Sample records for public key based

  1. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  2. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  3. Quantum Public Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2017-11-01

    Classical public key cryptosystems ( P K C), such as R S A, E I G a m a l, E C C, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem i.e. quantum public key cryptosystem ( Q P K C) based on the Bell states. In particular, in the proposed QPKC the public key are given by the first n particles of Bell states and generalized Pauli operations. The corresponding secret key are the last n particles of Bell states and the inverse of generalized Pauli operations. The proposed QPKC encrypts the message using a public key and decrypts the ciphertext using a private key. By H o l e v o ' s theorem, we proved the security of the secret key and messages during the QPKC.

  4. Public Key-Based Need-to-Know Authorization Engine Final Report CRADA No. TSB-1553-98

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mark, R.; Williams, R.

    The goals of this project were to develop a public key-based authentication service plug-in based on LLNL's requirements, integrate the public key-based authentication with the Intra Verse authorization service adn the LLNL NTK server by developing a full-featured version of the prototyped Intra Verse need-to-know plug in; and to test the authorization and need-to-know plug-in in a secured extranet prototype among selected national Labs.

  5. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  6. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  7. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  8. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  9. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  10. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  11. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  12. Multivariate Cryptography Based on Clipped Hopfield Neural Network.

    PubMed

    Wang, Jia; Cheng, Lee-Ming; Su, Tong

    2018-02-01

    Designing secure and efficient multivariate public key cryptosystems [multivariate cryptography (MVC)] to strengthen the security of RSA and ECC in conventional and quantum computational environment continues to be a challenging research in recent years. In this paper, we will describe multivariate public key cryptosystems based on extended Clipped Hopfield Neural Network (CHNN) and implement it using the MVC (CHNN-MVC) framework operated in space. The Diffie-Hellman key exchange algorithm is extended into the matrix field, which illustrates the feasibility of its new applications in both classic and postquantum cryptography. The efficiency and security of our proposed new public key cryptosystem CHNN-MVC are simulated and found to be NP-hard. The proposed algorithm will strengthen multivariate public key cryptosystems and allows hardware realization practicality.

  13. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  14. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  15. Key Performance Indicators of Public Universities Based on Quality Assessment Criteria in Thailand

    ERIC Educational Resources Information Center

    Sukboonyasatit, Kritsana; Thanapaisarn, Chaiwit; Manmar, Lampang

    2011-01-01

    The research objective was to develop public universities' key performance indicators. Qualitative research and interviews were employed with each public university's senior executive and quality assessors. The sample group was selected by the office of the public sector development commission and Thailand's public universities can be separated…

  16. Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm

    NASA Astrophysics Data System (ADS)

    Kota, Sujatha; Padmanabhuni, Venkata Nageswara Rao; Budda, Kishor; K, Sruthi

    2018-05-01

    Elliptic Curve Cryptography (ECC) uses two keys private key and public key and is considered as a public key cryptographic algorithm that is used for both authentication of a person and confidentiality of data. Either one of the keys is used in encryption and other in decryption depending on usage. Private key is used in encryption by the user and public key is used to identify user in the case of authentication. Similarly, the sender encrypts with the private key and the public key is used to decrypt the message in case of confidentiality. Choosing the private key is always an issue in all public key Cryptographic Algorithms such as RSA, ECC. If tiny values are chosen in random the security of the complete algorithm becomes an issue. Since the Public key is computed based on the Private Key, if they are not chosen optimally they generate infinity values. The proposed Modified Elliptic Curve Cryptography uses selection in either of the choices; the first option is by using Particle Swarm Optimization and the second option is by using Cuckoo Search Algorithm for randomly choosing the values. The proposed algorithms are developed and tested using sample database and both are found to be secured and reliable. The test results prove that the private key is chosen optimally not repetitive or tiny and the computations in public key will not reach infinity.

  17. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    NASA Astrophysics Data System (ADS)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  18. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  19. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  20. Data publication and dissemination of interactive keys under the open access model

    USDA-ARS?s Scientific Manuscript database

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  1. Public-Key Cryptography: A Hardware Implementation and Novel Neural Network-Based Approach

    DTIC Science & Technology

    1992-09-01

    FUNDINGISPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (if applicable ) 8c. ADDRESS (City, State, and ZIP Code) 10...8217....... ......... 4. .. . . iii TABLE OF CONTENTS I. INTRODUCTION ............................. 1 II. MATHEMATICAL BASIS FOR THE DEVELOPMENT OF PUBLIC-KEY...in the spirit of this future that this thesis is presented. It is an in-depth study of the public-key cryptosystem. First, the mathematical basis

  2. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  3. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  4. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  5. Securing resource constraints embedded devices using elliptic curve cryptography

    NASA Astrophysics Data System (ADS)

    Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad

    2014-06-01

    The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).

  6. Claims-Based Authentication for a Web-Based Enterprise

    DTIC Science & Technology

    2013-07-01

    authority must use known and registered (or in specific cases defined ) certificate revocation and currency-checking software . B. Translation of...Machines and services are issued software certificates that contain the public key with the private key generated and remaining in hardware...publicly available) information. A hardware token that contains the certificate is preferred to software -only certificates. For enterprise users

  7. Deducing trapdoor primitives in public key encryption schemes

    NASA Astrophysics Data System (ADS)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  8. Information hiding based on double random-phase encoding and public-key cryptography.

    PubMed

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  9. Image encryption based on nonlinear encryption system and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Chi, Yingying

    2015-03-01

    Recently, optical asymmetric cryptosystem (OACS) has became the focus of discussion and concern of researchers. Some researchers pointed out that OACS was not tenable because of misunderstanding the concept of asymmetric cryptosystem (ACS). We propose an improved cryptosystem using RSA public-key algorithm based on existing OACS and the new system conforms to the basic agreement of public key cryptosystem. At the beginning of the encryption process, the system will produce an independent phase matrix and allocate the input image, which also conforms to one-time pad cryptosystem. The simulation results show that the validity of the improved cryptosystem and the high robustness against attack scheme using phase retrieval technique.

  10. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  11. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal - a case study from health science.

    PubMed

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become critical for the inclusion of a publication or a database in a bibliometric analysis.

  12. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science

    PubMed Central

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become critical for the inclusion of a publication or a database in a bibliometric analysis. PMID:27635223

  13. Fast parallel molecular algorithms for DNA-based computation: factoring integers.

    PubMed

    Chang, Weng-Long; Guo, Minyi; Ho, Michael Shan-Hui

    2005-06-01

    The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form. The security of the RSA public-key cryptosystem is based on the difficulty of factoring the product of two large prime numbers. This paper demonstrates to factor the product of two large prime numbers, and is a breakthrough in basic biological operations using a molecular computer. In order to achieve this, we propose three DNA-based algorithms for parallel subtractor, parallel comparator, and parallel modular arithmetic that formally verify our designed molecular solutions for factoring the product of two large prime numbers. Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations.

  14. Algorithms for Lightweight Key Exchange †

    PubMed Central

    Santonja, Juan; Zamora, Antonio

    2017-01-01

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks. PMID:28654006

  15. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  16. Error-correcting pairs for a public-key cryptosystem

    NASA Astrophysics Data System (ADS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-06-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.

  17. Key-phrase based classification of public health web pages.

    PubMed

    Dolamic, Ljiljana; Boyer, Célia

    2013-01-01

    This paper describes and evaluates the public health web pages classification model based on key phrase extraction and matching. Easily extendible both in terms of new classes as well as the new language this method proves to be a good solution for text classification faced with the total lack of training data. To evaluate the proposed solution we have used a small collection of public health related web pages created by a double blind manual classification. Our experiments have shown that by choosing the adequate threshold value the desired value for either precision or recall can be achieved.

  18. A PKI Approach for Deploying Modern Secure Distributed E-Learning and M-Learning Environments

    ERIC Educational Resources Information Center

    Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos

    2007-01-01

    While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…

  19. Public-key encryption with chaos.

    PubMed

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  20. Public-key encryption with chaos

    NASA Astrophysics Data System (ADS)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  1. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2016-03-05

    should operate in a self-organized way. Capkun t al. [15] proposed a certificate-based self-organized pub- c key management for MANETs by removing...period allo node started with ignorance interact with other nodes, th not reach T th Table 2 Attack behavior for operations . Operation Attack...section, we discuss the core operations o CTPKM as illustrated by Fig. 1 . Each mobile entity is able t communicate with other entities using public

  2. Public trust and confidence in legal authorities: What do majority and minority group members want from the law and legal institutions?

    PubMed

    Tyler, T R

    2001-01-01

    Discussions of public trust and confidence in the police and the courts often assume that the key to public feelings is the public's evaluation of the outcomes that the public receives from these legal authorities. In the case of the courts, discontent is often assumed to be linked to issues of cost and delay-instrumental concerns about the outcomes delivered to the public by the courts. In the case of the police, the inability to effectively control crime is frequently seen as driving public evaluations. This article presents an alternative procedural justice based model that links public trust and confidence to views about the manner in which legal authorities treat the public. Drawing upon psychological research about public evaluations of institutions and authorities it is argued that the key issue that shapes public views is a process based evaluation of the fairness of the procedures that the police and courts use to exercise their authority. Analyses from several studies exploring the basis of public views support this procedural justice based model of public evaluation. In addition, the results provide suggestions about the elements of procedures that are central to public judgments about their fairness. Copyright 2001 John Wiley & Sons, Ltd.

  3. Modeling Public School Partnerships: Merging Corporate and Community Issues.

    ERIC Educational Resources Information Center

    Clark, Cynthia E.; Brill, Dale A.

    This paper describes a model that merges corporate community relations strategy and public relations pedagogy to accelerate the rate at which Internet-based technologies are integrated into the public schools system. The model provides Internet-based training for a select group of Key Contacts drawn from two urban middle schools. Training is…

  4. Sustaining Public Involvement in Long Range Planning Using a Stakeholder Based Process: A Case Study from Eugene-Springfield ,Oregon

    DOT National Transportation Integrated Search

    1998-09-16

    The Intermodal Surface Transportation Efficiency Act requires a proactive : public involvement process that provides complete information, timely public : notice, full public access to key decisions, and supports early and continuing : involvement of...

  5. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  6. Developing web-based training for public health practitioners: what can we learn from a review of five disciplines?

    PubMed Central

    Ballew, Paula; Castro, Sarah; Claus, Julie; Kittur, Nupur; Brennan, Laura; Brownson, Ross C.

    2013-01-01

    During a time when governmental funding, resources and staff are decreasing and travel restrictions are increasing, attention to efficient methods of public health workforce training is essential. A literature review was conducted to inform the development and delivery of web-based trainings for public health practitioners. Literature was gathered and summarized from five disciplines: Information Technology, Health, Education, Business and Communications, following five research themes: benefits, barriers, retention, promotion and evaluation. As a result, a total of 138 articles relevant to web-based training design and implementation were identified. Key recommendations emerged, including the need to conduct formative research and evaluation, provide clear design and layout, concise content, interactivity, technical support, marketing and promotion and incentives. We conclude that there is limited application of web-based training in public health. This review offers an opportunity to learn from other disciplines. Web-based training methods may prove to be a key training strategy for reaching our public health workforce in the environment of limited resources. PMID:22987862

  7. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  8. Efficient Implementation of the Pairing on Mobilephones Using BREW

    NASA Astrophysics Data System (ADS)

    Yoshitomi, Motoi; Takagi, Tsuyoshi; Kiyomoto, Shinsaku; Tanaka, Toshiaki

    Pairing based cryptosystems can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptosystems is relatively slow compared with the other conventional public key cryptosystems. However, several efficient algorithms for computing the pairing have been proposed, namely Duursma-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones. Moreover, we compare the processing speed of the pairing with that of the other standard public key cryptosystems, i. e. RSA cryptosystem and elliptic curve cryptosystem. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. In addition, the pairing is more efficient than the other public key cryptosystems, and the pairing can be achieved enough also on BREW mobilephones. It has become efficient enough to implement security applications, such as short signature, ID-based cryptosystems or broadcast encryption, using the pairing on BREW mobilephones.

  9. Nature-based strategies for improving urban health and safety

    Treesearch

    Michelle C. Kondo; Eugenia C. South; Charles C. Branas

    2015-01-01

    Place-based programs are being noticed as key opportunities to prevent disease and promote public health and safety for populations at-large. As one key type of place-based intervention, nature-based and green space strategies can play an especially large role in improving health and safety for dwellers in urban environments such as US legacy cities that lack nature...

  10. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

    DOEpatents

    Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G

    2014-09-30

    Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  11. [Brazilian bibliographical output on public oral health in public health and dentistry journals].

    PubMed

    Celeste, Roger Keller; Warmling, Cristine Maria

    2014-06-01

    The scope of this paper is to describe characteristics of the scientific output in the area of public oral health in journals on public health and dentistry nationwide. The Scopus database of abstracts and quotations was used and eight journals in public health, as well as ten in dentistry, dating from 1947 to 2011 were selected. A research strategy using key words regarding oral health in public health and key words about public health in dentistry was used to locate articles. The themes selected were based on the frequency of key words. Of the total number of articles, 4.7% (n = 642) were found in oral health journals and 6.8% (n = 245) in public health journals. Among the authors who published most, only 12% published in both fields. There was a percentile growth of public oral health publications in dentistry journals, though not in public health journals. In dentistry, only studies indexed as being on the topic of epidemiology showed an increase. In the area of public health, planning was predominant in all the phases studied. Research to evaluate the impact of research and postgraduate policies in scientific production is required.

  12. Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise

    NASA Astrophysics Data System (ADS)

    Wang, Cheng; Wang, Hongxiang; Ji, Yuefeng

    2018-01-01

    In this paper, a multi-bit wavelength coding phase-shift-keying (PSK) optical steganography method is proposed based on amplified spontaneous emission noise and wavelength selection switch. In this scheme, the assignment codes and the delay length differences provide a large two-dimensional key space. A 2-bit wavelength coding PSK system is simulated to show the efficiency of our proposed method. The simulated results demonstrate that the stealth signal after encoded and modulated is well-hidden in both time and spectral domains, under the public channel and noise existing in the system. Besides, even the principle of this scheme and the existence of stealth channel are known to the eavesdropper, the probability of recovering the stealth data is less than 0.02 if the key is unknown. Thus it can protect the security of stealth channel more effectively. Furthermore, the stealth channel will results in 0.48 dB power penalty to the public channel at 1 × 10-9 bit error rate, and the public channel will have no influence on the receiving of the stealth channel.

  13. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    NASA Astrophysics Data System (ADS)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  14. Competency Based Training. NCVER Research Forum (Adelaide, Australia, November 10, 1999).

    ERIC Educational Resources Information Center

    National Centre for Vocational Education Research, Leabrook (Australia).

    This publication reports on a forum on competency based training (CBT) research in Australia. Section 1 contains biographies of presenters and panel members. Section 2 presents an overview of the research and highlights key findings. Summaries follow of each of the five key projects. "The CBT Decade: Teaching for Flexibility and…

  15. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  16. What affects public acceptance of recycled and desalinated water?

    PubMed Central

    Dolnicar, Sara; Hurlimann, Anna; Grün, Bettina

    2011-01-01

    This paper identifies factors that are associated with higher levels of public acceptance for recycled and desalinated water. For the first time, a wide range of hypothesized factors, both of socio-demographic and psychographic nature, are included simultaneously. The key results, based on a survey study of about 3000 respondents are that: (1) drivers of the stated likelihood of using desalinated water differ somewhat from drivers of the stated likelihood of using recycled water; (2) positive perceptions of, and knowledge about, the respective water source are key drivers for the stated likelihood of usage; and (3) awareness of water scarcity, as well as prior experience with using water from alternative sources, increases the stated likelihood of use. Practical recommendations for public policy makers, such as key messages to be communicated to the public, are derived. PMID:20950834

  17. Keys to soil taxonomy by soil survey staff (sixth edition)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1994-12-31

    This publication, Keys to Soil Taxonomy, serves two purposes. It provides the taxonomic keys necessary for the classification of soils according to Soil Taxonomy in a form that can be used easily in the field, and it also acquaints users of Soil Taxonomy with recent changes in the classification system. This volume includes all revisions of the keys that have so far been approved, replacing the original keys in Soil Taxonomy: A Basic System of Soil Classification for Making and Interpreting Soil Surveys (1975), the work on which this abridged version, first published in 1983, is based. This publication incorporatesmore » all amendments approved to date and published in National Soil Taxonomy Handbook (NSTH) Issues 1-17.« less

  18. A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

    PubMed Central

    Pang, Liaojun; Yang, Jie; Jiang, Zhengtao

    2014-01-01

    With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. In this paper, we survey the basic ABE scheme and its two variants: the key-policy ABE (KP-ABE) scheme and the ciphertext-policy ABE (CP-ABE) scheme. We also pay attention to other researches relating to the ABE schemes, including multiauthority, user/attribute revocation, accountability, and proxy reencryption, with an extensive comparison of their functionality and performance. Finally, possible future works and some conclusions are pointed out. PMID:25101313

  19. Perspectives of Community- and Faith-Based Organizations about Partnering with Local Health Departments for Disasters

    PubMed Central

    Stajura, Michael; Glik, Deborah; Eisenman, David; Prelip, Michael; Martel, Andrea; Sammartinova, Jitka

    2012-01-01

    Public health emergency planners can better perform their mission if they develop and maintain effective relationships with community- and faith-based organizations in their jurisdictions. This qualitative study presents six themes that emerged from 20 key informant interviews representing a wide range of American community- and faith-based organizations across different types of jurisdictions, organizational types, and missions. This research seeks to provide local health department public health emergency planners with tools to assess and improve their inter-organizational community relationships. The themes identified address the importance of community engagement, leadership, intergroup dynamics and communication, and resources. Community- and faith-based organizations perceive that they are underutilized or untapped resources with respect to public health emergencies and disasters. One key reason for this is that many public health departments limit their engagement with community- and faith-based organizations to a one-way “push” model for information dissemination, rather than engaging them in other ways or improving their capacity. Beyond a reprioritization of staff time, few other resources would be required. From the perspective of community- and faith-based organizations, the quality of relationships seems to matter more than discrete resources provided by such ties. PMID:22851942

  20. Providing long-acting reversible contraception services in Seattle school-based health centers: key themes for facilitating implementation.

    PubMed

    Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann

    2015-06-01

    The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  2. The National Public Health Leadership Institute: evaluation of a team-based approach to developing collaborative public health leaders.

    PubMed

    Umble, Karl; Steffen, David; Porter, Janet; Miller, Delesha; Hummer-McLaughlin, Kelley; Lowman, Amy; Zelt, Susan

    2005-04-01

    Recent public health literature contains calls for collaborative public health interventions and for leaders capable of guiding them. The National Public Health Leadership Institute aims to develop collaborative leaders and to strengthen networks of leaders who share knowledge and jointly address public health problems. Evaluation results show that completing the institute training increases collaborative leadership and builds knowledge-sharing and problem-solving networks. These practices and networks strengthen interorganizational relationships, coalitions, services, programs, and policies. Intensive team-and project-based learning are key to the program's impact.

  3. The National Public Health Leadership Institute: Evaluation of a Team-Based Approach to Developing Collaborative Public Health Leaders

    PubMed Central

    Umble, Karl; Steffen, David; Porter, Janet; Miller, Delesha; Hummer-McLaughlin, Kelley; Lowman, Amy; Zelt, Susan

    2005-01-01

    Recent public health literature contains calls for collaborative public health interventions and for leaders capable of guiding them. The National Public Health Leadership Institute aims to develop collaborative leaders and to strengthen networks of leaders who share knowledge and jointly address public health problems. Evaluation results show that completing the institute training increases collaborative leadership and builds knowledge-sharing and problem-solving networks. These practices and networks strengthen interorganizational relationships, coalitions, services, programs, and policies. Intensive team-and project-based learning are key to the program’s impact. PMID:15798124

  4. Public open space, physical activity, urban design and public health: Concepts, methods and research agenda.

    PubMed

    Koohsari, Mohammad Javad; Mavoa, Suzanne; Villanueva, Karen; Sugiyama, Takemi; Badland, Hannah; Kaczynski, Andrew T; Owen, Neville; Giles-Corti, Billie

    2015-05-01

    Public open spaces such as parks and green spaces are key built environment elements within neighbourhoods for encouraging a variety of physical activity behaviours. Over the past decade, there has been a burgeoning number of active living research studies examining the influence of public open space on physical activity. However, the evidence shows mixed associations between different aspects of public open space (e.g., proximity, size, quality) and physical activity. These inconsistencies hinder the development of specific evidence-based guidelines for urban designers and policy-makers for (re)designing public open space to encourage physical activity. This paper aims to move this research agenda forward, by identifying key conceptual and methodological issues that may contribute to inconsistencies in research examining relations between public open space and physical activity. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Multi-factor authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  6. Patient-Centred Care in Canada: Key Components and the Path Forward.

    PubMed

    Montague, Terrence; Gogovor, Amédé; Aylen, John; Ashley, Lisa; Ahmed, Sara; Martin, Lesli; Cochrane, Bonnie; Adams, Owen; Nemis-White, Joanna

    2017-01-01

    Canadians' health and its care continue to evolve. Chronic diseases affect more than 50% of our aging population, but the majority of public and professional stakeholders retain a sense of care quality. An emergent issue, however, is generating an increasingly wide debate. It is the concept of patient-centred care, including its definition of key components, and efficacy. To advance the evidence base, the 2013-2014 and 2016 Health Care in Canada (HCIC) surveys measured pan-stakeholder levels of support and implementation priorities for frequently proposed components of patient centricity in healthcare. The public's highest rated component was timely access to care, followed by perceived respect and caring in its delivery, with decisions made in partnership among patients and professional providers, and within a basic belief that care should be based on patients' needs versus their ability to pay. Health professionals' levels of support for key components largely overlapped the public's levels of support for key components, with an additional accent on care influenced by an evidence base and expert opinion. In terms of priority to actually implement enhanced patient-centred care options, timely access was universally dominant among all stakeholders. Caring, respectful care, also retained high implementation priority among both the public and professionals, as did care decisions made in partnership, and, among professionals, care driven by research and expert opinion. Low priorities, for both the public and professionals, were the actual measurements of patient-centred care delivery and its impact on outcomes. In summary, there is remarkable concordance among all stakeholders in terms of favoured interventions to enhance patient-centred care, namely, timely access, caring, partnering and communicative delivery of evidence-based care. Unfortunately, the lack of contemporary imperative around the value of measuring and reporting actual use and outcomes of favoured interventions means uncertainty of their efficacy will persist for the foreseeable future. Things can be better.

  7. Distributed Data Networks That Support Public Health Information Needs.

    PubMed

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  8. Design and Development of a Web-Based DOD PKI Common Access Card (CAC) Instruction Tool

    DTIC Science & Technology

    2004-03-01

    institute internal training programs…to help educate the appropriate personnel” (p. 269). This section indicates the need for training when...of “digital certificates” that provide for the integrity and authenticity of the user to public key value binding. • Though public keys can be...known as a digest) is a unique, fixed- length mathematical value that is determined by the content of the message and the ‘hashing’ algorithm used

  9. Developing a Volunteer Program for Public Environmental Education.

    ERIC Educational Resources Information Center

    Meehan, Donald B.; Berta, Susan

    Volunteers can serve as a means to educate the public about environmental issues and increase stewardship ethic. This booklet is designed to provide much of the key information about designing and managing environmental volunteer programs to educate the general public. The booklet is based on the experiences of a volunteer program called Island…

  10. Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm

    NASA Astrophysics Data System (ADS)

    Meng, X. F.; Peng, X.; Cai, L. Z.; Li, A. M.; Gao, Z.; Wang, Y. R.

    2009-08-01

    A hybrid cryptosystem is proposed, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI), then three pairs of public-private keys are utilized to encode and decode the session keys (geometrical parameters, the second random-phase mask) and interferograms. In the stage of decryption, the ciphered image can be decrypted by wavefront reconstruction, inverse Fresnel diffraction, and real amplitude normalization. This approach can successfully solve the problem of key management and dispatch, resulting in increased security strength. The feasibility of the proposed cryptosystem and its robustness against some types of attack are verified and analyzed by computer simulations.

  11. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    PubMed

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  12. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  13. A Public-Health-Based Vision for the Management and Regulation of Psychedelics.

    PubMed

    Haden, Mark; Emerson, Brian; Tupper, Kenneth W

    2016-01-01

    The Health Officers Council of British Columbia has proposed post-prohibition regulatory models for currently illegal drugs based on public health principles, and this article continues this work by proposing a model for the regulation and management of psychedelics. This article outlines recent research on psychedelic substances and the key determinants of benefit and harm from their use. It then describes a public-health-based model for the regulation of psychedelics, which includes governance, supervision, set and setting controls, youth access, supply control, demand limitation, and evaluation.

  14. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  15. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  16. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  17. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  18. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters

    PubMed Central

    Wang, Baosheng; Tao, Jing

    2018-01-01

    Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE schemes have been proposed but shown to be either insecure or bounded where they have to fix the maximum hierarchical depth of RHIBE at setup. In this paper, we propose a new unbounded RHIBE scheme with decryption key exposure resilience and with short public system parameters, and prove our RHIBE scheme to be adaptively secure. Our system model is scalable inherently to accommodate more levels of user adaptively with no adding workload or restarting the system. By carefully designing the hybrid games, we overcome the subtle obstacle in applying the dual system encryption methodology for the unbounded and revocable HIBE. To the best of our knowledge, this is the first construction of adaptively secure unbounded RHIBE scheme. PMID:29649326

  19. Secure and Efficient Signature Scheme Based on NTRU for Mobile Payment

    NASA Astrophysics Data System (ADS)

    Xia, Yunhao; You, Lirong; Sun, Zhe; Sun, Zhixin

    2017-10-01

    Mobile payment becomes more and more popular, however the traditional public-key encryption algorithm has higher requirements for hardware which is not suitable for mobile terminals of limited computing resources. In addition, these public-key encryption algorithms do not have the ability of anti-quantum computing. This paper researches public-key encryption algorithm NTRU for quantum computation through analyzing the influence of parameter q and k on the probability of generating reasonable signature value. Two methods are proposed to improve the probability of generating reasonable signature value. Firstly, increase the value of parameter q. Secondly, add the authentication condition that meet the reasonable signature requirements during the signature phase. Experimental results show that the proposed signature scheme can realize the zero leakage of the private key information of the signature value, and increase the probability of generating the reasonable signature value. It also improve rate of the signature, and avoid the invalid signature propagation in the network, but the scheme for parameter selection has certain restrictions.

  20. Transitions in state public health law: comparative analysis of state public health law reform following the Turning Point Model State Public Health Act.

    PubMed

    Meier, Benjamin Mason; Hodge, James G; Gebbie, Kristine M

    2009-03-01

    Given the public health importance of law modernization, we undertook a comparative analysis of policy efforts in 4 states (Alaska, South Carolina, Wisconsin, and Nebraska) that have considered public health law reform based on the Turning Point Model State Public Health Act. Through national legislative tracking and state case studies, we investigated how the Turning Point Act's model legal language has been considered for incorporation into state law and analyzed key facilitating and inhibiting factors for public health law reform. Our findings provide the practice community with a research base to facilitate further law reform and inform future scholarship on the role of law as a determinant of the public's health.

  1. A systematic literature review of the key challenges for developing the structure of public health economic models.

    PubMed

    Squires, Hazel; Chilcott, James; Akehurst, Ronald; Burr, Jennifer; Kelly, Michael P

    2016-04-01

    To identify the key methodological challenges for public health economic modelling and set an agenda for future research. An iterative literature search identified papers describing methodological challenges for developing the structure of public health economic models. Additional multidisciplinary literature searches helped expand upon important ideas raised within the review. Fifteen articles were identified within the formal literature search, highlighting three key challenges: inclusion of non-healthcare costs and outcomes; inclusion of equity; and modelling complex systems and multi-component interventions. Based upon these and multidisciplinary searches about dynamic complexity, the social determinants of health, and models of human behaviour, six areas for future research were specified. Future research should focus on: the use of systems approaches within health economic modelling; approaches to assist the systematic consideration of the social determinants of health; methods for incorporating models of behaviour and social interactions; consideration of equity; and methodology to help modellers develop valid, credible and transparent public health economic model structures.

  2. Addressing the gap between public health emergency planning and incident response

    PubMed Central

    Freedman, Ariela M; Mindlin, Michele; Morley, Christopher; Griffin, Meghan; Wooten, Wilma; Miner, Kathleen

    2013-01-01

    Objectives: Since 9/11, Incident Command System (ICS) and Emergency Operations Center (EOC) are relatively new concepts to public health, which typically operates using less hierarchical and more collaborative approaches to organizing staff. This paper describes the 2009 H1N1 influenza outbreak in San Diego County to explore the use of ICS and EOC in public health emergency response. Methods: This study was conducted using critical case study methodology consisting of document review and 18 key-informant interviews with individuals who played key roles in planning and response. Thematic analysis was used to analyze data. Results: Several broad elements emerged as key to ensuring effective and efficient public health response: 1) developing a plan for emergency response; 2) establishing the framework for an ICS; 3) creating the infrastructure to support response; 4) supporting a workforce trained on emergency response roles, responsibilities, and equipment; and 5) conducting regular preparedness exercises. Conclusions: This research demonstrates the value of investments made and that effective emergency preparedness requires sustained efforts to maintain personnel and material resources. By having the infrastructure and experience based on ICS and EOC, the public health system had the capability to surge-up: to expand its day-to-day operation in a systematic and prolonged manner. None of these critical actions are possible without sustained funding for the public health infrastructure. Ultimately, this case study illustrates the importance of public health as a key leader in emergency response. PMID:28228983

  3. Developing an evidence-based approach to Public Health Nutrition: translating evidence into policy.

    PubMed

    Margetts, B; Warm, D; Yngve, A; Sjöström, M

    2001-12-01

    The aim of this paper is to highlight the importance of an evidence-based approach to the development, implementation and evaluation of policies aimed at improving nutrition-related health in the population. Public Health Nutrition was established to realise a population-level approach to the prevention of the major nutrition-related health problems world-wide. The scope is broad and integrates activity from local, national, regional and international levels. The aim is to inform and develop coherent and effective policies that address the key rate-limiting steps critical to improving nutrition-related public health. This paper sets out the rationale for an evidence-based approach to Public Health Nutrition developed under the umbrella of the European Network for Public Health Nutrition.

  4. The Mediating Roles of Internal Context Variables in the Relationship between Distributed Leadership Perceptions and Continuous Change Behaviours of Public School Teachers

    ERIC Educational Resources Information Center

    Kondakci, Yasar; Zayim, Merve; Beycioglu, Kadir; Sincar, Mehmet; Ugurlu, Celal T

    2016-01-01

    This study aims at building a theoretical base for continuous change in education and using this base to test the mediating roles of two key contextual variables, knowledge sharing and trust, in the relationship between the distributed leadership perceptions and continuous change behaviours of teachers. Data were collected from 687 public school…

  5. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  6. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  7. Facilitating the Evaluation of Complexity in the Public Sector: Learning from the NHS in Scotland

    ERIC Educational Resources Information Center

    Connolly, John; Reid, Garth; Mooney, Allan

    2015-01-01

    It is necessary for public managers to be able to evaluate programmes in the context of complexity. This article offers key learning and reflections based on the experience of facilitating the evaluation of complexity with a range of public sector partners in Scotland. There have been several articles that consider evaluating complexity and…

  8. Virtual reality system for treatment of the fear of public speaking using image-based rendering and moving pictures.

    PubMed

    Lee, Jae M; Ku, Jeong H; Jang, Dong P; Kim, Dong H; Choi, Young H; Kim, In Y; Kim, Sun I

    2002-06-01

    The fear of speaking is often cited as the world's most common social phobia. The rapid growth of computer technology enabled us to use virtual reality (VR) for the treatment of the fear of public speaking. There have been two techniques used to construct a virtual environment for the treatment of the fear of public speaking: model-based and movie-based. Virtual audiences and virtual environments made by model-based technique are unrealistic and unnatural. The movie-based technique has a disadvantage in that each virtual audience cannot be controlled respectively, because all virtual audiences are included in one moving picture file. To address this disadvantage, this paper presents a virtual environment made by using image-based rendering (IBR) and chroma keying simultaneously. IBR enables us to make the virtual environment realistic because the images are stitched panoramically with the photos taken from a digital camera. And the use of chroma keying allows a virtual audience to be controlled individually. In addition, a real-time capture technique was applied in constructing the virtual environment to give the subjects more interaction, in that they can talk with a therapist or another subject.

  9. Humanities Programming in Public Libraries: The Connecticut Perspective.

    ERIC Educational Resources Information Center

    Rader, Barbara A.

    1990-01-01

    Describes how public libraries can plan, fund, and implement scholar-led, library-based, humanities book discussion programs using the example of the Southern Connecticut Library Council. Key steps in planning, funding, targeting the audience, selecting topics and books, obtaining community support, recruiting scholars, marketing, administration,…

  10. An Inexpensive Device for Teaching Public Key Encryption

    ERIC Educational Resources Information Center

    Pendegraft, Norman

    2009-01-01

    An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…

  11. Federal Public Health Workforce Development: An Evidence-Based Approach for Defining Competencies.

    PubMed

    Mumford, Karen; Young, Andrea C; Nawaz, Saira

    2016-01-01

    This study reports the use of exploratory factor analysis to describe essential skills and knowledge for an important segment of the domestic public health workforce-Centers for Disease Control and Prevention (CDC) project officers-using an evidence-based approach to competency development and validation. A multicomponent survey was conducted. Exploratory factor analysis was used to examine the underlying domains and relationships between competency domains and key behaviors. The Cronbach α coefficient determined the reliability of the overall scale and identified factors. All domestic (US state, tribe, local, and territorial) grantees who received funding from the CDC during fiscal year 2011 to implement nonresearch prevention or intervention programs were invited to participate in a Web-based questionnaire. A total of 34 key behaviors representing knowledge, skills, and abilities, grouped in 7 domains-communication, grant administration and management, public health applied science and knowledge, program planning and development, program management, program monitoring and improvement, and organizational consultation-were examined. There were 795 responses (58% response rate). A total of 6 factors were identified with loadings of 0.40 or more for all 34 behavioral items. The Cronbach α coefficient was 0.95 overall and ranged between 0.73 and 0.91 for the factors. This study provides empirical evidence for the construct validity of 6 competencies and 34 key behaviors important for CDC project officers and serves as an important first step to evidence-driven workforce development efforts in public health.

  12. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.

    PubMed

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.

  13. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

    PubMed Central

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615

  14. [Analysis on barriers of urban sustainable development based on DEMATEL: a case of Shenyang City].

    PubMed

    Li, Chun-Rong; Geng, Yong; Xue, Bing; Ren, Wan-Xia; Dong, Hui-Juan

    2012-10-01

    To scientifically identify the key barriers which the urban sustainable development is facing and to analyze the interrelationships among the barriers are of significance to promote urban sustainable development. Through literature review, site investigation and structural interview, 21 factors affecting the Shenyang City's sustainable development were recognized, and based on questionnaire survey and statistics analysis, 12 main factors were screened. Further, by employing decision-making and trial evaluation laboratory (DEMATEL) method, the interrelationships among these factors were analyzed. The key factors affecting the Shenyang's sustainable development included the lack of leaders' attention, the economy-oriented governmental performance evaluation system, the lower public awareness on sustainable development, and the lack of academic understanding on regional eco-carrying capacity and related key projects. It was suggested that the local government should pay more attention on sustainable development, increase propaganda activities, reform governmental performance evaluation system, establish a reward-punishment system for promoting sustainable development and an effective monitoring mechanism, and enhance the implementation of related regulations, the local enterprises should establish research and development funds to support the researches of key technologies and introduce key projects, and general publics should improve their awareness on sustainable development and actively participate in related activities.

  15. Agent-Based Modeling in Public Health: Current Applications and Future Directions.

    PubMed

    Tracy, Melissa; Cerdá, Magdalena; Keyes, Katherine M

    2018-04-01

    Agent-based modeling is a computational approach in which agents with a specified set of characteristics interact with each other and with their environment according to predefined rules. We review key areas in public health where agent-based modeling has been adopted, including both communicable and noncommunicable disease, health behaviors, and social epidemiology. We also describe the main strengths and limitations of this approach for questions with public health relevance. Finally, we describe both methodologic and substantive future directions that we believe will enhance the value of agent-based modeling for public health. In particular, advances in model validation, comparisons with other causal modeling procedures, and the expansion of the models to consider comorbidity and joint influences more systematically will improve the utility of this approach to inform public health research, practice, and policy.

  16. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    DTIC Science & Technology

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...stimulate awareness and demand with little or no cost. Kotler and Keller describe public relations and publicity as “a variety of programs designed to...broadcast media to promote something.”13 Kotler and Keller also argue that there is an appeal to the use of public relations and publicity that is based

  17. Transitions in State Public Health Law: Comparative Analysis of State Public Health Law Reform Following the Turning Point Model State Public Health Act

    PubMed Central

    Meier, Benjamin Mason; Gebbie, Kristine M.

    2009-01-01

    Given the public health importance of law modernization, we undertook a comparative analysis of policy efforts in 4 states (Alaska, South Carolina, Wisconsin, and Nebraska) that have considered public health law reform based on the Turning Point Model State Public Health Act. Through national legislative tracking and state case studies, we investigated how the Turning Point Act's model legal language has been considered for incorporation into state law and analyzed key facilitating and inhibiting factors for public health law reform. Our findings provide the practice community with a research base to facilitate further law reform and inform future scholarship on the role of law as a determinant of the public's health. PMID:19150900

  18. Key Ideas: What Are They and How Can They Help Us Understand How People View Proof?

    ERIC Educational Resources Information Center

    Raman, Manya

    2003-01-01

    Examines the views of proof held by university-level mathematics students and teachers. Develops a framework for characterizing people's views of proof based on a distinction between public and private aspects of proof and the key ideas that link these two domains. (Author/KHR)

  19. 34 CFR 636.21 - What selection criteria does the Secretary use to evaluate an application?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) Agencies of local government. (ii) Public and private elementary and secondary schools. (iii) Business... implementation strategy for each key project component activity is— (i) Comprehensive; (ii) Based on a sound... operation; (5) Describe a time-line chart that relates key evaluation processes and benchmarks to other...

  20. 34 CFR 636.21 - What selection criteria does the Secretary use to evaluate an application?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) Agencies of local government. (ii) Public and private elementary and secondary schools. (iii) Business... implementation strategy for each key project component activity is— (i) Comprehensive; (ii) Based on a sound... operation; (5) Describe a time-line chart that relates key evaluation processes and benchmarks to other...

  1. 34 CFR 636.21 - What selection criteria does the Secretary use to evaluate an application?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Agencies of local government. (ii) Public and private elementary and secondary schools. (iii) Business... implementation strategy for each key project component activity is— (i) Comprehensive; (ii) Based on a sound... operation; (5) Describe a time-line chart that relates key evaluation processes and benchmarks to other...

  2. 34 CFR 636.21 - What selection criteria does the Secretary use to evaluate an application?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) Agencies of local government. (ii) Public and private elementary and secondary schools. (iii) Business... implementation strategy for each key project component activity is— (i) Comprehensive; (ii) Based on a sound... operation; (5) Describe a time-line chart that relates key evaluation processes and benchmarks to other...

  3. Ideological and organizational components of differing public health strategies for addressing the social determinants of health.

    PubMed

    Raphael, Dennis; Brassolotto, Julia; Baldeo, Navindra

    2015-12-01

    Despite a history of conceptual contributions to reducing health inequalities by addressing the social determinants of health (SDH), Canadian governmental authorities have struggled to put these concepts into action. Ontario's-Canada's most populous province-public health scene shows a similar pattern. In statements and reports, governmental ministries, professional associations and local public health units (PHUs) recognize the importance of these issues, yet there has been varying implementation of these concepts into public health activity. The purpose of this study was to gain insight into the key features responsible for differences in SDH-related activities among local PHUs. We interviewed Medical Officers of Health (MOH) and key staff members from nine local PHUs in Ontario varying in SDH activity as to their understandings of the SDH, public health's role in addressing the SDH, and their units' SDH-related activities. We also reviewed their unit's documents and their organizational structures in relation to acting on the SDH. Three clusters of PHUs are identified based on their SDH-related activities: service-delivery-oriented; intersectoral and community-based; and public policy/public education-focused. The two key factors that differentiate PHUs are specific ideological commitments held by MOHs and staff and the organizational structures established to carry out SDH-related activities. The ideological commitments and the organizational structures of the most active PHUs showed congruence with frameworks adopted by national jurisdictions known for addressing health inequalities. These include a structural analysis of the SDH and a centralized organizational structure that coordinates SDH-related activities. © The Author (2014). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Engaging Community-Based Organizations in Fall Prevention Education

    ERIC Educational Resources Information Center

    Kramer, B. Josea; Vivrette, Rebecca L.; Rubenstein, Laurence Z.

    2011-01-01

    Falls are a major public health problem for older adults, and community-based organizations play a key role in educating seniors about falls prevention (FP). We conducted a qualitative process evaluation at six sites to report community-based centers' perspectives on adoption, adaptation, and sustainability of an evidence-based multifactorial FP…

  5. Digital camera with apparatus for authentication of images produced from an image file

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1993-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.

  6. Quantum communication and information processing

    NASA Astrophysics Data System (ADS)

    Beals, Travis Roland

    Quantum computers enable dramatically more efficient algorithms for solving certain classes of computational problems, but, in doing so, they create new problems. In particular, Shor's Algorithm allows for efficient cryptanalysis of many public-key cryptosystems. As public key cryptography is a critical component of present-day electronic commerce, it is crucial that a working, secure replacement be found. Quantum key distribution (QKD), first developed by C.H. Bennett and G. Brassard, offers a partial solution, but many challenges remain, both in terms of hardware limitations and in designing cryptographic protocols for a viable large-scale quantum communication infrastructure. In Part I, I investigate optical lattice-based approaches to quantum information processing. I look at details of a proposal for an optical lattice-based quantum computer, which could potentially be used for both quantum communications and for more sophisticated quantum information processing. In Part III, I propose a method for converting and storing photonic quantum bits in the internal state of periodically-spaced neutral atoms by generating and manipulating a photonic band gap and associated defect states. In Part II, I present a cryptographic protocol which allows for the extension of present-day QKD networks over much longer distances without the development of new hardware. I also present a second, related protocol which effectively solves the authentication problem faced by a large QKD network, thus making QKD a viable, information-theoretic secure replacement for public key cryptosystems.

  7. Use of Opioids in Latin America: The Need of an Evidence-Based Change.

    PubMed

    Rico, María Antonieta; Kraychete, Durval Campos; Iskandar, Aziza Jreige; Colimon, Frantz; Lara-Solares, Argelia; Cantisani, José Alberto Flores; Amescua-García, César; Núñez, María del Rocío Guillén; Bonilla, Patricia; Lech, Osvandré; Hernández-Castro, John Jairo; Guerrero, Carlos; Barrera, William Delgado; Gallegos, Manuel Sempértegui; Cook, María Berenguel; Garcia, João Batista Santos; Hernández, Concepción Pérez

    2016-04-01

    The subject of this publication has been focused on local considerations for facilitating regional best practice, including identifying and uniformly adopting the most relevant international guidelines on opioid use (OU) in chronic pain management. The Change Pain Latin America (CPLA) Advisory Panel conducted a comprehensive, robust, and critical analysis of published national and international reviews and guidelines of OU, considering those most appropriate for Latin America. A PubMed search was conducted using the terms "opioid," "chronic," and "pain" and then refined using the filters "practice guidelines" and "within the last 5 years" (2007-2012). Once the publications were identified, they were selected using five key criteria: "Evidence based," "Comprehensive," "From a well-recognized source," "Current publications," and "Based on best practice" and then critically analyzed considering 10 key criteria for determining the most relevant guidelines to be applied in Latin America. The initial PubMed search identified 177 reviews and guidelines, which was reduced to 16 articles using the five preliminary criteria. After a secondary analysis according to the 10 key criteria specific to OU in Latin America, 10 publications were selected for critical review and discussion. The CPLA advisory panel considered the "Safe and effective use of opioids for chronic non-cancer pain" (published in 2010 by the NOUGG of Canada) to be valid, relevant to Latin America, practical, evidence-based, concise, unambiguous, and sufficiently educational to provide clear instruction on OU and pain management and, thus, recommended for uniform adoption across the Latin America region. © 2015 American Academy of Pain Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  8. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    PubMed

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  9. Contracting and Procurement for Evidence-Based Interventions in Public-Sector Human Services: A Case Study.

    PubMed

    Willging, Cathleen E; Aarons, Gregory A; Trott, Elise M; Green, Amy E; Finn, Natalie; Ehrhart, Mark G; Hecht, Debra B

    2016-09-01

    Sustainment of evidence-based interventions (EBIs) in human services depends on the inner context of community-based organizations (CBOs) that provide services and the outer context of their broader environment. Increasingly, public officials are experimenting with contracting models from for-profit industries to procure human services. In this case study, we conducted qualitative interviews with key government and CBO stakeholders to examine implementation of the Best Value-Performance Information Procurement System to contract for EBIs in a child welfare system. Findings suggest that stakeholder relationships may be compromised when procurement disregards local knowledge, communication, collaboration, and other factors supporting EBIs and public health initiatives.

  10. Urban Teacher Curriculum Networks and Systemic Change.

    ERIC Educational Resources Information Center

    Useem, Elizabeth; And Others

    Among the best examples of the professional development of teachers that has become a key component of systemic educational reform are the curriculum-based teacher networks that have been created and nurtured in public schools by external private and public funders. This study examined the impact of four such networks on teacher renewal and…

  11. Public-Private Venture’s Contribution to Improved Quality of Life

    DTIC Science & Technology

    2005-02-08

    management priority and is recognized as a key item on the administration’s agenda to improve the quality of life for our service members. These public...private ventures (PPVs) will significantly improve the quality of life for Marine families residing in base housing because they offer an increased

  12. A zebra or a painted horse? Are hospital PPPs infrastructure partnerships with stripes or a separate species?

    PubMed

    Montagu, Dominic; Harding, April

    2012-01-01

    Public Private Partnerships (PPP) have been common in infrastructure for many years and are increasingly being considered as a means to finance, build, and manage hospitals. However, the growth of hospital PPPs in the past two decades has led to confusion about what sorts of contractual arrangements between public and private partners consititute a PPP, and what key differences distinguish public private partnership for hospitals from PPPs for infrastructure. Based on experiences from around the world we indentify six key areas where hospital PPPs differ from infrastructure partnerships. We draw upon the hospital partnerships that have been documented in OECD countries and a growing number of middle-income countries to identify four distinct types of hospital PPPs: service focused partnerships in which private partners manage operations within publicly constructed facilities; facilities and finance PPPs, focused on mobilizing capital and creating new hospitals; combined PPPs, involving both facility and clinical operations; and co-located PPPs where privately operated services are developed within the grounds of a public hospital. These four types of hospital PPPs have differing goals, and therefore different contractual and functional aspects, as well as differing risks to both public and private partners. By clarifying these, we provide a base upon which hospital PPPs can be assessed against appropriate goals and benchmarks.

  13. Food Safety Is a Key Determinant of Fruit and Vegetable Consumption in Urban Beninese Adolescents

    ERIC Educational Resources Information Center

    Nago, Eunice S.; Verstraeten, Roosmarijn; Lachat, Carl K.; Dossa, Romain A.; Kolsteren, Patrick W.

    2012-01-01

    Objective: To identify the determinants of fruit and vegetable consumption in urban Beninese adolescents and elements to develop a school-based fruit and vegetable program. Design: Sixteen focus groups conducted with a key word guide. Setting and Participants: Two private and 2 public secondary schools in Cotonou, Benin. One hundred fifty-three…

  14. 21 CFR 1311.25 - Requirements for obtaining a CSOS digital certificate.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... public keys, the corresponding private key must be used to sign the certificate request. Verification of the signature using the public key in the request will serve as proof of possession of the private key. ... certification of the public digital signature key. After the request is approved, the Certification Authority...

  15. 21 CFR 1311.25 - Requirements for obtaining a CSOS digital certificate.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... public keys, the corresponding private key must be used to sign the certificate request. Verification of the signature using the public key in the request will serve as proof of possession of the private key. ... certification of the public digital signature key. After the request is approved, the Certification Authority...

  16. 21 CFR 1311.25 - Requirements for obtaining a CSOS digital certificate.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... public keys, the corresponding private key must be used to sign the certificate request. Verification of the signature using the public key in the request will serve as proof of possession of the private key. ... certification of the public digital signature key. After the request is approved, the Certification Authority...

  17. Feasibility of Producing and Using Biomass-Based Diesel and Jet Fuel in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Milbrandt, A.; Kinchin, C.; McCormick, R.

    The study summarizes the best available public data on the production, capacity, cost, market demand, and feedstock availability for the production of biomass-based diesel and jet fuel. It includes an overview of the current conversion processes and current state-of-development for the production of biomass-based jet and diesel fuel, as well as the key companies pursuing this effort. Thediscussion analyzes all this information in the context of meeting the RFS mandate, highlights uncertainties for the future industry development, and key business opportunities.

  18. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    NASA Astrophysics Data System (ADS)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  19. What do pharmaceutical industry professionals in Europe believe about involving patients and the public in research and development of medicines? A qualitative interview study

    PubMed Central

    Parsons, Suzanne; Starling, Bella; Mullan-Jensen, Christine; Warner, Kay; Wever, Kim

    2016-01-01

    Objectives To explore European-based pharmaceutical industry professionals’ beliefs about patient and public involvement (PPI) in medicines research and development (R&D). Setting Pharmaceutical companies in the UK, Poland and Spain. Participants 21 pharmaceutical industry professionals, four based in the UK, five with pan-European roles, four based in Spain and eight based in Poland. Method Qualitative interview study (telephone and face-to-face, semistructured interviews). All interviews were audio taped, translated (where appropriate) and transcribed for analysis using the Framework approach. Results 21 pharmaceutical industry professionals participated. Key themes were: beliefs about (1) whether patients and the public should be involved in medicines R&D; (2) the barriers and facilitators to PPI in medicines R&D and (3) how the current relationships between the pharmaceutical industry, patient organisations and patients influence PPI in medicines R&D. Conclusions Although interviewees appeared positive about PPI, many were uncertain about when, how and which patients to involve. Patients and the public's lack of knowledge and interest in medicines R&D, and the pharmaceutical industry's lack of knowledge, interest and receptivity to PPI were believed to be key challenges to increasing PPI. Interviewees also believed that relationships between the pharmaceutical industry, patient organisations, patients and the public needed to change to facilitate PPI in medicines R&D. Existing pharmaceutical industry codes of practice and negative media reporting of the pharmaceutical industry were also seen as negative influences on these relationships. PMID:26743701

  20. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    NASA Astrophysics Data System (ADS)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  1. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.

  2. Using Insights From Behavioral Economics to Strengthen Disaster Preparedness and Response.

    PubMed

    Linnemayr, Sebastian; O'Hanlon, Claire; Uscher-Pines, Lori; Van Abel, Kristin; Nelson, Christopher

    2016-10-01

    Behavioral economics is based on the idea that individuals' decisions are affected by systematic and predictable cognitive biases and that these same biases can be leveraged to change behavior and improve decision-making. Insights from behavioral economics have been used to encourage a range of desired behaviors but have rarely been used in disaster preparedness and response, though traditional efforts by public health practitioners have failed to increase adoption of key preparedness behaviors. In this work, we aim to show how some of the key concepts in the behavioral economics literature are applicable to behaviors related to disaster preparedness and response, and we present ideas for behavioral economics-based interventions that we vetted with public health officials. Two of the best-received interventions were applications of social norms approaches, which leverage social influence bias, and commitment devices, which leverage present bias and loss aversion. Although the current evidence base for the applications of concepts from behavioral economics in disaster preparedness and response is weak, behavioral economics has achieved positive results in similar decision-making contexts. The low cost and potentially high impact of behavioral economics-based interventions warrant further investigation and testing. (Disaster Med Public Health Preparedness. 2016;page 1 of 7).

  3. Data visualisation in surveillance for injury prevention and control: conceptual bases and case studies

    PubMed Central

    Martinez, Ramon; Ordunez, Pedro; Soliz, Patricia N; Ballesteros, Michael F

    2016-01-01

    Background The complexity of current injury-related health issues demands the usage of diverse and massive data sets for comprehensive analyses, and application of novel methods to communicate data effectively to the public health community, decision-makers and the public. Recent advances in information visualisation, availability of new visual analytic methods and tools, and progress on information technology provide an opportunity for shaping the next generation of injury surveillance. Objective To introduce data visualisation conceptual bases, and propose a visual analytic and visualisation platform in public health surveillance for injury prevention and control. Methods The paper introduces data visualisation conceptual bases, describes a visual analytic and visualisation platform, and presents two real-world case studies illustrating their application in public health surveillance for injury prevention and control. Results Application of visual analytic and visualisation platform is presented as solution for improved access to heterogeneous data sources, enhance data exploration and analysis, communicate data effectively, and support decision-making. Conclusions Applications of data visualisation concepts and visual analytic platform could play a key role to shape the next generation of injury surveillance. Visual analytic and visualisation platform could improve data use, the analytic capacity, and ability to effectively communicate findings and key messages. The public health surveillance community is encouraged to identify opportunities to develop and expand its use in injury prevention and control. PMID:26728006

  4. [Dental education for college students based on WeChat public platform].

    PubMed

    Chen, Chuan-Jun; Sun, Tan

    2016-06-01

    The authors proposed a model for dental education based on WeChat public platform. In this model, teachers send various kinds of digital teaching information such as PPT,word and video to the WeChat public platform and students share the information for preview before class and differentiate the key-point knowledge from those information for in-depth learning in class. Teachers also send reference materials for expansive learning after class. Questionaire through the WeChat public platform is used to evaluate teaching effect of teachers and improvement may be taken based on the feedback questionnaire. A discussion and interaction based on WeCchat between students and teacher can be aroused on a specific topic to reach a proper solution. With technique development of mobile terminal, mobile class will come true in near future.

  5. New public key cryptosystem based on quaternions

    NASA Astrophysics Data System (ADS)

    Durcheva, Mariana; Karailiev, Kristian

    2017-12-01

    Quaternions are not commonly used in cryptography. Nevertheless, the noncommutativity of their multiplication makes them suitable for cryptographic purposes. In this paper we suggest a Diffie-Hellman like cryptosystem based on the the quaternions. Additionally, a computer realization of the protocol is given.

  6. Design and implementation of PKI-based certification authority

    NASA Astrophysics Data System (ADS)

    Zheng, Ying; Bai, Qinghai; Zhao, Linna; Chun, Hua; Chen, Jing

    2015-12-01

    PKI achieves the management of public key by certificates. It combines the user's public key and his or her identification formation through a trusted third-party organization CA, in order to authenticate the user's identity on the Internet, thus ensuring the authenticity, integrity, confidentiality, and non- repudiation of the information transmitted on the Internet. CA is the most critical agency in the PKI system, mainly responsible for issuing and managing certificates. On the basis of the actual needs of an enterprise, in this paper the author designs and develops a small-sized PKI-based Certification Authority equipped with the functions of root CA initialization, certificate application, certificate issuance, certificate revocation, and the generation of certificate revocation list. The author also points out the problems that need to be mentioned in the design and development.

  7. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  8. Smoking, vaping and public health: Time to be creative.

    PubMed

    Sweanor, David

    2016-03-16

    The development of policies on vaping in health care organizations (HCOs) needs to be based on a solid understanding of science and a recognition of individual rights. It should also be seen in the broader public health context of innovative alternative nicotine delivery systems playing a key role in ending the immense devastation of combustible cigarettes. Opposition to vaping based on inaccurate and incomplete information, or fear of unlikely and avoidable hypothetical unintended consequences, will invariably cause great harm to individuals, impede rather than assist the attainment of public health objectives, and unnecessarily prolong the epidemic of cigarette-caused diseases.

  9. Nature-Based Strategies for Improving Urban Health and Safety.

    PubMed

    Kondo, Michelle C; South, Eugenia C; Branas, Charles C

    2015-10-01

    Place-based programs are being noticed as key opportunities to prevent disease and promote public health and safety for populations at-large. As one key type of place-based intervention, nature-based and green space strategies can play an especially large role in improving health and safety for dwellers in urban environments such as US legacy cities that lack nature and greenery. In this paper, we describe the current understanding of place-based influences on public health and safety. We focus on nonchemical environmental factors, many of which are related to urban abandonment and blight. We then review findings from studies of nature-based interventions regarding impacts on health, perceptions of safety, and crime. Based on our findings, we suggest that further research in this area will require (1) refined measures of green space, nature, and health and safety for cities, (2) interdisciplinary science and cross-sector policy collaboration, (3) observational studies as well as randomized controlled experiments and natural experiments using appropriate spatial counterfactuals and mixed methods, and (4) return-on-investment calculations of potential economic, social, and health costs and benefits of urban greening initiatives.

  10. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  11. Identifying Barriers to Collaboration Between Primary Care and Public Health: Experiences at the Local Level.

    PubMed

    Pratt, Rebekah; Gyllstrom, Beth; Gearin, Kim; Lange, Carol; Hahn, David; Baldwin, Laura-Mae; VanRaemdonck, Lisa; Nease, Don; Zahner, Susan

    Interest is increasing in collaborations between public health and primary care to address the health of a community. Although the understanding of how these collaborations work is growing, little is known about the barriers facing these partners at the local level. The objective of this study was to identify barriers to collaboration between primary care and public health at the local level in 4 states. The study team, which comprised 12 representatives of Practice-Based Research Networks (networks of practitioners interested in conducting research in practice-based settings), identified 40 key informants from the public health and primary care fields in Colorado, Minnesota, Washington State, and Wisconsin. The key informants participated in standardized, semistructured telephone interviews with 8 study team members in 2014 and 2015. Interviews were audio recorded and transcribed verbatim. We analyzed key themes and subthemes by drawing on grounded theory. Primary care and public health participants identified similar barriers to collaboration. Barriers at the institutional level included the challenges of the primary care environment, in which providers feel overwhelmed and resources are tight; the need for systems change; a lack of partnership; and geographic challenges. Barriers to collaboration included mutual awareness, communication, data sharing, capacity, lack of resources, and prioritization of resources. Some barriers to collaboration (eg, changes to health care billing, demands on provider time) require systems change to overcome, whereas others (eg, a lack of shared priorities and mutual awareness) could be addressed through educational approaches, without adding resources or making a systemic change. Overcoming these common barriers may lead to more effective collaboration.

  12. Taking a Step to Identify How to Create Professional Learning Communities--Report of a Case Study of a Korean Public High School on How to Create and Sustain a School-Based Teacher Professional Learning Community

    ERIC Educational Resources Information Center

    Ahn, Joonkil

    2017-01-01

    This study intends to identify some key factors in creating and sustaining school-based teacher professional learning communities (PLCs) through a case study of a South Korean public high school. To achieve this, the study identified some essential infrastructure, preparation, and necessary social organization for creating PLCs. The ideal unit and…

  13. 76 FR 10135 - Public Housing Evaluation and Oversight: Changes to the Public Housing Assessment System (PHAS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-23

    ... PHA to four key areas of a PHA's operations: (1) The physical condition of the PHA's properties; (2... and to require PHAs to be scored on performance based on evaluation of four indicators: physical... changes proposed to each of the four current PHAS indicators are as follows: Physical. The physical...

  14. Getting to the Right Algebra: The Equity 2000 Initiative in Milwaukee Public Schools. MDRC Working Papers.

    ERIC Educational Resources Information Center

    Ham, Sandra; Walker, Erica

    This paper describes the Milwaukee Public Schools' involvement in Equity 2000, a standards-based reform initiative to enhance mathematics education and achievement among students of color, thereby increasing their likelihood of college enrollment and completion. The study highlights efforts to support and sustain a key component of Equity 2000:…

  15. Culture, Health, and Science: A Multidisciplinary Liberal Arts Alternative to the Public Health Major.

    PubMed

    Morgan, Lynn M; Knight, Sabina; Gubrium, Aline C

    2016-01-01

    Since the 2003 call by the Institute of Medicine to educate undergraduates in public health, various models have emerged for incorporating public health into the liberal arts and sciences. One model is a professionalized public health major that uses core public health competencies to prepare a workforce of health professionals. A second model offers a broad-based public health major rooted in liberal arts principles, resisting the utilitarian trend toward human capital formation. A third model resists even the label of "public health," preferring instead to introduce undergraduates to many ways of analyzing human health and healing. The multidisciplinary Culture, Health, and Science Program, based on six key commitments for preparing liberal arts students to analyze health and respond to global health challenges, is offered as an alternative to the public health major. © The Author(s) 2016.

  16. Training Public Health Advisors.

    PubMed

    Meyer, Pamela A; Brusuelas, Kristin M; Baden, Daniel J; Duncan, Heather L

    2015-01-01

    Federal public health advisors provide guidance and assistance to health departments to improve public health program work. The Centers for Disease Control and Prevention (CDC) prepares them with specialized training in administering public health programs. This article describes the evolving training and is based on internal CDC documents and interviews. The first federal public health advisors worked in health departments to assist with controlling syphilis after World War II. Over time, more CDC prevention programs hired them. To meet emerging needs, 3 major changes occurred: the Public Health Prevention Service, a fellowship program, in 1999; the Public Health Associate Program in 2007; and integration of those programs. Key components of the updated training are competency-based training, field experience, supervision, recruitment and retention, and stakeholder support. The enduring strength of the training has been the experience in a public health agency developing practical skills for program implementation and management.

  17. Contracting and Procurement for Evidence-Based Interventions in Public-Sector Human Services: A Case Study

    PubMed Central

    Willging, Cathleen E.; Aarons, Gregory A.; Trott, Elise M.; Green, Amy E.; Finn, Natalie; Ehrhart, Mark G.; Hecht, Debra B.

    2016-01-01

    Sustainment of evidence-based interventions (EBIs) in human services depends on the inner context of community-based organizations (CBOs) that provide services and the outer context of their broader environment. Increasingly, public officials are experimenting with contracting models from for-profit industries to procure human services. In this case study, we conducted qualitative interviews with key government and CBO stakeholders to examine implementation of the Best Value-Performance Information Procurement System to contract for EBIs in a child welfare system. Findings suggest that stakeholder relationships may be compromised when procurement disregards local knowledge, communication, collaboration, and other factors supporting EBIs and public health initiatives. PMID:26386977

  18. On Robust Key Agreement Based on Public Key Authentication

    NASA Astrophysics Data System (ADS)

    Hao, Feng

    We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.

  19. Transforming the Cross Cultural Collaborative of Pierce County Through Assessment Capacity Building

    PubMed Central

    Garza, Mary A.; Abatemarco, Diane J.; Gizzi, Cindan; Abegglen, Lynn M.; Johnson-Conley, Christina

    2010-01-01

    Background Underserved populations are underrepresented in public health initiatives such as tobacco control and in cancer clinical trials. Community involvement is crucial to interventions aimed at reducing health disparities, and local health departments increasingly are called upon to provide both leadership and funding. The Tacoma Pierce County Health Department (TPCHD), in conjunction with 13 key community-based organizations and healthcare systems, formed the Cross Cultural Collaborative of Pierce County (CCC) that successfully employs needs-assessment and evaluation techniques to identify community health initiatives. Methods Community leaders from six underserved populations of the CCC were trained in needs-assessments techniques. Assessments measured effectiveness of the collaborative process and community health initiatives by using key informant (n = 18) and group interviews (n = 3). Results The CCC, facilitated by its partnership with the TPCHD, built capacity and competence across community groups to successfully obtain two funded public health initiatives for six priority populations. Members expressed overall satisfaction with the training, organizational structure, and leadership. The CCC’s diversity, cultural competency, and sharing of resources were viewed both as a strength and a decision-making challenge. Conclusion Public health department leadership, collaboration, and evidence-based assessment and evaluation were key to demonstrating effectiveness of the interventions, ensuring the CCC’s sustainability. PMID:19077598

  20. Awareness and implementation of the 2000 United States public health service tobacco dependence treatment guideline in a public hospital system.

    PubMed

    Moody-Thomas, Sarah; Horswell, Ronald; Celestin, Michael D; Dellinger, Amy B; Kaiser, Michael; Butler, Michael

    2011-04-01

    The 2000 United States Public Health Service (USPHS) clinical practice guideline, "Treating Tobacco Use and Dependence," recommends systems interventions to integrate the treatment of tobacco into routine health care. The Tobacco Control Initiative employed a systems approach to integrate evidence-based treatment for tobacco use into patient care practices in Louisiana's safety net health care system. The purpose of this study was to assess changes in awareness and implementation of the USPHS clinical practice guideline. Surveys were administered to a purposive sample of hospital personnel from key departments in the Louisiana State University system of public hospitals in 2003 (n = 24) and 2007 (n = 44). Perceptions of implementation success improved for 50 of 59 distinct survey items. Rasch scaling was used to assess overall (scaled) change and showed substantial improvement from 2003 to 2007 (P < 0.001). Survey items also were grouped into 6 logical key concept sets. Improvement occurred in perceptions for all 6 key concepts; however, not uniformly. Results of the 2003 and 2007 surveys illustrate the potential effectiveness of using a systems approach to integrate the assessment and treatment of tobacco use into routine care practices in a public health care delivery system that serves medically vulnerable populations.

  1. A study of incentives to support and promote public health accreditation.

    PubMed

    Thielen, Lee; Leff, Marilyn; Corso, Liza; Monteiro, Erinn; Fisher, Jessica Solomon; Pearsol, Jim

    2014-01-01

    Accreditation of public health agencies through the Public Health Accreditation Board is voluntary. Incentives that encourage agencies to apply for accreditation have been suggested as important factors in facilitating participation by state and local agencies. The project describes both current and potential incentives that are available at the federal, state, and local levels. Thirty-nine key informants from local, state, tribal, federal, and academic settings were interviewed from March through May 2012. Through open-ended interviews, respondents were asked about incentives that were currently in use in their settings and incentives they thought would help encourage participation in Public Health Accreditation Board accreditation. Incentives currently in use by public health agencies based on interviews include (1) financial support, (2) legal mandates, (3) technical assistance, (4) peer support workgroups, and (5) state agencies serving as role models by seeking accreditation themselves. Key informants noted that state agencies are playing valuable and diverse roles in providing incentives for accreditation within their own states. Key informants also identified the Centers for Disease Control and Prevention and other players, such as private foundations, public health institutes, national and state associations, and academia as providing both technical and financial assistance to support accreditation efforts. State, tribal, local, and federal agencies, as well as related organizations can play an important role by providing incentives to move agencies toward accreditation.

  2. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    NASA Astrophysics Data System (ADS)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  3. Free-ranging domestic cats (Felis catus) on public lands: estimating density, activity, and diet in the Florida Keys

    USGS Publications Warehouse

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; Kays, Roland; O'Connell, Allan F.

    2017-01-01

    Feral and free-ranging domestic cats (Felis catus) can have strong negative effects on small mammals and birds, particularly in island ecosystems. We deployed camera traps to study free-ranging cats in national wildlife refuges and state parks on Big Pine Key and Key Largo in the Florida Keys, USA, and used spatial capture–recapture models to estimate cat abundance, movement, and activities. We also used stable isotope analyses to examine the diet of cats captured on public lands. Top population models separated cats based on differences in movement and detection with three and two latent groups on Big Pine Key and Key Largo, respectively. We hypothesize that these latent groups represent feral, semi-feral, and indoor/outdoor house cats based on the estimated movement parameters of each group. Estimated cat densities and activity varied between the two islands, with relatively high densities (~4 cats/km2) exhibiting crepuscular diel patterns on Big Pine Key and lower densities (~1 cat/km2) exhibiting nocturnal diel patterns on Key Largo. These differences are most likely related to the higher proportion of house cats on Big Pine relative to Key Largo. Carbon and nitrogen isotope ratios from hair samples of free-ranging cats (n = 43) provided estimates of the proportion of wild and anthropogenic foods in cat diets. At the population level, cats on both islands consumed mostly anthropogenic foods (>80% of the diet), but eight individuals were effective predators of wildlife (>50% of the diet). We provide evidence that cat groups within a population move different distances, exhibit different activity patterns, and that individuals consume wildlife at different rates, which all have implications for managing this invasive predator.

  4. 27 CFR 73.3 - What terms must I know to understand this part?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... digest function, and the signer's public key, the recipient can verify: (1) Whether the transformation was accomplished with the private key that corresponds to the signer's public key; and (2) Whether the... verified. A signer creates a digital signature by using public-key encryption to transform a message digest...

  5. 27 CFR 73.3 - What terms must I know to understand this part?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... digest function, and the signer's public key, the recipient can verify: (1) Whether the transformation was accomplished with the private key that corresponds to the signer's public key; and (2) Whether the... verified. A signer creates a digital signature by using public-key encryption to transform a message digest...

  6. 27 CFR 73.3 - What terms must I know to understand this part?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... digest function, and the signer's public key, the recipient can verify: (1) Whether the transformation was accomplished with the private key that corresponds to the signer's public key; and (2) Whether the... verified. A signer creates a digital signature by using public-key encryption to transform a message digest...

  7. Public health human resources: a comparative analysis of policy documents in two Canadian provinces

    PubMed Central

    2014-01-01

    Background Amidst concerns regarding the capacity of the public health system to respond rapidly and appropriately to threats such as pandemics and terrorism, along with changing population health needs, governments have focused on strengthening public health systems. A key factor in a robust public health system is its workforce. As part of a nationally funded study of public health renewal in Canada, a policy analysis was conducted to compare public health human resources-relevant documents in two Canadian provinces, British Columbia (BC) and Ontario (ON), as they each implement public health renewal activities. Methods A content analysis of policy and planning documents from government and public health-related organizations was conducted by a research team comprised of academics and government decision-makers. Documents published between 2003 and 2011 were accessed (BC = 27; ON = 20); documents were either publicly available or internal to government and excerpted with permission. Documentary texts were deductively coded using a coding template developed by the researchers based on key health human resources concepts derived from two national policy documents. Results Documents in both provinces highlighted the importance of public health human resources planning and policies; this was particularly evident in early post-SARS documents. Key thematic areas of public health human resources identified were: education, training, and competencies; capacity; supply; intersectoral collaboration; leadership; public health planning context; and priority populations. Policy documents in both provinces discussed the importance of an educated, competent public health workforce with the appropriate skills and competencies for the effective and efficient delivery of public health services. Conclusion This policy analysis identified progressive work on public health human resources policy and planning with early documents providing an inventory of issues to be addressed and later documents providing evidence of beginning policy development and implementation. While many similarities exist between the provinces, the context distinctive to each province has influenced and shaped how they have focused their public health human resources policies. PMID:24564931

  8. Public health human resources: a comparative analysis of policy documents in two Canadian provinces.

    PubMed

    Regan, Sandra; MacDonald, Marjorie; Allan, Diane E; Martin, Cheryl; Peroff-Johnston, Nancy

    2014-02-24

    Amidst concerns regarding the capacity of the public health system to respond rapidly and appropriately to threats such as pandemics and terrorism, along with changing population health needs, governments have focused on strengthening public health systems. A key factor in a robust public health system is its workforce. As part of a nationally funded study of public health renewal in Canada, a policy analysis was conducted to compare public health human resources-relevant documents in two Canadian provinces, British Columbia (BC) and Ontario (ON), as they each implement public health renewal activities. A content analysis of policy and planning documents from government and public health-related organizations was conducted by a research team comprised of academics and government decision-makers. Documents published between 2003 and 2011 were accessed (BC = 27; ON = 20); documents were either publicly available or internal to government and excerpted with permission. Documentary texts were deductively coded using a coding template developed by the researchers based on key health human resources concepts derived from two national policy documents. Documents in both provinces highlighted the importance of public health human resources planning and policies; this was particularly evident in early post-SARS documents. Key thematic areas of public health human resources identified were: education, training, and competencies; capacity; supply; intersectoral collaboration; leadership; public health planning context; and priority populations. Policy documents in both provinces discussed the importance of an educated, competent public health workforce with the appropriate skills and competencies for the effective and efficient delivery of public health services. This policy analysis identified progressive work on public health human resources policy and planning with early documents providing an inventory of issues to be addressed and later documents providing evidence of beginning policy development and implementation. While many similarities exist between the provinces, the context distinctive to each province has influenced and shaped how they have focused their public health human resources policies.

  9. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  10. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  11. General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States

    NASA Astrophysics Data System (ADS)

    Kang, Guo-Dong; Fang, Mao-Fa

    2011-02-01

    We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.

  12. Genomics in Public Health: Perspective from the Office of Public Health Genomics at the Centers for Disease Control and Prevention (CDC)

    PubMed Central

    Fisk Green, Ridgely; Dotson, W. David; Bowen, Scott; Kolor, Katherine; Khoury, Muin J.

    2015-01-01

    The national effort to use genomic knowledge to save lives is gaining momentum, as illustrated by the inclusion of genomics in key public health initiatives, including Healthy People 2020, and the recent launch of the precision medicine initiative. The Office of Public Health Genomics (OPHG) at the Centers for Disease Control and Prevention (CDC) partners with state public health departments and others to advance the translation of genome-based discoveries into disease prevention and population health. To do this, OPHG has adopted an “identify, inform, and integrate” model: identify evidence-based genomic applications ready for implementation, inform stakeholders about these applications, and integrate these applications into public health at the local, state, and national level. This paper addresses current and future work at OPHG for integrating genomics into public health programs. PMID:26636032

  13. Genomics in Public Health: Perspective from the Office of Public Health Genomics at the Centers for Disease Control and Prevention (CDC).

    PubMed

    Green, Ridgely Fisk; Dotson, W David; Bowen, Scott; Kolor, Katherine; Khoury, Muin J

    2015-01-01

    The national effort to use genomic knowledge to save lives is gaining momentum, as illustrated by the inclusion of genomics in key public health initiatives, including Healthy People 2020, and the recent launch of the precision medicine initiative. The Office of Public Health Genomics (OPHG) at the Centers for Disease Control and Prevention (CDC) partners with state public health departments and others to advance the translation of genome-based discoveries into disease prevention and population health. To do this, OPHG has adopted an "identify, inform, and integrate" model: identify evidence-based genomic applications ready for implementation, inform stakeholders about these applications, and integrate these applications into public health at the local, state, and national level. This paper addresses current and future work at OPHG for integrating genomics into public health programs.

  14. Evaluation of a natural speech based informational inquiry system as a potential means to increase transit utilization.

    DOT National Transportation Integrated Search

    2013-05-01

    This project proposed to explore the potential of a user friendly, natural speech based : information inquiry application as one means of increasing public transit utilization. It suggested : that a key challenge to expanding transit ridership isto e...

  15. Asymmetric cryptography based on wavefront sensing.

    PubMed

    Peng, Xiang; Wei, Hengzheng; Zhang, Peng

    2006-12-15

    A system of asymmetric cryptography based on wavefront sensing (ACWS) is proposed for the first time to our knowledge. One of the most significant features of the asymmetric cryptography is that a trapdoor one-way function is required and constructed by analogy to wavefront sensing, in which the public key may be derived from optical parameters, such as the wavelength or the focal length, while the private key may be obtained from a kind of regular point array. The ciphertext is generated by the encoded wavefront and represented with an irregular array. In such an ACWS system, the encryption key is not identical to the decryption key, which is another important feature of an asymmetric cryptographic system. The processes of asymmetric encryption and decryption are formulized mathematically and demonstrated with a set of numerical experiments.

  16. Shifting public health practice to advance health equity: recommendations from experts and community leaders.

    PubMed

    Knight, Erin K

    2014-01-01

    While the evidence base regarding the social determinants of health and their relationship to health inequities grows, the field of public health is challenged to translate this knowledge into practice changes that advance health equity. Drawing on the knowledge, beliefs, and experiences of public health experts and community leaders working to advance health equity, our objective was to develop and disseminate recommendations for changing public health practice to better address this problem. We conducted semistructured, qualitative telephone interviews (n = 25) with key informants. Interviews were recorded and transcribed, and data were coded and analyzed using both inductive and deductive methods. Member checks were used to enhance quality. A purposeful sample of key informants was selected from content experts and community leaders involved with the development of the Unnatural Causes public impact campaign. Participants represented state and local health departments, community-based organizations, national research/advocacy organizations, and academic institutions across the country. Participants distinguished between social determinants of health and their structural precursors in social and political institutions. They believed that the field of public health has an obligation to address health inequities and shifts in practice are needed that focus more attention on societal factors that underlie such inequities. According to participants, specific practice changes are difficult to identify because actions should be community specific and community driven. Recommended approaches that may be adapted to community-based needs and assets include building nontraditional partnerships, engaging in political advocacy, promoting community leadership, collecting better data on social conditions and institutional factors, and enhancing communication for health equity. Recommended shifts in practice may be facilitated by revisiting our understanding of the 3 core functions of public health-assessment, assurance, and policy development.

  17. Data visualisation in surveillance for injury prevention and control: conceptual bases and case studies.

    PubMed

    Martinez, Ramon; Ordunez, Pedro; Soliz, Patricia N; Ballesteros, Michael F

    2016-04-01

    The complexity of current injury-related health issues demands the usage of diverse and massive data sets for comprehensive analyses, and application of novel methods to communicate data effectively to the public health community, decision-makers and the public. Recent advances in information visualisation, availability of new visual analytic methods and tools, and progress on information technology provide an opportunity for shaping the next generation of injury surveillance. To introduce data visualisation conceptual bases, and propose a visual analytic and visualisation platform in public health surveillance for injury prevention and control. The paper introduces data visualisation conceptual bases, describes a visual analytic and visualisation platform, and presents two real-world case studies illustrating their application in public health surveillance for injury prevention and control. Application of visual analytic and visualisation platform is presented as solution for improved access to heterogeneous data sources, enhance data exploration and analysis, communicate data effectively, and support decision-making. Applications of data visualisation concepts and visual analytic platform could play a key role to shape the next generation of injury surveillance. Visual analytic and visualisation platform could improve data use, the analytic capacity, and ability to effectively communicate findings and key messages. The public health surveillance community is encouraged to identify opportunities to develop and expand its use in injury prevention and control. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. An examination of the needs of older patients with chronic mental illness in public mental health services.

    PubMed

    Futeran, Shuli; Draper, Brian M

    2012-01-01

    To describe the needs of patients aged 50 years and over with chronic mental illness being case managed within a public mental health service, and to determine factors that influence these needs. Patients were recruited from community-based Adult Mental Health (AMH) teams and Specialist Mental Health Services for Older People (SMHSOP) teams. Eligibility criteria included a diagnosis of schizophrenia or mood disorder. Patient, carer and key worker interviews were carried out using the Camberwell Assessment of Need for the Elderly (CANE). Of 183 eligible patients, 97 (mean age of 66.4 years) participated, of whom 63 were managed by AMH teams and 34 by SMHSOP teams. The majority (52%) had a diagnosis of schizophrenia, particularly those managed by AMH (71%). Patients self-rated fewer needs overall on the CANE than their key workers or the researcher, and also rated a higher proportion of their needs being met (83%) than the key worker (77%) or researcher (76%). From each perspective, over 80% of psychiatric and around 95% of identified medical needs were being met. The majority of social needs were unmet, with patients reporting only 42%, and key workers only 33%, met needs. The key unmet social needs were company, daily activities and having a close confidant. Key workers, patients and researchers rated SMHSOP service delivery to have significantly less unmet needs. The social needs of older patients with chronic mental illness require greater attention by public mental health services.

  19. Budgeting Based on Student Needs

    ERIC Educational Resources Information Center

    Willis, Jason; Hill, Matt

    2011-01-01

    School finance reform has become a key component for transforming public schools in the United States. Over the last decade, a growing number of districts have turned to an approach known by different names--student-based budgeting, weighted student funding and fair student funding, among others--in which budgets are allocated to schools in…

  20. Advancing Implementation of Evidence-Based Public Health in China: An Assessment of the Current Situation and Suggestions for Developing Regions.

    PubMed

    Shi, Jianwei; Jiang, Chenghua; Tan, Duxun; Yu, Dehua; Lu, Yuan; Sun, Pengfei; Pan, Ying; Zhang, Hanzhi; Wang, Zhaoxin; Yang, Beilei

    2016-01-01

    Objective. Existing research shows a serious scarcity of EBPH practice in China and other developing regions; as an exploratory study, this study aimed to assess the current EBPH implementation status in Shanghai of China qualitatively. Methods. Using semistructured key informant interviews, we examined the status of and impediments to the lagging EBPH in China. Data were analyzed based on the Consolidated Framework for Implementation Research (CFIR). Results. Chinese public health practitioners knew more about evidence-based medicine but less about EBPH. The situation was worse in community healthcare centers. Participants perceived that evidence sources were limited and the quality of evidence was low. Concerning the inner setting factors, the structural characteristics, networks and communications, implementation climate, and leadership engagement were confronted with many problems. Among the outer setting factors, external government policies and incentives and low patient compliance were the key problems. Additionally, public health practitioners in Shanghai lacked sufficient awareness of EBPH. Furthermore, the current project-based EBPH lacks a systematic implementation system. Conclusions. Existing practical perspectives on EBPH indicate a lag in the advocacy of this new ideology in China. It would be advisable for healthcare institutions to take the initiative to explore feasible and multiple methods of EBPH promotion.

  1. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... GENERAL SERVICES ADMINISTRATION [Wildlife Order 187; 4-D-FL-1218] Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property Pursuant to section 2 of Public Law 537, 80th Congress, approved May 19, 1948 (16 U.S.C. 667c), notice is hereby given that: 1. The General...

  2. The NIHR Public Health Research Programme: responding to local authority research needs in the United Kingdom.

    PubMed

    Dorling, Hannah; Cook, Andrew; Ollerhead, Liz; Westmore, Matt

    2015-12-11

    The remit of the National Institute for Health Research Public Health Research (PHR) Programme is to evaluate public health interventions, providing new knowledge on the benefits, costs, acceptability and wider impacts of interventions, set outside of the National Health Service, intended to improve the health of the public and reduce inequalities. This paper illustrates how the PHR Programme is providing new knowledge for public health decision makers, based on the nine key areas for local authority public health action, described by the King's Fund. Many funded PHR projects are evaluating interventions, applied in a range of settings, across the identified key areas for local authority influence. For example, research has been funded on children and young people, and for some of the wider determinants of health, such as housing and travel. Other factors, such as spatial planning, or open and green spaces and leisure, are less represented in the PHR Programme. Further opportunities in research include interventions to improve the health of adolescents, adults in workplaces, and communities. Building evidence for public health interventions at local authority level is important to prioritise and implement effective changes to improve population health.

  3. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  4. Identifying core competencies for public health epidemiologists.

    PubMed

    Bondy, Susan J; Johnson, Ian; Cole, Donald C; Bercovitz, Kim

    2008-01-01

    Public health authorities have prioritized the identification of competencies, yet little empirical data exist to support decisions on competency selection among particular disciplines. We sought perspectives on important competencies among epidemiologists familiar with or practicing in public health settings (local to national). Using a sequential, qualitative-quantitative mixed method design, we conducted key informant interviews with 12 public health practitioners familiar with front-line epidemiologists' practice, followed by a web-based survey of members of a provincial association of public health epidemiologists (90 respondents of 155 eligible) and a consensus workshop. Competency statements were drawn from existing core competency lists and those identified by key informants, and ranked by extent of agreement in importance for entry-level practitioners. Competencies in quantitative methods and analysis, critical appraisal of scientific evidence and knowledge transfer of scientific data to other members of the public health team were all regarded as very important for public health epidemiologists. Epidemiologist competencies focused on the provision, interpretation and 'translation' of evidence to inform decision-making by other public health professionals. Considerable tension existed around some potential competency items, particularly in the areas of more advanced database and data-analytic skills. Empirical data can inform discussions of discipline-specific competencies as one input to decisions about competencies appropriate for epidemiologists in the public health workforce.

  5. Avatar Web-Based Self-Report Survey System Technology for Public Health Research: Technical Outcome Results and Lessons Learned.

    PubMed

    Savel, Craig; Mierzwa, Stan; Gorbach, Pamina M; Souidi, Samir; Lally, Michelle; Zimet, Gregory; Interventions, Aids

    2016-01-01

    This paper reports on a specific Web-based self-report data collection system that was developed for a public health research study in the United States. Our focus is on technical outcome results and lessons learned that may be useful to other projects requiring such a solution. The system was accessible from any device that had a browser that supported HTML5. Report findings include: which hardware devices, Web browsers, and operating systems were used; the rate of survey completion; and key considerations for employing Web-based surveys in a clinical trial setting.

  6. Approach to spatial information security based on digital certificate

    NASA Astrophysics Data System (ADS)

    Cong, Shengri; Zhang, Kai; Chen, Baowen

    2005-11-01

    With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.

  7. Use of acupuncture to treat cerebral infarction in the last 10 years: A Scopus-based literature analysis.

    PubMed

    Chen, Jiajun; Yao, Min; Zhao, Yunhua; Jin, Xiya; Li, Yuanbing; Huang, Lihong

    2012-12-25

    To identify global research trends in the use of acupuncture to treat cerebral infarction. We performed a bibliometric analysis of studies on the use of acupuncture to treat cerebral infarction published during 2002-2011, retrieved from Scopus, using the key words of acupuncture and cerebral infarction or ischemic stroke. peer-reviewed articles on the use of acupuncture to treat cerebral infarction indexed in Scopus and published between 2002 and 2011; types of publications were original research articles, reviews, meeting abstracts, proceedings papers, book chapters, editorial material, and news items. articles that required manual searching or telephone access; documents that were not published in the public domain; and corrected papers. (a) Annual publication output; (b) language of publication; (c) type of publication; (d) key words of publication; (e) publication by research field; (f) publication by journal; (g) publication by country and institution; (h) publication by author; (i) most-cited papers between 2002 and 2006; and (j) most-cited papers between 2007 and 2011. A total of 160 publications on the use of acupuncture to treat cerebral infarction from 2002-2011 were retrieved from Scopus. The number of publications increased gradually over the 10-year study period; most were written in Chinese or English. Articles and reviews constituted the major types. The most frequent key word used was acupuncture. The most prolific journals in this area were Zhongguo Zhen Jiu and the Chinese Journal of Clinical Rehabilitation. Of the 160 publications retrieved, half came from Chinese authors and institutions. Tianjin University of Traditional Chinese Medicine was the most prolific research institute. Two papers were cited 30 times; they were published in 2002 and 2009, respectively. In the field of neuroscience, there is little literature on acupuncture for cerebral infarction. The most-cited papers were cited 30 times in the past 3 years. We believe that, with advances in the study of mechanisms in neurobiology, research on acupuncture will also advance and will become the concern of more scholars.

  8. Promoting Science-based Governance through Monitoring Changes to Agencies' Public Presentation

    NASA Astrophysics Data System (ADS)

    Rinberg, A.; Bergman, A.

    2017-12-01

    As the scientific basis for the missions of agencies like the Environmental Protection Agency have come under attack this year, political appointees and career staff alike have made changes to public-facing agency web content and resources. These changes have resulted in scientific information and findings being removed from the government's web presence and have reduced access to resources that inform the public about important topics like climate change and clean water. But these removals also obscure the work that the the federal government has done and the role it is legally required to play, which is often based squarely on key scientific findings. By monitoring changes to federal agency websites and ensuring that the public continues to be informed about the government's role in using science to improve the public's well-being, we can help retain the integrity of these important agencies and bolster their public support.

  9. Practical Challenges of Systems Thinking and Modeling in Public Health

    PubMed Central

    Trochim, William M.; Cabrera, Derek A.; Milstein, Bobby; Gallagher, Richard S.; Leischow, Scott J.

    2006-01-01

    Objectives. Awareness of and support for systems thinking and modeling in the public health field are growing, yet there are many practical challenges to implementation. We sought to identify and describe these challenges from the perspectives of practicing public health professionals. Methods. A systems-based methodology, concept mapping, was used in a study of 133 participants from 2 systems-based public health initiatives (the Initiative for the Study and Implementation of Systems and the Syndemics Prevention Network). This method identified 100 key challenges to implementation of systems thinking and modeling in public health work. Results. The project resulted in a map identifying 8 categories of challenges and the dynamic interactions among them. Conclusions. Implementation by public health professionals of the 8 simple rules we derived from the clusters in the map identified here will help to address challenges and improve the organization of systems that protect the public’s health. PMID:16449581

  10. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  11. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    PubMed

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  12. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    PubMed Central

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280

  13. Engaging communities in post-fire restoration: forest treatments and community-agency relations after the Cerro Grande fire

    Treesearch

    Robert L. Ryan; Elisabeth M. Hamin

    2006-01-01

    Our research provides advice to managers in their work in post-fire forest rehabilitation based on focus groups and interviews in the Los Alamos, New Mexico, community after the Cerro Grande fire of 2000. We address two key issues: how different restoration efforts compare to natural revegetation from the public?s perspective, and how to effectively communicate with...

  14. Distributional consequences of the transition from age-based to income-based prescription drug coverage in British Columbia, Canada.

    PubMed

    Hanley, Gillian E; Morgan, Steve; Hurley, Jeremiah; van Doorslaer, Eddy

    2008-12-01

    In May, 2003, British Columbia transitioned from an age-based public drug program, with public subsidy primarily based on age, to an age-irrelevant income-based drug program, in which public subsidy is based primarily on household income. As one of the specific aims of the policy change was to improve fairness by increasing the extent to which payment for drugs is based on ability to pay, we measure the progressivity of pharmaceutical financing before and after the policy change in BC using Kakwani indices. Our results suggest that pharmaceutical financing became less regressive after the policy change. However, this decrease in regressivity arose primarily because high-income seniors were making greater direct contributions to pharmaceutical financing and not because low-income households were making smaller direct contributions. Our results also suggest that if the public financing of pharmaceuticals were maintained or increased, a change from age-based to income-based eligibility can unambiguously improve equity in finance. As populations in developed countries age, governments will increasingly consider reforms to publicly financed health-care programs with age-based eligibility. In assessing policy options, financial equity is likely to be a key consideration. These results suggest that income-based pharmacare can improve financial equity especially when implemented with a commitment to maintain or increase public funding for prescription drugs.

  15. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 7

    DTIC Science & Technology

    2006-07-01

    public key certificates and cryptographic keys for crypto - graphic devices. In an environment where enterprise protection relies on an array of IA-enabled...allowing for greater accuracy, currency , and relevance of the information con- tained in the satellite communications data- base will be evaluated...JWPO). The purpose of the JWPO is to define, develop, validate, and evolve the JTRS SCA; acquire wave- form software applications; acquire Crypto

  16. Research on Quantum Algorithms at the Institute for Quantum Information and Matter

    DTIC Science & Technology

    2016-05-29

    local quantum computation with applications to position-based cryptography , New Journal of Physics, (09 2011): 0. doi: 10.1088/1367-2630/13/9/093036... cryptography , such as the ability to turn private-key encryption into public-key encryption. While ad hoc obfuscators exist, theoretical progress has mainly...to device-independent quantum cryptography , to quantifying entanglement, and to the classification of quantum phases of matter. Exact synthesis

  17. A digital memories based user authentication scheme with privacy preservation.

    PubMed

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  18. A digital memories based user authentication scheme with privacy preservation

    PubMed Central

    Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang

    2017-01-01

    The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659

  19. Evaluating public housing residents for knowledge, attitudes, and practices following dengue prevention outreach in Key West, Florida.

    PubMed

    Matthias, James; Zielinski-Gutierrez, Emily C; Tisch, Daniel J; Stanek, Danielle; Blanton, Ronald E; Doyle, Michael S; Eadie, Robert B; Gazdick, Elizabeth J; Leal, Andrea L; Pattison, Kimberly J; Perez-Guerra, Carmen L; Tittel, Christopher J; Vyas, Jooi; Wagner, Todd; Blackmore, Carina G M

    2014-11-01

    In 2009-2010, 93 cases of dengue were identified in Key West, Florida. This was the first outbreak of autochthonous transmission of dengue in Florida since 1934. In response to this outbreak, a multifaceted public education outreach campaign was launched. The aim of this study is to compare dengue prevention knowledge, attitudes, perceptions, and prevention practices among residents of subsidized public housing to the general population in Key West and to assess whether there were barriers preventing effective outreach from reaching specific vulnerable populations. A randomized population-based evaluation of knowledge, attitudes, and behaviors toward dengue prevention consisting of 521 separate household interviews was undertaken in July of 2011. A subset analysis was performed on interviews collected from 28 public housing units within four subsidized public housing complexes. Analysis was performed to determine whether knowledge, attitudes, and behaviors exhibited by public housing residents differed from the non-public housing study population. Public housing residents recalled fewer outreach materials (p=0.01) and were 3.4 times (95% confidence interval [CI] 1.4-8.3) more likely not to recall any outreach materials. Public housing residents were less likely to correctly identify how dengue transmission occurs (61% vs. 89%), where mosquitoes lay their eggs (54% vs. 85%), or to identify any signs or symptoms related to dengue (36% vs. 64%). Public housing residents were less likely to perform dengue prevention practices such as removing standing water or always using air conditioning. Examination of public housing residents identified an at-risk population that recalled less exposure to outreach materials and had less knowledge about dengue infection and prevention than the randomized study population. This provides public health systems the opportunity to target or modify future health messages and interventions to this group. Differences identified in the demographics of this population suggest that alternative methods or non-English materials may be required to reach desired outcomes.

  20. Analysis of mesenchymal stem cell differentiation in vitro using classification association rule mining.

    PubMed

    Wang, Weiqi; Wang, Yanbo Justin; Bañares-Alcántara, René; Coenen, Frans; Cui, Zhanfeng

    2009-12-01

    In this paper, data mining is used to analyze the data on the differentiation of mammalian Mesenchymal Stem Cells (MSCs), aiming at discovering known and hidden rules governing MSC differentiation, following the establishment of a web-based public database containing experimental data on the MSC proliferation and differentiation. To this effect, a web-based public interactive database comprising the key parameters which influence the fate and destiny of mammalian MSCs has been constructed and analyzed using Classification Association Rule Mining (CARM) as a data-mining technique. The results show that the proposed approach is technically feasible and performs well with respect to the accuracy of (classification) prediction. Key rules mined from the constructed MSC database are consistent with experimental observations, indicating the validity of the method developed and the first step in the application of data mining to the study of MSCs.

  1. Public Health Systems Research: Setting a National Agenda

    PubMed Central

    Lenaway, Dennis; Halverson, Paul; Sotnikov, Sergey; Tilson, Hugh; Corso, Liza; Millington, Wayne

    2006-01-01

    The Institute of Medicine has recommended that policy decisions about improvement of national public health systems be guided by sound scientific evidence. However, to date there is no national research agenda to help guide public health systems. The Centers for Disease Control and Prevention was called upon to lead a collaborative consensus-based process to define key research questions and establish a framework to create opportunities to better coordinate, leverage, and identify public health resources, which are increasingly scarce. The public health systems research agenda that emerged from this process has 14 overarching priority research themes. This national agenda should stimulate and guide research to meet the urgent need to improve the nation’s public health systems. PMID:16449601

  2. What do pharmaceutical industry professionals in Europe believe about involving patients and the public in research and development of medicines? A qualitative interview study.

    PubMed

    Parsons, Suzanne; Starling, Bella; Mullan-Jensen, Christine; Tham, Su-Gwan; Warner, Kay; Wever, Kim

    2016-01-07

    To explore European-based pharmaceutical industry professionals' beliefs about patient and public involvement (PPI) in medicines research and development (R&D). Pharmaceutical companies in the UK, Poland and Spain. 21 pharmaceutical industry professionals, four based in the UK, five with pan-European roles, four based in Spain and eight based in Poland. Qualitative interview study (telephone and face-to-face, semistructured interviews). All interviews were audio taped, translated (where appropriate) and transcribed for analysis using the Framework approach. 21 pharmaceutical industry professionals participated. Key themes were: beliefs about (1) whether patients and the public should be involved in medicines R&D; (2) the barriers and facilitators to PPI in medicines R&D and (3) how the current relationships between the pharmaceutical industry, patient organisations and patients influence PPI in medicines R&D. Although interviewees appeared positive about PPI, many were uncertain about when, how and which patients to involve. Patients and the public's lack of knowledge and interest in medicines R&D, and the pharmaceutical industry's lack of knowledge, interest and receptivity to PPI were believed to be key challenges to increasing PPI. Interviewees also believed that relationships between the pharmaceutical industry, patient organisations, patients and the public needed to change to facilitate PPI in medicines R&D. Existing pharmaceutical industry codes of practice and negative media reporting of the pharmaceutical industry were also seen as negative influences on these relationships. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  3. Document cards: a top trumps visualization for documents.

    PubMed

    Strobelt, Hendrik; Oelke, Daniela; Rohrdantz, Christian; Stoffel, Andreas; Keim, Daniel A; Deussen, Oliver

    2009-01-01

    Finding suitable, less space consuming views for a document's main content is crucial to provide convenient access to large document collections on display devices of different size. We present a novel compact visualization which represents the document's key semantic as a mixture of images and important key terms, similar to cards in a top trumps game. The key terms are extracted using an advanced text mining approach based on a fully automatic document structure extraction. The images and their captions are extracted using a graphical heuristic and the captions are used for a semi-semantic image weighting. Furthermore, we use the image color histogram for classification and show at least one representative from each non-empty image class. The approach is demonstrated for the IEEE InfoVis publications of a complete year. The method can easily be applied to other publication collections and sets of documents which contain images.

  4. Applications of Strengths-Based Leadership Theory for the U.S. Army

    DTIC Science & Technology

    2012-09-01

    Technical Report 1321 Applications of Strengths-Based Leadership Theory for the U.S. Army Melinda Key-Roberts U.S. Army Research...for the Behavioral and Social Sciences Approved for...public release; distribution is unlimited. U.S. Army Research Institute for the Behavioral and Social Sciences Department of the Army Deputy Chief

  5. Supporting Nurse Health Champions: Developing a "New Generation" of Health Improvement Facilitators

    ERIC Educational Resources Information Center

    Blake, H.; Chambers, D.

    2012-01-01

    In efforts to respond to key government public health initiatives for settings-based health promotion, the "Workplace Health Champion" role has emerged as a method of promoting health within the UK healthcare setting. Health promotion techniques used by these individuals are based on psychological theories that are known to motivate…

  6. Reinventing School-Based Management: A School Board Guide to School-Based Improvement.

    ERIC Educational Resources Information Center

    Drury, Darrel W.

    This report critiques the movement to decentralize decision making in public education. It provides an indepth examination of school-based management (SBM) with the aim of revealing why this type of reform seems to have had so little payoff for students. It addresses several key questions: What are the objectives of SBM, and are these objectives…

  7. Lessons Learned in Promoting Evidence-Based Public Health: Perspectives from Managers in State Public Health Departments.

    PubMed

    Allen, Peg; Jacob, Rebekah R; Lakshman, Meenakshi; Best, Leslie A; Bass, Kathryn; Brownson, Ross C

    2018-03-02

    Evidence-based public health (EBPH) practice, also called evidence-informed public health, can improve population health and reduce disease burden in populations. Organizational structures and processes can facilitate capacity-building for EBPH in public health agencies. This study involved 51 structured interviews with leaders and program managers in 12 state health department chronic disease prevention units to identify factors that facilitate the implementation of EBPH. Verbatim transcripts of the de-identified interviews were consensus coded in NVIVO qualitative software. Content analyses of coded texts were used to identify themes and illustrative quotes. Facilitator themes included leadership support within the chronic disease prevention unit and division, unit processes to enhance information sharing across program areas and recruitment and retention of qualified personnel, training and technical assistance to build skills, and the ability to provide support to external partners. Chronic disease prevention leaders' role modeling of EBPH processes and expectations for staff to justify proposed plans and approaches were key aspects of leadership support. Leaders protected staff time in order to identify and digest evidence to address the common barrier of lack of time for EBPH. Funding uncertainties or budget cuts, lack of political will for EBPH, and staff turnover remained challenges. In conclusion, leadership support is a key facilitator of EBPH capacity building and practice. Section and division leaders in public health agencies with authority and skills can institute management practices to help staff learn and apply EBPH processes and spread EBPH with partners.

  8. Financial Management Reforms in the Health Sector: A Comparative Study Between Cash-based and Accrual-based Accounting Systems.

    PubMed

    Abolhallaje, Masoud; Jafari, Mehdi; Seyedin, Hesam; Salehi, Masoud

    2014-10-01

    Financial management and accounting reform in the public sectors was started in 2000. Moving from cash-based to accrual-based is considered as the key component of these reforms and adjustments in the public sector. Performing this reform in the health system is a part of a bigger reform under the new public management. The current study aimed to analyze the movement from cash-based to accrual-based accounting in the health sector in Iran. This comparative study was conducted in 2013 to compare financial management and movement from cash-based to accrual-based accounting in health sector in the countries such as the United States, Britain, Canada, Australia, New Zealand, and Iran. Library resources and reputable databases such as Medline, Elsevier, Index Copernicus, DOAJ, EBSCO-CINAHL and SID, and Iranmedex were searched. Fish cards were used to collect the data. Data were compared and analyzed using comparative tables. Developed countries have implemented accrual-based accounting and utilized the valid, reliable and practical information in accrual-based reporting in different areas such as price and tariffs setting, operational budgeting, public accounting, performance evaluation and comparison and evidence based decision making. In Iran, however, only a few public organizations such as the municipalities and the universities of medical sciences use accrual-based accounting, but despite what is required by law, the other public organizations do not use accrual-based accounting. There are advantages in applying accrual-based accounting in the public sector which certainly depends on how this system is implemented in the sector.

  9. Crystal growth of device quality GaAs in space

    NASA Technical Reports Server (NTRS)

    Gatos, Harry C.; Lagowski, Jacek

    1989-01-01

    The program on Crystal Growth of Device Quality GaAs in Space was initiated in 1977. The initial stage covering 1977 to 1984 was devoted strictly to ground-based research. By 1985 the program had evolved into its next logical stage aimed at space growth experiments; however, since the Challenger disaster, the program has been maintained as a ground-based program awaiting activation of experimentation in space. The overall prgram has produced some 80 original scientific publications on GaAs crystal growth, crystal characterization, and new approaches to space processing. Publication completed in the last three years are listed. Their key results are outlined and discussed in the twelve publications included as part of the report.

  10. Secure medical information sharing in cloud computing.

    PubMed

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  11. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  12. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  13. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  14. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  15. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  16. Why psychopathy matters: Implications for public health and violence prevention✩

    PubMed Central

    Reidy, Dennis E.; Kearns, Megan C.; DeGue, Sarah; Lilienfeld, Scott O.; Massetti, Greta; Kiehl, Kent A.

    2018-01-01

    Psychopathy is an early-appearing risk factor for severe and chronic violence. The violence largely attributable to psychopathy constitutes a substantial portion of the societal burden to the public health and criminal justice systems, and thus necessitates significant attention from prevention experts. Yet, despite a vast base of research in psychology and criminology, the public health approach to violence has generally neglected to consider this key variable. Fundamentally, the public health approach to violence prevention is focused on achieving change at the population level to provide the most benefit to the maximum number of people. Increasing attention to the individual-level factor of psychopathy in public health could improve our ability to reduce violence at the community and societal levels. We conclude that the research literature on psychopathy points to a pressing need for a broad-based public health approach with a focus on primary prevention. Further, we consider how measuring psychopathy in public health research may benefit violence prevention, and ultimately society, in general. PMID:29593448

  17. Use of evidence to support healthy public policy: a policy effectiveness–feasibility loop

    PubMed Central

    Bowman, Sarah; Critchley, Julia; Capewell, Simon; Husseini, Abdullatif; Maziak, Wasim; Zaman, Shahaduz; Ben Romdhane, Habiba; Fouad, Fouad; Phillimore, Peter; Unal, Belgin; Khatib, Rana; Shoaibi, Azza; Ahmad, Balsam

    2012-01-01

    Abstract Public policy plays a key role in improving population health and in the control of diseases, including non-communicable diseases. However, an evidence-based approach to formulating healthy public policy has been difficult to implement, partly on account of barriers that hinder integrated work between researchers and policy-makers. This paper describes a “policy effectiveness–feasibility loop” (PEFL) that brings together epidemiological modelling, local situation analysis and option appraisal to foster collaboration between researchers and policy-makers. Epidemiological modelling explores the determinants of trends in disease and the potential health benefits of modifying them. Situation analysis investigates the current conceptualization of policy, the level of policy awareness and commitment among key stakeholders, and what actually happens in practice, thereby helping to identify policy gaps. Option appraisal integrates epidemiological modelling and situation analysis to investigate the feasibility, costs and likely health benefits of various policy options. The authors illustrate how PEFL was used in a project to inform public policy for the prevention of cardiovascular diseases and diabetes in four parts of the eastern Mediterranean. They conclude that PEFL may offer a useful framework for researchers and policy-makers to successfully work together to generate evidence-based policy, and they encourage further evaluation of this approach. PMID:23226897

  18. Public health departments and accountable care organizations: finding common ground in population health.

    PubMed

    Ingram, Richard; Scutchfield, F Douglas; Costich, Julia F

    2015-05-01

    We examined areas of potential collaboration between accountable care organizations and public health agencies, as well as perceived barriers and facilitators. We interviewed 9 key informants on 4 topics: advantages of public health agency involvement in accountable care organizations; services public health agencies could provide; practical, cultural, and legal barriers to accountable care organization-public health agency involvement; and business models that facilitate accountable care organization-public health agency collaboration. Public health agencies could help accountable care organizations partner with community organizations and reach vulnerable patients, provide population-based services and surveillance data, and promote policies that improve member health. Barriers include accountable care organizations' need for short-term financial yield, limited public health agency technical and financial capacity, and the absence of a financial model.

  19. Public Health Departments and Accountable Care Organizations: Finding Common Ground in Population Health

    PubMed Central

    Ingram, Richard; Scutchfield, F. Douglas

    2015-01-01

    We examined areas of potential collaboration between accountable care organizations and public health agencies, as well as perceived barriers and facilitators. We interviewed 9 key informants on 4 topics: advantages of public health agency involvement in accountable care organizations; services public health agencies could provide; practical, cultural, and legal barriers to accountable care organization–public health agency involvement; and business models that facilitate accountable care organization–public health agency collaboration. Public health agencies could help accountable care organizations partner with community organizations and reach vulnerable patients, provide population-based services and surveillance data, and promote policies that improve member health. Barriers include accountable care organizations’ need for short-term financial yield, limited public health agency technical and financial capacity, and the absence of a financial model. PMID:25790392

  20. Privacy-Preserving and Secure Sharing of PHR in the Cloud.

    PubMed

    Zhang, Leyou; Wu, Qing; Mu, Yi; Zhang, Jingxia

    2016-12-01

    As a new summarized record of an individual's medical data and information, Personal Health Record (PHR) can be accessible online. The owner can control fully his/her PHR files to be shared with different users such as doctors, clinic agents, and friends. However, in an open network environment like in the Cloud, these sensitive privacy information may be gotten by those unauthorized parties and users. In this paper, we consider how to achieve PHR data confidentiality and provide fine-grained access control of PHR files in the public Cloud based on Attribute Based Encryption(ABE). Differing from previous works, we also consider the privacy preserving of the receivers since the attributes of the receivers relate to their identity or medical information, which would make some sensitive data exposed to third services. Anonymous ABE(AABE) not only enforces the security of PHR of the owners but also preserves the privacy of the receivers. But a normal AABE with a single private key generation(PKG) center may not match a PHR system in the hierarchical architecture. Therefore, we discuss not only the construction of the PHR sharing system base on AABE but also how to construct the PHR sharing system based on the hierarchical AABE. The proposed schemes(especially based on hierarchical AABE) have many advantages over the available such as short public keys, constant-size private keys, which overcome the weaknesses in the existing works. In the standard model, the introduced schemes achieve compact security in the prime order groups.

  1. Avatar Web-Based Self-Report Survey System Technology for Public Health Research: Technical Outcome Results and Lessons Learned

    PubMed Central

    Savel, Craig; Mierzwa, Stan; Gorbach, Pamina M.; Souidi, Samir; Lally, Michelle; Zimet, Gregory; Interventions, AIDS

    2016-01-01

    This paper reports on a specific Web-based self-report data collection system that was developed for a public health research study in the United States. Our focus is on technical outcome results and lessons learned that may be useful to other projects requiring such a solution. The system was accessible from any device that had a browser that supported HTML5. Report findings include: which hardware devices, Web browsers, and operating systems were used; the rate of survey completion; and key considerations for employing Web-based surveys in a clinical trial setting. PMID:28149445

  2. Health-Based Capitation Risk Adjustment in Minnesota Public Health Care Programs

    PubMed Central

    Gifford, Gregory A.; Edwards, Kevan R.; Knutson, David J.

    2004-01-01

    This article documents the history and implementation of health-based capitation risk adjustment in Minnesota public health care programs, and identifies key implementation issues. Capitation payments in these programs are risk adjusted using an historical, health plan risk score, based on concurrent risk assessment. Phased implementation of capitation risk adjustment for these programs began January 1, 2000. Minnesota's experience with capitation risk adjustment suggests that: (1) implementation can accelerate encounter data submission, (2) administrative decisions made during implementation can create issues that impact payment model performance, and (3) changes in diagnosis data management during implementation may require changes to the payment model. PMID:25372356

  3. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  4. Appraising Qualitative Research in Health Education: Guidelines for Public Health Educators

    PubMed Central

    Jeanfreau, Scharalda G.; Jack, Leonard

    2010-01-01

    Research studies, including qualitative studies, form the basis for evidence-based practice among health professionals. However, many practicing health educators do not feel fully confident in their ability to critically appraise qualitative research studies. This publication presents an overview of qualitative research approaches, defines key terminology used in qualitative research, and provides guidelines for appraising the strengths and weaknesses of published qualitative research. On reading, health educators will be better equipped to evaluate the quality of the evidence through critical appraisals of qualitative research publications. PMID:20817630

  5. A Risk Communication Success Story

    NASA Technical Reports Server (NTRS)

    Peecook, Keith

    2010-01-01

    A key success of the decommissioning effort at the National Aeronautics and Space Administration's (NASA's) Plum Brook Reactor Facility (PBRF) has been the public outreach program. The approach has been based on risk communications rather than a public relations approach. As a result it has kept the public feeling more involved in the process. It ensures they have the information needed to understand the project and its goals, and to make recommendations. All this is done so that NASA can better plan and execute the necessary work without delays or suprises.

  6. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  7. Implementation Issues of a Standards-Based Teacher Evaluation System: Perceptions of Campus Administrators

    ERIC Educational Resources Information Center

    Nixon, Lisa

    2013-01-01

    The purpose of this mixed methods study was to determine the key implementation issues of a standards-based teacher evaluation system as perceived by campus administrators. The 80 campus administrators that participated in this study were from six public school districts located in southeastern Texas that serve students in grades Kindergarten…

  8. Toward a Community School: A Model for Organizing Community Based Educational Support Services. Publication Series No. 10.

    ERIC Educational Resources Information Center

    Bartelt, David W.

    This paper focuses on how to develop a community-based educational intervention when community apathy is present, or where the isolation between school and community makes partnership more difficult. The key elements for this model are three steps: (1) determining the school-community relationship, establishing that a condition of isolation…

  9. Secure data sharing in public cloud

    NASA Astrophysics Data System (ADS)

    Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.

    2012-04-01

    Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.

  10. Study on Public Flood Risk Cognition and Behavioral Response Based on IEC Strategy

    NASA Astrophysics Data System (ADS)

    Shen, Xin; Xu, Xiaofeng; Zhou, Guilin; Pan, Shaolin; Mi, Tengfei

    2017-11-01

    In order to disseminate knowledge and information on flood risks in flood-prone areas, raise public awareness of flood risks and reduce possible damage to the public, a questionnaire survey was coducted among 260 residents of nine selected communities in Jiaozhou City to learn the public awareness and behavioral response to flood risks at different early warning levels. IEC key information of flood risk awareness was modified and formulated through group discussions, in-depth individual interviews and on-site observation. The awareness of residents in the project area was enhanced through the public participation, environmental management and flood management training, which plays a very important role in reducing flood losses.

  11. Bridging graduate education in public health and the liberal arts.

    PubMed

    Aelion, C Marjorie; Gubrium, Aline C; Aulino, Felicity; Krause, Elizabeth L; Leatherman, Thomas L

    2015-03-01

    The University of Massachusetts Amherst is part of Five-Colleges Inc, a consortium that includes the university and four liberal arts colleges. Consortium faculty from the School of Public Health and Health Sciences at the university and from the colleges are working to bridge liberal arts with public health graduate education. We outline four key themes guiding this effort and exemplary curricular tools for innovative community-based and multidisciplinary academic and research programs. The structure of the consortium has created a novel trajectory for student learning and engagement, with important ramifications for pedagogy and professional practice in public health. We show how graduate public health education and liberal arts can, and must, work in tandem to transform public health practice in the 21st century.

  12. Accountability in district nursing practice: key concepts.

    PubMed

    Griffith, Richard

    2015-03-01

    Public trust and confidence in district nurses is essential to the nurse-patient relationship that underpins effective care and treatment. That trust and confidence has even greater focus for district nurses who care for patients in their own homes. Those patients need to be able to count on the professionalism and probity of their district nurses. The professionalism and probity of district nurses is based on their accountability, which protects the public by imposing standards on district nurses and holds them answerable for their acts and omissions. This is the first of a series of articles on accountability in district nursing practice to mark the introduction of the revised Nursing and Midwifery Code on the 31 March 2015. This month's article considers the key concepts of accountability.

  13. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  14. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  15. Creating a database of internet-based clinical trials to support a public-led research programme: A descriptive analysis.

    PubMed

    Brice, Anne; Price, Amy; Burls, Amanda

    2015-01-01

    Online trials are rapidly growing in number, offering potential benefits but also methodological, ethical and social challenges. The International Network for Knowledge on Well-being (ThinkWell™) aims to increase public and patient participation in the prioritisation, design and conduct of research through the use of technologies. We aim to provide a baseline understanding of the online trial environment, determining how many trials have used internet-based technologies; how they have been used; and how use has developed over time. We searched a range of bibliographic databases to March 2015, with no date limits, supplemented by citation searching and references provided by experts in the field. Results were screened against inclusion and exclusion criteria, and included studies mapped against a number of key dimensions, with key themes developed iteratively throughout the process. We identified 1992 internet-based trials to March 2015. The number of reported studies increased substantially over the study timeframe. The largest number of trials were conducted in the USA (49.7%), followed by The Netherlands (10.2%); Australia (8.5%); the United Kingdom (5.8%); Sweden (4.6%); Canada (4%); and Germany (2.6%). South Korea (1.5%) has the highest number of reported trials for other continents. There is a predominance of interventions addressing core public health challenges including obesity (8.6%), smoking cessation (5.9%), alcohol abuse (7.7%) and physical activity (10.2%); in mental health issues such as depression (10.9%) and anxiety (5.6%); and conditions where self-management (16.6%) or monitoring (8.1%) is a major feature of care. The results confirm an increase in the use of the internet in trials. Key themes have emerged from the analysis and further research will be undertaken in order to investigate how the data can be used to improve trial design and recruitment, and to build an open access resource to support the public-led research agenda.

  16. Exploring shared risks through public-private partnerships in public health programs: a mixed method.

    PubMed

    Alonazi, Wadi B

    2017-06-12

    The natural assimilation of the process through which health partners sustain long-term relationships is a key issue in maintaining social well-being, reducing health risk factors, and sustaining public health programs. One global initiative in building effective healthcare systems is public-private partnerships (PPPs). This study elucidates the proposed key performance indicators initiated by the Ministry of Health of Saudi Arabia based on the projections of the government, known as Vision 2030, from the perspective of health risk factors. Through an inductive content analysis, this study assessed primary and secondary data in relation to the Saudi National Transformation Program (NTP). To identify the institutions that played a role in formulating the new Saudi Healthcare System, health policies, regulations, and reports published between 1996 and 2016 were categorized. After ranking the risk factors, the investigator selected 13 healthcare professionals in four focus group interviews to insightfully explore the challenges that the NTP faces from a health risk perspective. Thus, the study employed qualitative data gathered through focus group interviews with key figures as well as data extracted from written sources to identify distinct but interrelated partnerships practiced within risk management. A methodological overview of NTP priority and implementation offered practical guidance in the healthcare context. The five critical factors in maintaining successful and sustainable PPPs were (1) trustworthiness, (2) technological capability, (3) patient-centeredness, (4) competence, and (5) flexibility. Concession on primary and secondary healthcare services might be a good option based on the literature review and considering its popularity in other countries. A high outcome-based risk of PPPs was found as the most commonly shared perspective in risk management. Although the impact of the NTP rise has yet to be explored, its potential for challenging health consequences requires consideration and substantial regulatory action. This study contributes to the emerging critical analysis on local health initiatives by highlighting how integration may only be possible with a more radical conceptualization of national health governance.

  17. The Impact of a Research Ethics Training Program: Romania as a Case Study.

    PubMed

    Loue, Sana

    2014-12-01

    Case Western Reserve University's (CWRU) Training Program in International Research Ethics, funded by the Fogarty International Center, has been ongoing in Romania since 2000. The program consists of multiple components: a U.S.- based MA degree program for long-term trainees, Romania-based short courses, a U.S.-based opportunity for mid-and senior-level personnel to develop collaborative writing or research projects and present lectures, and a newsletter and various Internet-based activities. We evaluated the impact of the training program on bioethics in Romania through a survey of the training program's long-term trainees, a literature search for trainee publications, interviews with key informants, and identification of key events during the course of the program. Findings indicate that the program has had a considerable impact in the field of bioethics through trainee authorship of peer-reviewed publications, books, and chapters; trainee career trajectories that encompass activities related to research ethics; and the development of a Romania-based master's degree program in bioethics and a Center of Bioethics and Health Policy. We attribute these achievements to the establishment of strong relationships between CWRU in Cleveland and the University of Medicine and Pharmacy Gr. T. Popa in Iasi, Romania, prior to the initiation of the training program; collaboration with key Romania-based institutional partners that are equally invested in the program's success; reliance of the program on a solid theoretical framework; ongoing program responsiveness to trainee and country needs; and a sustained commitment of time, expertise, and funding by the funders, sponsors, and in-country collaborators.

  18. The Impact of a Research Ethics Training Program: Romania as a Case Study

    PubMed Central

    Loue, Sana

    2017-01-01

    Case Western Reserve University's (CWRU) Training Program in International Research Ethics, funded by the Fogarty International Center, has been ongoing in Romania since 2000. The program consists of multiple components: a U.S.-based MA degree program for long-term trainees, Romania-based short courses, a U.S.-based opportunity for mid-and senior-level personnel to develop collaborative writing or research projects and present lectures, and a newsletter and various Internet-based activities. We evaluated the impact of the training program on bioethics in Romania through a survey of the training program's long-term trainees, a literature search for trainee publications, interviews with key informants, and identification of key events during the course of the program. Findings indicate that the program has had a considerable impact in the field of bioethics through trainee authorship of peer-reviewed publications, books, and chapters; trainee career trajectories that encompass activities related to research ethics; and the development of a Romania-based master's degree program in bioethics and a Center of Bioethics and Health Policy. We attribute these achievements to the establishment of strong relationships between CWRU in Cleveland and the University of Medicine and Pharmacy Gr. T. Popa in Iasi, Romania, prior to the initiation of the training program; collaboration with key Romania-based institutional partners that are equally invested in the program's success; reliance of the program on a solid theoretical framework; ongoing program responsiveness to trainee and country needs; and a sustained commitment of time, expertise, and funding by the funders, sponsors, and in-country collaborators. PMID:26247075

  19. Stakeholder engagement and public policy evaluation: factors contributing to the development and implementation of a regional network for geriatric care.

    PubMed

    Glover, Catherine; Hillier, Loretta M; Gutmanis, Iris

    2007-01-01

    The development and implementation of a regional network that provides universally accessible and consistent services to the frail elderly living in Southwestern Ontario is described. Through continuous stakeholder engagement, clear network goals were identified and operationalized. Stakeholder commitment to the integration of expertise and specialized services, to evidence-based public policy and to iterative evaluation cycles were key to network success.

  20. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  1. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  2. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  3. Rules of thumb for superfund remedy selection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-08-01

    The guidance document describes key principles and expectations, interspersed with `best practices` based on program experience, that should be consulted during the Superfund remedy selection process. These remedy selection `Rules of Thumb` are organized into three major policy areas: (1) risk assessment and risk management, (2) developing remedial alternatives, and (3) ground-water response actions. The purpose of this guide is to briefly summarize key elements of various remedy selection guidance documents and policies in one publication.

  4. Financial Management Reforms in the Health Sector: A Comparative Study Between Cash-based and Accrual-based Accounting Systems

    PubMed Central

    Abolhallaje, Masoud; Jafari, Mehdi; Seyedin, Hesam; Salehi, Masoud

    2014-01-01

    Background: Financial management and accounting reform in the public sectors was started in 2000. Moving from cash-based to accrual-based is considered as the key component of these reforms and adjustments in the public sector. Performing this reform in the health system is a part of a bigger reform under the new public management. Objectives: The current study aimed to analyze the movement from cash-based to accrual-based accounting in the health sector in Iran. Patients and Methods: This comparative study was conducted in 2013 to compare financial management and movement from cash-based to accrual-based accounting in health sector in the countries such as the United States, Britain, Canada, Australia, New Zealand, and Iran. Library resources and reputable databases such as Medline, Elsevier, Index Copernicus, DOAJ, EBSCO-CINAHL and SID, and Iranmedex were searched. Fish cards were used to collect the data. Data were compared and analyzed using comparative tables. Results: Developed countries have implemented accrual-based accounting and utilized the valid, reliable and practical information in accrual-based reporting in different areas such as price and tariffs setting, operational budgeting, public accounting, performance evaluation and comparison and evidence based decision making. In Iran, however, only a few public organizations such as the municipalities and the universities of medical sciences use accrual-based accounting, but despite what is required by law, the other public organizations do not use accrual-based accounting. Conclusions: There are advantages in applying accrual-based accounting in the public sector which certainly depends on how this system is implemented in the sector. PMID:25763194

  5. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    NASA Astrophysics Data System (ADS)

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu

    2007-06-01

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  6. Simultaneous transmission for an encrypted image and a double random-phase encryption key.

    PubMed

    Yuan, Sheng; Zhou, Xin; Li, Da-hai; Zhou, Ding-fu

    2007-06-20

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  7. Prioritization of zoonotic diseases of public health significance in Vietnam.

    PubMed

    Trang, Do Thuy; Siembieda, Jennifer; Huong, Nguyen Thi; Hung, Pham; Ky, Van Dang; Bandyopahyay, Santanu; Olowokure, Babatunde

    2015-12-30

    Prioritization of zoonotic diseases is critical as it facilitates optimization of resources, greater understanding of zoonotic diseases and implementation of policies promoting multisectoral collaboration. This study aimed to establish strategic priorities for zoonotic diseases in Vietnam taking a key stakeholder approach. Two weeks prior to a workshop on zoonotic diseases a questionnaire was developed and posted to key professionals involved in different areas of zoonotic disease management in Vietnam. Respondents were asked to assess the relative priority of 12 zoonotic diseases using a number of evidence-based criteria, and to provide suggestions to strengthen multisectoral collaboration. A response rate of 69% (51/74) was obtained, and 75% (38/51) respondents worked in non-international Vietnamese organizations. Respondents identified the top five diseases for prioritization in Vietnam as: avian influenza, rabies, Streptococcus suis infection, pandemic influenza and foodborne bacterial diseases. The three criteria most used to rank diseases were severity of disease, outbreak potential and public attention. Avian influenza was ranked as the number one priority zoonotic disease in Vietnam by 57% of the respondents, followed by rabies (18%). Respondents identified coordination mechanisms, information sharing and capacity building as the most important areas for strengthening to enhance multisectoral collaboration. This study is the first systematic and broad-based attempt to prioritize zoonotic diseases of public health significance in Vietnam using key stakeholders, and a comparative and transparent method. There is limited literature for policy makers and planners on this topic and the results of this study can be used to guide decision-making.

  8. Use of acupuncture to treat cerebral infarction in the last 10 years: A Scopus-based literature analysis☆

    PubMed Central

    Chen, Jiajun; Yao, Min; Zhao, Yunhua; Jin, Xiya; Li, Yuanbing; Huang, Lihong

    2012-01-01

    OBJECTIVE: To identify global research trends in the use of acupuncture to treat cerebral infarction. DATA RETRIEVAL: We performed a bibliometric analysis of studies on the use of acupuncture to treat cerebral infarction published during 2002–2011, retrieved from Scopus, using the key words of acupuncture and cerebral infarction or ischemic stroke. SELECTION CRITERIA: Inclusion criteria: peer-reviewed articles on the use of acupuncture to treat cerebral infarction indexed in Scopus and published between 2002 and 2011; types of publications were original research articles, reviews, meeting abstracts, proceedings papers, book chapters, editorial material, and news items. Exclusion criteria: articles that required manual searching or telephone access; documents that were not published in the public domain; and corrected papers. MAIN OUTCOME MEASURES: (a) Annual publication output; (b) language of publication; (c) type of publication; (d) key words of publication; (e) publication by research field; (f) publication by journal; (g) publication by country and institution; (h) publication by author; (i) most-cited papers between 2002 and 2006; and (j) most-cited papers between 2007 and 2011. RESULTS: A total of 160 publications on the use of acupuncture to treat cerebral infarction from 2002–2011 were retrieved from Scopus. The number of publications increased gradually over the 10-year study period; most were written in Chinese or English. Articles and reviews constituted the major types. The most frequent key word used was acupuncture. The most prolific journals in this area were Zhongguo Zhen Jiu and the Chinese Journal of Clinical Rehabilitation. Of the 160 publications retrieved, half came from Chinese authors and institutions. Tianjin University of Traditional Chinese Medicine was the most prolific research institute. Two papers were cited 30 times; they were published in 2002 and 2009, respectively. CONCLUSION: In the field of neuroscience, there is little literature on acupuncture for cerebral infarction. The most-cited papers were cited 30 times in the past 3 years. We believe that, with advances in the study of mechanisms in neurobiology, research on acupuncture will also advance and will become the concern of more scholars. PMID:25317148

  9. Automated Literature Searches for Longitudinal Tracking of Cancer Research Training Program Graduates.

    PubMed

    Padilla, Luz A; Desmond, Renee A; Brooks, C Michael; Waterbor, John W

    2018-06-01

    A key outcome measure of cancer research training programs is the number of cancer-related peer-reviewed publications after training. Because program graduates do not routinely report their publications, staff must periodically conduct electronic literature searches on each graduate. The purpose of this study is to compare findings of an innovative computer-based automated search program versus repeated manual literature searches to identify post-training peer-reviewed publications. In late 2014, manual searches for publications by former R25 students identified 232 cancer-related articles published by 112 of 543 program graduates. In 2016, a research assistant was instructed in performing Scopus literature searches for comparison with individual PubMed searches on our 543 program graduates. Through 2014, Scopus found 304 cancer publications, 220 of that had been retrieved manually plus an additional 84 papers. However, Scopus missed 12 publications found manually. Together, both methods found 316 publications. The automated method found 96.2 % of the 316 publications while individual searches found only 73.4 %. An automated search method such as using the Scopus database is a key tool for conducting comprehensive literature searches, but it must be supplemented with periodic manual searches to find the initial publications of program graduates. A time-saving feature of Scopus is the periodic automatic alerts of new publications. Although a training period is needed and initial costs can be high, an automated search method is worthwhile due to its high sensitivity and efficiency in the long term.

  10. Measuring the authority of local public health directors in the context of organizational structure: an exploratory, multimodal approach.

    PubMed

    Miner Gearin, Kimberly J; Thrash, Allison M Rick; Frauendienst, Renee; Myhre, Julie; Gyllstrom, M Elizabeth; Riley, William J; Schroeder, Janelle

    2012-11-01

    Studies have reported a relationship between the organization of public health services and variability in public health practice at the local and state levels. A national research agenda has prioritized practice-based research to understand pathways that lead to this variation and examine the impact of these differences on outcomes. To measure the extent to which Minnesota local health directors report having key authorities and examine the relationship between organizational structure and authority of local health directors. : Multimodal. Minnesota local health departments. Directors of Minnesota local health departments. Director authorities. Most Minnesota local health directors reported having 6 key authorities related to budget preparation and modification and interaction with local elected officials (n = 51, 71%). Twelve directors (16%) reported that they have 4 or fewer of the 6 authorities. The authority most commonly reported as lacking was the authority to initiate communication with locally elected officials (n = 15, 21%). The percentage of directors who reported having all 6 authorities was higher among those in stand-alone departments (82%) than those in combined organizations (50%). This descriptive study illustrates that emerging practice-based research networks can successfully collaborate on small-scale research projects with immediate application for systems development. Study findings are being used by local public health officials to help articulate their role, aid in succession planning, and inform elected officials, who need to consider the public health implications of potential changes to local public health governance and organization. More studies are needed to refine measurement of authority and structure.

  11. EVALUATION OF LITERATURE ESTABLISHING SCREENING LEVELS FOR TERRESTRIAL PLANTS/INVERTEBRATES

    EPA Science Inventory

    Scientific publications often lack key information on experimental design or do not follow appropriate test methods and therefore cannot be used in deriving reliable benchmarks. Risk based soil screening levels (Eco-SSLs) are being established for chemicals of concern to terrestr...

  12. LabKey Server NAb: A tool for analyzing, visualizing and sharing results from neutralizing antibody assays

    PubMed Central

    2011-01-01

    Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb) assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the LabKey Server NAb tool without installing the software by using the Atlas Science Portal (https://atlas.scharp.org). Atlas is an installation of LabKey Server. PMID:21619655

  13. Public health practice vs research: implications for preparedness and disaster research review by State Health Department IRBs.

    PubMed

    Perlman, David

    2008-10-01

    Under the current US Department of Health and Human Services regulatory and ethical system for research involving human subjects, research is defined in terms of several key concepts: intent, systematic investigation, and generalizability. If an investigator engages in a systematic investigation designed or intended to contribute to generalizable knowledge, then he or she is engaged in research. If that research involves living individuals and the investigator will either interact or intervene with people or obtain their identifiable personal information, then the research must be prospectively reviewed by an institutional review board (IRB), a federally mandated committee that ensures the ethical and regulatory appropriateness of proposed research. In public health institutions, and especially at state departments of health, this definition of research may prove vexing for determining when particular public health activities must be reviewed by IRBs. This article outlines several reasons for such vexation and 2 key responses from major public health stakeholders. In the current climate of public health preparedness initiatives at state health departments for disasters and bioterrorism, how research is defined vis-à-vis public health interventions may add even more confusion to preparedness initiatives and pose difficulties in determining when IRB review and the added protections it affords are appropriate. This article suggests several practical ways to avoid confusion and attempts to strike a balance between the need for expeditious approvals of research-based responses to public health disasters and to ensure proper protections for human subjects at state health departments. It is hoped that these suggestions can assist not only state health departments but also academically based researchers who either collaborate with those departments or whose research will need to be reviewed by their IRBs.

  14. The Use of Published Clinical Study Reports to Support U.S. Food and Drug Administration Approval of Imaging Agents.

    PubMed

    Rieves, Dwaine; Jacobs, Paula

    2016-12-01

    Pharmaceutical companies typically perform prospective, multicenter phase 3 clinical studies to support approval of a new imaging agent by the U.S. Food and Drug Administration (FDA). In uncommon situations, the FDA has approved imaging agents based solely, or in large part, on the clinical study experience described in published reports, including reports of exploratory (i.e., phase 1 or 2) studies performed at a single clinical site. We performed a survey of published reports to assess the potential of the reported information to support FDA approval of a commonly cited investigational imaging agent. Our survey revealed critical data limitations in most publications, all of which reported exploratory clinical studies. Here we summarize the precedent for FDA approval of imaging agents using effectiveness data from publications, FDA guidance, and our experience in reviewing publications. We also present a key-data checklist for investigators to consider in the design, conduct, and reporting of exploratory clinical studies for publication. We encourage editors and peer reviewers to consider requiring these key data when reviewing these reports for publication. © 2016 by the Society of Nuclear Medicine and Molecular Imaging, Inc.

  15. Global trade and health: key linkages and future challenges.

    PubMed Central

    Bettcher, D. W.; Yach, D.; Guindon, G. E.

    2000-01-01

    Globalization of trade, marketing and investment has important implications for public health, both negative and positive. This article considers the implications of the single package of World Trade Organization (WTO) agreements for public health research and policy, focusing on three themes: commodities, intellectual property rights, and health services. The main aims of the analysis are as follows: to identify how trade issues are associated with the transnationalization of health risks and possible benefits; to identify key areas of research; and to suggest policy-relevant advice and interventions on trade and health issues. The next wave of international trade law will need to take more account of global public health issues. However, to become more engaged in global trade debates, the public health community must gain an understanding of the health effects of global trade agreements. It must also ensure that its own facts are correct, so that public health is not blindly used for political ends, such as justifying unwarranted economic protectionism. "Healthy trade" policies, based on firm empirical evidence and designed to improve health status, are an important step towards reaching a more sustainable form of trade liberalization. PMID:10885181

  16. Understanding Evidence-Based Public Health Policy

    PubMed Central

    Chriqui, Jamie F.; Stamatakis, Katherine A.

    2009-01-01

    Public health policy has a profound impact on health status. Missing from the literature is a clear articulation of the definition of evidence-based policy and approaches to move the field forward. Policy-relevant evidence includes both quantitative (e.g., epidemiological) and qualitative information (e.g., narrative accounts). We describe 3 key domains of evidence-based policy: (1) process, to understand approaches to enhance the likelihood of policy adoption; (2) content, to identify specific policy elements that are likely to be effective; and (3) outcomes, to document the potential impact of policy. Actions to further evidence-based policy include preparing and communicating data more effectively, using existing analytic tools more effectively, conducting policy surveillance, and tracking outcomes with different types of evidence. PMID:19608941

  17. A Qualitative Study of Early Childhood Educators' Beliefs about Key Preschool Classroom Experiences

    ERIC Educational Resources Information Center

    Lara-Cinisomo, Sandraluz; Fuligni, Allison Sidle; Daugherty, Lindsay; Howes, Carollee; Karoly, Lynn

    2009-01-01

    The aim of the study was to uncover early childhood educators' beliefs about how to best work with children getting ready for kindergarten. The study involved 11 focus groups with providers from three types of early education settings located in Los Angeles County: (1) public center-based programs, (2) private center-based programs, and (3) family…

  18. Enabling interspecies epigenomic comparison with CEpBrowser.

    PubMed

    Cao, Xiaoyi; Zhong, Sheng

    2013-05-01

    We developed the Comparative Epigenome Browser (CEpBrowser) to allow the public to perform multi-species epigenomic analysis. The web-based CEpBrowser integrates, manages and visualizes sequencing-based epigenomic datasets. Five key features were developed to maximize the efficiency of interspecies epigenomic comparisons. CEpBrowser is a web application implemented with PHP, MySQL, C and Apache. URL: http://www.cepbrowser.org/.

  19. Higher Education Partners with the Federal Government for PKI: Both Communities Bring Substantial Expertise and Investment to the Solutions.

    ERIC Educational Resources Information Center

    PKI for Networked Higher Education Working Group.

    2000-01-01

    One barrier to Web-based education is lack of an effective system to identify and authorize involved participants, content, and institutions. PKI (public-key infrastructure) is an emerging technology that can certify the correct identity of each person and communication in Web-based learning. A June 2000 National Science Foundation workshop…

  20. Assessing the Impact of School-Based Marketing Efforts: A Case Study of a Foreign Language Immersion Program in a School-Choice Environment

    ERIC Educational Resources Information Center

    Olson Beal, Heather K.; Beal, Brent D.

    2016-01-01

    The marketization of K-12 education has led to an increase in school-based marketing efforts. Relatively little research, however, has examined how public schools market themselves, who is involved in marketing, and how these marketing efforts impact key stakeholders, including school administrators, teachers, students, and parents.We explore…

  1. Obtaining resources for evidence-based public health initiatives at the local level: insights from the Central Sydney Tobacco Control Plan.

    PubMed

    Rissel, C; McMaugh, K; O'Connor, D; Balafas, A; Ward, J

    1999-02-01

    In response to inquiries regarding the processes of developing a Tobacco Control Plan (TCP) for the Central Sydney Area Health Service (which in 1997 allocated dedicated funding of $ 800,000 over 2 1/2 years to implement the plan), this article describes the strengths and weaknesses of the TCP and outlines the process which contributed to its funding. Consistent with national and state priorities, the TCP recommended strategies based on best available evidence in the four action areas: reducing sales of cigarettes to minors, marketing, passive smoking and smoking cessation. Funding of this amount for a single public health issue at a local level represents a unique achievement in the application of an evidence-based approach to population health. Key elements of our advocacy methods included the involvement of all key primary health care and clinical stakeholders; comprehensive background research to identify evidence-based strategies; careful attention to budget options; strategic lobbying of senior staff and decision makers; the proposal for a multidisciplinary management structure for the TCP and specifications for funding allocation and evaluation. Early achievements and other reflections are discussed.

  2. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  3. Computer Abuse: Vandalizing the Information Society.

    ERIC Educational Resources Information Center

    Furnell, Steven M.; Warren, Matthew J.

    1997-01-01

    Computing and telecommunications, key to an information-based society, are increasingly targets for criminals and mischief makers. This article examines the effects of malicious computer abuse: hacking and viruses, highlights the apparent increase in incidents, and examines their effect on public perceptions of technology. Presents broad…

  4. Dynamic development of public attitudes towards science policymaking.

    PubMed

    Okamura, Keisuke

    2016-05-01

    Understanding the heterogeneity of mechanisms that form public attitudes towards science and technology policymaking is essential to the establishment of an effective public engagement platform. Using the 2011 public opinion survey data from Japan (n = 6,136), I divided the general public into three categories: the Attentive public, who are willing to actively engage with science and technology policymaking dialogue; the Interested public, who have moderate interest in science and technology but rely on experts for policy decisions; and the Residual public, who have minimal interest in science and technology. On the basis of the results of multivariate regression analysis, I have identified several key predispositions towards science and technology and other socio-demographic characteristics that influence the shift of individuals from one category of the general public to another. The findings provide a foundation for understanding how to induce more accountable, evidence-based science and technology policymaking. © The Author(s) 2015.

  5. Research in support of health systems transformation in South Africa: the experience of the Centre for Health Policy.

    PubMed

    Rispel, Laetitia C; Doherty, Jane

    2011-01-01

    We describe the role and experience of the Centre for Health Policy (CHP), a university-based research unit established in 1987, in influencing and supporting health systems transformation in South Africa over two decades. During 2010, we analyzed relevant documents and conducted interviews with 25 key informants. CHP's research has contributed directly to health policy development and implementation while also changing the way government understood or approached policy issues. Key success factors for policy influence are: research quality and trustworthiness, strategic alliances and networking, and capacity building. CHP's challenges include identifying new funding sources and sustaining a high public profile. The lessons for other countries are to: conduct good quality, relevant research based on strong ethical values; build and maintain open and honest relationships with government; recognize and adapt to changes in the policy environment; develop capacity as part of a continuous programme; and seek core funding that ensures research independence and public accountability.

  6. Security, privacy, and confidentiality issues on the Internet

    PubMed Central

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  7. An Iterative Information-Reduced Quadriphase-Shift-Keyed Carrier Synchronization Scheme Using Decision Feedback for Low Signal-to-Noise Ratio Applications

    NASA Technical Reports Server (NTRS)

    Simon, M.; Tkacenko, A.

    2006-01-01

    In a previous publication [1], an iterative closed-loop carrier synchronization scheme for binary phase-shift keyed (BPSK) modulation was proposed that was based on feeding back data decisions to the input of the loop, the purpose being to remove the modulation prior to carrier synchronization as opposed to the more conventional decision-feedback schemes that incorporate such feedback inside the loop. The idea there was that, with sufficient independence between the received data and the decisions on it that are fed back (as would occur in an error-correction coding environment with sufficient decoding delay), a pure tone in the presence of noise would ultimately be produced (after sufficient iteration and low enough error probability) and thus could be tracked without any squaring loss. This article demonstrates that, with some modification, the same idea of iterative information reduction through decision feedback can be applied to quadrature phase-shift keyed (QPSK) modulation, something that was mentioned in the previous publication but never pursued.

  8. Security, privacy, and confidentiality issues on the Internet.

    PubMed

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  9. Ionospheric Response to Solar Flares Using an Improved Version of SAMI2

    DTIC Science & Technology

    2008-03-01

    THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION ...Reich III, AAS, B.S. Captain, USAF March 2008 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFrT/GAP/ENP/0&M08 Approved: IoNospHERrc RpspoxsE To...This region plays a key role in the absorption of HF-radio signals, especially very low frequency (VLF) signals used in military communications

  10. Recommendations for control of East african sleeping sickness in Uganda.

    PubMed

    Kotlyar, Simon

    2010-01-01

    East African sleeping sickness, caused by Trypanosoma brucei rhodesiense, is prominent in Uganda and poses a serious public health challenge in the region. This publication attempts to provide key components for designing a strategy for a nationwide initiative to provide insecticide-treatment of the animal reservoir to control T. b. rhodesiense. The contents of this article will focus on insecticide-based vector control strategies, monitoring and evaluation framework, and knowledge gaps required for future initiatives.

  11. Food-based dietary guidelines and implementation: lessons from four countries--Chile, Germany, New Zealand and South Africa.

    PubMed

    Keller, Ingrid; Lang, Tim

    2008-08-01

    Food-based dietary guidelines (FBDGs) are globally promoted as an important part of national food and nutrition policies. They are presented within policy as key features of the strategy to educate the public and guide policy-makers and other stakeholders about a healthy diet. This paper examines the implementation of FBDGs in four countries: Chile, Germany, New Zealand and South Africa - diverse countries chosen to explore the realities of the FBDG within policy on public health nutrition. A literature review was carried out, followed by interviews with representatives from the governmental, academic and private sector in all four countries. In all four countries the FBDG is mainly implemented via written/electronic information provided to the public through the health and/or education sector. Data about the impact of FBDGs on policy and consumers' food choice or dietary habits are incomplete; nutrition surveys do not enable assessment of how effective FBDGs are as a factor in dietary or behavioural change. Despite limitations, FBDGs are seen as being valuable by key stakeholders. FBDGs are being implemented and there is experience which should be built upon. The policy focus needs to move beyond merely disseminating FBDGs. They should be part of a wider public health nutrition strategy involving multiple sectors and policy levels. Improvements in the implementation of FBDGs are crucial given the present epidemic of chronic, non-communicable diseases.

  12. Tools for Implementing an Evidence-Based Approach in Public Health Practice

    PubMed Central

    Jacobs, Julie A.; Jones, Ellen; Gabella, Barbara A.; Spring, Bonnie

    2012-01-01

    Increasing disease rates, limited funding, and the ever-growing scientific basis for intervention demand the use of proven strategies to improve population health. Public health practitioners must be ready to implement an evidence-based approach in their work to meet health goals and sustain necessary resources. We researched easily accessible and time-efficient tools for implementing an evidence-based public health (EBPH) approach to improve population health. Several tools have been developed to meet EBPH needs, including free online resources in the following topic areas: training and planning tools, US health surveillance, policy tracking and surveillance, systematic reviews and evidence-based guidelines, economic evaluation, and gray literature. Key elements of EBPH are engaging the community in assessment and decision making; using data and information systems systematically; making decisions on the basis of the best available peer-reviewed evidence (both quantitative and qualitative); applying program-planning frameworks (often based in health-behavior theory); conducting sound evaluation; and disseminating what is learned. PMID:22721501

  13. Bridging Graduate Education in Public Health and the Liberal Arts

    PubMed Central

    Gubrium, Aline C.; Aulino, Felicity; Krause, Elizabeth L.; Leatherman, Thomas L.

    2015-01-01

    The University of Massachusetts Amherst is part of Five-Colleges Inc, a consortium that includes the university and four liberal arts colleges. Consortium faculty from the School of Public Health and Health Sciences at the university and from the colleges are working to bridge liberal arts with public health graduate education. We outline four key themes guiding this effort and exemplary curricular tools for innovative community-based and multidisciplinary academic and research programs. The structure of the consortium has created a novel trajectory for student learning and engagement, with important ramifications for pedagogy and professional practice in public health. We show how graduate public health education and liberal arts can, and must, work in tandem to transform public health practice in the 21st century. PMID:25706025

  14. Evaluation of HIV/AIDS prevention resources in Liberia: strategy and implications.

    PubMed

    Kennedy, Stephen B; Johnson, Knowlton; Harris, Albert O; Lincoln, Adams; Neace, William; Collins, David

    2004-03-01

    The purpose of this preliminary study was to assess the HIV/AIDS prevention needs, services, and resources in Liberia, including the readiness of local providers to conduct HIV/AIDS-related prevention programs based on a set of six key dimensions (prevention needs, knowledge, leadership, environment, risky behaviors, and resources). A valid self-administered qualitative-based health survey, based on a community readiness model, was utilized as the primary data collection source. A cross-sectional design that utilized a convenient sample of key informants such as health coordinators, program directors, and health administrator from both public and private HIV/AIDS-based organizations was used. Furthermore, an extensive review of the National Library of Medicine database of published articles from mid-1980 to 2002 was simultaneously conducted to gauge the extent of scientific publications on HIV/AIDS-related prevention services in Liberia. The findings from this study strongly suggest that Liberia is in a stage of vague awareness, as defined by the Tri-Ethnic Center community readiness framework, regarding HIV/AIDS-related activities, including a significant lack of HIV/AIDS-related resources and scientific publications. Accordingly, there is a critical need to acquire adequate resources and build capacity to implement effective HIV/AIDS-related prevention programming services in order to avert the negative public health consequences associated with HIV/AIDS, including the implementation of relevant evaluation and dissemination strategies. Most importantly, this model has the potential to be utilized in other resource-constraint settings, especially in the developing world, to assess prevention-related resources and programmatic readiness. This is the first published study to evaluate Liberia's HIV/AIDS prevention resources and to systematically document the extent and magnitude of the HIV/AIDS crises in the country.

  15. Modular multiplication in GF(p) for public-key cryptography

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub

    Modular multiplication forms the basis of modular exponentiation which is the core operation of the RSA cryptosystem. It is also present in many other cryptographic algorithms including those based on ECC and HECC. Hence, an efficient implementation of PKC relies on efficient implementation of modular multiplication. The paper presents a survey of most common algorithms for modular multiplication along with hardware architectures especially suitable for cryptographic applications in energy constrained environments. The motivation for studying low-power and areaefficient modular multiplication algorithms comes from enabling public-key security for ultra-low power devices that can perform under constrained environments like wireless sensor networks. Serial architectures for GF(p) are analyzed and presented. Finally proposed architectures are verified and compared according to the amount of power dissipated throughout the operation.

  16. Dental Public Health In Action: Putting Oral Health on the Local Public Health Agenda.

    PubMed

    Walker, I F; Eapen-Simon, S; Gibson, S

    2018-04-18

    Oral health is a key public health issue across England. In Wakefield in the north of England, local data suggested the oral health of local children was significantly worse than the national average. This paper describes the work undertaken by Wakefield Council to strategically address this issue. A structured process was adopted. Key lessons include; having senior ownership from the Director of Public Health, partnership working across all key stakeholders, utilising dental public health expertise from Public Health England and the use of extensive engagement with stakeholders. Through this work, oral health is now identified with greater importance in Wakefield as a public health issue. Actions are now strategically co-ordinated across stakeholders to improve oral health in local children. Copyright© 2018 Dennis Barber Ltd.

  17. Measuring the Value of Public Health Systems: The Disconnect Between Health Economists and Public Health Practitioners

    PubMed Central

    Jacobson, Peter D.; Palmer, Jennifer A.

    2008-01-01

    We investigated ways of defining and measuring the value of services provided by governmental public health systems. Our data sources included literature syntheses and qualitative interviews of public health professionals. Our examination of the health economic literature revealed growing attempts to measure value of public health services explicitly, but few studies have addressed systems or infrastructure. Interview responses demonstrated no consensus on metrics and no connection to the academic literature. Key challenges for practitioners include developing rigorous, data-driven methods and skilled staff; being politically willing to base allocation decisions on economic evaluation; and developing metrics to capture “intangibles” (e.g., social justice and reassurance value). Academic researchers evaluating the economics of public health investments should increase focus on the working needs of public health professionals. PMID:18923123

  18. Research on hotspot discovery in internet public opinions based on improved K-means.

    PubMed

    Wang, Gensheng

    2013-01-01

    How to discover hotspot in the Internet public opinions effectively is a hot research field for the researchers related which plays a key role for governments and corporations to find useful information from mass data in the Internet. An improved K-means algorithm for hotspot discovery in internet public opinions is presented based on the analysis of existing defects and calculation principle of original K-means algorithm. First, some new methods are designed to preprocess website texts, select and express the characteristics of website texts, and define the similarity between two website texts, respectively. Second, clustering principle and the method of initial classification centers selection are analyzed and improved in order to overcome the limitations of original K-means algorithm. Finally, the experimental results verify that the improved algorithm can improve the clustering stability and classification accuracy of hotspot discovery in internet public opinions when used in practice.

  19. Research on Hotspot Discovery in Internet Public Opinions Based on Improved K-Means

    PubMed Central

    2013-01-01

    How to discover hotspot in the Internet public opinions effectively is a hot research field for the researchers related which plays a key role for governments and corporations to find useful information from mass data in the Internet. An improved K-means algorithm for hotspot discovery in internet public opinions is presented based on the analysis of existing defects and calculation principle of original K-means algorithm. First, some new methods are designed to preprocess website texts, select and express the characteristics of website texts, and define the similarity between two website texts, respectively. Second, clustering principle and the method of initial classification centers selection are analyzed and improved in order to overcome the limitations of original K-means algorithm. Finally, the experimental results verify that the improved algorithm can improve the clustering stability and classification accuracy of hotspot discovery in internet public opinions when used in practice. PMID:24106496

  20. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  1. Availability of emergency obstetric care (EmOC) among public and private health facilities in rural northwest Bangladesh.

    PubMed

    Sikder, Shegufta S; Labrique, Alain B; Ali, Hasmot; Hanif, Abu A M; Klemm, Rolf D W; Mehra, Sucheta; West, Keith P; Christian, Parul

    2015-01-31

    Although safe motherhood strategies recommend that women seek timely care from health facilities for obstetric complications, few studies have described facility availability of emergency obstetric care (EmOC). We sought to describe and compare availability and readiness to provide EmOC among public and private health facilities commonly visited for pregnancy-related complications in two districts of northwest Bangladesh. We also described aspects of financial and geographic access to healthcare and key constraints to EmOC provision. Using data from a large population-based community trial, we identified and surveyed the 14 health facilities (7 public, 7 private) most frequently visited for obstetric complications and near misses as reported by women. Availability of EmOC was based on provision of medical services, assessed through clinician interviews and record review. Levels of EmOC availability were defined as basic or comprehensive. Readiness for EmOC provision was based on scores in four categories: staffing, equipment, laboratory capacity, and medicines. Readiness scores were calculated using unweighted averages. Costs of C-section procedures and geographic locations of facilities were described. Textual analysis was used to identify key constraints. The seven surveyed private facilities offered comprehensive EmOC compared to four of the seven public facilities. With 100% representing full readiness, mean EmOC readiness was 81% (range: 63%-91%) among surveyed private facilities compared to 67% (range: 48%-91%) in public facilities (p = 0.040). Surveyed public clinics had low scores on staffing and laboratory capacity (69%; 50%). The mean cost of the C-section procedure in private clinics was $77 (standard deviation: $16) and free in public facilities. The public sub-district facilities were the only facilities located in rural areas, with none providing comprehensive EmOC. Shortages in specialized staff were listed as the main barrier to EmOC provision in public facilities. Although EmOC availability and readiness was higher among the surveyed seven most commonly visited private clinics, public facilities appeared to be more affordable for C-section and more geographically accessible. Strategies to retain anesthesiologists and surgeons, such as non-financial incentives, are needed to improve EmOC provision in the public sector. Centralized blood banks are recommended to streamline safe blood acquisition for obstetric surgeries.

  2. The Future of Public Health Informatics: Alternative Scenarios and Recommended Strategies

    PubMed Central

    Edmunds, Margo; Thorpe, Lorna; Sepulveda, Martin; Bezold, Clem; Ross, David A.

    2014-01-01

    Background: In October 2013, the Public Health Informatics Institute (PHII) and Institute for Alternative Futures (IAF) convened a multidisciplinary group of experts to evaluate forces shaping public health informatics (PHI) in the United States, with the aim of identifying upcoming challenges and opportunities. The PHI workshop was funded by the Robert Wood Johnson Foundation as part of its larger strategic planning process for public health and primary care. Workshop Context: During the two-day workshop, nine experts from the public and private sectors analyzed and discussed the implications of four scenarios regarding the United States economy, health care system, information technology (IT) sector, and their potential impacts on public health in the next 10 years, by 2023. Workshop participants considered the potential role of the public health sector in addressing population health challenges in each scenario, and then identified specific informatics goals and strategies needed for the sector to succeed in this role. Recommendations and Conclusion: Participants developed recommendations for the public health informatics field and for public health overall in the coming decade. These included the need to rely more heavily on intersectoral collaborations across public and private sectors, to improve data infrastructure and workforce capacity at all levels of the public health enterprise, to expand the evidence base regarding effectiveness of informatics-based public health initiatives, and to communicate strategically with elected officials and other key stakeholders regarding the potential for informatics-based solutions to have an impact on population health. PMID:25848630

  3. Public Response to Obamacare on Twitter

    PubMed Central

    Zheng, Kai; Liu, Yang; Levy, Helen

    2017-01-01

    Background The Affordable Care Act (ACA), often called “Obamacare,” is a controversial law that has been implemented gradually since its enactment in 2010. Polls have consistently shown that public opinion of the ACA is quite negative. Objective The aim of our study was to examine the extent to which Twitter data can be used to measure public opinion of the ACA over time. Methods We prospectively collected a 10% random sample of daily tweets (approximately 52 million since July 2011) using Twitter’s streaming application programming interface (API) from July 10, 2011 to July 31, 2015. Using a list of key terms and ACA-specific hashtags, we identified tweets about the ACA and examined the overall volume of tweets about the ACA in relation to key ACA events. We applied standard text sentiment analysis to assign each ACA tweet a measure of positivity or negativity and compared overall sentiment from Twitter with results from the Kaiser Family Foundation health tracking poll. Results Public opinion on Twitter (measured via sentiment analysis) was slightly more favorable than public opinion measured by the Kaiser poll (approximately 50% vs 40%, respectively) but trends over time in both favorable and unfavorable views were similar in both sources. The Twitter-based measures of opinion as well as the Kaiser poll changed very little over time: correlation coefficients for favorable and unfavorable public opinion were .43 and .37, respectively. However, we found substantial spikes in the volume of ACA-related tweets in response to key events in the law’s implementation, such as the first open enrollment period in October 2013 and the Supreme Court decision in June 2012. Conclusions Twitter may be useful for tracking public opinion of health care reform as it appears to be comparable with conventional polling results. Moreover, in contrast with conventional polling, the overall amount of tweets also provides a potential indication of public interest of a particular issue at any point in time. PMID:28550002

  4. Teaching Public Health Through a Pedagogy of Collegiality

    PubMed Central

    Chávez, Vivian; Turalba, Ruby-Asuncion N.; Malik, Savita

    2006-01-01

    Curriculum development in masters of public health programs that effectively meets the complex challenges of the 21st century is an important part of public health education and requires purposeful thinking. Current approaches to training the public health work-force do not adequately prepare professionals to be culturally competent in addressing health disparities. Principles of community-based participatory research highlight the importance of building relationships of mutual accountability and emphasize collegial teaching. We present background and theoretical foundations for a pedagogy of collegiality and describe specific teaching methods, classroom activities, and key assignments organized around 4 essential features: principles of community organizing, building community and valuing diversity, engaging the senses, and writing across the curriculum. PMID:16735640

  5. Teaching public health through a pedagogy of collegiality.

    PubMed

    Chávez, Vivian; Turalba, Ruby-Asuncion N; Malik, Savita

    2006-07-01

    Curriculum development in masters of public health programs that effectively meets the complex challenges of the 21st century is an important part of public health education and requires purposeful thinking. Current approaches to training the public health work-force do not adequately prepare professionals to be culturally competent in addressing health disparities. Principles of community-based participatory research highlight the importance of building relationships of mutual accountability and emphasize collegial teaching. We present background and theoretical foundations for a pedagogy of collegiality and describe specific teaching methods, classroom activities, and key assignments organized around 4 essential features: principles of community organizing, building community and valuing diversity, engaging the senses, and writing across the curriculum.

  6. For Fit's Sake: A Norms-Based Approach to Healthy Behaviors Through Influence of Presumed Media Influence.

    PubMed

    Ho, Shirley S; Lee, Edmund W J; Ng, Kaijie; Leong, Grace S H; Tham, Tiffany H M

    2016-09-01

    Based on the influence of presumed media influence (IPMI) model as the theoretical framework, this study examines how injunctive norms and personal norms mediate the influence of healthy lifestyle media messages on public intentions to engage in two types of healthy lifestyle behaviors-physical activity and healthy diet. Nationally representative data collected from 1,055 adults in Singapore demonstrate partial support for the key hypotheses that make up the extended IPMI model, highlighting the importance of a norms-based approach in health communication. Our results indicate that perceived media influence on others indirectly shaped public intentions to engage in healthy lifestyle behaviors through personal norms and attitude, providing partial theoretical support for the extended IPMI model. Practical implications for health communicators in designing health campaigns media messages to motivate the public to engage in healthy lifestyle are discussed.

  7. The current state of nursing performance measurement, public reporting, and value-based purchasing.

    PubMed

    Kurtzman, Ellen T; Dawson, Ellen M; Johnson, Jean E

    2008-08-01

    Over the last decade, there has been a substantial investment in holding health care providers accountable for the quality of care provided in hospitals and other settings of care. This investment has been realized through the proliferation of national policies that address performance measurement, public reporting, and value-based purchasing. Although nurses represent the largest segment of the health care workforce and despite their acknowledged role in patient safety and health care outcomes, they have been largely absent from policy setting in these areas. This article provides an analysis of current nursing performance measurement and public reporting initiatives and presents a summary of emerging trends in value-based purchasing, with an emphasis on activities in the United States. The article synthesizes issues of relevance to advancing the current climate for nursing quality and concludes with key issues for future policy setting.

  8. Science and Engineering Indicators 2010

    ERIC Educational Resources Information Center

    National Science Foundation, 2010

    2010-01-01

    The Science Indicators series was designed to provide a broad base of quantitative information about U.S. science, engineering, and technology for use by policymakers, researchers, and the general public. "Science and Engineering Indicators 2010" contains analyses of key aspects of the scope, quality, and vitality of the Nation's science…

  9. Chicago Decentralizes.

    ERIC Educational Resources Information Center

    Rist, Marilee C.

    1990-01-01

    Bureaucratic inefficiency aside, Chicago public schools are failing dismally in their basic educational mission. A new school reform plan promises to turn systemwide failure into success by weakening the central bureaucracy's power and turning the ignition key over to 541 school-based councils. A sidebar claims that courts could determine the real…

  10. Modeling, Simulation and Analysis of Public Key Infrastructure

    NASA Technical Reports Server (NTRS)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  11. Moving an Evidence-Based Policy Agenda Forward: Leadership Tips From the Field.

    PubMed

    Garrett, Teresa

    2018-05-01

    Advancing evidence-based policy change is a leadership challenge that nurses should embrace. Key tips to ensure that evidence-based policy changes are successful at the individual, community, and population levels are offered to help nurses through the change process. The public trust in the nursing profession is a leverage point that should be used to advance the use of evidence, expedite change, and improve health for students and across communities.

  12. Community-based health and schools of nursing: supporting health promotion and research.

    PubMed

    Shannon, Crystal

    2014-01-01

    This article examines the role of community-based schools of nursing in the promotion of public health and research in poverty-stricken areas. This was a three-phase study (questionnaire and key-informants' interviews) that surveyed representatives of prelicensure associate and baccalaureate nursing schools (n=17), nursing-school key informants (n=6) and community leaders (n=10). A 13-question web-based survey and semi-structured interview of key informants elicited data on demographics, nursing program design, exposure of faculty and students to various research and health promotion methods, and beliefs about student involvement. Nursing schools participated minimally in community-based health promotion (CBHP) and community-based participatory research saw reduced need for student involvement in such activities, cited multiple barriers to active community collaboration, and reported restricted community partnerships. CBHP was recognized to be a valuable element of health care and student education, but is obstructed by many barriers. This study suggests that nursing schools are not taking full advantage of relationships with community leaders. Recommendations for action are given. © 2013 Wiley Periodicals, Inc.

  13. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  14. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  15. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  16. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  17. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  18. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  19. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  20. Have No PHEAR: Networks Without Identifiers

    DTIC Science & Technology

    2015-12-07

    packet processing, cryptography , or other computationally intensive func- tionality is present. This prevents, e.g., SDN-based onion routing from being...client registration protocol uses public key cryptography in its identity verification handshake. An attacker could exploit this by continually...and M. K. Wright. Timing Attacks in Low-Latency Mix-Based Systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC ’04), pages 251–265

  1. Perspective on the Ongoing Replacement of Artificial and Animal-Based Dyes with Alternative Natural Pigments in Foods and Beverages.

    PubMed

    Schweiggert, Ralf M

    2018-03-28

    This perspective highlights current trends, advances, and challenges related to the replacement of artificial dyes and the insect-based carmine with alternative natural pigments. Briefly reviewing the history of food coloration, key publications and public events leading to diverse concerns about artificial dyes and carmine will be summarized. An overview about promising alternatives in the market and those under development is provided, including a separate section on coloring foodstuffs. The perspective aims at supporting readers to keep abreast with the enormous efforts undertaken by the food and beverage industry to replace certain food dyes.

  2. State health agencies and the legislative policy process.

    PubMed

    Williams-Crowe, S M; Aultman, T V

    1994-01-01

    A new era of health care reform places increasing pressure on public health leaders and agencies to participate in the public policy arena. Public health professionals have long been comfortable in providing the scientific knowledge base required in policy development. What has been more recent in its evolution, however, is recognition that they must also play an active role in leading and shaping the debate over policy. A profile of effective State legislative policy "entrepreneurs" and their strategies has been developed to assist health agencies in developing such a leadership position. Based on the experiences of State legislative liaison officers, specific strategies for dealing with State legislatures have been identified and are organized into five key areas--agency organization, staff skills, communications, negotiation, and active ongoing involvement. A public health agency must be organized effectively to participate in the legislative policy process. Typically, effective agencies centralize responsibility for policy activities and promote broad and coordinated participation throughout the organization. Playing a key role in the agency's political interventions, the legislative liaison office should be staffed with persons possessing excellent interpersonal skills and a high degree of technical competence. Of central importance to effective legislative policy entrepreneurship is the ability to communicate the agency's position clearly. This includes setting forward a focused policy agenda, documenting policy issues in a meaningful manner, and reaching legislators with the proper information. Once a matter is on the legislative agenda, the agency must be prepared to negotiate and build broad support for the measure. Finally, public health agencies must be active policy players. To take advantage of new opportunities for action, the public health (policy) leader must monitor the political environment continually.By working to anticipate and formulate legislation,health officials can form meaningful relationships with legislators and the community, which are the cornerstones of political strength.

  3. Making the audience a key participant in the science communication process.

    PubMed

    Rogers, C L

    2000-10-01

    The public communication of science and technology has become increasingly important over the last several decades. However, understanding the audience that receives this information remains the weak link in the science communication process. This essay provides a brief review of some of the issues involved, discusses results from an audience-based study, and suggests some strategies that both scientists and journalists can use to modify media coverage in ways that can help audiences better understand major public issues that involve science and technology.

  4. Key attributes of global partnerships in food and nutrition to align research agendas and improve public health.

    PubMed

    Bertolo, Robert F; Hentges, Eric; Makarchuk, Mary-Jo; Wiggins, Ashleigh K A; Steele, Heather; Levin, Julia; Grantham, Andrea; Gramlich, Leah; Ma, David W L

    2018-07-01

    Partnerships among academia, government, and industry have emerged in response to global challenges in food and nutrition. At a workshop reviewing international partnerships, we concluded that to build a partnership, partners must establish a common goal, identify barriers, and engage all stakeholders to ensure project sustainability. To be effective, partnerships must synchronize methodologies and adopt evidence-based processes, and be led by governmental or nonprofit organizations to ensure trust among partners and with the public.

  5. Built environment assessment: Multidisciplinary perspectives.

    PubMed

    Glanz, Karen; Handy, Susan L; Henderson, Kathryn E; Slater, Sandy J; Davis, Erica L; Powell, Lisa M

    2016-12-01

    As obesity has become increasingly widespread, scientists seek better ways to assess and modify built and social environments to positively impact health. The applicable methods and concepts draw on multiple disciplines and require collaboration and cross-learning. This paper describes the results of an expert team׳s analysis of how key disciplinary perspectives contribute to environmental context-based assessment related to obesity, identifies gaps, and suggests opportunities to encourage effective advances in this arena. A team of experts representing diverse disciplines convened in 2013 to discuss the contributions of their respective disciplines to assessing built environments relevant to obesity prevention. The disciplines include urban planning, public health nutrition, exercise science, physical activity research, public health and epidemiology, behavioral and social sciences, and economics. Each expert identified key concepts and measures from their discipline, and applications to built environment assessment and action. A selective review of published literature and internet-based information was conducted in 2013 and 2014. The key points that are highlighted in this article were identified in 2014-2015 through discussion, debate and consensus-building among the team of experts. Results focus on the various disciplines׳ perspectives and tools, recommendations, progress and gaps. There has been significant progress in collaboration across key disciplines that contribute to studies of built environments and obesity, but important gaps remain. Using lessons from interprofessional education and team science, along with appreciation of and attention to other disciplines׳ contributions, can promote more effective cross-disciplinary collaboration in obesity prevention.

  6. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  7. Science & Engineering Indicators. National Science Board. NSB 14-01

    ERIC Educational Resources Information Center

    National Science Foundation, 2014

    2014-01-01

    The "Science and Engineering Indicators" series was designed to provide a broad base of quantitative information about U.S. science, engineering, and technology for use by policymakers, researchers, and the general public. "Science and Engineering Indicators 2014" contains analyses of key aspects of the scope, quality, and…

  8. Qualifications Frameworks in Europe: Forging the Right Links. Briefing Note

    ERIC Educational Resources Information Center

    Cedefop - European Centre for the Development of Vocational Training, 2013

    2013-01-01

    As national qualifications frameworks in Europe move closer to operation, policy integration becomes a key challenge. Introducing qualifications frameworks based on learning outcomes is now a global phenomenon. According to the recent joint publication by Cedefop, ETF and Unesco, frameworks are either established or being developed in 142…

  9. Weighing the Evidence: From Chaos to Consilience

    ERIC Educational Resources Information Center

    Brendtro, Larry K.; Mitchell, Martin L.

    2010-01-01

    A flood of contradictory publications claim widely different methods to be "evidence-based." What then are the key principles for success with challenging youth? Amidst all the confusion, how do we identify powerful universal truths? The answer lies in a "consilience," which involves drawing information from multiple fields of knowledge.…

  10. Trend analysis of key solvency ratios for health plans in Medicaid managed care.

    PubMed

    McCue, Michael J

    2013-01-01

    The focus of this article is to assess the solvency of health plans that manage Medicaid members across key plan traits, specifically Medicaid dominant or plans with more than 75 percent Medicaid members, and plans owned by publicly traded companies, and sponsored by health care providers. The study accessed National Association of Insurance Commissioners (NAIC) financial data and computed key solvency ratios for 117 Medicaid health plans over a five-year time trend from 2007 to 2011. A mean test compared the mean values for each year and for the entire study period on risk-based capital (RBC), cash-flow margin and debt to total capital ratios across these plan traits. For all years except 2008 Medicaid dominant plans had a lower RBC ratio for all four out of five years. Cash-flow margin ratio for Medicaid dominant plans was only lower in 2011 than non-Medicaid dominant plans. From 2007 to 2010, debt to total capital was higher for plans owned by publicly traded companies than non-publicly traded companies. Given the potential for an expanding Medicaid market, Medicaid health plans have reduced their risk of insolvency by increasing the RBC over time and reducing their debt capital. However between 2010 and 2011 cash-flow margin ratio decreased by almost 180 basis points for Medicaid dominant plans.

  11. Authentication of digital video evidence

    NASA Astrophysics Data System (ADS)

    Beser, Nicholas D.; Duerr, Thomas E.; Staisiunas, Gregory P.

    2003-11-01

    In response to a requirement from the United States Postal Inspection Service, the Technical Support Working Group tasked The Johns Hopkins University Applied Physics Laboratory (JHU/APL) to develop a technique tha will ensure the authenticity, or integrity, of digital video (DV). Verifiable integrity is needed if DV evidence is to withstand a challenge to its admissibility in court on the grounds that it can be easily edited. Specifically, the verification technique must detect additions, deletions, or modifications to DV and satisfy the two-part criteria pertaining to scientific evidence as articulated in Daubert et al. v. Merrell Dow Pharmaceuticals Inc., 43 F3d (9th Circuit, 1995). JHU/APL has developed a prototype digital video authenticator (DVA) that generates digital signatures based on public key cryptography at the frame level of the DV. Signature generation and recording is accomplished at the same time as DV is recorded by the camcorder. Throughput supports the consumer-grade camcorder data rate of 25 Mbps. The DVA software is implemented on a commercial laptop computer, which is connected to a commercial digital camcorder via the IEEE-1394 serial interface. A security token provides agent identification and the interface to the public key infrastructure (PKI) that is needed for management of the public keys central to DV integrity verification.

  12. Harnessing the language of overdose prevention to advance evidence-based responses to the opioid crisis.

    PubMed

    Collins, Alexandra B; Bluthenthal, Ricky N; Boyd, Jade; McNeil, Ryan

    2018-05-01

    Language has significant implications for how we view and respond to public health issues. Conventional moralistic messaging around drug use stigmatizes people who use drugs and inhibits the implementation of evidence-based harm reduction interventions that do not condemn drug use. However, within the context of the unprecedented North American opioid overdose crisis, we argue that shifting conventional moral messaging around overdose prevention and response strategies is key to supporting the rapid roll-out of evidence-based harm reduction interventions. Reframing overdose prevention to highlight the imperative to address the ongoing public health emergency is an important first step in implementing urgently needed response strategies. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Community partnerships in preventing childhood lead poisoning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dugbatey, K.; Evans, R.G.; Lienhop, M.T.

    1995-11-01

    Childhood lead poisoning is an environmental health problem that has no socio-economic, racial/ethnic, or regional boundaries. Because the key element in the exposure pathway is lead-based paint, it is more likely to impact inner city urban populations than those living in suburban areas. Suburban development primarily occurred after lead was removed from lead-based paint. It is maximally effective to adopt strategies that promote grassroots community development in designing preventive interventions. This paper reviews such a strategy for building community partnerships that have been instrumental in the development and implementation of an innovative lead education program. Saint Louis University School ofmore » Public Health reaches out to private and public nonprofit community organizations in this community-based lead education program.« less

  14. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSImore » addressed some of these issues to create a more manageable public key infrastructure.« less

  15. Important interactional strategies for everyday public health nursing practice.

    PubMed

    Porr, Caroline J

    2015-01-01

    This Clinical Concepts article concerns the relational tools required by public health nurses to establish relationships with single mothers living on public assistance, mothers who are vulnerable and often stigmatized. The implications of stigmatization for relationship building are highlighted based on previous research investigating how public health nurses working in Canadian jurisdictions establish professional caring relationships with this cohort of mothers. Public health nurses employed interactional strategies including engaging in a positive manner and offering verbal commendations which served as effective relational tools to break through mothers' walls of defensiveness and to resume the dynamic process of relationship building. Building Relationship is a key practice standard for public health nurses and is instrumental to their work at both individual and community levels to improve social determinants of health. The author concludes with recommendations to facilitate building relationships during everyday public health nursing practice. © 2013 Wiley Periodicals, Inc.

  16. Key-Generation Algorithms for Linear Piece In Hand Matrix Method

    NASA Astrophysics Data System (ADS)

    Tadaki, Kohtaro; Tsujii, Shigeo

    The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Gröbner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.

  17. Motivational interviewing for HIV risk reduction among gay men in commercial and public sex settings.

    PubMed

    Harding, R; Dockrell, M J; Dockrell, J; Corrigan, N

    2001-08-01

    The present paper addresses the feasibility of combining motivational interviewing and cognitive interventions to HIV risk reduction in commercial venues and public sex environments (PSEs). The logic for these two approaches is considered and an intervention combining key elements of the two is presented. The intervention uses a questionnaire format to encourage individuals to compare their desired versus actual behaviour (i.e. chosen personal risk reduction strategy versus 'slip-ups'/unwanted risk taking), and to recognize their risk-related cognitions. High-risk individuals are identified, and health-focused conversations developed from the brief schedule. The structure and key design issues in the development of a feasible, acceptable and evidence-based tool are reviewed. The limitations of more complex, focused interventions in the context of commercial and PSE settings are discussed.

  18. Are the American Psychological Association's Detainee Interrogation Policies Ethical and Effective?: Key Claims, Documents, and Results.

    PubMed

    Pope, Kenneth S

    2011-01-01

    After 9-11, the United States began interrogating detainees at settings such as Abu Ghraib, Bagram, and Guantanamo. The American Psychological Association (APA) supported psychologists' involvement in interrogations, adopted formal policies, and made an array of public assurances. This article's purpose is to highlight key APA decisions, policies, procedures, documents, and public statements in urgent need of rethinking and to suggest questions that may be useful in a serious assessment, such as, "However well intended, were APA's interrogation policies ethically sound?"; "Were they valid, realistic, and able to achieve their purpose?"; "Were other approaches available that would address interrogation issues more directly, comprehensively, and actively, that were more ethically and scientifically based, and that would have had a greater likelihood of success?"; and "Should APA continue to endorse its post-9-11 detainee interrogation policies?"

  19. Do we develop public health leaders?- association between public health competencies and emotional intelligence: a cross-sectional study

    PubMed Central

    2014-01-01

    Background Professional development of public health leaders requires a form of instruction which is competency-based to help them develop the abilities to address complex and evolving demands of health care systems. Concurrently, emotional intelligence (EI) is a key to organisational success. Our aim was twofold: i) to assess the relationship between the level of self-assessed public health and EI competencies among Master of European Public Health (MEPH) students and graduates at Maastricht University, and; ii) to determine the relationship between different groups of public health competencies and specific EI skills. Methods A cross-sectional study was conducted including all recent MEPH graduates and students from 2009–2012, out of 67 eligible candidates N = 51 were contacted and N = 33 responded (11 males and 22 females; overall response: 64.7%).Two validated tools were employed: i) public health competencies self-assessment questionnaire, and; ii) Assessing Emotions Scale. Results Females scored higher than males in all seven domains of the self-assessed key public health competencies (NS) and emotional intelligence competences (P = 0.022). Overall, the mean value of public health competencies was the lowest in students with “staff” preferences and the highest among students with mixed job preferences (P < 0.001). There was evidence of a correlation between the overall public health competencies and the overall emotional intelligence competencies (r = 0.61, P < 0.001). Conclusions The study shows a positive correlation between public health specific competencies and EI attributes. It can contribute to the improvement of the educational content of PH curricula by rising awareness through self-assessment and supporting the identification of further educational needs related to leadership. PMID:24742091

  20. Do we develop public health leaders?- association between public health competencies and emotional intelligence: a cross-sectional study.

    PubMed

    Czabanowska, Katarzyna; Malho, André; Schröder-Bäck, Peter; Popa, Daniela; Burazeri, Genc

    2014-04-17

    Professional development of public health leaders requires a form of instruction which is competency-based to help them develop the abilities to address complex and evolving demands of health care systems. Concurrently, emotional intelligence (EI) is a key to organisational success. Our aim was twofold: i) to assess the relationship between the level of self-assessed public health and EI competencies among Master of European Public Health (MEPH) students and graduates at Maastricht University, and; ii) to determine the relationship between different groups of public health competencies and specific EI skills. A cross-sectional study was conducted including all recent MEPH graduates and students from 2009-2012, out of 67 eligible candidates N = 51 were contacted and N = 33 responded (11 males and 22 females; overall response: 64.7%).Two validated tools were employed: i) public health competencies self-assessment questionnaire, and; ii) Assessing Emotions Scale. Females scored higher than males in all seven domains of the self-assessed key public health competencies (NS) and emotional intelligence competences (P = 0.022). Overall, the mean value of public health competencies was the lowest in students with "staff" preferences and the highest among students with mixed job preferences (P < 0.001). There was evidence of a correlation between the overall public health competencies and the overall emotional intelligence competencies (r = 0.61, P < 0.001). The study shows a positive correlation between public health specific competencies and EI attributes. It can contribute to the improvement of the educational content of PH curricula by rising awareness through self-assessment and supporting the identification of further educational needs related to leadership.

  1. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique.

    PubMed

    Lin, Chao; Shen, Xueju; Wang, Zhisong; Zhao, Cheng

    2014-06-20

    We demonstrate a novel optical asymmetric cryptosystem based on the principle of elliptical polarized light linear truncation and a numerical reconstruction technique. The device of an array of linear polarizers is introduced to achieve linear truncation on the spatially resolved elliptical polarization distribution during image encryption. This encoding process can be characterized as confusion-based optical cryptography that involves no Fourier lens and diffusion operation. Based on the Jones matrix formalism, the intensity transmittance for this truncation is deduced to perform elliptical polarized light reconstruction based on two intensity measurements. Use of a quick response code makes the proposed cryptosystem practical, with versatile key sensitivity and fault tolerance. Both simulation and preliminary experimental results that support theoretical analysis are presented. An analysis of the resistance of the proposed method on a known public key attack is also provided.

  2. The impact of patient and public involvement on UK NHS health care: a systematic review.

    PubMed

    Mockford, Carole; Staniszewska, Sophie; Griffiths, Frances; Herron-Marx, Sandra

    2012-02-01

    Patient and public involvement (PPI) has become an integral part of health care with its emphasis on including and empowering individuals and communities in the shaping of health and social care services. The aims of this study were to identify the impact of PPI on UK National Health Service (NHS) healthcare services and to identify the economic cost. It also examined how PPI is being defined, theorized and conceptualized, and how the impact of PPI is captured or measured. Seventeen key online databases and websites were searched, e.g. Medline and the King's Fund. UK studies from 1997 to 2009 which included service user involvement in NHS healthcare services. Date extraction Key themes were identified and a narrative analysis was undertaken. The review indicates that PPI has a range of impacts on healthcare services. There is little evidence of any economic analysis of the costs involved. A key limitation of the PPI evidence base is the poor quality of reporting impact. Few studies define PPI, there is little theoretical underpinning or conceptualization reported, there is an absence of robust measurement of impact and descriptive evidence lacked detail. There is a need for significant development of the PPI evidence base particularly around guidance for the reporting of user activity and impact. The evidence base needs to be significantly strengthened to ensure the full impact of involving service users in NHS healthcare services is fully understood.

  3. A Global Public Goods Approach to the Health of Migrants

    PubMed Central

    Widdows, Heather; Marway, Herjeet

    2015-01-01

    This paper explores a global public goods approach to the health of migrants. It suggests that this approach establishes that there are a number of health goods which must be provided to migrants not because these are theirs by right (although this may independently be the case), but because these goods are primary goods which fit the threefold criteria of global public goods. There are two key advantages to this approach: first, it is non-confrontational and non-oppositional, and second, it provides self-interested arguments to provide at least some health goods to migrants and thus appeals to those little moved by rights-based arguments. PMID:26180550

  4. A Global Public Goods Approach to the Health of Migrants.

    PubMed

    Widdows, Heather; Marway, Herjeet

    2015-07-01

    This paper explores a global public goods approach to the health of migrants. It suggests that this approach establishes that there are a number of health goods which must be provided to migrants not because these are theirs by right (although this may independently be the case), but because these goods are primary goods which fit the threefold criteria of global public goods. There are two key advantages to this approach: first, it is non-confrontational and non-oppositional, and second, it provides self-interested arguments to provide at least some health goods to migrants and thus appeals to those little moved by rights-based arguments.

  5. Integrating Windblown Dust Forecasts with Public Safety and Health Systems

    NASA Astrophysics Data System (ADS)

    Sprigg, W. A.

    2014-12-01

    Experiments in real-time prediction of desert dust emissions and downstream plume concentrations (~ 3.5 km near-surface spatial resolution) succeed to the point of challenging public safety and public health services to beta test a dust storm warning and advisory system in lowering risks of highway and airline accidents and illnesses such as asthma and valley fever. Key beta test components are: high-resolution models of dust emission, entrainment and diffusion, integrated with synoptic weather observations and forecasts; satellite-based detection and monitoring of soil properties on the ground and elevated above; high space and time resolution for health surveillance and transportation advisories.

  6. A joint asymmetric watermarking and image encryption scheme

    NASA Astrophysics Data System (ADS)

    Boato, G.; Conotter, V.; De Natale, F. G. B.; Fontanari, C.

    2008-02-01

    Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we present an explicit example where the watermarking part, based on elementary linear algebra, and the encryption part, exploiting a secret random permutation, are integrated in a commutative scheme.

  7. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  8. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  9. Community-managed Data Sharing, Curation, and Publication: SEN on SEAD

    NASA Astrophysics Data System (ADS)

    Martin, R. L.; Myers, J.; Hsu, L.

    2017-12-01

    While data publication in support of reuse and scientific reproducibility is increasingly being recognized as a key aspect of modern research practice, best practices are still to be developed at the level of scientific communities. Often, such practices are discussed in the abstract - as community standards for data plans or as requirements for yet-to-be-built software - with no clear path to community adoption. In contrast, the Sediment Experimentalist Network, supported through the National Science Foundation's (NSF) EarthCube initiative, has encouraged an iterative, practice-based approach within its community that has resulted in the publication of dozens of datasets, comprised of millions of files totaling more than 4 TB in size, and the documentation of more than 100 experimental procedures, instruments, and facilities, by multiple research teams. A key element of SEN's approach has been to leverage cloud-based data services that provide robust core capabilities with community-based management and customization capabilities. These services - data sharing, curation, and publication services developed through the NSF-supported Sustainable Environment - Actionable Data (SEAD) project and the wiki-based SEN Knowledge Base (KB) - have allowed the SEN team to ground discussions in reality and leverage the practical questions arising as researchers publish data to drive discussion and evolve towards better practices. In this presentation we summarize how SEN interacts with researchers, the best practices that have been developed, and the capabilities of SEAD and the SEN KB that support them. We also describe issues that have arisen in the community - related, for example, to recommended and required metadata, individual, project and community branding, and data version and derivation relationships - and describe how SEN's outreach activities, collaboration with the SEAD team, and the flexible design of the data services themselves have, in combination, been able to provide rapid incremental solutions to support researchers needs while also helping the community align with broader semantic and data publication standards. We conclude with thoughts on how this approach could be applied in other communities as a way to drive progress towards data reuse and reproducible research.

  10. Key Elements of a Successful Multi-System Collaboration for School-Based Mental Health: In-Depth Interviews with District and Agency Administrators

    ERIC Educational Resources Information Center

    Powers, Joelle D.; Edwards, Jeffrey D.; Blackman, Kate F.; Wegmann, Kate M.

    2013-01-01

    The alarming number of youth with unmet mental health needs in the US is a significant social problem. The pilot school-based mental health project described here established an innovative multi-system partnership between an urban school district, a public mental health agency, and a local university to better meet the mental health needs of youth…

  11. Critical Opportunities for Public Health Law: A Call for Action

    PubMed Central

    Wood, Jennifer; Burris, Scott; Wagenaar, Alexander C.; Ibrahim, Jennifer K.; Swanson, Jeffrey W.

    2013-01-01

    Although legal interventions are responsible for many sentinel public health achievements, law is underutilized as a tool for advancing population health. Our purpose was to identify critical opportunities for public health lawmaking. We articulated key criteria and illustrated their use with 5 examples. These opportunities involve significant health problems that are potentially amenable to change through law and for which an effective legal intervention is available: optimizing graduated driver licensing laws, increasing tax rates on alcoholic beverages, regulating sodium in foods, enacting laws to facilitate reversal of opioid overdoses, and improving mental health interventions in the college setting. We call for a national conversation about critical opportunities for public health law to advance evidence-based policymaking. PMID:24028265

  12. Budget impact analysis of medicines: updated systematic review and implications.

    PubMed

    Faleiros, Daniel Resende; Álvares, Juliana; Almeida, Alessandra Maciel; de Araújo, Vânia Eloisa; Andrade, Eli Iola Gurgel; Godman, Brian B; Acurcio, Francisco A; Guerra Júnior, Augusto A

    2016-01-01

    This evaluation determines whether published studies to date meet the key characteristics identified for budget impact analyses (BIA) for medicines, accomplished through a systematic review and assessment against identified key characteristics. Studies from 2001-2015 on 'budget impact analysis' with 'drug' interventions were assessed, selected based on their titles/abstracts and full texts, and their characteristics checked according to key criteria. Out of 1,984 studies, 92 were subsequently identified for review. Of these, 95% were published in Europe and the USA. 2012 saw the largest number of publications (16%) with a decline thereafter. 48% met up to 7 out of the 9 key characteristics. Only 22% stated no conflict of interest. The results indicate low adherence to the key characteristics that should be considered for BIAs and strong conflict of interest. This is an issue since BIAs can be of fundamental importance in managing the entry of new medicines including reimbursement decisions.

  13. Analysis of the Skills Used in Public Broadcasting's Key Jobs with Recommended Uses by Public Broadcasting Organizations.

    ERIC Educational Resources Information Center

    Olian, Judy; Schneier, Craig E.

    Designed to provide a listing of knowledge, skills, and abilities (collectively known as KSAs) that could be used by public broadcasting stations for recruitment, selection, promotion, evaluation, training, and staff career development, this document addresses three key broadcasting personnel areas. These areas are programming/production,…

  14. Using innovative instructional technology to meet training needs in public health: a design process.

    PubMed

    Millery, Mari; Hall, Michelle; Eisman, Joanna; Murrman, Marita

    2014-03-01

    Technology and distance learning can potentially enhance the efficient and effective delivery of continuing education to the public health workforce. Public Health Training Centers collaborate with instructional technology designers to develop innovative, competency-based online learning experiences that meet pressing training needs and promote best practices. We describe one Public Health Training Center's online learning module design process, which consists of five steps: (1) identify training needs and priority competencies; (2) define learning objectives and identify educational challenges; (3) pose hypotheses and explore innovative, technology-based solutions; (4) develop and deploy the educational experience; and (5) evaluate feedback and outcomes to inform continued cycles of revision and improvement. Examples illustrate the model's application. These steps are discussed within the context of design practices in the fields of education, engineering, and public health. They incorporate key strategies from across these fields, including principles of programmatic design familiar to public health professionals, such as backward design. The instructional technology design process we describe provides a structure for the creativity, collaboration, and systematic strategies needed to develop online learning products that address critical training needs for the public health workforce.

  15. Using Gemba Boards to Facilitate Evidence-Based Practice in Critical Care.

    PubMed

    Bourgault, Annette M; Upvall, Michele J; Graham, Alison

    2018-06-01

    Tradition-based practices lack supporting research evidence and may be harmful or ineffective. Engagement of key stakeholders is a critical step toward facilitating evidence-based practice change. Gemba , derived from Japanese, refers to the real place where work is done. Gemba boards (visual management tools) appear to be an innovative method to engage stakeholders and facilitate evidence-based practice. To explore the use of gemba boards and gemba huddles to facilitate practice change. Twenty-two critical care nurses participated in interviews in this qualitative, descriptive study. Thematic analysis was used to code and categorize interview data. Two researchers reached consensus on coding and derived themes. Data were managed with qualitative analysis software. The code gemba occurred most frequently; a secondary analysis was performed to explore its impact on practice change. Four themes were derived from the gemba code: (1) facilitation of staff, leadership, and interdisciplinary communication, (2) transparency of outcome data, (3) solicitation of staff ideas and feedback, and (4) dissemination of practice changes. Gemba boards and gemba huddles became part of the organizational culture for promoting and disseminating evidence-based practices. Unit-based, publicly located gemba boards and huddles have become key components of evidence-based practice culture. Gemba is both a tool and a process to engage team members and the public to generate clinical questions and to plan, implement, and evaluate practice changes. Future research on the effectiveness of gemba boards to facilitate evidence-based practice is warranted. ©2018 American Association of Critical-Care Nurses.

  16. Exploring Attitudes, Perceived Norms, and Personal Agency: Insights Into Theory-Based Messages to Encourage Park-Based Physical Activity in Low-Income Urban Neighborhoods.

    PubMed

    Groshong, Lisa; Stanis, Sonja A Wilhelm; Kaczynski, Andrew T; Hipp, J Aaron; Besenyi, Gina M

    2017-02-01

    Public parks hold promise for promoting population-level PA, but studies show a significant portion of park use is sedentary. Past research has documented the effectiveness of message-based strategies for influencing diverse behaviors in park settings and for increasing PA in nonpark contexts. Therefore, to inform message-based interventions (eg, point-ofdecision prompts) to increase park-based PA, the purpose of this study was to elicit insights about key attitudes, perceived norms, and personal agency that affect park use and park-based PA in low-income urban neighborhoods. This study used 6 focus groups with youth and adults (n = 41) from low-income urban areas in Kansas City, MO, to examine perceptions of key attitudinal outcomes and motivations, perceived norms, key referents, and personal agency facilitators and constraints that affect park use and park-based PA. Participant attitudes reflected the importance of parks for mental and physical health, with social interaction and solitude cited as key motivations. Of 10 themes regarding perceived norms, influential others reflected participants' ethnic makeup but little consensus emerged among groups. Social and safety themes were cited as both facilitators and constraints, along with park offerings and setting. Information about attitudes, perceived norms, and personal agency can increase understanding of theoretically derived factors that influence park-based PA and help park and health professionals create communication strategies to promote PA.

  17. Understanding An Informed Public's Views On The Role Of Evidence In Making Health Care Decisions.

    PubMed

    Carman, Kristin L; Maurer, Maureen; Mangrum, Rikki; Yang, Manshu; Ginsburg, Marjorie; Sofaer, Shoshanna; Gold, Marthe R; Pathak-Sen, Ela; Gilmore, Dierdre; Richmond, Jennifer; Siegel, Joanna

    2016-04-01

    Policy makers and practitioners increasingly believe that medical evidence plays a critical role in improving care and health outcomes and lowering costs. However, public understanding of the role of evidence-based care may be different. Public deliberation is a process that convenes diverse citizens and has them learn about and consider ethical or values-based dilemmas and weigh alternative views. The Community Forum Deliberative Methods Demonstration project, sponsored by the Agency for Healthcare Research and Quality, obtained informed public views on the role of evidence in health care decisions through seventy-six deliberative groups involving 907 people overall, in the period August-November 2012. Although participants perceived evidence as being essential to high-quality care, they also believed that personal choice or clinical judgment could trump evidence. They viewed doctors as central figures in discussing evidence with patients and key arbiters of whether to follow evidence in individual cases. They found evidence of harm to individuals or the community to be more compelling than evidence of effectiveness. These findings indicate that increased public understanding of evidence can play an important role in advancing evidence-based care by helping create policies that better reflect the needs and values of the public. Project HOPE—The People-to-People Health Foundation, Inc.

  18. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    PubMed

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  19. Biometrics based key management of double random phase encoding scheme using error control codes

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  20. Condom provision and education in Minnesota public schools: a telephone survey of parents.

    PubMed

    Eisenberg, Marla E; Bernat, Debra H; Bearinger, Linda H; Resnick, Michael D

    2009-09-01

    Increasing correct and consistent condom use among sexually active adolescents continues to be a critical public health goal, with schools serving as key agents for achieving this goal through sexuality education and condom use provision. This research aims to describe the views of parents regarding school-based condom distribution and education programs, and examines how these views differ across demographic groups. Parents of school-age children in Minnesota were surveyed in telephone interviews (N = 1605; 63% participation) regarding their beliefs about condom availability and education. Chi-square tests of significance were used to detect differences in agreement with each statement for 10 demographic and personal characteristics. A majority of respondents held supportive views about condom availability and education programs. Strongest support centered on statements in the survey about teenagers needing information about condoms (86%) and showing actual condoms during classroom lessons (77%). Approximately two thirds of the parents agreed that school-based instruction about condoms should be "allowed" at the high school level (65%), and one fifth (21%) believed that this type of education should be "required." Support for condom availability and education programs differed significantly according to certain personal characteristics, with less supportive views from self-identified Born Again Christians and politically conservative parents. Public discourse regarding school-based sexuality education should include the viewpoints of parents of school-aged children as key stakeholders. Parents' perspectives provide unique and critical insights that school administrators and educators should consider as they develop educational and programmatic offerings regarding condoms.

  1. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  2. Comparative analysis of dietary guidelines in the Spanish-Speaking Caribbean.

    PubMed

    Fuster, Melissa

    2016-03-01

    Dietary guidelines are important education and policy tools to address local nutrition concerns. The current paper presents a comparative analysis of nutrition messages from three Spanish-speaking Caribbean countries (Cuba, Puerto Rico and Dominican Republic) to explore how these dietary guidelines address common public health nutrition concerns, contextualized in different changing food environments and food culture similarities. Qualitative, comparative analysis of current dietary guideline documents and key recommendations. Key recommendations were categorized into sixteen themes (two diet-based, ten food-based and four 'other'). Only the Cuban dietary guidelines included diet-based key recommendations. Of the ten food-based key recommendations, only four themes overlapped across the three dietary guidelines (the encouragement of fruits and vegetables, addressing protein sources and fat). Other overlaps were found between dietary guideline pairs, except between Cuba and Puerto Rico. Further analysis revealed differences in levels of specificity and acknowledgement of local dietary patterns and issues, as well as the need to revise the guidelines to account for current scientific advances. The present study underscored the importance of context in the framing of dietary advice and the influence of national socio-economic and political situations on nutrition policy and education efforts. The results contribute to inform efforts to improve nutrition communication in the region and among migrant communities.

  3. A Computer-Based Index to Book Reviews in the Physics Literature.

    ERIC Educational Resources Information Center

    Wynne, Allen

    1979-01-01

    Describes the production of computer-generated author and key-word-from-title indexes to book reviews in physics: the sources, the processing, and the storage and retrieval system. Data elements available from the indexes include author, title, local call number, publisher, year of imprint, month and year of publication, series, cost, and…

  4. Long Term Activity Analysis in Surveillance Video Archives

    ERIC Educational Resources Information Center

    Chen, Ming-yu

    2010-01-01

    Surveillance video recording is becoming ubiquitous in daily life for public areas such as supermarkets, banks, and airports. The rate at which surveillance video is being generated has accelerated demand for machine understanding to enable better content-based search capabilities. Analyzing human activity is one of the key tasks to understand and…

  5. Social Integration and Health Behavioral Change in San Luis, Honduras

    ERIC Educational Resources Information Center

    McQuestion, Michael J.; Calle, Ana Quijano; Drasbek, Christopher; Harkins, Thomas; Sagastume, Lourdes J.

    2010-01-01

    This study explores the effects of social integration on behavioral change in the course of an intensive, community-based public health intervention. The intervention trained volunteers and mobilized local organizations to promote 16 key family health practices in rural San Luis, Honduras, during 2004 to 2006. A mixed methods approach is used.…

  6. Adolescents, Alcohol, and Substance Abuse: Reaching Teens through Brief Interventions.

    ERIC Educational Resources Information Center

    Monti, Peter M., Ed.; Colby, Suzanne M., Ed.; O'Leary, Tracy A., Ed.

    This publication reviews a variety of empirically supported approaches to dealing with alcohol and drug problems in adolescents. Its focus is to provide motivationally based brief interventions that can be delivered in a variety of contexts address key developmental considerations and draw on the latest knowledge about the processes of addictive…

  7. Modeling Social Dimensions of Oral Health among Older Adults in Urban Environments

    ERIC Educational Resources Information Center

    Metcalf, Sara S.; Northridge, Mary E.; Widener, Michael J.; Chakraborty, Bibhas; Marshall, Stephen E.; Lamster, Ira B.

    2013-01-01

    In both developed and developing countries, population aging has attained unprecedented levels. Public health strategies to deliver services in community-based settings are key to enhancing the utilization of preventive care and reducing costs for this segment of the population. Motivated by concerns of inadequate access to oral health care by…

  8. The Self-Efficacy of Special Education Directors in the State of Texas

    ERIC Educational Resources Information Center

    Hubbard, Catana C.

    2009-01-01

    The purpose of this study was to examine the self-efficacy of special education directors serving in public schools in the state of Texas. Within the review of literature the following key components were identified: special education administration, self-efficacy--theoretical perspective and self-efficacy and outcomes-based research. A…

  9. Alumni Relations in Chinese HEIs: Case Studies of Three Major Universities

    ERIC Educational Resources Information Center

    Zhimin, Luo; Chunlian, Chen; Xian, Wang

    2016-01-01

    Good alumni relations are key to universities and colleges winning support from their graduates. With reference to social capital theory, an important problem in establishing strong alumni relations is how to turn alumni resources, an important university social network, into productive, public, and abundant capital. Based on the established…

  10. Evaluation Design: 1981-82 State Compensatory Education. Publication No. 81.20.

    ERIC Educational Resources Information Center

    Mangino, Evangelina; And Others

    The evaluation of the 1981-82 State Compensatory Education (SCE) program, as implemented in the Austin Independent School District, will involve the following major activities: production of an Evaluation Design based on input received from key SCE personnel; production of a Final Report and a Technical Report which present information and…

  11. Ensuring Effective Student Support in Higher Education Alleged Plagiarism Cases

    ERIC Educational Resources Information Center

    Baird, Craig; Dooey, Patricia

    2014-01-01

    Plagiarism and other forms of academic misconduct are matters of great concern at all levels of study worldwide. This is especially so for students in higher education institutions, where higher degrees and publications are key focus activities. Ready access to internet based resources assist academic writing practices. However, the unintentional,…

  12. Transportation of Wheelchair Seated Students in School Buses: A Review of State Policy

    ERIC Educational Resources Information Center

    Moore, Britta; Fuhrman, Susan; Karg, Patricia

    2010-01-01

    This study quantitatively reviews publicly available state policies as they relate to the transportation of wheelchair-seated students in school buses. Inclusion of best practices in specially equipped school bus and driver training policies was assessed. Key points of interest within state policies were identified based on site visits, common…

  13. Scholars Identify 5 Keys to Urban School Success

    ERIC Educational Resources Information Center

    Viadero, Debra

    2010-01-01

    Offering a counter-narrative to the school improvement prescriptions that dominate national education debates, a new book based on 15 years of data on public elementary schools in Chicago identifies five tried-and-true ingredients that work, in combination with one another, to spur success in urban schools. The authors liken their "essential…

  14. Scale Construction for Graphing: An Investigation of Students' Resources

    ERIC Educational Resources Information Center

    Delgado, Cesar; Lucero, Margaret M.

    2015-01-01

    Graphing is a fundamental part of the scientific process. Scales are key but little-studied components of graphs. Adopting a resources-based framework of cognitive structure, we identify the potential intuitive resources that six undergraduates of diverse majors and years at a public US research university activated when constructing scales, and…

  15. Physical Space and the Resource-Based View of the College

    ERIC Educational Resources Information Center

    Fugazzotto, Sam J.

    2010-01-01

    Space serves as a key resource for colleges and universities, and institutions exchange information about it with each other and with prospective students. Using content analysis to examine several widely circulated publications, this study looked for differences in the value attributed to space when institutional leaders present it to students…

  16. 3 CFR - Proposed Revised Habitat for the Spotted Owl: Minimizing Regulatory Burdens

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... “regulatory system must protect public health, welfare, safety, and our environment while promoting economic... habitat, consistent with applicable law and science; and (6) to the extent permitted by law, adopt the... habitat for the spotted owl, based on a full evaluation of all key criteria: the relevant science...

  17. The National Issues Forum: Bridging the Human Gap through Innovative Learning.

    ERIC Educational Resources Information Center

    McMahan, Eva M.

    The National Issues Forum model, a series of community based public discussions on key domestic issues, may be a partial solution to the "human gap" between growing complexity and a capacity to deal with it, by exemplifying "innovative learning." To engage in innovative learning, characterized by anticipation and participation,…

  18. 76 FR 10810 - Public Workshop to Discuss Low-Level Radioactive Waste Management

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-28

    ... the environment. Development of the part 61 regulation in the early 1980s was based on several... there have been a number of developments that have called into question some of the key assumptions...-level radioactive wastes that did not exist at the time part 61 was promulgated. The developments...

  19. Primary Mental Health in Elementary Schools: Its Impact on Psychosocial Measures.

    ERIC Educational Resources Information Center

    Munoz, Marco A.

    The Primary Mental Health Project (PMHP) is a research-based, selective program implemented by the Jefferson County Public Schools. The goal of the program is to enhance learning and other school-related competencies. Key structural components of the program include a focus on young children, early screening and selection, use of paraprofessionals…

  20. Vaccines and Airline Travel: A Federal Role to Protect the Public Health.

    PubMed

    Robertson, Christopher T

    2016-05-01

    This Article explores two ways in which airline travel is an important vector for the spread of infectious disease, and argues that airlines have market-based and liability-based reasons to require that passengers be vaccinated. Going further, the Article explores whether the federal government has the legal and constitutional authority-especially under the Commerce Clause-to encourage or mandate that airlines implement such a vaccine screen. By disrupting the spread of disease at key network nodes where individuals interact and then connect with other geographic regions, and by creating another incentive for adult vaccination, an airline vaccine screen could be an effective and legally viable tool for the protection of public health.

  1. Guidelines for Bystander First Aid 2016.

    PubMed

    Pek, Jen Heng

    2017-07-01

    Cardiac life support is a form of first aid for cardiac emergencies. However, research and evidence in this field is lacking compared with other forms of first aid. Having identified the common emergencies that are encountered in the hospital, based on the available evidence, we have put together what could be an evidence-based approach to the first aid management of some of these common emergencies, viz. breathlessness, chest pain, allergies, stroke, heat injury, poisoning, unconsciousness, seizures, and trauma situations such as bleeding, wounds, contusions, head injury, burns and fractures. Educating the public is the key to developing a first responder bystander. These guidelines could become the basis for training of the public. Copyright: © Singapore Medical Association.

  2. 77 FR 42699 - Gulf of Mexico Fishery Management Council; Public Hearings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ... INFORMATION. ADDRESSES: The public hearings will be held in the following locations: Tampa, Key West and..., telephone: (251) 344-5200. Wednesday, August 8, 2012 Harvey Government Center, 1200 Truman Avenue, Key West...

  3. A glossary of theories for understanding policymaking.

    PubMed

    Smith, Katherine Elizabeth; Katikireddi, Srinivasa Vittal

    2013-02-01

    Public health practitioners and researchers often seek to influence public policies in order to improve population health and/or reduce health inequalities. However, these efforts frequently appear to be uninformed by the many empirically-based theories about policymaking that have been developed within political science. This glossary provides a brief overview of some of the most popular of these theories, describing how each: frames the policymaking process; portrays the relationships and influence of specific policy actors; and depicts the potential for policy change (or inertia). Examples of their application to public health are provided to help improve understanding of the material presented. Throughout the article, the implications of the different theories for public health researchers and advocates seeking to inform policy decisions are emphasised. The glossary aims to provide an accessible overview to key theories about policy and decision-making, with a view to supporting public health efforts to achieve healthier public policies.

  4. Systems thinking and ethics in public health: a necessary and mutually beneficial partnership.

    PubMed

    Silva, Diego S; Smith, Maxwell J; Norman, Cameron D

    2018-06-13

    Systems thinking has emerged as a means of conceptualizing and addressing complex public health problems, thereby challenging more commonplace understanding of problems and corresponding solutions as straightforward explanations of cause and effect. Systems thinking tries to address the complexity of problems through qualitative and quantitative modeling based on a variety of systems theories, each with their own assumptions and, more importantly, implicit and unexamined values. To date, however, there has been little engagement between systems scientists and those working in bioethics and public health ethics. The goal of this paper is to begin to consider what it might mean to combine systems thinking with public health ethics to solve public health challenges. We argue that there is a role for ethics in systems thinking in public health as a means of elucidating implicit assumptions and facilitating ethics debate and dialogue with key stakeholders.

  5. Vital Collaboratives, Alliances, and Partnerships: A Search for Key Elements of an Effective Public-Private Partnership

    ERIC Educational Resources Information Center

    Young, Charles Keith

    2010-01-01

    Owing to the significant structural changes that have occurred in the global marketplace over the past 2 decades, a corresponding increase of public-private partnerships have been established among the business sector, local governments, and public community colleges. This qualitative project sought to identify and substantiate key elements that…

  6. MPH education for the 21st century: motivation, rationale, and key principles for the new Columbia public health curriculum.

    PubMed

    Fried, Linda P; Begg, Melissa D; Bayer, Ronald; Galea, Sandro

    2014-01-01

    Public health is at a watershed moment. The world's health needs are changing, and complex problems require interdisciplinary approaches and systems-based solutions. Our longer lives and changing environments necessitate life-course and structural approaches to prevention. This argues strongly for public health graduate education that adequately prepares trainees to tackle emerging challenges and to lead now and in the future. Nearly a century of scholarship and scientific advances may offer a blueprint for training the next generation of public health leaders. We articulate a case for change; discuss some of the foundational principles that should guide public health education; and discuss what such a change might look like building on prior scholarship, on the examples set by other disciplines, and on our own experience.

  7. MPH Education for the 21st Century: Motivation, Rationale, and Key Principles for the New Columbia Public Health Curriculum

    PubMed Central

    Fried, Linda P.; Begg, Melissa D.; Bayer, Ronald

    2014-01-01

    Public health is at a watershed moment. The world’s health needs are changing, and complex problems require interdisciplinary approaches and systems-based solutions. Our longer lives and changing environments necessitate life-course and structural approaches to prevention. This argues strongly for public health graduate education that adequately prepares trainees to tackle emerging challenges and to lead now and in the future. Nearly a century of scholarship and scientific advances may offer a blueprint for training the next generation of public health leaders. We articulate a case for change; discuss some of the foundational principles that should guide public health education; and discuss what such a change might look like building on prior scholarship, on the examples set by other disciplines, and on our own experience. PMID:24228646

  8. Research on Urban Road Traffic Congestion Charging Based on Sustainable Development

    NASA Astrophysics Data System (ADS)

    Ye, Sun

    Traffic congestion is a major problem which bothers our urban traffic sustainable development at present. Congestion charging is an effective measure to alleviate urban traffic congestion. The paper first probes into several key issues such as the goal, the pricing, the scope, the method and the redistribution of congestion charging from theoretical angle. Then it introduces congestion charging practice in Singapore and London and draws conclusion and suggestion that traffic congestion charging should take scientific plan, support of public, public transportation development as the premise.

  9. PEM public key certificate cache server

    NASA Astrophysics Data System (ADS)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  10. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  11. Development of a virtual speaking simulator using Image Based Rendering.

    PubMed

    Lee, J M; Kim, H; Oh, M J; Ku, J H; Jang, D P; Kim, I Y; Kim, S I

    2002-01-01

    The fear of speaking is often cited as the world's most common social phobia. The rapid growth of computer technology has enabled the use of virtual reality (VR) for the treatment of the fear of public speaking. There are two techniques for building virtual environments for the treatment of this fear: a model-based and a movie-based method. Both methods have the weakness that they are unrealistic and not controllable individually. To understand these disadvantages, this paper presents a virtual environment produced with Image Based Rendering (IBR) and a chroma-key simultaneously. IBR enables the creation of realistic virtual environments where the images are stitched panoramically with the photos taken from a digital camera. And the use of chroma-keys puts virtual audience members under individual control in the environment. In addition, real time capture technique is used in constructing the virtual environments enabling spoken interaction between the subject and a therapist or another subject.

  12. Strengthening community-based programming for juvenile sexual offenders: key concepts and paradigm shifts.

    PubMed

    Hunter, John A; Gilbertson, Stephen A; Vedros, Dani; Morton, Michael

    2004-05-01

    The past decade has been witness to a sharp increase in residential placement of adjudicated delinquent youth, including juvenile sexual offenders. It is argued that this trend has fiscal implications and may be clinically contraindicated for less characterologically disturbed and dangerous youth. The authors advocate greater investment of public funds in the development and refinement of community-based intervention programs. It is believed that clinically and legally integrated programming, using newer social-ecological methodologies and supports, offers promise of reducing the number of youth who require residential placement, shortening residential lengths of stay and improving the transition of residentially treated youth back into community settings. Key concepts relevant to bolstering community-based programming for juvenile sexual offenders are identified and discussed. Two programs are described, and program evaluation data reviewed, in support of the viability of innovative community-based approaches to the management of this population.

  13. Tackling overweight and obesity: does the public health message match the science?

    PubMed

    Hafekost, Katherine; Lawrence, David; Mitrou, Francis; O'Sullivan, Therese A; Zubrick, Stephen R

    2013-02-18

    Despite the increasing understanding of the mechanisms relating to weight loss and maintenance, there are currently no validated public health interventions that are able to achieve sustained long-term weight loss or to stem the increasing prevalence of obesity in the population. We aimed to examine the models of energy balance underpinning current research about weight-loss intervention from the field of public health, and to determine whether they are consistent with the model provided by basic science. EMBASE was searched for papers published in 2011 on weight-loss interventions. We extracted details of the population, nature of the intervention, and key findings for 27 articles. Most public health interventions identified were based on a simple model of energy balance, and thus attempted to reduce caloric consumption and/or increase physical activity in order to create a negative energy balance. There appeared to be little consideration of homeostatic feedback mechanisms and their effect on weight-loss success. It seems that there has been a lack of translation between recent advances in understanding of the basic science behind weight loss, and the concepts underpinning the increasingly urgent efforts to reduce excess weight in the population. Public health weight-loss interventions seem to be based on an outdated understanding of the science. Their continued failure to achieve any meaningful, long-term results reflects the need to develop intervention science that is integrated with knowledge from basic science. Instead of asking why people persist in eating too much and exercising too little, the key questions of obesity research should address those factors (environmental, behavioral or otherwise) that lead to dysregulation of the homeostatic mechanism of energy regulation. There is a need for a multidisciplinary approach in the design of future weight-loss interventions in order to improve long-term weight-loss success.

  14. Healthy public policy in poor countries: tackling macro-economic policies.

    PubMed

    Mohindra, K S

    2007-06-01

    Large segments of the population in poor countries continue to suffer from a high level of unmet health needs, requiring macro-level, broad-based interventions. Healthy public policy, a key health promotion strategy, aims to put health on the agenda of policy makers across sectors and levels of government. Macro-economic policy in developing countries has thus far not adequately captured the attention of health promotion researchers. This paper argues that healthy public policy should not only be an objective in rich countries, but also in poor countries. This paper takes up this issue by reviewing the main macro-economic aid programs offered by international financial institutions as a response to economic crises and unmanageable debt burdens. Although health promotion researchers were largely absent during a key debate on structural adjustment programs and health during the 1980s and 1990s, the international macro-economic policy tool currently in play offers a new opportunity to participate in assessing these policies, ensuring new forms of macro-economic policy interventions do not simply reproduce patterns of (neoliberal) economics-dominated development policy.

  15. Innovations in health service organization and delivery in northern rural and remote regions: a review of the literature.

    PubMed

    Mitton, Craig; Dionne, Francois; Masucci, Lisa; Wong, Sabrina; Law, Susan

    2011-01-01

    To identify and review innovations relevant to improving access, quality, efficiency and/or effectiveness in the organization and delivery of health care services in rural and remote areas. Literature review. Key bibliographic databases that index health research were searched: MEDLINE, EMBASE and CINAHL. Other databases relevant to Arctic health were also accessed. Abstracts were assessed for relevancy and full articles were reviewed and categorized according to emergent themes. Many innovations in delivering services to rural and remote areas were identified, particularly in the public health realm. These innovations were grouped into 4 key themes: organizational structure of health services; utilization of telehealth and ehealth; medical transportation; and public health challenges. Despite the challenges facing rural and remote regions, there is a distinctly positive message from this broad literature review. Evidence-based initiatives exist across a range of areas - which include operational efficiency and integration, access to care, organizational structure, public health, continuing education and workforce composition - that have the potential to positively impact health care quality and health-related outcomes.

  16. Queued History based Mediator Identification for an Incentive Attached peer to peer Electronic Coupon System

    NASA Astrophysics Data System (ADS)

    Shojima, Taiki; Ikkai, Yoshitomo; Komoda, Norihisa

    An incentive attached peer to peer (P2P) electronic coupon system is proposed in which users forward e-coupons to potential users by providing incentives to those mediators. A service provider needs to acquire distribution history for incentive payment by recording UserIDs (UIDs) in the e-coupons, since this system is intended for pure P2P environment. This causes problems of dishonestly altering distribution history. In order to solve such problems, distribution history is realized in a couple of queues structure. They are the UID queue, and the public key queue. Each element of the UID queue at the initial state consists of index, a secret key, and a digital signature. In recording one's UID, the encrypted UID is enqueued to the UID queue with a new digital signature created by a secret key of the dequeued element, so that each UID cannot be altered. The public key queue provides the functionality of validating digital signatures on mobile devices. This method makes it possible both each UID and sequence of them to be certificated. The availability of the method is evaluated by quantifying risk reduction using Fault Tree Analysis (FTA). And it's recognized that the method is better than common encryption methods.

  17. Regression-Based Approach For Feature Selection In Classification Issues. Application To Breast Cancer Detection And Recurrence

    NASA Astrophysics Data System (ADS)

    Belciug, Smaranda; Serbanescu, Mircea-Sebastian

    2015-09-01

    Feature selection is considered a key factor in classifications/decision problems. It is currently used in designing intelligent decision systems to choose the best features which allow the best performance. This paper proposes a regression-based approach to select the most important predictors to significantly increase the classification performance. Application to breast cancer detection and recurrence using publically available datasets proved the efficiency of this technique.

  18. Secure, Policy-Based, Multi-Recipient Data Sharing

    DTIC Science & Technology

    2009-01-01

    effects of a new drug to all patients at participating hospitals, who have a certain medical condition and have indicated a willingness to partici...pate in clinical trials at their discretion. The drug company considers the potential side effects of the new drug private data and thus would like to...health care example discussed above. Attribute-Based Encryption (ABE) [63, 37, 10, 23, 56, 24, 55, 36, 43, 49] is a new public-key encryption paradigm

  19. From surveillance to action: early gains from the National Violent Death Reporting System.

    PubMed

    Campbell, R; Weis, M A; Millet, L; Powell, V; Hull-Jilly, D; Hackman, H

    2006-12-01

    Drawing from the experiences of individual state programs that currently participate in the National Violent Death Reporting System (NVDRS), this article reviews some of the practical benefits that may accrue from the introduction of violent death surveillance systems. As a state-based surveillance system that uses multiple data sources and relies upon multiple stakeholders, the NVDRS program has fostered an array of initiatives within and among individual state programs. State-based initiatives highlighted in this article were selected on the basis of a purposive sampling strategy intended to illustrate key aspects of program development. The NVDRS state programs are in Alaska, California, Colorado, Georgia, Kentucky, Maryland, Massachusetts, New Jersey, New Mexico, North Carolina, Oklahoma, Oregon, Rhode Island, South Carolina, Utah, Virginia, and Wisconsin. The NVDRS has helped to build alliances and collaborative efforts between key stakeholders, facilitated the recognition of violent death as a public health problem through outreach and media attention, acted as a catalyst for new projects, enhanced surveillance of special populations and utility for evaluation, and identified key circumstances that will target interventions in state prevention planning. The NVDRS has implemented data collection efforts and is beginning to produce and analyze findings. In the process of implementing the data collection system and publicizing findings, state NVDRS programs are realizing other gains that strengthen their surveillance efforts. The use of data for prevention purposes will be the ultimate indicator of program success.

  20. Schools of public health in low and middle-income countries: an imperative investment for improving the health of populations?

    PubMed

    Rabbani, Fauziah; Shipton, Leah; White, Franklin; Nuwayhid, Iman; London, Leslie; Ghaffar, Abdul; Ha, Bui Thi Thu; Tomson, Göran; Rimal, Rajiv; Islam, Anwar; Takian, Amirhossein; Wong, Samuel; Zaidi, Shehla; Khan, Kausar; Karmaliani, Rozina; Abbasi, Imran Naeem; Abbas, Farhat

    2016-09-07

    Public health has multicultural origins. By the close of the nineteenth century, Schools of Public Health (SPHs) began to emerge in western countries in response to major contemporary public health challenges. The Flexner Report (1910) emphasized the centrality of preventive medicine, sanitation, and public health measures in health professional education. The Alma Ata Declaration on Primary Health Care (PHC) in 1978 was a critical milestone, especially for low and middle-income countries (LMICs), conceptualizing a close working relationship between PHC and public health measures. The Commission on Social Determinants of Health (2005-2008) strengthened the case for SPHs in LMICs as key stakeholders in efforts to reduce global health inequities. This scoping review groups text into public health challenges faced by LMICs and the role of SPHs in addressing these challenges. The challenges faced by LMICs include rapid urbanization, environmental degradation, unfair terms of global trade, limited capacity for equitable growth, mass displacements associated with conflicts and natural disasters, and universal health coverage. Poor governance and externally imposed donor policies and agendas, further strain the fragile health systems of LMICs faced with epidemiological transition. Moreover barriers to education and research imposed by limited resources, political and economic instability, and unbalanced partnerships additionally aggravate the crisis. To address these contextual challenges effectively, SPHs are offering broad based health professional education, conducting multidisciplinary population based research and fostering collaborative partnerships. SPHs are also looked upon as the key drivers to achieve sustainable development goals (SDGs). SPHs in LMICs can contribute to overcoming several public health challenges being faced by LMICs, including achieving SDGs. Most importantly they can develop cadres of competent and well-motivated public health professionals: educators, practitioners and researchers who ask questions that address fundamental health determinants, seek solutions as agents of change within their mandates, provide specific services and serve as advocates for multilevel partnerships. Funding support, human resources, and agency are unfortunately often limited or curtailed in LMICs, and this requires constructive collaboration between LMICs and counterpart institutions from high income countries.

  1. The Delivery of Health Promotion and Environmental Health Services; Public Health or Primary Care Settings?

    PubMed

    Bjørn Jensen, Lene; Lukic, Irena; Gulis, Gabriel

    2018-05-07

    The WHO Regional Office for Europe developed a set of public health functions resulting in the ten Essential Public Health Operations (EPHO). Public health or primary care settings seem to be favorable to embrace all actions included into EPHOs. The presented paper aims to guide readers on how to assign individual health promotion and environmental health services to public health or primary care settings. Survey tools were developed based on EPHO 2, 3 and 4; there were six key informant surveys out of 18 contacted completed via e-mails by informants working in Denmark on health promotion and five face-to-face interviews were conducted in Australia (Melbourne and Victoria state) with experts from environmental health, public health and a physician. Based on interviews, we developed a set of indicators to support the assignment process. Population or individual focus, a system approach or one-to-one approach, dealing with hazards or dealing with effects, being proactive or reactive were identified as main element of the decision tool. Assignment of public health services to one of two settings proved to be possible in some cases, whereas in many there is no clear distinction between the two settings. National context might be the one which guides delivery of public health services.

  2. Healthcare public key infrastructure (HPKI) and non-profit organization (NPO): essentials for healthcare data exchange.

    PubMed

    Takeda, Hiroshi; Matsumura, Yasushi; Nakagawa, Katsuhiko; Teratani, Tadamasa; Qiyan, Zhang; Kusuoka, Hideo; Matsuoka, Masami

    2004-01-01

    To share healthcare information and to promote cooperation among healthcare providers and customers (patients) under computerized network environment, a non-profit organization (NPO), named as OCHIS, was established at Osaka, Japan in 2003. Since security and confidentiality issues on the Internet have been major concerns in the OCHIS, the system has been based on healthcare public key infrastructure (HPKI), and found that there remained problems to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority by contracting with the Ministry of Economics and Trading Industries in 2003. This paper describes the experimental design with NPO and the results of the study concerning message security and HPKI. The developed system has been operated practically in Osaka urban area.

  3. Transparency of Biobank Access in Canada: An Assessment of Industry Access and the Availability of Information on Access Policies and Resulting Research.

    PubMed

    Gibson, Shannon G; Axler, Renata E; Lemmens, Trudo

    2017-12-01

    A key issue impacting public trust in biobanks is how these resources are utilized, including who is given access to biobank data and samples. To assess the conditions under which researchers are given access to Canadian biobanks, we reviewed websites and contacted Canadian biobanks to determine the availability of information on access policies and procedures; research resulting from access biobank data and samples; and conditions on private industry access to biobanks. We also conducted expert interviews with key Canadian stakeholders ( n = 11) to obtain their perspectives on biobank transparency and access policies. Among 21 Canadian biobanks, there was wide variation in the access information made publicly available, and the majority of these allowed access by industry applicants. Biobanks should be governed by the principles of transparency, accountability, and accessibility, and attention must be given to the conditions around the commercialization of biobank-based research.

  4. Nature Contact and Human Health: A Research Agenda.

    PubMed

    Frumkin, Howard; Bratman, Gregory N; Breslow, Sara Jo; Cochran, Bobby; Kahn, Peter H; Lawler, Joshua J; Levin, Phillip S; Tandon, Pooja S; Varanasi, Usha; Wolf, Kathleen L; Wood, Spencer A

    2017-07-31

    At a time of increasing disconnectedness from nature, scientific interest in the potential health benefits of nature contact has grown. Research in recent decades has yielded substantial evidence, but large gaps remain in our understanding. We propose a research agenda on nature contact and health, identifying principal domains of research and key questions that, if answered, would provide the basis for evidence-based public health interventions. We identify research questions in seven domains: a ) mechanistic biomedical studies; b ) exposure science; c ) epidemiology of health benefits; d ) diversity and equity considerations; e ) technological nature; f ) economic and policy studies; and g ) implementation science. Nature contact may offer a range of human health benefits. Although much evidence is already available, much remains unknown. A robust research effort, guided by a focus on key unanswered questions, has the potential to yield high-impact, consequential public health insights. https://doi.org/10.1289/EHP1663.

  5. Tissue engineering and regenerative medicine: recent innovations and the transition to translation.

    PubMed

    Fisher, Matthew B; Mauck, Robert L

    2013-02-01

    The field of tissue engineering and regenerative medicine (TERM) has exploded in the last decade. In this Year (or so) in Review, we highlight some of the high impact advances within the field over the past several years. Using the past as our guide and starting with an objective premise, we attempt so to identify recent "hot topics" and transformative publications within the field. Through this process, several key themes emerged: (1) tissue engineering: grafts and materials, (2) regenerative medicine: scaffolds and factors that control endogenous tissue formation, (3) clinical trials, and (4) novel cell sources: induced pluripotent stem cells. Within these focus areas, we summarize the highly impactful articles that emerged from our objective analysis and review additional recent publications to augment and expand upon these key themes. Finally, we discuss where the TERM field may be headed and how to monitor such a broad-based and ever-expanding community.

  6. Nature Contact and Human Health: A Research Agenda

    PubMed Central

    Bratman, Gregory N.; Breslow, Sara Jo; Cochran, Bobby; Kahn Jr, Peter H.; Lawler, Joshua J.; Levin, Phillip S.; Tandon, Pooja S.; Varanasi, Usha; Wolf, Kathleen L.; Wood, Spencer A.

    2017-01-01

    Background: At a time of increasing disconnectedness from nature, scientific interest in the potential health benefits of nature contact has grown. Research in recent decades has yielded substantial evidence, but large gaps remain in our understanding. Objectives: We propose a research agenda on nature contact and health, identifying principal domains of research and key questions that, if answered, would provide the basis for evidence-based public health interventions. Discussion: We identify research questions in seven domains: a) mechanistic biomedical studies; b) exposure science; c) epidemiology of health benefits; d) diversity and equity considerations; e) technological nature; f) economic and policy studies; and g) implementation science. Conclusions: Nature contact may offer a range of human health benefits. Although much evidence is already available, much remains unknown. A robust research effort, guided by a focus on key unanswered questions, has the potential to yield high-impact, consequential public health insights. https://doi.org/10.1289/EHP1663 PMID:28796634

  7. Delivering proportionate governance in the era of eHealth

    PubMed Central

    Sethi, Nayha; Laurie, Graeme T.

    2013-01-01

    This article advances a principled proportionate governance model (PPGM) that overcomes key impediments to using health records for research. Despite increasing initiatives for maximising benefits of data linkage, significant challenges remain, including a culture of caution around data sharing and linkage, failure to make use of flexibilities within the law and failure to incorporate intelligent iterative design. The article identifies key issues for consideration and posits a flexible and accessible governance model that provides a robust and efficient means of paying due regard to both privacy and the public interests in research. We argue that proportionate governance based on clear guiding principles accurately gauges risks associated with data uses and assigns safeguards accordingly. This requires a clear articulation of roles and responsibilities at all levels of decision-making and effective training for researchers and data custodians. Accordingly, the PPGM encourages and supports defensible judgements about data linkage in the public interest. PMID:24634569

  8. Tissue Engineering and Regenerative Medicine: Recent Innovations and the Transition to Translation

    PubMed Central

    Fisher, Matthew B.

    2013-01-01

    The field of tissue engineering and regenerative medicine (TERM) has exploded in the last decade. In this Year (or so) in Review, we highlight some of the high impact advances within the field over the past several years. Using the past as our guide and starting with an objective premise, we attempt so to identify recent “hot topics” and transformative publications within the field. Through this process, several key themes emerged: (1) tissue engineering: grafts and materials, (2) regenerative medicine: scaffolds and factors that control endogenous tissue formation, (3) clinical trials, and (4) novel cell sources: induced pluripotent stem cells. Within these focus areas, we summarize the highly impactful articles that emerged from our objective analysis and review additional recent publications to augment and expand upon these key themes. Finally, we discuss where the TERM field may be headed and how to monitor such a broad-based and ever-expanding community. PMID:23253031

  9. Public Health Adaptation to Climate Change in OECD Countries

    PubMed Central

    Austin, Stephanie E.; Biesbroek, Robbert; Berrang-Ford, Lea; Ford, James D.; Parker, Stephen; Fleury, Manon D.

    2016-01-01

    Climate change is a major challenge facing public health. National governments play a key role in public health adaptation to climate change, but there are competing views on what responsibilities and obligations this will—or should—include in different nations. This study aims to: (1) examine how national-level public health adaptation is occurring in Organization for Economic Cooperation and Development (OECD) countries; (2) examine the roles national governments are taking in public health adaptation; and (3) critically appraise three key governance dimensions of national-level health adaptation—cross-sectoral collaboration, vertical coordination and national health adaptation planning—and identify practical examples suited to different contexts. We systematically reviewed publicly available public health adaptation to climate change documents and webpages by national governments in ten OECD countries using systematic web searches, assessment of self-reporting, and content analysis. Our findings suggest national governments are primarily addressing infectious disease and heat-related risks posed by climate change, typically emphasizing capacity building or information-based groundwork initiatives. We find national governments are taking a variety of approaches to public health adaptation to climate change that do not follow expected convergence and divergence by governance structure. We discuss practical options for incorporating cross-sectoral collaboration, vertical coordination and national health adaptation planning into a variety of contexts and identify leaders national governments can look to to inform their public health adaptation planning. Following the adoption of the Paris Agreement and subsequent increased momentum for adaptation, research tracking adaptation is needed to define what health adaptation looks like in practice, reveal insights that can be taken up across states and sectors, and ensure policy orientated learning. PMID:27618074

  10. Public Health Adaptation to Climate Change in OECD Countries.

    PubMed

    Austin, Stephanie E; Biesbroek, Robbert; Berrang-Ford, Lea; Ford, James D; Parker, Stephen; Fleury, Manon D

    2016-09-07

    Climate change is a major challenge facing public health. National governments play a key role in public health adaptation to climate change, but there are competing views on what responsibilities and obligations this will-or should-include in different nations. This study aims to: (1) examine how national-level public health adaptation is occurring in Organization for Economic Cooperation and Development (OECD) countries; (2) examine the roles national governments are taking in public health adaptation; and (3) critically appraise three key governance dimensions of national-level health adaptation-cross-sectoral collaboration, vertical coordination and national health adaptation planning-and identify practical examples suited to different contexts. We systematically reviewed publicly available public health adaptation to climate change documents and webpages by national governments in ten OECD countries using systematic web searches, assessment of self-reporting, and content analysis. Our findings suggest national governments are primarily addressing infectious disease and heat-related risks posed by climate change, typically emphasizing capacity building or information-based groundwork initiatives. We find national governments are taking a variety of approaches to public health adaptation to climate change that do not follow expected convergence and divergence by governance structure. We discuss practical options for incorporating cross-sectoral collaboration, vertical coordination and national health adaptation planning into a variety of contexts and identify leaders national governments can look to to inform their public health adaptation planning. Following the adoption of the Paris Agreement and subsequent increased momentum for adaptation, research tracking adaptation is needed to define what health adaptation looks like in practice, reveal insights that can be taken up across states and sectors, and ensure policy orientated learning.

  11. Public Response to Obamacare on Twitter.

    PubMed

    Davis, Matthew A; Zheng, Kai; Liu, Yang; Levy, Helen

    2017-05-26

    The Affordable Care Act (ACA), often called "Obamacare," is a controversial law that has been implemented gradually since its enactment in 2010. Polls have consistently shown that public opinion of the ACA is quite negative. The aim of our study was to examine the extent to which Twitter data can be used to measure public opinion of the ACA over time. We prospectively collected a 10% random sample of daily tweets (approximately 52 million since July 2011) using Twitter's streaming application programming interface (API) from July 10, 2011 to July 31, 2015. Using a list of key terms and ACA-specific hashtags, we identified tweets about the ACA and examined the overall volume of tweets about the ACA in relation to key ACA events. We applied standard text sentiment analysis to assign each ACA tweet a measure of positivity or negativity and compared overall sentiment from Twitter with results from the Kaiser Family Foundation health tracking poll. Public opinion on Twitter (measured via sentiment analysis) was slightly more favorable than public opinion measured by the Kaiser poll (approximately 50% vs 40%, respectively) but trends over time in both favorable and unfavorable views were similar in both sources. The Twitter-based measures of opinion as well as the Kaiser poll changed very little over time: correlation coefficients for favorable and unfavorable public opinion were .43 and .37, respectively. However, we found substantial spikes in the volume of ACA-related tweets in response to key events in the law's implementation, such as the first open enrollment period in October 2013 and the Supreme Court decision in June 2012. Twitter may be useful for tracking public opinion of health care reform as it appears to be comparable with conventional polling results. Moreover, in contrast with conventional polling, the overall amount of tweets also provides a potential indication of public interest of a particular issue at any point in time. ©Matthew A Davis, Kai Zheng, Yang Liu, Helen Levy. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 26.05.2017.

  12. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  13. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  14. Financing prevention: opportunities for economic analysis across the translational research cycle.

    PubMed

    Crowley, D Max; Jones, Damon

    2016-03-01

    Prevention advocates often make the case that preventive intervention not only improves public health and welfare but also can save public resources. Increasingly, evidence-based policy efforts considering prevention are focusing on how programs can save taxpayer resources from reduced burden on health, criminal justice, and social service systems. Evidence of prevention's return has begun to draw substantial investments from the public and private sector. Yet, translating prevention effectiveness into economic impact requires specific economic analyses to be employed across the stages of translational research. This work discusses the role of economic analysis in prevention science and presents key translational research opportunities to meet growing demand for estimates of prevention's economic and fiscal impact.

  15. Identification of key ancestors of modern germplasm in a breeding program of maize.

    PubMed

    Technow, F; Schrag, T A; Schipprack, W; Melchinger, A E

    2014-12-01

    Probabilities of gene origin computed from the genomic kinships matrix can accurately identify key ancestors of modern germplasms Identifying the key ancestors of modern plant breeding populations can provide valuable insights into the history of a breeding program and provide reference genomes for next generation whole genome sequencing. In an animal breeding context, a method was developed that employs probabilities of gene origin, computed from the pedigree-based additive kinship matrix, for identifying key ancestors. Because reliable and complete pedigree information is often not available in plant breeding, we replaced the additive kinship matrix with the genomic kinship matrix. As a proof-of-concept, we applied this approach to simulated data sets with known ancestries. The relative contribution of the ancestral lines to later generations could be determined with high accuracy, with and without selection. Our method was subsequently used for identifying the key ancestors of the modern Dent germplasm of the public maize breeding program of the University of Hohenheim. We found that the modern germplasm can be traced back to six or seven key ancestors, with one or two of them having a disproportionately large contribution. These results largely corroborated conjectures based on early records of the breeding program. We conclude that probabilities of gene origin computed from the genomic kinships matrix can be used for identifying key ancestors in breeding programs and estimating the proportion of genes contributed by them.

  16. Unconstrained Capacities of Quantum Key Distribution and Entanglement Distillation for Pure-Loss Bosonic Broadcast Channels.

    PubMed

    Takeoka, Masahiro; Seshadreesan, Kaushik P; Wilde, Mark M

    2017-10-13

    We consider quantum key distribution (QKD) and entanglement distribution using a single-sender multiple-receiver pure-loss bosonic broadcast channel. We determine the unconstrained capacity region for the distillation of bipartite entanglement and secret key between the sender and each receiver, whenever they are allowed arbitrary public classical communication. A practical implication of our result is that the capacity region demonstrated drastically improves upon rates achievable using a naive time-sharing strategy, which has been employed in previously demonstrated network QKD systems. We show a simple example of a broadcast QKD protocol overcoming the limit of the point-to-point strategy. Our result is thus an important step toward opening a new framework of network channel-based quantum communication technology.

  17. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  18. Context-based Strategies for Engaging Consumers with Public Reports about Health Care Providers

    PubMed Central

    Shaller, Dale; Kanouse, David E.; Schlesinger, Mark

    2017-01-01

    Efforts to engage consumers in the use of public reports on health care provider performance have met with limited success. Fostering greater engagement will require new approaches that provide consumers with relevant content at the time and in the context they need to make a decision of consequence. To this end, we identify three key factors influencing consumer engagement and show how they manifest in different ways and combinations for four particular choice contexts that appear to offer realistic opportunities for engagement. We analyze how these engagement factors play out differently in each choice context and suggest specific strategies that sponsors of public reports can use in each context. Cross-cutting lessons for report sponsors and policy makers include new media strategies such as a commitment to adaptive web-based reporting, new metrics with richer emotional content, and the use of navigators or advocates to assist consumers with interpreting reports. PMID:23819945

  19. Higher Education Policy Change in Europe: Academic Research Funding and the Impact Agenda

    ERIC Educational Resources Information Center

    Gunn, Andrew; Mintrom, Michael

    2016-01-01

    In the policy period following the Lisbon Strategy of 2000, European governments increasingly regard universities, and the research they produce, as key to enhancing economic performance. With this heightened respect for the value of university-based research, comes an impatience to see returns on the public investments made. We analyze how policy…

  20. Data estimation and prediction for natural resources public data

    Treesearch

    Hans T. Schreuder; Robin M. Reich

    1998-01-01

    A key product of both Forest Inventory and Analysis (FIA) of the USDA Forest Service and the Natural Resources Inventory (NRI) of the Natural Resources Conservation Service is a scientific data base that should be defensible in court. Multiple imputation procedures (MIPs) have been proposed both for missing value estimation and prediction of non-remeasured cells in...

  1. Holy Alliances: Public Subsidies, Islamic High Schools, and Female Schooling in Bangladesh

    ERIC Educational Resources Information Center

    Asadullah, Mohammad Niaz; Chaudhury, Nazmul

    2009-01-01

    This paper documents the experience of incentive-based reforms in the secondary Islamic/madrasa education sector in Bangladesh within the context of the broader debate over modernization of religious school systems in South Asia. Key features of the reform are changes of the curriculum and policy regarding admission of female students. In return…

  2. Faith: The Key to Successful Education.

    ERIC Educational Resources Information Center

    Kysilka, Marcella; Qadri, Yasmeen

    The need for Islamic schools in the United States is growing with the increasing flow of Muslim immigrants. Increasing public school problems lead many Muslim parents to seek private education. Islamic schools are based on religion, though Islam is both a religion and a way of life. The ultimate goal of these schools is to produce graduates who…

  3. Strategic Pay Reform: A Student Outcomes-Based Evaluation of Denver's ProComp Teacher Pay Initiative

    ERIC Educational Resources Information Center

    Goldhaber, Dan; Walch, Joe

    2012-01-01

    Denver Public Schools utilizes one of the nation's highest profile alternative teacher compensation systems, and a key element of Denver's Professional Compensation System for Teachers (ProComp) is pay for performance. This study analyzes the student achievement implications of ProComp utilizing matched student- and teacher-level data from 2003 to…

  4. Educational Paradigm: Implementation of the Competence-Based Approach to the Higher School System

    ERIC Educational Resources Information Center

    Kunanbayeva, Salima S.

    2016-01-01

    The educational system of Kazakhstan is now characterized by certain gradual changes of an educational paradigm. The educational paradigm is understood as framework of key provisions and the ideas which are acknowledged by the pedagogical public during the concrete time period and are the cornerstone of scientific research. Change of an…

  5. Improve Your Marketing Results by Asking Peter F. Drucker's "Five Most Important Questions."

    ERIC Educational Resources Information Center

    Rossum, Constance; Baum, Geoffrey

    2001-01-01

    This case study demonstrates how the Office of Marketing & Public Relations at Claremont McKenna College used five "Drucker Tool" questions to improve marketing's image on campus and awareness of the college among key constituencies. It concludes with a reevaluation of the initial marketing strategy based on the growing importance of…

  6. Space School

    ERIC Educational Resources Information Center

    Fitzgerald, Victoria

    2012-01-01

    Part of the School of Physical Sciences mission and plan is to deliver an effective outreach programme to the community and South East regions to stimulate interest, both in school pupils and the general public, in science. To do this, it offers many activities that are school-based and aimed at students in Key stages 3, 4 and 5 (ages 11-18).…

  7. Personal Reflection: Reflections on a Family Health History Assignment for Undergraduate Public Health and Nursing Students

    ERIC Educational Resources Information Center

    Rooks, Ronica N.; Ford, Cassandra

    2013-01-01

    This personal reflection describes our experiences with incorporating the scholarship of teaching and learning and problem-based techniques to facilitate undergraduate student learning and their professional development in the health sciences. We created a family health history assignment to discuss key concepts in our courses, such as health…

  8. Change Management and the SENCo Role: Developing Key Performance Indicators in the Strategic Development of Inclusivity

    ERIC Educational Resources Information Center

    Done, Liz; Murphy, Mike; Watt, Mia

    2016-01-01

    This article follows an earlier publication highlighting the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. School-based action research undertaken by a teacher studying for the postgraduate National Award for SEN…

  9. Expert Panel Consensus for and Analysis of Key Attributes on Websites Devoted to Weight Control

    ERIC Educational Resources Information Center

    Brown, Stephen L.; Land, Diane; Johnson, Chandrika; Miller, Kim

    2014-01-01

    Background: Obesity presents major challenges to public health in the United States. Trials of web-based interventions for weight control suggest that the Internet is a promising option for program delivery. Purpose: This study sought consensus among experts regarding critical components of successful weight control and to systematically examine…

  10. Marketing, Parental Choice and Strategic Planning: An Opportunity or Dilemma for UK Schools?

    ERIC Educational Resources Information Center

    Giles, Corrie

    Site-based management, parental choice, and accountability for the efficient, effective, and economic use of public resources in England and Wales were key themes of the 1988 Education Reform Act. The 1993 Education Act opened the way for greater choice in the marketplace by encouraging specialization and/or selection by aptitude/ability in…

  11. Authorship Correction: Sampling Key Populations for HIV Surveillance: Results From Eight Cross-Sectional Studies Using Respondent-Driven Sampling and Venue-Based Snowball Sampling.

    PubMed

    Rao, Amrita; Stahlman, Shauna; Hargreaves, James; Weir, Sharon; Edwards, Jessie; Rice, Brian; Kochelani, Duncan; Mavimbela, Mpumelelo; Baral, Stefan

    2018-01-15

    [This corrects the article DOI: 10.2196/publichealth.8116.]. ©Amrita Rao, Shauna Stahlman, James Hargreaves, Sharon Weir, Jessie Edwards, Brian Rice, Duncan Kochelani, Mpumelelo Mavimbela, Stefan Baral. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 15.01.2018.

  12. A Framework for Developing the Structure of Public Health Economic Models.

    PubMed

    Squires, Hazel; Chilcott, James; Akehurst, Ronald; Burr, Jennifer; Kelly, Michael P

    2016-01-01

    A conceptual modeling framework is a methodology that assists modelers through the process of developing a model structure. Public health interventions tend to operate in dynamically complex systems. Modeling public health interventions requires broader considerations than clinical ones. Inappropriately simple models may lead to poor validity and credibility, resulting in suboptimal allocation of resources. This article presents the first conceptual modeling framework for public health economic evaluation. The framework presented here was informed by literature reviews of the key challenges in public health economic modeling and existing conceptual modeling frameworks; qualitative research to understand the experiences of modelers when developing public health economic models; and piloting a draft version of the framework. The conceptual modeling framework comprises four key principles of good practice and a proposed methodology. The key principles are that 1) a systems approach to modeling should be taken; 2) a documented understanding of the problem is imperative before and alongside developing and justifying the model structure; 3) strong communication with stakeholders and members of the team throughout model development is essential; and 4) a systematic consideration of the determinants of health is central to identifying the key impacts of public health interventions. The methodology consists of four phases: phase A, aligning the framework with the decision-making process; phase B, identifying relevant stakeholders; phase C, understanding the problem; and phase D, developing and justifying the model structure. Key areas for further research involve evaluation of the framework in diverse case studies and the development of methods for modeling individual and social behavior. This approach could improve the quality of Public Health economic models, supporting efficient allocation of scarce resources. Copyright © 2016 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  13. 75 FR 28805 - Science Advisory Board Staff Office; Notification of a Public Teleconference and Public Meeting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-24

    ... selection of key data sets for analysis; and (3) transparency, thoroughness, and clarity in quantitative... being asked to evaluate: The transparency and clarity in the selection of key data sets for dose...

  14. Public Key Infrastructure Study

    DTIC Science & Technology

    1994-04-01

    commerce. This Public Key Infrastructure (PKI) study focuses on the United States Federal Government operations, but also addresses national and global ... issues in order to facilitate the interoperation of protected electronic commerce among the various levels of government in the U.S., private citizens

  15. Developing a public health policy-research nexus: an evaluation of Nurse Practitioner models in aged care.

    PubMed

    Prosser, Brenton; Clark, Shannon; Davey, Rachel; Parker, Rhian

    2013-10-01

    A frustration often expressed by researchers and policy-makers in public health is an apparent mismatch between respective priorities and expectations for research. Academics bemoan an oversimplification of their work, a reticence for independent critique and the constant pressure to pursue evaluation funding. Meanwhile, policy-makers look for research reports written in plain language with clear application, which are attuned to current policy settings and produced quickly. In a context where there are calls in western nations for evidence based policy with stronger links to academic research, such a mismatch can present significant challenges to policy program evaluation. The purpose of this paper is to present one attempt to overcome these challenges. Specifically, the paper describes the development of a conceptual framework for a large-scale, multifaceted evaluation of an Australian Government health initiative to expand Nurse Practitioner models of practice in aged care service delivery. In doing so, the paper provides a brief review of key points for the facilitation of a strong research-policy nexus in public health evaluations, as well as describes how this particular evaluation embodies these key points. As such, the paper presents an evaluation approach which may be adopted and adapted by others undertaking public health policy program evaluations. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Prioritizing public- private partnership models for public hospitals of iran based on performance indicators.

    PubMed

    Gholamzadeh Nikjoo, Raana; Jabbari Beyrami, Hossein; Jannati, Ali; Asghari Jaafarabadi, Mohammad

    2012-01-01

    The present study was conducted to scrutinize Public- Private Partnership (PPP) models in public hospitals of different countries based on performance indicators in order to se-lect appropriated models for Iran hospitals. In this mixed (quantitative-qualitative) study, systematic review and expert panel has been done to identify varied models of PPP as well as performance indicators. In the second step we prioritized performance indicator and PPP models based on selected performance indicators by Analytical Hierarchy process (AHP) technique. The data were analyzed by Excel 2007 and Expert Choice11 software's. In quality - effectiveness area, indicators like the rate of hospital infections (100%), hospital accidents prevalence rate (73%), pure rate of hospital mortality (63%), patient satisfaction percentage (53%), in accessibility equity area indicators such as average inpatient waiting time (100%) and average outpatient waiting time (74%), and in financial - efficiency area, indicators including average length of stay (100%), bed occupation ratio (99%), specific income to total cost ratio (97%) have been chosen to be the most key performance indicators. In the pri¬oritization of the PPP models clinical outsourcing, management, privatization, BOO (build, own, operate) and non-clinical outsourcing models, achieved high priority for various performance in¬dicator areas. This study had been provided the most common PPP options in the field of public hospitals and had gathered suitable evidences from experts for choosing appropriate PPP option for public hospitals. Effect of private sector presence in public hospital performance, based on which PPP options undertaken, will be different.

  17. Prioritizing Public- Private Partnership Models for Public Hospitals of Iran Based on Performance Indicators

    PubMed Central

    Gholamzadeh Nikjoo, Raana; Jabbari Beyrami, Hossein; Jannati, Ali; Asghari Jaafarabadi, Mohammad

    2012-01-01

    Background: The present study was conducted to scrutinize Public- Private Partnership (PPP) models in public hospitals of different countries based on performance indicators in order to se-lect appropriated models for Iran hospitals. Methods: In this mixed (quantitative-qualitative) study, systematic review and expert panel has been done to identify varied models of PPP as well as performance indicators. In the second step we prioritized performance indicator and PPP models based on selected performance indicators by Analytical Hierarchy process (AHP) technique. The data were analyzed by Excel 2007 and Expert Choice11 software’s. Results: In quality – effectiveness area, indicators like the rate of hospital infections (100%), hospital accidents prevalence rate (73%), pure rate of hospital mortality (63%), patient satisfaction percentage (53%), in accessibility equity area indicators such as average inpatient waiting time (100%) and average outpatient waiting time (74%), and in financial – efficiency area, indicators including average length of stay (100%), bed occupation ratio (99%), specific income to total cost ratio (97%) have been chosen to be the most key performance indicators. In the pri¬oritization of the PPP models clinical outsourcing, management, privatization, BOO (build, own, operate) and non-clinical outsourcing models, achieved high priority for various performance in¬dicator areas. Conclusion: This study had been provided the most common PPP options in the field of public hospitals and had gathered suitable evidences from experts for choosing appropriate PPP option for public hospitals. Effect of private sector presence in public hospital performance, based on which PPP options undertaken, will be different. PMID:24688942

  18. An efficient and provable secure revocable identity-based encryption scheme.

    PubMed

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  19. Using Conjoint Analysis to Estimate Employers Preferences for Key Competencies of Master Level Dutch Graduates Entering the Public Health Field

    ERIC Educational Resources Information Center

    Biesma, R. G.; Pavlova, M.; van Merode, G. G.; Groot, W.

    2007-01-01

    This paper uses an experimental design to estimate preferences of employers for key competencies during the transition from initial education to the labor market. The study is restricted to employers of entry-level academic graduates entering public health organizations in the Netherlands. Given the changing and complex demands in public health,…

  20. Trend of Medical Tourism Publications: An Attempt to Explore the Involved Academic Disciplines and Interests.

    PubMed

    Rokni, Ladan; Park, Sam-Hun

    2018-02-01

    Medical tourism suffers from the lack of a consensus regarding the involved categories. This study aimed to address this gap from the academic disciplines and publications perspective. Totally 1954 citations were identified through a formula of keyword search of SCOPUS. In order to classify the various subject areas, we followed the international standard classification of education (ISCED) developed by UNESCO. Moreover, the trends of publications were identified based on their popularity between 2000 and 2017. The category with the most interests on publication about medical tourism was 'health and welfare', followed by 'social science'. Even though various disciplines were involved in the medical tourism, it seems that a downward trend has been experienced since 2015. The identified key trends of medical tourism publications will benefit researchers exploring the categories of medical tourism or health travel. The results contribute to advance the state of knowledge from the academic perspective.

  1. A Budget Proposal for China's Public Long-Term Care Policy.

    PubMed

    Lu, Bei; Liu, Xiaoting; Yang, Mingxu

    2017-01-01

    Long-term care (LTC) policy is at an experimental stage in China, characterized by various regional pilot programs. The public cost of LTC is difficult to estimate due to a lack of clarity about policy detail from the central government. This article analyzes the current disabled status for vulnerable older people without sufficient financial resources and family supports. It focuses on estimating a safety net public subsidy policy for LTC services in China, both for today and into the future, using China Health and Retirement Longitudinal Survey (CHARLS) data, 2011 wave, with the methods of multinomial logistic regression and simulation. The key contribution is to estimate the future disability trend and LTC public cost based on changes in education, population ageing, and urbanization. Disability prevalence might be decreasing partly due to higher education, urbanization, and better health care, and the overall public LTC costs might be growing by the results of projection.

  2. Public policy versus individual rights in childhood obesity interventions: perspectives from the Arkansas experience with Act 1220 of 2003.

    PubMed

    Phillips, Martha M; Ryan, Kevin; Raczynski, James M

    2011-09-01

    Childhood obesity is a major public health problem. Experts recommend that prevention and control strategies include population-based policies. Arkansas Act 1220 of 2003 is one such initiative and provides examples of the tensions between individual rights and public policy. We discuss concerns raised during the implementation of Act 1220 related to the 2 primary areas in which they emerged: body mass index measurement and reporting to parents and issues related to vending machine access. We present data from the evaluation of Act 1220 that have been used to address concerns and other research findings and conclude with a short discussion of the tension between personal rights and public policy. States considering similar policy approaches should address these concerns during policy development, involve multiple stakeholder groups, establish the legal basis for public policies, and develop consensus on key elements.

  3. Consideration of an Applied Model of Public Health Program Infrastructure

    PubMed Central

    Lavinghouze, Rene; Snyder, Kimberly; Rieker, Patricia; Ottoson, Judith

    2015-01-01

    Systemic infrastructure is key to public health achievements. Individual public health program infrastructure feeds into this larger system. Although program infrastructure is rarely defined, it needs to be operationalized for effective implementation and evaluation. The Ecological Model of Infrastructure (EMI) is one approach to defining program infrastructure. The EMI consists of 5 core (Leadership, Partnerships, State Plans, Engaged Data, and Managed Resources) and 2 supporting (Strategic Understanding and Tactical Action) elements that are enveloped in a program’s context. We conducted a literature search across public health programs to determine support for the EMI. Four of the core elements were consistently addressed, and the other EMI elements were intermittently addressed. The EMI provides an initial and partial model for understanding program infrastructure, but additional work is needed to identify evidence-based indicators of infrastructure elements that can be used to measure success and link infrastructure to public health outcomes, capacity, and sustainability. PMID:23411417

  4. Public Space, Public Waste, and the Right to the City.

    PubMed

    Chikarmane, Poornima

    2016-08-01

    I draw on my experiences as an organizer with a waste-pickers collective, Kagad Kach Patra Kashtakari Panchayat in Pune, India, to reflect on the power dynamics in control of public space. The Pune Municipal Corporation (PMC), a public body, has used public resources to facilitate and enable accumulation by private companies, who have not been able to produce what they had committed to in the processing of waste. The waste pickers, in alliance with affected village-based land agitation committees, have mobilized against the dumping that is ruining their way of life, environments, and health, and are fighting for their own integration into waste value chains. The article uses the frame of David Harvey's(1) "right to the city"; a key part of the mobilizing work with waste pickers has been Freirean conscientization methods to spread awareness of the economic importance, to the city and to the planet, of waste recycling. © The Author(s) 2016.

  5. Security Protection on Trust Delegated Data in Public Mobile Networks

    NASA Astrophysics Data System (ADS)

    Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.

  6. Parents, Practitioners, and Researchers: Community-Based Participatory Research With Early Head Start

    PubMed Central

    McAllister, Carol L.; Green, Beth L.; Terry, Martha Ann; Herman, Vivian; Mulvey, Laurie

    2003-01-01

    Community-based participatory research (CBPR) is an approach to research and evaluation that is receiving increased attention in the field of public health. Our report discusses the application of this approach to research and evaluation with an Early Head Start (EHS) program in Pittsburgh, Pa. Our primary purpose is to illustrate the key elements that contributed to effective collaboration among researchers, EHS practitioners, and parents of EHS children in the conduct of the study. The focus is not on research findings but on research process. Our goal is to make the practices of CBPR visible and explicit so they can be analyzed, further developed, and effectively applied to a range of public health issues in a diversity of community contexts. PMID:14534219

  7. Scenarios, personas and user stories: user-centered evidence-based design representations of communicable disease investigations.

    PubMed

    Turner, Anne M; Reeder, Blaine; Ramey, Judith

    2013-08-01

    Despite years of effort and millions of dollars spent to create unified electronic communicable disease reporting systems, the goal remains elusive. A major barrier has been a lack of understanding by system designers of communicable disease (CD) work and the public health workers who perform this work. This study reports on the application of user-centered design representations, traditionally used for improving interface design, to translate the complex CD work identified through ethnographic studies to guide designers and developers of CD systems. The purpose of this work is to: (1) better understand public health practitioners and their information workflow with respect to CD monitoring and control at a local health agency, and (2) to develop evidence-based design representations that model this CD work to inform the design of future disease surveillance systems. We performed extensive onsite semi-structured interviews, targeted work shadowing and a focus group to characterize local health agency CD workflow. Informed by principles of design ethnography and user-centered design we created persona, scenarios and user stories to accurately represent the user to system designers. We sought to convey to designers the key findings from ethnographic studies: (1) public health CD work is mobile and episodic, in contrast to current CD reporting systems, which are stationary and fixed, (2) health agency efforts are focused on CD investigation and response rather than reporting and (3) current CD information systems must conform to public health workflow to ensure their usefulness. In an effort to illustrate our findings to designers, we developed three contemporary design-support representations: persona, scenario, and user story. Through application of user-centered design principles, we were able to create design representations that illustrate complex public health communicable disease workflow and key user characteristics to inform the design of CD information systems for public health. Copyright © 2013 Elsevier Inc. All rights reserved.

  8. Exploring the Life Expectancy Increase in Poland in the Context of CVD Mortality Fall

    PubMed Central

    Kobza, Joanna; Geremek, Mariusz

    2015-01-01

    Life expectancy at birth is considered the best mortality-based summary indicator of the health status of the population and is useful for measuring long-term health changes. The objective of this article was to present the concept of the bottom-up policy risk assessment approach, developed to identify challenges involved in analyzing risk factor reduction policies and in assessing how the related health indicators have changed over time. This article focuses on the reasons of the significant life expectancy prolongation in Poland over the past 2 decades, thus includes policy context. The methodology details a bottom-up risk assessment approach, a chain of relations between the health outcome, risk factors, and health policy, based on Risk Assessment From Policy to Impact Dimension project guidance. A decline in cardiovascular disease mortality was a key factor that followed life expectancy prolongation. Among basic factors, tobacco and alcohol consumption, diet, physical activity, and new treatment technologies were identified. Poor health outcomes of the Polish population at the beginning of 1990s highlighted the need of the implementation of various health promotion programs, legal acts, and more effective public health policies. Evidence-based public health policy needs translating scientific research into policy and practice. The bottom-up case study template can be one of the focal tools in this process. Accountability for the health impact of policies and programs and legitimization of the decisions of policy makers has become one of the key questions nowadays in European countries’ decision-making process and in EU public health strategy. PMID:26546595

  9. A patient and public involvement (PPI) toolkit for meaningful and flexible involvement in clinical trials - a work in progress.

    PubMed

    Bagley, Heather J; Short, Hannah; Harman, Nicola L; Hickey, Helen R; Gamble, Carrol L; Woolfall, Kerry; Young, Bridget; Williamson, Paula R

    2016-01-01

    Funders of research are increasingly requiring researchers to involve patients and the public in their research. Patient and public involvement (PPI) in research can potentially help researchers make sure that the design of their research is relevant, that it is participant friendly and ethically sound. Using and sharing PPI resources can benefit those involved in undertaking PPI, but existing PPI resources are not used consistently and this can lead to duplication of effort. This paper describes how we are developing a toolkit to support clinical trials teams in a clinical trials unit. The toolkit will provide a key 'off the shelf' resource to support trial teams with limited resources, in undertaking PPI. Key activities in further developing and maintaining the toolkit are to: ● listen to the views and experience of both research teams and patient and public contributors who use the tools; ● modify the tools based on our experience of using them; ● identify the need for future tools; ● update the toolkit based on any newly identified resources that come to light; ● raise awareness of the toolkit and ● work in collaboration with others to either develop or test out PPI resources in order to reduce duplication of work in PPI. Background Patient and public involvement (PPI) in research is increasingly a funder requirement due to the potential benefits in the design of relevant, participant friendly, ethically sound research. The use and sharing of resources can benefit PPI, but available resources are not consistently used leading to duplication of effort. This paper describes a developing toolkit to support clinical trials teams to undertake effective and meaningful PPI. Methods The first phase in developing the toolkit was to describe which PPI activities should be considered in the pathway of a clinical trial and at what stage these activities should take place. This pathway was informed through review of the type and timing of PPI activities within trials coordinated by the Clinical Trials Research Centre and previously described areas of potential PPI impact in trials. In the second phase, key websites around PPI and identification of resources opportunistically, e.g. in conversation with other trialists or social media, were used to identify resources. Tools were developed where gaps existed. Results A flowchart was developed describing PPI activities that should be considered in the clinical trial pathway and the point at which these activities should happen. Three toolkit domains were identified: planning PPI; supporting PPI; recording and evaluating PPI. Four main activities and corresponding tools were identified under the planning for PPI: developing a plan; identifying patient and public contributors; allocating appropriate costs; and managing expectations. In supporting PPI, tools were developed to review participant information sheets. These tools, which require a summary of potential trial participant characteristics and circumstances help to clarify requirements and expectations of PPI review. For recording and evaluating PPI, the planned PPI interventions should be monitored in terms of impact, and a tool to monitor public contributor experience is in development. Conclusions This toolkit provides a developing 'off the shelf' resource to support trial teams with limited resources in undertaking PPI. Key activities in further developing and maintaining the toolkit are to: listen to the views and experience of both research teams and public contributors using the tools, to identify the need for future tools, to modify tools based on experience of their use; to update the toolkit based on any newly identified resources that come to light; to raise awareness of the toolkit and to work in collaboration with others to both develop and test out PPI resources in order to reduce duplication of work in PPI.

  10. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  11. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  12. The Fountain of Stem Cell-Based Youth? Online Portrayals of Anti-Aging Stem Cell Technologies.

    PubMed

    Rachul, Christen M; Percec, Ivona; Caulfield, Timothy

    2015-08-01

    The hype surrounding stem cell science has created a market opportunity for the cosmetic industry. Cosmetic and anti-aging products and treatments that make claims regarding stem cell technology are increasingly popular, despite a lack of evidence for safety and efficacy of such products. This study explores how stem cell-based products and services are portrayed to the public through online sources, in order to gain insight into the key messages available to consumers. A content analysis of 100 web pages was conducted to examine the portrayals of stem cell-based cosmetic and anti-aging products and treatments. A qualitative discourse analysis of one web page further examined how language contributes to the portrayals of these products and treatments to public audiences. The majority of web pages portrayed stem cell-based products as ready for public use. Very few web pages substantiated claims with scientific evidence, and even fewer mentioned any risks or limitations associated with stem cell science. The discourse analysis revealed that the framing and use of metaphor obscures the certainty of the efficacy of and length of time for stem cell-based anti-aging technology to be publicly available. This study highlights the need to educate patients and the public on the current limits of stem cell applications in this context. In addition, generating scientific evidence for stem cell-based anti-aging and aesthetic applications is needed for optimizing benefits and minimizing adverse effects for the public. Having more evidence on efficacy and risks will help to protect patients who are eagerly seeking out these treatments. © 2015 The American Society for Aesthetic Plastic Surgery, Inc. Reprints and permission: journals.permissions@oup.com.

  13. Human action recognition based on spatial-temporal descriptors using key poses

    NASA Astrophysics Data System (ADS)

    Hu, Shuo; Chen, Yuxin; Wang, Huaibao; Zuo, Yaqing

    2014-11-01

    Human action recognition is an important area of pattern recognition today due to its direct application and need in various occasions like surveillance and virtual reality. In this paper, a simple and effective human action recognition method is presented based on the key poses of human silhouette and the spatio-temporal feature. Firstly, the contour points of human silhouette have been gotten, and the key poses are learned by means of K-means clustering based on the Euclidean distance between each contour point and the centre point of the human silhouette, and then the type of each action is labeled for further match. Secondly, we obtain the trajectories of centre point of each frame, and create a spatio-temporal feature value represented by W to describe the motion direction and speed of each action. The value W contains the information of location and temporal order of each point on the trajectories. Finally, the matching stage is performed by comparing the key poses and W between training sequences and test sequences, the nearest neighbor sequences is found and its label supplied the final result. Experiments on the public available Weizmann datasets show the proposed method can improve accuracy by distinguishing amphibious poses and increase suitability for real-time applications by reducing the computational cost.

  14. Basis for the development of sustainable optimisation indicators for activated sludge wastewater treatment plants in the Republic of Ireland.

    PubMed

    Gordon, G T; McCann, B P

    2015-01-01

    This paper describes the basis of a stakeholder-based sustainable optimisation indicator (SOI) system to be developed for small-to-medium sized activated sludge (AS) wastewater treatment plants (WwTPs) in the Republic of Ireland (ROI). Key technical publications relating to best practice plant operation, performance audits and optimisation, and indicator and benchmarking systems for wastewater services are identified. Optimisation studies were developed at a number of Irish AS WwTPs and key findings are presented. A national AS WwTP manager/operator survey was carried out to verify the applied operational findings and identify the key operator stakeholder requirements for this proposed SOI system. It was found that most plants require more consistent operational data-based decision-making, monitoring and communication structures to facilitate optimised, sustainable and continuous performance improvement. The applied optimisation and stakeholder consultation phases form the basis of the proposed stakeholder-based SOI system. This system will allow for continuous monitoring and rating of plant performance, facilitate optimised operation and encourage the prioritisation of performance improvement through tracking key operational metrics. Plant optimisation has become a major focus due to the transfer of all ROI water services to a national water utility from individual local authorities and the implementation of the EU Water Framework Directive.

  15. Key enablers to facilitate healthy behavior change: workshop summary.

    PubMed

    Teyhen, Deydre S; Aldag, Matt; Centola, Damon; Edinborough, Elton; Ghannadian, Jason D; Haught, Andrea; Jackson, Theresa; Kinn, Julie; Kunkler, Kevin J; Levine, Betty; Martindale, Valerie E; Neal, David; Snyder, Leslie B; Styn, Mindi A; Thorndike, Frances; Trabosh, Valerie; Parramore, David J

    2014-05-01

    The increases in preventable chronic diseases and the rising costs of health care are unsustainable. The US Army Surgeon General's vision to transition from a health care system to a system of health requires the identification of key health enablers to facilitate the adoption of healthy behaviors. In support of this vision, the US Army Telemedicine and Advanced Technology Research Center hosted a workshop in April 2013 titled "Incentives to Create and Sustain Change for Health." Members of government and academia participated to identify key health enablers that could ultimately be leveraged by technology. The key health enablers discussed included (1) public health messaging, (2) changing health habits and the environmental influence on health, (3) goal setting and tracking, (4) the role of incentives in behavior-change intervention, and (5) the role of peer and social networks on change. This report summarizes leading evidence and the group consensus on evidence-based practices with respect to the key enablers in creating healthy behavior change.

  16. [Glocalization: the outlook for Taiwan evidence based health care].

    PubMed

    Chen, Chiehfeng

    2014-12-01

    Public attention to evidence-based health care (EBHC) has increased significantly in recent years. Key problems related to applying EBHC in current healthcare practice include the timely update of up-to-date knowledge and skills and the methodology used to implement EBHC in clinical settings. EBHC has been introduced to the Taiwan healthcare system for the past two decades. The annual EBM (Evidence based medicine) National Competition is a unique and important EBHC activity in Taiwan. EBHC has been promoted widely in medicine, nursing, pharmacy, public health and other professions, and EBHC-related organizations such as the Taiwan Evidence Based Medicine Association (TEBMA), and Taiwan Evidence Based Nursing Association (TEBNA), have increased in number and grown in membership. In addition to domestic developments, Taiwan is also actively involved in global organizations, such as the Cochrane Collaboration, East Asian Cochrane Alliance (EACA), and the International Society for Evidence Based Health Care (ISEHC). In Taiwan, most medical professionals work cooperatively to promote EBHC, which facilitates the gradual improvement of healthcare quality.

  17. GNSS-based emergency management system

    NASA Astrophysics Data System (ADS)

    Wu, Yuhang; Chen, Xiuwan; Ma, Lei

    2009-06-01

    Public safety and public service is a particularly challenging task. The questions of how to use the limited resources efficiently, how to improve the Government's emergency rapid response and ability of risk resistance, and how to provide a more efficient emergency service for the public, have increasingly become the focus to strengthen urban management. Emergency Response Management System is a highly efficient and powerful command system dealing with natural and social disasters, by using all aspects of the force being gathered in a short period of time, sudden events can be handled efficiently, and further development of the incident can be controlled. In this paper, based on the analysis of development status of the emergency management system at home and abroad, and the key technologies of the emergency management system based on GNSS, research and development on emergency command system based on GNSS has been done. Meanwhile, test in Sichuan earthquake has also been carried out. Practice in Sichuan province earthquake relief work has proved that the emergency management command system based on GNSS can play the advantage function and exert the maximum potential, and can play the role of "lifeline" in the critical moment.

  18. PRISM: Priority Symptom Management Project phase I: assessment.

    PubMed

    Ropka, M E; Spencer-Cisek, P

    2001-01-01

    To provide an overview of the process, goals, and outcome recommendations from the assessment phase of the Oncology Nursing Society's Priority Symptom Management (PRISM) project and to provide the foundation for a series of evidence-based practice and qualitative systematic review articles generated from the first phase of PRISM. Published articles, abstracts, and books; computerized databases; nonpublished research; personal communications; and proceedings of the PRISM summit meeting. Symptom management is a key component in quality cancer care. The assessment phase of PRISM yielded systematic reviews with an evidence-based framework to evaluate key symptoms, developed a framework for teaching and evaluating other symptoms, and recommended future ONS initiatives. Outcome recommendations from the PRISM summit targeted practice; professional and public education; research; and health policy. These activities provide background for subsequent evidence-based practice and qualitative systematic review articles that will focus on cancer symptom management.

  19. [Modeling in value-based medicine].

    PubMed

    Neubauer, A S; Hirneiss, C; Kampik, A

    2010-03-01

    Modeling plays an important role in value-based medicine (VBM). It allows decision support by predicting potential clinical and economic consequences, frequently combining different sources of evidence. Based on relevant publications and examples focusing on ophthalmology the key economic modeling methods are explained and definitions are given. The most frequently applied model types are decision trees, Markov models, and discrete event simulation (DES) models. Model validation includes besides verifying internal validity comparison with other models (external validity) and ideally validation of its predictive properties. The existing uncertainty with any modeling should be clearly stated. This is true for economic modeling in VBM as well as when using disease risk models to support clinical decisions. In economic modeling uni- and multivariate sensitivity analyses are usually applied; the key concepts here are tornado plots and cost-effectiveness acceptability curves. Given the existing uncertainty, modeling helps to make better informed decisions than without this additional information.

  20. How can health ministries present persuasive investment plans for women’s, children’s and adolescents’ health?

    PubMed Central

    Maliqi, Blerta; Axelson, Henrik; Ostergren, Mikael

    2016-01-01

    Abstract Most low- and middle-income countries face financing pressures if they are to adequately address the recommendations of the Global Strategy for Women’s, Children’s and Adolescent’s Health. Negotiations between government ministries of health and finance are a key determinant of the level and effectiveness of public expenditure in the health sector. Yet ministries of health in low- and middle-income countries do not always have a good record in obtaining additional resources from key decision-making institutions. This is despite the strong evidence about the affordability and cost–effectiveness of many public health interventions and of the economic returns of investing in health. This article sets out 10 attributes of effective budget requests that can address the analytical needs and perspectives of ministries of finance and other financial decision-makers. We developed the list based on accepted economic principles, a literature review and a workshop in June 2015 involving government officials and other key stakeholders from low- and middle-income countries. The aim is to support ministries of health to present a more strategic and compelling plan for investments in the health of women, children and adolescents. PMID:27274599

  1. How can health ministries present persuasive investment plans for women's, children's and adolescents' health?

    PubMed

    Anderson, Ian; Maliqi, Blerta; Axelson, Henrik; Ostergren, Mikael

    2016-06-01

    Most low- and middle-income countries face financing pressures if they are to adequately address the recommendations of the Global Strategy for Women's, Children's and Adolescent's Health. Negotiations between government ministries of health and finance are a key determinant of the level and effectiveness of public expenditure in the health sector. Yet ministries of health in low- and middle-income countries do not always have a good record in obtaining additional resources from key decision-making institutions. This is despite the strong evidence about the affordability and cost-effectiveness of many public health interventions and of the economic returns of investing in health. This article sets out 10 attributes of effective budget requests that can address the analytical needs and perspectives of ministries of finance and other financial decision-makers. We developed the list based on accepted economic principles, a literature review and a workshop in June 2015 involving government officials and other key stakeholders from low- and middle-income countries. The aim is to support ministries of health to present a more strategic and compelling plan for investments in the health of women, children and adolescents.

  2. The North American model and captive cervid facilities—What is the threat?

    USGS Publications Warehouse

    Organ, John F.; Decker, Thomas A.; Lama, Tanya M.

    2016-01-01

    The North American Model of Wildlife Conservation represents the key principles that in combination resulted in a distinct form of wildlife conservation in the United States and Canada. How and to what extent captive cervid facilities comport with or conflict with these principles has implications for wildlife conservation. Greatest threats appear to be toward principles of public ownership of wildlife, allocation of wildlife by law, and in policy decisions based on science. Captive cervid facilities have potential to contribute to erosion of the underlying principles of the Model and could undermine public support for conservation initiatives.

  3. Using metaphor to translate the science of resilience and developmental outcomes.

    PubMed

    Kendall-Taylor, Nathaniel; Haydon, Abigail

    2016-07-01

    Developmental scientists have used a variety of linguistic devices to communicate the science of resilience, but their effectiveness at improving understanding and expanding support for evidence-based social policies has not been empirically tested. We describe the process of developing, testing, and refining an Explanatory Metaphor to communicate the science of resilience to the public and policymakers. We argue that public understanding is key to bridging the research-to-practice divide and that communications is a social science endeavor in its own right that requires careful empirical research. © The Author(s) 2014.

  4. [Collective oral health: ways from sanitary dentistry to buccality].

    PubMed

    Narvai, Paulo Capel

    2006-08-01

    This essay focuses on the pioneer activities of public health dentistry in Brazil and its evolution in the 20th century with emphasis on the emergency of a landmark, the sanitary dentistry. Social and preventive dentistry and market dentistry, with reference to the main theoretical works representative of these trends, are presented. The essential characteristics of collective oral health (Brazilian variant of public health dentistry) and buccality are presented. The relationship between collective oral health and collective health as well as the implications of the buccality concept for the development of public health dentistry actions and new guidance of clinical practice in public services of the Brazilian Health System (SUS) are discussed. The key elements of an agenda for collective oral health based on proposals presented at the 3rd National Conference on Oral Health are addressed.

  5. Commentary on the new sex and gender editorial policy of the Canadian Journal of Public Health.

    PubMed

    Gahagan, Jacqueline

    2016-08-15

    While the concepts of both "sex" and "gender" are widely recognized as important considerations in health research, the presence of these and other key determinants of health in research findings remains quite variable in the published literature. In an effort to close this knowledge gap in relation to the implications of both sex and gender in the public health research evidence base, the Canadian Journal of Public Health (CJPH) has recently adopted an editorial policy requiring authors to ensure that their manuscripts speak to these concepts, where applicable. In keeping with the international trend in sex and gender reporting in health research, the aim of this policy shift is for CJPH to continue to advance excellence in the field of public health research, policy and practice in Canada and internationally.

  6. The Dissemination of Teacher Learning: A Study of the Similarities and Differences between Public School Levels and Locations

    ERIC Educational Resources Information Center

    Krohn, Jacqueline M.

    2010-01-01

    Teacher learning, whether in-service, continued education, or experience based, is a key component of school reform. Specific research on the use of teacher learning to improve student achievement and instructional practices in and across schools is limited. The research questions addressed in this study were: (a) the degree to which teacher…

  7. Private Tutoring in Wales: Patterns of Private Investment and Public Provision

    ERIC Educational Resources Information Center

    Pearce, Sioned; Power, Sally; Taylor, Chris

    2018-01-01

    This paper seeks to contribute to the growing research base about the extent and significance of "shadow education" through drawing on data from a national survey of over 1000 key stage 2, 3 and 4 pupils in Wales and over 200 of their parents. Wales provides an important lens to look at shadow education because of the political…

  8. ALPHABET "Ante Portas": How English Text Invades Japanese Public Space

    ERIC Educational Resources Information Center

    Backhaus, Peter

    2007-01-01

    This paper examines the prominence of written English on shop signs in Japan. Based on data from a larger empirical study into multilingual signs in Tokyo, the most common ways of using English and the roman alphabet on Japanese shops signs are identified. It is argued that the ambivalent nature of English loan words plays a key role in the ever…

  9. Social Capital and Educational Organizing in Low Income, Minority, and New Immigrant Communities: Can the University Strengthen Community Organizations?

    ERIC Educational Resources Information Center

    Krasner, Michael Alan; Pierre-Louis, Francois

    2009-01-01

    A college-based program that combines training, direct support, and technical assistance was found to produce significant gains in bonding and bridging social capital and key political attributes among low-income, minority, and immigrant groups organizing to enhance their power to influence public school politics and policies in New York City.…

  10. When Does Accountability Work? Texas System Had Mixed Effects on College Graduation Rates and Future Earnings

    ERIC Educational Resources Information Center

    Deming, David J.; Cohodes, Sarah; Jennings, Jennifer; Jencks, Christopher

    2016-01-01

    When congress passed the No Child Left Behind Act of 2001 (NCLB), standardized testing in public schools became the law of the land. The ambitious legislation identified test-based accountability as the key to improving schools and, by extension, the long-term prospects of American schoolchildren. Thirteen years later, the debate over the federal…

  11. Hydrodynamic Sensing Based on Surface-Modified Flexible Nanocomposite Film

    NASA Astrophysics Data System (ADS)

    Shu, Yi; Tian, He; Wang, Zhe; Zhao, Hai-Ming; Mi, Wen-Tian; Li, Yu-Xing; Cao, Hui-Wen; Ren, Tian-Ling

    2015-11-01

    Not Available Supported by the National Natural Science Foundation under Grant No 61434001 and 61574083, the National Basic Research Program of China under Grant No 2015CB352100, the National Key Project of Science and Technology under Grant No 2011ZX02403-002, and the Special Fund for Agroscientic Research in the Public Interest of China under Grant No 201303107.

  12. Listing of data systems elements authorities

    NASA Technical Reports Server (NTRS)

    1977-01-01

    The NASA personnel have a need to be aware of and to interact with key technical experts in all areas of data systems. This report presents a partial listing (names, addresses and telephone numbers) of individuals known to be authorities in selected areas of data systems of interest to NASA. The listings are based primarily on recent publications by the named individuals.

  13. Understanding the organization of public health delivery systems: an empirical typology.

    PubMed

    Mays, Glen P; Scutchfield, F Douglas; Bhandari, Michelyn W; Smith, Sharla A

    2010-03-01

    Policy discussions about improving the U.S. health care system increasingly recognize the need to strengthen its capacities for delivering public health services. A better understanding of how public health delivery systems are organized across the United States is critical to improvement. To facilitate the development of such evidence, this article presents an empirical method of classifying and comparing public health delivery systems based on key elements of their organizational structure. This analysis uses data collected through a national longitudinal survey of local public health agencies serving communities with at least 100,000 residents. The survey measured the availability of twenty core public health activities in local communities and the types of organizations contributing to each activity. Cluster analysis differentiated local delivery systems based on the scope of activities delivered, the range of organizations contributing, and the distribution of effort within the system. Public health delivery systems varied widely in organizational structure, but the observed patterns of variation suggested that systems adhere to one of seven distinct configurations. Systems frequently migrated from one configuration to another over time, with an overall trend toward offering a broader scope of services and engaging a wider range of organizations. Public health delivery systems exhibit important structural differences that may influence their operations and outcomes. The typology developed through this analysis can facilitate comparative studies to identify which delivery system configurations perform best in which contexts.

  14. Beyond efficacy: The full public health impact of vaccines.

    PubMed

    Saadatian-Elahi, Mitra; Horstick, Olaf; Breiman, Robert F; Gessner, Bradford D; Gubler, Duane J; Louis, Jacques; Parashar, Umesh D; Tapia, Roberto; Picot, Valentina; Zinsou, Jean-Antoine; Nelson, Christopher B

    2016-02-24

    There is an active discussion in the public health community on how to assess and incorporate, in addition to safety and measures of protective efficacy, the full public health value of preventive vaccines into the evidence-based decision-making process of vaccine licensure and recommendations for public health use. The conference "Beyond efficacy: the full public health impact of vaccines in addition to efficacy measures in trials" held in Annecy, France (June 22-24, 2015) has addressed this issue and provided recommendations on how to better capture the whole public health impact of vaccines. Using key examples, the expert group stressed that we are in the midst of a new paradigm in vaccine evaluation, where all aspects of public health value of vaccines beyond efficacy should be evaluated. To yield a wider scope of vaccine benefits, additional measures such as vaccine preventable disease incidence, overall efficacy and other outcomes such as under-five mortality or non-etiologically confirmed clinical syndromes should be assessed in addition to traditional efficacy or effectiveness measurements. Dynamic modelling and the use of probe studies should also be considered to provide additional insight to the full public health value of a vaccine. The use of burden reduction and conditional licensure of vaccines based on collection of outcome results should be considered by regulatory agencies. Copyright © 2016. Published by Elsevier Ltd.. All rights reserved.

  15. Where Public Health Meets Human Rights

    PubMed Central

    Kiragu, Karusa; Sawicki, Olga; Smith, Sally; Brion, Sophie; Sharma, Aditi; Mworeko, Lilian; Iovita, Alexandrina

    2017-01-01

    Abstract In 2014, the World Health Organization (WHO) initiated a process for validation of the elimination of mother-to-child transmission (EMTCT) of HIV and syphilis by countries. For the first time in such a process for the validation of disease elimination, WHO introduced norms and approaches that are grounded in human rights, gender equality, and community engagement. This human rights-based validation process can serve as a key opportunity to enhance accountability for human rights protection by evaluating EMTCT programs against human rights norms and standards, including in relation to gender equality and by ensuring the provision of discrimination-free quality services. The rights-based validation process also involves the assessment of participation of affected communities in EMTCT program development, implementation, and monitoring and evaluation. It brings awareness to the types of human rights abuses and inequalities faced by women living with, at risk of, or affected by HIV and syphilis, and commits governments to eliminate those barriers. This process demonstrates the importance and feasibility of integrating human rights, gender, and community into key public health interventions in a manner that improves health outcomes, legitimizes the participation of affected communities, and advances the human rights of women living with HIV. PMID:29302179

  16. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  17. Counterproductive Consequences of a Conservative Ideology: Medicaid Expansion and Personal Responsibility Requirements.

    PubMed

    Baker, Allison M; Hunt, Linda M

    2016-07-01

    Medicaid expansion, a key part of the Affordable Care Act, has been opposed by conservative politicians despite its fiscal and public health benefits. In response, some Republican-led states have expanded Medicaid with new reforms, including requirements for cost sharing and behavioral incentives, that promote conservative political values tied to an ideology of personal responsibility. We examine this trend using Michigan's Medicaid expansion as a case example. We explore the origins, evidence base, and possible consequences of these reforms. We argue that these reforms prioritize ideology over sound public health knowledge, deflecting attention away from the social, economic, and structural factors that influence the health of the poor, and may ultimately contribute to counterproductive public health and fiscal outcomes.

  18. Improving Public Perception of Behavior Analysis.

    PubMed

    Freedman, David H

    2016-05-01

    The potential impact of behavior analysis is limited by the public's dim awareness of the field. The mass media rarely cover behavior analysis, other than to echo inaccurate negative stereotypes about control and punishment. The media instead play up appealing but less-evidence-based approaches to problems, a key example being the touting of dubious diets over behavioral approaches to losing excess weight. These sorts of claims distort or skirt scientific evidence, undercutting the fidelity of behavior analysis to scientific rigor. Strategies for better connecting behavior analysis with the public might include reframing the field's techniques and principles in friendlier, more resonant form; pushing direct outcome comparisons between behavior analysis and its rivals in simple terms; and playing up the "warm and fuzzy" side of behavior analysis.

  19. Across the Atlantic cooperation to address international challenges in eHealth and health IT: managing toward a common goal.

    PubMed

    Friedman, Charles P; Iakovidis, Ilias; Debenedetti, Laurent; Lorenzi, Nancy M

    2009-11-01

    Countries on both sides of the Atlantic Ocean have invested in health information and communication technologies. Since eHealth challenges cross borders a European Union-United States of America conference on public policies relating to health IT and eHealth was held October 20-21, 2008 in Paris, France. The conference was organized around the four themes: (1) privacy and security, (2) health IT interoperability, (3) deployment and adoption of health IT, and (4) Public Private Collaborative Governance. The four key themes framed the discussion over the two days of plenary sessions and workshops. Key findings of the conference were organized along the four themes. (1) Privacy and security: Patients' access to their own data and key elements of a patient identification management framework were discussed. (2) Health IT interoperability: Three significant and common interoperability challenges emerged: (a) the need to establish common or compatible standards and clear guidelines for their implementation, (b) the desirability for shared certification criteria and (c) the need for greater awareness of the importance of interoperability. (3) Deployment and adoption of health IT: Three major areas of need emerged: (a) a shared knowledge base and assessment framework, (b) public-private collaboration and (c) and effective organizational change strategies. (4) Public Private Collaborative Governance: Sharing and communication are central to success in this area. Nations can learn from one another about ways to develop harmonious, effective partnerships. Three areas that were identified as highest priority for collaboration included: (1) health data security, (2) developing effective strategies to ensure healthcare professionals' acceptance of health IT tools, and (3) interoperability.

  20. A Critical Evaluation of Waste Incineration Plants in Wuhan (China) Based on Site Selection, Environmental Influence, Public Health and Public Participation

    PubMed Central

    Hu, Hui; Li, Xiang; Nguyen, Anh Dung; Kavan, Philip

    2015-01-01

    With the rapid development of the waste incineration industry in China, top priority has been given to the problem of pollution caused by waste incineration. This study is the first attempt to assess all the waste incineration plants in Wuhan, the only national key city in central China, in terms of environmental impact, site selection, public health and public participation. By using a multi-criterion assessment model for economic, social, public health and environmental effects, this study indicates these incineration plants are established without much consideration of the local residents’ health and environment. A location analysis is also applied and some influences of waste incineration plants are illustrated. This study further introduces a signaling game model to prove that public participation is a necessary condition for improving the environmental impact assessment and increasing total welfare of different interest groups in China. This study finally offers some corresponding recommendations for improving the environmental impact assessments of waste incineration projects. PMID:26184242

  1. A Critical Evaluation of Waste Incineration Plants in Wuhan (China) Based on Site Selection, Environmental Influence, Public Health and Public Participation.

    PubMed

    Hu, Hui; Li, Xiang; Nguyen, Anh Dung; Kavan, Philip

    2015-07-08

    With the rapid development of the waste incineration industry in China, top priority has been given to the problem of pollution caused by waste incineration. This study is the first attempt to assess all the waste incineration plants in Wuhan, the only national key city in central China, in terms of environmental impact, site selection, public health and public participation. By using a multi-criterion assessment model for economic, social, public health and environmental effects, this study indicates these incineration plants are established without much consideration of the local residents' health and environment. A location analysis is also applied and some influences of waste incineration plants are illustrated. This study further introduces a signaling game model to prove that public participation is a necessary condition for improving the environmental impact assessment and increasing total welfare of different interest groups in China. This study finally offers some corresponding recommendations for improving the environmental impact assessments of waste incineration projects.

  2. Downscaling U.S. public opinion about climate change and the 'Six Americas' to states, cities, and counties

    NASA Astrophysics Data System (ADS)

    Marlon, J. R.; Howe, P. D.; Leiserowitz, A.

    2013-12-01

    For climate change communication to be most effective, messages should be targeted to the characteristics of local audiences. In the U.S., 'Six Americas' have been identified among the public based on their response to the climate change issue. The distribution of these different 'publics' varies between states and communities, yet data about public opinion at the sub-national scale remains scarce. In this presentation, we describe a methodology to statistically downscale results from national-level surveys about the Six Americas, climate literacy, and other aspects of public opinion to smaller areas, including states, metropolitan areas, and counties. The method utilizes multilevel regression with poststratification (MRP) to model public opinion at various scales using a large national-level survey dataset. We present state and county-level estimates of two key beliefs about climate change: belief that climate change is happening, and belief in the scientific consensus about climate change. We further present estimates of how the Six Americas vary across the U.S.

  3. Critical review of the United Kingdom's "gold standard" survey of public attitudes to science.

    PubMed

    Smith, Benjamin K; Jensen, Eric A

    2016-02-01

    Since 2000, the UK government has funded surveys aimed at understanding the UK public's attitudes toward science, scientists, and science policy. Known as the Public Attitudes to Science series, these surveys and their predecessors have long been used in UK science communication policy, practice, and scholarship as a source of authoritative knowledge about science-related attitudes and behaviors. Given their importance and the significant public funding investment they represent, detailed academic scrutiny of the studies is needed. In this essay, we critically review the most recently published Public Attitudes to Science survey (2014), assessing the robustness of its methods and claims. The review casts doubt on the quality of key elements of the Public Attitudes to Science 2014 survey data and analysis while highlighting the importance of robust quantitative social research methodology. Our analysis comparing the main sample and booster sample for young people demonstrates that quota sampling cannot be assumed equivalent to probability-based sampling techniques. © The Author(s) 2016.

  4. Climate Literacy Partnership in the Southeast (CLiPSE): A Focus on Climate Change-related Dialogs with Faith-Based Groups as a form of Network Building in the Southeast United States - Lessons Learned

    NASA Astrophysics Data System (ADS)

    Carroll, F. J.; McNeal, K. S.; Hammerman, J.; Christiansen, J.

    2013-05-01

    The Climate Literacy Partnership in the Southeast (CLiPSE, http://CLiPSE-project.org), funded through the National Science Foundation Climate Change Education Partnership program, is dedicated to improving climate literacy in the Southeastern United States (SE US). By promoting science-based formal and informal educational resources, CLiPSE works through a diverse network of key partner organizations in the SE US to conduct effective public dialogues that address diverse audiences and support learning about climate, climate change, and its impact on human and environmental systems. The CLiPSE project successfully created partnerships with more than fifty key stakeholders, including agriculture, education, leisure, and religious organizations, along with culturally diverse communities. This presentation will explain the CLiPSE model for reaching key publics who hold traditional ideologies typically perceived as incompatible with climate change science. We will discuss the results of our interactions with the leaders of our partnering organizations, their knowledge, perceptions, needs, and input in crafting effective messages for their audiences, through addressing both learners' affective and cognitive domains. For the informal education sector, CLiPSE utilized several open discussion and learning forums aimed to promote critical thinking and civil conversation about climate change. Focusing on Faith-based audiences, a key demographic, in the Southeast US, CLiPSE also conducted an online, moderated, author-attended book study, discussing the thoughts and ideas contained in the work, "Green Like God," by Jonathan Merritt. We will share the questions we faced as we focused on and learned about faith-based audiences, such as: What are the barriers and opportunities?; How do we break out of the assumptions that we have to find the common ground?; How do the audiences understand the issues?; How do we understand the issues?; What common language can we find?; What happens when we bringing the multiple the multiple identities of faith and science together within ourselves and those we are trying to build relationships with? We will also share the lessons we learned while attempting to answer these questions, such as the role of trust and key influentials/leaders in talking with target audiences, the importance of face-to-face dialog and relationships in trust building.

  5. The construction of a public key infrastructure for healthcare information networks in Japan.

    PubMed

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  6. Challenges in defining an optimal approach to formula-based allocations of public health funds in the United States.

    PubMed

    Buehler, James W; Holtgrave, David R

    2007-03-29

    Controversy and debate can arise whenever public health agencies determine how program funds should be allocated among constituent jurisdictions. Two common strategies for making such allocations are expert review of competitive applications and the use of funding formulas. Despite widespread use of funding formulas by public health agencies in the United States, formula allocation strategies in public health have been subject to relatively little formal scrutiny, with the notable exception of the attention focused on formula funding of HIV care programs. To inform debates and deliberations in the selection of a formula-based approach, we summarize key challenges to formula-based funding, based on prior reviews of federal programs in the United States. The primary challenge lies in identifying data sources and formula calculation methods that both reflect and serve program objectives, with or without adjustments for variations in the cost of delivering services, the availability of local resources, capacity, or performance. Simplicity and transparency are major advantages of formula-based allocations, but these advantages can be offset if formula-based allocations are perceived to under- or over-fund some jurisdictions, which may result from how guaranteed minimum funding levels are set or from "hold-harmless" provisions intended to blunt the effects of changes in formula design or random variations in source data. While fairness is considered an advantage of formula-based allocations, the design of a formula may implicitly reflect unquestioned values concerning equity versus equivalence in setting funding policies. Whether or how past or projected trends are taken into account can also have substantial impacts on allocations. Insufficient attention has been focused on how the approach to designing funding formulas in public health should differ for treatment or service versus prevention programs. Further evaluations of formula-based versus competitive allocation methods are needed to promote the optimal use of public health funds. In the meantime, those who use formula-based strategies to allocate funds should be familiar with the nuances of this approach.

  7. A physiome standards-based model publication paradigm.

    PubMed

    Nickerson, David P; Buist, Martin L

    2009-05-28

    In this era of widespread broadband Internet penetration and powerful Web browsers on most desktops, a shift in the publication paradigm for physiome-style models is envisaged. No longer will model authors simply submit an essentially textural description of the development and behaviour of their model. Rather, they will submit a complete working implementation of the model encoded and annotated according to the various standards adopted by the physiome project, accompanied by a traditional human-readable summary of the key scientific goals and outcomes of the work. While the final published, peer-reviewed article will look little different to the reader, in this new paradigm, both reviewers and readers will be able to interact with, use and extend the models in ways that are not currently possible. Here, we review recent developments that are laying the foundations for this new model publication paradigm. Initial developments have focused on the publication of mathematical models of cellular electrophysiology, using technology based on a CellML- or Systems Biology Markup Language (SBML)-encoded implementation of the mathematical models. Here, we review the current state of the art and what needs to be done before such a model publication becomes commonplace.

  8. Health impacts of climate change and health and social inequalities in the UK.

    PubMed

    Paavola, Jouni

    2017-12-05

    This article examines how social and health inequalities shape the health impacts of climate change in the UK, and what the implications are for climate change adaptation and health care provision. The evidence generated by the other articles of the special issue were interpreted using social justice reasoning in light of additional literature, to draw out the key implications of health and social inequalities for health outcomes of climate change. Exposure to heat and cold, air pollution, pollen, food safety risks, disruptions to access to and functioning of health services and facilities, emerging infections and flooding are examined as the key impacts of climate change influencing health outcomes. Age, pre-existing medical conditions and social deprivation are found to be the key (but not only) factors that make people vulnerable and to experience more adverse health outcomes related to climate change impacts. In the future, climate change, aging population and decreasing public spending on health and social care may aggravate inequality of health outcomes related to climate change. Health education and public preparedness measures that take into account differential exposure, sensitivity and adaptive capacity of different groups help address health and social inequalities to do with climate change. Adaptation strategies based on individual preparedness, action and behaviour change may aggravate health and social inequalities due to their selective uptake, unless they are coupled with broad public information campaigns and financial support for undertaking adaptive measures.

  9. Bridging the Divide: Challenges and Opportunities for Public Sector Agricultural Professionals Working with Amish and Mennonite Producers on Conservation.

    PubMed

    Brock, Caroline; Ulrich-Schad, Jessica D; Prokopy, Linda

    2018-05-01

    As Amish and Old Order and Conservative Mennonite (i.e., Plain) farmers increase their presence in the agricultural sector, it is crucial for public sector agricultural professionals to effectively work with them to mediate nonpoint source pollution and address issues like the hypoxic zone in the Gulf of Mexico. However, there is a dearth of research on how public sector agricultural professionals can better work with Plain producers on environmental management. There are also few training resources for those working with this key, yet hard to reach, population. Additionally, due to their religious doctrines, Plain communities strive to live apart from the "world" and may be discouraged from working with government entities and attending non-Plain people events. This study analyzes interview data from 23 Amish farmers in one region of Indiana and 18 public sector agricultural professionals from a variety of backgrounds and geographies in areas of the U.S. with heavy Plain populations. Public sector agricultural professionals identified some key agronomic challenges on Plain farms related to issues like poor pasture and manure management as well as socio-cultural challenges such as restrictions on electronic and phone communication. Educators should design outreach strategies that take into consideration that faith convictions and conservation concerns may vary greatly based on the specificities of the particular Plain church group. By better understanding this population and how to work with them, public sector agricultural professionals can more effectively work towards addressing environmental problems with this under-served group.

  10. The Impact of Public Health Awareness Campaigns on the Awareness and Quality of Palliative Care.

    PubMed

    Seymour, Jane

    2018-01-01

    The right to health includes a right of access to good quality palliative care, but inequalities persist. Raising awareness is a key plank of the public health approach to palliative care, but involves consideration of subjects most of us prefer not to address. This review addresses the question: "do public health awareness campaigns effectively improve the awareness and quality of palliative care"? The evidence shows that public awareness campaigns can improve awareness of palliative care and probably improve quality of care, but there is a lack of evidence about the latter. Rapid review and synthesis. A comprehensive public awareness campaign about palliative care (including advance care planning and end-of-life decision making) should be based on clear and shared terminology, use well piloted materials, and the full range of mass media to suit different ages, cultures, and religious/spiritual perspectives. Arts and humanities have a role to play in allowing individuals and communities to express experiences of illness, death, and grief and encourage conversation and thoughtful reflection. There is evidence about key factors for success: targeting, networking, and use of specific, measurable, achievable, realistic time-bound objectives; continuous evaluation; and complementarity to national and international policy. Campaigns should be located within the framework of public health promotion and the synergy between short national mass media campaigns and longer term local community action initiatives carefully considered. National and local projects to raise awareness should identify and address any barriers at the level of individuals, communities, and systems of care, for example, literacy skills and unequal access to resources.

  11. Paradigms in epidemiology textbooks: in the footsteps of Thomas Kuhn.

    PubMed Central

    Bhopal, R

    1999-01-01

    This article attempts to contribute to the debate on the future of epidemiology by combining Thomas Kuhn's ideas on scientific paradigms with the author's observations on some epidemiology textbooks. The author's interpretations were based on his readings of Kuhn's The Structure of Scientific Revolutions, epidemiology textbooks, and papers on the future of epidemiology. Thomas Kuhn's view is that sciences mostly work with a single paradigm driven by exemplars of successful work, and that proposals for paradigm change are resisted. Sciences that are maturing or changing do not have a dominant paradigm. Epidemiology textbooks showed diversity in their concepts, content, and approach. Most exemplars related to etiologic research rather than public health practice. One key focus of the recent controversy regarding the role of epidemiology has been the increasing inability of epidemiology to solve socially based public health problems. Kuhn's views help explain the polarization of views expressed. Kuhn's philosophy of science offers insights into controversies such as whether a paradigm shift is needed or imminent and the gap between epidemiology and public health practice. Interaction between science philosophers, epidemiologists, and public health practitioners may be valuable. PMID:10432899

  12. Smart governance for smart city

    NASA Astrophysics Data System (ADS)

    Mutiara, Dewi; Yuniarti, Siti; Pratama, Bambang

    2018-03-01

    Some of the local government in Indonesia claimed they already created a smart city. Mostly the claim based of IT utilization for their governance. In general, a smart city definition is to describe a developed urban area that creates sustainable economic development and high quality of life by excelling in multiple key; economy, mobility, environment, people, living, and government. For public services, the law guarantees good governance by setting the standard for e-government implicitly including for local government or a city. Based on the arguments, this research tries to test the condition of e-government of the Indonesian city in 34 provinces. The purpose is to map e-government condition by measuring indicators of smart government, which are: transparent governance and open data for the public. This research is departing from public information disclosure law and to correspond with the existence law. By examining government transparency, the output of the research can be used to measure the effectiveness of public information disclosure law and to determine the condition of e-government in local government in which as part of a smart city.

  13. Paradigms in epidemiology textbooks: in the footsteps of Thomas Kuhn.

    PubMed

    Bhopal, R

    1999-08-01

    This article attempts to contribute to the debate on the future of epidemiology by combining Thomas Kuhn's ideas on scientific paradigms with the author's observations on some epidemiology textbooks. The author's interpretations were based on his readings of Kuhn's The Structure of Scientific Revolutions, epidemiology textbooks, and papers on the future of epidemiology. Thomas Kuhn's view is that sciences mostly work with a single paradigm driven by exemplars of successful work, and that proposals for paradigm change are resisted. Sciences that are maturing or changing do not have a dominant paradigm. Epidemiology textbooks showed diversity in their concepts, content, and approach. Most exemplars related to etiologic research rather than public health practice. One key focus of the recent controversy regarding the role of epidemiology has been the increasing inability of epidemiology to solve socially based public health problems. Kuhn's views help explain the polarization of views expressed. Kuhn's philosophy of science offers insights into controversies such as whether a paradigm shift is needed or imminent and the gap between epidemiology and public health practice. Interaction between science philosophers, epidemiologists, and public health practitioners may be valuable.

  14. A Training Framework for the Department of Defense Public Key Infrastructure

    DTIC Science & Technology

    2001-09-01

    and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key...also grown within the Department of Defense. Electronic commerce and business to business transactions have become more commonplace and have

  15. The Human Factor

    ERIC Educational Resources Information Center

    Johnson, Jean

    2013-01-01

    Unless school leaders do more to help teachers, students, parents, taxpayers, and other key groups understand the need for change and the key roles they can play, school improvement will be spotty and nearly impossible to sustain, writes Public Agenda senior fellow Jean Johnson. Citing multiple surveys of these groups conducted by Public Agenda,…

  16. [Evaluation of a Public Campaign on Mental Disorders - Results from "psychenet"].

    PubMed

    Mnich, Eva E; Makowski, Anna C; Daubmann, Anne; Bock, Thomas; Lambert, Martin; Härter, Martin; Dirmaier, Jörg; Tlach, Lisa; Liebherz, Sarah; von dem Knesebeck, Olaf

    2016-11-01

    Objective: From 2011 to 2014, an information and awareness campaign was conducted in the framework of psychenet - Hamburg network for mental health . Evaluation is focused on two aspects: First, the reach of the campaign is examined. Second, effects of the campaign's key messages on public attitudes concerning mental disorders are analyzed. Methods: Analyses are based on two representative telephone surveys, conducted in Hamburg (intervention region) and Munich (control region) in 2011 prior (N = 2014) and 2014 post-campaign (N = 2006). Respondents were asked about their awareness of the psychenet campaign and to state their agreement or disagreement regarding attitudes and beliefs about mental disorders. Results: 7.3 % (74 of 1005) of the respondents from Hamburg were aware of psychenet. Compared to the other respondents, this subgroup displayed a stronger accordance with the campaign's key messages. However, regarding the total population over the course of time, differences in attitudes towards mental disorders were minor. Conclusion: Information and awareness campaigns seem to have minor effects on public attitudes towards mental disorders. Effects of specific campaign messages need to be examined more systematically. © Georg Thieme Verlag KG Stuttgart · New York.

  17. Public health and social work: training dual professionals for the contemporary workplace.

    PubMed

    Ruth, Betty J; Sisco, Sarah; Wyatt, Jamie; Bethke, Christina; Bachman, Sara S; Piper, Tinka Markham

    2008-01-01

    The emergence of new, complex social health concerns demands that the public health field strengthen its capacity to respond. Academic institutions are vital to improving the public health infrastructure. Collaborative and transdisciplinary practice competencies are increasingly viewed as key components of public health training. The social work profession, with its longstanding involvement in public health and emphasis on ecological approaches, has been a partner in many transdisciplinary community-based efforts. The more than 20 dual-degree programs in public health and social work currently offered reflect this collaborative history. This study represents an exploratory effort to evaluate the impact of these programs on the fields of public health and social work. This study explored motivations, perspectives, and experiences of 41 graduates from four master of social work/master of public health (MSW/ MPH) programs. Four focus groups were conducted using traditional qualitative methods during 2004. Findings suggest that MSW/MPH alumni self-selected into dual programs because of their interest in the missions, ethics, and practices of both professions. Participants highlighted the challenges and opportunities of dual professionalism, including the struggle to better define public health social work in the workplace. Implications for academic public health focus on how schools can improve MSW/MPH programs to promote transdisciplinary collaboration. Increased recognition, better coordination, and greater emphasis on marketing to prospective employers were suggested. A national evaluation of MSW/MPH graduates could strengthen the roles and contributions of public health social work to the public health infrastructure. A conceptual framework, potentially based on developmental theory, could guide this evaluation of the MSW/MPH training experience.

  18. [Horizon scanning in preparation for future health threats: a pilot exercise conducted by the French Institute for Public Health Surveillance in 2014].

    PubMed

    Eilstein, Daniel; Xerri, Bertrand; Viso, Anne-Catherine; Therre, Hélène; Gorza, Maud; Fuchs, Doriane; Pozuelos, Jérôme; Ioos, Sophie; Che, Didier; Bertrand, Edwige; El Yamani, Mounia; Empereur-Bissonnet, Pascal; Duport, Nicolas; Desenclos, Jean-Claude

    2016-01-01

    Background: Health surveillance is a reactive process, with no real hindsight for dealing with signals and alerts. It may fail to detect more radical changes with a major medium-term or long-term impact on public health. To increase proactivity, the French Institute for Public Health Surveillance has opted for a prospective monitoring approach.Methods: Several steps were necessary: 1) Identification of public health determinants. 2) Identification of key variables based on a combination of determinants. Variables were classified into three groups (health event trigger factors, dissemination factors and response factors) and were submitted to future development assumptions. 3) Identification, in each of the three groups, of micro-scenarios derived from variable trends. 4) Identification of macro-scenarios, each built from the three micro-scenarios for each of the three groups. 5) Identification of issues for the future of public health.Results: The exercise identified 22 key variables, 17 micro-scenarios and 5 macro-scenarios. The topics retained relate to issues on social and territorial health inequalities, health burden, individual and collective responsibilities in terms of health, ethical aspects, emerging phenomena, ‘Big data’, data mining, new health technologies, interlocking of analysis scales.Conclusions: The approach presented here guides the programming of activities of a health safety agency, particularly for monitoring and surveillance. By describing possible future scenarios, health surveillance can help decision-makers to influence the context towards one or more favourable futures.

  19. Engaging patients in health research: identifying research priorities through community town halls.

    PubMed

    Etchegary, Holly; Bishop, Lisa; Street, Catherine; Aubrey-Bassler, Kris; Humphries, Dale; Vat, Lidewij Eva; Barrett, Brendan

    2017-03-11

    The vision of Canada's Strategy for Patient-Oriented Research is that patients be actively engaged as partners in health research. Support units have been created across Canada to build capacity in patient-oriented research and facilitate its conduct. This study aimed to explore patients' health research priorities in the province of Newfoundland and Labrador (NL). Eight town halls were held with members of the general public in rural and urban settings across the province. Sessions were a hybrid information-consultation event, with key questions about health research priorities and outcomes guiding the discussion. Sixty eight members of the public attended town hall sessions. A broad range of health experiences in the healthcare system were recounted. Key priorities for the public included access and availability of providers and services, disease prevention and health promotion, and follow-up support and community care. In discussing their health research priorities, participants spontaneously raised a broad range of suggestions for improving the healthcare system in our jurisdiction. Public research priorities and suggestions for improving the provision of healthcare provide valuable information to guide Support Units' planning and priority-setting processes. A range of research areas were raised as priorities for patients that are likely comparable to other healthcare systems. These create a number of health research questions that would be in line with public priorities. Findings also provide lessons learned for others and add to the evidence base on patient engagement methods.

  20. Willingness to Pay for Mosquito Control in Key West, Florida and Tucson, Arizona.

    PubMed

    Dickinson, Katherine L; Hayden, Mary H; Haenchen, Steven; Monaghan, Andrew J; Walker, Kathleen R; Ernst, Kacey C

    2016-04-01

    Mosquito-borne illnesses like West Nile virus (WNV) and dengue are growing threats to the United States. Proactive mosquito control is one strategy to reduce the risk of disease transmission. In 2012, we measured the public's willingness to pay (WTP) for increased mosquito control in two cities: Key West, FL, where there have been recent dengue outbreaks, and Tucson, AZ, where dengue vectors are established and WNV has been circulating for over a decade. Nearly three quarters of respondents in both cities (74% in Tucson and 73% in Key West) would be willing to pay $25 or more annually toward an increase in publicly funded mosquito control efforts. WTP was positively associated with income (both cities), education (Key West), and perceived mosquito abundance (Tucson). Concerns about environmental impacts of mosquito control were associated with lower WTP in Key West. Expanded mosquito control efforts should incorporate public opinion as they respond to evolving disease risks. © The American Society of Tropical Medicine and Hygiene.

  1. Tools for Identifying and Prioritizing Evidence-Based Obesity Prevention Strategies, Colorado

    PubMed Central

    Juhl, Ashley L.; Gujral, Indira B.; Hoaglin-Wagner, Andrea L.; Gabella, Barbara A.; McDermott, Kristin M.

    2013-01-01

    Colorado’s adult obesity rate has more than doubled since 1995, prompting its Department of Public Health and Environment to list obesity as its top prevention priority. To initiate comprehensive and effective action, the department used a well-known evidence-based public health framework developed by Brownson and others. This article describes the tools and process developed to conduct 2 of the 7 stages in this framework that challenge public health organizations: reviewing the literature and prioritizing effective strategies from that literature. Forty-five department staff participated in an intensive literature review training to identify physical activity and nutrition strategies that effectively address obesity and worked with external stakeholders to prioritize strategies for the state. Divided into 8 multidisciplinary teams organized by the setting where public health could exert leverage, they scanned the scientific literature to identify potential strategies to implement. These teams were trained to use standardized tools to critique findings, systematically abstract key information, and classify the evidence level for each of 58 identified strategies. Next, departmental subject matter experts and representatives from local public health and nonprofit health agencies selected and applied prioritization criteria to rank the 58 strategies. A team charter, group facilitation tools, and 2 web-based surveys were used in the prioritization stage. This process offered the staff a shared experience to gain hands-on practice completing literature reviews and selecting evidence-based strategies, thereby enhancing Colorado’s obesity prevention efforts and improving public health capacity. Practitioners can use these tools and methodology to replicate this process for other health priorities. PMID:23806801

  2. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  3. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    PubMed

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the review results. © 2016 Sigma Theta Tau International.

  4. Suicide Prevention for School Communities: An Educational Initiative for Student Safety.

    PubMed

    Roberts, Diane Cody; Taylor, Mary Ellen; Pyle, Audrey D'Ann

    2018-05-01

    A knowledge gap exists in school communities regarding suicide prevention and means reduction education. The article highlights two core interrelated topics: school nurse engagement in dialogue with students' families and the implementation of an innovative, community-based suicide prevention educational program at a suburban public school district. The authors provide an overview of the public health problem of suicide for students, current student challenges, role of the school nurse in suicide prevention, and a key gap in current school nursing practice. At the request of the school counselors and principal, an innovative suicide prevention educational program was initiated as a community-based project at a large suburban public school district in Texas. The two overarching goals for this community-based collaboration are the following: school nurses will engage in frank, productive conversations with students' parents and families about suicidality concerns and increase the school community's knowledge about suicide prevention. This school community knowledge includes effective risk mitigation and means reduction strategies to better manage suicidality in students. Ultimately, this ongoing family and school community collaboration aims to prevent student deaths by suicide.

  5. Multiple stakeholder views on changes in delivery of public health nursing services in Ireland.

    PubMed

    Hanafin, Sinead; Dwan O'Reilly, Emma

    2015-08-01

    In contrast with community nursing services in the UK and other parts of the world, the public health nursing service in the Republic of Ireland operates as a generalist service, providing both public health and wellbeing services in addition to clinical nursing services to a wide range of patient groups. While much discussion has taken place over the years about the benefits and challenges of a generalist service, little consensus has emerged about whether the current generalist approach should be maintained or whether a more specialised approach is required. This article presents key findings from an evaluation, using research methods, of a community nursing service that was restructured from a generalist, geographically based service, to a more specialist team-based model. The findings across multiple stakeholders show a number of positive effects in the areas of quality, safety, risk, governance, active caseload management, and finances. Some challenges were also identified, particularly with respect to continuity of services, loss of expertise, role of the team leader, and engagement in population-based activities.

  6. LitMiner and WikiGene: identifying problem-related key players of gene regulation using publication abstracts.

    PubMed

    Maier, Holger; Döhr, Stefanie; Grote, Korbinian; O'Keeffe, Sean; Werner, Thomas; Hrabé de Angelis, Martin; Schneider, Ralf

    2005-07-01

    The LitMiner software is a literature data-mining tool that facilitates the identification of major gene regulation key players related to a user-defined field of interest in PubMed abstracts. The prediction of gene-regulatory relationships is based on co-occurrence analysis of key terms within the abstracts. LitMiner predicts relationships between key terms from the biomedical domain in four categories (genes, chemical compounds, diseases and tissues). Owing to the limitations (no direction, unverified automatic prediction) of the co-occurrence approach, the primary data in the LitMiner database represent postulated basic gene-gene relationships. The usefulness of the LitMiner system has been demonstrated recently in a study that reconstructed disease-related regulatory networks by promoter modelling that was initiated by a LitMiner generated primary gene list. To overcome the limitations and to verify and improve the data, we developed WikiGene, a Wiki-based curation tool that allows revision of the data by expert users over the Internet. LitMiner (http://andromeda.gsf.de/litminer) and WikiGene (http://andromeda.gsf.de/wiki) can be used unrestricted with any Internet browser.

  7. Comparison of practice based research network based quality improvement technical assistance and evaluation to other ongoing quality improvement efforts for changes in agency culture.

    PubMed

    Livingood, William C; Peden, Angela H; Shah, Gulzar H; Marshall, Nandi A; Gonzalez, Ketty M; Toal, Russell B; Alexander, Dayna S; Wright, Alesha R; Woodhouse, Lynn D

    2015-07-31

    Public health agencies in the USA are increasingly challenged to adopt Quality Improvement (QI) strategies to enhance performance. Many of the functional and structural barriers to effective use of QI can be found in the organizational culture of public health agencies. The purpose of this study was to assess the impact of public health practice based research network (PBRN) evaluation and technical assistance for QI interventions on the organizational culture of public health agencies in Georgia, USA. An online survey of key informants in Georgia's districts and county health departments was used to compare perceptions of characteristics of organizational QI culture between PBRN supported QI districts and non-PBRN supported districts before and after the QI interventions. The primary outcomes of concern were number and percentage of reported increases in characteristics of QI culture as measured by key informant responses to items assessing organizational QI practices from a validated instrument on QI Collaboratives. Survey results were analyzed using Multi-level Mixed Effects Logistic Model, which accounts for clustering/nesting. Increases in QI organizational culture were consistent for all 10- items on a QI organizational culture survey related to: leadership support, use of data, on-going QI, and team collaboration. Statistically significant odds ratios were calculated for differences in increased QI organizational culture between PBRN-QI supported districts compared to Non-PBRN supported districts for 5 of the 10 items, after adjusting for District clustering of county health departments. Agency culture, considered by many QI experts as the main goal of QI, is different than use of specific QI methods, such as Plan-Do-Study-Act (PDSA) cycles or root-cause analyses. The specific use of a QI method does not necessarily reflect culture change. Attempts to measure QI culture are newly emerging. This study documented significant improvements in characteristics of organizational culture and demonstrated the potential of PBRNs to support agency QI activities.

  8. Key Lessons in Building "Data Commons": The Open Science Data Cloud Ecosystem

    NASA Astrophysics Data System (ADS)

    Patterson, M.; Grossman, R.; Heath, A.; Murphy, M.; Wells, W.

    2015-12-01

    Cloud computing technology has created a shift around data and data analysis by allowing researchers to push computation to data as opposed to having to pull data to an individual researcher's computer. Subsequently, cloud-based resources can provide unique opportunities to capture computing environments used both to access raw data in its original form and also to create analysis products which may be the source of data for tables and figures presented in research publications. Since 2008, the Open Cloud Consortium (OCC) has operated the Open Science Data Cloud (OSDC), which provides scientific researchers with computational resources for storing, sharing, and analyzing large (terabyte and petabyte-scale) scientific datasets. OSDC has provided compute and storage services to over 750 researchers in a wide variety of data intensive disciplines. Recently, internal users have logged about 2 million core hours each month. The OSDC also serves the research community by colocating these resources with access to nearly a petabyte of public scientific datasets in a variety of fields also accessible for download externally by the public. In our experience operating these resources, researchers are well served by "data commons," meaning cyberinfrastructure that colocates data archives, computing, and storage infrastructure and supports essential tools and services for working with scientific data. In addition to the OSDC public data commons, the OCC operates a data commons in collaboration with NASA and is developing a data commons for NOAA datasets. As cloud-based infrastructures for distributing and computing over data become more pervasive, we ask, "What does it mean to publish data in a data commons?" Here we present the OSDC perspective and discuss several services that are key in architecting data commons, including digital identifier services.

  9. Ends versus means: the role of markets in expanding access to contraceptives.

    PubMed

    Hanson, K; Kumaranayake, L; Thomas, I

    2001-06-01

    Achieving and sustaining universal access to contraceptives are key policy goals of interventions supplying contraceptive commodities. Donor support for contraceptive supplies is substantial and many public and national programmes rely on donated and subsidized supplies of contraceptives. Sustainability of programme benefits is a concern to both national governments and donor agencies. At the same time, market-based provision of contraceptives has become a major source of contraceptives for individuals in a number of countries. While the goals or 'ends' of policy are to increase and sustain universal access to contraceptives, there is debate about the role of markets and their negative impacts on equity and universality. There is also concern that while public programmes supplying free contraceptives may, in the medium-term, achieve high coverage, they may hamper the achievement of long-term sustainability and the development of commercial markets. This paper focuses on the tension between the public health and market paradigms, and uses economic analysis as a framework in order to examine the relative roles or 'means' for subsidized public and commercial private sector supply of contraceptives. The review of the theory and evidence focuses on the trade-offs between public sector and market provision of contraceptives, examining the role for the public sector given the potential for market failures, the impact of public provision on the development of markets, and the role of price in demand. However, because of the potential conflict between these policy objectives, we argue that strategies to deliver contraceptives should be based on the specific characteristics of the context. In particular four variables (contraceptive prevalence rates, HIV prevalence, income level of country, size and geographic spread of private sector development) are important in characterizing this context, and these are highlighted in a matrix of programme priorities. Public choices need to take into account the ways in which they will affect the potential for development of sustainable private sources of supply. Undertaking a 'market assessment' should be a key stage in the analysis of policy options. Such an assessment should address demand factors, health priorities, actual and potential sources of supply and the relationships between public and private supply. Clearly the development of markets for contraceptives is not an end in itself, but may prove an important means of improving the health of women and men.

  10. Synchronization of random bit generators based on coupled chaotic lasers and application to cryptography.

    PubMed

    Kanter, Ido; Butkovski, Maria; Peleg, Yitzhak; Zigzag, Meital; Aviad, Yaara; Reidler, Igor; Rosenbluh, Michael; Kinzel, Wolfgang

    2010-08-16

    Random bit generators (RBGs) constitute an important tool in cryptography, stochastic simulations and secure communications. The later in particular has some difficult requirements: high generation rate of unpredictable bit strings and secure key-exchange protocols over public channels. Deterministic algorithms generate pseudo-random number sequences at high rates, however, their unpredictability is limited by the very nature of their deterministic origin. Recently, physical RBGs based on chaotic semiconductor lasers were shown to exceed Gbit/s rates. Whether secure synchronization of two high rate physical RBGs is possible remains an open question. Here we propose a method, whereby two fast RBGs based on mutually coupled chaotic lasers, are synchronized. Using information theoretic analysis we demonstrate security against a powerful computational eavesdropper, capable of noiseless amplification, where all parameters are publicly known. The method is also extended to secure synchronization of a small network of three RBGs.

  11. Promoting social welfare through oral health: New Jersey's fluoridation experience.

    PubMed

    Mendoza, Roger Lee

    2009-01-01

    This study examines the contentious public health policy of treating community water with fluoride in the United States. The question for scholarly investigation is why water fluoridation has been unsuccessful in several parts of the United States relative to the rest. It addresses this question by looking into the processes of scientific discovery and information dissemination, benefits and risks of science-based health policy, related issues of provision and production, and spatial dimensions of policy development. The case method based on New Jersey's experience in public water fluoridation, was opted for this study. We find that policy debates, which are confined to single key issues, tend to breed binary choices and bipolar debates and result in policy stalemates. Consumer accessibility and desirability of merit goods thus become sharply conflicting social welfare values. They undermine the intent of science-based policies and often make alternative and second-best policies more practical to adopt.

  12. [Ethical considerations in genomic cohort study].

    PubMed

    Choi, Eun Kyung; Kim, Ock-Joo

    2007-03-01

    During the last decade, genomic cohort study has been developed in many countries by linking health data and genetic data in stored samples. Genomic cohort study is expected to find key genetic components that contribute to common diseases, thereby promising great advance in genome medicine. While many countries endeavor to build biobank systems, biobank-based genome research has raised important ethical concerns including genetic privacy, confidentiality, discrimination, and informed consent. Informed consent for biobank poses an important question: whether true informed consent is possible in population-based genomic cohort research where the nature of future studies is unforeseeable when consent is obtained. Due to the sensitive character of genetic information, protecting privacy and keeping confidentiality become important topics. To minimize ethical problems and achieve scientific goals to its maximum degree, each country strives to build population-based genomic cohort research project, by organizing public consultation, trying public and expert consensus in research, and providing safeguards to protect privacy and confidentiality.

  13. Evidence based medicine guidelines: a solution to rationing or politics disguised as science?

    PubMed

    Saarni, S I; Gylling, H A

    2004-04-01

    "Evidence based medicine" (EBM) is often seen as a scientific tool for quality improvement, even though its application requires the combination of scientific facts with value judgments and the costing of different treatments. How this is done depends on whether we approach the problem from the perspective of individual patients, doctors, or public health administrators. Evidence based medicine exerts a fundamental influence on certain key aspects of medical professionalism. Since, when clinical practice guidelines are created, costs affect the content of EBM, EBM inevitably becomes a form of rationing and adopts a public health point of view. This challenges traditional professionalism in much the same way as managed care has done in the US. Here we chart some of these major philosophical issues and show why simple solutions cannot be found. The profession needs to pay more attention to different uses of EBM in order to preserve the good aspects of professionalism.

  14. Key Ingredients-Target Groups, Methods and Messages, and Evaluation-of Local-Level, Public Interventions to Counter Stigma and Discrimination: A Lived Experience Informed Selective Narrative Literature Review.

    PubMed

    Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A

    2018-04-01

    A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.

  15. An Expert Systems Approach for PR Campaigns Research.

    ERIC Educational Resources Information Center

    Cameron, Glen T.; Curtin, Patricia A.

    1992-01-01

    Describes an expert system (the artificial intelligence program "Publics") that helps users identify key publics for public relations campaigns. Examines advantages and problems encountered in its use in public relations campaigns classrooms. (SR)

  16. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    PubMed

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  17. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    PubMed Central

    Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-01-01

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475

  18. Memory attacks on device-independent quantum cryptography.

    PubMed

    Barrett, Jonathan; Colbeck, Roger; Kent, Adrian

    2013-01-04

    Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).

  19. Development of a Rural Health Framework: Implications for Program Service Planning and Delivery

    PubMed Central

    White, Deanna

    2013-01-01

    Purpose: To describe the development and application of an evidence-based Rural Health Framework to guide rural health program, policy and service planning. Methods: A literature review of rural health programs, focusing on health promotion, chronic disease prevention and population health, was conducted using several bibliographic databases. Findings: Thirty papers met the criteria for review, describing chronic disease interventions and public health policies in rural settings. Twenty-one papers demonstrated effective intervention programs and highlighted potential good practices for rural health programs, which were used to define key elements of a Rural Health Framework. Conclusions: The Rural Health Framework was applied to an influenza immunization program to demonstrate its utility in assisting public health providers to increase uptake of the vaccine. This Rural Health Framework provides an opportunity for program planners to reflect on the key issues facing rural communities to ensure the development of policies and strategies that will prudently and effectively meet population health needs. PMID:23968625

  20. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  1. Public health workforce: challenges and policy issues

    PubMed Central

    Beaglehole, Robert; Dal Poz, Mario R

    2003-01-01

    This paper reviews the challenges facing the public health workforce in developing countries and the main policy issues that must be addressed in order to strengthen the public health workforce. The public health workforce is diverse and includes all those whose prime responsibility is the provision of core public health activities, irrespective of their organizational base. Although the public health workforce is central to the performance of health systems, very little is known about its composition, training or performance. The key policy question is: Should governments invest more in building and supporting the public health workforce and infrastructure to ensure the more effective functioning of health systems? Other questions concern: the nature of the public health workforce, including its size, composition, skills, training needs, current functions and performance; the appropriate roles of the workforce; and how the workforce can be strengthened to support new approaches to priority health problems. The available evidence to shed light on these policy issues is limited. The World Health Organization is supporting the development of evidence to inform discussion on the best approaches to strengthening public health capacity in developing countries. WHO's priorities are to build an evidence base on the size and structure of the public health workforce, beginning with ongoing data collection activities, and to map the current public health training programmes in developing countries and in Central and Eastern Europe. Other steps will include developing a consensus on the desired functions and activities of the public health workforce and developing a framework and methods for assisting countries to assess and enhance the performance of public health training institutions and of the public health workforce. PMID:12904251

  2. Mapping publication status and exploring hotspots in a research field: chronic disease self-management.

    PubMed

    Lu, Yang; Li, Zheng; Arthur, David

    2014-08-01

    To provide insight into the characteristics of chronic disease self-management by mapping publication status and exploring hotspots. Chronic disease is becoming a major public health issue worldwide, highlighting the importance of self-management in this area. Despite the volume and variety of publications, little is known about how 'chronic disease self-management' has developed, since the first publication 40 years ago. Such is the number of publications in the area, that there is a need for a systematic bibliographic examination to enable clinicians and researchers to navigate this literature. A bibliometric analysis of publications was used. Publication status was achieved using BICOMB software, whereas hotspots were identified with Ucinet software. A search of PubMed was conducted for papers published between 1971-2012. By 2011, the number of publications reached 696, a fourfold increase from the previous 10 years, of which 75% came from the USA and UK. There were 1284 journals, which published chronic disease self-management research, involving various disciplines. The research hotspots highlighted various self-management strategies for the following: diabetes; cardiac vascular and pulmonary chronic disease; pain relief for neoplasms; and obesity. Psychological adjustment was a permeating theme in self-management processes as was using internet-based interventions. Self-management in chronic disease publication has been most evident in developed countries. The bibliographic mapping and identification of publication hotspots provides scholars and practitioners with key target journals, as well as a rigorous overview of the field for use in further research, evidence-based practice and health policy development. © 2014 John Wiley & Sons Ltd.

  3. 'Hot particles' in the cold light of day: principles for a stakeholder and public engagement architecture relating to historic liabilities in the marine environment.

    PubMed

    Wylie, Rick

    2007-09-01

    This paper discusses issues in stakeholder relations, focusing on the challenges of liabilities management associated with small fragments of irradiated nuclear fuel hereafter termed particles (and sometimes termed 'hot particles' in the public domain, from which this paper gets its title), produced over a number of decades from now ceased operations at Dounreay. It describes key problems confronting the nuclear industry in developing a stakeholder-relations strategy. Drawing upon examples of the stakeholder activity at Dounreay, and using an ecological metaphor, an innovative architecture for stakeholder engagement relating to nuclear issues is outlined. This is based upon the view that the solution of the stakeholder issue must reflect the complexity and connectivity of influences and interests within the stakeholder environment. It is argued that the lay public should be visualised as the stakeholder if an effective stakeholder-relations strategy is to be achieved. The importance of creating trust in a context of scientific uncertainty is highlighted. This will, it is argued, become an increasingly salient issue in the thrust for openness and transparency, two key drivers of nuclear industry public and stakeholder relations, which could make the limits of scientific knowledge and control more widely appreciated, and bring to the fore the role of lay conceptions of perceived risk.

  4. Through a public health lens. Preventing violence against women: an update from the US Centers for Disease Control and Prevention.

    PubMed

    Graffunder, Corinne M; Noonan, Rita K; Cox, Pamela; Wheaton, Jocelyn

    2004-01-01

    Over the past two decades, the Centers for Disease Control and Prevention (CDC) has been a key contributor to the growing public health effort to prevent violence. Although CDC and its partners are proud of their many successes, much work remains to be done. Violence continues to be a leading cause of death worldwide for people aged 15-44. Moreover, although many forms of violence garner national concern and resources, much more violence occurs in private domains and receives less attention. These hidden health hazards silently drain our nation's human, economic, and health resources. In this paper, we highlight the current efforts of the Division of Violence Prevention (DVP), housed within CDC's National Center for Injury Prevention and Control (NCIPC), to use a public health approach to the prevention of one key hidden health hazard: violence against women (VAW). Building from a recently developed strategic plan and a research agenda, we explain how four core public health principles--emphasizing primary prevention, advancing the science of prevention, translating science into effective programs, and building on the efforts of others--drive current programmatic activities in VAW prevention. Several current programs and projects are described. Finally, we conclude with recommendations for future prevention work by deepening our vision of leadership, expanding our partnerships, pursuing comprehensive approaches, and using evidence-based strategies.

  5. Public Expenditures on Children through 2008: Key Facts

    ERIC Educational Resources Information Center

    Macomber, Jennifer; Isaacs, Julia; Kent, Adam; Vericker, Tracy

    2010-01-01

    This report provides the key findings on the public spending on children through 2008. They are: (1) Spending on children increased under the American Recovery and Reinvestment Act (ARRA) and other stimulus spending, but not proportionately to other federal spending. As ARRA expires, we project that spending on children will decline, assuming no…

  6. Implications of Key Performance Indicator Issues in Ontario Universities Explored

    ERIC Educational Resources Information Center

    Chan, Vivian

    2015-01-01

    Since 1998, the Ministry of Training, Colleges and Universities in Ontario, Canada, has required that data on specific key performance indicators (KPIs) be made public by its publicly funded universities. The information is intended to be used by universities to demonstrate their achievements, to improve their programmes and services, and to…

  7. Education and Success: A Case Study of the Thai Public Service.

    ERIC Educational Resources Information Center

    Fry, Gerald W.

    1980-01-01

    Studied is the bureaucracy in Thailand, and access to an promotion within the system--or the "degree of openness" in the Thai public service. The key dependent variable is occupational attainment. Some key intervening variables include educational attainment, total job experience, sex, and regional remoteness of early schooling. (KC)

  8. 41 CFR Appendix A to Subpart A of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false 3-Key Points and Principles A Appendix A to Subpart A of Part 102 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL ADVISORY COMMITTEE...

  9. Nanotechnology-Enabled Optical Molecular Imaging of Breast Cancer

    DTIC Science & Technology

    2008-07-01

    explanation of results. 37 KEY RESEACH ACCOMPLISHMENTS • Design of needle-based fiber optic imaging system completed and development of first...policy or decision unless so designated by other documentation. REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting...our results to date. As described in the Statement of Work, Year 1 plans focused on design of this system and beginning initial construction. It

  10. Whose Side Are We on and for Whom Do We Write? Notes on Issues and Challenges Facing Those Researching and Evaluating Public Policy

    ERIC Educational Resources Information Center

    Warren, Jon; Garthwaite, Kayleigh

    2015-01-01

    Becker (1967) poses the question "Whose side are we on?," a question which has become an enduring part of discussions within social scientific methodology. This paper explores the key issues in Becker's argument and considers its relevance to researchers today, locating this within a consideration of evaluation-based research and policy.…

  11. An informatics agenda for public health: summarized recommendations from the 2011 AMIA PHI Conference

    PubMed Central

    Goodman, Kenneth W; Gotham, Ivan J; Holmes, John H; Lang, Lisa; Miner, Kathleen; Potenziani, David D; Richards, Janise; Turner, Anne M; Fu, Paul C

    2012-01-01

    The AMIA Public Health Informatics 2011 Conference brought together members of the public health and health informatics communities to revisit the national agenda developed at the AMIA Spring Congress in 2001, assess the progress that has been made in the past decade, and develop recommendations to further guide the field. Participants met in five discussion tracks: technical framework; research and evaluation; ethics; education, professional training, and workforce development; and sustainability. Participants identified 62 recommendations, which clustered into three key themes related to the need to (1) enhance communication and information sharing within the public health informatics community, (2) improve the consistency of public health informatics through common public health terminologies, rigorous evaluation methodologies, and competency-based training, and (3) promote effective coordination and leadership that will champion and drive the field forward. The agenda and recommendations from the meeting will be disseminated and discussed throughout the public health and informatics communities. Both communities stand to gain much by working together to use these recommendations to further advance the application of information technology to improve health. PMID:22395299

  12. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  13. Investigating the key indicators for evaluating post-disaster shelter.

    PubMed

    Nath, Ronita; Shannon, Harry; Kabali, Conrad; Oremus, Mark

    2017-07-01

    This study sought to identify the primary indicators for evaluating shelter assistance following natural disasters and then to develop a shelter evaluation instrument based on these indicators. Electronic databases and the 'grey' literature were scoured for publications with a relation to post-disaster shelter assistance. Indicators for evaluating such assistance were extracted from these publications. In total, 1,525 indicators were extracted from 181 publications. A preliminary evaluation instrument was designed from these 1,525 indicators. Shelter experts checked the instrument for face and content validity, and it was revised subsequently based on their input. The revised instrument comprises a version for use by shelter agencies (48 questions that assess 23 indicators) and a version for use by beneficiaries (52 questions that assess 22 indicators). The instrument can serve as a standardised tool to enable groups to gauge whether or not the shelter assistance that they supply meets the needs of disaster-affected populations. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  14. Is the practice of public or private sector doctors more evidence-based? A qualitative study from Vellore, India.

    PubMed

    Akinyemi, Oluwaseun O; Martineau, Tim; Tharyan, Prathap

    2015-06-01

    The literature on the use of evidence-based practice is sparse, both in the public and private sectors in middle-and low-income countries, and the present literature shows that physician understanding and use of evidence-based practice is poor. The study aimed to explore the perception of medical practitioners in the private for-profit, private not-for-profit and government sectors in Vellore, India, on evidence-based practice, in order to explain the factors affecting the use of evidence-based practice among the practitioners and to inform local policy and management decisions for improvement in quality of care. Qualitative methodology was employed in the study. Sixteen in-depth and two key informant interviews were carried out with medical practitioners selected by purposive sampling in the private for-profit, private not-for-profit and government sectors. The interviews explored participants' knowledge of evidence-based practice, factors affecting its use and possible ways of improving the use of evidence-based practice among physicians in all the health sectors. Data from the in-depth and key informant interviews were analyzed with the NVIVO (version 8) software package using the framework approach. Although most practitioners interviewed have heard of evidence-based practice, knowledge about evidence-based practice seems inadequate. However, doctors in the private not-for-profit sector seem to be more familiar with the concept of evidence-based practice. Also, practitioners in the private not-for profit sector appear to use medical evidence more in their practices compared to government practitioners or doctors in the private for-profit sector. Perceived factors affecting physician use of evidence-based practice include lack of personal time for literature appraisal as a result of high case load, weak regulatory system, pressure from patients, caregivers and pharmaceutical companies, as well as financial considerations. Opinions of the respondents are that use of evidence-based practice is mostly found among practitioners in the private not-for-profit health sector. Better training in evidence-based practice, improved regulatory system and greater collaboration between the public, private for-profit and private not-for-profit sectors with regards to training in evidence-based practice - literature search and critical appraisal skills - were suggested as needed to improve the present situation.

  15. Using Local Climate Science to Educate "Key Influentials" and their Communities in the San Diego Region

    NASA Astrophysics Data System (ADS)

    Boudrias, M. A.; Estrada, M.; Anders, S.; Silva-Send, N. J.; Yin, Z.; Schultz, P.; Young, E.

    2012-12-01

    The San Diego Regional Climate Education Partnership has formed an innovative and collaborative team whose mission is to implement a research-based climate science education and communications program to increase knowledge about climate science among highly-influential leaders and their communities and foster informed decision making based on climate science and impacts. The team includes climate scientists, behavioral psychologists, formal and informal educators and communication specialists. The Partnership's strategic plan has three major goals: (1) raise public understanding of the causes and consequences of climate change; (2) identify the most effective educational methods to educate non-traditional audiences (Key Influentials) about the causes and consequences of climate change; and (3) develop and implement a replicable model for regional climate change education. To implement this strategic plan, we have anchored our project on three major pillars: (1) Local climate science (causes, impacts and long-term consequences); (2) theoretical, research-based evaluation framework (TIMSI); and (3) Key! Influentials (KI) as primary audience for messages (working w! ith and through them). During CCEP-I, the Partnership formed and convened an advisory board of Key Influentials, completed interviews with a sample of Key Influentials, conducted a public opinion survey, developed a website (www.sandiego.edu/climate) , compiled inventories on literature of climate science education resources and climate change community groups and local activities, hosted stakeholder forums, and completed the first phase of on an experiment to test the effects of different messengers delivering the same local climate change message via video. Results of 38 KI Interviews provided evidence of local climate knowledge, strong concern about climate change, and deeply held values related to climate change education and regional leadership. The most intriguing result was that while 90% of Key Influentials described themselves as concerned about climate change, they believed only 10% of their peers were equally concerned. Results from a public opinion survey of 1001 San Diego residents exhibited two clear trends: San Diegans were consistently more attuned and concerned about climate change and its impacts than nationwide average; and similar to the KI findings, they do not believe others are as concerned as they are. Further, mediation analysis of results supported TIMSI, showing that climate change education that promotes efficacy, identity and values endorsed by a concerned community are most likely to result in engagement in mitigation and adaptive behaviors. All CCEP-I activities informed and directed the design of our Phase II Strategic plan and will provide baseline data for assessing changes that occur as we implement the educational plan. Implementation strategies for the next Phase will emphasize (1) presenting local climate science and unique climate impacts, (2) working with Key Influentials in diverse ways, including educational both formal and informal dialogues for this non-traditional audience, developing climate education messages to be delivered by KIs to their peers and their communities, and engaging certain KIs to be the portal to their constituents; and (3) using social media to connect educators and their audiences.

  16. Problems with provision: barriers to drinking water quality and public health in rural Tasmania, Australia.

    PubMed

    Whelan, Jessica J; Willis, Karen

    2007-01-01

    Access to safe drinking water is essential to human life and wellbeing, and is a key public health issue. However, many communities in rural and regional parts of Australia are unable to access drinking water that meets national standards for protecting human health. The aim of this research was to identify the key issues in and barriers to the provision and management of safe drinking water in rural Tasmania, Australia. Semi-structured interviews were conducted with key local government employees and public health officials responsible for management of drinking water in rural Tasmania. Participants were asked about their core public health duties, regulatory responsibilities, perceptions and management of risk, as well as the key barriers that may be affecting the provision of safe drinking water. This research highlights the effect of rural locality on management and safety of fresh water in protecting public health. The key issues contributing to problems with drinking water provision and quality identified by participants included: poor and inadequate water supply infrastructure; lack of resources and staffing; inadequate catchment monitoring; and the effect of competing land uses, such as forestry, on water supply quality. This research raises issues of inequity in the provision of safe drinking water in rural communities. It highlights not only the increasing need for greater funding by state and commonwealth government for basic services such as drinking water, but also the importance of an holistic and integrated approach to managing drinking water resources in rural Tasmania.

  17. Research on centrality of urban transport network nodes

    NASA Astrophysics Data System (ADS)

    Wang, Kui; Fu, Xiufen

    2017-05-01

    Based on the actual data of urban transport in Guangzhou, 19,150 bus stations in Guangzhou (as of 2014) are selected as nodes. Based on the theory of complex network, the network model of Guangzhou urban transport is constructed. By analyzing the degree centrality index, betweenness centrality index and closeness centrality index of nodes in the network, the level of centrality of each node in the network is studied. From a different point of view to determine the hub node of Guangzhou urban transport network, corresponding to the city's key sites and major transfer sites. The reliability of the network is determined by the stability of some key nodes (transport hub station). The research of network node centralization can provide a theoretical basis for the rational allocation of urban transport network sites and public transport system planning.

  18. [Adapting the service portfolio of a public health organisation to shrinking resources].

    PubMed

    Villalbí, Joan R; Borrell, Carme; Macía, Manel; Subirana, Teresa; López, María José; Portaña, Samuel; Llebaria, Xavier; Casas, Conrad

    This paper describes the review process of the Agency of Public Health of Barcelona's service portfolio in response to the budget cuts introduced since 2010 in the public administrations in Spain. A working group reviewed the different business activities, taking into account their costs and generated revenue and their justification, assessing factors such as the existence of legal constraints, tied funding, explicit demands from the founding administrations and other actors that may be capable of undertaking particular activities. The changes and their consequences are described. The new service portfolio has been consolidated and is considered ratified by the Agency board, which was renewed after political changes. We conclude that this is because it was based on professional consensus and management criteria, which are key for the smooth operation of a public autonomous executive organisation. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  19. Getting the Word Out: New Approaches for Disseminating Public Health Science

    PubMed Central

    Eyler, Amy A.; Harris, Jenine K.; Moore, Justin B.; Tabak, Rachel G.

    2018-01-01

    The gap between discovery of public health knowledge and application in practice settings and policy development is due in part to ineffective dissemination. This article describes (1) lessons related to dissemination from related disciplines (eg, communication, agriculture, social marketing, political science), (2) current practices among researchers, (3) key audience characteristics, (4) available tools for dissemination, and (5) measures of impact. Dissemination efforts need to take into account the message, source, audience, and channel. Practitioners and policy makers can be more effectively reached via news media, social media, issue or policy briefs, one-on-one meetings, and workshops and seminars. Numerous “upstream” and “midstream” indicators of impact include changes in public perception or awareness, greater use of evidence-based interventions, and changes in policy. By employing ideas outlined in this article, scientific discoveries are more likely to be applied in public health agencies and policy-making bodies. PMID:28885319

  20. Electronic health record - public health (EHR-PH) system prototype for interoperability in 21st century healthcare systems.

    PubMed

    Orlova, Anna O; Dunnagan, Mark; Finitzo, Terese; Higgins, Michael; Watkins, Todd; Tien, Allen; Beales, Steven

    2005-01-01

    Information exchange, enabled by computable interoperability, is the key to many of the initiatives underway including the development of Regional Health Information Exchanges, Regional Health Information Organizations, and the National Health Information Network. These initiatives must include public health as a full partner in the emerging transformation of our nation's healthcare system through the adoption and use of information technology. An electronic health record - public health (EHR-PH)system prototype was developed to demonstrate the feasibility of electronic data transfer from a health care provider, i.e. hospital or ambulatory care settings, to multiple customized public health systems which include a Newborn Metabolic Screening Registry, a Newborn Hearing Screening Registry, an Immunization Registry and a Communicable Disease Registry, using HL7 messaging standards. Our EHR-PH system prototype can be considered a distributed EHR-based RHIE/RHIO model - a principal element for a potential technical architecture for a NHIN.

Top