Sample records for information security professionals

  1. Information Sharing for IT Security Professionals

    ERIC Educational Resources Information Center

    Petersen, Rodney J.

    2008-01-01

    Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their long history of collaboration and openness. Information sharing has become part of the national fabric as IT security professionals attempt to secure cyber…

  2. The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information

    ERIC Educational Resources Information Center

    Johnson, Kenneth T.

    2017-01-01

    Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…

  3. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  4. [Application of classified protection of information security in the information system of air pollution and health impact monitoring].

    PubMed

    Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun

    2018-01-01

    To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.

  5. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    ERIC Educational Resources Information Center

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  6. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  7. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    PubMed

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  8. Video calls from lay bystanders to dispatch centers - risk assessment of information security

    PubMed Central

    2011-01-01

    Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387

  9. A Unified Approach to Information Security Compliance

    ERIC Educational Resources Information Center

    Adler, M. Peter

    2006-01-01

    The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…

  10. Ethical Hacking in Information Security Curricula

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  11. Information Security in Higher Education. Professional Paper Series, #5.

    ERIC Educational Resources Information Center

    Elliott, Raymond; And Others

    Intended to generate discussion and motivate proactive intervention in matters of information security, this paper defines and discusses some of the key issues relating to information security on college and university campuses based on in-depth interviews conducted at eight selected higher education institutions of varying size and composition in…

  12. Using Information Technologies in Professional Training of Future Security Specialists in the USA, Great Britain, Poland and Israel

    ERIC Educational Resources Information Center

    Kyslenko, Dmytro

    2017-01-01

    The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…

  13. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  14. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  15. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  16. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  17. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  18. Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises

    ERIC Educational Resources Information Center

    Shah, Ashish

    2017-01-01

    Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…

  19. Teaching Information Security with Workflow Technology--A Case Study Approach

    ERIC Educational Resources Information Center

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  20. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  1. Implementing an electronic medication overview in Belgium.

    PubMed

    Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree

    2014-12-16

    An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.

  2. 2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)

    DTIC Science & Technology

    2011-08-25

    Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3

  3. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    PubMed

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  4. Role of Outsourcing in Stress and Job Satisfaction of Information Technology Professionals

    ERIC Educational Resources Information Center

    Robinson, Janell R.

    2016-01-01

    Information technology (IT) outsourcing poses a potential job loss threat to IT professionals, which can decrease job security, job satisfaction, and organizational commitment. The problem that this study addressed was the perceived role of IT outsourcing in the job stress, job dissatisfaction, and turnover intention of IT professionals. The…

  5. Making Technology Work for Campus Security

    ERIC Educational Resources Information Center

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  6. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    PubMed

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  7. 20 CFR 401.25 - Terms defined.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...

  8. 20 CFR 401.25 - Terms defined.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...

  9. The ISACA Business Model for Information Security: An Integrative and Innovative Approach

    NASA Astrophysics Data System (ADS)

    von Roessing, Rolf

    In recent years, information security management has matured into a professional discipline that covers both technical and managerial aspects in an organisational environment. Information security is increasingly dependent on business-driven parameters and interfaces to a variety of organisational units and departments. In contrast, common security models and frameworks have remained largely technical. A review of extant models ranging from [LaBe73] to more recent models shows that technical aspects are covered in great detail, while the managerial aspects of security are often neglected.Likewise, the business view on organisational security is frequently at odds with the demands of information security personnel or information technology management. In practice, senior and executive level management remain comparatively distant from technical requirements. As a result, information security is generally regarded as a cost factor rather than a benefit to the organisation.

  10. 77 FR 61659 - Proposed Information Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-10

    ... professional education programs and the renewal of the enrollment status for those individuals admitted... years. For additional information on renewals, see Circular 230 or visit the Office of Professional... Accounting Method for Dealers in Securities. OMB Number: 1545-1558. Revenue Procedure Number: Revenue...

  11. Analysis of health professional security behaviors in a real clinical setting: an empirical study.

    PubMed

    Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis

    2015-06-01

    The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  12. 76 FR 70207 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-10

    ...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... information concerning associated persons. The proposed rule change was published for comment in the Federal...

  13. [Security agents on the front line against Ebola: roles, perceptions and knowledge in Fann Teaching Hospital, Dakar, Senegal].

    PubMed

    Lanièce, C; Sow, K; Desclaux, A

    2016-10-01

    Security agents are on the front line when patients arrive at health facilities, giving them a potential role to play in an Ebola virus disease (EVD) outbreak. The position of security agents within health services is poorly documented. A survey was conducted to clarify their understanding of Ebola pathology, to assess their need for information and to determine their role in patient management. The survey included both qualitative and quantitative aspects. 80 security agents of the Fann teaching hospital (Dakar) completed questionnaires, and 11 were interviewed. Qualitative analysis was performed with Dedoose and the quantitative analysis using Excel. The results show that security agents' activities go beyond their mission of security and control. They are involved in informing, orienting and assisting patients and those accompanying them in the hospital. The security agents have basic knowledge of EVD, but overestimate the risk of transmission. They want to be more informed and to have access to protective material. These results suggest that these professionals should be taken into account when developing response strategies to Ebola outbreaks. Their knowledge of and protection against the disease must be strengthened. Non-health professionals working in health facilities should be trained in order to be able to relay information to the public.

  14. Security and privacy of EHR systems--ethical, social and legal requirements.

    PubMed

    Kluge, Eike-Henner W

    2003-01-01

    This paper addresses social, ethical and legal concerns about security and privacy that arise in the development of international interoperable health information systems. The paper deals with these concerns under four rubrics: the ethical status of electronic health records, the social and legal embedding of interoperable health information systems, the overall information-requirements healthcare as such, and the role of health information professionals as facilitators. It argues that the concerns that arise can be met if the development of interoperability protocols is guided by the seven basic principles of information ethics that have been enunciated in the IMIA Code of Ethics for Health Information Professionals and that are central to the ethical treatment of electronic health records.

  15. The Perceptions of U.S.-Based IT Security Professionals about the Effectiveness of IT Security Frameworks: A Quantitative Study

    ERIC Educational Resources Information Center

    Warfield, Douglas L.

    2011-01-01

    The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…

  16. Guidelines for Working with Law Enforcement Agencies

    ERIC Educational Resources Information Center

    Corn, Michael

    2007-01-01

    Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…

  17. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers

    PubMed Central

    Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N

    2014-01-01

    Introduction This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). Methods The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents’ concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Results Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). Conclusions This study underscores the need for enhanced measures to secure patients’ PHI to avoid undermining their trust. PMID:23975624

  18. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers.

    PubMed

    Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N

    2014-01-01

    This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents' concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). This study underscores the need for enhanced measures to secure patients' PHI to avoid undermining their trust.

  19. 76 FR 29014 - Self-Regulatory Organizations; NASDAQ Stock Market, LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... those who meet the Professional definition have certain technological and informational advantages over... Chapter I, Section I (Definitions). See also Securities Exchange Act Release Nos. 63028 (October 1, 2010... Professionals have the same technological and informational advantages as broker-dealers trading for their own...

  20. An Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection

    ERIC Educational Resources Information Center

    Maar, Michael C.

    2013-01-01

    This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…

  1. The personal health record paradox: health care professionals' perspectives and the information ecology of personal health record systems in organizational and clinical settings.

    PubMed

    Nazi, Kim M

    2013-04-04

    Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals' accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings.

  2. Protecting the Privacy and Security of Your Health Information

    MedlinePlus

    ... Access to Medical Records Privacy, Security, and HIPAA Laws, Regulation, and Policy Scientific Initiatives Standards & Technology Usability ... care providers and professionals, and the government. Federal laws require many of the key persons and organizations ...

  3. A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment

    NASA Astrophysics Data System (ADS)

    Ula, M.; Ula, M.; Fuadi, W.

    2017-02-01

    As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.

  4. Inter-organizational future proof EHR systems. A review of the security and privacy related issues.

    PubMed

    van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan

    2009-03-01

    Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.

  5. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    ERIC Educational Resources Information Center

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  6. Ethics Certification of Health Information Professionals.

    PubMed

    Kluge, Eike-Henner; Lacroix, Paulette; Ruotsalainen, Pekka

    2018-04-22

     To provide a model for ensuring the ethical acceptability of the provisions that characterize the interjurisdictional use of eHealth, telemedicine, and associated modalities of health care deliveiy that are currently in place.  Following the approach initiated in their Global Protection of Health Data project within the Security in Health Information Systems (SiHIS) working group of the International Medical Informatics Association (IMIA), the authors analyze and evaluate relevant privacy and security approaches that are intended to stem the erosion of patients' trustworthiness in the handling of their sensitive information by health care and informatics professionals in the international context.  The authors found that while the majority of guidelines and ethical codes essentially focus on the role and functioning of the institutions that use EHRs and information technologies, little if any attention has been paid to the qualifications of the health informatics professionals (HIPs) who actualize and operate information systems to deal with or address relevant ethical issues.  The apparent failure to address this matter indicates that the ethical qualification of HIPs remains an important security issue and that the Global Protection of Health Data project initiated by the SiHIS working group in 2015 should be expanded to develop into an internationally viable method of certification. An initial model to this effect is sketched and discussed. Georg Thieme Verlag KG Stuttgart.

  7. Implementing healthcare information security: standards can help.

    PubMed

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  8. How secure is your information system? An investigation into actual healthcare worker password practices.

    PubMed

    Cazier, Joseph A; Medlin, B Dawn

    2006-09-27

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.

  9. How Secure Is Your Information System? An Investigation into Actual Healthcare Worker Password Practices

    PubMed Central

    Cazier, Joseph A; Medlin, B. Dawn

    2006-01-01

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366

  10. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  11. Indirect effect of management support on users' compliance behaviour towards information security policies.

    PubMed

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management-user values and the nature of compliance towards ISPs among selected health professionals, this study has made a unique contribution to the literature.

  12. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.

    PubMed

    Busdicker, Mike; Upendra, Priyanka

    2017-09-02

    This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.

  13. 76 FR 60953 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the SEC...

  14. Report of the Public Cryptography Study Group.

    ERIC Educational Resources Information Center

    American Council on Education, Washington, DC.

    Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…

  15. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  16. The Personal Health Record Paradox: Health Care Professionals’ Perspectives and the Information Ecology of Personal Health Record Systems in Organizational and Clinical Settings

    PubMed Central

    2013-01-01

    Background Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. Objective The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. Methods In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Results Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals’ accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Conclusions Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings. PMID:23557596

  17. An On-Line Information Management System for Resources for Staff Development for the Professional Development Center Network.

    ERIC Educational Resources Information Center

    Monroe, Eula Ewing

    The Professional Development Center Network (PDC), a consortium of twenty public school districts, parochial schools, and Western Kentucky University, seeks to identify and secure resources to assist in the design and delivery of activities appropriate to the educational development of individual staff members through the online Information…

  18. Mobile Device Security: Perspectives of Future Healthcare Workers

    PubMed Central

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992

  19. Mobile Device Security: Perspectives of Future Healthcare Workers.

    PubMed

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.

  20. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    PubMed

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  1. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  2. Ethics in Public Health Research

    PubMed Central

    Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.

    2008-01-01

    Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010

  3. Social Media Principles Applied to Critical Infrastructure Information Sharing

    DTIC Science & Technology

    2013-12-01

    shooters. The DHS works throughout the year to build partnerships with industries across a wide spectrum, to include commercial facilities. They...security professionals , industry association and security organizations, emergency managers, and planners and architects. Each of these stakeholder sets... Project Report.126 The DARPA SCP fellows identified 14 factors that affected the performance of any one team. Notable among the collection were

  4. A physician's role following a breach of electronic health information.

    PubMed

    Kim, Daniel; Schleiter, Kristin; Crigger, Bette-Jane; McMahon, John W; Benjamin, Regina M; Douglas, Sharon P

    2010-01-01

    The Council on Ethical and Judicial Affairs of the American Medical Association examines physicians' professional ethical responsibility in the event that the security of patients' electronic records is breached.

  5. Finding an Eye Care Professional

    MedlinePlus

    ... article rating hospitals in the United States. Website: http://health.usnews.com/best-hospitals For More Information ... ophthalmologists in the United States and abroad. Website: https://secure.aao.org/aao/find-ophthalmologist The American ...

  6. An Examination of Information Security Training and Education for IT Professionals in a Community College: A Case Study

    ERIC Educational Resources Information Center

    Stark, Adam

    2017-01-01

    This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…

  7. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.

    PubMed

    Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona

    2003-01-01

    The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.

  8. Trade Secret Law and Information Systems: Can Your Students Keep a Secret?

    ERIC Educational Resources Information Center

    Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L.

    2011-01-01

    The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…

  9. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    PubMed

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  10. An Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and Discussion

    ERIC Educational Resources Information Center

    Peslak, Alan R.

    2010-01-01

    One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…

  11. 45 CFR 60.1 - The National Practitioner Data Bank.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... certain information relating to the professional competence and conduct of physicians, dentists and other health care practitioners. Section 1921 of the Social Security Act (42 U.S.C. 1396r-2) (section 1921...

  12. The Role Of Moral Awareness In Computer Security

    NASA Astrophysics Data System (ADS)

    Stawinski, Arthur

    1984-08-01

    Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.

  13. Beyond Firewalls: Professional Certification Ensures Your Staff Will Understand Information Security in Its Proper Context

    ERIC Educational Resources Information Center

    Svetcov, Eric

    2004-01-01

    When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…

  14. [Quality management and participation into clinical database].

    PubMed

    Okubo, Suguru; Miyata, Hiroaki; Tomotaki, Ai; Motomura, Noboru; Murakami, Arata; Ono, Minoru; Iwanaka, Tadashi

    2013-07-01

    Quality management is necessary for establishing useful clinical database in cooperation with healthcare professionals and facilities. The ways of management are 1) progress management of data entry, 2) liaison with database participants (healthcare professionals), and 3) modification of data collection form. In addition, healthcare facilities are supposed to consider ethical issues and information security for joining clinical databases. Database participants should check ethical review boards and consultation service for patients.

  15. Internal dental school environmental factors promoting faculty survival and success.

    PubMed

    Masella, Richard S

    2005-04-01

    A career in dental academics offers ample rewards and challenges. To promote successful careers in dental education, prospective and new dental faculty should possess a realistic view of the dental school work environment, akin to the informed consent so valuable to patients and doctors. Self-assessment of personal strengths and weaknesses provides helpful information in matching faculty applicants with appropriate dental schools. Essential prehiring information also includes a written job description detailing duties and responsibilities, professional development opportunities, and job performance evaluation protocol. Prehiring awareness of what constitutes excellence in job performance will aid new faculty in allotting time to productive venues. New faculty should not rely solely on professional expertise to advance careers. Research and regular peer-reviewed publications are necessary elements in academic career success, along with the ability to secure governmental, private foundation, and corporate grant support. Tactful self-promotion and self-definition to the dental school community are faculty responsibilities, along with substantial peer collaboration. The recruitment period is a singular opportunity to secure job benefits and privileges. It is also the time to gain knowledge of institutional culture and assess administrative and faculty willingness to collaborate on teaching, research, professional development, and attainment of change. Powerful people within dental schools and parent institutions may influence faculty careers and should be identified and carefully treated. The time may come to leave one's position for employment at a different dental school or to step down from full-time academics. Nonetheless, the world of dental and health professional education in 2005 is rapidly expanding and offers unlimited opportunities to dedicated, talented, and informed educators.

  16. Blockchain Technology: A Data Framework to Improve Validity, Trust, and Accountability of Information Exchange in Health Professions Education.

    PubMed

    Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel

    2018-06-12

    Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.

  17. 75 FR 11890 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... housed on a secure server and database. The results of the survey shall be used for inpatient quality... of records are necessary to ensure the well-being and safety of patients and that professional...

  18. Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2014-02-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.

  19. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    NASA Astrophysics Data System (ADS)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  20. A Quantitative Examination of Perceived Promotability of Information Security Professionals with Vendor-Specific Certifications versus Vendor-Neutral Certifications

    ERIC Educational Resources Information Center

    Gleghorn, Gregory D.

    2011-01-01

    Human capital theory suggests the knowledge, skills, and abilities one obtains through experience, on-the-job training, or education enhances one's productivity. This research was based on human capital theory and promotability (i.e., upward mobility). The research offered in this dissertation shows what effect obtaining information security…

  1. 75 FR 51484 - Agency Information Collection Activities: Extension of a Currently Approved Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-20

    ... consultation program to provide the general public and Federal agencies with an opportunity to comment on... required by section 212(a)(5)(A)(iii) and section 214(c) of the Immigration and Nationality Act (INA). 8 U... of alien professional athletes. The Department of Homeland Security, U.S. Citizenship and Immigration...

  2. 6 CFR 9.15 - Professional and technical services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.15 Section 9.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Own Employees § 9.15 Professional and technical services. (a) The prohibition on the...

  3. 6 CFR 9.23 - Professional and technical services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.23 Section 9.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Other than Own Employees § 9.23 Professional and technical services. (a) The...

  4. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Job Profiles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  5. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    ERIC Educational Resources Information Center

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  6. Conception of a course for professional training and education in the field of computer and mobile forensics

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2012-06-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.

  7. HIPAA Compliance and Training: A Perfect Storm for Professionalism Education?

    PubMed

    Agris, Julie L; Spandorfer, John M

    2016-12-01

    The HIPAA Rules continue to support and bolster the importance of protecting the privacy and security of patients' protected health information. The HIPAA training requirements are at the cornerstone of meaningful implementation and provide a ripe opportunity for critical education.

  8. A secure EHR system based on hybrid clouds.

    PubMed

    Chen, Yu-Yi; Lu, Jun-Chao; Jan, Jinn-Ke

    2012-10-01

    Consequently, application services rendering remote medical services and electronic health record (EHR) have become a hot topic and stimulating increased interest in studying this subject in recent years. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. Sharing EHR information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. With the widespread use of EHR, building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructures for facilitating EHR sharing and EHR integration. In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.

  9. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications

    NASA Astrophysics Data System (ADS)

    Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

    Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

  10. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Behavioral Interview Guidelines by Job Roles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  11. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Individual and Team Performance Guidelines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  12. High-end Home Firewalls CIAC-2326

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W

    Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managersmore » have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.« less

  13. Increasing clinical presence of mobile communication technology: avoiding the pitfalls.

    PubMed

    Visvanathan, Akila; Gibb, Alan P; Brady, Richard R W

    2011-10-01

    Mobile communication technologies are employed in many diverse areas of healthcare delivery to provide improved quality and efficiency of communication and facilitate increased rapidity of data or information transfer. Mobile phones enable healthcare professionals to possess a portable platform from which to provide many healthcare-related applications and are a popular means to directly communicate with colleagues and patients. As involvement of mobile communication technology in healthcare delivery continues to rapidly expand, there are also important considerations of relevance to patient safety and security as a result. Here, we review the previous evidence of reported clinical risks associated with mobile communication technology, such as electromagnetic interference, confidentiality and data security, distraction/noise, infection control, and cross contamination. In conclusion, although mobile phones provide much putative potential improvement to healthcare delivery, further evaluation and research are required to both inform and protect health professionals and users of such technology in the healthcare environment and provide the evidence base to support the provision of clear and comprehensive guidelines.

  14. [Information security in health care].

    PubMed

    Ködmön, József; Csajbók, Zoltán Ernő

    2015-07-05

    Doctors, nurses and other medical professionals are spending more and more time in front of the computer, using applications developed for general practitioners, specialized care, or perhaps an integrated hospital system. The data they handle during healing and patient care are mostly sensitive data and, therefore, their management is strictly regulated. Finding our way in the jungle of laws, regulations and policies is not simple. Notwithstanding, our lack of information does not waive our responsibility. This study summarizes the most important points of international recommendations, standards and legal regulations of the field, as well as giving practical advices for managing medical and patient data securely and in compliance with the current legal regulations.

  15. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  16. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  17. A Mutual Authentication Framework for Wireless Medical Sensor Networks.

    PubMed

    Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav

    2017-05-01

    Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.

  18. Medical image security in a HIPAA mandated PACS environment.

    PubMed

    Cao, F; Huang, H K; Zhou, X Q

    2003-01-01

    Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.

  19. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    NASA Astrophysics Data System (ADS)

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  20. Advancing the chronic care road map: a contemporary overview.

    PubMed

    Ahmed, Sara; Gogovor, Amede; Kosseim, Mylene; Poissant, Lise; Riopelle, Richard; Simmonds, Maureen; Krelenbaum, Marilyn; Montague, Terrence

    2010-01-01

    In an effort to assess and advance the community-based model of chronic care, we reviewed a contemporary spectrum of Canadian chronic disease management and prevention (CDMP) programs with a participatory audience of administrators, academics, professional and non-professional providers and patients. While many questions remain unanswered, several common characteristics of CDMP success were apparent. These included community-based partnerships with aligned goals; inter-professional and non-professional care, including patient self-management; measured and shared information on practices and outcomes; and visible leadership. Principal improvement opportunities identified were the enhanced engagement of all stakeholders; further efficacy evidence for team care; facile information systems, with clear rationales for data selection, access, communication and security; and increased education of, and resource support for, patients and caregivers. Two immediate actions were suggested. One was a broad and continuing communication plan highlighting CDMP issues and opportunities. The other was a standardized survey of team structures, interventions, measurements and communications in ongoing CDMP programs, with a causal analysis of their relation to outcomes. In the longer term, the key needs requiring action were more inter-professional education of health human resources and more practical information systems available to all stakeholders. Things can be better.

  1. Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations

    DTIC Science & Technology

    2015-12-01

    USBP agent, intelligence ( BPA -I), information sharing, capability gap analysis process (CGAP), Tucson Sector Red Team 15. NUMBER OF PAGES 109 16...27 2. BPA -I .............................................................................................28 3. BPA -I Requirements...71 APPENDIX A. PROFESSIONAL INTELLIGENCE ASSOCIATIONS— ADDITIONAL OPPORTUNITIES FOR BPA -IS

  2. 34 CFR 668.46 - Institutional security policies and crime statistics.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... recognized by that religious order or denomination as someone who provides confidential counseling, and is... whose official responsibilities include providing mental health counseling to members of the institution... professional counselors, if and when they deem it appropriate, to inform the persons they are counseling of any...

  3. 34 CFR 668.46 - Institutional security policies and crime statistics.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... recognized by that religious order or denomination as someone who provides confidential counseling, and is... whose official responsibilities include providing mental health counseling to members of the institution... professional counselors, if and when they deem it appropriate, to inform the persons they are counseling of any...

  4. 34 CFR 668.46 - Institutional security policies and crime statistics.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... recognized by that religious order or denomination as someone who provides confidential counseling, and is... whose official responsibilities include providing mental health counseling to members of the institution... professional counselors, if and when they deem it appropriate, to inform the persons they are counseling of any...

  5. Small Community Training & Education

    Science.gov Websites

    training and adult education professionals. • National Technical Information Service (NTIS) This U.S residents of New Jersey and beyond through education and public service. • Operator Training Committee of Water Wastewater Training Security Conservation & Water Efficiency Water for All Americans Water We

  6. Teachers' Perceptions of Financial Literacy and the Implications for Professional Learning

    ERIC Educational Resources Information Center

    Sawatzki, Carly M.; Sullivan, Peter A.

    2017-01-01

    Consumer, economic and financial literacy education at school is central to active and informed citizenship. Over the past decade, the Australian Securities and Investments Commission has led various policy initiatives and influenced curriculum and resource development in this area. However, there remains a paucity of research exploring how…

  7. 12 CFR 403.9 - Fees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY INFORMATION § 403.9 Fees. The following specific fees shall be applicable with respect to services... records, per hour or fraction thereof: (i) Professional $11.00 (ii) Clerical 6.00 (b) Computer service charges per second for actual use of computer central processing unit .25 (c) Copies made by photostat or...

  8. 12 CFR 403.9 - Fees.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SECURITY INFORMATION § 403.9 Fees. The following specific fees shall be applicable with respect to services... records, per hour or fraction thereof: (i) Professional $11.00 (ii) Clerical 6.00 (b) Computer service charges per second for actual use of computer central processing unit .25 (c) Copies made by photostat or...

  9. 12 CFR 403.9 - Fees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SECURITY INFORMATION § 403.9 Fees. The following specific fees shall be applicable with respect to services... records, per hour or fraction thereof: (i) Professional $11.00 (ii) Clerical 6.00 (b) Computer service charges per second for actual use of computer central processing unit .25 (c) Copies made by photostat or...

  10. 12 CFR 403.9 - Fees.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SECURITY INFORMATION § 403.9 Fees. The following specific fees shall be applicable with respect to services... records, per hour or fraction thereof: (i) Professional $11.00 (ii) Clerical 6.00 (b) Computer service charges per second for actual use of computer central processing unit .25 (c) Copies made by photostat or...

  11. 12 CFR 403.9 - Fees.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SECURITY INFORMATION § 403.9 Fees. The following specific fees shall be applicable with respect to services... records, per hour or fraction thereof: (i) Professional $11.00 (ii) Clerical 6.00 (b) Computer service charges per second for actual use of computer central processing unit .25 (c) Copies made by photostat or...

  12. Nurses' professionalism in Canada: a labor process analysis.

    PubMed

    Campbell, M L

    1992-01-01

    This article draws on a body of research conducted by the author over the past ten years on the social organization of nursing work. It explores questions surrounding nurses' contemporary labor process control and its meaning for nurses' professionalization and proletarianization. Both are dynamic processes, changing as public administration of the Canadian health care system changes and as nurses are successful in winning more complete self-regulation. Nurses are currently being articulated more and more securely to dominant ideas of public sector management through textually mediated technologies. Nurses find new upwardly mobile careers and challenging, responsible, and more respected work. However, as the generation of objective information for professional accountability, cost-accounting, and managerial decision-making becomes unified in computerized patient information systems, producing and using such information becomes a central and determining core of everyday nursing work. It organizes nurses into a "managed" practice of patient care, contradictory for them in many ways. Outstanding among these contradictions is a new professionalized standpoint of cost-efficiency that subordinates nurses' traditional interests and grounding of their work in the standpoint of care.

  13. Ways to Improve DoD 8570 IY Security Certification

    ERIC Educational Resources Information Center

    Bates, Justin D.

    2017-01-01

    The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…

  14. OS friendly microprocessor architecture: Hardware level computer security

    NASA Astrophysics Data System (ADS)

    Jungwirth, Patrick; La Fratta, Patrick

    2016-05-01

    We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.

  15. Security Recommendations for mHealth Apps: Elaboration of a Developer's Guide.

    PubMed

    Morera, Enrique Pérez; de la Torre Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Arambarri, Jon

    2016-06-01

    Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the "OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.

  16. Women's experiences of social support during the first year following primary breast cancer surgery.

    PubMed

    Drageset, Sigrunn; Lindstrøm, Torill Christine; Giske, Tove; Underlid, Kjell

    2016-06-01

    The aim of this qualitative follow-up study was to describe women's individual experiences of social support during their first year after primary breast cancer surgery. Individual semi-structured interviews with 10 women 1 year after surgery analysed by Kvales' meaning condensation method. Sharing experiences, being understood as an individual, continuity, and information and explanations were themes identified. Sharing mutual experiences increased the women's knowledge regarding cancer, increased experience of support and minimised rumination. After 1 year, the women felt that the network around them had 'normalised' and was less supportive. Being seen as a person, not as 'a diagnosis being treated', and continuity of professional support were important, giving feelings of security and trust. The women felt uncertainty after loss of professional support post-treatment. Information and explanations regarding treatment and treatment-related problems were essential. Mutual sharing of experiences is an important part of social support. Continuity, availability, information and respect were essential aspects of experienced professional support. © 2015 Nordic College of Caring Science.

  17. New Advanced Technologies to Provide Decentralised and Secure Access to Medical Records: Case Studies in Oncology

    PubMed Central

    Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent

    2009-01-01

    The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an “ephemeral electronic patient record”. However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure “google-like” access to medical records. PMID:19718446

  18. Dutch virtual integration of healthcare information.

    PubMed

    de Graaf, J C; Vlug, A E; van Boven, G J

    2007-01-01

    As information technology creates opportunities for cooperation which crosses the boundaries between healthcare institutions, it will become an integral part of the Dutch healthcare system. Along with many involved organizations in healthcare the National IT Institute for Healthcare in the Netherlands (NICTIZ) is working on the realization of a national IT infrastructure for healthcare and a national electronic patient record (EPR). An underlying national architecture is designed to enable the Dutch EPR virtually, not in a national database, nor on a patient's smartcard. The required secure infrastructure provides generic functions for healthcare applications: patient identification, authentication and authorization of healthcare professionals. The first national applications in the EPR program using a national index of where patient data is stored, are the electronic medication record and the electronic record for after hours GP services. The rollout of the electronic medication record and electronic record for after hours GP services has been started in 2007. To guarantee progress of electronic data exchange in healthcare in the Netherlands we have primarily opted for two healthcare applications: the electronic medication record and the electronic record for after hours GP services. The use of a national switch-point containing the registry of where to find what information, guarantees that the professional receives the most recent information and omits large databases to contain downloaded data. Proper authorization, authentication as well as tracing by the national switchpoint also ensures a secure environment for the communication of delicate information.

  19. A Secure Architecture to Provide a Medical Emergency Dataset for Patients in Germany and Abroad.

    PubMed

    Storck, Michael; Wohlmann, Jan; Krudwig, Sarah; Vogel, Alexander; Born, Judith; Weber, Thomas; Dugas, Martin; Juhra, Christian

    2017-01-01

    The ongoing fragmentation of medical care and mobility of patients severely restrains exchange of lifesaving information about patient's medical history in case of emergencies. Therefore, the objective of this work is to offer a secure technical solution to supply medical professionals with emergency-relevant information concerning the current patient via mobile accessibility. To achieve this goal, the official national emergency data set was extended by additional features to form a patient summary for emergencies, a software architecture was developed and data security and data protection issues were taken into account. The patient has sovereignty over his/her data and can therefore decide who has access to or can change his/her stored data, but the treating physician composes the validated dataset. Building upon the introduced concept, future activities are the development of user-interfaces for the software components of the different user groups as well as functioning prototypes for upcoming field tests.

  20. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    PubMed

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  1. The use of electronic devices for communication with colleagues and other healthcare professionals - nursing professionals' perspectives.

    PubMed

    Koivunen, Marita; Niemi, Anne; Hupli, Maija

    2015-03-01

    The aim of the study is to describe nursing professionals' experiences of the use of electronic devices for communication with colleagues and other healthcare professionals. Information and communication technology applications in health care are rapidly expanding, thanks to the fast-growing penetration of the Internet and mobile technology. Communication between professionals in health care is essential for patient safety and quality of care. Implementing new methods for communication among healthcare professionals is important. A cross-sectional survey was used in the study. The data were collected in spring 2012 using an electronic questionnaire with structured and open-ended questions. The target group comprised the nursing professionals (N = 567, n = 123) in one healthcare district who worked in outpatient clinics in publically funded health care in Finland. Nursing professionals use different electronic devices for communication with each other. The most often used method was email, while the least used methods were question-answer programmes and synchronous communication channels on the Internet. Communication using electronic devices was used for practical nursing, improving personnel competences, organizing daily operations and administrative tasks. Electronic devices may speed up the management of patient data, improve staff cooperation and competence and make more effective use of working time. The obstacles were concern about information security, lack of technical skills, unworkable technology and decreasing social interaction. According to our findings, despite the obstacles related to use of information technology, the use of electronic devices to support communication among healthcare professionals appears to be useful. © 2014 John Wiley & Sons Ltd.

  2. European health telematics networks for positron emission tomography

    NASA Astrophysics Data System (ADS)

    Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios

    2006-12-01

    A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.

  3. An end-to-end secure patient information access card system.

    PubMed

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  4. Factors influencing workplace violence risk among correctional health workers: insights from an Australian survey.

    PubMed

    Cashmore, Aaron W; Indig, Devon; Hampton, Stephen E; Hegney, Desley G; Jalaludin, Bin B

    2016-11-01

    Little is known about the environmental and organisational determinants of workplace violence in correctional health settings. This paper describes the views of health professionals working in these settings on the factors influencing workplace violence risk. All employees of a large correctional health service in New South Wales, Australia, were invited to complete an online survey. The survey included an open-ended question seeking the views of participants about the factors influencing workplace violence in correctional health settings. Responses to this question were analysed using qualitative thematic analysis. Participants identified several factors that they felt reduced the risk of violence in their workplace, including: appropriate workplace health and safety policies and procedures; professionalism among health staff; the presence of prison guards and the quality of security provided; and physical barriers within clinics. Conversely, participants perceived workplace violence risk to be increased by: low health staff-to-patient and correctional officer-to-patient ratios; high workloads; insufficient or underperforming security staff; and poor management of violence, especially horizontal violence. The views of these participants should inform efforts to prevent workplace violence among correctional health professionals.

  5. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.

    PubMed

    Griggs, Kristen N; Ossipova, Olya; Kohlios, Christopher P; Baccarini, Alessandro N; Howson, Emily A; Hayajneh, Thaier

    2018-06-06

    As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI) generated by these devices, we propose utilizing blockchain-based smart contracts to facilitate secure analysis and management of medical sensors. Using a private blockchain based on the Ethereum protocol, we created a system where the sensors communicate with a smart device that calls smart contracts and writes records of all events on the blockchain. This smart contract system would support real-time patient monitoring and medical interventions by sending notifications to patients and medical professionals, while also maintaining a secure record of who has initiated these activities. This would resolve many security vulnerabilities associated with remote patient monitoring and automate the delivery of notifications to all involved parties in a HIPAA compliant manner.

  6. Informed use of patients' records on trusted health care services.

    PubMed

    Sahama, Tony; Miller, Evonne

    2011-01-01

    Health care is an information-intensive business. Sharing information in health care processes is a smart use of data enabling informed decision-making whilst ensuring. the privacy and security of patient information. To achieve this, we propose data encryption techniques embedded Information Accountability Framework (IAF) that establishes transitions of the technological concept, thus enabling understanding of shared responsibility, accessibility, and efficient cost effective informed decisions between health care professionals and patients. The IAF results reveal possibilities of efficient informed medical decision making and minimisation of medical errors. Of achieving this will require significant cultural changes and research synergies to ensure the sustainability, acceptability and durability of the IAF.

  7. Business game using information technologies for the students of final courses to direction of telecommunication

    NASA Astrophysics Data System (ADS)

    Khmelevskaya, A. V.; Klyuchnikova, O. E.; Golovin, P. V.; Yakushev, A. S.

    2017-01-01

    This article discusses the use of business games in the field of Infocommunications and information security. The authors consider the developed business game "Interview - rules of successful employment," "The tender to design Local Area Network," "Emergency situation in telecommunications company." This business games allows students to develop many skills and abilities. This games gives students the opportunity to take advantage of their theoretical knowledge and already in student years to begin them practically to realize and apply, producing own preparation the same for a further successful professional growth. The games is recommended for use as a new integrated form of organization-semester independent students work with a public defense of result and demonstration all professional competencies.

  8. An Expanded Study of Net Generation Perceptions on Privacy and Security on Social Networking Sites (SNS)

    ERIC Educational Resources Information Center

    Lawler, James P.; Molluzzo, John C.; Doshi, Vijal

    2012-01-01

    Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…

  9. Conversations about Research Supervision--Enabling and Accrediting a Community of Practice Model for Research Degree Supervisor Development

    ERIC Educational Resources Information Center

    Hill, Geof; Vaughan, Sian

    2018-01-01

    The authors' lived experience of devising a professional development programme for research supervisors and securing SEDA (Staff and Educational Development Association) accreditation informs this paper. Our first purpose is to outline the programme and discuss its uniqueness in using a community of practice model in conjunction with practitioner…

  10. Survey on the population's needs and the public health response during floods in Germany 2002.

    PubMed

    Schnitzler, Johannes; Benzler, Justus; Altmann, Doris; Mücke, Inge; Krause, Gérard

    2007-01-01

    A survey after the 2002 flood in Germany identifies contact with floodwater as a risk factor for diarrhea and injuries and shows that the affected population valued the given professional support in securing homes and cleanup work. Evacuations were well tolerated. Information reached the population mainly through loudspeakers, radio, and TV.

  11. Measuring Human Performance within Computer Security Incident Response Teams

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less

  12. Erosion of Digital Professionalism During Medical Students' Core Clinical Clerkships.

    PubMed

    Mostaghimi, Arash; Olszewski, Aleksandra E; Bell, Sigall K; Roberts, David H; Crotty, Bradley H

    2017-05-03

    The increased use of social media, cloud computing, and mobile devices has led to the emergence of guidelines and novel teaching efforts to guide students toward the appropriate use of technology. Despite this, violations of professional conduct are common. We sought to explore professional behaviors specific to appropriate use of technology by looking at changes in third-year medical students' attitudes and behaviors at the beginning and conclusion of their clinical clerkships. After formal teaching about digital professionalism, we administered a survey to medical students that described 35 technology-related behaviors and queried students about professionalism of the behavior (on a 5-point Likert scale), observation of others engaging in the behavior (yes or no), as well as personal participation in the behavior (yes or no). Students were resurveyed at the end of the academic year. Over the year, perceptions of what is considered acceptable behavior regarding privacy, data security, communications, and social media boundaries changed, despite formal teaching sessions to reinforce professional behavior. Furthermore, medical students who observed unprofessional behaviors were more likely to participate in such behaviors. Although technology is a useful tool to enhance teaching and learning, our results reflect an erosion of professionalism related to information security that occurred despite medical school and hospital-based teaching sessions to promote digital professionalism. True alteration of trainee behavior will require a cultural shift that includes continual education, better role models, and frequent reminders for faculty, house staff, students, and staff. ©Arash Mostaghimi, Aleksandra E Olszewski, Sigall K Bell, David H Roberts, Bradley H Crotty. Originally published in JMIR Medical Education (http://mededu.jmir.org), 03.05.2017.

  13. Freedom, security and justice: the thin end of the wedge for biometrics?

    PubMed

    Lodge, Juliet

    2007-01-01

    This paper examines an area of EU policy where the application of information and communication tecnology (ICT) poses acutely difficult problems for policymakers: freedom, security and justice. It focuses on the absence of an ethical debate about the adoption of ICT-based instruments in this area. It highlights the implausibility of simply adopting codes of ethical practice from the health sector to close the public trust deficit. It argues that health and justice professionals need to cooperate in order to create a code of ethical e-governance fit for an e-governance age.

  14. The realities of partnership in person-centred care: a qualitative interview study with patients and professionals.

    PubMed

    Wolf, Axel; Moore, Lucy; Lydahl, Doris; Naldemirci, Öncel; Elam, Mark; Britten, Nicky

    2017-07-17

    Although conceptual definitions of person-centred care (PCC) vary, most models value the involvement of patients through patient-professional partnerships. While this may increase patients' sense of responsibility and control, research is needed to further understand how this partnership is created and perceived. This study aims to explore the realities of partnership as perceived by patients and health professionals in everyday PCC practice. Qualitative study employing a thematic analysis of semistructured interviews with professionals and patients. Four internal medicine wards and two primary care centres in western Sweden. 16 health professionals based at hospital wards or primary care centres delivering person-centred care, and 20 patients admitted to one of the hospital wards. Our findings identified both informal and formal aspects of partnership. Informal aspects, emerging during the interaction between healthcare professionals and patients, without any prior guidelines or regulations, incorporated proximity and receptiveness of professionals and building a close connection and confidence. This epitomised a caring, respectful relationship congruent across accounts. Formal aspects, including structured ways of sustaining partnership were experienced differently. Professionals described collaborating with patients to encourage participation, capture personal goals, plan and document care. However, although patients felt listened to and informed, they were content to ask questions and felt less involved in care planning, documentation or exploring lifeworld goals. They commonly perceived participation as informed discussion and agreement, deferring to professional knowledge and expertise in the presence of an empathetic and trusting relationship. In our study, patients appear to value a process of human connectedness above and beyond formalised aspects of documenting agreed goals and care planning. PCC increases patients' confidence in professionals who are competent and able to make them feel safe and secure. Informal elements of partnership provide the conditions for communication and cooperation on which formal relations of partnership can be constructed. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. Deception Using an SSH Honeypot

    DTIC Science & Technology

    2017-09-01

    the device itself but also the device’s cloud and mobile infrastructure. This increase in unsecured devices connected to the Internet presents...have SSH enabled on their systems without knowledge that this service is running. Computer -security professionals use several techniques to gain...early 2000s. Honeypots are decoy computer systems intended for no other purpose than to collect data on attackers. They gather information about

  16. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs—Summary Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.

    2013-07-01

    This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

  17. Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: no malicious intent.

    PubMed

    Jack, Caron; Singh, Yashik; Mars, Maurice

    2013-01-01

    Information and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the workplace and at home, and whether their current computer practices meets legal and ethical requirements. The aims of this study were to determine the use of computers by healthcare practitioners in the workplace and home; the use and approach to data storage, encryption and security of patient data and patient email; and the use of informed consent to transmit data by email. A self-administered questionnaire was administered to 400 health care providers from the state and private health care sectors. The questionnaire covered computer use in the workplace and at home, sharing of computers, data encryption and storage, email use, encryption of emails and storage, and the use of informed consent for email communication. 193 doctors and 207 nurses in the private and public sectors completed the questionnaire. Forty (10%) of participants do not use a computer. A third of health professionals were the only users of computers at work or at home. One hundred and ninety-eight respondents (55%) did not know if the data on the computers were encrypted, 132 (36.7%) knew that the data were not encrypted and 30 (8.3%) individuals knew that the data on the computers they were using were encrypted. Few doctors, 58 (16%), received emails from patients, with doctors more likely to receive emails from patients than nurses (p = 0.0025). Thirty-one percent of individuals did not respond to the emails. Emails were saved by 40 (69%) recipients but only 5 (12.5%) doctors encrypted the messages, 19 (47.5%) individuals knowingly did not encrypt and 16 (40.0%) did not know if they encrypted the data. While 20% of health professionals have emailed patient data, but only 41.7% gained consent to do so. Most health professionals as sampled in South Africa are not compliant with the National Health Act or the Electronic Communications Transactions Act of South Africa or guidelines from regulatory bodies when managing patient data on computers. Many appear ignorant or lack the ability to comply with simple data security procedures.

  18. The Impact of an eHealth Portal on Health Care Professionals' Interaction with Patients: Qualitative Study.

    PubMed

    Das, Anita; Faxvaag, Arild; Svanæs, Dag

    2015-11-24

    People who undergo weight loss surgery require a comprehensive treatment program to achieve successful outcomes. eHealth solutions, such as secure online portals, create new opportunities for improved health care delivery and care, but depend on the organizational delivery systems and on the health care professionals providing it. So far, these have received limited attention and the overall adoption of eHealth solutions remains low. In this study, a secure eHealth portal was implemented in a bariatric surgery clinic and offered to their patients. During the study period of 6 months, 60 patients and 5 health care professionals had access. The portal included patient information, self-management tools, and communication features for online dialog with peers and health care providers at the bariatric surgery clinic. The aim of this study was to characterize and assess the impact of an eHealth portal on health care professionals' interaction with patients in bariatric surgery. This qualitative case study involved a field study consisting of contextual interviews at the clinic involving observing and speaking with personnel in their actual work environment. Semi-structured in-depth interviews were conducted with health care professionals who interacted with patients through the portal. Analysis of the collected material was done inductively using thematic analysis. The analysis revealed two main dimensions of using an eHealth portal in bariatric surgery: the transparency it represents and the responsibility that follows by providing it. The professionals reported the eHealth portal as (1) a source of information, (2) a gateway to approach and facilitate the patients, (3) a medium for irrevocable postings, (4) a channel that exposes responsibility and competence, and (5) a tool in the clinic. By providing an eHealth portal to patients in a bariatric surgery program, health care professionals can observe patients' writings and revelations thereby capturing patient challenges and acting and implementing measures. Interacting with patients through the portal can prevent dropouts and deterioration of patients' health. However, professionals report on organizational challenges and personal constraints related to communicating with patients in writing online. Further development of guidelines and education of health care professionals about how to handle, prioritize, communicate, and facilitate patients online is required in addition to increased attention to the organizational infrastructures and incentives for enabling such solutions in health care.

  19. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  20. Developing an online professional network for veterinary education: the NOVICE project.

    PubMed

    Baillie, Sarah; Kinnison, Tierney; Forrest, Neil; Dale, Vicki H M; Ehlers, Jan P; Koch, Michael; Mándoki, Mira; Ciobotaru, Emilia; de Groot, Esther; Boerboom, Tobias B B; van Beukelen, Peter

    2011-01-01

    An online professional network for veterinarians, veterinary students, veterinary educationalists, and ICT (Information and Communication Technology) educationalists is being developed under the EU (European Union) Lifelong Learning Programme. The network uses Web 2.0, a term used to describe the new, more interactive version of the Internet, and includes tools such as wikis, blogs, and discussion boards. Focus groups conducted with qualified and student veterinarians within the project's five founding countries (The Netherlands, Germany, United Kingdom, Hungary, Romania) demonstrated that online professional communities can be valuable for accessing information and establishing contacts. Online networks have the potential to overcome common challenges to face-to-face communities-such as distance, cost, and timing-but they have their own drawbacks, such as security and professionalism issues. The Network Of Veterinary ICt in Education (NOVICE) was developed using Elgg, an open-source, free social networking platform, after several software options had been considered. NOVICE aims to promote the understanding of Web 2.0, confidence to use social software tools, and participation in an online community. Therefore, the Web site contains help sections, Frequently Asked Questions, and access to support from ICT experts. Five months after the network's launch (and just over one year into the project) 515 members from 28 countries had registered. Further research will include analysis of a core group's activities, which will inform ongoing support for and development of informal, lifelong learning in a veterinary context.

  1. Assessment of the work environment of faculty of a Medical College in Pakistan.

    PubMed

    Saeed, Abid; Butt, Zahid Ahmad

    2014-01-01

    Extensive research is done on nursing work environments but less is known about the job conditions and environments of other health professionals. This study was aimed to fill this information gap by highlighting the factors affecting the work environment and stressors causing turnover of staff. A cross sectional study was conducted in Bolan Medical College Quetta for the assessment of working environment of the faculty from 22nd April to 22nd July 2012. All permanent teaching staff was included. A structured questionnaire was adopted fromI health sciences association of Alberta (HSSA), 2006 work Environment Survey. An observational check list for assessment of the physical environment /infrastructure and other general physical stuff was used. The faculty menibers were-not-satisfied with the security and safety of their work place but were satisfied with salaries, employer, and management. Work teams and relationship between employees and employers were respectful with good communication. Majority found their work times stressful and opportunities for on job trainings and professional development, adequate tools, equipment and conditions were mostly lacking. The overall working environment is not that good and few areas need serious attention like: professional development, trainings, adequate equipment, and security.

  2. Between security and military identities: The case of Israeli security experts.

    PubMed

    Grassiani, Erella

    2018-02-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.

  3. Between security and military identities: The case of Israeli security experts

    PubMed Central

    Grassiani, Erella

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228

  4. [Data security and the handling of patient data in home monitoring systems].

    PubMed

    Heydenreich, F; Jürgens, C; Tost, F

    2009-09-01

    Data security must be considered seriously in the context of telemedical home monitoring because of the transmission and communication of patients' personal data. The contract governing medical treatment allows the ophthalmologist to process all data relevant to treatment. In Germany the legal framework for this purpose is provided by the Data Protection Act, various German hospital acts, and codes of medical professional conduct. In principle, these rules apply to telemedical home monitoring as well as to common physician-patient relationships. The patient must be informed extensively in an understandable manner and must give his or her written consent. However, the advanced options of new IT technologies demand the development of technical and organizational concepts that guarantee compliance with legal and regulatory affairs, assure data security, and prevent data abuse.

  5. Role of the U.S. Military in the Professionalization of the Armed Forces of Liberia

    DTIC Science & Technology

    2015-06-12

    professionalizing the AFL. The GEF states, “Partner nations provide for their own security, contribute effectively to broader regional or global security...facilitates the development of important professional and personal relationships that effectively strengthen military alliances and the international...Forces of Liberia (AFL) presents a developing opportunity to contribute to the broader U.S. interests. However, in order to ensure stability within

  6. Commitment to nursing: results of a qualitative interview study.

    PubMed

    Gould, Dinah; Fontenla, Marina

    2006-04-01

    The aims of the study were to explore opportunities to undergo continuing professional education, family friendly policy and holding an innovative or traditional post on nurses' job satisfaction and professional and organizational commitment. Qualified nurses have become a scare resource in the National Health Service. Managers need to be aware of the work-related factors most likely to secure nurses' professional and organizational commitment which will contribute to the retention. Commitment is thought to be increased if opportunities for continuing professional education are good. Family friendly policy is also important. Less is known about the relationship between type of nursing work and commitment. An in-depth, exploratory approach to data collection were taken, employing an interview guide with open-ended questions. Data were collected with 27 nurses in clinical grades in two contrasting trusts. Family friendly policies emerged as most important in securing nursing commitment. Those in innovative posts whose work entailed social hours and greater professional autonomy also displayed greater levels of job satisfaction. Opportunities for continuing professional education had less influence on professional and organizational commitment. Providing flexible or social working hours appears to be more influential than providing opportunities for continuing professional education in securing nursing commitment in this exploratory study.

  7. Petroleum Geology and the securities laws: Implications for professional practice

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, D.M. Jr.; Achuff, C.H.

    1991-03-01

    Many geologists' practice includes such activities as recommending prospects, estimating reserves, and assembling drilling deals. When other people's money is used to finance these and other activities, the geologist, knowingly or not, becomes subject to the securities laws. Full disclosure to investors of all relevant information is the primary securities law principle affecting geological practice. In particular, geologic recommendations or reports reaching investors must effectively communicate both the upside potential and the downside risks of the project. If investors feel misled, the geologist may be sued for statements made in or based on his or her reports or for failingmore » to discuss significant factors. To reduce this risk, professional reports should state the date of the report, what was done, for whom, what data and underlying assumptions were used, what remains to be done, what is recommended, and whether distribution of the report should be restricted, among other things. Always retain a copy in case questions about the report's contents arise. Remember, reports tend to be passed along with the project and can be used or misused several years later by successors in interest in the project. In today's litigious society, there is an increasing likelihood that geologists may have to defend their work in court. Geologists should be aware of the impact of the securities and other laws on their practice.« less

  8. Web-based Factors Affecting Online Purchasing Behaviour

    NASA Astrophysics Data System (ADS)

    Ariff, Mohd Shoki Md; Sze Yan, Ng; Zakuan, Norhayati; Zaidi Bahari, Ahamad; Jusoh, Ahmad

    2013-06-01

    The growing use of internet and online purchasing among young consumers in Malaysia provides a huge prospect in e-commerce market, specifically for B2C segment. In this market, if E-marketers know the web-based factors affecting online buyers' behaviour, and the effect of these factors on behaviour of online consumers, then they can develop their marketing strategies to convert potential customers into active one, while retaining existing online customers. Review of previous studies related to the online purchasing behaviour in B2C market has point out that the conceptualization and empirical validation of the online purchasing behaviour of Information and Communication Technology (ICT) literate users, or ICT professional, in Malaysia has not been clearly addressed. This paper focuses on (i) web-based factors which online buyers (ICT professional) keep in mind while shopping online; and (ii) the effect of web-based factors on online purchasing behaviour. Based on the extensive literature review, a conceptual framework of 24 items of five factors was constructed to determine web-based factors affecting online purchasing behaviour of ICT professional. Analysis of data was performed based on the 310 questionnaires, which were collected using a stratified random sampling method, from ICT undergraduate students in a public university in Malaysia. The Exploratory factor analysis performed showed that five factors affecting online purchase behaviour are Information Quality, Fulfilment/Reliability/Customer Service, Website Design, Quick and Details, and Privacy/Security. The result of Multiple Regression Analysis indicated that Information Quality, Quick and Details, and Privacy/Security affect positively online purchase behaviour. The results provide a usable model for measuring web-based factors affecting buyers' online purchase behaviour in B2C market, as well as for online shopping companies to focus on the factors that will increase customers' online purchase.

  9. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  10. Information Assurance and Forensic Readiness

    NASA Astrophysics Data System (ADS)

    Pangalos, Georgios; Katos, Vasilios

    Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.

  11. Holding personal information in a disease-specific register: the perspectives of people with multiple sclerosis and professionals on consent and access.

    PubMed

    Baird, W; Jackson, R; Ford, H; Evangelou, N; Busby, M; Bull, P; Zajicek, J

    2009-02-01

    To determine the views of people with multiple sclerosis (MS) and professionals in relation to confidentiality, consent and access to data within a proposed MS register in the UK. Qualitative study using focus groups (10) and interviews (13). England and Northern Ireland. 68 people with MS, neurologists, MS nurses, health services management professionals, researchers, representatives from pharmaceutical companies and social care professionals. People with MS expressed open and altruistic views towards the use of their personal information to facilitate service provision and research, placing trust in responsible guardianship and legitimate use of their information. Participant's proposed that people with MS should be able to select their individual level of involvement in a register using levels of consent. It was agreed that access to the register should be governed by a guardianship committee composed of a range of stakeholders. People with MS did not wish their details to be used by marketing agencies and did not consider this a legitimate use of their data. Whilst participants were positive of the role a register could play in promoting research, participants felt that access to data by pharmaceutical industries should be administered by the guardianship committee. People with MS are concerned should their employers be able to access their personal information. Professionals were more cautious than people with MS in their approach to the use of patient personal data within a register. Whilst all stakeholders were positive of the benefits of an MS register, development of such a resource must incorporate robust data security and guardianship measures in order to ensure that, whilst opportunities are maximised, risks to the privacy of individuals and legal challenges to professionals are avoided.

  12. Integrating Top-down and Bottom-up Cybersecurity Guidance using XML

    PubMed Central

    Lubell, Joshua

    2016-01-01

    This paper describes a markup-based approach for synthesizing disparate information sources and discusses a software implementation of the approach. The implementation makes it easier for people to use two complementary, but differently structured, guidance specifications together: the (top-down) Cybersecurity Framework and the (bottom-up) National Institute of Standards and Technology Special Publication 800-53 security control catalog. An example scenario demonstrates how the software implementation can help a security professional select the appropriate safeguards for restricting unauthorized access to an Industrial Control System. The implementation and example show the benefits of this approach and suggest its potential application to disciplines other than cybersecurity. PMID:27795810

  13. The use of information and communication technology (ICT) in dentistry.

    PubMed

    Knott, N J

    2013-02-01

    As the use of information and communication technology (ICT) becomes more widespread in dentistry the risk of breaching electronic commerce laws and patient confidentiality increases. It is necessary to be aware of the responsibilities internet usage entails, especially within a dental practice where the protection of patient information is of the utmost importance. More should be done to outline the various precautions that should be taken to ensure ICT security within the professional domain, as it would appear dentistry has been neglected with regard to receiving the proper ICT education, training and support systems.

  14. Perceptions of the importance and control of professional problems in the clinical setting.

    PubMed

    Maupomé, G; Borges-Yáñez, S A; Dáez-de-Bonilla, F J; Pineda-Cruz, A

    2001-01-01

    The objective of this study was to identify the relative importance of culturally relevant professional problems and the degree of control over them, as perceived by dentists and dental students in Mexico City, Mexico. The dentists and students ranked 13 problems according to importance and then according to the perceived degree of control over each one. Novice clinicians were less secure about their ability to cope with the legal, financial, and clinical performance problems, whereas experienced clinicians were more concerned about occupational hazards and the dental market and culture. Both reported similar perceptions of their control of the problems. This preliminary information should support introducing into dental schools relevant practice-management courses, targeting continuing education efforts, and instituting professional counseling measures to meet the challenges posed by these problems.

  15. Is emergency management an integrated element of business continuity management? A case study with security professionals in Western Australia.

    PubMed

    Frohde, Kenny; Brooks, David J

    Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.

  16. Security auditing: a prescription for keeping protection programs healthy.

    PubMed

    Luizzo, Anthony

    2010-01-01

    The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.

  17. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eipeldauer, Mary D; Shelander Jr, Bruce R

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less

  18. [Early prenatal interview: implementation of a sheet link "carried" by patient. The Aurore perinatal network experience].

    PubMed

    Dupont, C; Gonnaud, F; Touzet, S; Luciani, F; Perié, M-A; Molenat, F; Evrard, A; Fernandez, M-P; Roy, J; Rudigoz, R-C

    2008-11-01

    Early prenatal interview has needed the implementation of a new communication tool between follow-up pregnancy professionals: a link sheet filled and carried by patients. To assess the utilization of link sheet by trained professionals, the contribution of the interview and the patient acceptation of the link sheet. Descriptive survey from the database of link sheets returned by professionals to Aurore perinatal network and semi-guided interviews with 100 randomized patients. One thousand one hundred and nineteen link sheets were sent to Aurore perinatal network by 55 professionals out of 78 trained. For primipare, precocious prenatal interview contribution has concerned health care security (60%) and emotional security (56%). For multipare, this contribution has concerned mainly emotional security (80%). No interviewed patient has refused link sheet principle. Link sheet principle, like implemented by Aurore perinatal network, seems pertinent to professionals and patients but it constitutes only one of the elements of network elaboration of personalized care.

  19. Revitalization of food barns in supporting sustainable food security in Central Java

    NASA Astrophysics Data System (ADS)

    Riptanti, E. W.; Qonita, A.; Suprapti

    2018-02-01

    Rice barns have been developed in some areas in Central Java, but several problems seem to appear, leading to nonoptimal functions of nonactive food barns. The present article aims to examine revitalization of food barns through systematic, integrated, and sustainable empowerment. The research design is exploratory research to generate data that are in-depth qualitative and quantitative. Survey was applied in four regencies including Wonogiri, Purworejo, Temanggung, and Batang. Key informants comprise caretakers of food barns, village apparatus, public figures, and Food Security Office apparatus. The research results revealed that the food barns have not been managed in professional manners. Active roles of all members and caretakers, village government, and Food Security Agency are, therefore, required in revitalizing the food barns. In order to perform social functions well, the food barns should be profit-oriented to achieve sustainability.

  20. Facilitating Secure Sharing of Personal Health Data in the Cloud.

    PubMed

    Thilakanathan, Danan; Calvo, Rafael A; Chen, Shiping; Nepal, Surya; Glozier, Nick

    2016-05-27

    Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors.

  1. Are personal health records safe? A review of free web-accessible personal health record privacy policies.

    PubMed

    Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-08-23

    Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.

  2. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies

    PubMed Central

    Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    Background Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information. Objective To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. Methods We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. Results The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users’ accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Conclusions Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low. PMID:22917868

  3. Fiscal Year 2014 Annual Report on BNLs Next Generation Safeguards Initiative Human Capital Development Activities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pepper, Susan E.

    2014-10-10

    Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.

  4. Ethical considerations in internet use of electronic protected health information.

    PubMed

    Polito, Jacquelyn M

    2012-03-01

    Caregivers, patients, and their family members are increasingly reliant on social network websites for storing, communicating, and referencing medical information. The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule seeks balance by protecting the privacy of patients' health information and assuring that this information is available to those who need it to provide health care. Though federal and state governments have created laws and policies to safeguard patient privacy and confidentiality, the laws are inadequate against the rapid and innovative use of electronic health websites. As Internet use broadens access to information, health professionals must be aware that this information is not always secure. We must identify and reflect on medical ethics issues and be accountable for maintaining privacy for the patient.

  5. ICT and the future of healthcare: Aspects of pervasive health monitoring.

    PubMed

    Haluza, Daniela; Jungwirth, David

    2018-01-01

    Along with the digital revolution, information and communication technology applications are currently transforming the delivery of health and social care services. This paper investigates prevailing opinions toward future technology-based healthcare solutions among Austrian healthcare professionals. During a biphasic online Delphi survey, panelists rated expected outcomes of two future scenarios describing pervasive health monitoring applications. Experts perceived that the scenarios were highly innovative, but only moderately desirable, and that their implementation could especially improve patients' knowledge, quality of healthcare, and living standard. Contrarily, monetary aspects, technical prerequisites, and data security were identified as key obstacles. We further compared the impact of professional affiliation. Clearly, opinions toward pervasive healthcare differed between the interest groups, medical professionals, patient advocates, and administrative personnel. These data suggest closer collaborations between stakeholder groups to harmonize differences in expectations regarding pervasive health monitoring.

  6. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    PubMed

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  7. A Portable Computer Security Workshop

    ERIC Educational Resources Information Center

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  8. A Security Checklist for ERP Implementations

    ERIC Educational Resources Information Center

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  9. [Information, knowledge and healthcare practice: professionals participation as the key element of the gear].

    PubMed

    Adam, Paula; Permanyer-Miralda, Gaietà; Solà-Morales, Oriol; Canela-Soler, Jaume

    2010-02-01

    This article analyzes the role of ICT within the complicated gear between information, knowledge and healthcare practices, which particular focus on two specific cases: the digitalization process of the healthcare system and the application of knowledge into the healthcare practices. In both cases, international and local experiences suggest, and sometimes demonstrate the importance of the participation, capacity-building and empowerment of healthcare practitioners for the generation, transfer and use of information and knowledge empowered by the digital tools which should bring into the system better performance, more efficacy, efficiency, equity, equality, security, quality. 2010 Elsevier España S.L. All rights reserved.

  10. An analysis of the management and leadership roles of nurses relative to the health insurance portability and accountability act.

    PubMed

    Kiel, Joan M

    2015-01-01

    Nurses have a great deal of interaction with patients. Given this, nurses play a vital role in conveying to patients knowledge of their privacy, security, and confidentiality of patient health information rights under the Health Insurance Portability and Accountability Act (HIPAA). Nurses also can be "at the head of the table" in their own organization and professional organizations in regard to facilitating the implementation of the HIPAA and making access to patient information more "consumer friendly." This article discusses the role that nurses can develop into concerning HIPAA implementation in an ever-burgeoning arena of consumer advocacy and consumer information.

  11. The Impact of an eHealth Portal on Health Care Professionals’ Interaction with Patients: Qualitative Study

    PubMed Central

    Faxvaag, Arild; Svanæs, Dag

    2015-01-01

    Background People who undergo weight loss surgery require a comprehensive treatment program to achieve successful outcomes. eHealth solutions, such as secure online portals, create new opportunities for improved health care delivery and care, but depend on the organizational delivery systems and on the health care professionals providing it. So far, these have received limited attention and the overall adoption of eHealth solutions remains low. In this study, a secure eHealth portal was implemented in a bariatric surgery clinic and offered to their patients. During the study period of 6 months, 60 patients and 5 health care professionals had access. The portal included patient information, self-management tools, and communication features for online dialog with peers and health care providers at the bariatric surgery clinic. Objective The aim of this study was to characterize and assess the impact of an eHealth portal on health care professionals’ interaction with patients in bariatric surgery. Methods This qualitative case study involved a field study consisting of contextual interviews at the clinic involving observing and speaking with personnel in their actual work environment. Semi-structured in-depth interviews were conducted with health care professionals who interacted with patients through the portal. Analysis of the collected material was done inductively using thematic analysis. Results The analysis revealed two main dimensions of using an eHealth portal in bariatric surgery: the transparency it represents and the responsibility that follows by providing it. The professionals reported the eHealth portal as (1) a source of information, (2) a gateway to approach and facilitate the patients, (3) a medium for irrevocable postings, (4) a channel that exposes responsibility and competence, and (5) a tool in the clinic. Conclusions By providing an eHealth portal to patients in a bariatric surgery program, health care professionals can observe patients’ writings and revelations thereby capturing patient challenges and acting and implementing measures. Interacting with patients through the portal can prevent dropouts and deterioration of patients’ health. However, professionals report on organizational challenges and personal constraints related to communicating with patients in writing online. Further development of guidelines and education of health care professionals about how to handle, prioritize, communicate, and facilitate patients online is required in addition to increased attention to the organizational infrastructures and incentives for enabling such solutions in health care. PMID:26601678

  12. A web-based communication system for integrated care in cerebral palsy: design features, technical feasibility and usability.

    PubMed

    Gulmans, Jitske; Vollenbroek-Hutten, Miriam M R; Visser, Jacqueline J W; Nijeweme-d'Hollosy, Wendy Oude; van Gemert-Pijnen, J E W C Lisette; van Harten, Wim H

    2010-01-01

    We developed a secure, web-based system for parent-professional and inter-professional communication. The aim was to improve communication in the care of children with cerebral palsy. We conducted a six-month trial of the system in three Dutch health-care regions. The participants were the parents of 30 cerebral palsy patients and 120 professional staff involved in their care. Information about system usage was extracted from the system's database. The experience of the parents and professionals was evaluated by a questionnaire after six months. The system proved to be technically robust and reliable. A total of 21 parents (70%) and 66 professionals (55%) used the system. The parents submitted 111 questions and 59 responses, with a mean of 5 questions (range 1-17) and 3 responses (range 1-9) per parent. The professionals submitted 79 questions and 237 responses, with a mean of 2 questions (range 1-8) and 4 responses (range 1-23) per professional. Most parents (95%) and some professionals (30%) reported value in using the system, which ranged from efficiency and accessibility to flexibility and transparency. The web-based communication system was technically feasible and produced improved parent-professional and inter-professional communication. It may be especially valuable if frequent interventions or consultations about a child's care are required, involving complex care networks of different professionals and organisations.

  13. Dimensions of professional labor support for intrapartum practice.

    PubMed

    Sauls, Donna J

    2006-01-01

    To define and describe the dimensions of Professional Labor Support (PLS). A factor-analytic study was conducted with a random sample of 146 intrapartum nurses in Texas. Nurses' responses to the Labor Support Questionnaire (LSQ) were subjected to principal components analysis and descriptive analysis. A six-factor solution indicated the dimensions of PLS: Tangible Support, Advocacy, Emotional Support-Reassurance, Emotional Support-Creating Control, Security and Comfort, Emotional Support-Nurse Caring Behavior, and Informational Support. Although the presence of four dimensions was theorized, six dimensions were found. The emotional support dimension was identified by nurses as being an important component of labor support as indicated by the identification of three separate emotional support dimensions.

  14. Workplace Violence: Practical Considerations for Mental Health Professionals in Consultation, Assessment, and Management of Risk.

    PubMed

    Saragoza, Philip; White, Stephen G

    2016-12-01

    Workplace predatory violence has been the focus of increased study over the past 30 years, leading to a more sophisticated understanding of the factors that contribute to it, and important considerations for its assessment and management. Risk assessment professionals involved in workplace violence consultations should be mindful of issues specific to the workplace context and the principles of threat assessment to provide a more precise opinion of risk, to inform and enhance critical decisions regarding the employment status of the individual of concern, security measures, possible treatment options, and other management responses, while being mindful of the employee's certain rights. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Concerns about usage of smartphones in operating room and critical care scenario

    PubMed Central

    Attri, JP; Khetarpal, R; Chatrath, V; Kaur, J

    2016-01-01

    Smartphones and tablets have taken a central place in the lives of health care professionals. Their use has dramatically improved the communication and has become an important learning tool as the medical information can be assessed online at anytime. In critical care settings, use of smartphone facilitates quick passage of information through E-mail messaging and getting feedback from the concerned physician quickly, thereby reducing medical errors. However, in addition to the benefits offered, these devices have become a significant source of nosocomial infections, distraction for medical professionals and interfere with medical equipments. They may also put privacy and security of patients at stake. The benefits could be severely undermined if abuse and over use are not kept in check. This review article focuses on various applications of smartphones in healthcare practices, drawback of the use of these devices and the recommendations regarding the safe use of these devices. PMID:26952181

  16. Concerns about usage of smartphones in operating room and critical care scenario.

    PubMed

    Attri, J P; Khetarpal, R; Chatrath, V; Kaur, J

    2016-01-01

    Smartphones and tablets have taken a central place in the lives of health care professionals. Their use has dramatically improved the communication and has become an important learning tool as the medical information can be assessed online at anytime. In critical care settings, use of smartphone facilitates quick passage of information through E-mail messaging and getting feedback from the concerned physician quickly, thereby reducing medical errors. However, in addition to the benefits offered, these devices have become a significant source of nosocomial infections, distraction for medical professionals and interfere with medical equipments. They may also put privacy and security of patients at stake. The benefits could be severely undermined if abuse and over use are not kept in check. This review article focuses on various applications of smartphones in healthcare practices, drawback of the use of these devices and the recommendations regarding the safe use of these devices.

  17. Education and training in the MEDICOM system.

    PubMed

    Marinos, G; Palamas, S; Vlachos, I; Panou-Diamandi, O; Kalivas, D; Koutsouris, D

    2000-01-01

    MEDICOM system is a world wide telematics application for electronic commerce of medical devices. It has been designed so as to provide the health care professionals with a central Internet access to up-to-date information about medical equipment from multiple manufacturers, in a particular easy and friendly way. Moreover, the Medicom system will serve the health care professionals' requirements for high-quality information about specific products in a form of multimedia presentations and that of a secure communication channel with the community of manufacturers, especially for post marketing surveillance. The system will provide the medical staff (physicians and technicians) with demonstrations of the operation procedures and the functioning of high-tech equipment in a form of virtual models. Moreover, through the medicom system the end users of medical devices can have access to on line libraries and participate in special newsgroups. This paper discusses the architectural structure of the MEDICOM system with emphasis to its educational and training functionality.

  18. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    PubMed Central

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271

  19. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    PubMed

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.

  20. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    PubMed Central

    2011-01-01

    Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967

  1. Modeling and 3D Visualization for Evaluation of Anti-Terrorism/Force Protection Alternatives: Phase II Final Report

    DTIC Science & Technology

    2006-11-21

    SCHOOL Monterey, California 93943-5000 COL David A. Smarsh, USAF Dr. Leonard A. Ferrari Acting President...1.3.6 Planet 9 Studios David Colleen, CEO Chris Greuel, 3D Model Engineer Dan Ancona, Documentation and Training Carlos Newcomb, 3D Imagery...informational forum of M&S professionals working in the service of naval installation security. David Colleen, CEO, Planet 9 Studios, gave a

  2. Influence of professional drivers' personality traits on road traffic safety: case study.

    PubMed

    Živković, Snežana; Nikolić, Vesna; Markič, Mirko

    2015-01-01

    The purpose of this paper is to present basic elements of the research directed at identifying and determining the personality traits of professional drivers that affect safe, secure and enjoyable ride on public roads. A quantitative method has been used here, whereas data were acquired from a questionnaire based on a sample of 59 professional drivers. Determining personality traits of professional drivers that are in correlation with a safe and pleasant ride on the roads has been enabled by applying the five-factor model of personality ('Big Five') and the Personality Inventory NEO-PI. From these results it was concluded that safe operation of the vehicle in traffic involves the successful 'conduct' of oneself, which recognises the importance of certain personality traits of professional drivers for traffic safety and the need for appropriate professional selection in the case of employment of professional drivers. Research results implicate development of educational programmes aimed at achieving harmony of psychological, physical and sensory health, that is, programmes for permanent informing, educating and training professional drivers for defensive driving. The research opens the way for new research tasks that should help in creating a specific structure of curricula that can be used in a variety of transportation companies and enterprises to improve general and public safety.

  3. Analyzing commercial flight crewmember perceptions' regarding airline security effectiveness, morale, and professionalism

    NASA Astrophysics Data System (ADS)

    Belanger, James Durham

    Since the formation of the Transportation Security Administration (TSA) following the September 11, 2001 terrorist's attacks few studies involving commercial flight crewmember perceptions' of the organization's efficacy have been conducted, nor has there been any research into the effects on crewmember morale and professionalism resulting from their interactions with the TSA. This researcher surveyed 624 flight crewmembers, using a multiple-choice instrument to ascertain both their perceptions of TSA effectiveness involving an array of security issues, in addition to how crewmember interactions with the TSA may have affected their morale and professionalism. A 2-sample t-test measured the difference in the means of pilots and flight attendants regarding the study's scope, as did 2-way ANOVA and Tukey HSD comparisons, which factored in gender. The study found that crewmembers indicated some confidence in the areas of passenger and baggage screening and the Armed Pilot Program, with less confidence regarding ancillary personnel screening, airport perimeter security, and in both crewmember anti-terrorist training and human error issues. Statistical testing indicated varying differences in sample means concerning all study related issues. Finally, crewmembers indicated some effects on morale and professionalism, with a majority indicating a negative effect on both.

  4. Safety and Security Interface Technology Initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less

  5. THE NEXT GENERATION SAFEGUARDS PROFESSIONAL NETWORK: PROGRESS AND NEXT STEPS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhernosek, Alena V; Lynch, Patrick D; Scholz, Melissa A

    2011-01-01

    President Obama has repeatedly stated that the United States must ensure that the international safeguards regime, as embodied by the International Atomic Energy Agency (IAEA), has 'the authority, information, people, and technology it needs to do its job.' The U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA) works to implement the President's vision through the Next Generation Safeguards Initiative (NGSI), a program to revitalize the U.S. DOE national laboratories safeguards technology and human capital base so that the United States can more effectively support the IAEA and ensure that it meets current and emerging challenges to the internationalmore » safeguards system. In 2009, in response to the human capital development goals of NGSI, young safeguards professionals within the Global Nuclear Security Technology Division at Oak Ridge National Laboratory launched the Next Generation Safeguards Professional Network (NGSPN). The purpose of this initiative is to establish working relationships and to foster collaboration and communication among the next generation of safeguards leaders. The NGSPN is an organization for, and of, young professionals pursuing careers in nuclear safeguards and nonproliferation - as well as mid-career professionals new to the field - whether working within the U.S. DOE national laboratory complex, U.S. government agencies, academia, or industry or at the IAEA. The NGSPN is actively supported by the NNSA, boasts more than 70 members, maintains a website and newsletter, and has held two national meetings as well as an NGSPN session and panel at the July 2010 Institute of Nuclear Material Management Annual Meeting. This paper discusses the network; its significance, goals and objectives; developments and progress to date; and future plans.« less

  6. Design and implementation of a smart card based healthcare information system.

    PubMed

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  7. 7 CFR 1940.336 - Contracting for professional services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Contracting for professional services. 1940.336... Contracting for professional services. (a) Assistance from outside experts and professionals can be secured... conflict of interest, contractors competing for the work will be required to execute a disclosure statement...

  8. Realizing Informed Consent in Times of Controversy: Lessons from the SUPPORT Study.

    PubMed

    Morse, Robert J; Wilson, Robin Fretwell

    2016-09-01

    This Essay examines the elegantly simple idea that consent to medical treatment or participation in human research must be "informed" to be valid. It does so by using as a case study the controversial clinical research trial known as the Surfactant, Positive Pressure, and Oxygenation Randomized Trial ("SUPPORT"). The Essay begins by charting, through case law and the adoption of the common rule, the evolution of duties to secure fully informed consent in both research and treatment. The Essay then utilizes the SUPPORT study, which sought to pinpoint the level of saturated oxygen that should be provided to extremely low birth weight infants to demonstrate modern complexities and shortcomings of the duty to secure informed consent. This Essay shows how the duty is measured by foreseeability of risks and benefits in human research and why federal regulators believed the trade-offs in risk and benefits from differing oxygen levels administered in the support study were foreseeable. It then explores the contours of the duty to secure informed consent when applied to researchers who also serve as treating physicians, highlighting how common law duties differ in jurisdictions that apply the professional standard and those that apply the patient-centered material risk standard. This Essay provides new insight into what the law must do to make real the notion that [e]very human being of adult years and sound mind has a right to determine what shall be done with his body." © 2016 American Society of Law, Medicine & Ethics.

  9. Evolving the Role of Campus Security

    ERIC Educational Resources Information Center

    May, Vern

    2008-01-01

    One of the problems security professionals see in security is that there are few benchmarks to quantify the effectiveness of proactive security initiatives. This hurts them with funding support and also with ensuring community buy-in outside of crisis situations. The reactive nature of many institutions makes it difficult to move forward with…

  10. Exploring the Educational Needs of the Homeland Security Community

    ERIC Educational Resources Information Center

    France, Paul

    2012-01-01

    This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…

  11. Caveats of smartphone applications for the cardiothoracic trainee.

    PubMed

    Edlin, Joy C E; Deshpande, Ranjit P

    2013-12-01

    The clinical environment is becoming increasingly dominated by information technology, most recently the smartphone with its applications (apps) of a multitude of uses. There are already tens of thousands of medical apps available for download, to educate both patients and trainees, and many more are being designed to facilitate delivery of care. The rapid development of this technology has outgrown its quality evaluation and regulation, both urgently required to maintain patient safety, protect sensitive data, and ensure dissemination of accurate information. We review medical apps themed towards cardiothoracic surgery in terms of medical professional involvement in their content and design. iTunes and Play Store were searched for cardiothoracic surgery-themed medical apps, using the terms cardiothoracic, thoracic, cardiac, heart, lung, surgery, and variations thereof and including the term medical. A focused search yielded 379 apps, of which 6% were associated with a named medical professional, 15% with a publisher or professional society, and 63% with a user rating. The findings suggest inadequate input from the medical profession. The article discusses the pressing issues regarding quality evaluation, regulation, and information security, required for smartphones and handheld devices to become an integral and safe part of delivery of care. Copyright © 2013 The American Association for Thoracic Surgery. Published by Mosby, Inc. All rights reserved.

  12. [Concept for a National Implant Registry to Improve Patient Safety].

    PubMed

    Prantl, L; von Fritschen, U; Liebau, J; von Hassel, J; Baur, E M; Vogt, P M; Giunta, R E; Horch, R E

    2016-12-01

    Since the introduction of silicone implants, several events have led to considerable uncertainty among the patients, public, and users. So far, however, the necessary steps to significantly improving patient safety have not been taken in any of these cases. Requiring stricter approvals for medical devices, improving monitoring by the regulatory authorities and the revision of the Medical Devices Directive are all initial steps in the right direction towards a change in policy, but are insufficient as an early warning system. After the introduction of registers was announced in the coalition agreement, the German Society of Plastic, Aesthetic and Reconstructive Surgeons (DGPRÄC), in close consultation with the Ministry of Health, has developed a concept which is presented here. The need for a uniform and legally binding central register for breast implants is fully supported by the entire medical profession. According to the concept presented by the DGPRÄC, three data qualities would be applicable: Safety data (mandatory), physician information (voluntary) and research data (optional, except if safety related). The public authorities are creating a unified, secure entry portal for all professional associations concerned. This register is based with the professional associations, and from there the mandatory security data will be forwarded to the public authorities. Decoding of the identity of the patient and doctor would only occur in specifically defined emergency situations such as product recalls. Automated tools in the security database provide early detection of problems, so that rapid clarification is possible in consultation with the professional associations, manufacturers and possibly patients. This concept as proposed by the DGPRÄC has thus far been very positively received in all discussions between the various parties concerned. © Georg Thieme Verlag KG Stuttgart · New York.

  13. How can the German Electronic Health Card support patient's role in care management.

    PubMed

    Pharow, Peter; Blobel, Bernd; Hildebrand, Claudia

    2008-01-01

    All types of advanced communication, collaboration, and cooperation in healthcare require a strong involvement of all addressed parties including health professionals and patients. Modern healthcare aims at involving patients having them take over responsibility for their own health status. Allowing them to take on their changed roles as emancipated partners in advanced care management, health professionals need to be educated and patients need to be empowered. From a security viewpoint, health issues have to be communicated via trusted health networks. To provide communication and cooperation between professionals and patients as well as to guarantee the required level of involvement of patients in shared care management environments, cards are widely used as person identifiers, on the one hand, and as security tokens, on the other. Being introduced as storage media and portable personalized application system, cards enable a patient controlled access to personalized health services as well as proper use and exchange of personal health data for specific purposes such as emergency. Furthermore, cards allow access to the wider electronic patient record via pointers or tickets. Cards can empower patients. The German Electronic Health Card (eGK) shall thus support care management and specific workflow processes e.g. for prescription and disease management. Regardless whether designed as data or pointer card - international standardization is a prerequisite also for national solutions. The more information patients have regarding different procedures and processes in healthcare, the more are they able to play their dedicated role within care management. Cards can and will contribute by allowing patients to get controlled access to administrative and medical data stored either on cards or in networks. Card holders determine who has access to their health information.

  14. "The support I need": women's experiences of social support after having received breast cancer diagnosis and awaiting surgery.

    PubMed

    Drageset, Sigrunn; Lindstrøm, Torill C; Giske, Tove; Underlid, Kjell

    2012-01-01

    Social support is associated with a better adjustment to breast cancer, whereas inadequate social support increases psychological distress. However, the period between diagnosis and surgery is particularly stressful, and few studies have addressed the significance of social support in this period. The purpose of this study was to describe women's individual experiences of social support after having received a breast cancer diagnosis and awaiting surgery. A qualitative descriptive design was used. Individual semistructured interviews were conducted the day before surgery with 21 women aged 41 to 73 years with newly diagnosed breast cancer at a Norwegian university hospital. Methods of qualitative meaning condensation analysis revealed 5 themes: available support, information and advice, care, having confidants, and balancing distance and closeness. Knowing that both family and healthcare professionals were available and caring gave a sense of security. Social support gave strength, although too much could be experienced as difficult and frightening. The women needed a balance between distance from and closeness to their social network. Both professional information and someone professional with whom to talk personally were essential. Social support is an important resource for women with breast cancer but can be a double-edged sword as the network's offered support can sometimes be a burden. Healthcare professionals could call each patient, encourage the patients to call if they want, and, if preferred, offer face-to-face consultations for women with breast cancer awaiting surgery. This contact should be a supportive, informative, and confidential available resource.

  15. Rights of dental patients in the EU - a legal assessment.

    PubMed

    Van den Bossche, Anne-Marie; Ploscar, Paula

    2012-11-30

    This contribution presents the legal framework for intra-European mobility of dental patients. After presenting the EU competences in respect of healthcare and a brief look into the various routes of patient mobility, the article sets out the rules for access to dental care, treatment abroad and reimbursement through social security. In addition, we focus on the impact of European Union (EU) law upon national systems in respect of professional insurance, complaints procedures and information mechanisms. In conclusion, we reflect on the development in EU law of an independent set of rights to cross-border dental care and its consequences for financing and reimbursement of care, as well as for national practices in respect of professional liability and insurance.

  16. Access and privacy rights using web security standards to increase patient empowerment.

    PubMed

    Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E

    2008-01-01

    Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer such principles into national laws. A perspective is given on the state of the art concerning web security standards, which can be used to easily engineer health information systems complying with the patient empowering goals. In conclusion health systems with the characteristics thus described are technically feasible and should be generally implemented and deployed.

  17. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    PubMed Central

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  18. Facilitating Secure Sharing of Personal Health Data in the Cloud

    PubMed Central

    Nepal, Surya; Glozier, Nick

    2016-01-01

    Background Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. Objective This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. Methods We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). Results We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. Conclusions We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors. PMID:27234691

  19. The Knowledge Work of Professional Associations: Approaches to Standardisation and Forms of Legitimisation

    ERIC Educational Resources Information Center

    Nerland, Monika; Karseth, Berit

    2015-01-01

    This paper examines how professional associations engage themselves in efforts to develop, regulate and secure knowledge in their respective domains, with special emphasis on standardisation. The general emphasis on science in society brings renewed attention to the knowledge base of professionals, and positions professional bodies as key…

  20. The utility of the Historical Clinical Risk-20 Scale as a predictor of outcomes in decisions to transfer patients from high to lower levels of security--a UK perspective.

    PubMed

    Dolan, Mairead; Blattner, Regine

    2010-09-29

    Structured Professional Judgment (SPJ) approaches to violence risk assessment are increasingly being adopted into clinical practice in international forensic settings. The aim of this study was to examine the predictive validity of the Historical Clinical Risk -20 (HCR-20) violence risk assessment scale for outcome following transfers from high to medium security in a United Kingdom setting. The sample was predominately male and mentally ill and the majority of cases were detained under the criminal section of the Mental Health Act (1986). The HCR-20 was rated based on detailed case file information on 72 cases transferred from high to medium security. Outcomes were examined, independent of risk score, and cases were classed as "success or failure" based on established criteria. The mean length of follow up was 6 years. The total HCR-20 score was a robust predictor of failure at lower levels of security and return to high security. The Clinical and Risk management items contributed most to predictive accuracy. Although the HCR-20 was designed as a violence risk prediction tool our findings suggest it has potential utility in decisions to transfer patients from high to lower levels of security.

  1. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  2. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.

    PubMed

    Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek

    2015-10-14

    Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.

  3. The ContiNet of the International Continence Society.

    PubMed

    Lim, P H; Fonda, D

    1997-01-01

    This is an account of the International Continence Society's ContiNet--the web server linking up continence organisations worldwide with provision to upload or download vast data stores of information on continence via e-mail, FTP, mailing lists, and special tools to seek information using "search engines." Special communication devices using internet voice/phone mail and real-time "text" or "voice" chats permit conversation globally over normal phone lines linked to the Net at local telephone rates. Special features of ContiNet include announcements of upcoming conventions, information for professionals and laypeople, and the capability to conduct research via the net and conduct consultations and discussions via newsgroups. In-built devices requiring special IDs and passwords permit privacy and security for users. Simple instructions are provided on how to get your PC up and running and get connected to fellow members of ICS, link up with national continence societies, or simply surf for professional enrichment and leisure. With the advent of advanced multimedia capabilities, the current poor quality videoconferencing on the Net will be replaced by excellent videophones by 1998.

  4. Job security at isfahan university of medical sciences: implications on employees and types of contracts.

    PubMed

    Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte

    2013-01-01

    Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS.

  5. A Privacy Preservation Model for Health-Related Social Networking Sites.

    PubMed

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  6. A Privacy Preservation Model for Health-Related Social Networking Sites

    PubMed Central

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  7. Chief medical officer actions on information security in an Italian rehabilitation centre.

    PubMed

    Reni, Gianluigi; Molteni, Massimo; Arlotti, Stefano; Pinciroli, Francesco

    2004-03-31

    In a multi-speciality rehabilitation centre, where child neuropsychiatrists, neurologists, physical rehabilitators, psychologists, nurses, therapists and other health care professionals actively care for patients, the moment will arrive when information security takes high priority on the chief medical officer (CMO) agenda. This has happened at the La Nostra Famiglia Institution. Local push to high priority arose from several concurrent forces, like privacy both on the patient and on the doctor side, legal and ethical aspects. Recommendations on the protection of medical data require appropriate technical and organisational measures to be taken to protect personal data against unauthorised access, alterations or any other form of inappropriate processing. In the same time quick and easy access to patient information should be granted to authorised personnel to ensure proper and in time treatment of patients. A long lasting sequence of co-operative negotiation meetings between the CMO and the chief information officer (CIO) led to appropriate outline of policies. We developed a suitable and modular architecture for designing systems that can simultaneously manage an increasing number of healthcare actors, objects and related access levels taking into account temporal conditions. Actions for keeping the prototype in use on an everyday basis are directly taken by the CMO.

  8. Engineer: The Professional Bulletin of Army Engineers. Volume 40, September-December 2010

    DTIC Science & Technology

    2010-12-01

    used by the enemy? Do we use sniper screens? What about the entry control point? The whole idea behind a COP is that it’s a secure place close to...more powerful signal, to initiate detonations. U.S. forces countered by using a stronger jamming signal. The C-IED fight escalated and the insurgents...attacked? Information from an existing database helped to locate the enemy and plot his locations on a map by using commer- cial off-the-shelf (COTS

  9. An Innovative Model for Professional Development

    ERIC Educational Resources Information Center

    McMurray, Sharon; O'Neill, Susan; Thompson, Ross

    2016-01-01

    This paper considers an innovative model of continuing professional development in addressing the needs of children with literacy difficulties, namely the Special Educational Needs Continuing Professional Development Literacy Project. Stranmillis University College, in partnership with St Mary's University College, Belfast secured £4.06 million…

  10. New security and privacy laws require basic changes in professional practice

    NASA Astrophysics Data System (ADS)

    Sykes, David M.

    2005-09-01

    Everybody knows about HIPAA-but what about GLBA? FIPA? The Patriot Act? Homeland Security? NCLB? FCRA? CASB1? PIPEDA? All of these are recent laws that impact acoustical design. Throw in the American Hospital Association/ASHE and AIA's about-to-be-released ``Guidelines for the Design of Healthcare Facilities'' as well as the redrafting of DCID 6/9 and it looks like time for careful examination of some professional practices relating to security and privacy. Should INCE members join with and endorse the ASA's recently formed Joint TCAA/TCN Subcommittee which aims to fill a policy vacuum in Washington and Ottawa relating to the fundamental protection of citizens' rights to privacy? This group will formulate consistent guidelines to enable federal and state agencies in the US and Canada to enforce and monitor their laws-will their guidelines affect INCE members? Those who advise or give expert testimony to government agencies, defense/security organizations, courts, and large institutions in financial services, healthcare or education likely find themselves in a rapidly shifting landscape and recognize the need to respond with new research and professional practices.

  11. Email for clinical communication between healthcare professionals.

    PubMed

    Pappas, Yannis; Atherton, Helen; Sawmynaden, Prescilla; Car, Josip

    2012-09-12

    Email is a popular and commonly-used method of communication, but its use in healthcare is not routine. Where email communication has been utilised in health care, its purposes have included use for clinical communication between healthcare professionals, but the effects of using email in this way are not known. This review assesses the use of email for two-way clinical communication between healthcare professionals. To assess the effects of healthcare professionals using email to communicate clinical information, on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information, and that took the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information. We report all measures as per the study report. We included one randomised controlled trial involving 327 patients and 159 healthcare providers at baseline. It compared an email to physicians containing patient-specific osteoporosis risk information and guidelines for evaluation and treatment with usual care (no email). This study was at high risk of bias for the allocation concealment and blinding domains. The email reminder changed health professional actions significantly, with professionals more likely to provide guideline-recommended osteoporosis treatment (bone density measurement and/or osteoporosis medication) when compared with usual care. The evidence for its impact on patient behaviours/actions was inconclusive. One measure found that the electronic medical reminder message impacted patient behaviour positively: patients had a higher calcium intake, and two found no difference between the two groups. The study did not assess primary health service outcomes or harms. As only one study was identified for inclusion, the results are inadequate to inform clinical practice in regard to the use of email for clinical communication between healthcare professionals. Future research needs to use high-quality study designs that take advantage of the most recent developments in information technology, with consideration of the complexity of email as an intervention, and costs.

  12. Evaluating the Use of Remote Sensing Data in the USAID Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Brickley, Elizabeth B.

    2011-01-01

    The US Agency for International Development (USAID) s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. Here we analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000-2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices and food access parameters in their analysis of food security problems. The reports display large scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data was used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10%, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  13. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems;more » (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.« less

  14. Draft secure medical database standard.

    PubMed

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  15. Quality in Australian after-hours doctor home visits: exploring the clinical, professional and security supports available to involved practitioners.

    PubMed

    Ifediora, Chris Onyebuchi

    2017-04-01

    The after-hours house call (AHHC) services in Australia has gained huge popularity in recent years, but it is not clear how well supported the involved doctors feel regarding the clinical, professional and security aspects of their work. It is important that this knowledge gap is filled given that appropriate support helps engender quality in health service delivery. This is a questionnaire-based electronic survey involving a sample frame of all 300 doctors participating in AHHC through the National Home Doctor Service. National Home Doctor Service is Australia's largest AHHC service provider. A total of 168 valid responses (56.0%) were received. Overall, the mean support levels were mild to moderate, ranging from 2.4 to 2.8 out of 4.0 for all three parameters. Specifically, 65.3% of the respondents felt well-supported on clinical issues, 64.7% on professional issues and 43.2% on security issues. Australian-trained doctors were less likely to feel well supported on all aspects [Clinical: odds ratio (OR) 0.38, confidence interval (CI) 0.16 to 0.90; Professional: OR 0.30, CI 0.13 to 0.72; and Security: OR 0.22; CI 0.09 to 0.53] compared with overseas-trained ones. Unsurprisingly, doctors who adopted protective measures felt significantly better supported regarding security (OR 2.75; CI 1.31 to 5.78). There is room for improvement regarding support on AHHC in Australia, and concerned Surgeries should ensure that where available these supports are appropriately utilized. © 2016 John Wiley & Sons, Ltd.

  16. Differences in multiple-target visual search performance between non-professional and professional searchers due to decision-making criteria.

    PubMed

    Biggs, Adam T; Mitroff, Stephen R

    2015-11-01

    Professional visual searches, such as those conducted by airport security personnel, often demand highly accurate performance. As many factors can hinder accuracy, it is critical to understand the potential influences. Here, we examined how explicit decision-making criteria might affect multiple-target search performance. Non-professional searchers (college undergraduates) and professional searchers (airport security officers) classified trials as 'safe' or 'dangerous', in one of two conditions. Those in the 'one = dangerous' condition classified trials as dangerous if they found one or two targets, and those in the 'one = safe' condition only classified trials as dangerous if they found two targets. The data suggest an important role of context that may be mediated by experience; non-professional searchers were more likely to miss a second target in the one = dangerous condition (i.e., when finding a second found target did not change the classification), whereas professional searchers were more likely to miss a second in the one = safe condition. © 2014 The British Psychological Society.

  17. Becoming an Approved Mental Health Professional: an analysis of the factors that influence individuals to become Approved Mental Health Professionals.

    PubMed

    Watson, David

    2016-08-01

    In England and Wales, the Approved Mental Health Professional (AMHP) has final responsibility for applying under the Mental Health Act 1983 to admit an individual compulsorily and convey them to psychiatric hospital. The AMHP role is challenging and legally accountable and unique to the UK context. To analyse the motivation of individuals to become AMHPs, and identify factors which may affect motivation. Semi-structured interviews were conducted with 12 AMHPs from local authorities across Southern England. Ten participants were social workers, one was qualified as both a nurse and social worker, and one was a mental health nurse. Participants identify career progression and professional development as significant as well as the status and independence of the role and enhanced job security. Social work participants value the Mental Health Act assessment as a contained piece of work, with a high degree of professional discretion. AMHPs are motivated by an increase in professional status and job security, but also exercising independent judgment and authority in a time-limited intervention is emotionally and professionally rewarding.

  18. Privacy Practices of Health Social Networking Sites: Implications for Privacy and Data Security in Online Cancer Communities.

    PubMed

    Charbonneau, Deborah H

    2016-08-01

    While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.

  19. The legal and ethical implications of consent to nursing procedures.

    PubMed

    Power, K J

    Nurses are increasingly expanding their practice to include many more invasive procedures. Consequently, there is a need to re-examine nurses' responsibilities in relation to obtaining consent for nursing as opposed to medical procedures. Fully informed consent is not a legal requirement in England, for either medical or nursing procedures. However, this article argues that to comply with the standard set by the Code of Professional Conduct nurses should obtain informed consent for any proposed procedure they undertake. The concept of informed consent is examined and applied to practice. Ultimately, nurses are charged with four key tasks in relation to securing consent for nursing procedures: educating themselves about the risks and benefits of the procedures they propose to undertake; conveying this information to patients; assessing their understanding of the information given; and endeavouring to support the patient in his/her decision.

  20. Secondary traumatic stress and burnout in child welfare workers: a comparative analysis of occupational distress across professional groups.

    PubMed

    Sprang, Ginny; Craig, Carlton; Clark, James

    2011-01-01

    This study describes predictors of secondary traumatic stress and burnout in a national sample of helping professionals, with a specific focus on the unique responses of child welfare (CW) workers. Specific worker and exposure characteristics are examined as possible predictors of these forms of occupational distress in a sample of 669 professionals from across the country who responded to mailed (e-mail and post) invitations to participate in an online survey. E-mail and home mailing addresses were secured from licensure boards and professional membership organizations in six states from across the country that had high rates of child related deaths in 2009. Respondents completed the Professional Quality of Life IV (Stamm, 2005) to ascertain compassion fatigue (CF) and burnout symptoms. Being male, young, Hispanic, holding rural residence, and endorsing a lack of religious participation were significant predictors of secondary traumatic stress. Similarly, being male and young predicted high burnout rates, while actively participating in religious services predicted lower burnout. CW worker job status as a professional was significantly more likely to predict CF and burnout compared to all other types of behavioral healthcare professionals. Based on the findings from this study, this paper proposes strategies for enhancing self-care for CW workers, and describes the essential elements of a trauma-informed CW agency that addresses secondary traumatic stress and burnout.

  1. Data Privacy and Security in Higher Education

    ERIC Educational Resources Information Center

    Williams, Tracy

    2003-01-01

    As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…

  2. SOCIAL MEDIA SECURITY

    Science.gov Websites

    , exciting, entertaining, and useful for maintaining relationships. Professionally, people can use social HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of world. CENTCOM Personnel are reminded to use common sense when using social media. What are social media

  3. 75 FR 30095 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-28

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... on May 5, 2010, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed.... Specifically, the Exchange proposes to adopt a $0.18 per contract execution fee for ``professional customers...

  4. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  5. Fires. A Joint Professional Bulletin for U.S. Field and Air Defense Artillerymen. September-October 2011

    DTIC Science & Technology

    2011-10-01

    said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most

  6. National Athletic Trainers' Association-accredited postprofessional athletic training education: attractors and career intentions.

    PubMed

    Mazerolle, Stephanie M; Dodge, Thomas M

    2012-01-01

    Anecdotally, we know that students select graduate programs based on location, finances, and future career goals. Empirically, however, we lack information on what attracts a student to these programs. To gain an appreciation for the selection process of graduate study. Qualitative study. Postprofessional programs in athletic training (PPATs) accredited by the National Athletic Trainers' Association. A total of 19 first-year PPAT students participated, representing 13 of the 16 accredited PPAT programs. All interviews were conducted via phone and transcribed verbatim. Analysis of the interview data followed the procedures as outlined by a grounded theory approach. Trustworthiness was secured by (1) participant checks, (2) participant verification, and (3) multiple analyst triangulations. Athletic training students select PPAT programs for 4 major reasons: reputation of the program or faculty (or both), career intentions, professional socialization, and mentorship from undergraduate faculty or clinical instructors (or both). Participants discussed long-term professional goals as the driving force behind wanting an advanced degree in athletic training. Faculty and clinical instructor recommendations and the program's prestige helped guide the decisions. Participants also expressed the need to gain more experience, which promoted autonomy, and support while gaining that work experience. Final selection of the PPAT program was based on academic offerings, the assistantship offered (including financial support), advanced knowledge of athletic training concepts and principles, and apprenticeship opportunities. Students who attend PPAT programs are attracted to advancing their entry-level knowledge, are committed to their professional development as athletic trainers, and view the profession of athletic training as a life-long career. The combination of balanced academics, clinical experiences, and additional professional socialization and mentorship from the PPAT program experience will help them to secure their desired career positions.

  7. 77 FR 30032 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-21

    ... Professionals'' May 15, 2012. I. Introduction On March 20, 2012, the Fixed Income Clearing Corporation (``FICC... Members and NYPC Clearing Members for certain ``market professionals.'' \\6\\ \\5\\ See Securities Exchange... professional'' cross-margining program aims to closely replicate the Options Clearing Corporation (``OCC...

  8. Job Security at Isfahan University of Medical Sciences: Implications on Employees and Types of Contracts

    PubMed Central

    Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte

    2013-01-01

    Introduction: Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). Method and materials: The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. Results: The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Discussion: Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS. PMID:23687464

  9. Food insecurity is associated with poor sleep outcomes among US adults.

    PubMed

    Ding, Meng; Keiley, Margaret K; Garza, Kimberly B; Duffy, Patricia A; Zizza, Claire A

    2015-03-01

    Although food insecure (FI) adults are at risk of chronic conditions, little research attention is given to their health behaviors, such as sleep. We examined the associations between adult food security status and sleep duration, sleep latency, and sleep complaints reported to a health care professional. Our population-based sample included 5637 men and 5264 women (≥22 y) who participated in the NHANES 2005-2010. Food security status was assessed with USDA's 10-item adult Food Security Survey Module. Self-reported information about sleep duration, sleep latency, and sleep complaints to a health care professional were used as sleep outcomes. Multiple linear, stratified by sex, and logistic regression models were used to estimate the association between food security status and the 3 sleep outcomes. Very low food secure (FS) women reported significantly shorter sleep duration than fully FS women (difference: -30 ± 5.2 min; P < 0.01); however, no relation to sleep duration was observed among men. Among men, participants who were marginally FS (4 ± 1.1 min), low FS (4 ± 1.7 min), and very low FS (5 ± 1.8 min) reported significantly longer sleep latency than fully FS men (P < 0.05), but no association with sleep latency was observed among women. The divergent patterns in sleep duration and latency were likely because of our reference groups reporting undesirable sleep outcomes; fully FS men reported inadequate sleep and fully FS women reported long sleep latency. Among both men and women, marginally FS (OR: 1.64; 95% CI: 1.24, 2.16), low FS (OR: 1.63; 95% CI: 1.16, 2.30), and very low FS (OR: 1.99; 95% CI: 1.36, 2.92) participants were more likely to report sleep complaints than their fully FS counterparts (P < 0.05). Poor sleep quantity and quality may predispose FI adults to adverse health outcomes. © 2015 American Society for Nutrition.

  10. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  11. Beyond Performativity: A Pragmatic Model of Teacher Professional Learning

    ERIC Educational Resources Information Center

    Lloyd, Margaret; Davis, James P.

    2018-01-01

    The intent and content of teacher professional learning has changed in recent times to meet the demands of performativity. In this article, we offer and demonstrate a pragmatic way to map teacher professional learning that both meets current demands and secures a place for teacher-led catalytic learning. To achieve this, we position identified…

  12. Redefining Professional Knowledge in Athletic Training: Whose Knowledge Is It Anyway?

    ERIC Educational Resources Information Center

    McKeon, Patrick O.; Medina McKeon, Jennifer M.; Geisler, Paul R.

    2017-01-01

    Context: As athletic training continues to evolve as a profession, several epistemological considerations must be considered. These include how we generate professional knowledge and how we secure and legitimize it in both professional and public spheres. Objective: The purpose of this commentary is to provide an overview of how athletic training…

  13. Promoting Inter-Professional Teamwork and Learning--The Case of a Surgical Operating Theatre

    ERIC Educational Resources Information Center

    Collin, Kaija; Paloniemi, Susanna; Mecklin, Jukka-Pekka

    2010-01-01

    Hospitals, and surgical operating theatres (OTs) in particular, are environments in which inter-professional teamwork and learning are essential to secure patient safety and effective practice. However, it has been revealed in many studies that inter-professional collaborative work in hospital organisations faces many challenges and constraints.…

  14. Evaluating the Use of Remote Sensing Data in the U.S. Agency for International Development Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly Elizabeth; Brickley, Elizabeth B

    2012-01-01

    The U.S. Agency for International Development (USAID)'s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods, and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. We analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000 to 2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices, and food access parameters in their analysis of food security problems. The reports display large-scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data were used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10% of the time, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  15. Professional values of nurse lecturers at three universities in Colombia.

    PubMed

    López-Pereira, Arabely; Arango-Bayer, Gloria

    2017-03-01

    To describe the professional values of the nurse lectures according to 241 nursing students, who participated voluntarily, in three different universities of Bogotá. This is a quantitative, descriptive cross-sectional study that applied the Nurses Professional Values Scale-permission secured-Spanish; three dimensions of values were applied: ethics, commitment, and professional knowledge. Ethical consideration: Project had ethical review and approval from an ethics committee and participants were given information sheets to read before they agreed to participate in the project. It was concluded that nursing students, in general, do perceive these values in their professors, and they give priority to the dimension of ethics, followed by the knowledge dimension, and finally, commitment. It is evident that professional values are transmitted by professors and students place importance to such values. Values related to the other's care are paramount in nursing training in Colombia as well as in other countries. It was found that participating students observed professors directly in relation to values focused on direct patient care, respect for privacy, respect for life, while matters related to professional improvement, participation in unions were not actually analyzed may be due to poor promotion activities and unions during undergraduate studies. The results obtained are primary approach to the study of values related to nursing, a topic which needs to be researched, something vital to all the country offering nursing training programs.

  16. Transportation Security Institute : recruiting next generation professionals.

    DOT National Transportation Integrated Search

    2013-08-01

    The Center for Transportation Training and Research (CTTR), as part of Texas Southern University : (TSU), served as host for the 2013 Transportation Security Institute (TSI) in Houston and : surrounding area. The 2013 Houston TSI focuses on the missi...

  17. Social Security for Composers and Free Lances.

    ERIC Educational Resources Information Center

    Rossel-Majdan, Karl

    1982-01-01

    Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)

  18. Transportation Security Institute: recruiting next generation professionals.

    DOT National Transportation Integrated Search

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  19. Improving maternity care using a personal health record: study protocol for a stepped-wedge, randomised, controlled trial.

    PubMed

    Groenen, Carola J M; Faber, Marjan J; Kremer, Jan A M; Vandenbussche, Frank P H A; van Duijnhoven, Noortje T L

    2016-04-16

    A personal health record (PHR) is an online application through which individuals can access, manage, and share their health information in a private, secure, and confidential environment. Personal health records empower patients, facilitate collaboration among healthcare professionals, and improve health outcomes. Given these anticipated positive effects, we want to implement a PHR, named MyPregn@ncy, in a Dutch maternity care setting and to evaluate its effects in routine care. This paper presents the study protocol. The effects of implementing a PHR in maternity care on patients and professionals will be identified in a stepped-wedge, cluster-randomised, controlled trial. The study will be performed in the region of Nijmegen, a Dutch area with an average of 4,500 births a year and more than 230 healthcare professionals involved in maternity care. Data analyses will describe the effects of MyPregn@ncy on health outcomes in maternity care, quality of care from the patients' perspectives, and collaboration among healthcare professionals. Additionally, a process evaluation of the implementation of MyPregn@ncy will be performed. Data will be collected using data from the Dutch perinatal registry, questionnaires, interviews, and log data. The study is expected to yield new information about the effects, strengths, possibilities, and challenges to the implementation and usage of a PHR in routine maternal care settings. Results may lead to new insights and improvements in the quality of maternal and perinatal care. Netherlands Trial Register: NTR4063.

  20. Square pegs in round holes: information systems, hospitals and the significance of contextual awareness.

    PubMed

    Tjora, Aksel Hagen; Scambler, Graham

    2009-02-01

    The considerable emphasis in the development and implementation of clinical information systems in hospitals internationally seems to have had a limited effect. In particular, the implementation of electronic patient record (EPR) systems has been slower and more difficult than anticipated and with little change in efficiency and security. This paper suggests why this might be the case. Well established research findings within the field of computer supported cooperative work (CSCW--an interdisciplinary research field between informatics and the social sciences) are cited to construct a case for greater awareness of (1) inter- and intra-professional interests, and (2) broader social and health policy contexts. We draw on Gouldner's work [(1957). Cosmopolitans and locals: toward an analysis of latent social roles--I. Administrative Science Quarterly, 2(3), 281-306; (1958). Cosmopolitans and locals: toward an analysis of latent social roles--II. Administrative Science Quarterly, 2 (4), 444-480] on organisational roles to develop a discussion of professional awareness; a pivotal notion is also the interactionist one of the hospital as a 'negotiated order'. Drawing for illustrative purposes on the Norwegian experience (that is, reviewing research on hospital information systems in Norway), we contend that enhanced awareness of the hospital itself as a social system may be a precondition of cost-effective hospital information and communication technologies.

  1. [Teletransmission, health care and deontology].

    PubMed

    Lousson, J P

    1995-01-01

    EDI is the technique the most frequently used by Chemists to relay their daily orders to their suppliers. Three out of four Chemists in France are computerised using various forms of computer hardware and software. The Health Care organisations propose that Chemists use the EDI to relay to the CETELIC all the items of information concerning their invoicing. This means handing over administrative information identifying the patient, the doctor ... as well as financial and confidential data such as the CIP code of the prescribed and delivered medicine. The law of the 4th January 1993 was instigated to control the rising expenses of the Health Care organisations and it mandates the Caisse Primaire d'Assurance Maladie (the French social security organisations) to retrieve and analyse the information thus gathered from all of the medical professionals involved. However, the accumulation of all these items of computerised information constitutes in effect a confidential medical file on each patient. This raises the following issues: Who does this confidential data belong to? Who should the Chemists give it to? What is to be done with it? Who will be responsible for its analysis in respect of the confidentiality problem? (Another medical professional bound by oath?) And how can we insure against subsequent abuse of this material?

  2. 75 FR 66410 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... Terms of Substance of the Proposed Rule Change The Exchange proposes to adopt ISE Rule 212 (Sales Value... supervision and regulation of the securities markets and securities professionals. To offset this obligation...

  3. 75 FR 5360 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-02

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61426; File No. SR-Phlx-2010-05] Self... Professional Orders January 26, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934... PHLX, Inc. (``Phlx'' or ``Exchange'') filed with the Securities and Exchange Commission (``SEC'' or...

  4. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    DTIC Science & Technology

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  5. Young women with a disorder of sex development: learning to share information with health professionals, friends and intimate partners about bodily differences and infertility

    PubMed Central

    Sanders, Caroline; Carter, Bernie; Lwin, Rebekah

    2015-01-01

    Aim To understand the experiences of young women with a disorder of sex development when sharing information about their body with healthcare professionals, friends and intimate partners. Background Disorders of sex development are lifelong conditions that create bodily difference such as absence of reproductive organs which can impact on young women’s fertility and sexual experiences. Design Interpretive phenomenological analysis with thirteen young women (14-19 years old) with a disorder of sex development. Methods The young women chose to participate in either a face-to-face semi-structured interview or to complete a paper diary between 2011–2012. Results A superordinate theme focusing on the meaning bodily differences held for these young women is presented through three themes: self-awareness and communicating this to others; actualizing intimacy; and expressing meaning of altered fertility to self or professionals or partners. During early adolescence, the young women were guarded and reticent about sharing personal information about their disorder of sex development but as they moved towards adulthood, some of the young women learnt to engage in conversations with more confidence. Frustrations about their bodily differences and the limitations of their bodies were talked about as factors which limited physical spontaneity, impacted on their perceived sexual fulfilment and challenged the development or sustainability of close friendships or intimate partnerships. The young women wanted empathic, sensitive support from knowledgeable health professionals to help them understand their bodies. Conclusion Attachment and a ‘sense of being’ were the concepts that were closely linked to the young women’s development of a secure identity. PMID:25893820

  6. Young women with a disorder of sex development: learning to share information with health professionals, friends and intimate partners about bodily differences and infertility.

    PubMed

    Sanders, Caroline; Carter, Bernie; Lwin, Rebekah

    2015-08-01

    To understand the experiences of young women with a disorder of sex development when sharing information about their body with healthcare professionals, friends and intimate partners. Disorders of sex development are lifelong conditions that create bodily difference such as absence of reproductive organs which can impact on young women's fertility and sexual experiences. Interpretive phenomenological analysis with thirteen young women (14-19 years old) with a disorder of sex development. The young women chose to participate in either a face-to-face semi-structured interview or to complete a paper diary between 2011-2012. A superordinate theme focusing on the meaning bodily differences held for these young women is presented through three themes: self-awareness and communicating this to others; actualizing intimacy; and expressing meaning of altered fertility to self or professionals or partners. During early adolescence, the young women were guarded and reticent about sharing personal information about their disorder of sex development but as they moved towards adulthood, some of the young women learnt to engage in conversations with more confidence. Frustrations about their bodily differences and the limitations of their bodies were talked about as factors which limited physical spontaneity, impacted on their perceived sexual fulfilment and challenged the development or sustainability of close friendships or intimate partnerships. The young women wanted empathic, sensitive support from knowledgeable health professionals to help them understand their bodies. Attachment and a 'sense of being' were the concepts that were closely linked to the young women's development of a secure identity. © 2015 The Authors. Journal of Advanced Nursing published by John Wiley & Sons Ltd.

  7. Mobile computing acceptance factors in the healthcare industry: a structural equation model.

    PubMed

    Wu, Jen-Her; Wang, Shu-Ching; Lin, Li-Min

    2007-01-01

    This paper presents a revised technology acceptance model to examine what determines mobile healthcare systems (MHS) acceptance by healthcare professionals. Conformation factor analysis was performed to test the reliability and validity of the measurement model. The structural equation modeling technique was used to evaluate the causal model. The results indicated that compatibility, perceived usefulness and perceived ease of use significantly affected healthcare professional behavioral intent. MHS self-efficacy had strong indirect impact on healthcare professional behavioral intent through the mediators of perceived usefulness and perceived ease of use. Yet, the hypotheses for technical support and training effects on the perceived usefulness and perceived ease of use were not supported. This paper provides initial insights into factors that are likely to be significant antecedents of planning and implementing mobile healthcare to enhance professionals' MHS acceptance. The proposed model variables explained 70% of the variance in behavioral intention to use MHS; further study is needed to explore extra significant antecedents of new IT/IS acceptance for mobile healthcare. Such as privacy and security issue, system and information quality, limitations of mobile devices; the above may be other interesting factors for implementing mobile healthcare and could be conducted by qualitative research.

  8. Different predictors of multiple-target search accuracy between nonprofessional and professional visual searchers.

    PubMed

    Biggs, Adam T; Mitroff, Stephen R

    2014-01-01

    Visual search, locating target items among distractors, underlies daily activities ranging from critical tasks (e.g., looking for dangerous objects during security screening) to commonplace ones (e.g., finding your friends in a crowded bar). Both professional and nonprofessional individuals conduct visual searches, and the present investigation is aimed at understanding how they perform similarly and differently. We administered a multiple-target visual search task to both professional (airport security officers) and nonprofessional participants (members of the Duke University community) to determine how search abilities differ between these populations and what factors might predict accuracy. There were minimal overall accuracy differences, although the professionals were generally slower to respond. However, the factors that predicted accuracy varied drastically between groups; variability in search consistency-how similarly an individual searched from trial to trial in terms of speed-best explained accuracy for professional searchers (more consistent professionals were more accurate), whereas search speed-how long an individual took to complete a search when no targets were present-best explained accuracy for nonprofessional searchers (slower nonprofessionals were more accurate). These findings suggest that professional searchers may utilize different search strategies from those of nonprofessionals, and that search consistency, in particular, may provide a valuable tool for enhancing professional search accuracy.

  9. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    PubMed

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  10. Usage of insecure E-mail services among researchers with different scientific background.

    PubMed

    Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago

    2011-08-01

    Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.

  11. Food security practice in Kansas schools and health care facilities.

    PubMed

    Yoon, Eunju; Shanklin, Carol W

    2007-02-01

    This pilot study investigated perceived importance and frequency of specific preventive measures, and food and nutrition professionals' and foodservice directors' willingness to develop a food defense management plan. A mail questionnaire was developed based on the US Department of Agriculture document, Biosecurity Checklist for School Foodservice Programs--Developing a Biosecurity Management Plan. The survey was sent to food and nutrition professionals and foodservice operators in 151 acute care hospitals, 181 long-term-care facilities, and 450 school foodservice operations. Chemical use and storage was perceived as the most important practice to protect an operation and was the practice implemented most frequently. Results of the study indicate training programs on food security are needed to increase food and nutrition professionals' motivation to implement preventive measures.

  12. Defining the Role of the Professional Security Consultant.

    ERIC Educational Resources Information Center

    Webster, Jim

    2002-01-01

    Discusses the skill set that should be available in security consultants to higher education, including the ability to work with mechanical, architectural, electrical, landscaping, and telecommunications systems. Addresses the need to bring consultants into the building design phase. (EV)

  13. 77 FR 20445 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-04

    ... Professionals'' March 29, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1... positions held by GSD Netting Members and NYPC Clearing Members for certain ``market professionals.'' \\5\\ \\4...\\ The NYPC-FICC ``market professional'' cross-margining program aims to closely replicate the Options...

  14. 76 FR 48197 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-08

    ... assessable professional reported or required to be reported by a municipal advisor to the MSRB on Form A-11... Assessment and Form A-11- Interim. For purposes of the interim assessment, an assessable professional of a...-Interim as an assessable professional any associated person (i) Who otherwise qualifies as an assessable...

  15. Enhancing the NFLs Counter-Terrorism Efforts: Is the Leagues Security Scheme Able to Effectively Thwart Terrorist Attacks

    DTIC Science & Technology

    2016-09-01

    League (EPL), football, mass gatherings, National Football League (NFL), safety manuals, soccer , sports security, soccer , terrorism, terrorist...fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL...kurtbadenhausen/2015/07/15/the-worlds-50-most-valuable-sports- teams-2015/. 3 professional league, the English Premier soccer league, earns $2.7 billion.6 In

  16. Email for clinical communication between healthcare professionals.

    PubMed

    Goyder, Clare; Atherton, Helen; Car, Mate; Heneghan, Carl J; Car, Josip

    2015-02-20

    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals. To assess the effects of email for clinical communication between healthcare professionals on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 9 2013), MEDLINE (OvidSP) (1946 to August 2013), EMBASE (OvidSP) (1974 to August 2013), PsycINFO (1967 to August 2013), CINAHL (EbscoHOST) (1982 to August 2013), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched November 2013). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies, and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information in the form of: 1) unsecured email, 2) secure email, or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information and have reported all measures as per the study report. The previous version of this review included one randomised controlled trial involving 327 patients and 159 healthcare providers at baseline. It compared an email to physicians containing patient-specific osteoporosis risk information and guidelines for evaluation and treatment versus usual care (no email). This study was at high risk of bias for the allocation concealment and blinding domains. The email reminder changed health professional actions significantly, with professionals more likely to provide guideline-recommended osteoporosis treatment (bone density measurement or osteoporosis medication, or both) when compared with usual care. The evidence for its impact on patient behaviours or actions was inconclusive. One measure found that the electronic medical reminder message impacted patient behaviour positively (patients had a higher calcium intake), and two found no difference between the two groups. The study did not assess health service outcomes or harms.No new studies were identified for this update. Only one study was identified for inclusion, providing insufficient evidence for guiding clinical practice in regard to the use of email for clinical communication between healthcare professionals. Future research should aim to utilise high-quality study designs that use the most recent developments in information technology, with consideration of the complexity of email as an intervention.

  17. The European Union Joint Procurement Agreement for cross-border health threats: what is the potential for this new mechanism of health system collaboration?

    PubMed

    Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut

    2017-01-01

    The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.

  18. One health security: an important component of the global health security agenda.

    PubMed

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  19. Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011

    DTIC Science & Technology

    2011-01-01

    the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional

  20. A Formal Specification and Verification Method for the Prevention of Denial of Service in Ada Services

    DTIC Science & Technology

    1988-03-01

    Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy

  1. Predicting Airport Screening Officers' Visual Search Competency With a Rapid Assessment.

    PubMed

    Mitroff, Stephen R; Ericson, Justin M; Sharpe, Benjamin

    2018-03-01

    Objective The study's objective was to assess a new personnel selection and assessment tool for aviation security screeners. A mobile app was modified to create a tool, and the question was whether it could predict professional screeners' on-job performance. Background A variety of professions (airport security, radiology, the military, etc.) rely on visual search performance-being able to detect targets. Given the importance of such professions, it is necessary to maximize performance, and one means to do so is to select individuals who excel at visual search. A critical question is whether it is possible to predict search competency within a professional search environment. Method Professional searchers from the USA Transportation Security Administration (TSA) completed a rapid assessment on a tablet-based X-ray simulator (XRAY Screener, derived from the mobile technology app Airport Scanner; Kedlin Company). The assessment contained 72 trials that were simulated X-ray images of bags. Participants searched for prohibited items and tapped on them with their finger. Results Performance on the assessment significantly related to on-job performance measures for the TSA officers such that those who were better XRAY Screener performers were both more accurate and faster at the actual airport checkpoint. Conclusion XRAY Screener successfully predicted on-job performance for professional aviation security officers. While questions remain about the underlying cognitive mechanisms, this quick assessment was found to significantly predict on-job success for a task that relies on visual search performance. Application It may be possible to quickly assess an individual's visual search competency, which could help organizations select new hires and assess their current workforce.

  2. 77 FR 2108 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ... Professional,\\9\\ Firm and Market Maker \\10\\ orders that remove liquidity from the BATS Options order book. The Exchange proposes to raise the fee to $0.44 per contract for Professional, Firm and Market Maker orders... ``Professional'' means any person or entity that (i) is not a broker or dealer in securities, and (ii) places...

  3. Local research ethics committees of the Mexican Institute of Social Security: results of a national survey.

    PubMed

    Valdez-Martinez, E; Garduño-Espinosa, J; Martinez-Salgado, H; Porter, J D H

    2004-07-01

    To identify the structure, composition and work of the local research ethics committees (LRECs) of the Mexican Institute of Social Security (IMSS) in Mexico. A descriptive cross-sectional study was performed that included all LRECs of the IMSS. A total of 335 questionnaires coded in advance were posted to each LREC secretary. The requested information was from January to December 2001. The response rate was 100%. Two hundred and thirty-eight (71%) LRECs were reported as 'active' during the evaluation period. Although almost all LRECs were composed of diverse professionals, physicians dominated the LRECs' membership. The rejection rate for research projects was lower than 1 per 1000, and less than half of the LRECs held meetings to issue a report of projects' evaluation. LRECs need to foster good ethical research; implementation of an audit system to examine their work might help improve LRECs' performance and accountability.

  4. The perfect heist :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lafleur, Jarret Marshall; Purvis, Liston Keith; Roesler, Alexander William

    2014-04-01

    Of the many facets of the criminal world, few have captured societys fascination as has that of high stakes robbery. The combination of meticulousness, cunning, and audacity required to execute a real-life Oceans Eleven may be uncommon among criminals, but fortunately it is common enough to extract a wealth of lessons for the protection of high-value assets. To assist in informing the analyses and decisions of security professionals, this paper surveys 23 sophisticated and high-value heists that have occurred or been attempted around the world, particularly over the past three decades. The results, compiled in a Heist Methods and Characteristicsmore » Database, have been analyzed qualitatively and quantitatively, with the goals of both identifying common characteristics and characterizing the range and diversity of criminal methods used. The analysis is focused in six areas: (1) Defeated Security Measures and Devices, (2) Deception Methods, (3) Timing, (4) Weapons, (5) Resources, and (6) Insiders.« less

  5. Combining conceptual graphs and argumentation for aiding in the teleexpertise.

    PubMed

    Doumbouya, Mamadou Bilo; Kamsu-Foguem, Bernard; Kenfack, Hugues; Foguem, Clovis

    2015-08-01

    Current medical information systems are too complex to be meaningfully exploited. Hence there is a need to develop new strategies for maximising the exploitation of medical data to the benefit of medical professionals. It is against this backdrop that we want to propose a tangible contribution by providing a tool which combines conceptual graphs and Dung׳s argumentation system in order to assist medical professionals in their decision making process. The proposed tool allows medical professionals to easily manipulate and visualise queries and answers for making decisions during the practice of teleexpertise. The knowledge modelling is made using an open application programming interface (API) called CoGui, which offers the means for building structured knowledge bases with the dedicated functionalities of graph-based reasoning via retrieved data from different institutions (hospitals, national security centre, and nursing homes). The tool that we have described in this study supports a formal traceable structure of the reasoning with acceptable arguments to elucidate some ethical problems that occur very often in the telemedicine domain. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Opening a new office: the dentist's personal frontier.

    PubMed

    Crafton, B Casey; Lofft, Alexander H

    2006-01-01

    The purpose of this article is to assist the dental practitioner by providing insight into commercial real estate and a framework for identifying and securing new office space, as well as by addressing concerns about the physical space of a dental practice. In the process of identifying and securing new office space, the dental practitioner can maximize efficiency and minimize risk by assembling a team of professionals to assist him or her. This team should be composed of an accountant and an attorney, as well as a dental equipment/design specialist and a commercial real estate professional. The professional team will provide invaluable assistance to the dentist, enabling him or her to avoid major financial, legal, logistic and real estate-related pitfalls inherent in establishing or moving a dental practice.

  7. Investigating the Relationship between Need for Cognition and Skill in Ethical Hackers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Le Blanc, Katya; Freeman, Sarah

    As technology gets more complex and increasingly connected, there is an increasing concern with cyber security. There is also a growing demand for cyber security professionals. Unfortunately there currently are not enough skilled professionals to meet that demand. In order to prepare the next generation of cyber security professionals to meet this demand, we need to understand what characteristics make skilled cyber security professionals. For this work, we focus on professionals who take an offensive approach to cyber security, so called ethical hackers. These hackers utilize many of the same skills that the adversaries that we defend against would use,more » with the goal of identifying vulnerabilities and address them before they are exploited by adversaries. A commonly held belief among ethical hackers is that hackers must possess exceptional curiosity and problem solving skills in order to be successful. Curiosity is has been studied extensively in psychology, but there is no consensus on what it is and how to measure it. Further, many existing inventories for assessing curiosity are targeted at measuring curiosity in children. Although there isn’t an accepted standard to assess curiosity in adults, a related construct, called Need for Cognition (may capture what is meant when people speak of curiosity. The Need for Cognition scale also captures the tendency toward preferring complex problems (which correlates with good problem solving skills), which may provide insight into what make skilled hackers. In addition to the Need for Cognition, we used a structured interview to assess hacker skill. Hackers rated their own skill on a scale from one to ten on a predefined list of hacker skills. They were then asked to rate a peer who they felt was most skilled in each of the skills. They were asked to rate two peers for each skill, one that they worked with directly and one person that was the most skilled in the field (these could be known by reputation only). The hypothesis is that hackers have a higher than average (i.e., compared to non-hackers) Need for cognition and that Need for Cognition will be positively correlated with self-reported and peer reported skill. We interviewed 20 cyber security researchers who specialize in offensive approaches. Based on the responses to the hacker skill inventory, we generated a self-reported skill score for each participant. We also developed a peer-rating for each participant based on the number of times each individual that was interviewed was named as the most skilled in a particular area. The results indicate that the sample of ethical hackers has a high Need for Cognition and that Need for cognition was related to both self-reported skill and peer-reported skill. The results are discussed in the context of training and recruitment of cyber security professionals.« less

  8. Patients' experiences when accessing their on-line electronic patient records in primary care.

    PubMed Central

    Pyper, Cecilia; Amery, Justin; Watson, Marion; Crook, Claire

    2004-01-01

    BACKGROUND: Patient access to on-line primary care electronic patient records is being developed nationally. Knowledge of what happens when patients access their electronic records is poor. AIM: To enable 100 patients to access their electronic records for the first time to elicit patients' views and to understand their requirements. DESIGN OF STUDY: In-depth interviews using semi-structured questionnaires as patients accessed their electronic records, plus a series of focus groups. SETTING: Secure facilities for patients to view their primary care records privately. METHOD: One hundred patients from a randomised group viewed their on-line electronic records for the first time. The questionnaire and focus groups addressed patients' views on the following topics: ease of use; confidentiality and security; consent to access; accuracy; printing records; expectations regarding content; exploitation of electronic records; receiving new information and bad news. RESULTS: Most patients found the computer technology used acceptable. The majority found viewing their record useful and understood most of the content, although medical terms and abbreviations required explanation. Patients were concerned about security and confidentiality, including potential exploitation of records. They wanted the facility to give informed consent regarding access and use of data. Many found errors, although most were not medically significant. Many expected more detail and more information. Patients wanted to add personal information. CONCLUSION: Patients have strong views on what they find acceptable regarding access to electronic records. Working in partnership with patients to develop systems is essential to their success. Further work is required to address legal and ethical issues of electronic records and to evaluate their impact on patients, health professionals and service provision. PMID:14965405

  9. The dual use of research ethics committees: why professional self-governance falls short in preserving biosecurity.

    PubMed

    Salloch, Sabine

    2018-06-05

    Dual Use Research of Concern (DURC) constitutes a major challenge for research practice and oversight on the local, national and international level. The situation in Germany is shaped by two partly competing suggestions of how to regulate security-related research: The German Ethics Council, as an independent political advisory body, recommended a series of measures, including national legislation on DURC. Competing with that, the German National Academy of Sciences and the German Research Foundation, as two major professional bodies, presented a strategy which draws on the self-control of science and, inter alia, suggests expanding the scope of research ethics committees (RECs) to an evaluation of DURC. This situation is taken as an occasion to further discuss the scope and limits of professional self-control with respect to security-related research. The role of RECs as professional bodies of science is particularly analyzed, referring to the theoretical backgrounds of professionalism. Two key sociological features of professionalism - ethical orientation and professional self-control - are discussed with respect to the practice of biomedical science. Both attributes are then analyzed with respect to the assessment of DURC by RECs. In conclusion, it is stated that issues of biosecurity transcend the boundaries of the scientific community and that a more comprehensive strategy should be implemented encompassing both professional self-control and legal oversight.

  10. Poland since Martial Law

    DTIC Science & Technology

    1988-12-01

    medical services, professional mobility , job security, and education. These were among the "human rights" on which the socialist system was said to be...economic reform is to mean anything, job uncertainty will supersede full employment. Professional mobility , once an important safety valve against worker

  11. 77 FR 31851 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-30

    ... identification, U.S. visa number, FCC point of contact, visitor signature, professional title, organizational... pertinent records, or to another public authority or professional organization, if necessary to obtain... secured by limited access card readers. The computer servers themselves are password-protected. Access to...

  12. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  13. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  14. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  15. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  16. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  17. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  18. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  19. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  20. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  1. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  2. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  3. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  4. Professional Development Needs as Perceived by Minnesota Industrial Arts/Technology Teachers.

    ERIC Educational Resources Information Center

    Johnson, Scott D.; Summers, Keith

    1984-01-01

    Describes a profile of professional development needs that was developed through a survey of 150 industrial arts/technology teachers in Minnesota. The greatest need was in the area of job environment: salary, job security, facilities and equipment, and discipline. (SK)

  5. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  6. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  7. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  8. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  9. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  10. MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security

    DTIC Science & Technology

    2007-01-01

    technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region

  11. Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine

    ERIC Educational Resources Information Center

    Bystrova, Bogdana

    2017-01-01

    At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…

  12. From Communities of Interest to Communities of Practice: The Role and Impact of Professional Development in Nuclear Security Education

    ERIC Educational Resources Information Center

    Moran, Matthew; Hobbs, Christopher

    2018-01-01

    In recent years, nuclear security has gained prominence on the international security agenda. Driven by post 9/11 anxieties and the politicization of fears regarding nuclear terrorism, concerns in this area have spawned a wealth of initiatives, which seek to counter this threat. Principal among these have been efforts to promote nuclear security…

  13. An ergonomic analysis of work in the process of professional rehabilitation in Brazil.

    PubMed

    Cabral, A; Souza e Silva, M; Louzada, E; Cesar, W

    2012-01-01

    The purpose of this study is to describe the use of the Ergonomic Analysis of Work (EAW) in the process of rehabilitating workers, insured by the National Institute of Social Security (INSS) in Brazil, and to conduct a brief analysis of the instrument used by this body. Information obtained from EAW enabled the demand, the requirements of the activity and the skills needed to perform the tasks in the workplace to be determined, thus aiding the decision of the INSS as to rehabilitating the workers and their return to their jobs.

  14. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    ERIC Educational Resources Information Center

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  15. Position statement. Restructuring, work redesign, and the job and career security of registered nurses. American Nurses Association.

    PubMed

    1996-01-01

    The American Nurses Association (ANA) is committed to safeguarding the public, protecting and advancing the careers of professional nurses, supporting individual and collective efforts by registered nurses to protect their clients and enhancing the professional development and job security of registered nurses. As the nation's health care system is restructured, ANA is actively engaged in initiatives to strengthen the economic and general welfare of registered nurses, the safety and care for the public, and, in partnership with the state nurses associations (SNAs), oppose efforts to replace registered nurses with inappropriate substitutes.

  16. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  17. Wisconsin Emergency Assistance Volunteer Registry (WEAVR): how physicians can help and why they are needed.

    PubMed

    Katcher, Murray L; Bayou, Billee; Anderson, Henry A; Davis, Jeffrey P

    2005-09-01

    The Wisconsin Division of Public Health (DPH) and its partners have developed the necessary public health infrastructure and core expertise to prepare for, and respond to, public health threats and emergencies. The infrastructure includes 12 public health preparedness consortia that have been established across the state. An important part of the response plan is to assure that the responder workforce is adequate to meet the need at the local, regional, and statewide levels. The responder workforce includes health professional volunteers who, if called on, will take on a variety of assigned roles relevant to a defined incident. In order to facilitate an organized system for volunteers to indicate their skills and availability, DPH has developed a secure and confidential database--the Wisconsin Emergency Assistance Volunteer Registry (WEAVR)--to collect and organize contact information on health professional volunteers and to make contact with volunteers when needed. Physicians, as well as other health professional volunteers, are critical to protect the health and safety of the community, especially if the need to dispense prophylactic medications or to vaccinate the entire population of Wisconsin arises. At the time of an event, volunteers will receive "just-in-time" training after reporting to their assigned location. In other states, physicians have found this emergency training to be of value to their overall practice of medicine. Information about how to sign on to WEAVR is provided.

  18. Human capital flight challenges within an equitable health system.

    PubMed

    Udonwa, N E

    2007-01-01

    The issue of human capital flight has been discussed at different forums with a consensus opinion that it has its merits and demerits to equitable health system. Most often one nation becomes a substantial net exporter of talent, leaving the provider nation at risk of depleting its natural supply of talent. This paper looks into the historical perspective of human capital flight or "brain drain", and its burden. It attempts to elucidate the various causes and suggested solutions. The paper's objective is to educate colleagues on the conceptual and contextual imperatives of the issue. Using a convenient sample of key informants who were medical colleagues in Nigeria relevant information was sourced from these colleagues, documents from the postgraduate medical college of Nigeria and the internet on maters relating to human capital flight and brain drain. Every year, thousands of qualified doctors, and other professionals leave Nigeria tempted by significantly higher wages, brighter prospects for employment and education, stability, food security. It appears that the potential exposure to different working conditions, resources and professional environments can be of advantage to the country, should Nigeria be able to recall these professionals. It also appears that necessary economic reforms that make staying at home rewarding, that is--good leadership, and policy planning that seriously looks into rural development, among other issues, are keys ingredients to reversing the trend in order to ensure a more equitable health system.

  19. [Evaluation of health system decentralization and reform of the Social Security system in Colombia].

    PubMed

    Jaramillo, I

    2002-01-01

    The aim of this study is to present the results of the reforms in the health sector that have taken place in Colombia since 1990. These reforms replaced the previous national health system and the so-called Bismarkian social security system. The new system has three basic characteristics: a) the public subsidies are decentralized in the municipalities and territorial departments; b) the public hospitals have been converted into state social enterprises, which has led them towards a management model, and c) the health and social security system monopoly has been abolished and a system of health subsidies has been created for the poorest citizens. This article systematically collects secondary information extracted from the most important studies evaluating the health sector reforms in Colombia. The present author participated in some of these studies. The reforms have increased financial resources, which, has led to an increase in public system staff and their salaries. The availability of hospitals' budgetary resources has increased and the social security system has become wider, including 20% of the poorest population who have benefited from subsidies on demand. Ease of access and equity in the health system have significantly improved. However, indicators of public health have fallen and health professionals are critical of a system based on mediation, which increases transaction costs.

  20. 33 CFR 137.35 - Inquiries by an environmental professional.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...

  1. 33 CFR 137.35 - Inquiries by an environmental professional.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...

  2. Professional Development: Catalyst for Change?

    ERIC Educational Resources Information Center

    Niederhauser, Dale; Wessling, Sarah

    2011-01-01

    Difficulty securing adequate professional development (PD) has long been a barrier to the effective implementation of educational technology. Concerns about the dearth of PD for helping teachers integrate technology into their instructional practices raised nearly 25 years ago appear to still hold true despite repeated calls for increased…

  3. Professional Development Seen as Employment Capital

    ERIC Educational Resources Information Center

    Mackay, Margaret

    2017-01-01

    Practitioners need to invest in professional development to enhance credibility, job security and employment prospects. Employer expectations of continuing development as a performance measure link to the notion of career capital; namely that knowledge competence influences job advancement. This study uses an interpretivist approach to explore…

  4. Flying Solo: Librarian, Manage Thyself.

    ERIC Educational Resources Information Center

    Siess, Judith A.

    1999-01-01

    Discusses solo librarians, or one-person librarians, and the benefits and disadvantages of being the only professional in a library. Topics include independence, variety, enhanced feelings of self-worth, professional isolation, lack of clerical support, lack of job security, low pay, and a list of pertinent resources. (LRW)

  5. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  6. A layered trust information security architecture.

    PubMed

    de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon

    2014-12-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.

  7. 32 CFR 2700.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Oversight Committee. 2700... MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The OMSN Information Security Oversight Committee shall be chaired...

  8. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...

  9. 32 CFR 2700.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2700... MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The OMSN Information Security Oversight Committee shall be chaired...

  10. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security...

  11. Training in the Post-Terrorism Era.

    ERIC Educational Resources Information Center

    Caudron, Shari

    2002-01-01

    A survey of training professionals revealed how the terrorist attacks of September 11, 2001 changed employee attitudes toward training. Decreased travel, increased use of distance technologies, development of security and evacuation plans, and emphasis on such topics as diversity, stress management, and security are some of the changes. (JOW)

  12. Former Nonproliferation Graduate Fellow Served at U.S. Mission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brim, Cornelia P.

    2014-10-01

    Because of her training and professional experiences, Rosalyn Leitch, a Security Specialist at Pacific Northwest National Laboratory and former Nonproliferation Graduate Fellow with NIS (2012-2013) was able to transition into temporary assignment as UNVIE Acting Nuclear Security Attaché from November 2013 through February 2014.

  13. Dentistry - a professional contained career in healthcare. A qualitative study of Vocational Dental Practitioners' professional expectations.

    PubMed

    Gallagher, Jennifer E; Clarke, Wendy; Eaton, Kenneth A; Wilson, Nairn H F

    2007-11-16

    New graduates in the UK presently spend one year in training as Vocational Dental Practitioners (VDPs) in preparation for primary dental care. There is a growing recognition that the emerging workforce has very different professional expectations to those of earlier generations, with implications for the profession, patients and the performance of health systems. The objectives of this study were to investigate why VDPs' in England and Wales perceive they chose dentistry as a professional career; how they perceive their vision has changed and the implications for their professional career plans, both short- and longterm. Purposive sampling of schemes was undertaken to include urban, rural and metropolitan schemes, schemes in areas with and without dental schools and geographic coverage across England and Wales. All VDPs in these schemes were initiated to participate in this qualitative study using focus groups. A topic guide was utilised to standardise data collection. Informants' views were recorded on tape and in field notes. Data were transcribed and analysed using Framework Methodology. A total of 99 VDPs participated in the 10 focus groups. Their choice of dentistry as a professional career was motivated by multiple categories of influence: 'academic', 'healthcare', 'lifestyle', the influence of 'family', 'friends', 'careers advice' and 'work experience'. Consideration of the features of the 'professional job' appears to have been key to their choice of dentistry and the 'active rejection of medicine' as an alternative career.Entry into the profession was proving a challenging process for some but not all VDPs. Informants perceived that their vision had been moderated as a result of 'personal student debt', 'national workforce initiatives', 'limitations on clinical practice' and the 'cost of additional training'.Short term goals focused around 'recovery from the past' and 'preparation for the future'. Longterm goals covered the spectrum of opportunities within dentistry. Factors influencing VDPs longterm career plans fell into six main categories: professional, personal, financial, political, social and cultural. VDPs chose dentistry because they perceived that it provides a financially lucrative, contained career in healthcare, with professional status, job security and the opportunity to work flexibly. They perceive that their vision is challenged by changes affecting education and the healthcare system. Longterm professional expectations were closely linked with their personal lives and support a vision of a favourable work/life balance.

  14. Dentistry – a professional contained career in healthcare. A qualitative study of Vocational Dental Practitioners' professional expectations

    PubMed Central

    Gallagher, Jennifer E; Clarke, Wendy; Eaton, Kenneth A; Wilson, Nairn HF

    2007-01-01

    Background New graduates in the UK presently spend one year in training as Vocational Dental Practitioners (VDPs) in preparation for primary dental care. There is a growing recognition that the emerging workforce has very different professional expectations to those of earlier generations, with implications for the profession, patients and the performance of health systems. The objectives of this study were to investigate why VDPs' in England and Wales perceive they chose dentistry as a professional career; how they perceive their vision has changed and the implications for their professional career plans, both short- and longterm. Methods Purposive sampling of schemes was undertaken to include urban, rural and metropolitan schemes, schemes in areas with and without dental schools and geographic coverage across England and Wales. All VDPs in these schemes were initiated to participate in this qualitative study using focus groups. A topic guide was utilised to standardise data collection. Informants' views were recorded on tape and in field notes. Data were transcribed and analysed using Framework Methodology. Results A total of 99 VDPs participated in the 10 focus groups. Their choice of dentistry as a professional career was motivated by multiple categories of influence: 'academic', 'healthcare', 'lifestyle', the influence of 'family', 'friends', 'careers advice' and 'work experience'. Consideration of the features of the 'professional job' appears to have been key to their choice of dentistry and the 'active rejection of medicine' as an alternative career. Entry into the profession was proving a challenging process for some but not all VDPs. Informants perceived that their vision had been moderated as a result of 'personal student debt', 'national workforce initiatives', 'limitations on clinical practice' and the 'cost of additional training'. Short term goals focused around 'recovery from the past' and 'preparation for the future'. Longterm goals covered the spectrum of opportunities within dentistry. Factors influencing VDPs longterm career plans fell into six main categories: professional, personal, financial, political, social and cultural. Conclusion VDPs chose dentistry because they perceived that it provides a financially lucrative, contained career in healthcare, with professional status, job security and the opportunity to work flexibly. They perceive that their vision is challenged by changes affecting education and the healthcare system. Longterm professional expectations were closely linked with their personal lives and support a vision of a favourable work/life balance. PMID:18005452

  15. Professional's Attitudes Do Not Influence Screening and Brief Interventions Rates for Hazardous and Harmful Drinkers: Results from ODHIN Study.

    PubMed

    Bendtsen, Preben; Anderson, Peter; Wojnar, Marcin; Newbury-Birch, Dorothy; Müssener, Ulrika; Colom, Joan; Karlsson, Nadine; Brzózka, Krzysztof; Spak, Fredrik; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Okulicz-Kozaryn, Katarzyna; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Palacio, Jorge; Baena, Begoña; Slodownik, Luiza; van Steenkiste, Ben; Wolstenholme, Amy; Wallace, Paul; Keurhorst, Myrna N; Laurant, Miranda G H; Gual, Antoni

    2015-07-01

    To determine the relation between existing levels of alcohol screening and brief intervention rates in five European jurisdictions and role security and therapeutic commitment by the participating primary healthcare professionals. Health care professionals consisting of, 409 GPs, 282 nurses and 55 other staff including psychologists, social workers and nurse aids from 120 primary health care centres participated in a cross-sectional 4-week survey. The participants registered all screening and brief intervention activities as part of their normal routine. The participants also completed the Shortened Alcohol and Alcohol Problems Perception Questionnaire (SAAPPQ), which measure role security and therapeutic commitment. The only significant but small relationship was found between role security and screening rate in a multilevel logistic regression analysis adjusted for occupation of the provider, number of eligible patients and the random effects of jurisdictions and primary health care units (PHCU). No significant relationship was found between role security and brief intervention rate nor between therapeutic commitment and screening rate/brief intervention rate. The proportion of patients screened varied across jurisdictions between 2 and 10%. The findings show that the studied factors (role security and therapeutic commitment) are not of great importance for alcohol screening and BI rates. Given the fact that screening and brief intervention implementation rate has not changed much in the last decade in spite of increased policy emphasis, training initiatives and more research being published, this raises a question about what else is needed to enhance implementation. © The Author 2015. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  16. Security Cooperation and Professional Military Education: Developing Better Theater Campaign Planners

    DTIC Science & Technology

    2012-05-22

    publication of the Security Cooperation Guidance ( SCG ), 32 U.S. Joint Chiefs of Staff, Joint Operation...format and content of the plans themselves. 2 The 2003 release of the classified SCG , which replaced TEPs with TSCPs, rendered CJCSM 3113.01 obsolete...interests while providing the SecDef increased visibility on and control over security cooperation activities, but the SCG was not as explicit in its

  17. Are healthcare professionals working in Australia's immigration detention centres condoning torture?

    PubMed

    Isaacs, David

    2016-07-01

    Australian immigration detention centres are in secluded locations, some on offshore islands, and are subject to extreme secrecy, comparable with 'black sites' elsewhere. There are parallels between healthcare professionals working in immigration detention centres and healthcare professionals involved with or complicit in torture. In both cases, healthcare professionals are conflicted between a duty of care to improve the health of patients and the interests of the government. While this duality of interests has been recognised previously, the full implications for healthcare professionals working in immigration detention have not been addressed. The Australian Government maintains that immigration detention is needed for security checks, but the average duration of immigration detention has increased from 10 weeks to 14 months, and detainees are not informed of the progress of their application for refugee status. Long-term immigration detention causes major mental health problems, is illegal in international law and arguably fulfils the recognised definition of torture. It is generally accepted that healthcare professionals should not participate in or condone torture. Australian healthcare professionals thus face a major ethical dilemma: patients in immigration detention have pressing mental and physical health needs, but providing healthcare might support or represent complicity in a practice that is unethical. Individual healthcare professionals need to decide whether or not to work in immigration detention centres. If they do so, they need to decide for how long and to what extent restrictive contracts and gagging laws will constrain them from advocating for closing detention centres. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. [Social network analysis: a method to improve safety in healthcare organizations].

    PubMed

    Marqués Sánchez, Pilar; González Pérez, Marta Eva; Agra Varela, Yolanda; Vega Núñez, Jorge; Pinto Carral, Arrate; Quiroga Sánchez, Enedina

    2013-01-01

    Patient safety depends on the culture of the healthcare organization involving relationships between professionals. This article proposes that the study of these relations should be conducted from a network perspective and using a methodology called Social Network Analysis (SNA). This methodology includes a set of mathematical constructs grounded in Graph Theory. With the SNA we can know aspects of the individual's position in the network (centrality) or cohesion among team members. Thus, the SNA allows to know aspects related to security such as the kind of links that can increase commitment among professionals, how to build those links, which nodes have more prestige in the team in generating confidence or collaborative network, which professionals serve as intermediaries between the subgroups of a team to transmit information or smooth conflicts, etc. Useful aspects in stablishing a safety culture. The SNA would analyze the relations among professionals, their level of communication to communicate errors and spontaneously seek help and coordination between departments to participate in projects that enhance safety. Thus, they related through a network, using the same language, a fact that helps to build a culture. In summary, we propose an approach to safety culture from a SNA perspective that would complement other commonly used methods.

  19. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  20. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  1. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  2. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  3. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  4. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... DEPARTMENT OF HOMELAND SECURITY Notice of Meeting of the Homeland Security Information Network... Security. ACTION: Notice of open meeting. SUMMARY: The Homeland Security Information Network Advisory... (Pub. L. 92-463). The mission of the Homeland Security Information Network Advisory Committee is to...

  5. 78 FR 16726 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Price, Managing Director, Securities Industry and Financial Markets Association, dated October 4, 2012... other industry professionals will have difficulty pricing options during Limit States and Straddle... conditions have changed and (ii) gaming the obvious error rule to retroactively adjust market maker quotes by...

  6. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and

  7. 12 CFR 605.501 - Information Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  8. 12 CFR 605.501 - Information Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  9. Medical students and personal smartphones in the clinical environment: the impact on confidentiality of personal health information and professionalism.

    PubMed

    Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C

    2014-05-22

    Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address the threat to patient confidentiality posed by the use of unsecured communication devices such as smartphones.

  10. A Layered Trust Information Security Architecture

    PubMed Central

    de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon

    2014-01-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490

  11. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...

  12. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  13. Professional Challenges in School Counseling: Organizational, Institutional and Political

    ERIC Educational Resources Information Center

    Hatch, Trish A.

    2008-01-01

    The school counseling profession has struggled throughout history to secure a legitimate integral position in the educational mission of school. The profession is more likely to gain acceptance and be seen as a legitimate profession if we understand three theories that form the foundation of professional legitimacy: Organizational Theory,…

  14. 20 CFR 438.205 - Professional and technical services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...

  15. 20 CFR 438.205 - Professional and technical services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...

  16. The Use of BS7799 Information Security Standard to Construct Mechanisms for the Management of Medical Organization Information Security

    NASA Astrophysics Data System (ADS)

    Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung

    According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.

  17. Online trust, trustworthiness, or assurance?

    PubMed

    Cheshire, Coye

    2011-01-01

    Every day, individuals around the world retrieve, share, and exchange information on the Internet. We interact online to share personal information, find answers to questions, make financial transactions, play social games, and maintain professional and personal relationships. Sometimes our online interactions take place between two or more humans. In other cases, we rely on computers to manage information on our behalf. In each scenario, risk and uncertainty are essential for determining possible actions and outcomes. This essay highlights common deficiencies in our understanding of key concepts such as trust, trustworthiness, cooperation, and assurance in online environments. Empirical evidence from experimental work in computer-mediated environments underscores the promises and perils of overreliance on security and assurance structures as replacements for interpersonal trust. These conceptual distinctions are critical because the future shape of the Internet will depend on whether we build assurance structures to limit and control ambiguity or allow trust to emerge in the presence of risk and uncertainty.

  18. Storing and using health data in a virtual private cloud.

    PubMed

    Regola, Nathan; Chawla, Nitesh V

    2013-03-13

    Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical methods to the data and will also enable a wide variety of new applications that will be meaningful to patients and medical professionals. Researchers are often granted access to health care data to assist in the data mining process, but HIPAA regulations mandate comprehensive safeguards to protect the data. Often universities (and presumably other research organizations) have an enterprise information technology infrastructure and a research infrastructure. Unfortunately, both of these infrastructures are generally not appropriate for sensitive research data such as HIPAA, as they require special accommodations on the part of the enterprise information technology (or increased security on the part of the research computing environment). Cloud computing, which is a concept that allows organizations to build complex infrastructures on leased resources, is rapidly evolving to the point that it is possible to build sophisticated network architectures with advanced security capabilities. We present a prototype infrastructure in Amazon's Virtual Private Cloud to allow researchers and practitioners to utilize the data in a HIPAA-compliant environment.

  19. Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets

    ERIC Educational Resources Information Center

    Ayyagari, Ramakrishna; Figueroa, Norilyz

    2017-01-01

    Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…

  20. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...

  1. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  2. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  3. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Homeland Security Information Network Advisory... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet... posted beforehand at this link: http://www.dhs.gov/homeland-security-information-network-advisory...

  4. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  5. Review of FEWS NET Biophysical Monitoring Requirements

    NASA Technical Reports Server (NTRS)

    Ross, K. W.; Brown, Molly E.; Verdin, J.; Underwood, L. W.

    2009-01-01

    The Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to famine and food insecurity. FEWS NET transforms satellite remote sensing data into rainfall and vegetation information that can be used by these decision makers. The National Aeronautics and Space Administration has recently funded activities to enhance remote sensing inputs to FEWS NET. To elicit Earth observation requirements, a professional review questionnaire was disseminated to FEWS NET expert end-users: it focused upon operational requirements to determine additional useful remote sensing data and; subsequently, beneficial FEWS NET biophysical supplementary inputs. The review was completed by over 40 experts from around the world, enabling a robust set of professional perspectives to be gathered and analyzed rapidly. Reviewers were asked to evaluate the relative importance of environmental variables and spatio-temporal requirements for Earth science data products, in particular for rainfall and vegetation products. The results showed that spatio-temporal resolution requirements are complex and need to vary according to place, time, and hazard: that high resolution remote sensing products continue to be in demand, and that rainfall and vegetation products were valued as data that provide actionable food security information.

  6. Physicians' Self-Conceptions of Their Expertise in Statutory Health Insurance and Social Security Systems.

    PubMed

    Seger, Wolfgang; Nüchtern, Elisabeth

    2015-07-01

    Medical experts who practice social medicine have a strong ethical approach for their professional positions. Their reports must reflect an objective, independent, high-quality assessment of interactions between health status and the disability of individuals. However, they must simultaneously consider the societal involvement of these individuals when determining the framework of the Statutory Health Insurance and Social Security Systems. Their task is to recommend sociomedical benefits that are tailored to suit personal needs and that respect the individual life situations of the persons involved, thus complementing the efforts of healthcare professionals in clinical settings. The editorial describes the self-conception of this medical specialty on behalf of the German Society of Social Medicine and Prevention (DGSMP). Policy makers in social insurances and social security systems generally must respect independent sociomedical recommendations as a crucial point for further realistic development activities.

  7. Professional convergence in forensic practice.

    PubMed

    Mercer, D; Mason, T; Richman, J

    2001-06-01

    This paper outlines the development and convergence of forensic science and secure psychiatric services in the UK, locating the professionalization of forensic nursing within a complex web of political, economic, and ideological structures. It is suggested that a stagnation of the therapeutic enterprise in high and medium security provision has witnessed an intrusion of medical power into the societal body. Expanding technologies of control and surveillance are discussed in relation to the move from modernity to postmodernity and the ongoing dynamic of medicalized offending. Four aspects of globalization are identified as impacting upon the organization and application of forensic practice: (i) organized capitalism and the exhaustion of the welfare state; (ii) security versus danger and trust versus risk; (iii) science as a meta-language; and (iv) foreclosure as a mechanism of censorship. Finally, as a challenge for the profession, some predictions are offered about the future directions or demise of forensic nursing.

  8. 32 CFR 2103.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...

  9. 32 CFR 2103.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...

  10. Residential staff responses to adolescent self-harm: The helpful and unhelpful.

    PubMed

    Johnson, Dan R; Ferguson, Kirstin; Copley, Jennifer

    2017-07-01

    Adolescent self-harm is prevalent in residential and secure care and is the cause of distress to those harming themselves, to the staff caring for them and for other young people living with them. This article sought service user views on what staff supports were effective and what were counter-productive in order to improve the care offered to young people. Seven young people living in residential or secure care were interviewed. Thematic analysis was used to elicit key themes. Global themes of safety and care were elicited. The young people understood and accepted that the role of staff was to provide these. Within these themes, they noted numerous responses that had both helpful and unhelpful effects, including increased observation, removal of means and extra collaborative support. Service users made numerous recommendations to increase the helpful effects of staff support. Young people provided informed and helpful guidance on how best to care for them. Their views can help mental health professionals and care staff increase their helpful responses making them more effective and less counter-productive. This study is a rare representation of the views of young people in residential and secure care and how to respond to their self-harm behaviour.

  11. Wireless communication in health care: who will win the right to send data boldly where no data has gone before?

    PubMed

    Campbell, Robert J; Durigon, Louis

    2003-01-01

    Increasingly, health care professionals will need to retrieve, store, share, and send data using several types of wireless devices. These devices include personal digital assistants, laptops, Web tablets, cell phones, and clothing that monitor heart rate and blood pressure. Regardless of the device, several standards will vie for the right to provide the wireless communications link between the health care professional and the wired data resources located within a health care organization. This article identifies the top three technologies in the wireless communications field: Wireless Fidelity (WiFi), Mobile Communications, and Bluetooth; breaks down each according to its strengths and weaknesses; and makes recommendations for their use by health care professionals located inside and outside a health care facility. Where appropriate the discussion includes an explication of how a specific technology can be made secure from hackers and other security breeches.

  12. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    PubMed

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  13. Security Shift in Future Network Architectures

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 2 - 1 Security Shift in Future Network Architectures Tim Hartog, M.Sc Information Security Dept. TNO Information and...current practice military communication infrastructures are deployed as stand-alone networked information systems. Network -Enabled Capabilities (NEC) and...information architects and security specialists about the separation of network and information security, the consequences of this shift and our view

  14. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  15. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  16. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  17. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  18. 75 FR 57904 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... Office, --Update of NIST Computer Security Division, and --Information Security and Privacy Advisory... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet...

  19. Database Systems and Oracle: Experiences and Lessons Learned

    ERIC Educational Resources Information Center

    Dunn, Deborah

    2005-01-01

    In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…

  20. Perspectives of Transplant Professionals on the Values, Ethics, and Challenges of Living Kidney Donor Evaluation in Asia.

    PubMed

    Tong, Allison; Chapman, Jeremy R; Kee, Terence; Li, Philip K T; Tsai, Daniel F C; Wong, Germaine; Craig, Jonathan C

    2015-07-01

    Deceased donor rates in Asia are among the lowest in the world. This has necessitated a reliance on living kidney donation, which has given rise to concerns about donor motivation and assessment in this region. We aimed to describe transplant professional perspectives on living kidney donor evaluation in Asia. Face-to-face, semistructured interviews were conducted with 53 transplant professionals (nephrologists [n = 21], surgeons/urologists [n = 17], coordinators [n = 7], social workers [n = 5], ethicists [n = 2], psychologist [n = 1]) from 20 centers in 10 countries. Transcripts were analyzed thematically to identify themes. The theme of traversing vulnerability overarched 4 themes. Vigilance against exploitation of the vulnerable meant mitigating the threat of commercial transplantation, combating disparities, and verifying volunteerism. Maintaining clarity of professional roles encompassed the perceived necessity of legal safeguards to determine legitimacy of relationships, ensuring informed consent, demarcating responsibilities, minimizing conflict of interest, meeting community expectations, and resolving ambivalence regarding donor risk. Societal plight driving caution about living kidney donor assessment was emphasized in the context of poverty and desperation, higher risk of disease, and lack of social security. Navigating sociocultural barriers acknowledged the centrality of the family, economic priorities, distrust in modern medicine, generational traditions, and emotional opacity limiting their ability to gauge donor motivation. Moral, professional, sociocultural and societal vulnerabilities contribute to the barriers and ethical quandaries in living kidney donation in Asia. Strategies are needed to address culturally based anxieties and disparities in living donation. Transplant professionals depend on strong legislation and policies to prevent exploitation of living donors.

  1. On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    NASA Astrophysics Data System (ADS)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.

  2. Public security female workers at the coast of Paraná, Brazil: intersections of gender, work, violence(s), and health.

    PubMed

    Schneider, Daniele; Signorelli, Marcos Claudio; Pereira, Pedro Paulo Gomes

    2017-09-01

    This study aimed to promote visibility of women working in public security along the Parana coast, articulating issues of gender, violence(s), and the health-disease process. The methodology was qualitative, through an ethnographic research which included 50 women (civilians, military policewomen, and prison officers) from municipalities along the Parana coast, between March 2014 and March 2015. Results revealed: 1) the dilemmas that these women are subjected to, facing the seasonal dynamics in the field of public security in the region; 2) exposure to violence (mainly institutional and gender-based) and its impact on these women's health; 3) power relations, marked by corporations' hierarchies and gender asymmetries between men and women in professional settings. In summary, this research highlighted the need to promote visibility of women working in public security institutions, considering the impact of violence and gender inequalities in their personal and professional lives, including the resistance and rearrangements promoted by these women in the institutions in response to their presence in a hegemonic and traditionally male environment.

  3. Summary and conclusions from the SIWI Seminar for Young Water Professionals Drainage basin security--implications of virtual water trade and agricultural subsidies at regional, national and local levels.

    PubMed

    Johannessen, A

    2004-01-01

    This is a summary of the Young Water Professionals Seminar involving more than 50 young people from all over the world working with water. The presentations and following discussion were very lively and were about how subsidies and trade barriers imposed by the developed countries are influencing the income-generating capacity of millions of people in the developing world. Even though this is a very complex issue not easily resolved during the seminar it was also clear that there are some fundamental problems that need to be addressed. The importance of looking for solutions at different levels (i.e. local, regional, national) was highlighted as well as the policy of double standards, preaching free trade but only for the benefit of overdeveloped countries themselves. Further it was discussed how to achieve basin security through food security, and managing water for food security. The conclusion was that win-win solutions would be made if agricultural subsidies were to be completely removed.

  4. SocialRAD: an infrastructure for a secure, cooperative, asynchronous teleradiology system.

    PubMed

    Figueiredo, João Filho Matos; Motta, Gustavo Henrique Matos Bezerra

    2013-01-01

    The popularity of teleradiology services has enabled a major advance in the provision of health services to areas with difficult geographical access. However, this potential has also brought with it a number of challenges: the large volume of data, characteristic of imaging tests, and security requirements designed to ensure confidentiality and integrity. Moreover, there is also a number of ethical questions involving the dominant model on the market, whereby this service is outsourced to private companies, and is not directly undertaken by professional radiologists. Therefore, the present paper proposes a cooperative model of teleradiology, where health professionals interact directly with the hospitals providing patient care. This has involved the integration of a wide range of technologies, such as the interconnection models Peer-to-Peer, Cloud Computing, Dynamic DNS, RESTful Web Services, as well as security and interoperability standards, with the aim of promoting a secure, collaborative asynchronous environment. The developed model is currently being used on an experimental basis, providing teleradiology support to cities in the north-eastern hinterland of Brazil, and is fulfilling all expectations.

  5. Interpreting international governance standards for health IT use within general medical practice.

    PubMed

    Mahncke, Rachel J; Williams, Patricia A H

    2014-01-01

    General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.

  6. Towards Social Radiology as an Information Infrastructure: Reconciling the Local With the Global

    PubMed Central

    2014-01-01

    The current widespread use of medical images and imaging procedures in clinical practice and patient diagnosis has brought about an increase in the demand for sharing medical imaging studies among health professionals in an easy and effective manner. This article reveals the existence of a polarization between the local and global demands for radiology practice. While there are no major barriers for sharing such studies, when access is made from a (local) picture archive and communication system (PACS) within the domain of a healthcare organization, there are a number of impediments for sharing studies among health professionals on a global scale. Social radiology as an information infrastructure involves the notion of a shared infrastructure as a public good, affording a social space where people, organizations and technical components may spontaneously form associations in order to share clinical information linked to patient care and radiology practice. This article shows however, that such polarization establishes a tension between local and global demands, which hinders the emergence of social radiology as an information infrastructure. Based on an analysis of the social space for radiology practice, the present article has observed that this tension persists due to the inertia of a locally installed base in radiology departments, for which common teleradiology models are not truly capable of reorganizing as a global social space for radiology practice. Reconciling the local with the global signifies integrating PACS and teleradiology into an evolving, secure, heterogeneous, shared, open information infrastructure where the conceptual boundaries between (local) PACS and (global) teleradiology are transparent, signaling the emergence of social radiology as an information infrastructure. PMID:25600710

  7. Clinical audit of emergency unit before and after establishment of the emergency medicine department.

    PubMed

    Amini, Afshin; Dindoost, Payam; Moghimi, Mehrdad; Kariman, Hamid; Shahrami, Ali; Dolatabadi, Ali Arhami; Ali-Mohammadi, Hossein; Alavai-Moghaddam, Mostafa; Derakhshanfar, Hojjat; Hatamabadi, HamidReza; Heidari, Kamran; Alamdari, Shahram; Meibodi, Mohammad Kalantar; Shojaee, Majid; Foroozanfar, Mohammad Mehdi; Hashemi, Behrooz; Sabzeghaba, Anita; Kabir, Ali

    2012-02-01

    To assess the deficiencies and potential areas through a medical audit of the emergency departments, in six general hospitals affiliated to Shahid Beheshti University of Medical Sciences at Tehran, Iran, after preparing specific wards-based international standards. A checklist was completed for all hospitals which met our eligibility criteria mainly observation and interviews with head nurses and managers of the emergency medicine unit of the hospitals before (2003) and after (2008) the establishment of emergency departments there. Domains studied included staffing, education and continuing professional development (CPD), facility (design), equipment, ancillary services, medical records, manuals and references, research, administration, pre-hospital care, information systems, disaster planning, bench-marking and hospital accreditation. Education and CPD (p = 0.042), design and facility (p = 0.027), equipment (p = 0.028), and disaster (p = 0.026) had significantly improved after the establishment of emergency departments. Nearly all domains showed a positive change though it was non-significant in a few. In terms of observation, better improvement was seen in disaster, security, design, and research. According to the score for each domain compared to what it was in the earlier phase, better improvement was observed in hospital accreditation, information systems, security, disaster planning, and research. Security, disaster planning, research, design and facility had improved in hospitals that wave studied, while equipment, records, ancillary services, administration and bench-marking had the lowest improvement even after the establishment of emergency department, and, hence, needed specific attention.

  8. Information Security: Computer Hacker Information Available on the Internet

    DTIC Science & Technology

    1996-06-05

    INFORMATION SECURITY Computer Hacker Information Available on the Internet Statement for the Record of...Report Type N/A Dates Covered (from... to) - Title and Subtitle INFORMATION SECURITY Computer Hacker Information Available on the Internet Contract...1996 4. TITLE AND SUBTITLE Information Security: Computer Hacker Information Available on the Internet 5. FUNDING NUMBERS 6. AUTHOR(S) Jack L.

  9. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    PubMed

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.

  10. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    PubMed

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  11. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  12. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...

  13. [International cooperation on aging: areas and players].

    PubMed

    Sidorenko, A V; Mikhaĭlova, O N

    2014-01-01

    This review article is devoted to the issues of international cooperation on ageing. It aims at describing the basic areas of cooperation and introducing its major players. Within the limited length of a journal article it is hardly possible to offer an exhaustive presentation of all available information; thus the article strives to provide a general orientation within the selected themes. The authors are hopeful that the presented materials will be of interest to the policy oriented researchers, policy makers and professionals working in the field of ageing and related areas such as social security, health and social services etc., as well as to the activists of non-governmental organizations.

  14. Standard reporting for medical apps.

    PubMed

    Albrecht, Urs-Vito; Von Jan, Ute; Pramann, Oliver

    2013-01-01

    Apps running on mobile devices are continually gaining importance, for medical professionals as well as for patients. When used appropriately, they can support their users, have the potential to increase efficiency and to lower costs. However, the information available for "medical apps" that are currently being distributed in the official mobile app stores of different mobile platforms often rather raises than answers questions regarding important aspects such as functionality, limits, data integrity, security and privacy. In this paper, we analyze the current situation, including a basic overview over current reporting and regulatory mechanisms and propose the use of an app-synopsis as step in direction of transparency.

  15. 77 FR 42036 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... Market Maker,\\5\\ Firm Proprietary and Customer (Professional) \\6\\ orders; and (ii) $0.78 per contract for Non-ISE Market Maker \\7\\ orders. Priority Customer \\8\\ orders are not charged a ``taker'' fee for... Proprietary and Customer (Professional) orders. Priority Customer orders are not charged a ``maker'' fee for...

  16. 77 FR 16304 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-20

    ...\\ Market Maker Plus,\\8\\ Firm Proprietary, Customer (Professional),\\9\\ Non-ISE Market Maker,\\10\\ and Priority Customer.\\11\\ The Exchange is proposing to increase certain rebates for certain complex orders, as... determine whether or not they are meeting the Exchange's stated criteria. \\9\\ A Customer (Professional) is a...

  17. Selected Organizational Factors Affecting Performance of Professional Nurses in North West Bank Governmental Hospitals

    ERIC Educational Resources Information Center

    Thulth, Ahida Saleem; Sayej, Sumaya

    2015-01-01

    Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess of selected organizational factors (workload, available recourses and…

  18. Relationship between Innovation and Professional Communication in the "Creative" Economy

    ERIC Educational Resources Information Center

    Hailey, David; Cox, Matthew; Loader, Emily

    2010-01-01

    We evaluate 45 jobs professional communicators might occupy. Specifically, we examine the impact of creativity on careers that may become more or less easily outsourced domestically or offshore in the future. We are unable to find any particular relationship between creativity, per se, and job security. Instead, we find that people with knowledge…

  19. Professional Amnesia: A Suitable Case for Treatment

    ERIC Educational Resources Information Center

    Drummond, Mary Jane

    2005-01-01

    Early Years educators have always had a particularly secure feel for what lies at the heart of vibrant education, for "a principled understanding of learning." Here Mary Jane Drummond reminds the reader, not only that professional knowledge exists outside ring binders, but that, prior to their emergence, we did know some very important things we…

  20. Homeland security challenges in nursing practice.

    PubMed

    Boatright, Connie; McGlown, K Joanne

    2005-09-01

    Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.

  1. Old-and With Severe Heart Failure: Telemonitoring by Using Digital Pen Technology in Specialized Homecare: System Description, Implementation, and Early Results.

    PubMed

    Lind, Leili; Carlgren, Gunnar; Karlsson, Daniel

    2016-08-01

    Telehealth programs for heart failure have been studied using a variety of techniques. Because currently a majority of the elderly are nonusers of computers and Internet, we developed a home telehealth system based on digital pen technology. Fourteen patients (mean age, 84 years [median, 83 years]) with severe heart failure participated in a 13-month pilot study in specialized homecare. Participants communicated patient-reported outcome measures daily using the digital pen and health diary forms, submitting a total of 3 520 reports. The reports generated a total of 632 notifications when reports indicated worsening health. Healthcare professionals reviewed reports frequently, more than 4700 times throughout the study, and acted on the information provided. Patients answered questionnaires and were observed in their home environment when using the system. Results showed that the technology was accepted by participants: patients experienced an improved contact with clinicians; they felt more compliant with healthcare professionals' advice, and they felt more secure and more involved in their own care. Via the system, the healthcare professionals detected heart failure-related deteriorations at an earlier stage, and as a consequence, none of the patients were admitted into hospital care during the study.

  2. Patient and health care professional views and experiences of computer agent-supported health care.

    PubMed

    Neville, Ron G; Greene, Alexandra C; Lewis, Sue

    2006-01-01

    To explore patient and health care professional (HCP) views towards the use of multi-agent computer systems in their GP practice. Qualitative analysis of in-depth interviews and analysis of transcriptions. Urban health centre in Dundee, Scotland. Five representative healthcare professionals and 11 patients. Emergent themes from interviews revealed participants' attitudes and beliefs, which were coded and indexed. Patients and HCPs had similar beliefs, attitudes and views towards the implementation of multi-agent systems (MAS). Both felt modern communication methods were useful to supplement, not supplant, face-to-face consultations between doctors and patients. This was based on the immense trust these patients placed in their doctors in this practice, which extended to trust in their choice of communication technology and security. Rapid access to medical information increased patients' sense of shared partnership and self-efficacy. Patients and HCPs expressed respect for each other's time and were keen to embrace technology that made interactions more efficient, including for the altruistic benefit of others less technically competent. Patients and HCPs welcomed the introduction of agent technology to the delivery of health care. Widespread use will depend more on the trust patients place in their own GP than on technological issues.

  3. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    ERIC Educational Resources Information Center

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  4. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  5. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  6. 49 CFR 8.9 - Information Security Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  7. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... Clause 1352.239-73, Security Requirements for Information Technology Resources, is needed, contracting... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339...

  8. 49 CFR 8.9 - Information Security Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  9. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  10. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  11. Common object request broker architecture (CORBA)-based security services for the virtual radiology environment.

    PubMed

    Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K

    2000-05-01

    The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.

  12. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Information regarding security risk for a chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...

  13. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    ERIC Educational Resources Information Center

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  14. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  15. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  16. Application of PKI in health care--needs, ambitions, prospects.

    PubMed

    Suselj, Marjan; Marcun, Tomaz; Trcek, Denis; Kandus, Gorazd

    2003-01-01

    Through continual development and considerable investment over the past years, Slovenia has established an information infrastructure providing efficient data links between all the health care actors. This includes furnishing all the citizens and health workers with microprocessor cards--health insurance card and health professional card. These tools have significantly simplified different procedures in the health care and brought services closer to insured persons. The know-how and experiences gathered to day have given rise to vivid discussions of further development steps: introduction of new contents on the infrastructure in place and technological upgrading, in particular progressive incorporation of the PKI concept and thereby integration of card and network solutions to provide an efficient and secure communication environment. This paper outlines key perspectives of the future developments in this segment. With the volume of health care data communications through internet growing steeply, and with the paramount importance of patient--doctor trust and confidence, security tools and solutions in the health care are a critical need.

  17. Using Publicly Available Data to Characterize Consumers Use of Email to Communicate with Healthcare Providers.

    PubMed

    Sandefer, Ryan H; Khairat, Saif S; Pieczkiewicz, David S; Speedie, Stuart M

    2015-01-01

    The use of patient focused technology has been proclaimed as a means to improve patient satisfaction and improve care outcomes. The Center for Medicaid/Medicare Services, through its EHR Incentive Program, has required eligible hospitals and professionals to send and receive secure messages from patients in order to receive financial incentives and avoid reimbursement penalties. Secure messaging between providers and patients has the potential to improve communication and care outcomes. The purpose of this study was to use National Health Interview Series (NHIS) data to identify the patient characteristics associated with communicating with healthcare providers via email. Individual patient characteristics were analyzed to determine the likelihood of emailing healthcare providers. The use of email for this purpose is associated with educational attainment, having a usual place of receiving healthcare, income, and geography. Publicly available data such as the NHIS may be used to better understand trends in adoption and use of consumer health information technologies.

  18. 12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...

  19. 75 FR 63499 - Extension of Agency Information Collection Activity Under OMB Review: Sensitive Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-15

    ... Information Collection Activity Under OMB Review: Sensitive Security Information Threat Assessments AGENCY... Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of... of a party seeking access to sensitive security information (SSI) in a civil proceeding in Federal...

  20. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  1. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  2. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  3. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...

  4. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  5. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  6. Strengthening Rehabilitation in Health Systems Worldwide by Integrating Information on Functioning in National Health Information Systems.

    PubMed

    Stucki, Gerold; Bickenbach, Jerome; Melvin, John

    2017-09-01

    A complete understanding of the experience of health requires information relevant not merely to the health indicators of mortality and morbidity but also to functioning-that is, information about what it means to live in a health state, "the lived experience of health." Not only is functioning information relevant to healthcare and the overall objectives of person-centered healthcare but to the successful operation of all components of health systems.In light of population aging and major epidemiological trends, the health strategy of rehabilitation, whose aim has always been to optimize functioning and minimize disability, will become a key health strategy. The increasing prominence of the rehabilitative strategy within the health system drives the argument for the integration of functioning information as an essential component in national health information systems.Rehabilitation professionals and researchers have long recognized in WHO's International Classification of Functioning, Disability and Health the best prospect for an internationally recognized, sufficiently complete and powerful information reference for the documentation of functioning information. This paper opens the discussion of the promise of integrating the ICF as an essential component in national health systems to secure access to functioning information for rehabilitation, across health systems and countries.

  7. XRIndex: a brief screening tool for individual differences in security threat detection in x-ray images

    PubMed Central

    Rusconi, Elena; Ferri, Francesca; Viding, Essi; Mitchener-Nissen, Timothy

    2015-01-01

    X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported attention to detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012). Here, we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score from the autism-spectrum quotient (AQ) questionnaire (Baron-Cohen et al., 2001) is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals. PMID:26321935

  8. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  9. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  10. The hobbyist phenomenon in physical security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michaud, E. C.

    Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less

  11. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less

  12. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...

  13. Approach to estimation of level of information security at enterprise based on genetic algorithm

    NASA Astrophysics Data System (ADS)

    V, Stepanov L.; V, Parinov A.; P, Korotkikh L.; S, Koltsov A.

    2018-05-01

    In the article, the way of formalization of different types of threats of information security and vulnerabilities of an information system of the enterprise and establishment is considered. In a type of complexity of ensuring information security of application of any new organized system, the concept and decisions in the sphere of information security are expedient. One of such approaches is the method of a genetic algorithm. For the enterprises of any fields of activity, the question of complex estimation of the level of security of information systems taking into account the quantitative and qualitative factors characterizing components of information security is relevant.

  14. Social media for radiologists: an introduction.

    PubMed

    Ranschaert, Erik R; van Ooijen, P M A; Lee, Simon; Ratib, Osman; Parizel, P M

    2015-12-01

    Social media, which can be defined as dynamic and interactive online communication forums, are becoming increasingly popular, not only for the general public but also for radiologists. In addition to assisting radiologists in finding useful profession-related information and interactive educational material in all kinds of formats, they can also contribute towards improving communication with peers, clinicians, and patients. The growing use of social networking in healthcare also has an impact on the visibility and engagement of radiologists in the online virtual community. Although many radiologists are already using social media, a large number of our colleagues are still unaware of the wide spectrum of useful information and interaction available via social media and of the added value these platforms can bring to daily practice. For many, the risk of mixing professional and private data by using social media creates a feeling of insecurity, which still keeps radiologists from using them. In this overview we aim to provide information on the potential benefits, challenges, and inherent risks of social media for radiologists. We will provide a summary of the different types of social media that can be of value for radiologists, including useful tips on how to use them safely and efficiently. • Online social networking enhances communication and collaboration between peers • Social media facilitate access to educational and scientific information • Recommendations and guidelines from policymakers and professional organisations are needed • Applications are desired for efficient and secure exchange of medical images in social media.

  15. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    PubMed

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  16. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...

  17. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...

  18. Creating a career legacy map to help assure meaningful work in nursing.

    PubMed

    Hinds, Pamela S; Britton, Dorienda R; Coleman, Lael; Engh, Eileen; Humbel, Tina Kunze; Keller, Susan; Kelly, Katherine Patterson; Menard, Johanna; Lee, Marlene A; Roberts-Turner, Renee; Walczak, Dory

    2015-01-01

    When nurses declare a professional legacy (or what they intend to be better in health care because of their efforts), they are likely to maintain a focus on achieving their legacy and to experience meaning in the process. We depict the legacy and involved steps in creating a legacy map, which is a concrete guide forward to intended career outcomes. Informed by the "meaningful work" literature, we describe a legacy map, its function, the process to create one, and the application of a legacy map to guide careers. We also describe an administrative benefit of the legacy map-the map can be used by team leaders and members to secure needed resources and opportunities to support the desired legacy of team members. Legacy mapping can be a self-use career guidance tool for nurses and other health care professionals or a tool that links the career efforts of a team member with the career support efforts of a team leader. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. Development of Standardized Clinical Training Cases for Diagnosis of Sexual Abuse using a Secure Telehealth Application

    ERIC Educational Resources Information Center

    Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia

    2012-01-01

    Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…

  20. Working Connections: Suzan Lee--UBS Securities LLC, New York

    ERIC Educational Resources Information Center

    Library Journal, 2004

    2004-01-01

    This article is about Suzan Lee of UBS Securities LLC in New York, a person who is dedicated to connecting aspiring professionals to opportunities in the world of special libraries. In 1999, Lee realized that most library students had only one resource for internships--their library schools--and that these offerings focused largely on public and…

  1. 46 CFR 503.52 - Senior agency official.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 9 2011-10-01 2011-10-01 false Senior agency official. 503.52 Section 503.52 Shipping FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security...'s information security program, which includes oversight (self-inspection) and security information...

  2. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  3. The importance of effective catheter securement.

    PubMed

    Fisher, Jayne

    This article examines the importance of securing/fixing indwelling urinary catheters. The Oxford English dictionary interlinks the two words-'secure' and 'fix'-as having the same meaning. To secure the catheter should not be confused with 'support', whereby the weight of the urine drainage bag is supported with the use of velcro straps or a sleeve. The author introduces the need for the concept of this practice to be at the forefront of nurses' minds in all settings, and this is demonstrated through the use of case studies. Current guidance in this area is reviewed, as well as the problems that can arise when catheters are not secured properly and the available products for health professionals to use.

  4. 6 CFR 7.27 - Declassification and downgrading.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY INFORMATION Classified Information § 7.27 Declassification and downgrading. (a) Classified... Security Officer. (b) Information shall be declassified or downgraded by the official who authorized the... Secretary of Homeland Security or the Chief Security Officer. (c) It is presumed that information that...

  5. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  6. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  7. 78 FR 26057 - Extension of Agency Information Collection Activity Under OMB Review: Pipeline Corporate Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-03

    ... Information Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request... current industry security practices through its Pipeline Corporate Security Review (PCSR) program. The...

  8. 77 FR 35727 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... categories: ISE Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary, Customer (Professional),\\8\\ Non-ISE Market Maker,\\9\\ and Priority Customer.\\10\\ The Exchange is proposing to increase certain rebate amounts... Customer (Professional) is a person who is not a broker/ dealer and is not a Priority Customer. \\9\\ A Non...

  9. Operational Contract Support: Economic Impact Evaluation and Measures of Effectiveness

    DTIC Science & Technology

    2017-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES...DATES COVERED MBA professional report 4. TITLE AND SUBTITLE OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES OF EFFECTIVENESS 5...evaluation, expeditionary economics , operational contract support, measure of effectiveness 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY

  10. CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009

    DTIC Science & Technology

    2009-12-01

    an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210

  11. 77 FR 28914 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary and Customer (Professional) \\8\\ orders; and (ii... for ISE Market Maker, Market Maker Plus, Firm Proprietary and Customer (Professional) orders; and (ii... Plus is an ISE Market Maker who is on the National Best Bid or National Best Offer 80% of the time for...

  12. Mentoring and Personal Relationships Are Perceived Benefits of Serving as an Athletic Training Preceptor

    ERIC Educational Resources Information Center

    Bowman, Thomas G.; Mazerolle, Stephanie M.; Dodge, Thomas M.

    2013-01-01

    Context: Preceptors play a vital role in athletic training education as they mentor and socialize athletic training students into their professional role. Exploring the benefits to serving as a preceptor is important to secure appropriate professional role models for students. Objective: To determine the benefits of serving as an athletic training…

  13. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  14. Information security of power enterprises of North-Arctic region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  15. Disaster at a University: A Case Study in Information Security

    ERIC Educational Resources Information Center

    Ayyagari, Ramakrishna; Tyks, Jonathan

    2012-01-01

    Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…

  16. 6 CFR 7.12 - Violations of classified information requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Violations of classified information requirements. 7.12 Section 7.12 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED NATIONAL SECURITY INFORMATION Administration § 7.12 Violations of classified information...

  17. 78 FR 77484 - Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... Federal agency for pipeline security, it is important for TSA to have contact information for company... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY...

  18. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  19. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  20. 75 FR 38595 - Guidance to States Regarding Driver History Record Information Security, Continuity of Operation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... Standards and Technology's (NIST) Computer Security Division maintains a Computer Security Resource Center... Regarding Driver History Record Information Security, Continuity of Operation Planning, and Disaster... (SDLAs) to support their efforts at maintaining the security of information contained in the driver...

  1. 14 CFR 1203.409 - Exceptional cases.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....409 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... Information Security Program Committee, Security Division, Washington, DC 20546 for a classification..., to the Director, Information Security Oversight Office, GSA, for a determination. ...

  2. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  3. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  4. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  5. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  6. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  7. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  8. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  9. Position of the American Dietetic Association: Addressing world hunger, malnutrition, and food insecurity.

    PubMed

    Struble, Marie Boyle; Aomari, Laurie Lindsay

    2003-08-01

    It is the position of the American Dietetic Association (ADA) that access to adequate amounts of safe, nutritious, and culturally appropriate food at all times is a fundamental human right. Hunger continues to be a worldwide problem of staggering proportions. The Association supports programs and encourages practices that combat hunger and malnutrition, produce food security, promote self-sufficiency, and are environmentally and economically sustainable. The Association is aware that hunger exists in a world of plenty and that poverty, gender inequity, ethnocentrism, racism, and the lack of political will are key constraints to solving the problems of global hunger and malnutrition. Recognizing that simplistic approaches are inadequate, the ADA identifies sustainable development as the long-term strategy to ending world hunger and achieving food security. Sustainable development requires political, economic, and social changes that include empowering the disenfranchised, widening access to assets and other resources, narrowing the gap between rich and poor, and adjusting consumption patterns so as to foster good stewardship of nature. Additionally, because the health status of future generations is related to the well-being of their mothers, achieving food security will also require increased access for women to education, adequate health care and sanitation, and economic opportunities. This position paper reviews the complex issues of global food insecurity and discusses long-term solutions for achieving world food security. Achieving the end of world hunger has been and is now within our grasp. There is sufficient food to feed everyone, and solutions can be realized now that will benefit all of humanity. As noted in the paper, most people who examine the costs of ending versus not ending world hunger are bewildered by the question of why humanity did not solve the problem a long time ago. The Association supports programs and encourages practices that combat hunger and malnutrition, produce food security, promote self-sufficiency, respect local cultures, and are environmentally and economically sustainable. The ADA recognizes that decisions and actions that dietetics professionals make as practitioners and consumers can help reduce the extent of poverty and hunger both here and abroad. This paper provides information, resources, and strategies to assist dietetics professionals in improving the public's understanding of key issues, becoming advocates of the poor, and influencing the political will to end world hunger.

  10. 49 CFR 1549.109 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...

  11. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.305 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify aircraft operators of...

  12. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  13. Rural New Zealand health professionals' perceived barriers to greater use of the internet for learning.

    PubMed

    Janes, Ron; Arroll, Bruce; Buetow, Stephen; Coster, Gregor; McCormick, Ross; Hague, Iain

    2005-01-01

    The purpose of this research was to investigate rural North Island (New Zealand) health professionals' attitudes and perceived barriers to using the internet for ongoing professional learning. A cross-sectional postal survey of all rural North Island GPs, practice nurses and pharmacists was conducted in mid-2003. The questionnaire contained both quantitative and qualitative questions. The transcripts from two open questions requiring written answers were analysed for emergent themes, which are reported here. The first open question asked: 'Do you have any comments on the questionnaire, learning, computers or the Internet?' The second open question asked those who had taken a distance-learning course using the internet to list positive and negative aspects of their course, and suggest improvements. Out of 735 rural North Island health professionals surveyed, 430 returned useable questionnaires (a response rate of 59%). Of these, 137 answered the question asking for comments on learning, computers and the internet. Twenty-eight individuals who had completed a distance-learning course using the internet, provided written responses to the second question. Multiple barriers to greater use of the internet were identified. They included lack of access to computers, poor availability of broadband (fast) internet access, lack of IT skills/knowledge, lack of time, concerns about IT costs and database security, difficulty finding quality information, lack of time, energy or motivation to learn new skills, competing priorities (eg family), and a preference for learning modalities which include more social interaction. Individuals also stated that rural health professionals needed to engage the technology, because it provided rapid, flexible access from home or work to a significant health information resource, and would save money and travelling time to urban-based education. In mid-2003, there were multiple barriers to rural North Island health professionals making greater use of the internet for learning. Now that access to broadband internet is available in all rural towns in New Zealand, there is a clear need to address the other identified barriers, especially the self-reported lack of IT skills, which are preventing many in the rural health workforce from gaining maximum advantage from both computers and the internet.

  14. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  15. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...

  16. Examining the Relationship between Organization Systems and Information Security Awareness

    ERIC Educational Resources Information Center

    Tintamusik, Yanarong

    2010-01-01

    The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…

  17. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  18. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...

  19. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...

  20. When security and medicine missions conflict: confidentiality in prison settings.

    PubMed

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  1. 12 CFR 1271.30 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... charges, printing, legal, and professional fees, postage, courier services, and office supplies; and (2... accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges, joint...

  2. Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals

    DTIC Science & Technology

    2014-10-01

    of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance

  3. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    ERIC Educational Resources Information Center

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  4. Coping With Their Lives Women, Learning Disabilities, Self-Harm And The Secure Unit: A Q-Methodological Study

    ERIC Educational Resources Information Center

    James, Melissa; Warner, Sam

    2005-01-01

    Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…

  5. Lethal and Legal The Ethics of Drone Strikes

    DTIC Science & Technology

    2015-12-01

    analysis, evaluation, and refinement of professional expertise in war, strategy, operations, national security, resource management , and responsible...in business studies and holds an M.Phil. in defence and security studies from the Defence College of Management and Technol- ogy, Defence Academy...in unsafe buildings, search and rescue missions in treacherous conditions, police searches for missing or wanted persons, traffic management , public

  6. Psychosocial Needs of Boys in Secure Care for Serious or Persistent Offending

    ERIC Educational Resources Information Center

    Harrington, R. C.; Kroll, L.; Rothwell, J.; McCarthy, K.; Bradley, D.; Bailey, S.

    2005-01-01

    Background: The mental health of child offenders who are detained in secure settings is a matter of great public and professional concern but there has been little systematic longitudinal research on the outcomes of these problems once the young person has returned to the community. The aims of the present study were to describe the psychosocial…

  7. Understanding the motivation: a qualitative study of dental students' choice of professional career.

    PubMed

    Gallagher, J; Clarke, W; Wilson, N

    2008-05-01

    Given the changing nature of the dental workforce, and the need to retain the services of future members, it is important to understand why current dental students perceive that they were motivated to study dentistry. Qualitative research provides the opportunity to explore the underlying issues in addition to informing subsequent quantitative research. The objectives of this research were to investigate final-year dental students' motivation for studying dentistry and how they perceive this has been modified during their undergraduate degree programme. Purposive sampling of a representative group of 35 final-year dental students at King's College London Dental Institute to participate in audio-taped focus groups. Qualitative data were analysed using Framework Methodology. The findings suggest a strong emphasis on having a career, providing 'professional status', 'financial benefits', 'job security, flexibility and independence' and 'good quality of life'. Students reported being attracted by features of the job, supported to a greater or lesser extent by personal experience, family and friends. It appears however that students' initial motivation is being tempered by their experiences during their undergraduate degree programme, in particular, the 'responsibilities of an intensive professional education', their 'mounting student debt' and the perception of 'feeling undervalued'. This perception related to dentistry in general and National Health Service dentistry in particular, being undervalued, by government, patients, the public and members of the dental profession. Students' vision of a 'contained professional career' within health care, providing status and financial benefits, appears to have influenced their choice of dentistry. Pressures relating to student life and policy changes are perceived as impacting on key components of professional life, particularly status in the social and economic order. The implications for educators, professional leaders and policy makers are explored.

  8. Improving computer security by health smart card.

    PubMed

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual national implementation of the CPS project and the introduction of new functions using electronic signatures and encryption.

  9. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  10. 46 CFR 503.59 - Safeguarding classified information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Information Security Program § 503.59 Safeguarding classified information. (a) All classified information... security; (2) Takes appropriate steps to protect classified information from unauthorized disclosure or... security check; (2) To protect the classified information in accordance with the provisions of Executive...

  11. 78 FR 73819 - Information Collection; Financial Information Security Request Form

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Financial Information Security... individuals and organizations on the extension with revision of a currently approved information collection, Financial Information Security Request Form. DATES: Comments must be received in writing on or before...

  12. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    NASA Astrophysics Data System (ADS)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  13. Information security for compliance with select agent regulations.

    PubMed

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  14. Information Security for Compliance with Select Agent Regulations

    PubMed Central

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  15. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  16. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  17. National health care providers' database (NHCPD) of Slovenia--information technology solution for health care planning and management.

    PubMed

    Albreht, T; Paulin, M

    1999-01-01

    The article describes the possibilities of planning of the health care providers' network enabled by the use of information technology. The cornerstone of such planning is the development and establishment of a quality database on health care providers, health care professionals and their employment statuses. Based on the analysis of information needs, a new database was developed for various users in health care delivery as well as for those in health insurance. The method of information engineering was used in the standard four steps of the information system construction, while the whole project was run in accordance with the principles of two internationally approved project management methods. Special attention was dedicated to a careful analysis of the users' requirements and we believe the latter to be fulfilled to a very large degree. The new NHCPD is a relational database which is set up in two important state institutions, the National Institute of Public Health and the Health Insurance Institute of Slovenia. The former is responsible for updating the database, while the latter is responsible for the technological side as well as for the implementation of data security and protection. NHCPD will be inter linked with several other existing applications in the area of health care, public health and health insurance. Several important state institutions and professional chambers are users of the database in question, thus integrating various aspects of the health care system in Slovenia. The setting up of a completely revised health care providers' database in Slovenia is an important step in the development of a uniform and integrated information system that would support top decision-making processes at the national level.

  18. Awake intubation creates feelings of being in a vulnerable situation but cared for in safe hands: a qualitative study.

    PubMed

    Knudsen, Kati; Nilsson, Ulrica; Högman, Marieann; Pöder, Ulrika

    2016-08-30

    Awake fiberoptic intubation is an alternative procedure for securing the airway and is a recommended option when a difficult airway is expected. The aim of the present study was to describe patient experiences with this procedure. A qualitative, descriptive design was used and patients were recruited from three county hospitals and one university hospital in Sweden. Data was collected by semi-structured interviews with 13 patients who underwent awake fiberoptic intubation. A qualitative content analysis extracted theme, categories, and subcategories. From the patient statements, one main theme emerged, feelings of being in a vulnerable situation but cared for in safe hands, which were described in five categories with 15 subcategories. The categories were: a need for tailored information, distress and fear of the intubation, acceptance and trust of the staff's competence, professional caring and support, and no hesitation about new awake intubation. The patients felt they lacked information about what to expect and relied on the professionals' expertise. Some patients felt overwhelmed by the information they were given and wanted less specific information about the equipment used but more information about how they would be cared for in the operating room. Undergoing awake intubation was an acceptable experience for most patients, whereas others experienced it as being painful and terrifying because they felt they could not breathe or communicate during the procedure itself. Tailored information about what to expect, ensuring eye contact and breathing instruction during the procedure seems to reduce patient distress when undergoing awake fiberoptic intubation. Most of the patients would not hesitate to undergo awake intubation again in the future if needed.

  19. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability. Contracting Officers are responsible for ensuring that all information technology acquisitions comply with the Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  20. Storing and Using Health Data in a Virtual Private Cloud

    PubMed Central

    Regola, Nathan

    2013-01-01

    Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical methods to the data and will also enable a wide variety of new applications that will be meaningful to patients and medical professionals. Researchers are often granted access to health care data to assist in the data mining process, but HIPAA regulations mandate comprehensive safeguards to protect the data. Often universities (and presumably other research organizations) have an enterprise information technology infrastructure and a research infrastructure. Unfortunately, both of these infrastructures are generally not appropriate for sensitive research data such as HIPAA, as they require special accommodations on the part of the enterprise information technology (or increased security on the part of the research computing environment). Cloud computing, which is a concept that allows organizations to build complex infrastructures on leased resources, is rapidly evolving to the point that it is possible to build sophisticated network architectures with advanced security capabilities. We present a prototype infrastructure in Amazon’s Virtual Private Cloud to allow researchers and practitioners to utilize the data in a HIPAA-compliant environment. PMID:23485880

  1. Connecting Climate Science to Policy: from Global Food Production to the US Supreme Court

    NASA Astrophysics Data System (ADS)

    Battisti, D. S.

    2016-12-01

    There are myriad ways climate science has been used to inform on global food security, and to affect law and policy. In this talk, I will summarize examples that include the application of the El Nino - Southern Oscillation science to improve food security in Indonesia and provide water forecasts for agriculture in northwest Mexico, as well as the application of climate change science to project changes in global grain production. In the latter case, reliable information on the impact of increasing greenhouse gases on growing season temperature is applied to assess the impact of climate change on average crop yields, on the volatility in crop yields, and on the loss of yield due to increasing pest pressure - all of which have acute implications for agricultural policy. In the US, climate change science was of paramount importance for the Supreme Court decision in the case "Massachusetts vs. EPA," which to this day greatly shapes US policy related to climate change - most notably in setting emission standards for vehicles. My colleagues and I have learned several lessons from our experiences in these applications of climate science that I will share, including some thoughts on the nature of interdisciplinary teams for producing reliable and effective products, and the on the professional pros and cons of pursuing applied work.

  2. Internationally educated nurses in Canada: predictors of workforce integration.

    PubMed

    Covell, Christine L; Primeau, Marie-Douce; Kilpatrick, Kelley; St-Pierre, Isabelle

    2017-04-04

    Global trends in migration accompanied with recent changes to the immigrant selection process may have influenced the demographic and human capital characteristics of internationally educated nurses (IENs) in Canada and in turn the assistance required to facilitate their workforce integration. This study aimed to describe the demographic and human capital profile of IENs in Canada, to explore recent changes to the profile, and to identify predictors of IENs' workforce integration. A cross-sectional, descriptive, correlational survey design was used. Eligible IENs were immigrants, registered and employed as regulated nurses in Canada. Data were collected in 2014 via online and paper questionnaires. Descriptive statistics were used to examine the data by year of immigration. Logistic regression modeling was employed to identify predictors of IENs' workforce integration measured as passing the licensure exam to acquire professional recertification and securing employment. The sample consisted of 2280 IENs, representative of all Canadian provincial jurisdictions. Since changes to the immigrant selection process in 2002, the IEN population in Canada has become more racially diverse with greater numbers emigrating from developing countries. Recent arrivals (after 2002) had high levels of human capital (knowledge, professional experience, language proficiency). Some, but not all, benefited from the formal and informal assistance available to facilitate their workforce integration. Professional experience and help studying significantly predicted if IENs passed the licensure exam on their first attempt. Bridging program participation and assistance from social networks in Canada were significant predictors if IENs had difficulty securing employment. Nurses will continue to migrate from a wide variety of countries throughout the world that have dissimilar nursing education and health systems. Thus, IENs are not a homogenous group, and a "one size fits all" model may not be effective for facilitating their professional recertification and employment in the destination country. Canada, as well as other countries, could consider using a case management approach to develop and tailor education and forms of assistance to meet the individual needs of IENs. Using technology to reach IENs who have not yet immigrated or have settled outside of urban centers are other potential strategies that may facilitate their timely entrance into the destination countries' nursing workforce.

  3. Impact of Night Shift and Training Development Factors on Performance of Professional Nurses in North West Bank Governmental Hospitals

    ERIC Educational Resources Information Center

    Ayed, Ahmad; Thulth, Ahida Saleem; Sayej, Sumaya

    2015-01-01

    Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess night shift and education/training developmental factors on performance of…

  4. 77 FR 45612 - Federal Acquisition Regulation; Information Collection; Professional Employee Compensation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-01

    ...; Information Collection; Professional Employee Compensation Plan AGENCY: Department of Defense (DOD), General... approved information collection requirement concerning submission of a Professional Employee Compensation..., 2012. ADDRESSES: Submit comments identified by Information Collection 9000- 0066, Professional Employee...

  5. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  6. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  7. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice the...

  8. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  9. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...

  10. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security program...

  11. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  12. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    ERIC Educational Resources Information Center

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…

  13. Key Factors in the Success of an Organization's Information Security Culture: A Quantitative Study and Analysis

    ERIC Educational Resources Information Center

    Pierce, Robert E.

    2012-01-01

    This research study reviewed relative literature on information security and information security culture within organizations to determine what factors potentially assist an organization in implementing, integrating, and maintaining a successful organizational information security culture. Based on this review of literature, five key factors were…

  14. Incorporating Global Information Security and Assurance in I.S. Education

    ERIC Educational Resources Information Center

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  15. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  16. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  17. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice the...

  18. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  19. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  20. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...

Top