03-01
This study investigated the instructional preferences of full time adult credential students after they took a live course called Principles of Adult Education at California State University, Long Beach (CSULB) in the fall semester of 2002. These full time adult credential students had been working on their adult teaching credentials to meet the competencies specified by the California Commission on Teacher Credentialing. The course introduced students to Andragogy developed by Malcolm Knowles out of the andragogical model developed by Lindeman (1926). The study used Principles of Adult Learning Scales (PALS), advanced by Gary Conti in 1983 to measure instructional preferences. Data were collected from 30 (100% of 30) full time adult credential students enrolled in a live course to determine their instructional preferences of helping adults learn. The results of the study showed in most cases these adult learning professionals taught adult students andragogically; in some cases they taught adult students pedagogically.
46 CFR 10.229 - Issuance of duplicate merchant mariner credentials.
Code of Federal Regulations, 2013 CFR
2013-10-01
... replaced credential(s). The duplicate issued will be in the form of an MMC. Until April 15, 2014, if a... charge. The term “other casualty” includes any damage to a ship caused by collision, explosion, tornado...
46 CFR 10.229 - Issuance of duplicate merchant mariner credentials.
Code of Federal Regulations, 2012 CFR
2012-10-01
... replaced credential(s). The duplicate issued will be in the form of an MMC. Until April 15, 2014, if a... charge. The term “other casualty” includes any damage to a ship caused by collision, explosion, tornado...
Status and Significance of Credentialing.
ERIC Educational Resources Information Center
Musgrave, Dorothea
1984-01-01
Discusses the current status, significance, and future of credentialing in the field of environmental health. Also discusses four phases of a Bureau of Health Professions (BHP) Credentialing Program and BHP-funded projects related to their development and implementation. Phases include role delineation, resources development, examination…
An Interview with Thomas W. Clawson.
ERIC Educational Resources Information Center
Juhnke, Gerald A.
2000-01-01
Presents an interview with the director of the National Board for Certified Counselors, who provides a history of the organization. He discusses his efforts in establishing unified addictions specialist credentials and offers suggestions for addiction and offender counselors seeking these credentials. He explores the pressing credentialing issues…
46 CFR 15.605 - Credentialed operators for uninspected passenger vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Credentialed operators for uninspected passenger vessels. 15.605 Section 15.605 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Uninspected Vessels § 15.605 Credentialed...
46 CFR 15.605 - Credentialed operators for uninspected passenger vessels.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Credentialed operators for uninspected passenger vessels. 15.605 Section 15.605 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Uninspected Vessels § 15.605 Credentialed...
46 CFR 15.605 - Credentialed operators for uninspected passenger vessels.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Credentialed operators for uninspected passenger vessels. 15.605 Section 15.605 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Uninspected Vessels § 15.605 Credentialed...
46 CFR 15.605 - Credentialed operators for uninspected passenger vessels.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Credentialed operators for uninspected passenger vessels. 15.605 Section 15.605 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Uninspected Vessels § 15.605 Credentialed...
46 CFR 15.605 - Credentialed operators for uninspected passenger vessels.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Credentialed operators for uninspected passenger vessels. 15.605 Section 15.605 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Uninspected Vessels § 15.605 Credentialed...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Adam J.; Perano, Kenneth J.
In trust negotiation, resource providers specify access control policies in terms of the attributes that should be possessed by authorized users, rather than the identities of these users. Users can prove ownership of certain attributes through the use of digital credentials issued by trusted entities. For example, the Department of Motor Vehicles might issue vehicle owners X.509 driver's licenses that can be used to demonstrate proof of their current age, address, or ability to drive. These types of digital credentials may also be protected by user-specified policies controlling their release to remote parties; for example, Alice might only be willingmore » to show her VISA card credential to members of the Better Business Bureau. In this way, a request to access a given resource can result in a bilateral and iterative exchange of policies and credentials that represents a negotiation between the participating parties. To date, research interest in trust negotiation has been primarily theoretical and any implementations have been largely proofs of concept; experimenting with these prototypes is often not a straightforward task. TrustBuilder2 is a flexible framework for supporting research in the area trust negotiation protocols, designed to allow researchers to quickly prototype and experiment with various approaches to trust negotiation. In TrustBuilder2, the primary components of a trust negotiation system are represented using abstract interfaces.« less
Turf wars: what can modern medicine learn from medieval guilds?
McLean, Thomas R
2005-01-01
Medieval guilds for a time grew wealthy under a system of work rules that granted them a virtual trade monopoly, but such protection was worthless in the face of innovations in communications and commerce. Many medical specialists have grown wealthy under a guild system based on board certification. Unfortunately, creation of a vascular medicine board is unlikely to resolve the ongoing turf wars between cardiologists, radiologists, and vascular surgeons. Moreover, if medical specialists (who are facing innovations in the form of the Internet and telemedicine) wish to avoid the fate of the medieval guilds, a more flexible system based on individual competency is needed. While credentialing based on individual competence is good for specialists, it creates increased liability for hospitals because specialist credentialing will become more discretionary and less ministerial.
46 CFR 15.410 - Credentialed individuals for assistance towing vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Credentialed individuals for assistance towing vessels. 15.410 Section 15.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.410 Credentialed individuals...
Teachers for Inclusive, Diverse Urban Settings
ERIC Educational Resources Information Center
Reese, Leslie; Richards-Tutor, Cara; Hansuvadha, Nat; Pavri, Shireen; Xu, Shelley
2018-01-01
In this article, the authors discuss the creation of an Urban Dual Credential Program (UDCP) at a large, comprehensive state university in California, a program meant to prepare dually-certified teachers in general education (California Multiple Subject Credential) and special education (California Education Specialist Credential in mild/moderate…
46 CFR 15.410 - Credentialed individuals for assistance towing vessels.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Credentialed individuals for assistance towing vessels. 15.410 Section 15.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.410 Credentialed individuals...
46 CFR 15.410 - Credentialed individuals for assistance towing vessels.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Credentialed individuals for assistance towing vessels. 15.410 Section 15.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.410 Credentialed individuals...
46 CFR 15.410 - Credentialed individuals for assistance towing vessels.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Credentialed individuals for assistance towing vessels. 15.410 Section 15.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.410 Credentialed individuals...
46 CFR 15.410 - Credentialed individuals for assistance towing vessels.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Credentialed individuals for assistance towing vessels. 15.410 Section 15.410 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.410 Credentialed individuals...
46 CFR 169.805 - Exhibition of merchant mariner credentials.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Exhibition of merchant mariner credentials. 169.805 Section 169.805 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Operations § 169.805 Exhibition of merchant mariner credentials. Officers on any vessel...
46 CFR 169.805 - Exhibition of merchant mariner credentials.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Exhibition of merchant mariner credentials. 169.805 Section 169.805 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Operations § 169.805 Exhibition of merchant mariner credentials. Officers on any vessel...
Scrambling for anonymous visual communications
NASA Astrophysics Data System (ADS)
Dufaux, Frederic; Ebrahimi, Touradj
2005-08-01
In this paper, we present a system for anonymous visual communications. Target application is an anonymous video chat. The system is identifying faces in the video sequence by means of face detection or skin detection. The corresponding regions are subsequently scrambled. We investigate several approaches for scrambling, either in the image-domain or in the transform-domain. Experiment results show the effectiveness of the proposed system.
32 CFR 767.6 - Credentials of principal investigator.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Credentials of principal investigator. 767.6 Section 767.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS... JURISDICATION OF THE DEPARTMENT OF THE NAVY Permit Guidelines § 767.6 Credentials of principal investigator. A...
32 CFR 767.6 - Credentials of principal investigator.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Credentials of principal investigator. 767.6 Section 767.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS... JURISDICATION OF THE DEPARTMENT OF THE NAVY Permit Guidelines § 767.6 Credentials of principal investigator. A...
32 CFR 767.6 - Credentials of principal investigator.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Credentials of principal investigator. 767.6 Section 767.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS... JURISDICATION OF THE DEPARTMENT OF THE NAVY Permit Guidelines § 767.6 Credentials of principal investigator. A...
32 CFR 767.6 - Credentials of principal investigator.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Credentials of principal investigator. 767.6 Section 767.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS... JURISDICATION OF THE DEPARTMENT OF THE NAVY Permit Guidelines § 767.6 Credentials of principal investigator. A...
32 CFR 767.6 - Credentials of principal investigator.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Credentials of principal investigator. 767.6 Section 767.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS... JURISDICATION OF THE DEPARTMENT OF THE NAVY Permit Guidelines § 767.6 Credentials of principal investigator. A...
14 CFR 121.548 - Aviation safety inspector's credentials: Admission to pilot's compartment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Aviation safety inspector's credentials: Admission to pilot's compartment. 121.548 Section 121.548 Aeronautics and Space FEDERAL AVIATION... Operations § 121.548 Aviation safety inspector's credentials: Admission to pilot's compartment. Whenever, in...
14 CFR 121.548 - Aviation safety inspector's credentials: Admission to pilot's compartment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aviation safety inspector's credentials: Admission to pilot's compartment. 121.548 Section 121.548 Aeronautics and Space FEDERAL AVIATION... Operations § 121.548 Aviation safety inspector's credentials: Admission to pilot's compartment. Whenever, in...
14 CFR 121.548 - Aviation safety inspector's credentials: Admission to pilot's compartment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Aviation safety inspector's credentials: Admission to pilot's compartment. 121.548 Section 121.548 Aeronautics and Space FEDERAL AVIATION... Operations § 121.548 Aviation safety inspector's credentials: Admission to pilot's compartment. Whenever, in...
14 CFR 121.548 - Aviation safety inspector's credentials: Admission to pilot's compartment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aviation safety inspector's credentials: Admission to pilot's compartment. 121.548 Section 121.548 Aeronautics and Space FEDERAL AVIATION... Operations § 121.548 Aviation safety inspector's credentials: Admission to pilot's compartment. Whenever, in...
Educational Credentialing of an Aging Workforce: Uneasy Conclusions
ERIC Educational Resources Information Center
Isopahkala-Bouret, Ulpukka
2015-01-01
This study investigates the educational attainment of an aging workforce from the perspective of educational credentialing. The research questions are defined as follows: Why are workers over age 50 attaining university degrees? How do they narratively construct the rational for pursuing well-recognized credentials in midlife? The specific focus…
Extra-Credential Experiences and Social Closure: Working-Class Students at University
ERIC Educational Resources Information Center
Lehmann, Wolfgang
2012-01-01
Human capital theorists perceive of educational expansion as beneficial to individuals, corporations and national economies, while social closure theorists have claimed that inflation of credential requirements maintains traditional status inequalities. In this paper I argue that status inequalities are not only maintained by credential inflation,…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for obtaining an authentication... Prescriptions § 1311.110 Requirements for obtaining an authentication credential—Individual practitioners... credentialing office) may conduct identity proofing and authorize the issuance of the authentication credential...
46 CFR 5.903 - Application procedures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... REGULATIONS-PERSONNEL ACTION Issuance of New Credential or Endorsement After Revocation or Surrender § 5.903 Application procedures. (a) An application form for a new credential or endorsement may be obtained from any... for the issuance of a new credential or endorsement and should include the following: (1) A letter...
46 CFR 15.403 - When credentials for ratings are required.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false When credentials for ratings are required. 15.403 Section 15.403 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.403 When credentials for ratings are required...
ERIC Educational Resources Information Center
Protz, Maria
This study examined the current value of credentialism, extending the findings of an earlier report, "Business Training: Content, Enrollment and Delivery." The study acknowledged the distinction between various types of credentials, but focused primarily on professional business certification and investigated the potential for TVOntario…
The Impact of Consumer Credentialism on Employee and Entrepreneur Returns to Higher Education.
ERIC Educational Resources Information Center
Tucker, Irvin B., III
1987-01-01
Examines the relative importance of education credentials in consumer perceptions of self-employed business people. Using 1980 national cross-sectional data on goods- and service-producing occupations, the regression analysis shows that highly educated entrepreneurs are not influenced by consumer credentialism. Includes 17 references. (MLH)
Teachers, Micro-Credentials, and the Performance Assessment Movement
ERIC Educational Resources Information Center
French, Dan; Berry, Barnett
2017-01-01
Micro-credentials, a new form of personalized professional development for teachers, offer a unique solution to the challenge of training school staff to design and implement performance assessments. In a relatively short period of time, micro-credentials have shown promise in enabling a more personalized, effective method of promoting teacher…
Scaling "Stackable Credentials": Implications for Implementation and Policy
ERIC Educational Resources Information Center
Ganzglass, Evelyn
2014-01-01
Postsecondary education and credentials are key to economic mobility for individuals and economic competitiveness for our nation. Although the economic return to credentials varies significantly by field of study, generally workers with higher levels of education have higher wages, work more hours, and suffer lower rates and shorter durations of…
Malhotra, Saurabh; Sobieraj, Diana M; Mann, April; Parker, Matthew W
2017-12-22
Background/Objectives: The specific credentials and continuing education (CME/CE) of nuclear cardiology laboratory medical and technical staff are important factors in the delivery of quality imaging services that have not been systematically evaluated. Methods: Nuclear cardiology accreditation application data from the Intersocietal Accreditation Commission (IAC) was used to characterize facilities performing myocardial perfusion imaging by setting, size, previous accreditation and credentials of the medical and technical staff. Credentials and CME/CE were compared against initial accreditation decisions (grant or delay) using multivariable logistic regression. Results: Complete data were available for 1913 nuclear cardiology laboratories from 2011-2014. Laboratories with initial positive accreditation decisions had a greater prevalence of Certification Board in Nuclear Cardiology (CBNC) certified medical directors and specialty credentialed technical directors. Certification and credentials of the medical and technical directors, respectively, staff CME/CE compliance, and assistance of a consultant with the application were positively associated with accreditation decisions. Conclusion: Nuclear cardiology laboratories directed by CBNC-certified physicians and NCT- or PET-credentialed technologists were less likely to receive delay decisions for MPI. CME/CE compliance of both the medical and technical directors was associated with accreditation decision. Medical and technical directors' years of experience were not associated with accreditation decision. Copyright © 2017 by the Society of Nuclear Medicine and Molecular Imaging, Inc.
Do inquiries into health system failures lead to change in clinical governance systems?
Gluyas, Heather; Alliex, Selma; Morrison, Paul
2011-01-01
This paper reports the first part of a case study investigation to examine the changes at King Edward Memorial Hospital (KEMH) following an inquiry established to review the quality of obstetric and gynaecological services. Common findings from a range of health inquiries in recent times include that there have been inadequate adverse event reporting systems, the absence of transparent systems for staff and patients to report concerns about quality of patient care, and an ineffective medical credentialing and performance review system. The similarity of findings from many health inquiries raises the question of whether an inquiry does lead to changes to improve patient care and safety. There has been very little reported in the literature about this. Using a case study strategy the areas of medical credentialing, performance review and involvement of consumers in care were chosen as the KEMH clinical governance processes to be examined for changes post inquiry. Documents, archives and interviews were used as data sources for this case study. Documents were examined using a normative analytic approach and the Miles and Huberman framework was used for data analysis of the interviews. There were significant changes in the area of credentialing and performance review evident in analysis of all sources of data. There were some improvements in the processes of involving consumers in care, but deficits were identified in regard to the provision of training and upskilling for clinicians to improve their communication skills and interactions with patients and families.
46 CFR 10.225 - Requirements for original merchant mariner credentials.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Requirements for original merchant mariner credentials....225 Requirements for original merchant mariner credentials. (a) An applicant must apply as an original... revoked pursuant to § 10.235 of this part. (b) A complete application for an original MMC must contain the...
ERIC Educational Resources Information Center
Kayne Chaplock, Sharon
2011-01-01
Professional credentials earned through certification programs are becoming an important way to demonstrate competency within a given discipline. With the globalization of business enterprises and associations, these credentials are eagerly sought by people located throughout the world. Candidates for these credentials often study together using…
ERIC Educational Resources Information Center
Bergman, Andrea; Kong, Grace; Pope, Alice
2014-01-01
There are many benefits for emerging adults, both financial and personal, in obtaining a General Education Development (GED®) credential (Ou, 2008). However, little is known about the correlates of GED® credential attainment in "disconnected" emerging adults attending GED® programs. Our goal was to examine whether externalizing…
Why New Mathematics Teachers Do or Don't Use Practices Emphasized in Their Credential Program
ERIC Educational Resources Information Center
Gainsburg, Julie
2012-01-01
A major research concern for teacher education is the impact of university credentialing programs on K-12 teaching and the disjuncture between university-promoted practices and what teachers actually do in their classrooms. In particular, mathematics-credential programs typically promote reform-oriented methods, while mathematics teaching in the…
Commission on Teacher Credentialing Approves 8 ELL-Related Credential Options
ERIC Educational Resources Information Center
Frost, Jeff; Cadiero-Kaplan, Karen; Kuhlman, Natalie
2011-01-01
On September 30, 2010, the California Commission on Teacher Credentialing (CTC) voted unanimously to approve a set of eight recommendations for authorization to teach English language learners. These recommendations approved by the CTC had been in development for almost two years and they focused on several issues, including: (1) a specific focus…
Code of Federal Regulations, 2011 CFR
2011-01-01
... Credentials: Admission to pilots compartment: Forward observer's seat. 135.76 Section 135.76 Aeronautics and... Commercial Air Carrier Evaluator's Credentials: Admission to pilots compartment: Forward observer's seat. (a.... (b) A forward observer's seat on the flight deck or forward passenger seat with headset or speaker...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Credentials: Admission to pilots compartment: Forward observer's seat. 135.76 Section 135.76 Aeronautics and... Commercial Air Carrier Evaluator's Credentials: Admission to pilots compartment: Forward observer's seat. (a.... (b) A forward observer's seat on the flight deck or forward passenger seat with headset or speaker...
Initiation of a voluntary certification program for health education specialists.
Wolle, J M; Cleary, H P; Stone, E J
1989-01-01
As health education has become a major strategy for addressing current health problems, the need for expertise in health education has increased. Today health education specialists work not only in health agencies and educational institutions but also in hospitals and other health and medical facilities, in businesses and industries, and in consulting firms. To promote quality assurance in the delivery of health education services to the public, the profession has launched a voluntary credentialing system for health education specialists. Seven areas of responsibilities and the competencies that they require have been delineated as generic to the practice of entry level health education specialists, regardless of the setting (for example, school, health agency, work site) where they work. The purposes and rationale for new National Commission for Health Education Credentialing, Inc., are described as well as the benefits of certification for the profession. The events and accomplishments of the past decade that have provided the foundation for the newly established credentialing program for the health education profession are chronicled. PMID:2502814
NASA Astrophysics Data System (ADS)
Moss, Kirran Jane
This study was performed on the initial systemwide response by the California State University (CSU) to California's Math and Science Teacher Initiative (CMSTI). The data collected tracked, measured, and reported the scope and range of recruitment and programmatic strategies developed and implemented among the first cohort of campuses funded with MSTI dollars with the intent to attract and increase the number of mathematic and science teachers produced. These findings suggest that the California State University Math and Science Teacher Initiative displays early signs of system effectiveness. These data collected indicate that MSTI funds have resulted in an increased number of diverse credentialing pathways being introduced that may operate to attract and recruit increased numbers of candidates into the math and science credentialing programs. Additionally, findings produced indicate that MSTI funds have resulted in new relationships being established with local Community Colleges, an increase in hybrid online subject-matter courses being offered, and new strategies that expedite the credentialing process.
Janssens, Sarah; Beckmann, Michael; Bonney, Donna
2015-08-01
Simulation training in laparoscopic surgery has been shown to improve surgical performance. To describe the implementation of a laparoscopic simulation training and credentialing program for gynaecology registrars. A pilot program consisting of protected, supervised laparoscopic simulation time, a tailored curriculum and a credentialing process, was developed and implemented. Quantitative measures assessing simulated surgical performance were measured over the simulation training period. Laparoscopic procedures requiring credentialing were assessed for both the frequency of a registrar being the primary operator and the duration of surgery and compared to a presimulation cohort. Qualitative measures regarding quality of surgical training were assessed pre- and postsimulation. Improvements were seen in simulated surgical performance in efficiency domains. Operative time for procedures requiring credentialing was reduced by 12%. Primary operator status in the operating theatre for registrars was unchanged. Registrar assessment of training quality improved. The introduction of a laparoscopic simulation training and credentialing program resulted in improvements in simulated performance, reduced operative time and improved registrar assessment of the quality of training. © 2015 The Royal Australian and New Zealand College of Obstetricians and Gynaecologists.
WE-E-304-01: SBRT Credentialing: Understanding the Process From Inquiry to Approval
DOE Office of Scientific and Technical Information (OSTI.GOV)
Followill, D.
SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less
Securing the anonymity of content providers in the World Wide Web
NASA Astrophysics Data System (ADS)
Demuth, Thomas; Rieke, Andreas
1999-04-01
Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, M
Fluoroscopy credentialing and privileging programs are being instituted because of recorded patient injuries and the widespread growth in fluoroscopy use by operators whose medical education did not include formal fluoroscopy training. This lack of training is recognized as a patient safety deficiency, and medical physicists and health physicists are finding themselves responsible for helping to establish fluoroscopy credentialing programs. While physicians are very knowledgeable about clinical credentials review and the privileging process, medical physicists and health physicists are not as familiar with the process and associated requirements. To assist the qualified medical physicist (QMP) and the radiation safety officer (RSO)more » with these new responsibilities, TG 124 provides an overview of the credentialing process, guidance for policy development and incorporating trained fluoroscopy users into a facility's established process, as well as recommendations for developing and maintaining a risk-based fluoroscopy safety training program. This lecture will review the major topics addressed in TG124 and relate them to practical situations. Learning Objectives: Understand the difference between credentialing and privileging. Understand the responsibilities, interaction and coordination among key individuals and committees. Understand options for integrating the QMP and/or RSO and Radiation Safety Committee into the credentialing and privileging process. Understand issues related to implementing the fluoroscopy safety training recommendations and with verifying and documenting successful completion.« less
ERIC Educational Resources Information Center
Delk, Tricia
2017-01-01
The purpose of the qualitative descriptive embedded single case study research was to explore how multicultural curriculum and instruction in a teacher-credentialing program prepared pre-service teachers to work with diverse students. The problem was the inadequacy on the part of teacher-credentialing programs to train pre-service teachers to make…
How to Tackle the Credentials Puzzle
ERIC Educational Resources Information Center
Jenkins, Rob
2008-01-01
In this article, the author discusses the issue of credentials in reply to one of the correspondents who is confused about the credentials she needs to teach at a community college. Generally speaking, to teach in programs that award associate of arts or associate of science degrees--i.e., to teach at a community college--faculty members are…
ERIC Educational Resources Information Center
Cronen, Stephanie; McQuiggan, Meghan; Isenberg, Emily
2017-01-01
This report presents data on adults' training and education in the United States as of 2016. The report focuses on nondegree credentials and work experience programs. Nondegree credentials include two types of work credentials--certifications and licenses--and postsecondary educational certificates. A certification is an occupational credential…
ERIC Educational Resources Information Center
Bozell, Maureen R.; Goldberg, Melissa
2009-01-01
This report investigates a number of education and training programs involving employers in efforts to help disadvantaged young adults attain post-secondary credentials leading to career track employment. For the purposes of this report, the authors define credentials to mean credit and non-credit industry-recognized certifications, associate…
Degree and Nondegree Credentials Held by Labor Force Participants. Data Point. NCES 2018-057
ERIC Educational Resources Information Center
Cronen, Stephanie; Isenberg, Emily
2018-01-01
A common approach to describing the credentials required for occupations is to cite whether workers hold an educational degree beyond a high school diploma--that is, whether they hold a postsecondary degree. Using a postsecondary degree as a measure of occupational credentialing, 45 percent of labor force participants (adults who are working or…
ERIC Educational Resources Information Center
Kaspari, Brenda Anderson
2017-01-01
With the skyrocketing costs of higher education and the increased scrutiny of how educational institutions prepare graduates for the workplace, this dissertation explored how the "outsiders," or employers, view and determine the value of academic credentials. Using the premise of credentialism, this grounded theory, qualitative study…
ERIC Educational Resources Information Center
Latham, Alyson; Hill, N. Sharon
2014-01-01
Electronic response systems (ERS) are a means to foster class participation by students who are reluctant to participate in class. In this study, we identify individual characteristics that relate to students' preference for anonymous classroom participation, and we also examine the extent to which preference for anonymity is related to their…
A Mechanism for Anonymous Credit Card Systems
NASA Astrophysics Data System (ADS)
Tamura, Shinsuke; Yanase, Tatsuro
This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.
Southwest Electronic One-Stop Shopping (EOSS) : field operational test : final evaluation report
DOT National Transportation Integrated Search
1999-06-01
This report presents an evaluation of the Southwest Electronic One-Stop Shopping System (EOSS) Operational Test. The system consisted of a PC-based software application that enabled interstate carriers to identify required commercial vehicle credenti...
Privacy preservation and authentication on secure geographical routing in VANET
NASA Astrophysics Data System (ADS)
Punitha, A.; Manickam, J. Martin Leo
2017-05-01
Vehicular Ad hoc Networks (VANETs) play an important role in vehicle-to-vehicle communication as it offers a high level of safety and convenience to drivers. In order to increase the level of security and safety in VANETs, in this paper, we propose a Privacy Preservation and Authentication on Secure Geographical Routing Protocol (PPASGR) for VANET. It provides security by detecting and preventing malicious nodes through two directional antennas such as forward (f-antenna) and backward (b-antenna). The malicious nodes are detected by direction detection, consistency detection and conflict detection. The location of the trusted neighbour is identified using TNT-based location verification scheme after the implementation of the Vehicle Tamper Proof Device (VTPD), Trusted Authority (TA) is generated that produces the anonymous credentials. Finally, VTPD generates pseudo-identity using TA which retrieves the real identity of the sender. Through this approach, the authentication, integrity and confidentiality for routing packets can be achieved. The simulation results show that the proposed approach reduces the packet drop due to attack and improves the packet delivery ratio.
Expecting the Unexpected: Towards Robust Credential Infrastructure
NASA Astrophysics Data System (ADS)
Xu, Shouhuai; Yung, Moti
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the center of credential infrastructures is the methodology of digital signatures. However, methods that assure that credentials and signed messages possess trustworthiness and longevity are not well understood, nor are they adequately addressed in both literature and practice. We believe that, as a basic engineering principle, these properties have to be built into the credential infrastructure rather than be treated as an after-thought since they are crucial to the long term success of this notion. In this paper we present a step in the direction of dealing with these issues. Specifically, we present the basic engineering reasoning as well as a model that helps understand (somewhat formally) the trustworthiness and longevity of digital signatures, and then we give basic mechanisms that help improve these notions.
ERIC Educational Resources Information Center
Mazawi, Andre Elias
1998-01-01
Examines the effects of regional, locality, and high school characteristics on access opportunities to educational credentials of Palestinian Arab students in Israel. Reveals that while tracking patterns are affected by high school variables at the community level, access to educational credentials is determined by community-level, socioeconomic…
ERIC Educational Resources Information Center
Liu, Sze Yan; Chavan, Niraj R.; Glymour, M. Maria
2013-01-01
Purpose: Educational attainment is a robust predictor of disability in elderly Americans: older adults with high-school (HS) diplomas have substantially lower disability than individuals who did not complete HS. General Educational Development (GED) diplomas now comprise almost 20% of new HS credentials issued annually in the United States but it…
ERIC Educational Resources Information Center
Bartlett, Kenneth R.; Horwitz, Sujin K.; Ipe, Minu; Liu, Yuwen
2005-01-01
The increase in the number of industry-sponsored credential programs raises many questions for career and technical education. This study investigated the perceived influence of industry-sponsored credentials on the recruitment process in the information technology (IT) field. Influence is examined from the perspective of Human Resource (HR)…
ERIC Educational Resources Information Center
Sotelo-Dynega, Marlene
2015-01-01
The present study explored the credentialing practices for bilingual school psychologists in the United States. Credentialing agencies of school psychologists, mostly State Departments of Education, across the 50 states and the District of Columbia were contacted via telephone by trained graduate student research assistants. Only two of the…
The Earnings of Community College Graduates in California. A CAPSEE Working Paper
ERIC Educational Resources Information Center
Bahr, Peter Riley
2016-01-01
In this study, I draw on longitudinal data for 1.1 million students in California to estimate the effects of community college credentials on students' earnings, as compared with students who are not awarded a credential. In contrast to much of the recent work on this subject, which assumed that the effects of credentials on students' earnings are…
ERIC Educational Resources Information Center
Willis, Marc
2017-01-01
The purpose of this research was to determine what, if any, relationship existed when considering instructor credentials in relation to student surveys of instruction (SSOI), instructor credentials in relation to grade distribution, and the relationship between SSOI and grade distribution. The case study college is a two-year rural institution in…
Stackable Credentials: Do They Have Labor Market Value? CCRC Working Paper No. 97
ERIC Educational Resources Information Center
Bailey, Thomas; Belfield, Clive R.
2017-01-01
Stackable credentials--sequential postsecondary awards that allow individuals to progress on a career path--have been suggested as a way to enhance the labor market prospects of middle-skill workers. Yet, thus far, little evidence has been provided on the economic value of these credentials. Here, we report a series of estimates on the association…
DOT National Transportation Integrated Search
2007-10-02
The objective was to evaluate economic justifications for motor carriers to participate in CVISN deployment. CVISN (Commercial Vehicle Information Systems and Networks) includes: interstate credentials administration (registration and permitting), el...
Brody, Rebecca; Hise, Mary; Marcus, Andrea Fleisch; Harvey-Banchik, Lillian; Matarese, Laura E
2016-01-01
The National Board of Nutrition Support Certification credentials healthcare professionals and certifies that holders of the Certified Nutrition Support Clinician (CNSC) credential have specialized knowledge of safe and effective nutrition support therapy. The purpose of this pilot study was to survey healthcare professionals affiliated with the American Society for Parenteral and Enteral Nutrition (A.S.P.E.N.) regarding their approaches to nutrition support practice using a complex patient case scenario in accordance with established clinical guidelines. An electronic survey was emailed to individuals affiliated with A.S.P.E.N. Eight multiple-choice knowledge questions addressed evidence-based nutrition support practice issues for a patient with progressing pancreatitis. Demographic and clinical characteristic data were collected. Of 48,093 email invitations sent, 4455 (9.1%) responded and met inclusion criteria. Most respondents were dietitians (70.8%) and in nutrition support practice for 10.3 years, and 29.3% held the CNSC credential. Respondents with the CNSC credential answered 6.18 questions correctly compared with 4.56 for non-CNSC respondents (P < .001). For all 8 questions, CNSC respondents were significantly more likely to choose the correct answer compared with non-CNSC respondents (P < .001). Professionals with the CNSC credential scored significantly higher on a complex case-based knowledge assessment of guideline recommendations for the nutrition support treatment of pancreatitis compared with those without a credential. © 2015 American Society for Parenteral and Enteral Nutrition.
Every Student Counts. The State We're in: 2016-2017. A Report on Public Education in Illinois
ERIC Educational Resources Information Center
Advance Illinois, 2016
2016-01-01
Illinois has set an ambitious target: 60% of working adults will hold a college degree or credential by 2025, as research suggests that at least 60% of jobs will require some type of educational credential past high school. Today, only 50% of the state's working adults hold college credentials. This report takes a snapshot of Illinois state's…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Hallaq, Hania A., E-mail: halhallaq@radonc.uchicago.edu; Chmura, Steven J.; Salama, Joseph K.
Purpose: The NRG-BR001 trial is the first National Cancer Institute–sponsored trial to treat multiple (range 2-4) extracranial metastases with stereotactic body radiation therapy. Benchmark credentialing is required to ensure adherence to this complex protocol, in particular, for metastases in close proximity. The present report summarizes the dosimetric results and approval rates. Methods and Materials: The benchmark used anonymized data from a patient with bilateral adrenal metastases, separated by <5 cm of normal tissue. Because the planning target volume (PTV) overlaps with organs at risk (OARs), institutions must use the planning priority guidelines to balance PTV coverage (45 Gy in 3 fractions) againstmore » OAR sparing. Submitted plans were processed by the Imaging and Radiation Oncology Core and assessed by the protocol co-chairs by comparing the doses to targets, OARs, and conformity metrics using nonparametric tests. Results: Of 63 benchmarks submitted through October 2015, 94% were approved, with 51% approved at the first attempt. Most used volumetric arc therapy (VMAT) (78%), a single plan for both PTVs (90%), and prioritized the PTV over the stomach (75%). The median dose to 95% of the volume was 44.8 ± 1.0 Gy and 44.9 ± 1.0 Gy for the right and left PTV, respectively. The median dose to 0.03 cm{sup 3} was 14.2 ± 2.2 Gy to the spinal cord and 46.5 ± 3.1 Gy to the stomach. Plans that spared the stomach significantly reduced the dose to the left PTV and stomach. Conformity metrics were significantly better for single plans that simultaneously treated both PTVs with VMAT, intensity modulated radiation therapy, or 3-dimensional conformal radiation therapy compared with separate plans. No significant differences existed in the dose at 2 cm from the PTVs. Conclusions: Although most plans used VMAT, the range of conformity and dose falloff was large. The decision to prioritize either OARs or PTV coverage varied considerably, suggesting that the toxicity outcomes in the trial could be affected. Several benchmarks met the dose-volume histogram metrics but produced unacceptable plans owing to low conformity. Dissemination of a frequently-asked-questions document improved the approval rate at the first attempt. Benchmark credentialing was found to be a valuable tool for educating institutions about the protocol requirements.« less
Al-Hallaq, Hania A; Chmura, Steven J; Salama, Joseph K; Lowenstein, Jessica R; McNulty, Susan; Galvin, James M; Followill, David S; Robinson, Clifford G; Pisansky, Thomas M; Winter, Kathryn A; White, Julia R; Xiao, Ying; Matuszak, Martha M
2017-01-01
The NRG-BR001 trial is the first National Cancer Institute-sponsored trial to treat multiple (range 2-4) extracranial metastases with stereotactic body radiation therapy. Benchmark credentialing is required to ensure adherence to this complex protocol, in particular, for metastases in close proximity. The present report summarizes the dosimetric results and approval rates. The benchmark used anonymized data from a patient with bilateral adrenal metastases, separated by <5 cm of normal tissue. Because the planning target volume (PTV) overlaps with organs at risk (OARs), institutions must use the planning priority guidelines to balance PTV coverage (45 Gy in 3 fractions) against OAR sparing. Submitted plans were processed by the Imaging and Radiation Oncology Core and assessed by the protocol co-chairs by comparing the doses to targets, OARs, and conformity metrics using nonparametric tests. Of 63 benchmarks submitted through October 2015, 94% were approved, with 51% approved at the first attempt. Most used volumetric arc therapy (VMAT) (78%), a single plan for both PTVs (90%), and prioritized the PTV over the stomach (75%). The median dose to 95% of the volume was 44.8 ± 1.0 Gy and 44.9 ± 1.0 Gy for the right and left PTV, respectively. The median dose to 0.03 cm 3 was 14.2 ± 2.2 Gy to the spinal cord and 46.5 ± 3.1 Gy to the stomach. Plans that spared the stomach significantly reduced the dose to the left PTV and stomach. Conformity metrics were significantly better for single plans that simultaneously treated both PTVs with VMAT, intensity modulated radiation therapy, or 3-dimensional conformal radiation therapy compared with separate plans. No significant differences existed in the dose at 2 cm from the PTVs. Although most plans used VMAT, the range of conformity and dose falloff was large. The decision to prioritize either OARs or PTV coverage varied considerably, suggesting that the toxicity outcomes in the trial could be affected. Several benchmarks met the dose-volume histogram metrics but produced unacceptable plans owing to low conformity. Dissemination of a frequently-asked-questions document improved the approval rate at the first attempt. Benchmark credentialing was found to be a valuable tool for educating institutions about the protocol requirements. Copyright © 2016 Elsevier Inc. All rights reserved.
A Parallel Postsecondary Universe: The Certification System in Information Technology.
ERIC Educational Resources Information Center
Adelman, Clifford
This report describes the new system of credentialing from corporate vendors and industry/professional associations that has arisen in the information technology and telecommunications industries over the past decade. It compares this system to traditional higher education, identifying both similarities and dissimilarities, and points to some…
Unlocking data: federated identity with LSDMA and dCache
NASA Astrophysics Data System (ADS)
Millar, AP; Behrmann, G.; Bernardt, C.; Fuhrmann, P.; Hardt, M.; Hayrapetyan, A.; Litvintsev, D.; Mkrtchyan, T.; Rossi, A.; Schwank, K.
2015-12-01
X.509, the dominant identity system from grid computing, has proved unpopular for many user communities. More popular alternatives generally assume the user is interacting via their web-browser. Such alternatives allow a user to authenticate with many services with the same credentials (user-name and password). They also allow users from different organisations form collaborations quickly and simply. Scientists generally require that their custom analysis software has direct access to the data. Such direct access is not currently supported by alternatives to X.509, as they require the use of a web-browser. Various approaches to solve this issue are being investigated as part of the Large Scale Data Management and Analysis (LSDMA) project, a German funded national R&D project. These involve dynamic credential translation (creating an X.509 credential) to allow backwards compatibility in addition to direct SAML- and OpenID Connect-based authentication. We present a summary of the current state of art and the current status of the federated identity work funded by the LSDMA project along with the future road map.
ERIC Educational Resources Information Center
Van Noy, Michelle; Jacobs, James
2012-01-01
While promoting postsecondary credential completion is a national priority intended to help graduates secure good jobs, the value of credentials in the labor market from the perspective of employers is not well understood. Specifically, more attention is needed to understand how credentials align with employer needs. Through in-depth interviews…
Private credentialing of health care personnel: an antitrust perspective. Part Two.
Havighurst, C C; King, N M
1983-01-01
Having argued in Part One against extensive judicial or regulatory interference with private personnel credentialing in the health care field, this Article now shifts its focus to emphasize the anticompetitive hazards inherent in credentialing as practiced by professional interests. Competitor-sponsored credentialing is shown to be a vital part of a larger cartel strategy to curb competition by standardizing personnel and services and controlling the flow of information to health care consumers. Instead of altering the conclusions reached in Part One, however, Part Two sets forth a new and hitherto unexplored agenda for antitrust enforcement, one that the authors believe will increase the quantity and quality of information available to consumers and offer a fairer competitive environment to individuals and groups disadvantaged by the denial of desirable credentials. The specific targets singled out for antitrust scrutiny are (1) the practice of "grandfathering," by which new candidates for credentials are required to meet tougher requirements than were met by existing credential holders; (2) agreements to standardize educational programs if they go beyond setting and applying accrediting standards and impair the freedom of institutions to decide independently whether to offer unaccredited training; (3) agreements by which independent certifying or accrediting bodies limit the nature or scope of competition among themselves; and (4) mergers and joint ventures in credentialing and accrediting. The legal theory supporting antitrust attacks in the latter two categories is strengthened by the apparently original insight that commercial information and opinion are themselves articles of commerce such that agreements and combinations restricting their nature and output can be characterized as restraints of trade. Among the many self-regulatory institutions in the health care field whose operation or sponsorship is called into question by the analysis herein are the leading medical specialty boards, the Liaison Committee on Medical Education, various accrediting and certifying bodies in the allied health occupations, and the Joint Commission on Accreditation of Hospitals.
Professional-Development Systems: The State of the States.
ERIC Educational Resources Information Center
Gannett, Ellen; Nee, Judy; Smith, Darci
2001-01-01
Describes states' efforts to implement a school-age credentialing system for child caregivers. Identifies basic problems hindering progress: readiness, infrastructure, and sustainability of infrastructure. Delineates implications for school-age care of significant initiatives in California, Florida, and New York. Suggests that there is no…
ERIC Educational Resources Information Center
New York State Education Dept., Albany.
The basic requirements for credentialing in 31 professions supervised by the Board of Regents and administered by the New York State Department of Education are listed. Not every requirement is cited, and a more detailed statement of the credentialing requirements for these professions may be found in Title VIII of the Education Law and in the…
Veterans’ Health Care: Improved Oversight of Community Care Physicians Credentials Needed
2016-09-01
Physicians’ Credentials Needed What GAO Found GAO found that the Department of Veterans Affairs’ (VA) contractors —Health Net Federal Services (Health...program, but were deficient in doing so under another program. Based on GAO’s review of selected physicians, GAO found that the contractors almost...program consistent with the requirements of the contract. In contrast, the contractors did not always verify credentials of the physicians in the
15 CFR 742.5 - Missile technology.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Country Chart (see supplement No. 1 to part 738 of the EAR). (2) The term “missiles” is defined as rocket systems (including ballistic missile systems, space launch vehicles, and sounding rockets) and unmanned... missile and space programs of the recipient country; (iv) The nonproliferation credentials of the...
DOT National Transportation Integrated Search
1999-05-01
This guide is designed to provide state administrators of motor carrier programs with information on safety, credentials, fuel tax and size and weight regulation as part of the Commercial Vehicle Information Systems and Networks (CVISN) Program. It d...
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Select Committee on Aging.
Hearings on the promotion and purchase of fraudulent credentials are presented, along with the results of an inquiry conducted by a Subcommittee of the Select Committee on Aging of the House of Representatives. Cases of persons who obtained fraudulent credentials and/or illegally practiced a profession are described. Testimony from state licensing…
Credentialing high school psychology teachers.
Weaver, Kenneth A
2014-09-01
The National Standards for High School Psychology Curricula (American Psychological Association, 2013b) require a teacher with considerable psychology content knowledge to teach high school psychology courses effectively. In this study, I examined the initial teaching credential requirements for high school psychology teachers in the 50 states plus the District of Columbia. Thirty-four states (the District of Columbia is included as a state) require the social studies credential to teach high school psychology. An analysis of the items on standardized tests used by states to validate the content knowledge required to teach social studies indicates little or no presence of psychology, a reflection of psychology's meager presence in the social studies teacher preparation curricula. Thus, new teachers with the social studies teaching credential are not prepared to teach high school psychology according to the National Standards. Approval of The College, Career, and Civic Life (C3) Framework for Social Studies State Standards: Guidance for Enhancing the Rigor of K-12 Civics, Economics, Geography, and History (National Council for the Social Studies, 2013) presents an opportunity to advocate for establishing a psychology credential in the 34 states. (c) 2014 APA, all rights reserved.
WE-E-304-00: Implementing SBRT Protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
2015-06-15
SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less
WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xiao, Y.
2015-06-15
SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less
Preventing Unofficial Information Propagation
NASA Astrophysics Data System (ADS)
Le, Zhengyi; Ouyang, Yi; Xu, Yurong; Ford, James; Makedon, Fillia
Digital copies are susceptible to theft and vulnerable to leakage, copying, or manipulation. When someone (or some group), who has stolen, leaked, copied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagation problem of digital credentials, which may contain sensitive information about a credential holder. Existing work such as access control policies and the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses short-lived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.
Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng
2018-02-14
The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1 ≥ a 2 , k 2 ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.
Appointed and Elected Superintendents in Florida's Governance
ERIC Educational Resources Information Center
Habersham, Candace L.
2012-01-01
When a specific system is chosen, in reference to selecting a school superintendent, contention between constituents who oppose such system ensues. Such issues range from demographics and differences in management style to which superintendent is more credentialed. In Florida, each county is considered a school district and has its own school…
The New Postsecondary Landscape
ERIC Educational Resources Information Center
Sandeen, Cathy
2013-01-01
In this essay, Cathy Sandeen states that the new postsecondary landscape requires looking at higher education as a system that provides multiple pathways in and through the various parts of the system, all with the goal of helping students complete a postsecondary degree, credential, or certificate. Sandeen observes two strengths in professional…
Defeating Insider Attacks via Autonomic Self-Protective Networks
ERIC Educational Resources Information Center
Sibai, Faisal M.
2012-01-01
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Beyond Credentialism: The Future of Social Selection
ERIC Educational Resources Information Center
Marien, Michael
1971-01-01
Social selection is analyzed within the context of the entire system of tests and certifications established and maintained by past society and serving certain functions for present society' three scenarios of the early 1980's are presented. (JM)
Anonymity in Classroom Voting and Debating
ERIC Educational Resources Information Center
Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie
2011-01-01
The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…
Earth Systems Science Curriculum Choices for Pre-Service Teachers at San Jose State University
NASA Astrophysics Data System (ADS)
Messina, P.; Metzger, E. P.
2008-12-01
San José State University was a member of the original ESSEA consortium (2003-05), and it continues its participation with the broadening ESSEA community. Having hosted the original Middle- and High School Teachers' ESSEA courses, the Geology Department and Program in Science Education have maintained their commitments toward supporting pre- and in-service teachers in geoscience concept competency and effective pedagogy. We have witnessed an encouraging trend in the numbers of K-8 (multiple subject) pre-service teachers who have enrolled in our in-house ESSEA-inspired course: Geology 103 (Earth Systems and the Environment). We have also seen an influx of prospective secondary (single subject) teachers seeking credentials in non- geoscience disciplines. California teacher credentialing requirements, especially when layered on the increasing demands of major fields of study and the California State University System's hefty General Education mandates, give prospective teachers little latitude in their academic programs. Geology 103 was developed to satisfy three logistical objectives: to comply with "geoscience content competency" as defined by the California Commission on Teacher Credentialing (CCTC); to fulfill one of the CSU's upper-division General Education requirements, and to develop science process skills in a population that may never have had similar prior opportunities. The course is offered in two modalities: online and on-campus. The Web-based sections are currently comparing the relative effectiveness of two dissimilar online learning modalities and assessments: one delivers video/audio/animated "podcasts," while the other requires student involvement through interactive Flash media. The course is taught by professors with joint appointments in the Department of Geology and Program in Science Education, and by current and former classroom teachers to ensure that geoscience content knowledge is achieved through inquiry, systems analyses, and other methods promoting enduring understandings.
Advancing Health Professions Education Research by Creating a Network of Networks.
Carney, Patricia A; Brandt, Barbara; Dekhtyar, Michael; Holmboe, Eric S
2018-02-27
Producing the best evidence to show educational outcomes, such as competency achievement and credentialing effectiveness, across the health professions education continuum will require large multisite research projects and longitudinal studies. Current limitations that must be overcome to reach this goal include the prevalence of single-institution study designs, assessments of a single curricular component, and cross-sectional study designs that provide only a snapshot in time of a program or initiative rather than a longitudinal perspective.One solution to overcoming these limitations is to develop a network of networks that collaborates, using longitudinal approaches, across health professions and regions of the United States. Currently, individual networks are advancing educational innovation toward understanding the effectiveness of educational and credentialing programs. Examples of such networks include: (1) the American Medical Association's Accelerating Change in Medical Education initiative, (2) the National Center for Interprofessional Practice and Education, and (3) the Accreditation Council for Graduate Medical Education's Accreditation System. In this Invited Commentary, the authors briefly profile these existing networks, identify their progress and the challenges they have encountered, and propose a vigorous way forward toward creating a national network of networks designed to determine the effectiveness of health professions education and credentialing.
American Academy of Cosmetic Dentistry
... Library Subscriptions Midline Clinical Newsletter Newsroom Credentialing Guides Surveys & Research Give Back a Smile About AACD Charitable Foundation ... Library Subscriptions Midline Clinical Newsletter Newsroom Credentialing Guides Surveys & Research Give Back a Smile About AACD Charitable Foundation ...
28 CFR 544.73 - Program participation.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) shall be deemed to be making satisfactory progress toward earning a GED credential or high school... program until the inmate earns a GED credential or high school diploma. At these meetings, the inmate may...
28 CFR 544.73 - Program participation.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) shall be deemed to be making satisfactory progress toward earning a GED credential or high school... program until the inmate earns a GED credential or high school diploma. At these meetings, the inmate may...
28 CFR 544.73 - Program participation.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) shall be deemed to be making satisfactory progress toward earning a GED credential or high school... program until the inmate earns a GED credential or high school diploma. At these meetings, the inmate may...
28 CFR 544.73 - Program participation.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) shall be deemed to be making satisfactory progress toward earning a GED credential or high school... program until the inmate earns a GED credential or high school diploma. At these meetings, the inmate may...
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs
Wang, Lingling; Liu, Guozhu; Sun, Lijun
2017-01-01
Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.
Wang, Lingling; Liu, Guozhu; Sun, Lijun
2017-03-24
Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.
Southwest electronic one-stop shopping, motor carrier test report
DOT National Transportation Integrated Search
1997-12-22
The Electronic One-Stop System (EOSS) used in this credential test was designed to replace current normal credentialling procedures with a personal computer-based electronic method that allows users to prepare, apply for, and obtain certain types of ...
Southwest electronic one-stop shopping, state agency test report
DOT National Transportation Integrated Search
1997-12-22
The Electronic One-Stop System (EOSS) used in this credential test was designed to replace current normal credentialling procedures with a personal computer-based electronic method that allows users to prepare, apply for, and obtain certain types of ...
Academic Reform: The More We Change, the Worse We Get
ERIC Educational Resources Information Center
Pearl, Arthur
1970-01-01
University-developed technologies contribute pollutants; academic credentialism legitimizes racism; scholastic involution produces a mandarin class; the university's "innovations reinforce the existing system. The university is aimless, and because it is, its attempted reforms amount to trivia. (Author)
76 FR 72400 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... developed biometric information systems capable of collecting and storing biometric images, associated biographic and contextual information; matching biometrics against local and external biometric galleries; displaying the results of the biometric searches; and as appropriate issuing credentials that contains the...
ERIC Educational Resources Information Center
Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.
2013-01-01
Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…
21 CFR 1311.105 - Requirements for obtaining an authentication credential-Individual practitioners.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Office of Technology Strategy/Division of Identity Management to conduct identity proofing that meets the... assurance level or above. (b) The practitioner must submit identity proofing information to the credential...
46 CFR 10.229 - Replacement of lost merchant mariner credentials.
Code of Federal Regulations, 2014 CFR
2014-10-01
... expiration date as the lost credential. The duplicate issued will be in the form of an MMC. Until April 15... collision, explosion, tornado, wreck, flooding, beaching, grounding, or fire; or personal loss associated...
Redefining commercial vehicle permitting and credentialing violations.
DOT National Transportation Integrated Search
2015-08-01
The objective of this study was to analyze enforcement and adjudication of common commercial vehicle tax, credentialing, and safety offenses. This study examined violations of the International Fuel Tax Agreement and the Kentucky Intrastate Tax, Kent...
Credentialism among Graduate Students.
ERIC Educational Resources Information Center
Stodt, Martha McGinty; Thielens, Wagner, Jr.
1985-01-01
An exploratory study of students entering four elite fields found that most sought both credentials and competence. Stiff competition within chosen occupations led the majority of students to seek every advantage that graduate education could provide. (Author/MLW)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-12
... support or received grant support, or both, from the Institute, either individually or through an academic institution or other organization. The system of records notice will cover a database and paper files..., professional experiences, academic credentials, current and pending support from other grant programs, research...
School Counselors and Student Assessment
ERIC Educational Resources Information Center
Blacher, Joan H.; Murray-Ward, Mildred; Uellendahl, Gail E.
2005-01-01
National school counselor certification examinations and state credentialing standards require knowledge of and skill development in assessment (California Commission on Teacher Credentialing [CCTC], 2001; National Board for Certified Counselors, 1998). And, professional associations have specified assessment competencies (American School…
46 CFR 15.720 - Use of non-U.S.-credentialed personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... MANNING REQUIREMENTS Limitations and Qualifying Factors § 15.720 Use of non-U.S.-credentialed personnel... outside the jurisdiction of the United States, in order to meet manning requirements, may use non-U.S...
28 CFR 544.74 - Work assignment limitations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... program. (2) An inmate ordinarily must show prior attainment of a GED credential or high school diploma in... attainment of a GED credential or high school diploma to be promoted above the minimum pay level or grade in...
28 CFR 544.74 - Work assignment limitations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... program. (2) An inmate ordinarily must show prior attainment of a GED credential or high school diploma in... attainment of a GED credential or high school diploma to be promoted above the minimum pay level or grade in...
28 CFR 544.74 - Work assignment limitations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... program. (2) An inmate ordinarily must show prior attainment of a GED credential or high school diploma in... attainment of a GED credential or high school diploma to be promoted above the minimum pay level or grade in...
28 CFR 544.74 - Work assignment limitations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... program. (2) An inmate ordinarily must show prior attainment of a GED credential or high school diploma in... attainment of a GED credential or high school diploma to be promoted above the minimum pay level or grade in...
Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S
2011-06-06
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.
Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.
2011-01-01
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214
Musolino, Gina M; van Duijn, Jacqueline; Noonan, Ann C; Eargle, Linda K; Gray, Debra L
2013-01-01
The American Physical Therapy Association's (APTA) Strategic Plan strives to increase the number of APTA credentialed clinical instructors. Available to all health care providers, as of 2012, there were 39,851 credentialed clinical instructors. Study purposes were threefold: to determine participants' a. reasons to attend the APTA Credentialed Clinical Instructor Program (CCIP); b. pre-CCIP learning goals; and c. related post-CCIP learning outcomes. This IRB-approved study was completed with informed consent procedures followed. APTA CCIP credentialed trainers (n=5) developed a survey and pilot tested for face and content validity. The instrument included demographics, forced choice and open-ended questions. The pre/post survey was administered to 301 participants of 21 Florida APTA CCIP courses with 5 trainers from 2009-2011. Quantitative survey data were collated, tabulated, and summarized comparing pre/post data. Narrative data was analyzed for codes and themes, synthesized, re-contextualized and triangulated by trainers then cross-compared with APTA CCIP objectives and trainer expertise. The qualitative insights were presented with resulting primary themes and subthemes. Results informed the study purposes with a clear determination of the reasons participants attend the APTA CCIP, the pre-course goals and post learning outcomes. Participants overwhelmingly recommend the APTA CCIP and most receive support from employers with geographic course location being a prime reason for course selection. Precourse learning goals included 5 over-arching themes, with few sub-themes; while post learning outcomes generated 12 specific themes with numerous subthemes. APTA CCIP-credentialed clinical instructors are achieving numerous learning outcomes immediately applicable for clinical education.
Code of Federal Regulations, 2010 CFR
2010-07-01
....310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND... credential; (5) Transportation Worker Identification Credential (TWIC) issued by the Transportation Security... authority of the government of a country that has ratified the International Labour Organization Seafarers...
ERIC Educational Resources Information Center
Miller, Kristina L.; McDaniels, Robert M.
2001-01-01
Examines the impact of technology on career services practitioners and administrators, customers, the educational system, and society. Describes how technology is used in career services such as virtual fairs, chat rooms, online resumes, and basic career websites. Addresses concerns about the credentials of those providing services. (JOW)
Wisconsin Fire Service Certification Program Procedures.
ERIC Educational Resources Information Center
Pribyl, Paul F.
These procedures for the Wisconsin Fire Service Certification Program provide professional qualification standards for three levels of fire fighter and four levels of fire service instructor. A section on program authority/operations covers program development, the credential review system, and revocation of certification. Requirements for…
Competencies in Professional Psychology
ERIC Educational Resources Information Center
Kaslow, Nadine J.
2004-01-01
There has been a burgeoning interest in competency-based education and credentialing in professional psychology. This movement gained momentum at the Competencies Conference: Future Directions in Education and Credentialing in Professional Psychology. After defining professional competence, the author focuses on the identification and delineation…
ERIC Educational Resources Information Center
Jonen, Ruth; Griffith, Phyllis
1998-01-01
The American School Food Service Association has two recognition programs: the recently revised School Foodservice and Nutrition Certification Program and the new School Foodservice and Nutrition Specialist Credentialing Program. The credentialing program was created to enhance school food-service professionals' image and improve their management…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turcotte, Melissa; Moore, Juston Shane
User Behaviour Analytics is the tracking, collecting and assessing of user data and activities. The goal is to detect misuse of user credentials by developing models for the normal behaviour of user credentials within a computer network and detect outliers with respect to their baseline.
IVOA Credential Delegation Protocol Version 1.0
NASA Astrophysics Data System (ADS)
Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew
2010-02-01
The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.
ERIC Educational Resources Information Center
Morra, Linda G.
A study reviewed eight standards and certification systems for occupations that required less than a bachelor's degree for entry-level employment. Common elements among systems included industry ownership and control, recertification requirements to keep certificate holders' skills current, national portability of credentials, and integration of…
The Kentucky Community and Technical College System Learn on Demand Model
ERIC Educational Resources Information Center
McCall, Michael B.
2013-01-01
When colleges turned to online learning, they opened the door for a number of students who might have only dreamed of pursuing a degree or credential. In 2006, the Kentucky Community and Technical College System (KCTCS) surveyed prospective adult students without a college degree and discovered that they were three times more likely to enroll in…
A flexible approach to distributed data anonymization.
Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A
2014-08-01
Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. Copyright © 2013 Elsevier Inc. All rights reserved.
28 CFR 523.20 - Good conduct time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE INMATE ADMISSION, CLASSIFICATION, AND... Educational Development (GED) credential. (c) For inmates serving a sentence for an offense committed on or... satisfactory progress toward earning a General Educational Development (GED) credential, to be eligible for a...
Learn More about EPA’s Plans to Establish Voluntary Criteria for Radon Credentialing Organizations
This page will provide the public with information on a Federal Register Notice of Intent to Establish Voluntary Criteria for Radon Credentialing Organizations.Topics covered include background and information on how to review and provide comments.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... nation's largest residential, educational, and career technical training program for young Americans. Job... Equivalency credential, and career technical training, including industry-recognized credentials, state... DEPARTMENT OF LABOR Employment and Training Administration Comment Request for Information...
46 CFR 5.201 - Voluntary deposits in event of mental or physical incompetence.
Code of Federal Regulations, 2013 CFR
2013-10-01
... incompetence of a holder of a credential or endorsement is caused by use of or addiction to dangerous drugs, a... mental or physical incompetence of a holder of a credential or endorsement is caused by use or addiction...
46 CFR 5.201 - Voluntary deposits in event of mental or physical incompetence.
Code of Federal Regulations, 2014 CFR
2014-10-01
... incompetence of a holder of a credential or endorsement is caused by use of or addiction to dangerous drugs, a... mental or physical incompetence of a holder of a credential or endorsement is caused by use or addiction...
46 CFR 5.201 - Voluntary deposits in event of mental or physical incompetence.
Code of Federal Regulations, 2010 CFR
2010-10-01
... incompetence of a holder of a credential or endorsement is caused by use of or addiction to dangerous drugs, a... mental or physical incompetence of a holder of a credential or endorsement is caused by use or addiction...
46 CFR 5.201 - Voluntary deposits in event of mental or physical incompetence.
Code of Federal Regulations, 2011 CFR
2011-10-01
... incompetence of a holder of a credential or endorsement is caused by use of or addiction to dangerous drugs, a... mental or physical incompetence of a holder of a credential or endorsement is caused by use or addiction...
46 CFR 5.201 - Voluntary deposits in event of mental or physical incompetence.
Code of Federal Regulations, 2012 CFR
2012-10-01
... incompetence of a holder of a credential or endorsement is caused by use of or addiction to dangerous drugs, a... mental or physical incompetence of a holder of a credential or endorsement is caused by use or addiction...
Code of Federal Regulations, 2010 CFR
2010-01-01
... AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.3 Definitions. The following definitions apply... aircraft service. Aviation Safety Inspector means a properly credentialed individual who bears FAA Form... investigations. FAA Form 110A means the credentials issued to qualified Aviation Safety Inspectors by the FAA for...
Professional Certification in Counseling Psychology.
ERIC Educational Resources Information Center
Fretz, Bruce R.; And Others
1980-01-01
Certification procedures protect consumers, but when licensing institutions become monopolistic, alternative paths to credentialing need to be considered. A series of articles examine third party payments, a changing job market and consumer protection concerns, all of which have had an impact on credentialing problems. (JAC)
Portfolio Evaluation for Professional Competence: Credentialing in Genetics for Nurses.
ERIC Educational Resources Information Center
Cook, Sarah Sheets; Kase, Ron; Middelton, Lindsay; Monsen, Rita Black
2003-01-01
Describes the process used by the Credentialing Committee of the International Society of Nurses in Genetics to validate evaluation criteria for nursing portfolios using neural network programs. Illustrates how standards are translated into measurable competencies and provides a scoring guide. (SK)
Mazerolle, Stephanie M; Myers, Sarah L; Walker, Stacy E; Kirby, Jessica
2018-03-01
Professional commitment, or one's affinity and loyalty to a career, has become a topic of interest in athletic training. The expanding research on the topic, however, has omitted newly credentialed athletic trainers (ATs). For an impressionable group of practitioners, transitioning to clinical practice can be stressful. To explore the professional commitment of newly credentialed ATs in the secondary school setting. Secondary school. Qualitative study. A total of 31 newly credentialed ATs (6 men, 25 women; mean age = 24 ± 3 years) participated. Of these, 17 ATs (4 men, 13 women; mean age = 25 ± 4 years) were employed full time in the secondary school setting, and 14 ATs (2 men, 12 women; mean age = 23.0 ± 2.0 years) were graduate assistant students in the secondary school setting. All participants completed semistructured interviews, which focused on their experiences in the secondary school setting and transitioning into the role and setting. Transcripts were analyzed using the phenomenologic approach. Creditability was established by peer review, member checks, and researcher triangulation. Four main findings related to the professional commitment of newly credentialed ATs in the secondary school setting were identified. Work-life balance, professional relationships formed with the student-athletes, enjoyment gained from working in the secondary school setting, and professional responsibility emerged as factors facilitating commitment. Affective commitment is a primary facilitator of professional commitment. Newly credentialed ATs who enjoy their jobs and have time to engage in nonwork roles are able to maintain a positive professional commitment. Our findings align with the previous literature and help strengthen our understanding that rejuvenation and passion are important to professional commitment.
Harned, Roger K
2012-11-01
Physician credentialing is a complex process driven by the demand for quality improvement in health care. In the U.S., the Joint Commission Standard of 2007 has tied hospital accreditation to credentialing through mandated use of the Focused Professional Practice Evaluation (FPPE) and Ongoing Professional Practice Evaluation (OPPE). To assess pediatric interventional radiologists' knowledge of how institutions grant them privileges. Members of the Society for Pediatric Interventional Radiology (SPIR) were sent a web-based survey regarding credentialing. Of 122 members from 19 countries, 81 (66%) responded, and of these 81, 59 (73%) were familiar with their hospital's privileging process. Of 49 U.S. respondents and 32 non-U.S. respondents, 37 (76%) and 17 (53%), respectively, stated that interventional radiology credentialing was different from diagnostic radiology credentialing. Of the 49 U.S. respondents, 24 (49%) reported an OPPE, and of the 32 non-U.S. respondents, 8 (25%) reported an ongoing evaluation. The U.S. OPPE is performed at shorter intervals than its international equivalent. Four years after the Joint Commission defined the FPPE and OPPE, separate credentialing of pediatric interventional radiology from pediatric diagnostic radiology is more likely in the U.S. than internationally, and U.S. pediatric interventional radiologists are more likely to have a defined ongoing professional evaluation and to be evaluated every 6 months or more frequently. There are many SPIR members who do not know how they obtain privileges and/or are not knowingly subject to an OPPE. This lack of knowledge may affect future education of interventional radiologists as well as the definition of pediatric interventional radiology practices within individual institutions.
Database Design to Ensure Anonymous Study of Medical Errors: A Report from the ASIPS collaborative
Pace, Wilson D.; Staton, Elizabeth W.; Higgins, Gregory S.; Main, Deborah S.; West, David R.; Harris, Daniel M.
2003-01-01
Medical error reporting systems are important information sources for designing strategies to improve the safety of health care. Applied Strategies for Improving Patient Safety (ASIPS) is a multi-institutional, practice-based research project that collects and analyzes data on primary care medical errors and develops interventions to reduce error. The voluntary ASIPS Patient Safety Reporting System captures anonymous and confidential reports of medical errors. Confidential reports, which are quickly de-identified, provide better detail than do anonymous reports; however, concerns exist about the confidentiality of those reports should the database be subject to legal discovery or other security breaches. Standard database elements, for example, serial ID numbers, date/time stamps, and backups, could enable an outsider to link an ASIPS report to a specific medical error. The authors present the design and implementation of a database and administrative system that reduce this risk, facilitate research, and maintain near anonymity of the events, practices, and clinicians. PMID:12925548
Florida Language, Speech and Hearing Association Journal, 1994.
ERIC Educational Resources Information Center
Langhans, Joseph J., Ed.
1994-01-01
This annual volume is an annual compilation of articles that address evaluation, treatment, efficacy, and credentialing, and a synopsis of programs that provide speech, language, hearing, and swallowing services. Featured articles include: (1) "Verification of Credentials and Privileging Review" (Kathryn W. Enchelmayer); (2) "The…
78 FR 2284 - Methodology for Selecting Job Corps Centers for Closure; Comments Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-10
... (GED), and career technical training credentials, including industry-recognized credentials, state... align existing career technical training programs to technical standards established by industries or... technical training. Both PIPs and CAPs are used for continued monitoring and implemented for USDA and...
ERIC Educational Resources Information Center
Moore, Rob; Trenwith, John
1997-01-01
Explores how an advertising degree course had to be positioned between competing definitions of valid and relevant, academic and experiential knowledge. Locates the issues within the context of credential inflation--credentials become worth less as more people acquire them. (SK)
46 CFR 10.207 - Identification number.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...
46 CFR 10.207 - Identification number.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...
46 CFR 10.207 - Identification number.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...
46 CFR 10.207 - Identification number.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Identification number. 10.207 Section 10.207 Shipping... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.207 Identification number. For recordkeeping purposes only, a mariner's official MMC identification number is the individual's social security...
28 CFR 115.5 - General definitions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... male or female. Intersex medical conditions are sometimes referred to as disorders of sex development... practitioner means a health professional who, by virtue of education, credentials, and experience, is permitted... professional who, by virtue of education, credentials, and experience, is permitted by law to evaluate and care...
28 CFR 115.5 - General definitions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... male or female. Intersex medical conditions are sometimes referred to as disorders of sex development... practitioner means a health professional who, by virtue of education, credentials, and experience, is permitted... professional who, by virtue of education, credentials, and experience, is permitted by law to evaluate and care...
28 CFR 115.5 - General definitions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... male or female. Intersex medical conditions are sometimes referred to as disorders of sex development... practitioner means a health professional who, by virtue of education, credentials, and experience, is permitted... professional who, by virtue of education, credentials, and experience, is permitted by law to evaluate and care...
America's credentialing crisis: a review of its origins and attempts at solutions.
Lewis-Jenkins, G
2000-01-01
Physicians and their office staffs need no introduction to the concept of practitioner credentialing. They know all too well the inefficiencies, redundancies, and frustrations that typically accompany the process. They may not be as well informed, however, about the origins of the current credentialing crisis and its far-reaching effects on health care. This article supplies a context for understanding the origin and evolution of the crisis and examines the differing approaches health care organizations and state governments are taking to address it. It also provides a look at how one state and its health care community are attempting to create a homegrown, collaborative solution.
On the sensitivity of TG-119 and IROC credentialing to TPS commissioning errors.
McVicker, Drew; Yin, Fang-Fang; Adamson, Justus D
2016-01-08
We investigate the sensitivity of IMRT commissioning using the TG-119 C-shape phantom and credentialing with the IROC head and neck phantom to treatment planning system commissioning errors. We introduced errors into the various aspects of the commissioning process for a 6X photon energy modeled using the analytical anisotropic algorithm within a commercial treatment planning system. Errors were implemented into the various components of the dose calculation algorithm including primary photons, secondary photons, electron contamination, and MLC parameters. For each error we evaluated the probability that it could be committed unknowingly during the dose algorithm commissioning stage, and the probability of it being identified during the verification stage. The clinical impact of each commissioning error was evaluated using representative IMRT plans including low and intermediate risk prostate, head and neck, mesothelioma, and scalp; the sensitivity of the TG-119 and IROC phantoms was evaluated by comparing dosimetric changes to the dose planes where film measurements occur and change in point doses where dosimeter measurements occur. No commissioning errors were found to have both a low probability of detection and high clinical severity. When errors do occur, the IROC credentialing and TG 119 commissioning criteria are generally effective at detecting them; however, for the IROC phantom, OAR point-dose measurements are the most sensitive despite being currently excluded from IROC analysis. Point-dose measurements with an absolute dose constraint were the most effective at detecting errors, while film analysis using a gamma comparison and the IROC film distance to agreement criteria were less effective at detecting the specific commissioning errors implemented here.
34 CFR 361.18 - Comprehensive system of personnel development.
Code of Federal Regulations, 2010 CFR
2010-07-01
... preparing vocational rehabilitation professionals, by type of program; (ii) The number of students enrolled at each of those institutions, broken down by type of program; and (iii) The number of students who..., or have the credentials to receive, certification or licensure. (b) Plan for recruitment, preparation...
34 CFR 361.18 - Comprehensive system of personnel development.
Code of Federal Regulations, 2013 CFR
2013-07-01
... preparing vocational rehabilitation professionals, by type of program; (ii) The number of students enrolled at each of those institutions, broken down by type of program; and (iii) The number of students who..., or have the credentials to receive, certification or licensure. (b) Plan for recruitment, preparation...
34 CFR 361.18 - Comprehensive system of personnel development.
Code of Federal Regulations, 2014 CFR
2014-07-01
... preparing vocational rehabilitation professionals, by type of program; (ii) The number of students enrolled at each of those institutions, broken down by type of program; and (iii) The number of students who..., or have the credentials to receive, certification or licensure. (b) Plan for recruitment, preparation...
34 CFR 361.18 - Comprehensive system of personnel development.
Code of Federal Regulations, 2011 CFR
2011-07-01
... preparing vocational rehabilitation professionals, by type of program; (ii) The number of students enrolled at each of those institutions, broken down by type of program; and (iii) The number of students who..., or have the credentials to receive, certification or licensure. (b) Plan for recruitment, preparation...
34 CFR 361.18 - Comprehensive system of personnel development.
Code of Federal Regulations, 2012 CFR
2012-07-01
... preparing vocational rehabilitation professionals, by type of program; (ii) The number of students enrolled at each of those institutions, broken down by type of program; and (iii) The number of students who..., or have the credentials to receive, certification or licensure. (b) Plan for recruitment, preparation...
Job Satisfaction in Health Education and the Value of Added Credentialing.
ERIC Educational Resources Information Center
Prelip, Michael L.
2001-01-01
Surveyed 267 health educators to measure job satisfaction in the profession and investigate whether individual credentialing affected overall job satisfaction and satisfaction with work, pay, opportunity for promotion, coworkers, and supervision. Results indicated satisfaction with coworkers, work, supervision, and pay, but dissatisfaction with…
ERIC Educational Resources Information Center
Watters, Audrey
2012-01-01
As changing student demographics make it harder for today's learners to earn a four-year degree, educators are experimenting with smaller credentialing steps, such as digital badges. Mark Milliron, chancellor of Western Governors University Texas, advocates the creation of a "family of credentials," ranging from digital badges to certifications,…
Professionalization: Whose Responsibility?
ERIC Educational Resources Information Center
Carter, Marcia J.; And Others
One requisite of a profession is that its practitioners hold a credential certifying that the individual is competent to provide needed services. In the fields of health, physical education, recreation, and dance, diverse groups compete in credentialing practitioners. The four papers in this collection discuss who is, or should be, responsible for…
Connecticut Postsecondary Pathways for Opportunity Youth
ERIC Educational Resources Information Center
American Youth Policy Forum, 2015
2015-01-01
Pathways to Postsecondary Opportunities are the range of options created across education institutions, training providers, and community-based organizations so that each and every young person can access the necessary and personally relevant credentials, skills, and training beyond the completion of a secondary credential that will propel…
46 CFR 10.214 - Security Check.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...
46 CFR 10.214 - Security Check.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...
Complexity and Control: The Organisational Background of Credentialism.
ERIC Educational Resources Information Center
Tyler, William
1982-01-01
Examines the role of organizational processes in generating the demand for qualified personnel. Neo-Weberian theorists point to the importance of contextual features of organizations such as size and national prominence as predictors of educational demand. Neo-Marxist historians examine the role played by credentials. (AM)
32 CFR 147.11 - Guideline I-Emotional, mental, and personality disorders.
Code of Federal Regulations, 2010 CFR
2010-07-01
... because they may indicate a defect in judgment, reliability, or stability. A credentialed mental health... properly, and particularly for consultation with the individual's mental health care provider. (b... credentialed mental health professional that the individual has a condition or treatment that may indicate a...
32 CFR 147.11 - Guideline I-Emotional, mental, and personality disorders.
Code of Federal Regulations, 2014 CFR
2014-07-01
... because they may indicate a defect in judgment, reliability, or stability. A credentialed mental health... properly, and particularly for consultation with the individual's mental health care provider. (b... credentialed mental health professional that the individual has a condition or treatment that may indicate a...
32 CFR 147.11 - Guideline I-Emotional, mental, and personality disorders.
Code of Federal Regulations, 2013 CFR
2013-07-01
... because they may indicate a defect in judgment, reliability, or stability. A credentialed mental health... properly, and particularly for consultation with the individual's mental health care provider. (b... credentialed mental health professional that the individual has a condition or treatment that may indicate a...
32 CFR 147.11 - Guideline I-Emotional, mental, and personality disorders.
Code of Federal Regulations, 2012 CFR
2012-07-01
... because they may indicate a defect in judgment, reliability, or stability. A credentialed mental health... properly, and particularly for consultation with the individual's mental health care provider. (b... credentialed mental health professional that the individual has a condition or treatment that may indicate a...
32 CFR 147.11 - Guideline I-Emotional, mental, and personality disorders.
Code of Federal Regulations, 2011 CFR
2011-07-01
... because they may indicate a defect in judgment, reliability, or stability. A credentialed mental health... properly, and particularly for consultation with the individual's mental health care provider. (b... credentialed mental health professional that the individual has a condition or treatment that may indicate a...
Parks and recreation employment status: implications from a civil service perspective
Joel Frater; Arthur Graham
2002-01-01
Current research on the credentialing process in parks, recreation and leisure services has focused primarily on accreditation and certification and has largely ignored the civil service exam as a credentialing toll or condition of employment in many state and municipal parks and recreation departments.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-19
... threat assessment (STA) and receive a biometric credential called the Transportation Worker... providing new biometric and biographic information at an enrollment center, new STA, payment of the renewal... trips to an enrollment center, and avoid providing new biometric and biographic enrollment information...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Requirements for an STCW endorsement for Global Maritime Distress and Safety System (GMDSS) radio operators. 11.604 Section 11.604 Shipping COAST GUARD, DEPARTMENT... Credentialing of Radio Officers § 11.604 Requirements for an STCW endorsement for Global Maritime Distress and...
Detecting Potentially Compromised Credentials in a Large-Scale Production Single-Signon System
2014-06-01
Attention Deficit Hyperactivity Disorder ( ADHD ), Post-Traumatic Stress Disorder (PTSD), anxiety, they are neurotic, and have memory issues. They... Deficit Hyperactivity Disorder API Application Programming Interface CAC Common Access Card CBL Composite Blocking List CDF Cumulative Distribution...Service Logons (DSLs) system . . . . . . . . . . . . . . . . 49 xi THIS PAGE INTENTIONALLY LEFT BLANK xii List of Acronyms and Abbreviations ADHD Attention
Connection anonymity analysis in coded-WDM PONs
NASA Astrophysics Data System (ADS)
Sue, Chuan-Ching
2008-04-01
A coded wavelength division multiplexing passive optical network (WDM PON) is presented for fiber to the home (FTTH) systems to protect against eavesdropping. The proposed scheme applies spectral amplitude coding (SAC) with a unipolar maximal-length sequence (M-sequence) code matrix to generate a specific signature address (coding) and to retrieve its matching address codeword (decoding) by exploiting the cyclic properties inherent in array waveguide grating (AWG) routers. In addition to ensuring the confidentiality of user data, the proposed coded-WDM scheme is also a suitable candidate for the physical layer with connection anonymity. Under the assumption that the eavesdropper applies a photo-detection strategy, it is shown that the coded WDM PON outperforms the conventional TDM PON and WDM PON schemes in terms of a higher degree of connection anonymity. Additionally, the proposed scheme allows the system operator to partition the optical network units (ONUs) into appropriate groups so as to achieve a better degree of anonymity.
NASA Astrophysics Data System (ADS)
Rogers, N. L.
2010-12-01
A paper published in PNAS (1) analyzed the scientific credentials of two groups of activist scientists. The unconvinced by the evidence group included ~500 scientists and technologists who signed various public documents protesting against various aspects of programs to prevent or mitigate anthropogenic global warming. The convinced by the evidence group (~1200 persons) signed public appeals to implement programs to prevent or mitigate AGW. Scientific credentials were measured by publications and citations. The unspoken message of the paper is that we should have confidence in the canonical program of climate change as outlined by, for example, the IPCC, because those who support the program have better scientific credentials than those that don’t. One of the authors of the paper, James Prall, made available on his website lists of several thousand persons, mostly scientists and technologists, who are in one group or the other. The lists include considerable detail, such as publications, citations and education that relates to scientific qualifications. Using Prall’s lists and relevant anecdotal statements by prominent advocates on both sides of the issue I suggest an alternate reason for the disparity in scientific credentials. The PNAS paper in testing scientific credentials counted the number of publications and citations in the area of climate science. There is a certain circularity in using such a test because persons who are professionally employed as climate scientists will naturally have many publications and citations - that is their professional goal. Professional employment in climate science implies adherence to group standards and to some extent beliefs. To give an analogy, if you are a professional freudian psychoanalyst you can’t say that Freud is a crackpot and retain your professional standing. I’m not saying that climate scientists are crackpots, but that there is surely some sort of shared belief and value system whether or not it is formerly acknowledged. There are lines that one must not cross. The relevant question is, are well qualified and professionally employed climate scientists not skeptics because their superior knowledge gives them insight to the science or are they not skeptics because that is a line they cannot cross? A remarkable disparity in Prall’s lists gives a clue to the answer. Early career scientists are highly dependent on group approval. They are canaries in the coal mine if you like. Looking at the early career scientists on both sides of the issue in Prall’s lists casts light on the answer to the relevant question posed above. (1) Expert credibility in climate change William R. L. Anderegg, James W. Prall, Jacob Harold, and Stephen H. Schneider. PNAS Early Edition April 2010
ERIC Educational Resources Information Center
Tyler, John H.; Murnane, Richard J.; Willett, John B.
A study used data from a long-standing examination system, the General Educational Development (GED) certificate, to illustrate that the details of examination systems have marked impacts on the number of test takers who obtain the desired credential and on the racial/ethnic composition of passers. Data provided by the Florida Department of…
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
Yu, Fu-Yun; Han, Chialing; Chan, Tak-Wai
2008-08-01
This study investigates the impact of anonymous, computerized, synchronized team competition on students' motivation, satisfaction, and interpersonal relationships. Sixty-eight fourth-graders participated in this study. A synchronous gaming learning system was developed to have dyads compete against each other in answering multiple-choice questions set in accordance with the school curriculum in two conditions (face-to-face and anonymous). The results showed that students who were exposed to the anonymous team competition condition responded significantly more positively than those in the face-to-face condition in terms of motivation and satisfaction at the 0.050 and 0.056 levels respectively. Although further studies regarding the effects of anonymous interaction in a networked gaming learning environment are imperative, the positive effects detected in this preliminary study indicate that anonymity is a viable feature for mitigating the negative effects that competition may inflict on motivation and satisfaction as reported in traditional face-to-face environments.
Evaluating Common Item Block Options When Faced with Practical Constraints
ERIC Educational Resources Information Center
Wolkowitz, Amanda; Davis-Becker, Susan
2015-01-01
This study evaluates the impact of common item characteristics on the outcome of equating in credentialing examinations when traditionally recommended representation is not possible. This research used real data sets from several credentialing exams to test the impact of content representation, item statistics, and number of common items on…
Spotlight: Sending Clear Signals on Complex Credentialing Process
ERIC Educational Resources Information Center
Guth, Douglas J.
2017-01-01
Credentialing programs in the U.S. are many and varied: Degrees, professional certifications, digital badges, and licenses to practice all serve as potential pathways to employment for would-be workers. However, those many approaches can also result in confusion for employers, colleges, and students when drilling down into how credentials…
Medical Laboratory Science: An International Comparison for Credentials Evaluators.
ERIC Educational Resources Information Center
Turner, Solveig M.; Karlsson, Britta
Information is presented to help medical technology schools abroad evaluate their credentials in comparison to U.S. requirements. After defining the subfields of medical technology, also called medical laboratory science, a summary is provided of the educational requirements, the professional titles, and the certification recognition of medical…
21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...
The Career Readiness Certificate: The Foundation for Stackable Credentials
ERIC Educational Resources Information Center
Bolin, Barbara
2011-01-01
This article features the Career Readiness Certificate (CRC) which serves as the founding credential in the six states and one locality in the Career Readiness Certificate Consortium (Tennessee, West Virginia, Kentucky, Maryland, North Carolina, Virginia and Washington, D.C.). The Career Readiness Certificate was developed by the small consortium…
46 CFR 15.401 - Employment and service within restrictions of credential.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Employment and service within restrictions of credential. 15.401 Section 15.401 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.401 Employment and service...
Educators' Degrees Earned on Internet Raise Fraud Issues
ERIC Educational Resources Information Center
Trotter, Andrew
2004-01-01
This article discusses how the degrees earned by a dozen educators on the Internet have raised fraud issues. Small firms known as "credential evaluators" help states and school districts detect educators who present phony or flimsy academic credentials from overseas institutions--a safeguard that is becoming more important with the…
14 CFR 125.317 - Inspector's credentials: Admission to pilots' compartment: Forward observer's seat.
Code of Federal Regulations, 2010 CFR
2010-01-01
... inspection, an FAA inspector presents an Aviation Safety Inspector credential, FAA Form 110A, to the pilot in... AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS AND OPERATORS FOR... of safety. (b) A forward observer's seat on the flight deck, or forward passenger seat with headset...
Combined Credential Programs: Pedagogic, Practical, and Ideological Concerns
ERIC Educational Resources Information Center
Young, Kathryn S.
2011-01-01
The number of teacher education programs combining general and special education teacher certification is growing. In spite of this increase, little has been known about how these programs impact preservice teachers' (PSTs) developing professional identities. This article uses a case study of one newly implemented combined credential program at a…
46 CFR 15.401 - Employment and service within restrictions of credential.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Employment and service within restrictions of credential. 15.401 Section 15.401 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.401 Employment and service...
46 CFR 15.401 - Employment and service within restrictions of credential.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Employment and service within restrictions of credential. 15.401 Section 15.401 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.401 Employment and service...
46 CFR 15.401 - Employment and service within restrictions of credential.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Employment and service within restrictions of credential. 15.401 Section 15.401 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.401 Employment and service...
46 CFR 15.401 - Employment and service within restrictions of credential.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Employment and service within restrictions of credential. 15.401 Section 15.401 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; All Vessels § 15.401 Employment and service...
46 CFR 10.215 - Medical and physical requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Medical and physical requirements. 10.215 Section 10.215... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.215 Medical and physical requirements. (a) Medical and Physical Exams. To qualify for an MMC an applicant must meet the medical and...
46 CFR 10.215 - Medical and physical requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Medical and physical requirements. 10.215 Section 10.215... CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.215 Medical and physical requirements. (a) Medical and Physical Exams. To qualify for an MMC an applicant must meet the medical and...
Digital Badges for Staff Training: Motivate Employees to Learn with Micro-Credentials
ERIC Educational Resources Information Center
Copenhaver, Kimberly; Pritchard, Liz
2017-01-01
Integrating micro-credentialing into employee training programs offers libraries an innovative and individualized way to recognize and certify learning and achievement. Digital badges provide a low-cost initiative to support learning benefiting both the individual and institution, offering evidence of skill development that transcends the library…
Equity and Access: Strengthening College Gateway Programs with Credentials
ERIC Educational Resources Information Center
Parks, Rodney; Parrish, Jesse; Holmes, Melissa
2017-01-01
As postsecondary credentials become even more essential to bridge education programs and career pathways, it is critical to reevaluate expectations regarding the transition from high school to college. More specifically, it must be determined how best to support students in marginalized populations that historically have been less likely to attend…
46 CFR 5.901 - Time limitations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Time limitations. 5.901 Section 5.901 Shipping COAST... Time limitations. (a) Any person whose credential or endorsement has been revoked or surrendered for... issuance of a new credential or endorsement. (b) The three year time period may be waived by the Commandant...
46 CFR 5.901 - Time limitations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Time limitations. 5.901 Section 5.901 Shipping COAST... Time limitations. (a) Any person whose credential or endorsement has been revoked or surrendered for... issuance of a new credential or endorsement. (b) The three year time period may be waived by the Commandant...
46 CFR 5.901 - Time limitations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Time limitations. 5.901 Section 5.901 Shipping COAST... Time limitations. (a) Any person whose credential or endorsement has been revoked or surrendered for... issuance of a new credential or endorsement. (b) The three year time period may be waived by the Commandant...
Credentialing in the Health, Leisure, and Movement Professions. Trends and Issues Paper No. 5.
ERIC Educational Resources Information Center
Summerfield, Liane M.
This trends and issues paper considers the emerging presence of credentialing programs in the health, leisure, and movement professions in which such diverse occupations as health education teachers, aerobics instructors, exercise physiologists, dance therapists, community park managers, intramural directors, and military fitness instructors are…
The Social Sources of Educational Credentialism: Status Cultures, Labor Markets, and Organizations.
ERIC Educational Resources Information Center
Brown, David K.
2001-01-01
Discusses expansion of access to higher education. Reviews contested development and promise of the Weberian theory of educational credentialism. Examines the relationship of educational expansion to economic growth, relative importance of technical skills versus occupational status-group cultures in degrees and recruitment, significance of degree…
Credentialism: Why We Have Diploma Mills.
ERIC Educational Resources Information Center
Arnstein, George
1982-01-01
The demand for credentials and college degrees in the United States has spawned the establishment of many degree-granting institutions that are nothing more than diploma mills. Despite some indicators of institutional quality, such as accreditation and state licensing, the identification of substandard colleges is not always an easy task. (WD)
46 CFR 5.205 - Return or issuance of a credential or endorsement.
Code of Federal Regulations, 2010 CFR
2010-10-01
... on incompetence due to drug abuse, the deposit agreement shall provide that the credential or endorsement will not be returned until the person: (1) Successfully completes a bona fide drug abuse... drug abuse monitoring program. (c) Where the voluntary deposit is based on incompetence due to alcohol...
46 CFR 5.205 - Return or issuance of a credential or endorsement.
Code of Federal Regulations, 2013 CFR
2013-10-01
... on incompetence due to drug abuse, the deposit agreement shall provide that the credential or endorsement will not be returned until the person: (1) Successfully completes a bona fide drug abuse... drug abuse monitoring program. (c) Where the voluntary deposit is based on incompetence due to alcohol...
46 CFR 5.205 - Return or issuance of a credential or endorsement.
Code of Federal Regulations, 2014 CFR
2014-10-01
... on incompetence due to drug abuse, the deposit agreement shall provide that the credential or endorsement will not be returned until the person: (1) Successfully completes a bona fide drug abuse... drug abuse monitoring program. (c) Where the voluntary deposit is based on incompetence due to alcohol...
46 CFR 5.205 - Return or issuance of a credential or endorsement.
Code of Federal Regulations, 2012 CFR
2012-10-01
... on incompetence due to drug abuse, the deposit agreement shall provide that the credential or endorsement will not be returned until the person: (1) Successfully completes a bona fide drug abuse... drug abuse monitoring program. (c) Where the voluntary deposit is based on incompetence due to alcohol...
46 CFR 5.205 - Return or issuance of a credential or endorsement.
Code of Federal Regulations, 2011 CFR
2011-10-01
... on incompetence due to drug abuse, the deposit agreement shall provide that the credential or endorsement will not be returned until the person: (1) Successfully completes a bona fide drug abuse... drug abuse monitoring program. (c) Where the voluntary deposit is based on incompetence due to alcohol...
20 CFR 666.100 - What performance indicators must be included in a State's plan?
Code of Federal Regulations, 2011 CFR
2011-04-01
... employment; and (iv) Attainment of a recognized credential related to achievement of educational skills (such as a secondary school diploma or its recognized equivalent), or occupational skills, by participants... employment; and (iv) Attainment of a recognized credential related to achievement of educational skills (such...
How Educational Inequality Develops. National Poverty Center Working Paper Series #06-09
ERIC Educational Resources Information Center
Farkas, George
2006-01-01
Academic achievement--the credentials of schooling completed and degrees attained, as well as the skills and capabilities associated with these credentials--is an important determinant of socioeconomic success. Few if any personal characteristics are more strongly and positively related to an individual's later occupational attainment, employment,…
Degrees of Durability and the New World of Credentialing
ERIC Educational Resources Information Center
DiSalvio, Philip
2013-01-01
The erosion of the college credit monopoly, the devaluation of the degree and the rise of new forms of credentialing suggest a generation of students and higher education institutions somewhat different than the previous generation. Consider a higher learning environment where students create their own academic portfolios and shape their…
Post-GED-Credential Employment Experiences of Adults with Special Needs
ERIC Educational Resources Information Center
Patterson, Margaret Becker
2013-01-01
When transitioning to employment, students with disabilities who do not complete high school face multiple challenges; even beyond the challenges of students who complete a GED® credential later, especially in times of economic downturn and job instability. They cope with sometimes overwhelming struggles from disabling conditions. Thus GED passers…
2009 GED Testing Program Statistical Report
ERIC Educational Resources Information Center
GED Testing Service, 2010
2010-01-01
The "2009 GED[R] Testing Program Statistical Report" is the 52nd annual report in the program's 68-year history of providing a second opportunity for adults without a high school credential to earn their jurisdiction's GED credential. The report provides candidate demographic and GED Test performance statistics as well as historical…
Marketing the College Brand in Ontario
ERIC Educational Resources Information Center
Holgerson, Ronald
2005-01-01
Since inception of the Ontario college system in 1967, the quality of a diploma or certificate in comparison to a university degree has been perceived as an inferior rather than alternative academic credential. As public institutions, community colleges are mandated to respond to regional labour force needs, and to provide graduates who will…
2004-03-01
Allison , Logistic Regression: Using the SAS System (Cary, NC: SAS Institute, Inc, 2001), 57. 23 using the likelihood ratio that SAS generates...21, respectively. 33 Jesse M. Rothstein, College Performance Predictions and the SAT ( Berkely , CA: UC
Global Student Teaching Experiences: Stories Bridging Cultural and Inter-Cultural Difference
ERIC Educational Resources Information Center
Alfaro, Cristina
2008-01-01
The study described in this article took place in an international consortium type model program. The International Teacher Education Program (ITEP) is a California State University System (CSUS) credential program for elementary teacher candidates who are pursuing teacher certification as bilingual teachers (Spanish). Besides San Diego State…
Enhancing the Assistive Technology Workforce State by State. The TAP Bulletin.
ERIC Educational Resources Information Center
RESNA: Association for the Advancement of Rehabilitation Technology, Arlington, VA.
This paper offers suggestions for state systems change activities to enhance the assistive technology (AT) workforce funded under the Technology-Related Assistance for Individuals with Disabilities Act of 1988. Nationally, the Rehabilitation Engineering and Assistive Technology Society of North America AT has begun to credential AT practitioners…
Iowa's Community College Adult Literacy Annual Report. Program Year 2007, July 1, 2006-June 30, 2007
ERIC Educational Resources Information Center
Division of Community Colleges and Workforce Preparation, Iowa Department of Education, 2007
2007-01-01
This comprehensive document replaces the previously published Benchmark Report, Benchmark Report Executive Summary, Iowa's Community College Basic Literacy Skills Credential Report, Iowa GED Statistical Report, GED Annual Performance Report and Iowa's Adult Literacy Program National Reporting System Annual Performance Report (Graphic…
ICT Proficiency and Gender: A Validation on Training and Development
ERIC Educational Resources Information Center
Lin, Shinyi; Shih, Tse-Hua; Lu, Ruiling
2013-01-01
Use of innovative learning/instruction mode, embedded in the Certification Pathway System (CPS) developed by Certiport TM, is geared toward Internet and Computing Benchmark & Mentor specifically for IC[superscript 3] certification. The Internet and Computing Core Certification (IC[superscript 3]), as an industry-based credentialing program,…
Student Mobility 2005. ACAATO Archive Document
ERIC Educational Resources Information Center
Colleges Ontario, 2005
2005-01-01
Several data sources indicate that the desire to obtain both a college and university credential in Ontario's postsecondary system is considerable. Aspirations at the start of college are high, with at least one quarter of college students having serious intentions of attaining a degree after a diploma. Data sources include the College Student…
Post-Secondary Education: Where Do We Go From Here?
ERIC Educational Resources Information Center
Barclay, D. J., Ed.
1971-01-01
Essays contained in this document present a direction for policy and problemsolving in the realm of postsecondary education. The essays cover: (1) the "new" domain of postsecondary education, (2) the growth and financing of postsecondary education, (3) a lottery system for higher education, (4) credentialism, (5) campus disaffection, (6) the…
School Expansion in North Korea and South Korea: Two Systems, Two Approaches.
ERIC Educational Resources Information Center
Lee, Hyangkue
2001-01-01
Examines differences in the public-policy objectives and financing of school expansion efforts in North and South Korea. Institutionalizing credentialism and reliance on financing private education dominates South Korean school expansion, while the financing of public schools and greater government control of education dominates North Korean…
ERIC Educational Resources Information Center
Ethridge, Robin R.; Hadden, Cynthia M; Smith, Michael P.
2000-01-01
Describes the Personal Access Web Services (PAWS) at Louisiana State University, a portal application which offers enterprise, workgroup, and personal services. The paper highlights: PAWS project planning; PAWS as a portal; PAWS implementation; account accreditation; user authentication; legacy integration; mapping credentials; transmission of…
Using Digital Badges to Organize Student Learning Opportunities
ERIC Educational Resources Information Center
Ippoliti, Cinthya; Baeza, Victor D.
2017-01-01
A growing trend at universities is to use digital badges (micro-credentialing) for capturing the "soft skills" students gain outside of the classroom. Libraries can use this opportunity to become campus leaders in digital badges, using the system to not only promote their information literacy activities but to coordinate workshop…
Education and Training: Have the Japanese Beaten Us Again?
ERIC Educational Resources Information Center
Rehder, Robert R.
1983-01-01
Japan is often likened to a giant corporation--Japan Inc.--in which the educational credentials of its employees largely determine their social and economic status. This first international report of 1983 discusses why the U.S. should study the pros and cons of the Japanese educational system. (SSH)
76 FR 43354 - Records Schedules; Availability and Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
...). Master files of an electronic information system containing network security information such as lists of... scores. 11. Department of Homeland Security, U.S. Immigration and Customs Enforcement (N1-567-11-5, 2... enforcement officers to receive agency credentials. 12. Department of Homeland Security, U.S. Immigration and...
Educational Attainment Skewed in California Community Colleges?
ERIC Educational Resources Information Center
Levin, John S.; Beach, Josh M.; Kisker, Carrie B.
2009-01-01
We address the emphasis of the California Community College system upon credentials in their effort to document student outcomes. Statewide curricular awards (associate degrees and certificates) were collected over a four-year period. Data were organized descriptively and analyzed in order to identify long term trends. These curricular trends are…
De-identification of health records using Anonym: effectiveness and robustness across datasets.
Zuccon, Guido; Kotzur, Daniel; Nguyen, Anthony; Bergheim, Anton
2014-07-01
Evaluate the effectiveness and robustness of Anonym, a tool for de-identifying free-text health records based on conditional random fields classifiers informed by linguistic and lexical features, as well as features extracted by pattern matching techniques. De-identification of personal health information in electronic health records is essential for the sharing and secondary usage of clinical data. De-identification tools that adapt to different sources of clinical data are attractive as they would require minimal intervention to guarantee high effectiveness. The effectiveness and robustness of Anonym are evaluated across multiple datasets, including the widely adopted Integrating Biology and the Bedside (i2b2) dataset, used for evaluation in a de-identification challenge. The datasets used here vary in type of health records, source of data, and their quality, with one of the datasets containing optical character recognition errors. Anonym identifies and removes up to 96.6% of personal health identifiers (recall) with a precision of up to 98.2% on the i2b2 dataset, outperforming the best system proposed in the i2b2 challenge. The effectiveness of Anonym across datasets is found to depend on the amount of information available for training. Findings show that Anonym compares to the best approach from the 2006 i2b2 shared task. It is easy to retrain Anonym with new datasets; if retrained, the system is robust to variations of training size, data type and quality in presence of sufficient training data. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.
An empirical examination of client attitudes towards online counseling.
Young, Kimberly S
2005-04-01
Trends over the past decade have shown that online counseling has grown in terms of popularity among consumers and clinicians alike; however, little, if any empirical evidence exists that examines client attitudes towards online counseling as alternative to traditional face-to-face therapy. Therefore, this study investigated client attitudes towards online counseling. Data was collected from 48 e-clients who received online counseling at the Center for Online Addiction. Variables such as client perceptions and concerns about using online counseling, clients' reasons for seeking online counseling over in-office treatment, and demographic profiles of e-clients were assessed. Results suggested that Caucasian, middle-aged males, with at least a four-year bachelors degree were most likely to use online counseling and anonymity, convenience, and counselor credentials were the most cited reasons they sought online counseling over in-office treatment. The lack of perceived privacy and security during online chat sessions and the fear of being caught while conducting online sessions were the main concerns reported by e-clients. A better understanding of client motives and perceptions towards online counseling helps to guide treatment in using the Internet as a clinical tool, especially as the Internet becomes increasingly more available in previously remote markets and the field of online counseling continues to grow.
An E-payment system based on quantum group signature
NASA Astrophysics Data System (ADS)
Xiaojun, Wen
2010-12-01
Security and anonymity are essential to E-payment systems. However, existing E-payment systems will easily be broken into soon with the emergence of quantum computers. In this paper, we propose an E-payment system based on quantum group signature. In contrast to classical E-payment systems, our quantum E-payment system can protect not only the users' anonymity but also the inner structure of customer groups. Because of adopting the two techniques of quantum key distribution, a one-time pad and quantum group signature, unconditional security of our E-payment system is guaranteed.
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs
NASA Astrophysics Data System (ADS)
Grzonkowski, Sławomir
Transmission of users' profiles over insecure communication means is a crucial task of today's ecommerce applications. In addition, the users have to createmany profiles and remember many credentials. Thus they retype the same information over and over again. Each time the users type their credentials, they expose them to phishing or eavesdropping attempts.These problems could be solved by using Single Sign-on (SSO). The idea of SSO is that the users keep using the same set of credentials when visiting different websites. For web-aplications, OpenID1. is the most prominent solution that partially impelemtns SSO. However, OpenID is prone to phishing attempts and it does not preserve users' privacy [1].
The Impact of Anonymous and Assigned Use of Student Response Systems on Student Achievement
ERIC Educational Resources Information Center
Poole, Dawn
2012-01-01
This study examined the impact of two approaches to use of student response systems (SRSs) on achievement in a study designed to better understand effective use of the devices. One condition was anonymous use of SRSs, in which graduate students selected a random clicker when entering the classroom. The second condition assigned devices to students…
46 CFR 10.229 - Issuance of duplicate merchant mariner credentials.
Code of Federal Regulations, 2010 CFR
2010-10-01
... charge. The term “other casualty” includes any damage to a ship caused by collision, explosion, tornado, wreck, flooding, beaching, grounding, or fire; or personal loss associated with a federally declared natural disaster. (d) If a person loses a credential by means other than those noted in paragraph (c) of...
46 CFR 10.229 - Issuance of duplicate merchant mariner credentials.
Code of Federal Regulations, 2011 CFR
2011-10-01
... charge. The term “other casualty” includes any damage to a ship caused by collision, explosion, tornado, wreck, flooding, beaching, grounding, or fire; or personal loss associated with a federally declared natural disaster. (d) If a person loses a credential by means other than those noted in paragraph (c) of...
Pedagogical Techniques of Improvisation Instructors without Academic Credentials
ERIC Educational Resources Information Center
Salonen, Richard Wayne
2010-01-01
The importance of music improvisation can be seen in its inclusion in the National Standards for Music Education and the accreditation standards for the National Association of Schools of Music. The purpose of this study was to examine the pedagogical techniques and materials of improvisation instructors who do not hold academic credentials. The…
Formal Education, Credential, or Both: Early Childhood Program Classroom Practices
ERIC Educational Resources Information Center
Vu, Jennifer A.; Jeon, Hyun-Joo; Howes, Carollee
2008-01-01
Research Findings: This study is intended to widen the debate around the bachelor's degree (BA) as preparation for early childhood teaching when head teachers possess various levels of credentials and education. We examined classroom quality and teacher involvement in 231 classrooms sponsored by 122 different agencies, staffed and supervised by…
Student Scheduling Choices and Time to Completion of a Two-Year Credential
ERIC Educational Resources Information Center
Rzeznik, Mark A.
2017-01-01
All students need to decide how to schedule their classes to complete their credential. This study examined three types of student scheduling choices: full-block scheduling, partial-block scheduling, and traditional scheduling to address two research questions: How do the choices students make in scheduling classes-using three scheduling…
21 CFR 1311.105 - Requirements for obtaining an authentication credential-Individual practitioners.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Technology Strategy/Division of Identity Management to conduct identity proofing that meets the requirements....08. (2) For digital certificates, a certification authority that is cross-certified with the Federal... authentication credential using two channels (e.g., e-mail, mail, or telephone call). If one of the factors used...
Toward the Development of a Model to Estimate the Readability of Credentialing-Examination Materials
ERIC Educational Resources Information Center
Badgett, Barbara A.
2010-01-01
The purpose of this study was to develop a set of procedures to establish readability, including an equation, that accommodates the multiple-choice item format and occupational-specific language related to credentialing examinations. The procedures and equation should be appropriate for learning materials, examination materials, and occupational…
ERIC Educational Resources Information Center
Gollin, George D.
2009-01-01
The global demand for higher education currently exceeds the world's existing university capacity. This shortfall is likely to persist for the foreseeable future, raising concerns that frustrated students might choose to purchase fraudulent credentials from counterfeiters or diploma mills. International efforts to encourage the development of…
CRC Credential Attainment by State Vocational Rehabilitation Counselors
ERIC Educational Resources Information Center
Harpster, Anna M.; Byers, Katherine L.; Harris, LaKeisha L.
2011-01-01
This study examines 137 state vocational rehabilitation (VR) counselors' perceptions of the value of having the Certified Rehabilitation Counselor (CRC) credential. While almost 53% of this sample included persons who were certified, the majority who were not indicated that the two major reasons for not currently having this designation were: (a)…
ERIC Educational Resources Information Center
Brown, Phillip; Power, Sally; Tholen, Gerbrand; Allouch, Annabelle
2016-01-01
This article examines student accounts of credentials, talent and academic success, against a backdrop of the enduring liberal ideal of an education-based meritocracy. The article also examines Bourdieu's account of academic qualifications as the dominant source of institutionalised cultural capital, and concludes that it does not adequately…
Predictors of Success on Professional Credentialing Examinations of Athletic Training Undergraduates
ERIC Educational Resources Information Center
Esparza, Shandra Dawn
2012-01-01
Compared to other allied health programs, graduates of athletic training (AT) programs have lower pass rates on their national credentialing examination (48%). In 2013, the new Standards for Entry Level AT Programs from the Commission on Accreditation of Athletic Training Education (CAATE) will require AT education programs to be accountable for…
An Analysis of Rural and Urban Pennsylvania Adults Taking, Completing and Passing the GED
ERIC Educational Resources Information Center
Van Horn, Barbara L.; Kassab, Cathy
2011-01-01
Dropping out of high school seriously impacts an individual's job opportunities, income potential and employment stability. To minimize those risks, individuals can earn a General Educational Development (GED) credential. Researchers have studied the impact of obtaining a GED on candidates' lives and found that the credential affects their…
Trans-Local Academic Credentials and the (Re)production of Financial Elites
ERIC Educational Resources Information Center
Hall, Sarah; Appleyard, Lindsey
2011-01-01
This paper examines the ways in which credentials from a range of education providers are used to (re)produce transnational financial elites in London's international financial district. Extant research has examined the long-standing relationship between educational background and entry into these financial labour markets. Far less attention has…
ERIC Educational Resources Information Center
Audant, Anne Babette
2016-01-01
Discussions of workforce development emphasize stackable training, and assume linear advancement and alignment, through college and career paths. Stackable credentials have become a best practice for community colleges across the United States as they struggle to advance the college completion agenda and ensure that students graduate with the…
Perceptions of Online Credentials for School Principals
ERIC Educational Resources Information Center
Richardson, Jayson W.; McLeod, Scott; Dikkers, Amy Garrett
2011-01-01
Purpose: The purpose of this study is to investigate the perceptions of human resource directors in the USA about online credentials earned by K-12 school principals and principal candidates. Design/methodology/approach: In this mixed methods study, a survey was sent to a random sample of 500 human resource directors in K-12 school districts…
The Perceived Influence of Industry-Sponsored Credentials in the Information Technology Industry.
ERIC Educational Resources Information Center
Bartlett, Kenneth R.
A study investigated the influence of information technology (IT)-industry-sponsored credentials from both organizational and individual perspectives. A senior-level human resource (HR) executive from each of 33 organizations with 500 or more employees completed a paper-and-pencil questionnaire (response rate=66% of the 50 organizations comprising…
Development of Competency Based Credential Programs in Southern California's High Desert Region.
ERIC Educational Resources Information Center
Burton, Louise F.; And Others
In the northern high desert region of San Bernardino County (California), about half of special education teachers do not hold special education credentials. In September 1988, the Desert-Mountain Rural Training Program began to provide appropriate training to uncredentialed special education teachers in this sparsely populated area. The program…
The Coach-of-Coaches Model for Preparing Rural Special Education Teachers.
ERIC Educational Resources Information Center
Cegelka, Patricia Thomas; Fitch, Suzanne; Alvarado, Jose Luis
San Diego State University (California) has developed a coach-of-coaches model of providing support, assistance, and supervision to intern-teachers in its rural special education alternative credential program. Coaches, who are fully credentialed teachers with supervisory skills, make a minimum of nine direct and indirect (video analysis)…
14 CFR 135.75 - Inspectors credentials: Admission to pilots' compartment: Forward observer's seat.
Code of Federal Regulations, 2010 CFR
2010-01-01
... FAA inspector presents an Aviation Safety Inspector credential, FAA Form 110A, to the pilot in command...' compartment: Forward observer's seat. 135.75 Section 135.75 Aeronautics and Space FEDERAL AVIATION... authority of the pilot in command to exclude any person from the pilot compartment in the interest of safety...
ERIC Educational Resources Information Center
Gül, Ibrahim
2017-01-01
The aim of this research is to examine the relationship between the attitudes of prospective teachers towards teaching profession courses and teaching staff behaviors. The research is a quantitative study. The study's study group is composed of 537 education faculty student. "Attitude Scale towards Credentialing Courses" and…
New Policies Allow High School Child Development Programs to Provide CDA Licensure
ERIC Educational Resources Information Center
Langlais, Amanda G.
2012-01-01
Recent changes made by the Council for Professional Recognition to the Child Development Associate (CDA) credentialing program create an opportunity to redesign high school child development programs. On April 1, 2011, the Council for Professional Recognition lifted the age restriction in the CDA credentialing requirements, now allowing students…
Regression Effects in Angoff Ratings: Examples from Credentialing Exams
ERIC Educational Resources Information Center
Wyse, Adam E.
2018-01-01
This article discusses regression effects that are commonly observed in Angoff ratings where panelists tend to think that hard items are easier than they are and easy items are more difficult than they are in comparison to estimated item difficulties. Analyses of data from two credentialing exams illustrate these regression effects and the…
GOAL Academy: Giving Dropouts a Second Chance
ERIC Educational Resources Information Center
Dicksteen, Lisa Napell
2012-01-01
The U.S. Department of Education's (ED) National Center for Education Statistics defines dropouts as "16- through 21-year-olds who are not enrolled in school and have not earned a high school credential (either a diploma or an equivalency credential such as a General Education Development (GED) certificate)." According to the feds, the…
Using an Experience Documentation Opportunity to Certify Advanced-Level Health Education Specialists
ERIC Educational Resources Information Center
Wilson, Kelly L.; Dennis, Dixie L.; Gambescia, Stephen F.; Chen, W. William; Lysoby, Linda
2012-01-01
The worldwide burden of diseases, environmental threats, and injuries help establish the global context and need for credentialing in health education and promotion. To ensure effective practice by certified or credentialed individuals, it is critical that the global health education and promotion workforce identify, agree on, and establish core…
Crossing the Bridge: GED Credentials and Postsecondary Educational Outcomes. Year One Report
ERIC Educational Resources Information Center
Patterson, Margaret Becker; Zhang, Jizhi; Song, Wei; Guison-Dowdy, Anne
2010-01-01
For most high school non-completers, the GED[R] credential provides a bridge to postsecondary education, but little is known about how successfully GED (General Educational Development) Test candidates make that transition and whether enrollment rates change with time. The American Council on Education (ACE) has begun a three-year longitudinal…
Degrees of Doubt: Legitimate, Real and Fake Qualifications in a Global Market
ERIC Educational Resources Information Center
Brown, George M.
2006-01-01
This paper provides an analysis into the global phenomenon known as credential/qualification fraud, a $US 1 billion dollar "cottage" industry which has tainted higher education in Australia, and does not appear to be abating. The study is developed through a conceptual framework of credentialism, degree creep and screening theory, which…
Back to Beginnings: Credentialism, Productivity, and Adam Smith's Division of Labour.
ERIC Educational Resources Information Center
Davis, Denis J.
1981-01-01
The foundation of factional pressures for upgrading educational credentials in the labor market is examined through a review of human capital and screening theories. The writings of Adam Smith are referenced to show that the claims of the beneficial effects of educational upgrading have been questioned for 200 years. (Author/MLW)
The Decline in the Standing of Educational Credentials in Australia.
ERIC Educational Resources Information Center
Marginson, Simon
1995-01-01
An analysis of the economic returns of education in Australia finds a rising need for education at a time of diminishing apparent returns. It is proposed that the notions of credentialism and education as a positional good provide a better explanation for this phenomenon than does the human capital approach. (MSE)
The Advanced Credential for Health Education Specialists: A Seven-Year Project
ERIC Educational Resources Information Center
Dennis, Dixie L.; Lysoby, Linda
2010-01-01
The only advanced credential exam for health educators, The Master Certified Health Education Specialist (MCHES), involved a seven-year process. The process began in December 2004, with the information from the Competency Update Project (CUP) report that health educators practice at entry- and advanced-levels of practice. In October 2011, the date…
Summative Evaluation of the Foreign Credential Recognition Program. Final Report
ERIC Educational Resources Information Center
Human Resources and Skills Development Canada, 2010
2010-01-01
A summative evaluation of the Foreign Credential Recognition Program (FCRP) funded by Human Resources and Skills Development Canada (HRSDC) was conducted during the spring, summer and fall of 2008. The main objective of the evaluation was to measure the relevance, impacts, and cost-effectiveness of the program. Given the timing of the evaluation…
ERIC Educational Resources Information Center
Berggren, Caroline; Lauster, Nathanael
2014-01-01
Transitions from education to work constitute a distinct set of situations where discrimination is likely to occur. Gender beliefs generally disadvantage women, and when coupled with beliefs regarding parental responsibility, tend to heavily disadvantage mothers. Yet we suggest that professional credentials create a divided labour market, with…
ERIC Educational Resources Information Center
Wildman, Louis
2014-01-01
The purpose of this effort is to share information about the variety of culminating activities used in the acquisition of the California Preliminary Administrative Services Credential. Knowledge of these varying culminating activities and related practices has not previously been readily available. The culminating activities among California's…
ERIC Educational Resources Information Center
Lee, Yeunjoo; Patterson, Philip P.; Vega, Luis A.
2011-01-01
To reduce teacher shortages, an intern credential has been introduced as a means of alternate certification in California. Individuals who meet the requirement of subject matter competency are eligible for an intern credential, allowing them to teach students in special education programs for two years while completing their coursework…
Progress and Directions in Professional Credentialing for Health Education in the United States
ERIC Educational Resources Information Center
Cottrell, Randall R.; Auld, M. Elaine; Birch, David A.; Taub, Alyson; King, Laura Rasar; Allegrante, John P.
2012-01-01
This article provides an update on initiatives in individual certification and accreditation of academic programs in public/community health education and school health education in the United States. Although we provide some historical context, the focus primarily addresses credentialing efforts that have evolved since the Galway Consensus…
ERIC Educational Resources Information Center
Allegrante, John P.; Barry, Margaret M.; Auld, M. Elaine; Lamarre, Marie-Claude; Taub, Alyson
2009-01-01
The interest in competencies, standards, and quality assurance in the professional preparation of public health professionals whose work involves health promotion and health education dates back several decades. In Australia, Europe, and North America, where the interest in credentialing has gained momentum, there have been rapidly evolving…
Essays on New Careers; Social Implications for Adult Educators.
ERIC Educational Resources Information Center
Riessman, Frank; And Others
These essays concentrate on the challenge that adult education faces in helping the urban poor develop meaningful paraprofessional careers in the human services. In one essay, the reformist approach to improving access to credentials is compared with the radical approach, which questions the validity of the credentials process as well as its…
State Initiatives on Industry-Based Skill Standards and Credentials.
ERIC Educational Resources Information Center
Ganzglass, Evelyn; Simon, Martin
A study examined state initiatives for industry-based skill standards and credentials. Officials in 19 states were interviewed, case studies of programs in 3 states (Georgia, Pennsylvania, and Texas) were conducted, and focus group discussions were held with 25 individuals. State skill standards were generally found to be tied to broader efforts…
Associate Degrees Awarded in British Columbia, 1993-94 to 2005-06
ERIC Educational Resources Information Center
Karlinski, Jean
2007-01-01
The Associate Degree is a two year academic credential available with an Arts or Science focus. The British Columbia Council on Admissions and Transfer (BCCAT) initiated development of this provincial credential at the request of British Columbia's (BC's) public post-secondary institutions. In March 2003, BCCAT prepared a report detailing the…
Credentialing Public Health Nurses: Current Issues and Next Steps Forward.
Vandenhouten, Christine L; DeVance-Wilson, Crystal L; Little, Barbara Battin
2015-01-01
The purpose of this descriptive, cross-sectional study was to identify Public Health Nurses' (PHN) perceived motivators and barriers to seeking PHN board certification. In collaboration with the Quad Council of Public Health Nursing Organizations, PHNs from across the United States were invited to complete the PHN Certification Survey, a 14-item online questionnaire. A total of 912 surveys were completed. PHNs were motivated to seek PHN board certification by three overarching categories: professional competence, personal satisfaction, and financial incentives. Frequently cited barriers to certification were lack of knowledge of certification opportunities, being unaware of eligibility criteria, cost, perceived lack of value/reward by employer, and preparation time. Demonstrating a highly educated, competent, and reliable PHN workforce can only be achieved through ongoing professional development and credentialing. PH stakeholders (i.e., PHN organizations, employers, PHNs, etc.) need a strategic approach to address the main barriers to certification identified in this study (a) awareness of certification and eligibility criteria, and (b) recognition of the credential by employers. In addition, research on the relationship between PHN credentialing and population health outcomes is essential. © 2015 Wiley Periodicals, Inc.
Procedural Headache Medicine in Neurology Residency Training: A Survey of US Program Directors.
Robbins, Matthew S; Robertson, Carrie E; Ailani, Jessica; Levin, Morris; Friedman, Deborah I; Dodick, David W
2016-01-01
To survey neurology residency program directors (PDs) on trainee exposure, supervision, and credentialing in procedures widely utilized in headache medicine. Clinic-based procedures have assumed a prominent role in headache therapy. Headache fellows obtain procedural competence, but reliance on fellowship-trained neurologists cannot match the population eligible for treatments. The inclusion of educational modules and mechanisms for credentialing trainees pursuing procedural competence in residency curricula at individual programs is not known. A web-based survey of US neurology residency PDs was designed by the American Headache Society (AHS) procedural special interest section in collaboration with AHS and American Academy of Neurology's Headache and Facial Pain section leadership. The survey addressed exposure, training, and credentialing in: (1) onabotulinumtoxinA (onabotA) injections, (2) extracranial peripheral nerve blocks (PNBs), and (3) trigger point injections (TPIs). Fifty-five PDs (42.6%) completed the survey. Compared to noncompleters, survey completers were more likely to feature headache fellowships at their institutions (38.2% vs 10.8%, P=0.0002). High exposure (onabotA=90.9%, PNBs=80.0%, TPIs=70.9%) usually featured hands-on patient instruction (66.2%) and lectures (55.7%). Supervised performance rates were high (onabotA=65.5%, PNBs=60.0%, TPIs=52.7%), usually in continuity clinic (60.0%) or headache elective (50.9%). Headache specialists (69.1%) or general neurology (32.7%) faculty most commonly trained residents. Formal credentialing was uncommon (16.4-18.2%), mostly by documenting supervised procedures (25.5%). Only 27.3% of programs permitted trainees to perform procedures independently. Most PDs felt procedural exposure (80.0-90.9%) and competence (50.9-56.4%) by all trainees was important. Resident exposure to procedures for headache is high, but credentialing mechanisms, while desired by most PDs, are not generally in place. Implementation of a credentialing process may ensure trainees enter practice with the ability to perform procedures safely and effectively. © 2015 American Headache Society.
Arshad, Hamed; Nikooghadam, Morteza
2014-12-01
Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.
TU-C-9A-01: IROC Organization and Clinical Trial Credentialing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Followill, D; Molineu, A; Xiao, Y
2014-06-15
As a response to recommendations from a report from the Institute of Medicine, NCI is reorganizing it clinical trial groups into a National Clinical Trial Network (NCTN) that consists of four adult groups (Alliance, ECOGACRIN, NRG, and SWOG) and one children’s group (COG). NRG will house CIRO, a center to promote innovative radiation therapy research and intergroup collaboration in radiation. The quality assurance groups that support clinical trials have also been restructured. ITC, OSU Imaging corelab, Philadelphia Imaging core-lab, QARC, RPC, and RTOGQA have joined together to create the Imaging and Radiation Oncology Core (IROC) Group. IROC’s mission is tomore » provide integrated radiation oncology and diagnostic imaging quality control programs in support of the NCI’s NCTN thereby assuring high quality data for clinical trials designed to improve the clinical outcomes for cancer patients worldwide. This will be accomplished through five core services: site qualification, trial design support, credentialing, data management, case review.These changes are important for physicist participating in NCI clinical trials to understand. We will describe in detail the IROC’s activities and five core services so that as a user, the medical physicist can learn how to efficiently utilize this group. We will describe common pitfalls encountered in credentialing for current protocols and present methods to avoid them. These may include the which benchmarks are required for NSABP B-51/RTOG 1304 and how to plan them as well as tips for phantom planning. We will explain how to submit patient and phantom cases in the TRIAD system used by IROC. Learning Objectives: To understand the basic organization of IROC, its mission and five core services To learn how to use TRIAD for patient and phantom data submission To learn how to avoid common pitfalls in credentialing for current trials.« less
Kushida, Clete A; Nichols, Deborah A; Jadrnicek, Rik; Miller, Ric; Walsh, James K; Griffin, Kara
2012-07-01
De-identification and anonymization are strategies that are used to remove patient identifiers in electronic health record data. The use of these strategies in multicenter research studies is paramount in importance, given the need to share electronic health record data across multiple environments and institutions while safeguarding patient privacy. Systematic literature search using keywords of de-identify, deidentify, de-identification, deidentification, anonymize, anonymization, data scrubbing, and text scrubbing. Search was conducted up to June 30, 2011 and involved 6 different common literature databases. A total of 1798 prospective citations were identified, and 94 full-text articles met the criteria for review and the corresponding articles were obtained. Search results were supplemented by review of 26 additional full-text articles; a total of 120 full-text articles were reviewed. A final sample of 45 articles met inclusion criteria for review and discussion. Articles were grouped into text, images, and biological sample categories. For text-based strategies, the approaches were segregated into heuristic, lexical, and pattern-based systems versus statistical learning-based systems. For images, approaches that de-identified photographic facial images and magnetic resonance image data were described. For biological samples, approaches that managed the identifiers linked with these samples were discussed, particularly with respect to meeting the anonymization requirements needed for Institutional Review Board exemption under the Common Rule. Current de-identification strategies have their limitations, and statistical learning-based systems have distinct advantages over other approaches for the de-identification of free text. True anonymization is challenging, and further work is needed in the areas of de-identification of datasets and protection of genetic information.
Medical document anonymization with a semantic lexicon.
Ruch, P.; Baud, R. H.; Rassinoux, A. M.; Bouillon, P.; Robert, G.
2000-01-01
We present an original system for locating and removing personally-identifying information in patient records. In this experiment, anonymization is seen as a particular case of knowledge extraction. We use natural language processing tools provided by the MEDTAG framework: a semantic lexicon specialized in medicine, and a toolkit for word-sense and morpho-syntactic tagging. The system finds 98-99% of all personally-identifying information. PMID:11079980
Does Formal Credit Work for MOOC-Like Learning Environments?
ERIC Educational Resources Information Center
Kursun, Engin
2016-01-01
Although a number of claims have been made describing massive open online courses (MOOCs) as a disruptive innovation in education, these claims have not yet been proven through research. Instead, MOOCs should perhaps be considered as an integrative model for higher education systems, but to do so will require recognition of credentials. Initial…
Illinois WorkNet System, NOCTI Partner for Real-World Credentials
ERIC Educational Resources Information Center
Telger, Natasha; Foster, John C.
2011-01-01
This article describes one assessment that provides a college- and career-ready individual for employers. In Illinois, workNet is the state's primary online workforce development Web site and resource for Workforce Investment Act services. With help from NOCTI, workNet offers assessments that identify the skills and interests of participants,…
Are Changing School Needs Reflected in Principal Job Ads?
ERIC Educational Resources Information Center
Richardson, Jayson W.; Watts, Dana Specker; Hollis, Ericka; McLeod, Scott
2016-01-01
The roles of the school principal continue to evolve due to shifting demands as well as ever-changing organizational needs. As new leadership skill sets emerge, we might expect school systems to respond by actively seeking different credentials, experiences, and dispositions of their principal candidates. This study of 279 principal job…
49 CFR 1572.13 - State responsibilities for issuance of hazardous materials endorsement.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Information System (CDLIS) operator of the results of the security threat assessment. (3) Revoke or deny the... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.13... security threat assessment in 49 CFR 1572.5 and issues an Initial Determination of Threat Assessment and...
Unregulated Autonomy: Uncredentialed Educational Interpreters in Rural Schools
ERIC Educational Resources Information Center
Fitzmaurice, Stephen
2017-01-01
Although many rural Deaf and Hard of Hearing students attend public schools most of the day and use the services of educational interpreters to gain access to the school environment, little information exists on what interpreters are doing in rural school systems in the absence of credentialing requirements. The researcher used ethnographic…
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Div. of Human Resources.
The Department of Defense's (DOD) efforts to assure that its physicians are qualified to perform their assigned duties are discussed. Five sections include: introduction; additional actions needed to help assure that military physicians have proper qualifications; hospital credentialing and privileging systems needed to comply with DOD…
ERIC Educational Resources Information Center
Duchan, Judith Felson
2012-01-01
Purpose: In the film "The King's Speech", the credibility of the king's speech clinician, Lionel Logue, is challenged. This article examines Logue's credentials in light of the credentialing standards and attitudes of Logue's time as well as those affecting today's practices. The aim is to show how standards of legitimacy change with the…
Pathways to Align Career and Educational Choices for Adult Learners
ERIC Educational Resources Information Center
Ippolito, Andrew
2018-01-01
Now, more than ever, more adults must earn college credentials in order to earn family sustaining wages and to help fuel and sustain a robust national economy. That means that institutions of higher education must do all they can to help adult students enroll in college and complete a postsecondary credential. Achieving the Dream emphasizes a…
How and Why do Teacher Credentials Matter for Student Achievement? NBER Working Paper No. 12828
ERIC Educational Resources Information Center
Clotfelter, Charles T.; Ladd, Helen F.; Vigdor, Jacob L.
2007-01-01
Education researchers and policy makers agree that teachers differ in terms of quality and that quality matters for student achievement. Despite prodigious amounts of research, however, debate still persists about the causal relationship between specific teacher credentials and student achievement. In this paper, we use a rich administrative data…
It addresses the criteria and process for EPA Regions to issue Federal EPA inspector credentials to state/tribal government employees to authorize them to conduct civil inspections on EPA's behalf under the authority of a specific environmental statute and subject to the conditions in the Guidance.
ERIC Educational Resources Information Center
Lechuga, Vicente M.
2008-01-01
As the labor market continues to demand more workers with postsecondary credentials, for-profit colleges and universities offer the training, degrees, and credentials that students seek to remain viable in an increasingly competitive job market. This study seeks to provide a new perspective on for-profit institutions by focusing on the roles and…
ERIC Educational Resources Information Center
Kirk, Richard; Watt, Karen M.
2018-01-01
This qualitative study examines how Mexican American students participating in an AVID for Higher Education course perceived their preparation for the workforce and efficacy of completing a college credential. A focus group approach was used to explore how social and cultural networks (networks for success) contribute to college completion. The…
Perceptions of Interior Design Program Chairs Regarding Credentials for Faculty
ERIC Educational Resources Information Center
Miller, Beth R.
2017-01-01
The purpose of this study was to determine whether program chairs in interior design have a preferred degree credential for candidates seeking a full-time, tenure-track position or other full-time position at their institution and to determine if there is a correlation between this preference and the program chair's university's demographics,…
ERIC Educational Resources Information Center
Bennett, Ruth
A description of the American Indian Bilingual Teacher Credential Program offered by Humboldt State University (California) provides background information on the linguistic groups served by the program. Accompanying the program descriptions are lists of lower and upper division requirements, descriptions of competency exam, program schedule,…
Labor Market Returns to Community College Awards: Evidence from Michigan. A CAPSEE Working Paper
ERIC Educational Resources Information Center
Bahr, Peter Riley; Dynarski, Susan; Jacob, Brian; Kreisman, Daniel; Sosa, Alfredo; Wiederspan, Mark
2015-01-01
We examine the relative labor market gains experienced by first-time college students who enrolled in five community colleges in Michigan in 2003 and 2004. We track credentials, credits, earnings, and employment for these students through 2011. We compare labor market outcomes of those who earned a credential (associate degree or certificate) to…
Goal Setting and Open Digital Badges in Higher Education
ERIC Educational Resources Information Center
Cheng, Zui; Watson, Sunnie Lee; Newby, Timothy James
2018-01-01
While Open Digital Badges (ODBs) has gained an increasing recognition as micro-credentials, many researchers foresee the role of ODBs as an innovative learning tool to enhance learning experiences beyond that of an alternative credential. However, little research has explored this topic. The purposes of this paper are to 1) argue that one way to…
Training, Degrees, and Credentials in the Hiring of School Psychologists
ERIC Educational Resources Information Center
O'donnell, Patrick S.; Dunlap, Linda L.
2014-01-01
A national sample of 246 Directors of Pupil Personnel Services and Directors of Special Education were surveyed to assess the importance they place on training, degrees, and credentials in the hiring of school psychologists. High, but varying, levels of importance were found for the content knowledge and skill areas in the National Association of…
ERIC Educational Resources Information Center
Scott-Clayton, Judith; Weiss, Madeline Joy
2011-01-01
As community colleges search for models of organizational success, new attention is being paid to technical colleges--institutions that primarily offer terminal programs in specific career-related fields rather than focusing on more general academic credentials and transfer programs as many comprehensive institutions do. Recent research observes…
The Adult Training and Education Survey (ATES) Pilot Study. Technical Report. NCES 2013-190
ERIC Educational Resources Information Center
Bielick, Stacey; Cronen, Stephanie; Stone, Celeste; Montaquila, Jill M.; Roth, Shelley Brock
2013-01-01
Education and training beyond high school are important for securing opportunities for high-wage jobs in the United States. Academic degrees awarded by institutions of higher education represent a key component of the post-high-school credentials available to the American labor force. Other credentials, such as industry-recognized certifications,…
The Credential Question: Attitudes of Teaching Artists in Dance and Theatre Arts
ERIC Educational Resources Information Center
Risner, Doug; Anderson, Mary Elizabeth
2015-01-01
Drawn from the authors' larger study of teaching artists in dance and theatre arts (Anderson and Risner, Hybrid Lives), this analysis investigated participants' (n = 172) attitudes and beliefs about the need and relevance of a teaching artist credential or certificate. Data were obtained through an in-depth, online survey, electronic…
GED 21st Century Learning Pathways Pilots. Final Report
ERIC Educational Resources Information Center
Rutschow, Elizabeth Zachry; Grossman, Amanda; Cullinan, Dan
2014-01-01
For the nearly 39 million U.S. adults who do not have a high school diploma, the General Educational Development (GED) programs and exam have served as the main avenue for improving individuals' skills and helping them earn a high school credential. However, few students who start these programs ever get this credential, and even fewer advance to…
Educational Transitions in Israel: A Test of the Industrialization and Credentialism Hypotheses.
ERIC Educational Resources Information Center
Shavit, Yossi; Kraus, Vered
1990-01-01
Explores the industrialization and credentialism hypotheses and predictions of educational attainment levels. Finds the effects of the father's education and occupation were stable for those attending school in the 1940s, 1950s, and 1960s. Notes that the effects of ethnicity declined in the transition from primary to secondary school. (NL)
Title VII and the Masters of Reality: Eliminating Credentialism in the American Labor Market.
ERIC Educational Resources Information Center
White, David M.; Francis, Richard L.
1976-01-01
Examines effects of a Supreme Court decision (Gribbs vs Duke Power Co., 1971) stating that job applicants need neither pass an intelligence test nor possess particular educational credentials unless they are directly related to the requirements of the job. Journal available from Georgetown University Law Center, 600 New Jersey Ave., NW,…
ERIC Educational Resources Information Center
Walters, David
2004-01-01
This paper assesses the importance of the credential requirements used by employers to attract graduates who will use their education on the job. The framework of this study is embedded within the theoretical debates between proponents of the credentialist and human capital theories of education. Past research related to these debates has focused…
Post-GED-Credential College Prospects for Adults with Special Needs
ERIC Educational Resources Information Center
Patterson, Margaret Becker
2014-01-01
Many adults with special needs, who did not finish high school, complete a GED® credential to go to college. As they prepare to transition, they may encounter barriers and likely require supports to succeed in college. The purpose of this qualitative research paper is to describe the college prospects of transitioning adults with a GED credential…
ERIC Educational Resources Information Center
Dadgar, Mina; Trimble, Madeline Joy
2015-01-01
This study provides one of the first estimates of the returns to different types of community college credentials--short-term certificates, long-term certificates, and associate degrees--across different fields of study. We exploit a rich data set that includes matched, longitudinal college transcripts and Unemployment Insurance records for…
Does Higher Education Expansion Reduce Credentialism and Gender Discrimination in Education?
ERIC Educational Resources Information Center
Lin, Ching-Yuan; Lin, Chun-Hung A.
2012-01-01
This paper investigates the effects of higher education expansion on the phenomena of credentialism and gender discrimination in education. Using the survey data of Family Income and Expenditure by DGBAS, Taiwan from 1980 to 2009, we examine the time path of the effect of higher education expansion on household expenditures for children's…
ERIC Educational Resources Information Center
Taub, Alyson; Allegrante, John P.; Barry, Margaret M.; Sakagami, Keiko
2009-01-01
This article was prepared to inform the deliberations of the Galway Consensus Conference by providing a common and global reference point for the discussion of terminology and key conceptual and professional issues in the credentialing of health education and health promotion specialists. The article provides a review of the terminology that is…
ERIC Educational Resources Information Center
Donovan, Loretta; Green, Tim; Hansen, Laurie E.
2012-01-01
This study compares teacher candidates' initial and changed beliefs, dispositions, and uses of technology in two credential program models: a one-to-one laptop program with ubiquitous technology use and a traditional credential program in which students are expected to have specific technology experiences and requirements in each course (a model…
ERIC Educational Resources Information Center
Cann, Colette N.
2015-01-01
White teacher savior films (WTSFs) depict the teaching profession as one for which conventional credentialing is unnecessary. White teachers with little training and experience perform miracles in urban classrooms where trained, experienced teachers have failed. This same narrative is echoed in alternative credential programs such as Teach For…
Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
NASA Astrophysics Data System (ADS)
Park, Jun-Cheol
User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.
ERIC Educational Resources Information Center
Caudill, Jason G.
2016-01-01
This paper provides an introductory discussion of the value and theoretical structure of a higher doctorate in American academia. The theory is that such a structure would help to guide academic careers and provide a credentialing system that is absent in most accrediting processes and disappearing with the decline of tenure. The goal is to ignite…
Wolff, Jennifer L; Berger, Andrea; Clarke, Deserae; Green, Jamie A; Stametz, Rebecca; Yule, Christina; Darer, Jonathan D
2016-11-01
To describe the characteristics and online practices of patients and "care partners" who share explicit access to a patient portal account at a large integrated health system that implemented shared access functionality in 2003. Survey of 323 patients and 389 care partners at Geisinger Health System with linked information regarding access and use of patient portal functionality. Few (0.4%) registered adult patient portal users shared access to their account. Patients varied in age (range: 18-102); more than half had a high school education or less (53.6%). Patient motivations for sharing access included: to help manage care (41.9%), for emergency reasons (29.7%), lack of technology experience (18.4%), or care partner request (10.0%). Care partners were parents (39.8%), adult children (27.9%), spouses (26.2%), and other relatives (6.1%). Patients were more likely than care partners to have inadequate health literacy (54.8% versus 8.8%, P < .001) and less confident in their ability to manage their care (53.0% versus 88.1%; P < .001). Care partners were more likely than patients to perform health management activities electronically (95.5% versus 48.4%; P < .001), access the patient portal (89.2% versus 30.3%; P < .001), and use patient portal functionality such as secure messaging (39.6% versus 13.9%; P < .001). Care partners used their own credentials (89.1%) and patient credentials (23.3%) to access the patient portal. Shared access is an underused strategy that may bridge patients' health literacy deficits and lack of technology experience and that helps but does not fully resolve concerns regarding patient and care partner identity credentials. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
[Current trends in gamete donation - psychosocial and ethical issues].
Rumpíková, T; Oborná, I; Konečná, H
2017-01-01
To overview contemporary knowledge of legal and psychosocial rules in gamete donation. Previously, anonymous donation was preferred and recommended by experts but currently, with respect to the right to know the genetic origin of individuals, the relation to donor anonymity was reconsidered in many countries. There is a growing tendency to introduce the open identity system in gamete donation. Such system may guarantee that the child born after gamete donation may have receive the identification data of the donor of gametes. A review. Clinic of Reproductive Medicine and Gynecology Zlin. An overview of recent literature evaluating the influence of donor anonymity vs. open identity on psychosocial development of children born after gamete donation as well as on the quality of the relationship between parents and children in such families. New medical technologies usually overtake the developmental speed of ethics and psychology, and their impact on human society. Current trend to open identity is strong but there is no clear evidence that the open identity is of real importance for the healthy psychosocial development of a child born after gamete donation. Furthermore, there is no evidence that anonymity and secrecy of the gamete donation is harmful. In case of the consideration of the change in legal regulation in anonymity/open identity in gamete donation we would suggest the thorough consideration of all consequences.
ERIC Educational Resources Information Center
Waters, Johanna L.
2009-01-01
This paper examines the role of specific and place-based social capital in the recognition and evaluation of international credentials. Whilst research on labour market segmentation has contributed towards an understanding of the spatial variability of the value of human capital, very little attention has been paid to the ways in which the…
ERIC Educational Resources Information Center
Giani, Matthew; Fox, Heather Lee
2017-01-01
Career pathways, comprised of stackable credentials and a coherently aligned sequence of programmes of study, are being hailed as an effective means for promoting postsecondary attainment and upward mobility, particularly for low-income and low-skilled adult workers. However, concerns have been raised regarding whether this strategy accomplishes…
Laura Pittman: The Nation's First Credentialed Direct Support Professional
ERIC Educational Resources Information Center
King, Tom
2007-01-01
This article profiles Laura Pittman, the nation's first credentialed Direct Support Professional (DSP). Laura is a DSP at the Orange Grove Center (OGC) in Chattanooga, Tennessee and has been working there for almost ten years. She has been a DSP for seven of those years, and in that role, supported four women at one of the Orange Grove Center…
ERIC Educational Resources Information Center
Lazarus, Sheryl S.; van den Heuvel, Jill R.; Thurlow, Martha L.
2017-01-01
This paper explores how to balance test security and accessibility on licensure, credentialing, and certification exams. It examines K-12 test security policies related to educational assessments across states to discover lessons learned about how to meet accessibility needs of individuals with disabilities while minimizing test security risks. It…
ERIC Educational Resources Information Center
Bahr, Peter Riley
2016-01-01
In this study, I use data from California to estimate the returns to a community college education for students who do not complete postsecondary credentials. I find strong, positive returns to completed credits in career and technical education (CTE) fields that are closely linked to employment sectors that are not credential-intensive, such as…
ERIC Educational Resources Information Center
Estupinan, Marina
2010-01-01
The purpose of the study was to research and analyze: (a) the similarities and differences in pre-service teachers' perceptions of teacher preparedness for multicultural education following the completion of a course in a teacher credentialing program, and (b) the identification of major factors from the university professor's perceptions which…
ERIC Educational Resources Information Center
George, Anna Ray Bayless
2012-01-01
A study was conducted to determine the relationship between the credentials held by science teachers who taught at a school that administered the Science Texas Assessment on Knowledge and Skills (Science TAKS), the state standardized exam in science, at grade 11 and student performance on a state standardized exam in science administered in grade…
ERIC Educational Resources Information Center
Dadgar, Mina; Weiss, Madeline Joy
2012-01-01
This study provides one of the first estimates of the returns to different types of community college credentials--short-term certificates, long-term certificates, and associate degrees--across different fields of study. We exploit a rich dataset that includes matched, longitudinal college transcripts and Unemployment Insurance records for…
ERIC Educational Resources Information Center
Saunders, Cindy Franklin
2012-01-01
Purpose: The purpose of this study was to describe the advising approaches and the training received by academic advisors to form an advisory working alliance with adult master's-level credential candidates in educator preparation programs at regional campuses in Southern and Central California. This advisory working alliance concept includes: (a)…
ECO TECH LINK: PT3 Grant Builds Technology Circles in the K-18 Community.
ERIC Educational Resources Information Center
Klinger, Katie; Duckett, Jane; Medrano, Maria; Crow, Nedra; Stowers, Gwen
Through the vehicle of the PT3 grant program, ECO TECH LINK has built a strong consortium to support technology circles of government, education and business in order to raise student achievement scores, shorten the time it takes to earn a teaching credential, and enhance the quality of teacher credential courses. The ECO TECH LINK grant enables…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fields, C.A.
1994-09-01
This Report concludes the DOE Human Genome Program project, ``Identification of Genes in Anonymous DNA Sequence.`` The central goals of this project have been (1) understanding the problem of identifying genes in anonymous sequences, and (2) development of tools, primarily the automated identification system gm, for identifying genes. The activities supported under the previous award are summarized here to provide a single complete report on the activities supported as part of the project from its inception to its completion.
Digital Badge Systems: The Promise and Potential
ERIC Educational Resources Information Center
Thigpen, Kamila
2014-01-01
Digital badges--defined as digital credentials that convey an array of skills, interests, and achievements--are steadily growing in acceptance as a way to validate learning that takes place not only in school but also at home and in a number of other out-of-school settings. This report builds on the growing body of literature about digital badge…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
... INFORMATION: I. Background The NPDB was established by Title IV of Public Law 99-660, the Health Care Quality... a comprehensive review of health care practitioners' professional credentials. Section 1128E of the..., (Pub. L. 104-191), created the Health Care Integrity and Protection Data Bank (HIPDB). Because a major...
ERIC Educational Resources Information Center
Harmon, Tim; Cielinski, Anna
2014-01-01
In an economy that increasingly demands postsecondary credentials to access high-paying jobs with the potential for career advancement, students need comprehensive and reliable information to make better college and career choices. This need has prompted a vigorous national dialogue about the best way to provide information on the performance of…
ERIC Educational Resources Information Center
Offenstein, Jeremy; Shulock, Nancy
2010-01-01
As educators, government officials, and foundations leaders have embraced the agenda of dramatically increasing college success and credential completion, they have come to understand the need for better data on student outcomes to guide the improvement efforts of institutions, systems, and states. The data on degree completion and other final…
Higher Education Policy and Legitimacy Building: The Making of a New Academic Credential in Ontario
ERIC Educational Resources Information Center
Hurley, Peter; Sa, Creso M.
2013-01-01
Canada's province of Ontario introduced a new policy in 2000 allowing community colleges to offer a new type of undergraduate degree. This decision was a significant policy change for the government considering the nature of Ontario's binary system, where a rigid separation has historically prevailed between the university and college sectors.…
State Disinvestment in Higher Education Has Led to an Explosion of Student-Loan Debt
ERIC Educational Resources Information Center
Baylor, Elizabeth
2014-01-01
Earning a college degree or credential can be life changing and economically sustaining. That is why it is critically important that America's system of public colleges remain affordable for all Americans. However, Center for American Progress (CAP) analysis estimates that annual student-loan borrowing increased by $17 billion in the five years…
Edge-Enabled Tactical Systems (Poster)
2014-10-23
Recently added capabilities allow fine grained network and data optimization in Disconnected, Intermittent, Low-Bandwidth (DIL) environments by...Research Focus Establishing Trusted Identities in Disconnected Tactical Environments We will develop trusted identity solutions that work within the...constraints of DIL environments in which there is no consistent access to third-party online trusted authorities that validate the credentials of
ERIC Educational Resources Information Center
Mallett, Christopher
2016-01-01
The American public's interests are well-served by a strong, effective postsecondary education system. And yet the industry's predominant learning and service paradigm, one that credentials learning by measuring student's time on task and that treats all learners largely the same from a pacing and a requirements perspective is inconsistent with…
ERIC Educational Resources Information Center
Mac Iver, Martha Abele; Vaughn, E. Sidney, III
2007-01-01
This study compares the retention rates of urban teachers in the Baltimore City Public School System who were recruited through a federal program called Teach for America (TFA) and selected alternative certification programs, with those of certified teachers and teachers who do not possess regular teaching credentials. The authors researched…
ERIC Educational Resources Information Center
Tomlinson, Michael
2008-01-01
The UK Government is calling upon higher education students to see their learning as an investment that will give them direct benefits in the labour market. At the same time, the relationship between educational credentials and their returns in labour market has been changing in recent times. Based on a qualitative study with 53 final-year…
ERIC Educational Resources Information Center
La Belle, Thomas J.
2004-01-01
The article argues that the time has come to change California's 1960 Master Plan for higher education by permitting the California State University (CSU) to award the doctorate in selected professional programs. The article also addresses the inadequacies of the joint doctorate as the means to remedy degree or credential creep; the CSU's focus on…
Current Opinion on Catheter-based Hemorrhage Control in Trauma Patients
2014-01-01
catheter-based interventions. Similar guidelines for competency/credentialing of practitioners to per- form endovascular stent grafting of the thoracic...practitioners to perform endovascular stent -grafting of the thoracic aorta. J Thorac Cardiovasc Surg. 2006;131: 530 532. 30. Rosenfield KM. Clinical...competence statement on carotid stenting : train- ing and credentialing for carotid stenting multispecialty consensus rec- ommendations. J Vasc Surg. 2005;41
ERIC Educational Resources Information Center
Torrez, Nena
This paper discusses development of the Crosscultural, Language, and Academic Development (CLAD) credential in California's preservice teacher education. CLAD focuses on first and second language development, educational equity, linguistic and cultural diversity, equal access to core curriculum, respect for cultural and linguistic issues,…
Health Coaching: An Update on the National Consortium for Credentialing of Health & Wellness Coaches
2015-01-01
In September 2014, Global Advances in Health and Medicine editor Michele Mittelman, RN, MPH, interviewed four of the leaders in health and wellness coaching about trends in coaching and the progress of the National Consortium for Credentialing of Health & Wellness Coaches. Following are the transcripts of those interviews. Additionally, videos of the interviews are available at www.gahmj.com. PMID:25694854
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gondi, Vinai, E-mail: vgondi@chicagocancer.org; University of Wisconsin School of Medicine & Public Health, Madison, Wisconsin; Cui, Yunfeng
2015-03-01
Purpose: RTOG 0933 was a phase II trial of hippocampal avoidance during whole brain radiation therapy for patients with brain metastases. The results demonstrated improvement in short-term memory decline, as compared with historical control individuals, and preservation of quality of life. Integral to the conduct of this trial were quality assurance processes inclusive of pre-enrollment credentialing and pretreatment centralized review of enrolled patients. Methods and Materials: Before enrolling patients, all treating physicians and sites were required to successfully complete a “dry-run” credentialing test. The treating physicians were credentialed based on accuracy of magnetic resonance imaging–computed tomography image fusion and hippocampal andmore » normal tissue contouring, and the sites were credentialed based on protocol-specified dosimetric criteria. Using the same criteria, pretreatment centralized review of enrolled patients was conducted. Physicians enrolling 3 consecutive patients without unacceptable deviations were permitted to enroll further patients without pretreatment review, although their cases were reviewed after treatment. Results: In all, 113 physicians and 84 sites were credentialed. Eight physicians (6.8%) failed hippocampal contouring on the first attempt; 3 were approved on the second attempt. Eight sites (9.5%) failed intensity modulated radiation therapy planning on the first attempt; all were approved on the second attempt. One hundred thirteen patients were enrolled in RTOG 0933; 100 were analyzable. Eighty-seven cases were reviewed before treatment; 5 (5.7%) violated the eligibility criteria, and 21 (24%) had unacceptable deviations. With feedback, 18 cases were approved on the second attempt and 2 cases on the third attempt. One patient was treated off protocol. Twenty-two cases were reviewed after treatment; 1 (4.5%) violated the eligibility criteria, and 5 (23%) had unacceptable deviations. Conclusions: Although >95% of the cases passed the pre-enrollment credentialing, the pretreatment centralized review disqualified 5.7% of reviewed cases, prevented unacceptable deviations in 24% of reviewed cases, and limited the final unacceptable deviation rate to 5%. Thus, pretreatment review is deemed necessary in future hippocampal avoidance trials and is potentially useful in other similarly challenging radiation therapy technique trials.« less
Legal Medicine Information System using CDISC ODM.
Kiuchi, Takahiro; Yoshida, Ken-ichi; Kotani, Hirokazu; Tamaki, Keiji; Nagai, Hisashi; Harada, Kazuki; Ishikawa, Hirono
2013-11-01
We have developed a new database system for forensic autopsies, called the Legal Medicine Information System, using the Clinical Data Interchange Standards Consortium (CDISC) Operational Data Model (ODM). This system comprises two subsystems, namely the Institutional Database System (IDS) located in each institute and containing personal information, and the Central Anonymous Database System (CADS) located in the University Hospital Medical Information Network Center containing only anonymous information. CDISC ODM is used as the data transfer protocol between the two subsystems. Using the IDS, forensic pathologists and other staff can register and search for institutional autopsy information, print death certificates, and extract data for statistical analysis. They can also submit anonymous autopsy information to the CADS semi-automatically. This reduces the burden of double data entry, the time-lag of central data collection, and anxiety regarding legal and ethical issues. Using the CADS, various studies on the causes of death can be conducted quickly and easily, and the results can be used to prevent similar accidents, diseases, and abuse. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Denny, Joshua C.; Haines, Jonathan L.; Roden, Dan M.; Malin, Bradley A.
2014-01-01
Objective Electronic medical records (EMRs) data is increasingly incorporated into genome-phenome association studies. Investigators hope to share data, but there are concerns it may be “re-identified” through the exploitation of various features, such as combinations of standardized clinical codes. Formal anonymization algorithms (e.g., k-anonymization) can prevent such violations, but prior studies suggest that the size of the population available for anonymization may influence the utility of the resulting data. We systematically investigate this issue using a large-scale biorepository and EMR system through which we evaluate the ability of researchers to learn from anonymized data for genome- phenome association studies under various conditions. Methods We use a k-anonymization strategy to simulate a data protection process (on data sets containing clinical codes) for resources of similar size to those found at nine academic medical institutions within the United States. Following the protection process, we replicate an existing genome-phenome association study and compare the discoveries using the protected data and the original data through the correlation (r2) of the p-values of association significance. Results Our investigation shows that anonymizing an entire dataset with respect to the population from which it is derived yields significantly more utility than small study-specific datasets anonymized unto themselves. When evaluated using the correlation of genome-phenome association strengths on anonymized data versus original data, all nine simulated sites, results from largest-scale anonymizations (population ∼ 100;000) retained better utility to those on smaller sizes (population ∼ 6000—75;000). We observed a general trend of increasing r2 for larger data set sizes: r2 = 0.9481 for small-sized datasets, r2 = 0.9493 for moderately-sized datasets, r2 = 0.9934 for large-sized datasets. Conclusions This research implies that regardless of the overall size of an institution's data, there may be significant benefits to anonymization of the entire EMR, even if the institution is planning on releasing only data about a specific cohort of patients. PMID:25038554
Malek-Ahmadi, Michael; Erickson, Tom; Puente, Antonio E; Pliskin, Neil; Rock, Rachel
2012-01-01
In recent years, the National Academy of Neuropsychology and other professional neuropsychological organizations have published a number of articles and position papers regarding the use, education, and training of psychometrists ("technicians"). Although these documents provide guidelines for the suggested qualifications and training procedures of psychometrists, none make any mention of the need for a standardized credentialing process, which is commonly required of technicians in similar fields, especially in medical settings. Given the recent changes in current procedural Terminology codes used to bill for neuropsychological services and the interpretation of legislation disallowing the use of psychometrists in New York, the need for a standard credential for psychometrists is apparent. This article will review the history and current use of psychometrists in clinical neuropsychology and highlight the need and rationale for the credentialing of psychometrists.
Data Retention and Anonymity Services
NASA Astrophysics Data System (ADS)
Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.
gLExec: gluing grid computing to the Unix world
NASA Astrophysics Data System (ADS)
Groep, D.; Koeroo, O.; Venekamp, G.
2008-07-01
The majority of compute resources in todays scientific grids are based on Unix and Unix-like operating systems. In this world, user and user-group management are based around the concepts of a numeric 'user ID' and 'group ID' that are local to the resource. In contrast, grid concepts of user and group management are centered around globally assigned identifiers and VO membership, structures that are independent of any specific resource. At the fabric boundary, these 'grid identities' have to be translated to Unix user IDs. New job submission methodologies, such as job-execution web services, community-deployed local schedulers, and the late binding of user jobs in a grid-wide overlay network of 'pilot jobs', push this fabric boundary ever further down into the resource. gLExec, a light-weight (and thereby auditable) credential mapping and authorization system, addresses these issues. It can be run both on fabric boundary, as part of an execution web service, and on the worker node in a late-binding scenario. In this contribution we describe the rationale for gLExec, how it interacts with the site authorization and credential mapping frameworks such as LCAS, LCMAPS and GUMS, and how it can be used to improve site control and traceability in a pilot-job system.
Schmidt, Harald; Callier, Shawneequa
2012-05-01
So-called 'anonymous' tissue samples are widely used in research. Because they lack externally identifying information, they are viewed as useful in reconciling conflicts between the control, privacy and confidentiality interests of those from whom the samples originated and the public (or commercial) interest in carrying out research, as reflected in 'consent or anonymise' policies. High level guidance documents suggest that withdrawal of consent and samples and the provision of feedback are impossible in the case of anonymous samples. In view of recent developments in science and consumer-driven genomics the authors argue that such statements are misleading and only muddle complex ethical questions about possible entitlements to control over samples. The authors therefore propose that terms such as 'anonymised', 'anonymous' or 'non-identifiable' be removed entirely from documents describing research samples, especially from those aimed at the public. This is necessary as a matter of conceptual clarity and because failure to do so may jeopardise public trust in the governance of large scale databases. As there is wide variation in the taxonomy for tissue samples and no uniform national or international standards, the authors propose that a numeral-based universal coding system be implemented that focuses on specifying incremental levels of identifiability, rather than use terms that imply that the reidentification of research samples and associated actions are categorically impossible.
A De-Identification Pipeline for Ultrasound Medical Images in DICOM Format.
Monteiro, Eriksson; Costa, Carlos; Oliveira, José Luís
2017-05-01
Clinical data sharing between healthcare institutions, and between practitioners is often hindered by privacy protection requirements. This problem is critical in collaborative scenarios where data sharing is fundamental for establishing a workflow among parties. The anonymization of patient information burned in DICOM images requires elaborate processes somewhat more complex than simple de-identification of textual information. Usually, before sharing, there is a need for manual removal of specific areas containing sensitive information in the images. In this paper, we present a pipeline for ultrasound medical image de-identification, provided as a free anonymization REST service for medical image applications, and a Software-as-a-Service to streamline automatic de-identification of medical images, which is freely available for end-users. The proposed approach applies image processing functions and machine-learning models to bring about an automatic system to anonymize medical images. To perform character recognition, we evaluated several machine-learning models, being Convolutional Neural Networks (CNN) selected as the best approach. For accessing the system quality, 500 processed images were manually inspected showing an anonymization rate of 89.2%. The tool can be accessed at https://bioinformatics.ua.pt/dicom/anonymizer and it is available with the most recent version of Google Chrome, Mozilla Firefox and Safari. A Docker image containing the proposed service is also publicly available for the community.
ERIC Educational Resources Information Center
Office of Postsecondary Education, US Department of Education, 2011
2011-01-01
This eighth report on the features of America's teacher preparation and initial state credentialing presents data states reported to the U.S. Department of Education (Department) in October 2008, October 2009 and October 2010. Title II of the Higher Education Act (HEA) of 1965, as amended in 2008 by the Higher Education Opportunity Act (HEOA),…
ERIC Educational Resources Information Center
Naylor, Michele
The perceptions of human resource (HR) managers and information technology (IT) professionals regarding the influence of industry-sponsored credentials (ISCs) on recruitment, training, career development, and selected organizational outcomes were examined. Data were collected from 33 (66%) of 50 HR executives surveyed and from a Web-based survey…
ERIC Educational Resources Information Center
Nicholson, Julie; Lin, Betty; Maniates, Helen; Woolley, Ristyn; Groves, Michelle Grant; Engdahl, Eric
2018-01-01
This study examines how, if at all, multiple subjects and administrative services credential preparation programs are changing in response to California's newest grade, Transitional Kindergarten (TK). We analyzed interviews from university faculty in early childhood education and credential programs in five institutions of higher education and…
Robotics in otolaryngology and head and neck surgery: Recommendations for training and credentialing
Gross, Neil D.; Holsinger, F. Christopher; Magnuson, J. Scott; Duvvuri, Umamaheswar; Genden, Eric M.; Ghanem, Tamer AH.; Yaremchuk, Kathleen L.; Goldenberg, David; Miller, Matthew C.; Moore, Eric J.; Morris, Luc GT.; Netterville, James; Weinstein, Gregory S.; Richmon, Jeremy
2016-01-01
Training and credentialing for robotic surgery in otolaryngology - head and neck surgery is currently not standardized, but rather relies heavily on industry guidance. This manuscript represents a comprehensive review of this increasingly important topic and outlines clear recommendations to better standardize the practice. The recommendations provided can be used as a reference by individuals and institutions alike, and are expected to evolve over time. PMID:26950771
ERIC Educational Resources Information Center
Akbari, Ather H.; Aydede, Yigit
2013-01-01
For the past two decades, most immigrants who arrived in the advanced nations of the western world originated in less advanced countries of the third world. One of the main barriers to their economic integration, as viewed in the public circles of host nations, is the lack of recognition of their educational credentials based on which the…
Credentialing of Physicians in the Army.
1984-05-21
unqualified , inexperienced or reckless."l2 There are many other legal decisions which have impacted on medical credentials, but their impact is clear...of a physician in good standing. The professional qualifications require: (1) a medical degree (either a Doctor of Medicine (MD) or a Doctor of...is a process to specifically define areas of medical practice to include specific modalities of care which a medical treat- ment facility (WI?) grants
ERIC Educational Resources Information Center
Klein-Collins, Rebecca
2012-01-01
Today the U.S. higher education system is facing a crisis regarding its perceived quality. One model for improving quality is competency-based education, in which an institution clearly defines the specific competencies expected of its graduates. A key challenge is how to help more people, particularly adults, succeed at the post¬secondary level…
ERIC Educational Resources Information Center
Bailey, Thomas; Kienzl, Gregory; Marcotte, David
2004-01-01
Technological changes in the workplace have placed considerable pressure on the U.S. educational system to prepare students for increasingly skillbased occupations. Employers reward new hires for having the skills or credentials needed for their job, underscoring the importance of having either the requisite "tools in your toolbox," or some basic…
ERIC Educational Resources Information Center
Mak, Barley
2016-01-01
Entry to the teaching career in most education systems nowadays is based on academic qualifications and professional credentials. The requirements and trainings for teachers of English vary in different regions and countries. This short review presents the professional preparation of pre-service teachers of English and the English language…
ERIC Educational Resources Information Center
Pace, Lillian; Worthen, Maria
2014-01-01
This paper provides a vision and set of policy recommendations to help federal, state, and local leaders develop the workforce necessary to support teaching and learning in a competency-based K-12 education system. Part One, Pre-service and Credentialing for K-12 Competency-Based Learning Environments, provides policymakers with a framework and…
ERIC Educational Resources Information Center
Freedberg, Louis; Rice, Stephanie
2014-01-01
Despite the fundamentally important role of teachers in our public school system, how they are prepared is receiving far less attention than other current reforms, such as the Common Core State Standards, the Local Control Funding Formula, and new ways to assess and hold schools accountable for student performance. It has been more than 15 years…
Allegrante, John P; Barry, Margaret M; Airhihenbuwa, Collins O; Auld, M Elaine; Collins, Janet L; Lamarre, Marie-Claude; Magnusson, Gudjon; McQueen, David V; Mittelmark, Maurice B
2009-06-01
This paper reports the outcome of the Galway Consensus Conference, an effort undertaken as a first step toward international collaboration on credentialing in health promotion and health education. Twenty-nine leading authorities in health promotion, health education, and public health convened a 2-day meeting in Galway, Ireland, during which the available evidence on credentialing in health promotion was reviewed and discussed. Conference participants reached agreement on core values and principles, a common definition, and eight domains of core competency required to engage in effective health promotion practice. The domains of competency are catalyzing change, leadership, assessment, planning, implementation, evaluation, advocacy, and partnerships. The long-term aim of this work is to stimulate a global dialogue that will lead to the development and widespread adoption of standards and quality assurance systems in all countries to strengthen capacity in health promotion, a critical element in achieving goals for the improvement of global population health.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Grant, Mary Jo C; Larsen, Gitte Y
2007-01-01
Adverse event reporting is a key element for improving patient safety. This study describes a new voluntary, anonymous reporting system that facilitates reporting of near-miss and patient harm events and an assessment of patient harm by the bedside care provider in a pediatric intensive care unit. The results demonstrated the effectiveness of the Patient Safety Report as a method to capture near-miss and patient harm events.
A multi-institution evaluation of clinical profile anonymization
Heatherly, Raymond; Rasmussen, Luke V; Peissig, Peggy L; Pacheco, Jennifer A; Harris, Paul; Denny, Joshua C
2016-01-01
Background and objective: There is an increasing desire to share de-identified electronic health records (EHRs) for secondary uses, but there are concerns that clinical terms can be exploited to compromise patient identities. Anonymization algorithms mitigate such threats while enabling novel discoveries, but their evaluation has been limited to single institutions. Here, we study how an existing clinical profile anonymization fares at multiple medical centers. Methods: We apply a state-of-the-art k-anonymization algorithm, with k set to the standard value 5, to the International Classification of Disease, ninth edition codes for patients in a hypothyroidism association study at three medical centers: Marshfield Clinic, Northwestern University, and Vanderbilt University. We assess utility when anonymizing at three population levels: all patients in 1) the EHR system; 2) the biorepository; and 3) a hypothyroidism study. We evaluate utility using 1) changes to the number included in the dataset, 2) number of codes included, and 3) regions generalization and suppression were required. Results: Our findings yield several notable results. First, we show that anonymizing in the context of the entire EHR yields a significantly greater quantity of data by reducing the amount of generalized regions from ∼15% to ∼0.5%. Second, ∼70% of codes that needed generalization only generalized two or three codes in the largest anonymization. Conclusions: Sharing large volumes of clinical data in support of phenome-wide association studies is possible while safeguarding privacy to the underlying individuals. PMID:26567325
ERIC Educational Resources Information Center
Davis, Stephen H.; Leon, Ronald J.; Fultz, Miriam
2013-01-01
The purpose of this study was to examine the comparative influence of college administrator credential programs, on-the-job experiences, and the ISLLC Standards in the development of leadership expertise among urban public school principals. An exploratory, ex-post-facto research design used both quantitative and qualitative approaches. A survey…
Secondary Education Credentials: A Military Enlistment Policy Dilemma
1983-11-01
fall 1980 data from the National Center for Education Statistics , showing the enrollment rankings for church related schools to be: (1) Catholic, (2...34Unclassified 8ECURITY CLASSI•ICATION OP THIS PA•OEMn Data SnI..ed) Final Report HumIRRO FR.PRD.3.-22 Secondary Education Credentials: A Military...Commission of the States National Home Study Council* 11 •National Center for Education Statistics National Institute of Education 3 National Association of
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Select Committee on Aging.
An investigation of the employment of federal employees who obtained fradulent educational degrees and professional credentials was initiated by Congress and conducted by the Federal Bureau of Investigation (FBI) and the Postal Service. One diploma mill operation was using the mails to defraud (i.e., they took people's money without giving them…
2016-06-10
APMC, the individual? 4. How are providers notified of delinquencies in their credentialing packet? i.e. something expired or there is a pending...interviews, web site, and doctrine comparisons, very little variance in those areas provide minimal impact on the participation rate of providers in...are points of frustration for practitioners however, the impact that they have is mitigated by the redundancies and good communication between all
Point-of-care ultrasonography by pediatric emergency physicians. Policy statement.
Marin, Jennifer R; Lewiss, Resa E
2015-04-01
Point-of-care ultrasonography is increasingly being used to facilitate accurate and timely diagnoses and to guide procedures. It is important for pediatric emergency physicians caring for patients in the emergency department to receive adequate and continued point-of-care ultrasonography training for those indications used in their practice setting. Emergency departments should have credentialing and quality assurance programs. Pediatric emergency medicine fellowships should provide appropriate training to physician trainees. Hospitals should provide privileges to physicians who demonstrate competency in point-of-care ultrasonography. Ongoing research will provide the necessary measures to define the optimal training and competency assessment standards. Requirements for credentialing and hospital privileges will vary and will be specific to individual departments and hospitals. As more physicians are trained and more research is completed, there should be one national standard for credentialing and privileging in point-of-care ultrasonography for pediatric emergency physicians.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibbott, Geoffrey S.; Followill, David S.; Molineu, H. Andrea
The Radiological Physics Center (RPC) has functioned continuously for 38 years to assure the National Cancer Institute and the cooperative groups that institutions participating in multi-institutional trials can be expected to deliver radiation treatments that are clinically comparable to those delivered by other institutions in the cooperative groups. To accomplish this, the RPC monitors the machine output, the dosimetry data used by the institutions, the calculation algorithms used for treatment planning, and the institutions' quality control procedures. The methods of monitoring include on-site dosimetry review by an RPC physicist and a variety of remote audit tools. The introduction of advancedmore » technology clinical trials has prompted several study groups to require participating institutions and personnel to become credentialed, to ensure their familiarity and capability with techniques such as three-dimensional conformal radiotherapy, intensity-modulated radiotherapy, stereotactic body radiotherapy, and brachytherapy. The RPC conducts a variety of credentialing activities, beginning with questionnaires to evaluate an institution's understanding of the protocol and their capabilities. Treatment-planning benchmarks are used to allow the institution to demonstrate their planning ability and to facilitate a review of the accuracy of treatment-planning systems under relevant conditions. The RPC also provides mailable anthropomorphic phantoms to verify tumor dose delivery for special treatment techniques. While conducting these reviews, the RPC has amassed a large amount of data describing the dosimetry at participating institutions. Representative data from the monitoring programs are discussed, and examples are presented of specific instances in which the RPC contributed to the discovery and resolution of dosimetry errors.« less
Can anonymous posters on medical forums be reidentified?
Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan
2013-10-03
Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being determined.
ERIC Educational Resources Information Center
Giegerich, Steve
2010-01-01
Today, the United States spends about twice as much on higher education as the average developed nation, but many other countries are doing a better job of graduating more students at substantially lower expense. To provide more high-quality degrees and credentials at lower cost, colleges and universities must become high-performing institutions.…
Becker, Ellen A; Nguyen, Xuan T
2014-12-01
Transitioning from an associate degree to a baccalaureate degree for respiratory therapists has been suggested as a new entry-level educational standard. One potential risk for this change is that it may limit the diversity of potential applicants for entry-level education. A diverse workforce is important to achieve the goal of reducing healthcare disparities. This study evaluated characteristics of therapists who completed associate and baccalaureate degree entry-level education. A secondary analysis of data collected from the 2009 AARC Respiratory Therapist Human Resource Survey explored relationships between the choice of entry-level associate or baccalaureate education and variables of gender, race, salary, career advancement, and job satisfaction. There were no differences between therapists with entry-level associate and baccalaureate degrees in gender, race, number of additional healthcare credentials, numbers of life support credentials, wages, delivering respiratory care by protocol, and job satisfaction. There were significantly higher percentages of advanced academic degrees, desire to pursue a higher academic degree, registered respiratory therapist credentials, total National Board for Respiratory Care credentials, and leadership roles for therapists with baccalaureate entry-level degrees. Current entry-level associate and baccalaureate degree graduates have similar gender and race proportions. This finding challenges concerns that an entry-level baccalaureate degree would decrease the diversity of the respiratory therapist workforce. Copyright © 2014 by Daedalus Enterprises.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
Anonymous voting for multi-dimensional CV quantum system
NASA Astrophysics Data System (ADS)
Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee
2016-06-01
We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).
A multi-institution evaluation of clinical profile anonymization.
Heatherly, Raymond; Rasmussen, Luke V; Peissig, Peggy L; Pacheco, Jennifer A; Harris, Paul; Denny, Joshua C; Malin, Bradley A
2016-04-01
There is an increasing desire to share de-identified electronic health records (EHRs) for secondary uses, but there are concerns that clinical terms can be exploited to compromise patient identities. Anonymization algorithms mitigate such threats while enabling novel discoveries, but their evaluation has been limited to single institutions. Here, we study how an existing clinical profile anonymization fares at multiple medical centers. We apply a state-of-the-artk-anonymization algorithm, withkset to the standard value 5, to the International Classification of Disease, ninth edition codes for patients in a hypothyroidism association study at three medical centers: Marshfield Clinic, Northwestern University, and Vanderbilt University. We assess utility when anonymizing at three population levels: all patients in 1) the EHR system; 2) the biorepository; and 3) a hypothyroidism study. We evaluate utility using 1) changes to the number included in the dataset, 2) number of codes included, and 3) regions generalization and suppression were required. Our findings yield several notable results. First, we show that anonymizing in the context of the entire EHR yields a significantly greater quantity of data by reducing the amount of generalized regions from ∼15% to ∼0.5%. Second, ∼70% of codes that needed generalization only generalized two or three codes in the largest anonymization. Sharing large volumes of clinical data in support of phenome-wide association studies is possible while safeguarding privacy to the underlying individuals. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
NASA Astrophysics Data System (ADS)
Wilkerson, Teresa
The researcher developed this study based on the Hardgrave, et al. (1993) statement that for a doctoral student, it was "more than just standardized scores, previous academic performance, and past work experience [that] ultimately affects whether the candidate will be successful in the program" (p. 261). This study examined both the subjective and quantifiable aspects of application materials to a physics doctoral program to explore potential relationships between the credentials presented in the application and the ultimate success of the admitted students. The researcher developed questions with the goals of addressing the problem of attrition in doctoral programs and gaining a better of understanding the information provided in students' application packets. The researcher defined success as either enrolled four years after admission or attainment of the degree. This study examined the records of a population of students admitted to a physics doctoral program from the fall of 1997 to the fall of 2003 to determine their level of success as of August 2006. An exploratory analysis of the data provided answers to each of the research questions as well as an extensive understanding of the students admitted into the program during this time. This study examined both admission credentials and constructs identified by past researchers. An evaluation of the data gathered in this research revealed no relationships between these and student success as previously defined. In 1974, Willingham stated simply, "the best way to improve selection of graduate students will be to develop improved criteria for success" (p. 278). To this end, recommendations emerged regarding the decision-making process and suggestions for future research. This study was not developed to prove or disprove past research findings that predicted success from admissions information; rather, the researcher developed this study to explore each of the credentials that a student presents with his or her application packet, and to tell the story about the nuances of these credentials as they related to student success in a physics doctoral program.
Kokkinen, Lauri; Muntaner, Carles; Kouvonen, Anne; Koskinen, Aki; Varje, Pekka; Väänänen, Ari
2015-01-01
Objectives Epidemiological studies have shown an association between educational credentials and mental disorders, but have not offered any explanation for the varying strength of this association in different historical contexts. In this study, we investigate the education-specific trends in hospitalisation due to psychiatric disorders in Finnish working-age men and women between 1976 and 2010, and offer a welfare state explanation for the secular trends found. Setting Population-based setting with a 25% random sample of the population aged 30–65 years in 7 independent consecutive cohorts (1976–1980, 1981–1985, 1986–1990, 1991–1995, 1996–2000, 2001–2005, 2006–2010). Participants Participants were randomly selected from the Statistics Finland population database (n=2 865 746). These data were linked to diagnosis-specific records on hospitalisations, drawn from the National Hospital Discharge Registry using personal identification numbers. Employment rates by educational credentials were drawn from the Statistics Finland employment database. Primary and secondary outcome measures Hospitalisation and employment. Results We found an increasing trend in psychiatric hospitalisation rates among the population with only an elementary school education, and a decreasing trend in those with higher educational credentials. The employment rate of the population with only an elementary school education decreased more than that of those with higher educational credentials. Conclusions We propose that restricted employment opportunities are the main mechanism behind the increased educational inequality in hospitalisation for psychiatric disorders, while several secondary mechanisms (lack of outpatient healthcare services, welfare cuts, decreased alcohol duty) further accelerated the diverging long-term trends. All of these inequality-increasing mechanisms were activated by welfare state retrenchment, which included the liberalisation of financial markets and labour markets, severe austerity measures and narrowing down of public sector employment commitment. PMID:26041491
Privacy-Aware Location Database Service for Granular Queries
NASA Astrophysics Data System (ADS)
Kiyomoto, Shinsaku; Martin, Keith M.; Fukushima, Kazuhide
Future mobile markets are expected to increasingly embrace location-based services. This paper presents a new system architecture for location-based services, which consists of a location database and distributed location anonymizers. The service is privacy-aware in the sense that the location database always maintains a degree of anonymity. The location database service permits three different levels of query and can thus be used to implement a wide range of location-based services. Furthermore, the architecture is scalable and employs simple functions that are similar to those found in general database systems.
Salmon, Margaret; Landes, Megan; Hunchak, Cheryl; Paluku, Justin; Malemo Kalisya, Luc; Salmon, Christian; Muller, Mundenga Mutendi; Wachira, Benjamin; Mangan, James; Chhaganlal, Kajal; Kalanzi, Joseph; Azazh, Aklilu; Berman, Sara; Zied, El-Sayed; Lamprecht, Hein
2017-02-01
Significant evidence identifies point-of-care ultrasound (PoCUS) as an important diagnostic and therapeutic tool in resource-limited settings. Despite this evidence, local health care providers on the African continent continue to have limited access to and use of ultrasound, even in potentially high-impact fields such as obstetrics and trauma. Dedicated postgraduate emergency medicine residency training programs now exist in 8 countries, yet no current consensus exists in regard to core PoCUS competencies. The current practice of transferring resource-rich PoCUS curricula and delivery methods to resource-limited health systems fails to acknowledge the unique challenges, needs, and disease burdens of recipient systems. As emergency medicine leaders from 8 African countries, we introduce a practical algorithmic approach, based on the local epidemiology and resource constraints, to curriculum development and implementation. We describe an organizational structure composed of nexus learning centers for PoCUS learners and champions on the continent to keep credentialing rigorous and standardized. Finally, we put forth 5 key strategic considerations: to link training programs to hospital systems, to prioritize longitudinal learning models, to share resources to promote health equity, to maximize access, and to develop a regional consensus on training standards and credentialing. Copyright © 2016 American College of Emergency Physicians. Published by Elsevier Inc. All rights reserved.
A data recipient centered de-identification method to retain statistical attributes.
Gal, Tamas S; Tucker, Thomas C; Gangopadhyay, Aryya; Chen, Zhiyuan
2014-08-01
Privacy has always been a great concern of patients and medical service providers. As a result of the recent advances in information technology and the government's push for the use of Electronic Health Record (EHR) systems, a large amount of medical data is collected and stored electronically. This data needs to be made available for analysis but at the same time patient privacy has to be protected through de-identification. Although biomedical researchers often describe their research plans when they request anonymized data, most existing anonymization methods do not use this information when de-identifying the data. As a result, the anonymized data may not be useful for the planned research project. This paper proposes a data recipient centered approach to tailor the de-identification method based on input from the recipient of the data. We demonstrate our approach through an anonymization project for biomedical researchers with specific goals to improve the utility of the anonymized data for statistical models used for their research project. The selected algorithm improves a privacy protection method called Condensation by Aggarwal et al. Our methods were tested and validated on real cancer surveillance data provided by the Kentucky Cancer Registry. Copyright © 2014 Elsevier Inc. All rights reserved.
2016-10-01
Section 2015 of Title 10 directed DOD to carry out a program to enable servicemembers to obtain professional credentials related to their military...which amended 10 U.S.C. § 2015 to require DOD to carry out a program to enable members of the armed forces to obtain, while serving in the armed...Internal Control in the Federal Government, GAO-14-704G (Washington, D.C.: Sept. 10 , 2014). 6See GAO, Tax Administration: IRS Needs to Further Refine
A Secure Authenticated Key Exchange Protocol for Credential Services
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Privacy preserving data anonymization of spontaneous ADE reporting system dataset.
Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng
2016-07-18
To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three different threshold settings for sensitive value, our method can successively prevent the disclosure of sensitive values (nearly all observed DRs are zeros) without sacrificing too much of data utility. With non-uniform threshold setting, level-wise or frequency-based, our MS(k, θ (*))-bounding exhibits the best data utility and the least privacy risk among all the models. The experiments conducted on selected ADR signals from MedWatch show that only very small difference on signal strength (PRR or ROR) were observed. The results show that our method can effectively prevent the disclosure of patient sensitive information without sacrificing data utility for ADR signal detection. We propose a new privacy model for protecting SRS data that possess some characteristics overlooked by contemporary models and an anonymization algorithm to sanitize SRS data in accordance with the proposed model. Empirical evaluation on the real SRS dataset, i.e., FAERS, shows that our method can effectively solve the privacy problem in SRS data without influencing the ADR signal strength.
From Legion to Avaki: The Persistence of Vision
2006-01-01
person, but what component, is requesting an action. 5.3.1 Authentication Users authenticate themselves to a Legion grid with the login paradigm...password supplied during login is compared to the password in the state of the authentication object in order to permit or deny subsequent access to...In either case, the credential is protected by the security of the underlying operating system. Although login is the most commonly used method
ERIC Educational Resources Information Center
Young, Natalie A. E.
2018-01-01
International schools are commonly depicted in the academic literature and popular press as offering elite educational credentials to an elite, oftentimes international, student body. In this paper, I draw on a case study of a Canadian international school to argue that a new form of international school is emerging in China--one that offers a…
Haddad, Matthew
2009-01-01
An alarming number of practicing medical professionals and healthcare staffers across the nation may have criminal backgrounds, jeopardizing the health of hundreds of millions of patients and compromising the integrity of healthcare in this country. An investigation conducted by The Los Angeles Times found that an extraordinary number of nurses in California with criminal backgrounds had been allowed to continue working in healthcare facilities for years--their crimes virtually swept under the rug. This article suggests that continuous monitoring of healthcare credentials can mitigate the potential harm posed by credentialing fraud, recommending 24/7 monitoring in real-time as opposed to once every year or two as is the current practice. This would include verification of provider licenses, Drug Enforcement Administration certification, Office of Inspector General status, and criminal offenses. Automatic and continuous monitoring of licenses and other databases for changes and lapses, and reports on issues that are uncovered, help to prevent harmful acts on the part of healthcare providers with questionable backgrounds.
From a Trickle to a Flood: Active Attacks on Several Mix Types
2002-01-01
out potential weaknesses in existing designs, and suggest improvements. 1 Introduction Many modern anonymity systems are based on mixes. Chaum first...Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, pages 10–29, July 2000. 2. David ... Chaum . Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. 3. L. Cottrell. Mixmaster
Defining ’Anonymity’ in Networked Communication, Version 1
2011-12-01
conference that features many current works on anonymity [5]. 7. References [1] D . Chaum , “Security without Identification: Transaction Systems...to make Big Brother Obsolete,” Communications of the ACM 28:10 (1985), pp. 1030-1044. [2] D . Chaum , “The Dining Cryptographers Problem: Unconditional...Sender and Recipient Untraceability,” Journal of Cryptology 1:1 (1988), pp. 65-75. [3] D . Chaum , “Untraceable Electronic Mail, Return Addresses
Johnson, Sarah
2016-01-01
An anonymous hazard reporting hotline was established for doctors to use on two general medical wards at Weston General Hospital (WGH) in North Somerset in England during an eight day period in July/August 2014. Doctors were encouraged to report hazards and near misses or just start a conversation about a concern. The existing computer based significant event system remained alongside the hotline and was to be used where actual harm had come to a patient. A team of consultants and quality improvement administrators monitored the hotline on a daily basis, categorized the level of risk being reported and ensured, where possible, that action was taken to address the doctors' concerns. The hotline increased reporting rates from two per month to 25 in eight days. The system identified 13 amber (medium risk) and five red (high risk) hazards which would otherwise not have been known about. This author believes these five high risk reports alone make the case for a new, quicker, easier, and anonymous reporting system for doctors at WGH urgent and irrefutable.
Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.
Chapman, Teresa; Reid, Janet R; O'Conner, Erin E
2017-06-01
Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.
Precise definition of anonymization in genetic polymorphism studies.
Hamajima, Nobuyuki; Atsuta, Yoshiko; Niwa, Yoshimitsu; Nishio, Kazuko; Tanaka, Daisuke; Yamamoto, Kazuhito; Tamakoshi, Akiko
2004-01-01
Anonymization is an essential tool to protect privacy of participants in epidemiological studies. This paper classifies types of anonymization in genetic polymorphism studies, providing precise definitions. They are: 1) unlinkable anonymization at enrollment without a participant list; 2) unlinkable anonymization before genotyping with a participant list; 3) linkable anonymization; 4) unlinkable anonymization for outsiders; and 5) linkable anonymization for outsiders. The classification in view of accessibility to a table including genotype data with directly identifiable data such as names is important; if such tables exist, staff may obtain genotype information about participants. The first three modes are defined here as anonymization unaccessible to genotype data with directly identifiable information for research staff. Anonymization with a key code held by participants is possible with any of the above anonymization modes, by which participants can access to their own genotypes through telephone or internet. A guideline issued on March 29, 2001 with collaboration of three Ministries in Japan defines "anonymization in a linkable fashion" and "anonymization in an unlinkable fashion", "for the purpose of preventing the personal information from being divulged externally in violation of law, the present guidelines or a research protocol", but the contents are not clear in practice. The proposed definitions will be useful when we describe and discuss the preferable mode of anonymization for a given polymorphism study.
Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks
2017-01-01
In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities’ authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol. PMID:28946633
Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.
Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho
2017-09-23
In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.
An Anonymous Credit Card System
NASA Astrophysics Data System (ADS)
Androulaki, Elli; Bellovin, Steven
Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.
A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.
Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian
2016-01-01
Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.
New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
Wang, Chunzhi; Zhang, Yanmei
2015-11-01
Due to the development of information technologies and network technologies, healthcare systems have been employed in many countries. As an important part of healthcare systems, the wireless body area network (WBAN) could bring convenience to both patients and physicians because it could help physicians to monitor patients' physiological values remotely. It is essential to ensure secure communication in WBANs because patients' physiological values are very sensitive. Recently, Liu et al. proposed an efficient authentication scheme for WBANs. Unfortunately, Zhao pointed out that their scheme suffered from the stolen verifier-table attack. To improve security and efficiency, Zhao proposed an anonymous authentication scheme for WBANs. However, Zhao's scheme cannot provide real anonymity because the users' pseudo identities are constant value and the attack could tract the users. In this paper, we propose a new anonymous authentication scheme for WBANs. Security analysis shows that the proposed scheme could overcome weaknesses in previous scheme. We also use the BAN logic to demonstrate the security of the proposed scheme.
Anonymity-preserving Reputation Management System for health sector
Hamid, Zara; Abdul, Wadood; Ghouzali, Sanaa; Khan, Abid; Malik, Saif Ur Rehman; Shaukat Khan, Mansoor; Nawaz, Sarfraz
2018-01-01
In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme. PMID:29649267
Simulation: Moving from Technology Challenge to Human Factors Success
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gould, Derek A., E-mail: dgould@liv.ac.uk; Chalmers, Nicholas; Johnson, Sheena J.
2012-06-15
Recognition of the many limitations of traditional apprenticeship training is driving new approaches to learning medical procedural skills. Among simulation technologies and methods available today, computer-based systems are topical and bring the benefits of automated, repeatable, and reliable performance assessments. Human factors research is central to simulator model development that is relevant to real-world imaging-guided interventional tasks and to the credentialing programs in which it would be used.
Protecting Privacy Using k-Anonymity
El Emam, Khaled; Dankar, Fida Kamal
2008-01-01
Objective There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Design Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Measurement Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. Results For one of the re-identification scenarios, k-Anonymity consistently over-anonymizes data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions to the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline k-anonymity. Conclusion Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity. PMID:18579830
Kimura, Shinya; Sato, Toshihiko; Ikeda, Shunya; Noda, Mitsuhiko; Nakayama, Takeo
2010-01-01
Health insurance claims (ie, receipts) record patient health care treatments and expenses and, although created for the health care payment system, are potentially useful for research. Combining different types of receipts generated for the same patient would dramatically increase the utility of these receipts. However, technical problems, including standardization of disease names and classifications, and anonymous linkage of individual receipts, must be addressed. In collaboration with health insurance societies, all information from receipts (inpatient, outpatient, and pharmacy) was collected. To standardize disease names and classifications, we developed a computer-aided post-entry standardization method using a disease name dictionary based on International Classification of Diseases (ICD)-10 classifications. We also developed an anonymous linkage system by using an encryption code generated from a combination of hash values and stream ciphers. Using different sets of the original data (data set 1: insurance certificate number, name, and sex; data set 2: insurance certificate number, date of birth, and relationship status), we compared the percentage of successful record matches obtained by using data set 1 to generate key codes with the percentage obtained when both data sets were used. The dictionary's automatic conversion of disease names successfully standardized 98.1% of approximately 2 million new receipts entered into the database. The percentage of anonymous matches was higher for the combined data sets (98.0%) than for data set 1 (88.5%). The use of standardized disease classifications and anonymous record linkage substantially contributed to the construction of a large, chronologically organized database of receipts. This database is expected to aid in epidemiologic and health services research using receipt information.
Shaffer, Stephen M; Brismée, Jean-Michel; Courtney, Carol A; Sizer, Phillip S
2015-02-01
The purpose of this investigation was to establish a baseline of physical therapist education on temporomandibular disorders (TMD)-related topics during credentialed orthopedic manual physical therapy fellowship training and compare it to cervical spine disorders education. An online survey was distributed electronically to each fellowship program credentialed by the American Physical Therapy Association (APTA) and recognized by the Academy of Orthopedic Manual Physical Therapists (AAOMPT). Data were analyzed to compare overall exposure to TMD educational content, including a direct comparison of TMD and cervical spine disorders education. The response rate was 79%. Thirteen programs (87%) reported providing both didactic and clinical training on both TMD and cervical spine disorders. Didactic education for cervical spine disorders ranged from 16-20 hours to over 25 hours, whereas TMD hours ranged from 0 to 6-10 hours. Clinical education for cervical spine disorders ranged from 11-15 hours to over 25 hours, whereas TMD hours ranged from 0 to 6-10 hours. The number of hours of exposure during didactic training and the number of patients exposed to during clinical training were significantly different when comparing TMD to cervical spine disorders exposure (P<0.0001). The data indicate a lack of uniformity between credentialed fellowship programs in orthopedic manual physical therapy with respect to the extent to which programs expose trainees to evaluation and management of TMD. There is consistency in that all programs provided more training on cervical spine disorders than TMD. Despite a high level of clinical specialization, fellows-in-training receive minimal TMD education.
Do surgeon credentials affect the rate of incidental durotomy during spine surgery.
Murray, N J; Demetriades, A K; Rolton, D; Nnadi, C
2014-08-01
Incidental durotomy is a potential complication of spinal surgery which can cause a number of intra-operative and post-operative complications. The purpose of this study was to determine if the primary operator's credentials impacted on the incidence of durotomy intra-operatively. Prospectively collected data of operator credentials in relation to the incidence of durotomy were acquired from the International Eurospine Tango database. The significance of variability and risk factors between operators was measured using the Chi-squared test. Data from a total of 3,764 patients were captured from the Tango registry. Of these 162 (4.3%) had a durotomy. Of the total number of patients, the primary operator was neurosurgical in 1,369 (36.4%) cases; orthopaedic in 180 (4.8%) cases; other (pre-certification) in 236 (6.3%) cases; specialised spine surgeon in 1,741 (46.3%) cases; 6 cases had missing operator data. cerebrospinal fluid (CSF) leak occurred in 57 (4.16%) of neurosurgeon-operated cases; 5 (2.78%) orthopaedic-operated cases; 19 (4.06%) of other surgeon-operated cases; and 81 (4.65%) in specialised spine surgeon-operated cases. Using Chi-squared test, the significance of the variation in incidence of CSF leak between primary operator groups was not statistically significant (P = 0.1405). From the data captured and analysed, the rate of durotomy ranged from 2.78 to 4.65% between operator groups with a mean rate of 4.3%. The primary operator credentials do not appear to significantly impact the rate of durotomy in spine surgery.
NASA Astrophysics Data System (ADS)
Jonker, Hugo; Pieters, Wolter
According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks
Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon
2016-01-01
Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.
Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon
2016-11-01
Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users' network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders' or receivers' identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.
Open Course Ware, Distance Education, and 21st Century Geoscience Education
NASA Astrophysics Data System (ADS)
Connors, M. G.
2010-12-01
Open Course Ware (OCW) allows the highest quality educational materials (including videos of lectures from the best classroom lecturers) to find a wide audience. This audience may include many who wish to obtain credentials for formal study yet who are unable to be campus-based students. This opens a role for formal, credentialed and accredited distance education (DE) to efficiently integrate OCW into DE courses. OCW materials will in this manner be able to be used for education of credential-seeking students who would not otherwise benefit from them. Modern presentation methods using the Internet and video (including mobile device) technologies may offer pedagogical advantages over even traditional classroom learning. A detailed analysis of the development of Athabasca University’s PHYS 302 Vibrations and Waves course (based mainly on MIT’s OCW), and application of lessons learned to development of PHYS 305 Electromagnetism is presented. These courses are relevant to the study of geophysics, but examples of GEOL (Geology) courses will also be mentioned, along with an broad overview of OCW resources in Geoscience.
1996-01-01
These guidelines are an official statement of the American Speech-Language-Hearing Association. They provide guidance on the training, credentialing, use, and supervision of one category of support personnel in speech-language pathology: speech-language pathology assistants. Guidelines are not official standards of the Association. They were developed by the Task Force on Support Personnel: Dennis J. Arnst, Kenneth D. Barker, Ann Olsen Bird, Sheila Bridges, Linda S. DeYoung, Katherine Formichella, Nena M. Germany, Gilbert C. Hanke, Ann M. Horton, DeAnne M. Owre, Sidney L. Ramsey, Cathy A. Runnels, Brenda Terrell, Gerry W. Werven, Denise West, Patricia A. Mercaitis (consultant), Lisa C. O'Connor (consultant), Frederick T. Spahr (coordinator), Diane Paul-Brown (associate coordinator), Ann L. Carey (Executive Board liaison). The 1994 guidelines supersede the 1981 guidelines entitled, "Guidelines for the Employment and Utilization of Supportive Personnel" (Asha, March 1981, 165-169). Refer to the 1995 position statement on the "Training, Credentialing, Use, and Supervision of Support Personnel in Speech-Language Pathology" (Asha, 37 [Suppl. 14], 21).
NASA Astrophysics Data System (ADS)
Shi, Larry; Carbunar, Bogdan; Sion, Radu
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. Payers are able to remunerate payees for services that depend on future, yet to be determined outcomes of events. Once payment complete, any double-spending attempt by the payer will reveal its identity; no double-spending by the payee is possible. Payers can not be linked to payees or to ongoing or past transactions. The flow of cash within the system is thus both correct and anonymous. We discuss several applications of conditional e-cash including online trading of financial securities, prediction markets, and betting systems.
Location Privacy for Mobile Crowd Sensing through Population Mapping †
Shin, Minho; Cornelius, Cory; Kapadia, Apu; Triandopoulos, Nikos; Kotz, David
2015-01-01
Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensor-equipped vehicles to measure traffic or pollution levels on a particular street or users' mobile phones to locate (Bluetooth-enabled) objects in their vicinity. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk: even if identifying information has been removed from a report, the accompanying time and location can reveal sufficient information to de-anonymize the user whose device sent the report. We propose and evaluate a novel spatiotemporal blurring mechanism based on tessellation and clustering to protect users' privacy against the system while reporting context. Our technique employs a notion of probabilistic k-anonymity; it allows users to perform local blurring of reports efficiently without an online anonymization server before the data are sent to the system. The proposed scheme can control the degree of certainty in location privacy and the quality of reports through a system parameter. We outline the architecture and security properties of our approach and evaluate our tessellation and clustering algorithm against real mobility traces. PMID:26131676
Technology for Anonymity: Names By Other Nyms.
ERIC Educational Resources Information Center
Wayner, Peter
1999-01-01
Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…
Secure Information Sharing: Part I. Shaping Industry Interaction
2008-02-01
reduce costs and maximize return, continues to be a simple, core concept to competitive advantage . Defense AT&L: January-February 2008 38 New Supply...only government body to benefit . The British Ministry of Defence will also be using secure e-mail to send U.K.-restricted e-mail over the Internet...illustrates two major advantages of DSIF: First, there are no accounts for the BAE Systems users at LMCO, and there are no credentials that need to
An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health
Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Marín, Andrés; Arias, Patricia; Sanvido, Fabio
2012-01-01
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent—considered as a privacy rule in sensitive scenarios—has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism. PMID:22778634
An event driven hybrid identity management approach to privacy enhanced e-health.
Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Marín, Andrés; Arias, Patricia; Sanvido, Fabio
2012-01-01
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent--considered as a privacy rule in sensitive scenarios--has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism.
Bekelman, Justin E.; Deye, James A.; Vikram, Bhadrasain; Bentzen, Soren M.; Bruner, Deborah; Curran, Walter J.; Dignam, James; Efstathiou, Jason A.; FitzGerald, T. J.; Hurkmans, Coen; Ibbott, Geoffrey S.; Lee, J. Jack; Merchant, Timothy E.; Michalski, Jeff; Palta, Jatinder R.; Simon, Richard; Ten Haken, Randal K.; Timmerman, Robert; Tunis, Sean; Coleman, C. Norman; Purdy, James
2012-01-01
Background In the context of national calls for reorganizing cancer clinical trials, the National Cancer Institute (NCI) sponsored a two day workshop to examine the challenges and opportunities for optimizing radiotherapy quality assurance (QA) in clinical trial design. Methods Participants reviewed the current processes of clinical trial QA and noted the QA challenges presented by advanced technologies. Lessons learned from the radiotherapy QA programs of recent trials were discussed in detail. Four potential opportunities for optimizing radiotherapy QA were explored, including the use of normal tissue toxicity and tumor control metrics, biomarkers of radiation toxicity, new radiotherapy modalities like proton beam therapy, and the international harmonization of clinical trial QA. Results Four recommendations were made: 1) Develop a tiered (and more efficient) system for radiotherapy QA and tailor intensity of QA to clinical trial objectives. Tiers include (i) general credentialing, (ii) trial specific credentialing, and (iii) individual case review; 2) Establish a case QA repository; 3) Develop an evidence base for clinical trial QA and introduce innovative prospective trial designs to evaluate radiotherapy QA in clinical trials; and 4) Explore the feasibility of consolidating clinical trial QA in the United States. Conclusion Radiotherapy QA may impact clinical trial accrual, cost, outcomes and generalizability. To achieve maximum benefit, QA programs must become more efficient and evidence-based. PMID:22425219
History of the Medical Library Association's credentialing program.
Bell, J A
1996-01-01
Since the Medical Library Association (MLA) adopted the Code for the Training and Certification of Medical Librarians in 1949, MLA members have reviewed and revised the program regularly. This paper traces the history of MLA's professional recognition program to illustrate how the program has changed over time and to identify the issues that have surrounded it. These issues include the value of the program to individual members, cost to MLA, appropriate entry requirements, certification examinations, and recertification requirements. The development and operation of MLA's current credentialing program, the Academy of Health Information Professionals, is described in detail. PMID:8883980
Pronk, Mathilde C; Slaats, Dorthe; van der Pant, Karlijn A M I; Vervelde, Janneke; Dooper, Ine M; Dor, Frank J M F; Weimar, Willem; van de Wetering, Jacqueline; Zuidema, Willij C; Massey, Emma K
2017-12-01
Anonymity between living donors and recipients is a topic of discussion among transplant professionals. This longitudinal study explored living kidney donors' and patients' perspectives on anonymity. Prior to surgery (T0) and 3 months afterward (T1), participants in unspecified or specified indirect donation programs completed a questionnaire on their experiences with and attitudes toward anonymity as well as demographic and medical characteristics. Nonparametric tests were used to assess group differences and associations. Participants were content with anonymity at T0 and T1. Fourteen and 23% wanted to meet at T0 and T1, respectively. If the other party expressed the wish to meet, 50% (T0) and 55% (T1) would be willing to meet. Most participants agreed that meeting should be allowed if both parties agree. Attitude toward anonymity did not differ between donors/recipients, nor between T0/T1 and unspecified/specified indirect donation programs. This study showed that most donors and recipients who participated in anonymous donation schemes are in favor of a conditional approach to anonymity. Guidelines on how to revoke anonymity if both parties agree are needed and should include education about pros and cons of (non-) anonymity and a logistical plan on how, when, where, and by whom anonymity should be revoked. © 2017 Steunstichting ESOT.
Whitley, Edgar A; Lund, David; Kaye, Jane
2016-01-01
Background Electronic health records are widely acknowledged to provide an important opportunity to anonymize patient-level health care data and collate across populations to support research. Nonetheless, in the wake of public and policy concerns about security and inappropriate use of data, conventional approaches toward data governance may no longer be sufficient to respect and protect individual privacy. One proposed solution to improve transparency and public trust is known as Dynamic Consent, which uses information technology to facilitate a more explicit and accessible opportunity to opt out. In this case, patients can tailor preferences about whom they share their data with and can change their preferences reliably at any time. Furthermore, electronic systems provide opportunities for informing patients about data recipients and the results of research to which their data have contributed. Objective To explore patient perspectives on the use of anonymized health care data for research purposes. To evaluate patient perceptions of a Dynamic Consent model and electronic system to enable and implement ongoing communication and collaboration between patients and researchers. Methods A total of 26 qualitative interviews and three focus groups were conducted that included a video presentation explaining the reuse of anonymized electronic patient records for research. Slides and tablet devices were used to introduce the Dynamic Consent system for discussion. A total of 35 patients with chronic rheumatic disease with varying levels of illness and social deprivation were recruited from a rheumatology outpatient clinic; 5 participants were recruited from a patient and public involvement health research network. Results Patients were supportive of sharing their anonymized electronic patient record for research, but noted a lack of transparency and awareness around the use of data, making it difficult to secure public trust. While there were general concerns about detrimental consequences of data falling into the wrong hands, such as insurance companies, 39 out of 40 (98%) participants generally considered that the altruistic benefits of sharing health care data outweighed the risks. Views were mostly positive about the use of an electronic interface to enable greater control over consent choices, although some patients were happy to share their data without further engagement. Participants were particularly enthusiastic about the system as a means of enabling feedback regarding data recipients and associated research results, noting that this would improve trust and public engagement in research. This underlines the importance of patient and public involvement and engagement throughout the research process, including the reuse of anonymized health care data for research. More than half of patients found the touch screen interface easy to use, although a significant minority, especially those with limited access to technology, expressed some trepidation and felt they may need support to use the system. Conclusions Patients from a range of socioeconomic backgrounds viewed a digital system for Dynamic Consent positively, in particular, feedback about data recipients and research results. Implementation of a digital Dynamic Consent system would require careful interface design and would need to be located within a robust data infrastructure; it has the potential to improve trust and engagement in electronic medical record research. PMID:27083521
Spencer, Karen; Sanders, Caroline; Whitley, Edgar A; Lund, David; Kaye, Jane; Dixon, William Gregory
2016-04-15
Electronic health records are widely acknowledged to provide an important opportunity to anonymize patient-level health care data and collate across populations to support research. Nonetheless, in the wake of public and policy concerns about security and inappropriate use of data, conventional approaches toward data governance may no longer be sufficient to respect and protect individual privacy. One proposed solution to improve transparency and public trust is known as Dynamic Consent, which uses information technology to facilitate a more explicit and accessible opportunity to opt out. In this case, patients can tailor preferences about whom they share their data with and can change their preferences reliably at any time. Furthermore, electronic systems provide opportunities for informing patients about data recipients and the results of research to which their data have contributed. To explore patient perspectives on the use of anonymized health care data for research purposes. To evaluate patient perceptions of a Dynamic Consent model and electronic system to enable and implement ongoing communication and collaboration between patients and researchers. A total of 26 qualitative interviews and three focus groups were conducted that included a video presentation explaining the reuse of anonymized electronic patient records for research. Slides and tablet devices were used to introduce the Dynamic Consent system for discussion. A total of 35 patients with chronic rheumatic disease with varying levels of illness and social deprivation were recruited from a rheumatology outpatient clinic; 5 participants were recruited from a patient and public involvement health research network. Patients were supportive of sharing their anonymized electronic patient record for research, but noted a lack of transparency and awareness around the use of data, making it difficult to secure public trust. While there were general concerns about detrimental consequences of data falling into the wrong hands, such as insurance companies, 39 out of 40 (98%) participants generally considered that the altruistic benefits of sharing health care data outweighed the risks. Views were mostly positive about the use of an electronic interface to enable greater control over consent choices, although some patients were happy to share their data without further engagement. Participants were particularly enthusiastic about the system as a means of enabling feedback regarding data recipients and associated research results, noting that this would improve trust and public engagement in research. This underlines the importance of patient and public involvement and engagement throughout the research process, including the reuse of anonymized health care data for research. More than half of patients found the touch screen interface easy to use, although a significant minority, especially those with limited access to technology, expressed some trepidation and felt they may need support to use the system. Patients from a range of socioeconomic backgrounds viewed a digital system for Dynamic Consent positively, in particular, feedback about data recipients and research results. Implementation of a digital Dynamic Consent system would require careful interface design and would need to be located within a robust data infrastructure; it has the potential to improve trust and engagement in electronic medical record research.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.
This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not tomore » unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.« less
Utility-preserving anonymization for health data publishing.
Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn
2017-07-11
Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.
An Identity Based Key Exchange Protocol in Cloud Computing
NASA Astrophysics Data System (ADS)
Molli, Venkateswara Rao; Tiwary, Omkar Nath
2012-10-01
Workflow systems often use delegation to enhance the flexibility of authorization; delegation transfers privileges among users across different administrative domains and facilitates information sharing. We present an independently verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators. This protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration; in the meantime, a delegation chain canbe verified by anyone without the participation of role administrators. We also propose the Measurable Risk Adaptive decentralized Role-based Delegation framework to address this problem. Describe an efficient realization of RBCD by using aggregate signatures, where the authentication information for an arbitrarily long role-based delegation chain is captured by one short signature of constant size. RBCD enables a role member to create delegations based on the need of collaboration; in the meantime anyone can verify a delegation chain without the participation of role administrators. The protocol is general and can be realized by any signature scheme. We have described a specific realization with a hierarchical certificate-based encryption scheme that gives delegation compact credentials.
Anonymization of Longitudinal Electronic Medical Records
Tamersoy, Acar; Loukides, Grigorios; Nergiz, Mehmet Ercan; Saygin, Yucel; Malin, Bradley
2013-01-01
Electronic medical record (EMR) systems have enabled healthcare providers to collect detailed patient information from the primary care domain. At the same time, longitudinal data from EMRs are increasingly combined with biorepositories to generate personalized clinical decision support protocols. Emerging policies encourage investigators to disseminate such data in a deidentified form for reuse and collaboration, but organizations are hesitant to do so because they fear such actions will jeopardize patient privacy. In particular, there are concerns that residual demographic and clinical features could be exploited for reidentification purposes. Various approaches have been developed to anonymize clinical data, but they neglect temporal information and are, thus, insufficient for emerging biomedical research paradigms. This paper proposes a novel approach to share patient-specific longitudinal data that offers robust privacy guarantees, while preserving data utility for many biomedical investigations. Our approach aggregates temporal and diagnostic information using heuristics inspired from sequence alignment and clustering methods. We demonstrate that the proposed approach can generate anonymized data that permit effective biomedical analysis using several patient cohorts derived from the EMR system of the Vanderbilt University Medical Center. PMID:22287248
Kron, Tomas; Chesson, Brent; Hardcastle, Nicholas; Crain, Melissa; Clements, Natalie; Burns, Mark; Ball, David
2018-05-01
A randomised clinical trial comparing stereotactic ablative body radiotherapy (SABR) with conventional radiotherapy for early stage lung cancer has been conducted in Australia and New Zealand under the auspices of the TransTasman Radiation Oncology Group (NCT01014130). We report on the technical credentialing program as prerequisite for centres joining the trial. Participating centres were asked to develop treatment plans for two test cases to assess their ability to create plans according to protocol. Dose delivery in the presence of inhomogeneity and motion was assessed during a site visit using a phantom with moving inserts. Site visits for the trial were conducted in 16 Australian and 3 New Zealand radiotherapy facilities. The tests with low density inhomogeneities confirmed shortcomings of the AAA algorithm for dose calculation. Dose was assessed for a typical treatment delivery including at least one non-coplanar beam in a stationary and moving phantom. This end-to-end test confirmed that all participating centres were able to deliver stereotactic ablative body radiotherapy with the required accuracy while the planning study demonstrated that they were able to produce acceptable plans for both test cases. The credentialing process documented that participating centres were able to deliver dose as required in the trial protocol. It also gave an opportunity to provide education about the trial and discuss technical issues such as four-dimensional CT, small field dosimetry and patient immobilisation with staff in participating centres. Advances in knowledge: Credentialing is an important quality assurance tool for radiotherapy trials using advanced technology. In addition to confirming technical competence, it provides an opportunity for education and discussion about the trial.