ERIC Educational Resources Information Center
Johnson, Kenneth T.
2017-01-01
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model
ERIC Educational Resources Information Center
Kassa, Woldeloul
2016-01-01
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
Commitment to nursing: results of a qualitative interview study.
Gould, Dinah; Fontenla, Marina
2006-04-01
The aims of the study were to explore opportunities to undergo continuing professional education, family friendly policy and holding an innovative or traditional post on nurses' job satisfaction and professional and organizational commitment. Qualified nurses have become a scare resource in the National Health Service. Managers need to be aware of the work-related factors most likely to secure nurses' professional and organizational commitment which will contribute to the retention. Commitment is thought to be increased if opportunities for continuing professional education are good. Family friendly policy is also important. Less is known about the relationship between type of nursing work and commitment. An in-depth, exploratory approach to data collection were taken, employing an interview guide with open-ended questions. Data were collected with 27 nurses in clinical grades in two contrasting trusts. Family friendly policies emerged as most important in securing nursing commitment. Those in innovative posts whose work entailed social hours and greater professional autonomy also displayed greater levels of job satisfaction. Opportunities for continuing professional education had less influence on professional and organizational commitment. Providing flexible or social working hours appears to be more influential than providing opportunities for continuing professional education in securing nursing commitment in this exploratory study.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.
2013-07-01
This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.
Frohde, Kenny; Brooks, David J
Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.
He, Ying; Johnson, Chris
2017-12-01
Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.
Information Sharing for IT Security Professionals
ERIC Educational Resources Information Center
Petersen, Rodney J.
2008-01-01
Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their long history of collaboration and openness. Information sharing has become part of the national fabric as IT security professionals attempt to secure cyber…
NASA Astrophysics Data System (ADS)
Belanger, James Durham
Since the formation of the Transportation Security Administration (TSA) following the September 11, 2001 terrorist's attacks few studies involving commercial flight crewmember perceptions' of the organization's efficacy have been conducted, nor has there been any research into the effects on crewmember morale and professionalism resulting from their interactions with the TSA. This researcher surveyed 624 flight crewmembers, using a multiple-choice instrument to ascertain both their perceptions of TSA effectiveness involving an array of security issues, in addition to how crewmember interactions with the TSA may have affected their morale and professionalism. A 2-sample t-test measured the difference in the means of pilots and flight attendants regarding the study's scope, as did 2-way ANOVA and Tukey HSD comparisons, which factored in gender. The study found that crewmembers indicated some confidence in the areas of passenger and baggage screening and the Armed Pilot Program, with less confidence regarding ancillary personnel screening, airport perimeter security, and in both crewmember anti-terrorist training and human error issues. Statistical testing indicated varying differences in sample means concerning all study related issues. Finally, crewmembers indicated some effects on morale and professionalism, with a majority indicating a negative effect on both.
6 CFR 9.15 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.15 Section 9.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Own Employees § 9.15 Professional and technical services. (a) The prohibition on the...
6 CFR 9.23 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.23 Section 9.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Other than Own Employees § 9.23 Professional and technical services. (a) The...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Exploring the Educational Needs of the Homeland Security Community
ERIC Educational Resources Information Center
France, Paul
2012-01-01
This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte
2013-01-01
Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Teaching Information Security with Workflow Technology--A Case Study Approach
ERIC Educational Resources Information Center
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang
2014-01-01
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2014 CFR
2014-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2010 CFR
2010-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2013 CFR
2013-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2012 CFR
2012-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2011 CFR
2011-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
NASA Astrophysics Data System (ADS)
Fleischmann, Kenneth R.
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte
2013-01-01
Introduction: Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). Method and materials: The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. Results: The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Discussion: Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS. PMID:23687464
Analysis of health professional security behaviors in a real clinical setting: an empirical study.
Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis
2015-06-01
The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Implementing an electronic medication overview in Belgium.
Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree
2014-12-16
An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.
Nazi, Kim M
2013-04-04
Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals' accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings.
Ways to Improve DoD 8570 IY Security Certification
ERIC Educational Resources Information Center
Bates, Justin D.
2017-01-01
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
Food security practice in Kansas schools and health care facilities.
Yoon, Eunju; Shanklin, Carol W
2007-02-01
This pilot study investigated perceived importance and frequency of specific preventive measures, and food and nutrition professionals' and foodservice directors' willingness to develop a food defense management plan. A mail questionnaire was developed based on the US Department of Agriculture document, Biosecurity Checklist for School Foodservice Programs--Developing a Biosecurity Management Plan. The survey was sent to food and nutrition professionals and foodservice operators in 151 acute care hospitals, 181 long-term-care facilities, and 450 school foodservice operations. Chemical use and storage was perceived as the most important practice to protect an operation and was the practice implemented most frequently. Results of the study indicate training programs on food security are needed to increase food and nutrition professionals' motivation to implement preventive measures.
Role of Outsourcing in Stress and Job Satisfaction of Information Technology Professionals
ERIC Educational Resources Information Center
Robinson, Janell R.
2016-01-01
Information technology (IT) outsourcing poses a potential job loss threat to IT professionals, which can decrease job security, job satisfaction, and organizational commitment. The problem that this study addressed was the perceived role of IT outsourcing in the job stress, job dissatisfaction, and turnover intention of IT professionals. The…
Promoting Inter-Professional Teamwork and Learning--The Case of a Surgical Operating Theatre
ERIC Educational Resources Information Center
Collin, Kaija; Paloniemi, Susanna; Mecklin, Jukka-Pekka
2010-01-01
Hospitals, and surgical operating theatres (OTs) in particular, are environments in which inter-professional teamwork and learning are essential to secure patient safety and effective practice. However, it has been revealed in many studies that inter-professional collaborative work in hospital organisations faces many challenges and constraints.…
Quality and security - They work together
NASA Technical Reports Server (NTRS)
Carr, Richard; Tynan, Marie; Davis, Russell
1991-01-01
This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.
Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC.
Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…
2016-09-01
League (EPL), football, mass gatherings, National Football League (NFL), safety manuals, soccer , sports security, soccer , terrorism, terrorist...fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL...kurtbadenhausen/2015/07/15/the-worlds-50-most-valuable-sports- teams-2015/. 3 professional league, the English Premier soccer league, earns $2.7 billion.6 In
Measuring Human Performance within Computer Security Incident Response Teams
DOE Office of Scientific and Technical Information (OSTI.GOV)
McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel
Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less
ERIC Educational Resources Information Center
Thulth, Ahida Saleem; Sayej, Sumaya
2015-01-01
Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess of selected organizational factors (workload, available recourses and…
Professional Development Seen as Employment Capital
ERIC Educational Resources Information Center
Mackay, Margaret
2017-01-01
Practitioners need to invest in professional development to enhance credibility, job security and employment prospects. Employer expectations of continuing development as a performance measure link to the notion of career capital; namely that knowledge competence influences job advancement. This study uses an interpretivist approach to explore…
Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio
2015-08-01
The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.
Between security and military identities: The case of Israeli security experts.
Grassiani, Erella
2018-02-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.
Between security and military identities: The case of Israeli security experts
Grassiani, Erella
2018-01-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228
Role of the U.S. Military in the Professionalization of the Armed Forces of Liberia
2015-06-12
professionalizing the AFL. The GEF states, “Partner nations provide for their own security, contribute effectively to broader regional or global security...facilitates the development of important professional and personal relationships that effectively strengthen military alliances and the international...Forces of Liberia (AFL) presents a developing opportunity to contribute to the broader U.S. interests. However, in order to ensure stability within
ERIC Educational Resources Information Center
Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea
2016-01-01
How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…
Lethal and Legal The Ethics of Drone Strikes
2015-12-01
analysis, evaluation, and refinement of professional expertise in war, strategy, operations, national security, resource management , and responsible...in business studies and holds an M.Phil. in defence and security studies from the Defence College of Management and Technol- ogy, Defence Academy...in unsafe buildings, search and rescue missions in treacherous conditions, police searches for missing or wanted persons, traffic management , public
ERIC Educational Resources Information Center
Maar, Michael C.
2013-01-01
This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…
ERIC Educational Resources Information Center
Ayed, Ahmad; Thulth, Ahida Saleem; Sayej, Sumaya
2015-01-01
Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess night shift and education/training developmental factors on performance of…
ERIC Educational Resources Information Center
Stark, Adam
2017-01-01
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Bendtsen, Preben; Anderson, Peter; Wojnar, Marcin; Newbury-Birch, Dorothy; Müssener, Ulrika; Colom, Joan; Karlsson, Nadine; Brzózka, Krzysztof; Spak, Fredrik; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Okulicz-Kozaryn, Katarzyna; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Palacio, Jorge; Baena, Begoña; Slodownik, Luiza; van Steenkiste, Ben; Wolstenholme, Amy; Wallace, Paul; Keurhorst, Myrna N; Laurant, Miranda G H; Gual, Antoni
2015-07-01
To determine the relation between existing levels of alcohol screening and brief intervention rates in five European jurisdictions and role security and therapeutic commitment by the participating primary healthcare professionals. Health care professionals consisting of, 409 GPs, 282 nurses and 55 other staff including psychologists, social workers and nurse aids from 120 primary health care centres participated in a cross-sectional 4-week survey. The participants registered all screening and brief intervention activities as part of their normal routine. The participants also completed the Shortened Alcohol and Alcohol Problems Perception Questionnaire (SAAPPQ), which measure role security and therapeutic commitment. The only significant but small relationship was found between role security and screening rate in a multilevel logistic regression analysis adjusted for occupation of the provider, number of eligible patients and the random effects of jurisdictions and primary health care units (PHCU). No significant relationship was found between role security and brief intervention rate nor between therapeutic commitment and screening rate/brief intervention rate. The proportion of patients screened varied across jurisdictions between 2 and 10%. The findings show that the studied factors (role security and therapeutic commitment) are not of great importance for alcohol screening and BI rates. Given the fact that screening and brief intervention implementation rate has not changed much in the last decade in spite of increased policy emphasis, training initiatives and more research being published, this raises a question about what else is needed to enhance implementation. © The Author 2015. Medical Council on Alcohol and Oxford University Press. All rights reserved.
Security auditing: a prescription for keeping protection programs healthy.
Luizzo, Anthony
2010-01-01
The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eipeldauer, Mary D; Shelander Jr, Bruce R
2012-01-01
The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less
ERIC Educational Resources Information Center
Peslak, Alan R.
2010-01-01
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Wallin Lundell, Inger; Eulau, Louise; Bjarneby, Frida; Westerbotn, Margareta
2018-03-01
This study sought to describe how women in Mexico who have suffered from gender-based violence experience their encounters with healthcare professionals. Gender-based violence is a worldwide problem. Previous studies have described that women feel they are not being cared for appropriately during their encounters with healthcare professionals. This study was conducted in Mexico, which has a high rate of gender inequality. A descriptive, qualitative study was conducted. Face-to-face interviews were conducted with seven women. An inductive content analysis was used to analyse the interviews. The analyses resulted in four categories: Feelings of guilt about being abused, Feelings of being unimportant, Feelings of taking time and Feelings of being insecure/secure. The women emphasised the importance of healthcare professionals taking time out of their busy schedules for them. When they treated the women with respect and genuine interest, the women felt secure. When the healthcare professionals did not meet these expectations, feelings of frustration and mistrust were elicited. Feelings of being listened to and safety were considered important aspects in a positive encounter, whereas feeling a lack of time or interest often led to negative experiences such as frustration with and distrust of the healthcare system. These results imply that healthcare professionals may have deficiencies with regard to how these women are treated because these women do not feel that they receive the proper support. Education regarding how to approach women who have suffered from gender-based violence is essential for healthcare professionals to establish respectful encounters. The findings of this study stress that relatively simple efforts such as listening to these women's stories and providing them with genuine attention might substantially improve care. © 2017 John Wiley & Sons Ltd.
Usage of insecure E-mail services among researchers with different scientific background.
Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago
2011-08-01
Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.
Dupont, C; Gonnaud, F; Touzet, S; Luciani, F; Perié, M-A; Molenat, F; Evrard, A; Fernandez, M-P; Roy, J; Rudigoz, R-C
2008-11-01
Early prenatal interview has needed the implementation of a new communication tool between follow-up pregnancy professionals: a link sheet filled and carried by patients. To assess the utilization of link sheet by trained professionals, the contribution of the interview and the patient acceptation of the link sheet. Descriptive survey from the database of link sheets returned by professionals to Aurore perinatal network and semi-guided interviews with 100 randomized patients. One thousand one hundred and nineteen link sheets were sent to Aurore perinatal network by 55 professionals out of 78 trained. For primipare, precocious prenatal interview contribution has concerned health care security (60%) and emotional security (56%). For multipare, this contribution has concerned mainly emotional security (80%). No interviewed patient has refused link sheet principle. Link sheet principle, like implemented by Aurore perinatal network, seems pertinent to professionals and patients but it constitutes only one of the elements of network elaboration of personalized care.
Ethical Hacking in Information Security Curricula
ERIC Educational Resources Information Center
Trabelsi, Zouheir; McCoey, Margaret
2016-01-01
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment
NASA Astrophysics Data System (ADS)
Ula, M.; Ula, M.; Fuadi, W.
2017-02-01
As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.
ERIC Educational Resources Information Center
Warfield, Douglas L.
2011-01-01
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pepper, Susan E.
2014-10-10
Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
2013-01-01
Background Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. Objective The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. Methods In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Results Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals’ accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Conclusions Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings. PMID:23557596
A Portable Computer Security Workshop
ERIC Educational Resources Information Center
Wagner, Paul J.; Phillips, Andrew T.
2006-01-01
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Predicting Airport Screening Officers' Visual Search Competency With a Rapid Assessment.
Mitroff, Stephen R; Ericson, Justin M; Sharpe, Benjamin
2018-03-01
Objective The study's objective was to assess a new personnel selection and assessment tool for aviation security screeners. A mobile app was modified to create a tool, and the question was whether it could predict professional screeners' on-job performance. Background A variety of professions (airport security, radiology, the military, etc.) rely on visual search performance-being able to detect targets. Given the importance of such professions, it is necessary to maximize performance, and one means to do so is to select individuals who excel at visual search. A critical question is whether it is possible to predict search competency within a professional search environment. Method Professional searchers from the USA Transportation Security Administration (TSA) completed a rapid assessment on a tablet-based X-ray simulator (XRAY Screener, derived from the mobile technology app Airport Scanner; Kedlin Company). The assessment contained 72 trials that were simulated X-ray images of bags. Participants searched for prohibited items and tapped on them with their finger. Results Performance on the assessment significantly related to on-job performance measures for the TSA officers such that those who were better XRAY Screener performers were both more accurate and faster at the actual airport checkpoint. Conclusion XRAY Screener successfully predicted on-job performance for professional aviation security officers. While questions remain about the underlying cognitive mechanisms, this quick assessment was found to significantly predict on-job success for a task that relies on visual search performance. Application It may be possible to quickly assess an individual's visual search competency, which could help organizations select new hires and assess their current workforce.
Video calls from lay bystanders to dispatch centers - risk assessment of information security.
Bolle, Stein R; Hasvold, Per; Henriksen, Eva
2011-09-30
Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
ERIC Educational Resources Information Center
James, Melissa; Warner, Sam
2005-01-01
Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…
Psychosocial Needs of Boys in Secure Care for Serious or Persistent Offending
ERIC Educational Resources Information Center
Harrington, R. C.; Kroll, L.; Rothwell, J.; McCarthy, K.; Bradley, D.; Bailey, S.
2005-01-01
Background: The mental health of child offenders who are detained in secure settings is a matter of great public and professional concern but there has been little systematic longitudinal research on the outcomes of these problems once the young person has returned to the community. The aims of the present study were to describe the psychosocial…
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
Introduction This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). Methods The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents’ concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Results Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). Conclusions This study underscores the need for enhanced measures to secure patients’ PHI to avoid undermining their trust. PMID:23975624
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents' concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). This study underscores the need for enhanced measures to secure patients' PHI to avoid undermining their trust.
Making Technology Work for Campus Security
ERIC Educational Resources Information Center
Floreno, Jeff; Keil, Brad
2010-01-01
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
ERIC Educational Resources Information Center
Kyslenko, Dmytro
2017-01-01
The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…
The importance of effective catheter securement.
Fisher, Jayne
This article examines the importance of securing/fixing indwelling urinary catheters. The Oxford English dictionary interlinks the two words-'secure' and 'fix'-as having the same meaning. To secure the catheter should not be confused with 'support', whereby the weight of the urine drainage bag is supported with the use of velcro straps or a sleeve. The author introduces the need for the concept of this practice to be at the forefront of nurses' minds in all settings, and this is demonstrated through the use of case studies. Current guidance in this area is reviewed, as well as the problems that can arise when catheters are not secured properly and the available products for health professionals to use.
A Unified Approach to Information Security Compliance
ERIC Educational Resources Information Center
Adler, M. Peter
2006-01-01
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Schneider, Daniele; Signorelli, Marcos Claudio; Pereira, Pedro Paulo Gomes
2017-09-01
This study aimed to promote visibility of women working in public security along the Parana coast, articulating issues of gender, violence(s), and the health-disease process. The methodology was qualitative, through an ethnographic research which included 50 women (civilians, military policewomen, and prison officers) from municipalities along the Parana coast, between March 2014 and March 2015. Results revealed: 1) the dilemmas that these women are subjected to, facing the seasonal dynamics in the field of public security in the region; 2) exposure to violence (mainly institutional and gender-based) and its impact on these women's health; 3) power relations, marked by corporations' hierarchies and gender asymmetries between men and women in professional settings. In summary, this research highlighted the need to promote visibility of women working in public security institutions, considering the impact of violence and gender inequalities in their personal and professional lives, including the resistance and rearrangements promoted by these women in the institutions in response to their presence in a hegemonic and traditionally male environment.
Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel
2014-04-01
The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.
7 CFR 1940.336 - Contracting for professional services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 13 2010-01-01 2009-01-01 true Contracting for professional services. 1940.336... Contracting for professional services. (a) Assistance from outside experts and professionals can be secured... conflict of interest, contractors competing for the work will be required to execute a disclosure statement...
Evolving the Role of Campus Security
ERIC Educational Resources Information Center
May, Vern
2008-01-01
One of the problems security professionals see in security is that there are few benchmarks to quantify the effectiveness of proactive security initiatives. This hurts them with funding support and also with ensuring community buy-in outside of crisis situations. The reactive nature of many institutions makes it difficult to move forward with…
He, Ying; Johnson, Chris
2015-11-01
The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Investigating the Relationship between Need for Cognition and Skill in Ethical Hackers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Le Blanc, Katya; Freeman, Sarah
As technology gets more complex and increasingly connected, there is an increasing concern with cyber security. There is also a growing demand for cyber security professionals. Unfortunately there currently are not enough skilled professionals to meet that demand. In order to prepare the next generation of cyber security professionals to meet this demand, we need to understand what characteristics make skilled cyber security professionals. For this work, we focus on professionals who take an offensive approach to cyber security, so called ethical hackers. These hackers utilize many of the same skills that the adversaries that we defend against would use,more » with the goal of identifying vulnerabilities and address them before they are exploited by adversaries. A commonly held belief among ethical hackers is that hackers must possess exceptional curiosity and problem solving skills in order to be successful. Curiosity is has been studied extensively in psychology, but there is no consensus on what it is and how to measure it. Further, many existing inventories for assessing curiosity are targeted at measuring curiosity in children. Although there isn’t an accepted standard to assess curiosity in adults, a related construct, called Need for Cognition (may capture what is meant when people speak of curiosity. The Need for Cognition scale also captures the tendency toward preferring complex problems (which correlates with good problem solving skills), which may provide insight into what make skilled hackers. In addition to the Need for Cognition, we used a structured interview to assess hacker skill. Hackers rated their own skill on a scale from one to ten on a predefined list of hacker skills. They were then asked to rate a peer who they felt was most skilled in each of the skills. They were asked to rate two peers for each skill, one that they worked with directly and one person that was the most skilled in the field (these could be known by reputation only). The hypothesis is that hackers have a higher than average (i.e., compared to non-hackers) Need for cognition and that Need for Cognition will be positively correlated with self-reported and peer reported skill. We interviewed 20 cyber security researchers who specialize in offensive approaches. Based on the responses to the hacker skill inventory, we generated a self-reported skill score for each participant. We also developed a peer-rating for each participant based on the number of times each individual that was interviewed was named as the most skilled in a particular area. The results indicate that the sample of ethical hackers has a high Need for Cognition and that Need for cognition was related to both self-reported skill and peer-reported skill. The results are discussed in the context of training and recruitment of cyber security professionals.« less
Self-confidence in financial analysis: a study of younger and older male professional analysts.
Webster, R L; Ellis, T S
2001-06-01
Measures of reported self-confidence in performing financial analysis by 59 professional male analysts, 31 born between 1946 and 1964 and 28 born between 1965 and 1976, were investigated and reported. Self-confidence in one's ability is important in the securities industry because it affects recommendations and decisions to buy, sell, and hold securities. The respondents analyzed a set of multiyear corporate financial statements and reported their self-confidence in six separate financial areas. Data from the 59 male financial analysts were tallied and analyzed using both univariate and multivariate statistical tests. Rated self-confidence was not significantly different for the younger and the older men. These results are not consistent with a similar prior study of female analysts in which younger women showed significantly higher self-confidence than older women.
Guidelines for Working with Law Enforcement Agencies
ERIC Educational Resources Information Center
Corn, Michael
2007-01-01
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises
ERIC Educational Resources Information Center
Shah, Ashish
2017-01-01
Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…
ERIC Educational Resources Information Center
Glenn, E. S.; And Others
1977-01-01
Offers an alternative methodology for studying persuasive strategies by examining the persuasive strategies selected by professional persuaders representing those cultures being studied. Analyzes the persuasive styles of United States, Soviet Union and Arab diplomats involved in international negotiations in the Security Council of the United…
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729
Rusconi, Elena; Ferri, Francesca; Viding, Essi; Mitchener-Nissen, Timothy
2015-01-01
X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported attention to detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012). Here, we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score from the autism-spectrum quotient (AQ) questionnaire (Baron-Cohen et al., 2001) is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals. PMID:26321935
ERIC Educational Resources Information Center
Nerland, Monika; Karseth, Berit
2015-01-01
This paper examines how professional associations engage themselves in efforts to develop, regulate and secure knowledge in their respective domains, with special emphasis on standardisation. The general emphasis on science in society brings renewed attention to the knowledge base of professionals, and positions professional bodies as key…
Humaidi, Norshima; Balakrishnan, Vimala
2018-01-01
Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management-user values and the nature of compliance towards ISPs among selected health professionals, this study has made a unique contribution to the literature.
An Innovative Model for Professional Development
ERIC Educational Resources Information Center
McMurray, Sharon; O'Neill, Susan; Thompson, Ross
2016-01-01
This paper considers an innovative model of continuing professional development in addressing the needs of children with literacy difficulties, namely the Special Educational Needs Continuing Professional Development Literacy Project. Stranmillis University College, in partnership with St Mary's University College, Belfast secured £4.06 million…
New security and privacy laws require basic changes in professional practice
NASA Astrophysics Data System (ADS)
Sykes, David M.
2005-09-01
Everybody knows about HIPAA-but what about GLBA? FIPA? The Patriot Act? Homeland Security? NCLB? FCRA? CASB1? PIPEDA? All of these are recent laws that impact acoustical design. Throw in the American Hospital Association/ASHE and AIA's about-to-be-released ``Guidelines for the Design of Healthcare Facilities'' as well as the redrafting of DCID 6/9 and it looks like time for careful examination of some professional practices relating to security and privacy. Should INCE members join with and endorse the ASA's recently formed Joint TCAA/TCN Subcommittee which aims to fill a policy vacuum in Washington and Ottawa relating to the fundamental protection of citizens' rights to privacy? This group will formulate consistent guidelines to enable federal and state agencies in the US and Canada to enforce and monitor their laws-will their guidelines affect INCE members? Those who advise or give expert testimony to government agencies, defense/security organizations, courts, and large institutions in financial services, healthcare or education likely find themselves in a rapidly shifting landscape and recognize the need to respond with new research and professional practices.
The Army War College Review: Student Publications. Volume 2, Number 2. May 2016
2016-05-01
Character Development of U.S. Army Leaders – The Laissez - Fair Approach,” Military Review Online, September-October 2013, 30-39, http://usacac.army.mil/CAC2...intellectual work with professionals invested in U.S. national security, Landpower, strategic leadership , global security studies, and the advancement of...assumed the leadership chair of the Arctic Council for two years. President Obama appointed a well-qualified Special Representative for the Arctic
Cazier, Joseph A; Medlin, B Dawn
2006-09-27
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.
Cazier, Joseph A; Medlin, B. Dawn
2006-01-01
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366
Ifediora, Chris Onyebuchi
2017-04-01
The after-hours house call (AHHC) services in Australia has gained huge popularity in recent years, but it is not clear how well supported the involved doctors feel regarding the clinical, professional and security aspects of their work. It is important that this knowledge gap is filled given that appropriate support helps engender quality in health service delivery. This is a questionnaire-based electronic survey involving a sample frame of all 300 doctors participating in AHHC through the National Home Doctor Service. National Home Doctor Service is Australia's largest AHHC service provider. A total of 168 valid responses (56.0%) were received. Overall, the mean support levels were mild to moderate, ranging from 2.4 to 2.8 out of 4.0 for all three parameters. Specifically, 65.3% of the respondents felt well-supported on clinical issues, 64.7% on professional issues and 43.2% on security issues. Australian-trained doctors were less likely to feel well supported on all aspects [Clinical: odds ratio (OR) 0.38, confidence interval (CI) 0.16 to 0.90; Professional: OR 0.30, CI 0.13 to 0.72; and Security: OR 0.22; CI 0.09 to 0.53] compared with overseas-trained ones. Unsurprisingly, doctors who adopted protective measures felt significantly better supported regarding security (OR 2.75; CI 1.31 to 5.78). There is room for improvement regarding support on AHHC in Australia, and concerned Surgeries should ensure that where available these supports are appropriately utilized. © 2016 John Wiley & Sons, Ltd.
Biggs, Adam T; Mitroff, Stephen R
2015-11-01
Professional visual searches, such as those conducted by airport security personnel, often demand highly accurate performance. As many factors can hinder accuracy, it is critical to understand the potential influences. Here, we examined how explicit decision-making criteria might affect multiple-target search performance. Non-professional searchers (college undergraduates) and professional searchers (airport security officers) classified trials as 'safe' or 'dangerous', in one of two conditions. Those in the 'one = dangerous' condition classified trials as dangerous if they found one or two targets, and those in the 'one = safe' condition only classified trials as dangerous if they found two targets. The data suggest an important role of context that may be mediated by experience; non-professional searchers were more likely to miss a second target in the one = dangerous condition (i.e., when finding a second found target did not change the classification), whereas professional searchers were more likely to miss a second in the one = safe condition. © 2014 The British Psychological Society.
Watson, David
2016-08-01
In England and Wales, the Approved Mental Health Professional (AMHP) has final responsibility for applying under the Mental Health Act 1983 to admit an individual compulsorily and convey them to psychiatric hospital. The AMHP role is challenging and legally accountable and unique to the UK context. To analyse the motivation of individuals to become AMHPs, and identify factors which may affect motivation. Semi-structured interviews were conducted with 12 AMHPs from local authorities across Southern England. Ten participants were social workers, one was qualified as both a nurse and social worker, and one was a mental health nurse. Participants identify career progression and professional development as significant as well as the status and independence of the role and enhanced job security. Social work participants value the Mental Health Act assessment as a contained piece of work, with a high degree of professional discretion. AMHPs are motivated by an increase in professional status and job security, but also exercising independent judgment and authority in a time-limited intervention is emotionally and professionally rewarding.
2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)
2011-08-25
Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3
Mobile Device Security: Perspectives of Future Healthcare Workers
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992
Mobile Device Security: Perspectives of Future Healthcare Workers.
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
Das, Anita; Faxvaag, Arild; Svanæs, Dag
2015-11-24
People who undergo weight loss surgery require a comprehensive treatment program to achieve successful outcomes. eHealth solutions, such as secure online portals, create new opportunities for improved health care delivery and care, but depend on the organizational delivery systems and on the health care professionals providing it. So far, these have received limited attention and the overall adoption of eHealth solutions remains low. In this study, a secure eHealth portal was implemented in a bariatric surgery clinic and offered to their patients. During the study period of 6 months, 60 patients and 5 health care professionals had access. The portal included patient information, self-management tools, and communication features for online dialog with peers and health care providers at the bariatric surgery clinic. The aim of this study was to characterize and assess the impact of an eHealth portal on health care professionals' interaction with patients in bariatric surgery. This qualitative case study involved a field study consisting of contextual interviews at the clinic involving observing and speaking with personnel in their actual work environment. Semi-structured in-depth interviews were conducted with health care professionals who interacted with patients through the portal. Analysis of the collected material was done inductively using thematic analysis. The analysis revealed two main dimensions of using an eHealth portal in bariatric surgery: the transparency it represents and the responsibility that follows by providing it. The professionals reported the eHealth portal as (1) a source of information, (2) a gateway to approach and facilitate the patients, (3) a medium for irrevocable postings, (4) a channel that exposes responsibility and competence, and (5) a tool in the clinic. By providing an eHealth portal to patients in a bariatric surgery program, health care professionals can observe patients' writings and revelations thereby capturing patient challenges and acting and implementing measures. Interacting with patients through the portal can prevent dropouts and deterioration of patients' health. However, professionals report on organizational challenges and personal constraints related to communicating with patients in writing online. Further development of guidelines and education of health care professionals about how to handle, prioritize, communicate, and facilitate patients online is required in addition to increased attention to the organizational infrastructures and incentives for enabling such solutions in health care.
Data Privacy and Security in Higher Education
ERIC Educational Resources Information Center
Williams, Tracy
2003-01-01
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
, exciting, entertaining, and useful for maintaining relationships. Professionally, people can use social HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of world. CENTCOM Personnel are reminded to use common sense when using social media. What are social media
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-28
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... on May 5, 2010, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed.... Specifically, the Exchange proposes to adopt a $0.18 per contract execution fee for ``professional customers...
A National Partnership for Careers in Public Safety and Security
ERIC Educational Resources Information Center
Coffee, Joseph
2007-01-01
A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…
Information Security in Higher Education. Professional Paper Series, #5.
ERIC Educational Resources Information Center
Elliott, Raymond; And Others
Intended to generate discussion and motivate proactive intervention in matters of information security, this paper defines and discusses some of the key issues relating to information security on college and university campuses based on in-depth interviews conducted at eight selected higher education institutions of varying size and composition in…
Influences on Researchers' Commitment.
ERIC Educational Resources Information Center
Bailey, Jeffrey G.
1994-01-01
A study in a new university investigated the relative importance of six factors (job security/promotion, availability of research resources, contribution to university mission, personal stimulation/challenge, colleague relationship, and professional recognition/development) on research commitment and productivity. Discipline, rank, and gender were…
2011-10-01
said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-21
... Professionals'' May 15, 2012. I. Introduction On March 20, 2012, the Fixed Income Clearing Corporation (``FICC... Members and NYPC Clearing Members for certain ``market professionals.'' \\6\\ \\5\\ See Securities Exchange... professional'' cross-margining program aims to closely replicate the Options Clearing Corporation (``OCC...
Assessment of the work environment of faculty of a Medical College in Pakistan.
Saeed, Abid; Butt, Zahid Ahmad
2014-01-01
Extensive research is done on nursing work environments but less is known about the job conditions and environments of other health professionals. This study was aimed to fill this information gap by highlighting the factors affecting the work environment and stressors causing turnover of staff. A cross sectional study was conducted in Bolan Medical College Quetta for the assessment of working environment of the faculty from 22nd April to 22nd July 2012. All permanent teaching staff was included. A structured questionnaire was adopted fromI health sciences association of Alberta (HSSA), 2006 work Environment Survey. An observational check list for assessment of the physical environment /infrastructure and other general physical stuff was used. The faculty menibers were-not-satisfied with the security and safety of their work place but were satisfied with salaries, employer, and management. Work teams and relationship between employees and employers were respectful with good communication. Majority found their work times stressful and opportunities for on job trainings and professional development, adequate tools, equipment and conditions were mostly lacking. The overall working environment is not that good and few areas need serious attention like: professional development, trainings, adequate equipment, and security.
Faunce, Thomas; McKenna, Michael; Rayner, Johanna; Hawes, Jazmin
2016-03-01
In recent times, Australia's national security concerns have had controversial impacts on regulation of Australian medical practitioners in areas related to immigration detention. This column explores three recent case studies relevant to this issue. The first involves the enactment of the Australian Border Force Act 2015 (Cth), which has a significant impact on the regulation of medical professionals who work with people in immigration detention. The second involves the decision of the High Court of Australia in Plaintiff M68/2015 v Minister for Immigration and Border Protection [2016] HCA 1 that an amendment to Australian federal legislation justified sending children back to immigration detention centres in Papua New Guinea and Nauru. This legislation was previously heavily criticised by the Australian Human Rights Commissioner. The third concerns the deregistration of Tareq Kamleh, an Australian doctor of German-Palestinian heritage who came to public attention on ANZAC Day 2015 with his appearance online in a propaganda video for the Islamic State terrorist organisation al-Dawla al-Islamyia fil Iraq wa'al Sham, also known as Islamic State of Iraq and Syria (ISIS) or Daesh. Australia's professional regulatory system should presumptively respect professional virtues, such as loyalty to the relief of individual patient suffering, when dealing with doctors (whether in Australia or ISIS-occupied Syria) working under regimes whose principles appear inconsistent with those of ethics and human rights.
Protecting the Privacy and Security of Your Health Information
... Access to Medical Records Privacy, Security, and HIPAA Laws, Regulation, and Policy Scientific Initiatives Standards & Technology Usability ... care providers and professionals, and the government. Federal laws require many of the key persons and organizations ...
Beyond Performativity: A Pragmatic Model of Teacher Professional Learning
ERIC Educational Resources Information Center
Lloyd, Margaret; Davis, James P.
2018-01-01
The intent and content of teacher professional learning has changed in recent times to meet the demands of performativity. In this article, we offer and demonstrate a pragmatic way to map teacher professional learning that both meets current demands and secures a place for teacher-led catalytic learning. To achieve this, we position identified…
Redefining Professional Knowledge in Athletic Training: Whose Knowledge Is It Anyway?
ERIC Educational Resources Information Center
McKeon, Patrick O.; Medina McKeon, Jennifer M.; Geisler, Paul R.
2017-01-01
Context: As athletic training continues to evolve as a profession, several epistemological considerations must be considered. These include how we generate professional knowledge and how we secure and legitimize it in both professional and public spheres. Objective: The purpose of this commentary is to provide an overview of how athletic training…
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
Van Ryzin, Mark J; Leve, Leslie D
2012-04-01
In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom
2009-04-16
Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors.
Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom
2009-01-01
Background Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Methods Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. Results The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Conclusion Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors. PMID:19371413
2011-01-01
Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967
Transportation Security Institute : recruiting next generation professionals.
DOT National Transportation Integrated Search
2013-08-01
The Center for Transportation Training and Research (CTTR), as part of Texas Southern University : (TSU), served as host for the 2013 Transportation Security Institute (TSI) in Houston and : surrounding area. The 2013 Houston TSI focuses on the missi...
Social Security for Composers and Free Lances.
ERIC Educational Resources Information Center
Rossel-Majdan, Karl
1982-01-01
Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)
Transportation Security Institute: recruiting next generation professionals.
DOT National Transportation Integrated Search
2012-08-01
"The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...
Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam
2017-01-01
Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
... Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... Terms of Substance of the Proposed Rule Change The Exchange proposes to adopt ISE Rule 212 (Sales Value... supervision and regulation of the securities markets and securities professionals. To offset this obligation...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61426; File No. SR-Phlx-2010-05] Self... Professional Orders January 26, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934... PHLX, Inc. (``Phlx'' or ``Exchange'') filed with the Securities and Exchange Commission (``SEC'' or...
2008 Stability, Security, Transition and Reconstruction Operations Conference
2008-09-04
Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV
Biggs, Adam T; Mitroff, Stephen R
2014-01-01
Visual search, locating target items among distractors, underlies daily activities ranging from critical tasks (e.g., looking for dangerous objects during security screening) to commonplace ones (e.g., finding your friends in a crowded bar). Both professional and nonprofessional individuals conduct visual searches, and the present investigation is aimed at understanding how they perform similarly and differently. We administered a multiple-target visual search task to both professional (airport security officers) and nonprofessional participants (members of the Duke University community) to determine how search abilities differ between these populations and what factors might predict accuracy. There were minimal overall accuracy differences, although the professionals were generally slower to respond. However, the factors that predicted accuracy varied drastically between groups; variability in search consistency-how similarly an individual searched from trial to trial in terms of speed-best explained accuracy for professional searchers (more consistent professionals were more accurate), whereas search speed-how long an individual took to complete a search when no targets were present-best explained accuracy for nonprofessional searchers (slower nonprofessionals were more accurate). These findings suggest that professional searchers may utilize different search strategies from those of nonprofessionals, and that search consistency, in particular, may provide a valuable tool for enhancing professional search accuracy.
Defining the Role of the Professional Security Consultant.
ERIC Educational Resources Information Center
Webster, Jim
2002-01-01
Discusses the skill set that should be available in security consultants to higher education, including the ability to work with mechanical, architectural, electrical, landscaping, and telecommunications systems. Addresses the need to bring consultants into the building design phase. (EV)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-04
... Professionals'' March 29, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1... positions held by GSD Netting Members and NYPC Clearing Members for certain ``market professionals.'' \\5\\ \\4...\\ The NYPC-FICC ``market professional'' cross-margining program aims to closely replicate the Options...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... assessable professional reported or required to be reported by a municipal advisor to the MSRB on Form A-11... Assessment and Form A-11- Interim. For purposes of the interim assessment, an assessable professional of a...-Interim as an assessable professional any associated person (i) Who otherwise qualifies as an assessable...
2011-01-01
Background Moving a forensic mental health patient from one level of therapeutic security to a lower level or to the community is influenced by more than risk assessment and risk management. We set out to construct and validate structured professional judgement instruments for consistency and transparency in decision making Methods Two instruments were developed, the seven-item DUNDRUM-3 programme completion instrument and the six item DUNDRUM-4 recovery instrument. These were assessed for all 95 forensic patients at Ireland's only forensic mental health hospital. Results The two instruments had good internal consistency (Cronbach's alpha 0.911 and 0.887). Scores distinguished those allowed no leave or accompanied leave from those with unaccompanied leave (ANOVA F = 38.1 and 50.3 respectively, p < 0.001). Scores also distinguished those in acute/high security units from those in medium or in low secure/pre-discharge units. Each individual item distinguished these levels of need significantly. The DUNDRUM-3 and DUNDRUM-4 correlated moderately with measures of dynamic risk and with the CANFOR staff rated unmet need (Spearman r = 0.5, p < 0.001). Conclusions The DUNDRUM-3 programme completion items distinguished significantly between levels of therapeutic security while the DUNDRUM-4 recovery items consistently distinguished those given unaccompanied leave outside the hospital and those in the lowest levels of therapeutic security. This data forms the basis for a prospective study of outcomes now underway. PMID:21722396
An exploratory risk perception study of attitudes toward homeland security systems.
Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic
2008-08-01
Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.
One health security: an important component of the global health security agenda.
Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle
2014-01-01
The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.
Lanièce, C; Sow, K; Desclaux, A
2016-10-01
Security agents are on the front line when patients arrive at health facilities, giving them a potential role to play in an Ebola virus disease (EVD) outbreak. The position of security agents within health services is poorly documented. A survey was conducted to clarify their understanding of Ebola pathology, to assess their need for information and to determine their role in patient management. The survey included both qualitative and quantitative aspects. 80 security agents of the Fann teaching hospital (Dakar) completed questionnaires, and 11 were interviewed. Qualitative analysis was performed with Dedoose and the quantitative analysis using Excel. The results show that security agents' activities go beyond their mission of security and control. They are involved in informing, orienting and assisting patients and those accompanying them in the hospital. The security agents have basic knowledge of EVD, but overestimate the risk of transmission. They want to be more informed and to have access to protective material. These results suggest that these professionals should be taken into account when developing response strategies to Ebola outbreaks. Their knowledge of and protection against the disease must be strengthened. Non-health professionals working in health facilities should be trained in order to be able to relay information to the public.
20 CFR 401.25 - Terms defined.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...
20 CFR 401.25 - Terms defined.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...
77 FR 75679 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-21
... et seq.). Rule 17Ad-13 requires an annual study and evaluation of internal accounting controls under... transfer agents to obtain an annual report on the adequacy of their internal accounting controls from an... service only their own companies' securities. Approximately 150 independent, professional transfer agents...
The Role Of Moral Awareness In Computer Security
NASA Astrophysics Data System (ADS)
Stawinski, Arthur
1984-08-01
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011
2011-01-01
the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional
1988-03-01
Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy
Kenny, P; Johnson, I G
2016-11-18
Use of social media has increased amongst health professionals. This has benefits for patient care but also introduces risks for confidentiality and professional fitness to practise. This study aimed to examine dental student attitudes towards professional behaviour on social media. The secondary aim was to establish the extent and nature of social media use and exposure to potentially unprofessional behaviours. A cross-sectional study was carried out in one dental school. Data were collected using questionnaires to examine social media use, perceptions and attitudes towards social media and professional behaviours online. Students who responded (N = 155) all used social media at least once per week; most used more than one platform. Students were aware of the relationship between social media use and professional practice. Posting drunken photographs and interacting with staff and patients online were widely considered as unprofessional. Security settings affected behaviour and most had seen inappropriate behaviours online. The study found that students use social media extensively.. Students are aware of the risks but there is a greater sense of safety in closed groups and many students are exposed to potentially inappropriate content online. This suggests that training should be implemented to help students manage these risks.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-13
... Professional,\\9\\ Firm and Market Maker \\10\\ orders that remove liquidity from the BATS Options order book. The Exchange proposes to raise the fee to $0.44 per contract for Professional, Firm and Market Maker orders... ``Professional'' means any person or entity that (i) is not a broker or dealer in securities, and (ii) places...
Faxvaag, Arild; Svanæs, Dag
2015-01-01
Background People who undergo weight loss surgery require a comprehensive treatment program to achieve successful outcomes. eHealth solutions, such as secure online portals, create new opportunities for improved health care delivery and care, but depend on the organizational delivery systems and on the health care professionals providing it. So far, these have received limited attention and the overall adoption of eHealth solutions remains low. In this study, a secure eHealth portal was implemented in a bariatric surgery clinic and offered to their patients. During the study period of 6 months, 60 patients and 5 health care professionals had access. The portal included patient information, self-management tools, and communication features for online dialog with peers and health care providers at the bariatric surgery clinic. Objective The aim of this study was to characterize and assess the impact of an eHealth portal on health care professionals’ interaction with patients in bariatric surgery. Methods This qualitative case study involved a field study consisting of contextual interviews at the clinic involving observing and speaking with personnel in their actual work environment. Semi-structured in-depth interviews were conducted with health care professionals who interacted with patients through the portal. Analysis of the collected material was done inductively using thematic analysis. Results The analysis revealed two main dimensions of using an eHealth portal in bariatric surgery: the transparency it represents and the responsibility that follows by providing it. The professionals reported the eHealth portal as (1) a source of information, (2) a gateway to approach and facilitate the patients, (3) a medium for irrevocable postings, (4) a channel that exposes responsibility and competence, and (5) a tool in the clinic. Conclusions By providing an eHealth portal to patients in a bariatric surgery program, health care professionals can observe patients’ writings and revelations thereby capturing patient challenges and acting and implementing measures. Interacting with patients through the portal can prevent dropouts and deterioration of patients’ health. However, professionals report on organizational challenges and personal constraints related to communicating with patients in writing online. Further development of guidelines and education of health care professionals about how to handle, prioritize, communicate, and facilitate patients online is required in addition to increased attention to the organizational infrastructures and incentives for enabling such solutions in health care. PMID:26601678
Opening a new office: the dentist's personal frontier.
Crafton, B Casey; Lofft, Alexander H
2006-01-01
The purpose of this article is to assist the dental practitioner by providing insight into commercial real estate and a framework for identifying and securing new office space, as well as by addressing concerns about the physical space of a dental practice. In the process of identifying and securing new office space, the dental practitioner can maximize efficiency and minimize risk by assembling a team of professionals to assist him or her. This team should be composed of an accountant and an attorney, as well as a dental equipment/design specialist and a commercial real estate professional. The professional team will provide invaluable assistance to the dentist, enabling him or her to avoid major financial, legal, logistic and real estate-related pitfalls inherent in establishing or moving a dental practice.
Salloch, Sabine
2018-06-05
Dual Use Research of Concern (DURC) constitutes a major challenge for research practice and oversight on the local, national and international level. The situation in Germany is shaped by two partly competing suggestions of how to regulate security-related research: The German Ethics Council, as an independent political advisory body, recommended a series of measures, including national legislation on DURC. Competing with that, the German National Academy of Sciences and the German Research Foundation, as two major professional bodies, presented a strategy which draws on the self-control of science and, inter alia, suggests expanding the scope of research ethics committees (RECs) to an evaluation of DURC. This situation is taken as an occasion to further discuss the scope and limits of professional self-control with respect to security-related research. The role of RECs as professional bodies of science is particularly analyzed, referring to the theoretical backgrounds of professionalism. Two key sociological features of professionalism - ethical orientation and professional self-control - are discussed with respect to the practice of biomedical science. Both attributes are then analyzed with respect to the assessment of DURC by RECs. In conclusion, it is stated that issues of biosecurity transcend the boundaries of the scientific community and that a more comprehensive strategy should be implemented encompassing both professional self-control and legal oversight.
1988-12-01
medical services, professional mobility , job security, and education. These were among the "human rights" on which the socialist system was said to be...economic reform is to mean anything, job uncertainty will supersede full employment. Professional mobility , once an important safety valve against worker
77 FR 31851 - Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-30
... identification, U.S. visa number, FCC point of contact, visitor signature, professional title, organizational... pertinent records, or to another public authority or professional organization, if necessary to obtain... secured by limited access card readers. The computer servers themselves are password-protected. Access to...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
77 FR 61659 - Proposed Information Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-10
... professional education programs and the renewal of the enrollment status for those individuals admitted... years. For additional information on renewals, see Circular 230 or visit the Office of Professional... Accounting Method for Dealers in Securities. OMB Number: 1545-1558. Revenue Procedure Number: Revenue...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
Professional Development Needs as Perceived by Minnesota Industrial Arts/Technology Teachers.
ERIC Educational Resources Information Center
Johnson, Scott D.; Summers, Keith
1984-01-01
Describes a profile of professional development needs that was developed through a survey of 150 industrial arts/technology teachers in Minnesota. The greatest need was in the area of job environment: salary, job security, facilities and equipment, and discipline. (SK)
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
ERIC Educational Resources Information Center
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal
2012-01-01
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security
2007-01-01
technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region
Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine
ERIC Educational Resources Information Center
Bystrova, Bogdana
2017-01-01
At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…
ERIC Educational Resources Information Center
Moran, Matthew; Hobbs, Christopher
2018-01-01
In recent years, nuclear security has gained prominence on the international security agenda. Driven by post 9/11 anxieties and the politicization of fears regarding nuclear terrorism, concerns in this area have spawned a wealth of initiatives, which seek to counter this threat. Principal among these have been efforts to promote nuclear security…
A Study of Teachers, Principals, and Tenure.
ERIC Educational Resources Information Center
Kersten, Thomas; Brandfon, Frances
1988-01-01
A survey of teachers and principals in North Cook County, Illinois, explored tenure issues related to teacher performance, professional image, job security, and teacher welfare. Although a majority of teachers and principals agreed that tenure inhibits dismissal of below-average teachers, 54 percent of teachers favored keeping tenure, and 69…
Mikkelsen, Maria Rudkjær; Hendriksen, Carsten; Schiødt, Frank Vinholt; Rydahl-Hansen, Susan
2015-12-01
To identify and describe conditions that limit or support patients, with alcoholic liver disease after surviving alcohol-induced hepatic encephalopathy, ability to cope with current and potential physical and psychosocial problems--in interaction with professionals and relatives--and to recommend appropriate interventions. Alcoholic liver disease patients surviving alcohol-induced hepatic encephalopathy have significantly impaired quality of life. Internationally, there is a lack of knowledge about the conditions that affect alcoholic liver disease patients' coping and rehabilitation. A grounded theory study. Semi-structured interviews, conducted with 11 alcoholic liver disease patients who were diagnosed with hepatic encephalopathy. The interview guide was inspired by Richard S. Lazarus's theory of stress and coping. The elements that support or limit alcoholic liver disease patients' ability to cope with physical and psychosocial problems in interaction with professionals and relatives were represented by the core category 'Struggle for preservation of identity as a significant individual'. It was characterised by three categories, which are interrelated and impact upon each other: 'Acknowledgement', 'Struggle to maintain control' and 'Achieving a sense of security'. Alcoholic liver disease patients experience a struggle to preserve their identity as a significant individual. It can be assumed that professionals and relatives in their interaction with, and support of, patients should focus on strengthening and preserving patients' identity in the form of acknowledgement, helping alcoholic liver disease patients maintain self-control and providing a safety net so patients feel a sense of security. It can be assumed that professionals should support alcoholic liver disease patients' appraisal of, and coping with, physical and psychosocial problems based on acknowledgment, understanding and a sympathetic attitude. Professionals should proactively approach patients when they withdraw. It may be useful for professionals to be aware of alcoholic liver disease patients' individual coping strategies and thereby their individual requirements for professional supportive intervention. © 2015 John Wiley & Sons Ltd.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... information concerning associated persons. The proposed rule change was published for comment in the Federal...
1996-01-01
The American Nurses Association (ANA) is committed to safeguarding the public, protecting and advancing the careers of professional nurses, supporting individual and collective efforts by registered nurses to protect their clients and enhancing the professional development and job security of registered nurses. As the nation's health care system is restructured, ANA is actively engaged in initiatives to strengthen the economic and general welfare of registered nurses, the safety and care for the public, and, in partnership with the state nurses associations (SNAs), oppose efforts to replace registered nurses with inappropriate substitutes.
Care control and collaborative working in a prison hospital.
Foster, John; Bell, Linda; Jayasinghe, Neil
2013-03-01
This paper reports findings from a qualitative research project, using interviews, focus groups and participant observations, which sought to investigate "good practice" in a nurse-led prison hospital wing for male prisoners. The study raised issues about tensions between "caring" and "control" of prisoners from the perspectives of professionals working or visiting the wing. This paper discusses collaborative working between professionals from different backgrounds, including nurses and healthcare (prison) officers who were based on the wing and others who visited such as probation, medical, Inreach team or Counselling Advice, Referral, Assessment and Through Care team staff (CARAT). The key finding was that there is a balance between therapy and security/risk. In order to maintain this, the two main groups based on the hospital wing--nurses and prison officers--moved between at times cooperating, coordinating and collaborating with each other to maintain this balance. Other themes were care and control, team working, individual and professional responsibilities and communication issues. Enhancing the role of nurses should be encouraged so that therapy remains paramount, and we conclude with some recommendations to encourage collaborative working in prison healthcare settings to ensure that therapy continues to be paramount while security and safety are maintained.
33 CFR 137.35 - Inquiries by an environmental professional.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...
33 CFR 137.35 - Inquiries by an environmental professional.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...
Professional Development: Catalyst for Change?
ERIC Educational Resources Information Center
Niederhauser, Dale; Wessling, Sarah
2011-01-01
Difficulty securing adequate professional development (PD) has long been a barrier to the effective implementation of educational technology. Concerns about the dearth of PD for helping teachers integrate technology into their instructional practices raised nearly 25 years ago appear to still hold true despite repeated calls for increased…
Flying Solo: Librarian, Manage Thyself.
ERIC Educational Resources Information Center
Siess, Judith A.
1999-01-01
Discusses solo librarians, or one-person librarians, and the benefits and disadvantages of being the only professional in a library. Topics include independence, variety, enhanced feelings of self-worth, professional isolation, lack of clerical support, lack of job security, low pay, and a list of pertinent resources. (LRW)
The strategic security officer.
Hodges, Charles
2014-01-01
This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.
Training in the Post-Terrorism Era.
ERIC Educational Resources Information Center
Caudron, Shari
2002-01-01
A survey of training professionals revealed how the terrorist attacks of September 11, 2001 changed employee attitudes toward training. Decreased travel, increased use of distance technologies, development of security and evacuation plans, and emphasis on such topics as diversity, stress management, and security are some of the changes. (JOW)
Former Nonproliferation Graduate Fellow Served at U.S. Mission
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brim, Cornelia P.
2014-10-01
Because of her training and professional experiences, Rosalyn Leitch, a Security Specialist at Pacific Northwest National Laboratory and former Nonproliferation Graduate Fellow with NIS (2012-2013) was able to transition into temporary assignment as UNVIE Acting Nuclear Security Attaché from November 2013 through February 2014.
Security Concerns in Android mHealth Apps
He, Dongjing; Naveed, Muhammad; Gunter, Carl A.; Nahrstedt, Klara
2014-01-01
Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients. This paper presents a series of three studies of the mHealth apps in Google Play that show that mHealth apps make widespread use of unsecured Internet communications and third party servers. Both of these practices would be considered problematic under HIPAA, suggesting that increased use of mHealth apps could lead to less secure treatment of health data unless mHealth vendors make improvements in the way they communicate and store data. PMID:25954370
Security Concerns in Android mHealth Apps.
He, Dongjing; Naveed, Muhammad; Gunter, Carl A; Nahrstedt, Klara
2014-01-01
Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients. This paper presents a series of three studies of the mHealth apps in Google Play that show that mHealth apps make widespread use of unsecured Internet communications and third party servers. Both of these practices would be considered problematic under HIPAA, suggesting that increased use of mHealth apps could lead to less secure treatment of health data unless mHealth vendors make improvements in the way they communicate and store data.
2012-05-22
publication of the Security Cooperation Guidance ( SCG ), 32 U.S. Joint Chiefs of Staff, Joint Operation...format and content of the plans themselves. 2 The 2003 release of the classified SCG , which replaced TEPs with TSCPs, rendered CJCSM 3113.01 obsolete...interests while providing the SecDef increased visibility on and control over security cooperation activities, but the SCG was not as explicit in its
High-end Home Firewalls CIAC-2326
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W
Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managersmore » have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.« less
Müthing, Jannis; Jäschke, Thomas
2017-01-01
Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271
Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M
2017-10-18
Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Price, Managing Director, Securities Industry and Financial Markets Association, dated October 4, 2012... other industry professionals will have difficulty pricing options during Limit States and Straddle... conditions have changed and (ii) gaming the obvious error rule to retroactively adjust market maker quotes by...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the SEC...
[Secure e-mail between physicians--aspect of a telemedicine platform for the health care system].
Goetz, C F
2001-10-01
Ever since the Roland-Berger-Study in 1997, the concept of a "telematics platform" for health care describes the combination of all technical and organizational components and services for the online transmission of patient data. This platform works on an interoperable collection of standards for addressing, security and content-description. In this context the security for application and transport data is based on data protection as well as medical non-disclosure rules. The methods of cryptography can provide security services for data transmitted realizing addressed, direct and indirect privacy. The first German health professional card, the electronic physicians' ID, provides central tools for such applications. First functionally simple pilot projects will prove the effectiveness of chosen methods in this year, even if not all identified construction sites in health care telematics have yet been lead towards a finalized solution.
Teaching the Passive through Semantically Enhanced Input
ERIC Educational Resources Information Center
Little, Andrea; Fieldsend, Terry
2018-01-01
This article reports on a small, classroom-based study exploring the use of a task to teach the passive in an English for specific purposes context. The participants were 34 adult Japanese male learners, all security professionals, ranging in proficiency level from elementary to advanced. The task was designed to highlight the form--meaning…
Using Social Media to Support the Learning Needs of Future IS Security Professionals
ERIC Educational Resources Information Center
Neville, Karen; Heavin, Ciara
2013-01-01
The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…
The Psychological Competence of Police Officers in Confidential Cooperation with Citizens
ERIC Educational Resources Information Center
Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.
2016-01-01
This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... those who meet the Professional definition have certain technological and informational advantages over... Chapter I, Section I (Definitions). See also Securities Exchange Act Release Nos. 63028 (October 1, 2010... Professionals have the same technological and informational advantages as broker-dealers trading for their own...
Professional Challenges in School Counseling: Organizational, Institutional and Political
ERIC Educational Resources Information Center
Hatch, Trish A.
2008-01-01
The school counseling profession has struggled throughout history to secure a legitimate integral position in the educational mission of school. The profession is more likely to gain acceptance and be seen as a legitimate profession if we understand three theories that form the foundation of professional legitimacy: Organizational Theory,…
20 CFR 438.205 - Professional and technical services.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...
20 CFR 438.205 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...
Sarracino, Diego; Presaghi, Fabio; Degni, Silvia; Innamorati, Marco
2011-06-01
In early adolescence, attachment security reflects not only the quality of ongoing relationships with parents, but also how adolescents process social relationships with "others" - that is, their "social value orientation" - with possible implications for adolescents' risk-taking. In this study, a sample of Italian early adolescents were administered self-report measures in order to examine the relationships (a) between early adolescents' perceived attachment security to mothers and fathers, social values (related to family and the socio-cultural context), and sensation seeking (as a temperamental predisposition to risk-taking), and (b) between these variables and adolescents' externalizing problem behaviour. Adolescents were more securely attached to the same-sexed parent. Further, attachment security with the opposite-sexed parent predicted more conservative social value orientations, and lower levels of problem behaviour. In contrast, sensation seeking predicted self-enhancement and openness-to-change values to a greater extent, and, in girls, lower levels of attachment security to mothers and fathers. Copyright © 2010 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Seger, Wolfgang; Nüchtern, Elisabeth
2015-07-01
Medical experts who practice social medicine have a strong ethical approach for their professional positions. Their reports must reflect an objective, independent, high-quality assessment of interactions between health status and the disability of individuals. However, they must simultaneously consider the societal involvement of these individuals when determining the framework of the Statutory Health Insurance and Social Security Systems. Their task is to recommend sociomedical benefits that are tailored to suit personal needs and that respect the individual life situations of the persons involved, thus complementing the efforts of healthcare professionals in clinical settings. The editorial describes the self-conception of this medical specialty on behalf of the German Society of Social Medicine and Prevention (DGSMP). Policy makers in social insurances and social security systems generally must respect independent sociomedical recommendations as a crucial point for further realistic development activities.
The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.
Busdicker, Mike; Upendra, Priyanka
2017-09-02
This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.
Professional convergence in forensic practice.
Mercer, D; Mason, T; Richman, J
2001-06-01
This paper outlines the development and convergence of forensic science and secure psychiatric services in the UK, locating the professionalization of forensic nursing within a complex web of political, economic, and ideological structures. It is suggested that a stagnation of the therapeutic enterprise in high and medium security provision has witnessed an intrusion of medical power into the societal body. Expanding technologies of control and surveillance are discussed in relation to the move from modernity to postmodernity and the ongoing dynamic of medicalized offending. Four aspects of globalization are identified as impacting upon the organization and application of forensic practice: (i) organized capitalism and the exhaustion of the welfare state; (ii) security versus danger and trust versus risk; (iii) science as a meta-language; and (iv) foreclosure as a mechanism of censorship. Finally, as a challenge for the profession, some predictions are offered about the future directions or demise of forensic nursing.
NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2014-02-01
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.
Campbell, Robert J; Durigon, Louis
2003-01-01
Increasingly, health care professionals will need to retrieve, store, share, and send data using several types of wireless devices. These devices include personal digital assistants, laptops, Web tablets, cell phones, and clothing that monitor heart rate and blood pressure. Regardless of the device, several standards will vie for the right to provide the wireless communications link between the health care professional and the wired data resources located within a health care organization. This article identifies the top three technologies in the wireless communications field: Wireless Fidelity (WiFi), Mobile Communications, and Bluetooth; breaks down each according to its strengths and weaknesses; and makes recommendations for their use by health care professionals located inside and outside a health care facility. Where appropriate the discussion includes an explication of how a specific technology can be made secure from hackers and other security breeches.
Database Systems and Oracle: Experiences and Lessons Learned
ERIC Educational Resources Information Center
Dunn, Deborah
2005-01-01
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
NASA Astrophysics Data System (ADS)
Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.
Johannessen, A
2004-01-01
This is a summary of the Young Water Professionals Seminar involving more than 50 young people from all over the world working with water. The presentations and following discussion were very lively and were about how subsidies and trade barriers imposed by the developed countries are influencing the income-generating capacity of millions of people in the developing world. Even though this is a very complex issue not easily resolved during the seminar it was also clear that there are some fundamental problems that need to be addressed. The importance of looking for solutions at different levels (i.e. local, regional, national) was highlighted as well as the policy of double standards, preaching free trade but only for the benefit of overdeveloped countries themselves. Further it was discussed how to achieve basin security through food security, and managing water for food security. The conclusion was that win-win solutions would be made if agricultural subsidies were to be completely removed.
SocialRAD: an infrastructure for a secure, cooperative, asynchronous teleradiology system.
Figueiredo, João Filho Matos; Motta, Gustavo Henrique Matos Bezerra
2013-01-01
The popularity of teleradiology services has enabled a major advance in the provision of health services to areas with difficult geographical access. However, this potential has also brought with it a number of challenges: the large volume of data, characteristic of imaging tests, and security requirements designed to ensure confidentiality and integrity. Moreover, there is also a number of ethical questions involving the dominant model on the market, whereby this service is outsourced to private companies, and is not directly undertaken by professional radiologists. Therefore, the present paper proposes a cooperative model of teleradiology, where health professionals interact directly with the hospitals providing patient care. This has involved the integration of a wide range of technologies, such as the interconnection models Peer-to-Peer, Cloud Computing, Dynamic DNS, RESTful Web Services, as well as security and interoperability standards, with the aim of promoting a secure, collaborative asynchronous environment. The developed model is currently being used on an experimental basis, providing teleradiology support to cities in the north-eastern hinterland of Brazil, and is fulfilling all expectations.
ERIC Educational Resources Information Center
Rosow, Jerome M.; Zager, Robert
This volume, Interim Report No. 3 in a 3-year study, considers literacy programs designed to qualify employees for promotions or professional advancement. It adopts a multidimensional definition of moving ahead, one that extends to monetary rewards, career development, and employment security. The volume is divided into two parts: report and case…
German Foreign Fighters in Syria and Iraq
2016-03-01
players of a Saudi semi-professional soccer team mobilized as a group to travel and fight in Iraq.47 Yet the Saudi soccer squad is not the only...as their biographical availability and integration into German society. The study finds that German foreign fighters are primarily mobilized through...MASTER OF ARTS IN SECURITY STUDIES (MIDDLE EAST, SOUTH ASIA, SUB-SAHARAN AFRICA) from the NAVAL POSTGRADUATE SCHOOL March 2016
Bible, J; Emery, R J; Williams, T; Wang, S
2006-11-01
Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.
Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L
2018-03-01
While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
... Market Maker,\\5\\ Firm Proprietary and Customer (Professional) \\6\\ orders; and (ii) $0.78 per contract for Non-ISE Market Maker \\7\\ orders. Priority Customer \\8\\ orders are not charged a ``taker'' fee for... Proprietary and Customer (Professional) orders. Priority Customer orders are not charged a ``maker'' fee for...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
...\\ Market Maker Plus,\\8\\ Firm Proprietary, Customer (Professional),\\9\\ Non-ISE Market Maker,\\10\\ and Priority Customer.\\11\\ The Exchange is proposing to increase certain rebates for certain complex orders, as... determine whether or not they are meeting the Exchange's stated criteria. \\9\\ A Customer (Professional) is a...
Relationship between Innovation and Professional Communication in the "Creative" Economy
ERIC Educational Resources Information Center
Hailey, David; Cox, Matthew; Loader, Emily
2010-01-01
We evaluate 45 jobs professional communicators might occupy. Specifically, we examine the impact of creativity on careers that may become more or less easily outsourced domestically or offshore in the future. We are unable to find any particular relationship between creativity, per se, and job security. Instead, we find that people with knowledge…
Professional Amnesia: A Suitable Case for Treatment
ERIC Educational Resources Information Center
Drummond, Mary Jane
2005-01-01
Early Years educators have always had a particularly secure feel for what lies at the heart of vibrant education, for "a principled understanding of learning." Here Mary Jane Drummond reminds the reader, not only that professional knowledge exists outside ring binders, but that, prior to their emergence, we did know some very important things we…
Homeland security challenges in nursing practice.
Boatright, Connie; McGlown, K Joanne
2005-09-01
Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.
Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.
Bernik, Igor; Prislan, Kaja
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
Geiger, Ben Baumberg; Garthwaite, Kayleigh; Warren, Jon; Bambra, Clare
2017-08-25
It has been argued that social security disability assessments should directly assess claimants' work capacity, rather than relying on proxies such as on functioning. However, there is little academic discussion of how such assessments could be conducted. The article presents an account of different models of direct disability assessments based on case studies of the Netherlands, Germany, Denmark, Norway, the United States of America, Canada, Australia, and New Zealand, utilising over 150 documents and 40 expert interviews. Three models of direct work disability assessments can be observed: (i) structured assessment, which measures the functional demands of jobs across the national economy and compares these to claimants' functional capacities; (ii) demonstrated assessment, which looks at claimants' actual experiences in the labour market and infers a lack of work capacity from the failure of a concerned rehabilitation attempt; and (iii) expert assessment, based on the judgement of skilled professionals. Direct disability assessment within social security is not just theoretically desirable, but can be implemented in practice. We have shown that there are three distinct ways that this can be done, each with different strengths and weaknesses. Further research is needed to clarify the costs, validity/legitimacy, and consequences of these different models. Implications for rehabilitation It has recently been argued that social security disability assessments should directly assess work capacity rather than simply assessing functioning - but we have no understanding about how this can be done in practice. Based on case studies of nine countries, we show that direct disability assessment can be implemented, and argue that there are three different ways of doing it. These are "demonstrated assessment" (using claimants' experiences in the labour market), "structured assessment" (matching functional requirements to workplace demands), and "expert assessment" (the judgement of skilled professionals). While it is possible to implement a direct assessment of work capacity for social security benefits, further research is necessary to understand how best to maximise validity, legitimacy, and cost-effectiveness.
Money, Status and Composition: Assumptions Underlying the Crisis of Part-Time Instruction.
ERIC Educational Resources Information Center
Staples, Katherine
Part-time instructors make up an increasingly large percentage of college faculty. In English departments, part-time instructors take on the least prestigious and most demanding work--the teaching of writing--for low wages and without job security or professional recognition. This unfair treatment stems from the belief that the study and teaching…
Promoting Continuing Computer Science Education through a Massively Open Online Course
ERIC Educational Resources Information Center
Oliver, Kevin
2016-01-01
This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…
The ISACA Business Model for Information Security: An Integrative and Innovative Approach
NASA Astrophysics Data System (ADS)
von Roessing, Rolf
In recent years, information security management has matured into a professional discipline that covers both technical and managerial aspects in an organisational environment. Information security is increasingly dependent on business-driven parameters and interfaces to a variety of organisational units and departments. In contrast, common security models and frameworks have remained largely technical. A review of extant models ranging from [LaBe73] to more recent models shows that technical aspects are covered in great detail, while the managerial aspects of security are often neglected.Likewise, the business view on organisational security is frequently at odds with the demands of information security personnel or information technology management. In practice, senior and executive level management remain comparatively distant from technical requirements. As a result, information security is generally regarded as a cost factor rather than a benefit to the organisation.
Perceptions of the importance and control of professional problems in the clinical setting.
Maupomé, G; Borges-Yáñez, S A; Dáez-de-Bonilla, F J; Pineda-Cruz, A
2001-01-01
The objective of this study was to identify the relative importance of culturally relevant professional problems and the degree of control over them, as perceived by dentists and dental students in Mexico City, Mexico. The dentists and students ranked 13 problems according to importance and then according to the perceived degree of control over each one. Novice clinicians were less secure about their ability to cope with the legal, financial, and clinical performance problems, whereas experienced clinicians were more concerned about occupational hazards and the dental market and culture. Both reported similar perceptions of their control of the problems. This preliminary information should support introducing into dental schools relevant practice-management courses, targeting continuing education efforts, and instituting professional counseling measures to meet the challenges posed by these problems.
Mazerolle, Stephanie M; Dodge, Thomas M
2012-01-01
Anecdotally, we know that students select graduate programs based on location, finances, and future career goals. Empirically, however, we lack information on what attracts a student to these programs. To gain an appreciation for the selection process of graduate study. Qualitative study. Postprofessional programs in athletic training (PPATs) accredited by the National Athletic Trainers' Association. A total of 19 first-year PPAT students participated, representing 13 of the 16 accredited PPAT programs. All interviews were conducted via phone and transcribed verbatim. Analysis of the interview data followed the procedures as outlined by a grounded theory approach. Trustworthiness was secured by (1) participant checks, (2) participant verification, and (3) multiple analyst triangulations. Athletic training students select PPAT programs for 4 major reasons: reputation of the program or faculty (or both), career intentions, professional socialization, and mentorship from undergraduate faculty or clinical instructors (or both). Participants discussed long-term professional goals as the driving force behind wanting an advanced degree in athletic training. Faculty and clinical instructor recommendations and the program's prestige helped guide the decisions. Participants also expressed the need to gain more experience, which promoted autonomy, and support while gaining that work experience. Final selection of the PPAT program was based on academic offerings, the assistantship offered (including financial support), advanced knowledge of athletic training concepts and principles, and apprenticeship opportunities. Students who attend PPAT programs are attracted to advancing their entry-level knowledge, are committed to their professional development as athletic trainers, and view the profession of athletic training as a life-long career. The combination of balanced academics, clinical experiences, and additional professional socialization and mentorship from the PPAT program experience will help them to secure their desired career positions.
Stress, satisfaction and burnout amongst Australian and New Zealand radiation oncologists.
Leung, John; Rioseco, Pilar; Munro, Philip
2015-02-01
The aim of this study was to determine the self-reported prevalence of stress, job satisfaction and burnout among radiation oncologists in Australia and New Zealand. A secondary aim was to determine the association between stress and satisfaction parameters with burnout. An anonymous online survey was distributed to all radiation oncologists listed on Royal Australian and New Zealand College of Radiologists membership database. There were 37 Likert scale questions on stress, 17 Likert scale questions on job satisfaction and burnout assessed by the Maslach Burnout Inventory - Human Services Survey (MBI-HSS). A principal component analysis was done for stress and satisfaction to identify specific areas. Independent samples t-tests and analysis of variances were done. There were 220 responses out of 348 eligible respondents (63.2% response rate).For stress, a principal component analysis identified five areas: delivery demands, demands on time, continuing professional development (CPD), value and security, and interpersonal/teaching demands. Specialist radiation oncologists were more stressed by value and security than generalists (P < 0.01). Lung cancer specialists had higher levels of stress associated with delivery demands, demands on time and CPD compared with others (P = 0.01). Those over 60 years were less stressed by delivery demands (P = 0.02), demands on time (P = 0.01) and CPD (P = 0.01) than their younger colleagues. Four satisfaction factors were identified in the principal component analysis: resources/remuneration, status/security, delivery of services and professional activities. [Correction added on 15 August 2014, after first online publication: stress/security was replaced with status/security.] Males and Australian radiation oncologists were more satisfied with professional activities (P = 0.02). Brachytherapy specialists were more satisfied with status/security (P = 0.01) while those interested in urology were more satisfied with resources/renumeration (P = 0.01) and professional activities (P = 0.01). The burnout results revealed at least 48.5% of respondents scoring highly in at least one of the three measures of burnout (emotional exhaustion, depersonalisation and personal accomplishment) while 37.5% scoring highly in the emotional exhaustion and depersonalisation subscales. Public sector radiation oncologists had higher levels of emotional exhaustion and lower levels of personal accomplishment than their private sector counterparts, while those interested in lung cancer had higher levels of emotional exhaustion. Multiple regression analysis revealed that the stress subscale demands on time had a significant effect on emotional exhaustion. Higher CPD stress and interpersonal/teaching demands increased the feeling of depersonalisation, while satisfaction with delivery of services was associated with lower levels of depersonalisation and higher levels of personal accomplishment. This first study of stress, satisfaction and burnout among radiation oncologists in Australia and New Zealand had a reasonable response rate and identified specific areas of stress and satisfaction. Nearly half of the respondents scored highly in one burnout subscale. Some of the stress and satisfaction subscales correlated with certain aspects of burnout. Further research will be undertaken to refine the stress and satisfaction parameters and address burnout interventions. © 2014 The Royal Australian and New Zealand College of Radiologists.
The hobbyist phenomenon in physical security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Michaud, E. C.
Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less
ERIC Educational Resources Information Center
Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia
2012-01-01
Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…
Working Connections: Suzan Lee--UBS Securities LLC, New York
ERIC Educational Resources Information Center
Library Journal, 2004
2004-01-01
This article is about Suzan Lee of UBS Securities LLC in New York, a person who is dedicated to connecting aspiring professionals to opportunities in the world of special libraries. In 1999, Lee realized that most library students had only one resource for internships--their library schools--and that these offerings focused largely on public and…
Professional values of nurse lecturers at three universities in Colombia.
López-Pereira, Arabely; Arango-Bayer, Gloria
2017-03-01
To describe the professional values of the nurse lectures according to 241 nursing students, who participated voluntarily, in three different universities of Bogotá. This is a quantitative, descriptive cross-sectional study that applied the Nurses Professional Values Scale-permission secured-Spanish; three dimensions of values were applied: ethics, commitment, and professional knowledge. Ethical consideration: Project had ethical review and approval from an ethics committee and participants were given information sheets to read before they agreed to participate in the project. It was concluded that nursing students, in general, do perceive these values in their professors, and they give priority to the dimension of ethics, followed by the knowledge dimension, and finally, commitment. It is evident that professional values are transmitted by professors and students place importance to such values. Values related to the other's care are paramount in nursing training in Colombia as well as in other countries. It was found that participating students observed professors directly in relation to values focused on direct patient care, respect for privacy, respect for life, while matters related to professional improvement, participation in unions were not actually analyzed may be due to poor promotion activities and unions during undergraduate studies. The results obtained are primary approach to the study of values related to nursing, a topic which needs to be researched, something vital to all the country offering nursing training programs.
Sprang, Ginny; Craig, Carlton; Clark, James
2011-01-01
This study describes predictors of secondary traumatic stress and burnout in a national sample of helping professionals, with a specific focus on the unique responses of child welfare (CW) workers. Specific worker and exposure characteristics are examined as possible predictors of these forms of occupational distress in a sample of 669 professionals from across the country who responded to mailed (e-mail and post) invitations to participate in an online survey. E-mail and home mailing addresses were secured from licensure boards and professional membership organizations in six states from across the country that had high rates of child related deaths in 2009. Respondents completed the Professional Quality of Life IV (Stamm, 2005) to ascertain compassion fatigue (CF) and burnout symptoms. Being male, young, Hispanic, holding rural residence, and endorsing a lack of religious participation were significant predictors of secondary traumatic stress. Similarly, being male and young predicted high burnout rates, while actively participating in religious services predicted lower burnout. CW worker job status as a professional was significantly more likely to predict CF and burnout compared to all other types of behavioral healthcare professionals. Based on the findings from this study, this paper proposes strategies for enhancing self-care for CW workers, and describes the essential elements of a trauma-informed CW agency that addresses secondary traumatic stress and burnout.
Influence of professional drivers' personality traits on road traffic safety: case study.
Živković, Snežana; Nikolić, Vesna; Markič, Mirko
2015-01-01
The purpose of this paper is to present basic elements of the research directed at identifying and determining the personality traits of professional drivers that affect safe, secure and enjoyable ride on public roads. A quantitative method has been used here, whereas data were acquired from a questionnaire based on a sample of 59 professional drivers. Determining personality traits of professional drivers that are in correlation with a safe and pleasant ride on the roads has been enabled by applying the five-factor model of personality ('Big Five') and the Personality Inventory NEO-PI. From these results it was concluded that safe operation of the vehicle in traffic involves the successful 'conduct' of oneself, which recognises the importance of certain personality traits of professional drivers for traffic safety and the need for appropriate professional selection in the case of employment of professional drivers. Research results implicate development of educational programmes aimed at achieving harmony of psychological, physical and sensory health, that is, programmes for permanent informing, educating and training professional drivers for defensive driving. The research opens the way for new research tasks that should help in creating a specific structure of curricula that can be used in a variety of transportation companies and enterprises to improve general and public safety.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-14
... categories: ISE Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary, Customer (Professional),\\8\\ Non-ISE Market Maker,\\9\\ and Priority Customer.\\10\\ The Exchange is proposing to increase certain rebate amounts... Customer (Professional) is a person who is not a broker/ dealer and is not a Priority Customer. \\9\\ A Non...
ERIC Educational Resources Information Center
Monroe, Eula Ewing
The Professional Development Center Network (PDC), a consortium of twenty public school districts, parochial schools, and Western Kentucky University, seeks to identify and secure resources to assist in the design and delivery of activities appropriate to the educational development of individual staff members through the online Information…
Operational Contract Support: Economic Impact Evaluation and Measures of Effectiveness
2017-12-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES...DATES COVERED MBA professional report 4. TITLE AND SUBTITLE OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES OF EFFECTIVENESS 5...evaluation, expeditionary economics , operational contract support, measure of effectiveness 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY
CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009
2009-12-01
an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary and Customer (Professional) \\8\\ orders; and (ii... for ISE Market Maker, Market Maker Plus, Firm Proprietary and Customer (Professional) orders; and (ii... Plus is an ISE Market Maker who is on the National Best Bid or National Best Offer 80% of the time for...
ERIC Educational Resources Information Center
Bowman, Thomas G.; Mazerolle, Stephanie M.; Dodge, Thomas M.
2013-01-01
Context: Preceptors play a vital role in athletic training education as they mentor and socialize athletic training students into their professional role. Exploring the benefits to serving as a preceptor is important to secure appropriate professional role models for students. Objective: To determine the benefits of serving as an athletic training…
[Information security in health care].
Ködmön, József; Csajbók, Zoltán Ernő
2015-07-05
Doctors, nurses and other medical professionals are spending more and more time in front of the computer, using applications developed for general practitioners, specialized care, or perhaps an integrated hospital system. The data they handle during healing and patient care are mostly sensitive data and, therefore, their management is strictly regulated. Finding our way in the jungle of laws, regulations and policies is not simple. Notwithstanding, our lack of information does not waive our responsibility. This study summarizes the most important points of international recommendations, standards and legal regulations of the field, as well as giving practical advices for managing medical and patient data securely and in compliance with the current legal regulations.
Guedes, Maryse; Santos, António J; Ribeiro, Olívia; Freitas, Miguel; Rubin, Kenneth H; Veríssimo, Manuela
2018-06-01
Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 adolescents (115 boys, 107 girls) who completed the Kerns Security Scale and the Extended Class Play, to assess perceived attachment security and social behavior, respectively. Controlling for age and sex, aggressive victims and non-aggressive victims differed in anxious withdrawal but shared a similar profile in peer exclusion and prosocial behavior. Only aggressive victims reported lower attachment security to mother and father when compared to non-victims. These findings underline that victimized adolescents constitute a heterogeneous group in terms of their social and family functioning. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Krüger, Jenny K; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
Code of Federal Regulations, 2013 CFR
2013-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
Code of Federal Regulations, 2012 CFR
2012-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
Code of Federal Regulations, 2011 CFR
2011-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
ERIC Educational Resources Information Center
Russell-Simmons, Heather N.; Anthony, Cathy; Ballard, Marcia; Coffman, Jonathan; Gilbreath, Donna; Keys, Terry L.; Story, Danielle; Rogers, Jennifer; Gosky, David M.; Vanderford, Nathan L.
2016-01-01
Academic careers and institutional reputations are closely linked with the ability to secure funding and publish work. In today's competitive environment, it is essential for research to be clearly communicated. In our experience, many researchers need assistance with communication skills, and institutions that offer professional services in…
Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation
2016-01-01
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001
When security and medicine missions conflict: confidentiality in prison settings.
Allen, Scott A; Aburabi, Raed
2016-06-13
Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.
Code of Federal Regulations, 2014 CFR
2014-01-01
... charges, printing, legal, and professional fees, postage, courier services, and office supplies; and (2... accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges, joint...
Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals
2014-10-01
of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance
Social Media Principles Applied to Critical Infrastructure Information Sharing
2013-12-01
shooters. The DHS works throughout the year to build partnerships with industries across a wide spectrum, to include commercial facilities. They...security professionals , industry association and security organizations, emergency managers, and planners and architects. Each of these stakeholder sets... Project Report.126 The DARPA SCP fellows identified 14 factors that affected the performance of any one team. Notable among the collection were
Erosion of Digital Professionalism During Medical Students' Core Clinical Clerkships.
Mostaghimi, Arash; Olszewski, Aleksandra E; Bell, Sigall K; Roberts, David H; Crotty, Bradley H
2017-05-03
The increased use of social media, cloud computing, and mobile devices has led to the emergence of guidelines and novel teaching efforts to guide students toward the appropriate use of technology. Despite this, violations of professional conduct are common. We sought to explore professional behaviors specific to appropriate use of technology by looking at changes in third-year medical students' attitudes and behaviors at the beginning and conclusion of their clinical clerkships. After formal teaching about digital professionalism, we administered a survey to medical students that described 35 technology-related behaviors and queried students about professionalism of the behavior (on a 5-point Likert scale), observation of others engaging in the behavior (yes or no), as well as personal participation in the behavior (yes or no). Students were resurveyed at the end of the academic year. Over the year, perceptions of what is considered acceptable behavior regarding privacy, data security, communications, and social media boundaries changed, despite formal teaching sessions to reinforce professional behavior. Furthermore, medical students who observed unprofessional behaviors were more likely to participate in such behaviors. Although technology is a useful tool to enhance teaching and learning, our results reflect an erosion of professionalism related to information security that occurred despite medical school and hospital-based teaching sessions to promote digital professionalism. True alteration of trainee behavior will require a cultural shift that includes continual education, better role models, and frequent reminders for faculty, house staff, students, and staff. ©Arash Mostaghimi, Aleksandra E Olszewski, Sigall K Bell, David H Roberts, Bradley H Crotty. Originally published in JMIR Medical Education (http://mededu.jmir.org), 03.05.2017.
Koivunen, Marita; Niemi, Anne; Hupli, Maija
2015-03-01
The aim of the study is to describe nursing professionals' experiences of the use of electronic devices for communication with colleagues and other healthcare professionals. Information and communication technology applications in health care are rapidly expanding, thanks to the fast-growing penetration of the Internet and mobile technology. Communication between professionals in health care is essential for patient safety and quality of care. Implementing new methods for communication among healthcare professionals is important. A cross-sectional survey was used in the study. The data were collected in spring 2012 using an electronic questionnaire with structured and open-ended questions. The target group comprised the nursing professionals (N = 567, n = 123) in one healthcare district who worked in outpatient clinics in publically funded health care in Finland. Nursing professionals use different electronic devices for communication with each other. The most often used method was email, while the least used methods were question-answer programmes and synchronous communication channels on the Internet. Communication using electronic devices was used for practical nursing, improving personnel competences, organizing daily operations and administrative tasks. Electronic devices may speed up the management of patient data, improve staff cooperation and competence and make more effective use of working time. The obstacles were concern about information security, lack of technical skills, unworkable technology and decreasing social interaction. According to our findings, despite the obstacles related to use of information technology, the use of electronic devices to support communication among healthcare professionals appears to be useful. © 2014 John Wiley & Sons Ltd.
Muntaner, Carles; Hadden, Wilbur C; Kravets, Nataliya
2004-01-01
Occupational social class has become a leading indicator of social inequalities in health. In the US, economic sectors are distinct with respect to wages, benefits, job security, promotion ladders and working conditions. The growing economic sector of self-employed workers is characterized by lower wages and benefits, and greater job insecurity. Little attention has been given to the association between economic sector measures of social class and all-cause mortality, and there have been no studies of mortality among the self-employed. To determine risk of death associated with economic sector social class, this study entails a longitudinal analysis of the National Health Interview Survey (NHIS), an annual household survey representative of the US population for the period 1986-1994 (n = 377,129). The sample includes 201,566 men and 175,563 women, aged 24-65 years of age, in the civilian labor force. Non- professionals are at higher risk of death than professionals across all sectors and self-employed professionals are at higher risk of death than professionals employed in government and production. Additional social class differences are accounted for by age, race, gender and marital status. Results are also partially explained by income. After controlling for income, Black professionals did not show a lower risk of death than Black non-professionals and self-employed Hispanic professionals had a higher risk of death than Hispanic professionals employed in the private sector. Given the growth of self-employment in the US, the noted increased risk of death among self-employed professionals merits further investigation and monitoring.
Electronic Medical Records in Greece and Oman: A Professional's Evaluation of Structure and Value.
Koutzampasopoulou Xanthidou, Ourania; Shuib, Liyana; Xanthidis, Dimitrios; Nicholas, David
2018-06-01
An Electronic Medical Record (EMR) is a patient's database record that can be transmitted securely. There are a diversity of EMR systems for different medical units to choose from. The structure and value of these systems is the focus of this qualitative study, from a medical professional's standpoint, as well as its economic value and whether it should be shared between health organizations. The study took place in the natural setting of the medical units' environments. A purposive sample of 40 professionals in Greece and Oman, was interviewed. The study suggests that: (1) The demographics of the EMR should be divided in categories, not all of them accessible and/or visible by all; (2) The EMR system should follow an open architecture so that more categories and subcategories can be added as needed and following a possible business plan (ERD is suggested); (3) The EMR should be implemented gradually bearing in mind both medical and financial concerns; (4) Sharing should be a patient's decision as the owner of the record. Reaching a certain level of maturity of its implementation and utilization, it is useful to seek the professionals' assessment on the structure and value of such a system.
Security and privacy of EHR systems--ethical, social and legal requirements.
Kluge, Eike-Henner W
2003-01-01
This paper addresses social, ethical and legal concerns about security and privacy that arise in the development of international interoperable health information systems. The paper deals with these concerns under four rubrics: the ethical status of electronic health records, the social and legal embedding of interoperable health information systems, the overall information-requirements healthcare as such, and the role of health information professionals as facilitators. It argues that the concerns that arise can be met if the development of interoperability protocols is guided by the seven basic principles of information ethics that have been enunciated in the IMIA Code of Ethics for Health Information Professionals and that are central to the ethical treatment of electronic health records.
NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2012-06-01
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.
Petersson, Pia; Blomqvist, Kerstin
2011-03-01
The aim of this study was to make sense of the Swedish concept 'trygghet' by using stories from daily life in a Participatory Action Research project. In Sweden, attempts to implement core values to ensure high quality health and social care for older people are given high priority and concepts such as security and dignity are often used. As concepts are abstract they are difficult to transform into practical work. One group of six assistant nurses and one group of five Registered Nurses working in a municipality participated in Story Dialogue Method and four older women were interviewed. 'Trygghet' was found to be an internal sense - an intrinsic state based on faith and trust in oneself and others called Sense of security. External factors that strengthened Sense of security were to be part of a community, to recognize and be familiar with things and situations and to use various kinds of aids. A prerequisite for the professionals being able to support the care receivers adequately is that they have a sense of security themselves, and that they are allowed to operate in a system that facilitates for the care receivers to maintain trustworthy and reliable relations over time. © 2010 Blackwell Publishing Ltd.
Corvol, A; Balard, F; Moutel, G; Somme, D
2014-01-01
Case management is a new professional field in France. It is addressed to elderly persons living in community whose situation is regarded as particularly complex. Case managers have to assess needs and coordinate necessary services. One common criteria of complexity is refusal of care. The objective of this study is to compare the words of users with those of case managers about refusal of care, in order to understand its meaning, professionals' attitudes and ethical challenges. Two researchers have cooperated on this qualitative research: the first one, anthropologist, interviewed 19 individuals, and 11 of their caregivers. The second one, geriatrician and researcher in medical ethics, lead four focus groups gathering a total of 18 case managers. Refusal of care often is the result of the will of preserving one's identity, compromised by illness. Individuals seek control on their life. Facing this behaviour, case managers try to secure the individual, by establishing a personal relationship that respects their choices, even if care has to be delayed. Refusal of care may sometimes disclose a desire to vanish, in front of which professionals meet their own limits. To recognise an elderly person that refuses care as a unique individual who can make choices secure his identity, and allow him to change. Copyright © 2013 Société nationale française de médecine interne (SNFMI). Published by Elsevier SAS. All rights reserved.
The Interface of Safety and Security in Transport: A Regional Perspective
DOE Office of Scientific and Technical Information (OSTI.GOV)
Welch, Tim; Duhamel, David A; Nandakumar, A. N.
Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios and developing transport security plans. Many participants also reported their appreciation of the workshop exercises that specifically focused on practical aspects of safety and security of transport of radioactive material. These workshop outcomes highlight the important role professionals can offer when they receive additional safety training and education for radioactive material in transport. Moreover, these professionals can help to increase capacity in countries with developing nuclear security regimes. This paper explores workshop outcomes and transportation regulations and guidelines for radioactive material.« less
Student Experiential Opportunities in National Security Careers
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less
Remote autopsy services: A feasibility study on nine cases.
Vodovnik, Aleksandar; Aghdam, Mohammad Reza F; Espedal, Dan Gøran
2017-01-01
Introduction We have conducted a feasibility study on remote autopsy services in order to increase the flexibility of the service with benefits for teaching and interdepartmental collaboration. Methods Three senior staff pathologists, one senior autopsy technician and one junior resident participated in the study. Nine autopsies were performed by the autopsy technician or resident, supervised by the primary pathologist, through the secure, double encrypted video link using Jabber Video (Cisco) with a high-speed broadband connection. The primary pathologist and autopsy room each connected to the secure virtual meeting room using 14″ laptops with in-built cameras (Hewlett-Packard). A portable high-definition web camera (Cisco) was used in the autopsy room. Primary and secondary pathologists independently interpreted and later compared gross findings for the purpose of quality assurance. The video was streamed live only during consultations and interpretation. A satisfaction survey on technical and professional aspects of the study was conducted. Results Independent interpretations of gross findings between primary and secondary pathologists yielded full agreement. A definite cause of death in one complex autopsy was determined following discussions between pathologists and reviews of the clinical notes. Our satisfaction level with the technical and professional aspects of the study was 87% and 97%, respectively. Discussion Remote autopsy services are found to be feasible in the hands of experienced staff, with increased flexibility and interest of autopsy technicians in the service as a result.
[Hygiene, safety and occupational medicine in Niger].
Moussa, F; Sékou, H
1997-01-01
The laws and rules governing hygiene, safety and medicine in the workplace in Niger were evaluated in this study. We used labour administration, health service and Social Security Department reports to review each type of professional activity and the risks associated with it. This enabled us to make recommendations to the authorities and to the organizations representing employers and staff, concerning the prevention of risks at work.
Sustainable Transportation: Strategy for Security, Prosperity, and Peace
2014-11-01
number. 1 . REPORT DATE NOV 2014 2. REPORT TYPE 3 . DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Sustainable Transportation...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...licensed Professional Engineer in the state of Virginia. viii 1 SUSTAINABLE TRANSPORTATION: STRATEGY FOR SECURITY, PROSPERITY, AND PEACE Introduction
Birds of a Feather: Supporting Secure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Braswell III, H V
2006-04-24
Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less
A secure EHR system based on hybrid clouds.
Chen, Yu-Yi; Lu, Jun-Chao; Jan, Jinn-Ke
2012-10-01
Consequently, application services rendering remote medical services and electronic health record (EHR) have become a hot topic and stimulating increased interest in studying this subject in recent years. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. Sharing EHR information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. With the widespread use of EHR, building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructures for facilitating EHR sharing and EHR integration. In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.
Okeke, Sunday O.
2017-01-01
Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444
Mecugni, Daniela; Serpe, Alessandra; Bravo, Giulia; Iemmi, Marina; Gobba, Fabrizio Maria
2009-01-01
Professional risk and security in the health sector is becoming ever more important : the number of accidents in hospital environments during 2005 was 19,000 and nurses were the most frequently involved category. This study deals with clinical risk perception . A questionnaire was issued to 259 student and 100 professional nurses at the Modena and Reggio Emilia University Hospital., comprising 70 questions regarding 5 dimensions: general risk perception, personal risk perception, nursing skills, observed experience and direct experience. Results were evaluated using the ANOVA and t-tests and showed significant differences among the various groups (first, second and third-year students and professional nurses) in relation to each dimension. On the whole , the perception of risk was relatively low in comparison to its real level in the working environment. Therefore, specific training for a correct perception of health risks is required, not only for students but also for trained nurses, so that the culture of risk management becomes a routine issue.
ERIC Educational Resources Information Center
Ai, Amy L.; Carrigan, Lynn T.
2007-01-01
Cardiovascular disease (CVD) is on the rise in the aging population of the United States. Heart disease is the leading cause of death, hospital bed use, and social security disability. Enhancing knowledge about CVD may improve social work's professional role in the health care system. This article focuses on a pressing CVD-related issue that needs…
A Code Of Ethics And Professional Conduct For NSA Intelligence Professionals
2015-02-17
protects the nation. Such releases may especially damage the cohesion of the workforce. Team Cohesion and Self - esteem The Greek philosopher...individual, the corporation , and the community, self -interest and the public good.” 25 Two aspects of this assertion accurately characterize NSA employees...reasons, most of which are thwarted by monitoring, security investigations, and self -reporting. Recently, individuals responsible for extremely damaging
LPTA Versus Tradeoff: Analysis of Contract Source Selection Strategies and Performance Outcomes
2016-06-01
methodologies contracting professionals employ to acquire what the DOD needs. Contracting professionals may use lowest price technically acceptable (LPTA) and...contract management process, source selection, lowest price technically acceptable, tradeoff 15. NUMBER OF PAGES 69 16. PRICE CODE 17. SECURITY...use lowest price technically acceptable (LPTA) and tradeoff strategies to procure requirements to maximize the overall best value to the government
Ethics Certification of Health Information Professionals.
Kluge, Eike-Henner; Lacroix, Paulette; Ruotsalainen, Pekka
2018-04-22
To provide a model for ensuring the ethical acceptability of the provisions that characterize the interjurisdictional use of eHealth, telemedicine, and associated modalities of health care deliveiy that are currently in place. Following the approach initiated in their Global Protection of Health Data project within the Security in Health Information Systems (SiHIS) working group of the International Medical Informatics Association (IMIA), the authors analyze and evaluate relevant privacy and security approaches that are intended to stem the erosion of patients' trustworthiness in the handling of their sensitive information by health care and informatics professionals in the international context. The authors found that while the majority of guidelines and ethical codes essentially focus on the role and functioning of the institutions that use EHRs and information technologies, little if any attention has been paid to the qualifications of the health informatics professionals (HIPs) who actualize and operate information systems to deal with or address relevant ethical issues. The apparent failure to address this matter indicates that the ethical qualification of HIPs remains an important security issue and that the Global Protection of Health Data project initiated by the SiHIS working group in 2015 should be expanded to develop into an internationally viable method of certification. An initial model to this effect is sketched and discussed. Georg Thieme Verlag KG Stuttgart.
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
The interdisciplinary nature of SOIL
NASA Astrophysics Data System (ADS)
Brevik, E. C.; Cerdà, A.; Mataix-Solera, J.; Pereg, L.; Quinton, J. N.; Six, J.; Van Oost, K.
2015-01-01
The holistic study of soils requires an interdisciplinary approach involving biologists, chemists, geologists, and physicists, amongst others, something that has been true from the earliest days of the field. In more recent years this list has grown to include anthropologists, economists, engineers, medical professionals, military professionals, sociologists, and even artists. This approach has been strengthened and reinforced as current research continues to use experts trained in both soil science and related fields and by the wide array of issues impacting the world that require an in-depth understanding of soils. Of fundamental importance amongst these issues are biodiversity, biofuels/energy security, climate change, ecosystem services, food security, human health, land degradation, and water security, each representing a critical challenge for research. In order to establish a benchmark for the type of research that we seek to publish in each issue of SOIL, we have outlined the interdisciplinary nature of soil science research we are looking for. This includes a focus on the myriad ways soil science can be used to expand investigation into a more holistic and therefore richer approach to soil research. In addition, a selection of invited review papers are published in this first issue of SOIL that address the study of soils and the ways in which soil investigations are essential to other related fields. We hope that both this editorial and the papers in the first issue will serve as examples of the kinds of topics we would like to see published in SOIL and will stimulate excitement among our readers and authors to participate in this new venture.
Dimensions of professional labor support for intrapartum practice.
Sauls, Donna J
2006-01-01
To define and describe the dimensions of Professional Labor Support (PLS). A factor-analytic study was conducted with a random sample of 146 intrapartum nurses in Texas. Nurses' responses to the Labor Support Questionnaire (LSQ) were subjected to principal components analysis and descriptive analysis. A six-factor solution indicated the dimensions of PLS: Tangible Support, Advocacy, Emotional Support-Reassurance, Emotional Support-Creating Control, Security and Comfort, Emotional Support-Nurse Caring Behavior, and Informational Support. Although the presence of four dimensions was theorized, six dimensions were found. The emotional support dimension was identified by nurses as being an important component of labor support as indicated by the identification of three separate emotional support dimensions.
Saragoza, Philip; White, Stephen G
2016-12-01
Workplace predatory violence has been the focus of increased study over the past 30 years, leading to a more sophisticated understanding of the factors that contribute to it, and important considerations for its assessment and management. Risk assessment professionals involved in workplace violence consultations should be mindful of issues specific to the workplace context and the principles of threat assessment to provide a more precise opinion of risk, to inform and enhance critical decisions regarding the employment status of the individual of concern, security measures, possible treatment options, and other management responses, while being mindful of the employee's certain rights. Copyright © 2016 Elsevier Inc. All rights reserved.
Baird, Theodore
2017-06-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.
Baird, Theodore
2017-01-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601
A security architecture for interconnecting health information systems.
Gritzalis, Dimitris; Lambrinoudakis, Costas
2004-03-31
Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.
Dolan, Mairead; Blattner, Regine
2010-09-29
Structured Professional Judgment (SPJ) approaches to violence risk assessment are increasingly being adopted into clinical practice in international forensic settings. The aim of this study was to examine the predictive validity of the Historical Clinical Risk -20 (HCR-20) violence risk assessment scale for outcome following transfers from high to medium security in a United Kingdom setting. The sample was predominately male and mentally ill and the majority of cases were detained under the criminal section of the Mental Health Act (1986). The HCR-20 was rated based on detailed case file information on 72 cases transferred from high to medium security. Outcomes were examined, independent of risk score, and cases were classed as "success or failure" based on established criteria. The mean length of follow up was 6 years. The total HCR-20 score was a robust predictor of failure at lower levels of security and return to high security. The Clinical and Risk management items contributed most to predictive accuracy. Although the HCR-20 was designed as a violence risk prediction tool our findings suggest it has potential utility in decisions to transfer patients from high to lower levels of security.
Krüger, Jenny K.; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed. PMID:27014142
Draft secure medical database standard.
Pangalos, George
2002-01-01
Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
Defending the Mentally Disabled.
ERIC Educational Resources Information Center
Cournos, Francine; And Others
1984-01-01
Discusses the role of mental health and social services personnel in helping patients apply for recertification for Supplementary Security Income (SSI) benefits. Describes the appeal process and provides guidelines for professionals. (JAC)
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... some disobedient children, you may need to obtain professional mental health treatment. Here are some situations where ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... for Referral to Pediatric Surgical Specialists Sports Medicine Professionals What is a Child Abuse Pediatrician? What is ...
[Evaluation of health system decentralization and reform of the Social Security system in Colombia].
Jaramillo, I
2002-01-01
The aim of this study is to present the results of the reforms in the health sector that have taken place in Colombia since 1990. These reforms replaced the previous national health system and the so-called Bismarkian social security system. The new system has three basic characteristics: a) the public subsidies are decentralized in the municipalities and territorial departments; b) the public hospitals have been converted into state social enterprises, which has led them towards a management model, and c) the health and social security system monopoly has been abolished and a system of health subsidies has been created for the poorest citizens. This article systematically collects secondary information extracted from the most important studies evaluating the health sector reforms in Colombia. The present author participated in some of these studies. The reforms have increased financial resources, which, has led to an increase in public system staff and their salaries. The availability of hospitals' budgetary resources has increased and the social security system has become wider, including 20% of the poorest population who have benefited from subsidies on demand. Ease of access and equity in the health system have significantly improved. However, indicators of public health have fallen and health professionals are critical of a system based on mediation, which increases transaction costs.
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
ERIC Educational Resources Information Center
Svetcov, Eric
2004-01-01
When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…
2008-01-24
operations of large corporate jets and professionally managed fractional-ownership fleets — makes up about one- quarter of all GA operations and... 2018 , it is expected that there will be about 18,000 GA turbojets in service in the United States, compared to an estimate of slightly more than 10,000...spray a chemical blister agent into a packed college football stadium CRS-17 43 White House Homeland Security Council, David Howe, Senior Director for
Security analysis of standards-driven communication protocols for healthcare scenarios.
Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco
2012-12-01
The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.
Food Security and Diet Among American Indians in the Midwest.
Berryhill, Kelly; Hale, Jason; Chase, Brian; Clark, Lauren; He, Jianghua; Daley, Christine M
2018-04-05
The purpose of this study was to determine levels of food security among American Indians (AI) living in the Midwest and possible correlations between food security levels and various health outcomes, diet, and demographic variables. This study used a cross-sectional design to determine health behaviors among AI. Participants (n = 362) were recruited by AI staff through various cultural community events in the Midwest, such as powwows and health fairs. Inclusion criteria included the following: age 18 years or older, self-identify as an AI, and willing to participate in the survey. Of all participants, 210 (58%) had either low or very low food security, with 96 in the very low category (26.5%). Participants with very low food security tended to have significantly more chronic conditions. Additional significant differences for very low food security existed by demographic variables, including having no insurance (p < 0.0001) or having a regular primary care provider (p = 0.0354). There was also a significant difference between food security levels and the consumption of fast food within the past week (p value = 0.0420), though no differences were found in fruit and vegetable consumption. AI in our sample had higher levels of food insecurity than those reported in the literature for other racial/ethnic groups. AI and non-Native health professionals should be aware of the gravity of food insecurity and the impact it has on overall health. Additional research is needed to determine specific aspects of food insecurity affecting different Native communities to develop appropriate interventions.
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Bunionette Deformity Correction
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... then an evaluation by a child mental-health professional would be helpful. Time to adjust Most shy ...
Morel, Kenneth R
2009-11-01
In the context of forensic neuropsychological assessments, the professional interaction of law and psychology is viewed primarily as one where the retaining attorney or court dictates its needs to psychologists when resolving legal disputes. While this perspective is conceptually accurate, the positive and practical collaboration of law and psychology also relies on attorneys adhering to basic protections of sensitive psychological assessment procedures and tests. Objective testing is undermined when a practitioner of law engages in actions prior to, during, or following a neuropsychological examination in a manner that threatens the test security. An appreciation among practitioners of law and psychology regarding the necessity of test security is essential. This article reviews attorney actions that can affect test security, proposes a distinction by psychology between appropriate and problematic client preparation for a neuropsychological examination, integrates the available legal precedent regarding test security, and suggests productive measures to protect test security in medicolegal settings.
ERIC Educational Resources Information Center
Chen, Chun-hsi Vivian; Kao, Rui Hsin
2012-01-01
Public security, traffic management and service for the people are the three major functions of policing. To assure the quality of police service, which is contingent on the people who render the service, has become the core of policing. This study aims to investigate the relationship between work values and service-oriented organizational…
The National Security Doctrine and Policies of the Brazilian Government.
1977-07-15
Studies (1970) and Brazil’s Future Role In Internat ional Politics (1973), and has written articles for professional journals . - S...Considering such an “audit” of their internal political affairs an ~ front to sovereignty, they turned to their own arms industry and West European suppliers...ideologies and empty nationalism such as Mussolini’s and realj power based on technology, industrialization , and organization, and to avoid the
Factors influencing nurse supervisor competence: a critical incident analysis study.
Arvidsson, Barbro; Fridlund, Bengt
2005-05-01
The aim of the study was to identify factors related to critical incidents that influence the competence of nurse supervisors. Nurse supervisors require considerable competence in order to help supervisees to reflect on their clinical work and to interpret the needs of the patient. A qualitative approach involving the critical incident technique was used. Critical incidents were collected by means of self-reports from 25 nurse supervisors. Two main areas emerged: a professional and a personal stance. The professional stance described the nurse supervisors' awareness of the importance of creating a secure learning environment and facilitating reflection. The supervisors structured the material and created awareness of fundamental nursing values. The second main area, personal stance, described the nurse supervisors' behaviour when they gave the participating nurses the opportunity to work through the experiences gained in the daily provision of nursing care. Although they experienced lack of self-assurance during the supervision session, they also expressed security regarding their own performance as nurse supervisors. Nurse supervisors need to include more nursing theory and focus on the nursing process as well as being aware of their own shortcomings and resources. One way for the supervisor to scrutinize his/her actions is to discuss and examine them with a more experienced nurse supervisor colleague.
2013-05-01
partnership between U.S. and Colombian forces. This approach requires introspection, understanding, and adaptation across the U.S. national security...status. Not all national militaries focus on external threats. Some environmental or national capacity circumstances require military professionals...desired impact, outcomes, and outputs through a strategic planning process providing direction, consultation with stakeholders, and environmentally driven
[Quality management and participation into clinical database].
Okubo, Suguru; Miyata, Hiroaki; Tomotaki, Ai; Motomura, Noboru; Murakami, Arata; Ono, Minoru; Iwanaka, Tadashi
2013-07-01
Quality management is necessary for establishing useful clinical database in cooperation with healthcare professionals and facilities. The ways of management are 1) progress management of data entry, 2) liaison with database participants (healthcare professionals), and 3) modification of data collection form. In addition, healthcare facilities are supposed to consider ethical issues and information security for joining clinical databases. Database participants should check ethical review boards and consultation service for patients.
Anticipating and Understanding the Rebalance: Exercise Nine Innings, USMC Command and Staff College
2017-06-21
USPACOM, professional military education , PME, Command and Staff College, training, education , Exercise Nine Innings, regional security challenges The...essence, professional military education had to keep up with the tempo of the evolution of warfare in the twenty-first century. Knowing and...operations existing in differing phases of execution, gained great- er interest among education commands, the Marine Corps, and joint leader- ship.4
What's with all this peer-review stuff anyway?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Warner, J. S.
2010-01-01
The Journal of Physical Security was ostensibly started to deal with a perceived lack of peer-reviewed journals related to the field of physical security. In fact, concerns have been expressed that the field of physical security is scarcely a field at all. A typical, well-developed field might include the following: multiple peer-reviewed journals devoted to the subject, rigor and critical thinking, metrics, fundamental principles, models and theories, effective standards and guidelines, R and D conferences, professional societies, certifications, its own academic department (or at least numerous academic experts), widespread granting of degrees in the field from 4-year research universities, mechanismsmore » for easily spotting 'snake oil' products and services, and the practice of professionals organizing to police themselves, provide quality control, and determine best practices. Physical Security seems to come up short in a number of these areas. Many of these attributes are difficult to quantify. This paper seeks to focus on one area that is quantifiable: the number of peer-reviewed journals dedicated to the field of Physical Security. In addition, I want to examine the number of overall periodicals (peer-reviewed and non-peer-reviewed) dedicated to physical security, as well as the number of papers published each year about physical security. These are potentially useful analyses because one can often infer how healthy or active a given field is by its publishing activity. For example, there are 2,754 periodicals dedicated to the (very healthy and active) field of physics. This paper concentrates on trade journal versus peer-reviewed journals. Trade journals typically focus on practice-related topics. A paper appropriate for a trade journal is usually based more on practical experience than rigorous studies or research. Models, theories, or rigorous experimental research results will usually not be included. A trade journal typically targets a specific market in an industry or trade. Such journals are often considered to be news magazines and may contain industry specific advertisements and/or job ads. A peer-reviewed journal, a.k.a 'referred journal', in contrast, contains peer-reviewed papers. A peer-reviewed paper is one that has been vetted by the peer review process. In this process, the paper is typically sent to independent experts for review and consideration. A peer-reviewed paper might cover experimental results, and/or a rigorous study, analyses, research efforts, theory, models, or one of many other scholarly endeavors.« less
European health telematics networks for positron emission tomography
NASA Astrophysics Data System (ADS)
Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios
2006-12-01
A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Date of birth; (C) Social security number; (D) Payment history; (E) Account number; and (F) Name and... medium) by a health care provider who is a mental health professional documenting or analyzing the...
Percutaneous Achilles Tendon Lengthening
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Find ... Correspondence Regulatory and Public Meetings Stop the Bleed Professional Development Education Annual Meeting International Cord Blood Symposium ...
van Koperen, Tessa M.; de Kruif, Anja; van Antwerpen, Lisa; Hendriks, Anna-Marie; Seidell, Jacob C.; Schuit, Albertine J.; Renders, Carry M.
2016-01-01
To prevent overweight and obesity the implementation of an integrated community-wide intervention approach (ICIA) is often advocated. Evaluation can enhance implementation of such an approach and demonstrate the extent of effectiveness. To be able to support professionals in the evaluation of ICIAs we studied barriers to and facilitators of ICIA evaluation. In this study ten professionals of two Dutch municipalities involved in the evaluation of an ICIA participated. We conducted semi-structured interviews (n = 12), observed programme meetings (n = 4) and carried out document analysis. Data were analyzed using a thematic content approach. We learned that evaluation is hampered when it is perceived as unfeasible due to limited time and budget, a lack of evaluation knowledge or a negative evaluation attitude. Other barriers are a poor understanding of the evaluation process and its added value to optimizing the programme. Sufficient communication between involved professionals on evaluation can facilitate evaluation, as does support for evaluation of ICIAs together with stakeholders at a strategic and tactical level. To stimulate the evaluation of ICIAs, we recommend supporting professionals in securing evaluation resources, providing tailored training and tools to enhance evaluation competences and stimulating strategic communication on evaluation. PMID:27043600
van Koperen, Tessa M; de Kruif, Anja; van Antwerpen, Lisa; Hendriks, Anna-Marie; Seidell, Jacob C; Schuit, Albertine J; Renders, Carry M
2016-03-31
To prevent overweight and obesity the implementation of an integrated community-wide intervention approach (ICIA) is often advocated. Evaluation can enhance implementation of such an approach and demonstrate the extent of effectiveness. To be able to support professionals in the evaluation of ICIAs we studied barriers to and facilitators of ICIA evaluation. In this study ten professionals of two Dutch municipalities involved in the evaluation of an ICIA participated. We conducted semi-structured interviews (n = 12), observed programme meetings (n = 4) and carried out document analysis. Data were analyzed using a thematic content approach. We learned that evaluation is hampered when it is perceived as unfeasible due to limited time and budget, a lack of evaluation knowledge or a negative evaluation attitude. Other barriers are a poor understanding of the evaluation process and its added value to optimizing the programme. Sufficient communication between involved professionals on evaluation can facilitate evaluation, as does support for evaluation of ICIAs together with stakeholders at a strategic and tactical level. To stimulate the evaluation of ICIAs, we recommend supporting professionals in securing evaluation resources, providing tailored training and tools to enhance evaluation competences and stimulating strategic communication on evaluation.
Cashmore, Aaron W; Indig, Devon; Hampton, Stephen E; Hegney, Desley G; Jalaludin, Bin B
2016-11-01
Little is known about the environmental and organisational determinants of workplace violence in correctional health settings. This paper describes the views of health professionals working in these settings on the factors influencing workplace violence risk. All employees of a large correctional health service in New South Wales, Australia, were invited to complete an online survey. The survey included an open-ended question seeking the views of participants about the factors influencing workplace violence in correctional health settings. Responses to this question were analysed using qualitative thematic analysis. Participants identified several factors that they felt reduced the risk of violence in their workplace, including: appropriate workplace health and safety policies and procedures; professionalism among health staff; the presence of prison guards and the quality of security provided; and physical barriers within clinics. Conversely, participants perceived workplace violence risk to be increased by: low health staff-to-patient and correctional officer-to-patient ratios; high workloads; insufficient or underperforming security staff; and poor management of violence, especially horizontal violence. The views of these participants should inform efforts to prevent workplace violence among correctional health professionals.
The Epidemiology of Injuries in Australian Professional Rugby Union 2014 Super Rugby Competition
Whitehouse, Timothy; Orr, Robin; Fitzgerald, Edward; Harries, Simon; McLellan, Christopher P.
2016-01-01
Background: Rugby union is a collision-based ball sport played at the professional level internationally. Rugby union has one of the highest reported incidences of injury of all team sports. Purpose: To identify the characteristics, incidence, and severity of injuries occurring in Australian professional Super Rugby Union. Design: Descriptive epidemiology study. Methods: The present study was a prospective epidemiology study on a cohort of 180 professional players from 5 Australian Super Rugby teams during the 2014 Super Rugby Union Tournament. Team medical staff collected and submitted daily training and match-play injury data through a secure, web-based electronic platform. The injury data included the main anatomic location of the injury, specific anatomic structure of the injury, injury diagnosis, training or match injury occurrence, main player position, mechanism of injury, and the severity of the injury quantified based on the number of days lost from training and/or competition due to injury. Results: The total combined incidence rate for injury during training and match-play across all Australian Super Rugby Union teams was 6.96 per 1000 hours, with a mean injury severity of 37.45 days lost from training and competition. The match-play injury incidence rate was 66.07 per 1000 hours, with a mean severity of 39.80 days lost from training and competition. No significant differences were observed between forward- and back-playing positions for match or training injury incidence rate or severity. Conclusion: The incidence of injury for the present study was lower during match-play than has previously been reported in professional rugby union; however, the overall time loss was higher compared with previous studies in professional rugby union. The high overall time loss was due fundamentally to a high incidence of injuries with greater than 28 days’ severity. PMID:27069947
Shoes and Orthotics for Diabetics
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... By working with a physician and a footwear professional, such as a certified pedorthist, many patients can ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Emotional Development: 2 Year Olds
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... probably refer your child to a mental health professional for a consultation. Last Updated 8/1/2009 ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Plantar Fibroma and Plantar Fibromatosis
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...
A physician's role following a breach of electronic health information.
Kim, Daniel; Schleiter, Kristin; Crigger, Bette-Jane; McMahon, John W; Benjamin, Regina M; Douglas, Sharon P
2010-01-01
The Council on Ethical and Judicial Affairs of the American Medical Association examines physicians' professional ethical responsibility in the event that the security of patients' electronic records is breached.
26 CFR 1.248-1 - Election to amortize organizational expenditures.
Code of Federal Regulations, 2011 CFR
2011-04-01
... original stock certificates, and the like; necessary accounting services; expenses of temporary directors... securities, such as commissions, professional fees, and printing costs. This is so even where the particular...
Finding an Eye Care Professional
... article rating hospitals in the United States. Website: http://health.usnews.com/best-hospitals For More Information ... ophthalmologists in the United States and abroad. Website: https://secure.aao.org/aao/find-ophthalmologist The American ...
Facing the terror of nuclear terrorism.
Johnson, Raymond H
2003-05-01
As America prepares for homeland security and the response to terrorism, more occupational safety professionals may find themselves called upon to deal with terror in their own neighborhoods. While thousands of safety professionals are well trained technically to deal with many types of terrorism, they may not be well prepared to deal with the greater challenge, namely the terror of terrorism. Dealing with terror requires hearing and responding to people's feelings before providing technical answers. For safety professionals to be most effective in dealing with terrorism, they can benefit from more training on how to deal with terror.
Everyday Excellence: A Framework for Professional Nursing Practice in Long-Term Care
Lyons, Stacie Salsbury; Specht, Janet Pringle; Karlman, Susan E.
2009-01-01
Registered nurses make measurable contributions to the health and wellness of persons living in nursing homes. However, most nursing homes do not employ adequate numbers of professional nurses with specialized training in the nursing care of older adults to positively impact resident outcomes. As a result, many people never receive excellent geriatric nursing while living in a long-term care facility. Nurses have introduced various professional practice models into health care institutions as tools for leading nursing practice, improving client outcomes, and achieving organizational goals. Problematically, few professional practice models have been implemented in nursing homes. This article introduces an evidence-based framework for professional nursing practice in long-term care. The Everyday Excellence framework is based upon eight guiding principles: Valuing, Envisioning, Peopling, Securing, Learning, Empowering, Leading, and Advancing Excellence. Future research will evaluate the usefulness of this framework for professional nursing practice. PMID:20077966
Relationships between oncohematopediatrics, mothers and children in communicating bad news.
Afonso, Selene Beviláqua Chaves; Minayo, Maria Cecília de Souza
2017-01-01
We present a study about the relations between pediatric oncological haematologists, mothers, and children in sharing bad news (BN) in a public hospital in Rio de Janeiro. The text emphasizes the intertwining of technique and emotions for the treatment of children with diagnoses in which the fatal outcome is always a probability. We used a qualitative approach, privileging participant observation and open interviews with oncologists (at this service all professionals were female) and mothers. We sought to understand the importance of communication which includes expressions and control of emotions; bioethical issues that require sensitivity, serenity, and truth about approaching the end of life; and how the professionals balance proximity to children and families and objectivity in their activity. The main results showed: intense exchanges on BN among professionals; relapse of children who were evolving positively as the most difficult news; constant update of BN facing terminally ill children; quality of communication influencing the treatment; professionals permanently balancing between closeness and distance from patients and evidence of the their irreplaceable role to secure the family and the child.
Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona
2003-01-01
The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.
Inter-organizational future proof EHR systems. A review of the security and privacy related issues.
van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan
2009-03-01
Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.
2015-12-01
professional development aspirations. An organization that realized a very similar narrative as the DHS is the Department of Defense (DOD), more...is one that finds itself imbedded in several debates surrounding the development of formalized education/preparatory efforts for its core civilian... development of formalized education efforts for its workforce. There is formalized preparatory training for several different kinds of homeland security
Challenges of the Global Century: Report of the Project on Globalization and National Security
2001-01-01
military and civilian leaders for service at the highest levels of national defense and security. The major components of NDU include the Industrial ...academic programs. In addition, it produces Joint Force Quarterly, a professional military journal published for the Chairman of the Joint Chiefs of...shocks become contagious. In these circumstances, it can both arouse anger at industrial democracies and facili- tate the growth of international crime
[Child labor in a marketplace in Bogotá].
Briceño, Leonardo; Pinzón, Angela María
2005-01-01
Child labor in marketplaces has not been sufficiently studied. It is present even in developed countries and it has been associated with problems in the physical, psychological, emotional and social development of children. This paper aims at determining the number of children working in the largest marketplace in the country and the risk factors to which they are exposed. Children working in the marketplace were counted and classified by gender and occupation. Working places were analyzed under Fine's professional risk plan. 376 children were found, 318 boys and 58 girls. 30% were carrying loads, 42% were selling merchandise, and 28% were doing minor jobs or accompanying relatives. The risk factors related with their personal security have the greatest danger level. They are followed by the ergonomic, psychosocial and biological factors. The risk factors affecting children's health the most in the short term are those related to personal security. They include vehicle traffic, inadequate materials storage that can be dangerous, and the physical burden that they have to suffer. According to the professional risk factors plan, this is a dangerous job for children. Child labor in marketplaces shall be regulated and the carrying of heavy loads prohibited.
How to Keep Your Feet Flexible
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Osteopathic Medicine: What is a DO?
... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...
Summer Safety Tips - Staying Safe Outdoors
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... Families should attend community fireworks displays run by professionals rather than using fireworks at home. The AAP ...
Power and confidence in professions: lessons for occupational therapy.
Clark, Florence A
2010-12-01
Powerful professions have the capacity to obtain leadership positions, advocate successfully in the policy arena, and secure the resources necessary to achieve their professional goals. Within the occupational therapy profession, cultivating power and confidence among our practitioners is essential to realize our full capacity for meeting society's occupational needs. Drawing from a historical analysis of the medical and nursing professions, this paper discusses the implications of power and disempowerment among health professions for their practitioners, clients, and public image. Theoretical perspectives on power from social psychology, politics, organizational management, and post-structuralism are introduced and their relevance to the profession of occupational therapy is examined. The paper concludes with recommendations for occupational therapy practitioners to analyze their individual sources of power and evaluate opportunities to develop confidence and secure power for their professional work--in venues both in and outside the workplace.
Wolf, Axel; Moore, Lucy; Lydahl, Doris; Naldemirci, Öncel; Elam, Mark; Britten, Nicky
2017-07-17
Although conceptual definitions of person-centred care (PCC) vary, most models value the involvement of patients through patient-professional partnerships. While this may increase patients' sense of responsibility and control, research is needed to further understand how this partnership is created and perceived. This study aims to explore the realities of partnership as perceived by patients and health professionals in everyday PCC practice. Qualitative study employing a thematic analysis of semistructured interviews with professionals and patients. Four internal medicine wards and two primary care centres in western Sweden. 16 health professionals based at hospital wards or primary care centres delivering person-centred care, and 20 patients admitted to one of the hospital wards. Our findings identified both informal and formal aspects of partnership. Informal aspects, emerging during the interaction between healthcare professionals and patients, without any prior guidelines or regulations, incorporated proximity and receptiveness of professionals and building a close connection and confidence. This epitomised a caring, respectful relationship congruent across accounts. Formal aspects, including structured ways of sustaining partnership were experienced differently. Professionals described collaborating with patients to encourage participation, capture personal goals, plan and document care. However, although patients felt listened to and informed, they were content to ask questions and felt less involved in care planning, documentation or exploring lifeworld goals. They commonly perceived participation as informed discussion and agreement, deferring to professional knowledge and expertise in the presence of an empathetic and trusting relationship. In our study, patients appear to value a process of human connectedness above and beyond formalised aspects of documenting agreed goals and care planning. PCC increases patients' confidence in professionals who are competent and able to make them feel safe and secure. Informal elements of partnership provide the conditions for communication and cooperation on which formal relations of partnership can be constructed. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Mayers, Pat; Alperstein, Melanie; Duncan, Madeleine; Olckers, Lorna; Gibbs, Trevor
2006-03-01
Multi-professional education has traditionally aimed to develop health professionals who are able to collaborate effectively in comprehensive healthcare delivery. The respective professions learn about their differences in order to work together, rather than developing unity in their commitment to a shared vision of professionalism and service. In this, the second of two papers, the 'nuts and bolts' or practicalities of designing a transformed curriculum for a multi-professional course with a difference is described. Guidelines for the curriculum design process, which seeks to be innovative, grounded in theory and relevant to the learning of the students and the ultimately the health of the patients, include: valuing education; gaining buy-in; securing buy-out; defining of roles; seeking consensus; negotiating difference and expediting decisions. The phases of the design process are described, as well as the educational outcomes envisaged during the process. Reflections of the designers, in particular on what it means to be a multi-professional team, and a reconceptualization of multi-professional education are presented as challenges for educators of health professionals.
PROFESSIONALISM IN THE ARMED FORCES
2017-04-06
basic American values from liberalism to conservatism" to permit " American military leaders to combine the political power which society thrusts upon...and civil societies is psychological more than physical.66 Quoting Epictetus, she notes the Stoic’s assertion "In our power are moral character and...the professional status conferred by the society he secures.6 Thesis In this paper I will analyze the specific failing of Rudolph Höss to meet
[Knowledge of occupational risk in IRCCS of Neurosciences].
Paladino, G; Giuliano, G; Monaco, S; Ottenga, F; Cristaudo, A; Guidi, M; Serretti, N; Talini, D
2002-01-01
A Professional Multicentric Audit, concerning Staff knowledge level about security on workplaces, was conducted by way of a standardized questionnaire given to 1022 (26.4%) IRCCS professional staff pertaining to Neurobiology. Four were the principal tasks of the questionnaire investigating the "sensibility" and "consciousness" concerning risk prevention on workplaces. It came out that there is a great variability in the knowledge level on this field, even if the "medium value" is "pretty good".
Work motivation and job satisfaction of health workers in urban and rural areas.
Grujičić, Maja; Jovičić-Bata, Jelena; Rađen, Slavica; Novaković, Budimka; Šipetić-Grujičić, Sandra
2016-08-01
Motivated and job satisfied health professionals represent a basis of success of modern health institutions. The aim of this study was to investigate whether there was a difference in work motivation and job satisfaction between health workers in urban and rural areas in the region of Central Serbia. The study included 396 health professionals from urban setting, and 436 from a rural area, employed in four randomly selected health facilities. An anonymous questionnaire was used for data gathering. Statistical analysis was performed using χ2, Student t-test, Spearman's correlation coefficient, and logistic regression analysis. Urban health professionals were significantly more motivated and job satisfied than respondents from rural area. In relation to work motivation factors and job satisfaction of health professionals in urban and rural areas, there were no significant differences in working conditions and current equipment, and in terms of job satisfaction there were no significant differences in relation to income either. In order to increase the level of work motivation and job satisfaction of health workers in rural areas, apart from better income, they should get more assistance and support from their supervisors, and awards for good job performance; interpersonal relationships, promotion and advancement opportunities, managerial performance and cooperation at work should be improved; employment security should be provided, as well as more independence at work, with professional supervision of health workers.
Creating relationships with persons with moderate to severe dementia
Kjellström, Sofia; Hellström, Ingrid
2013-01-01
The study describes how relationships are created with persons with moderate to severe dementia. The material comprises 24 video sequences of Relational Time (RT) sessions, 24 interviews with persons with dementia and eight interviews with professional caregivers. The study method was Constructivist Grounded Theory. The categories of ‘Assigning time’, ‘Establishing security and trust’ and ‘Communicating equality’ were strategies for arriving at the core category, ‘Opening up’, which was the process that led to creating relationships. Both parties had to contribute to create a relationship; the professional caregiver controlled the process, but the person with dementia permitted the caregiver's overtures and opened up, thus making the relationship possible. Interpersonal relationships are significant to enhancing the well-being of persons with dementia. Small measures like RT that do not require major resources can open paths to creating relationships. PMID:24336663
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
Lind, Leili; Carlgren, Gunnar; Karlsson, Daniel
2016-08-01
Telehealth programs for heart failure have been studied using a variety of techniques. Because currently a majority of the elderly are nonusers of computers and Internet, we developed a home telehealth system based on digital pen technology. Fourteen patients (mean age, 84 years [median, 83 years]) with severe heart failure participated in a 13-month pilot study in specialized homecare. Participants communicated patient-reported outcome measures daily using the digital pen and health diary forms, submitting a total of 3 520 reports. The reports generated a total of 632 notifications when reports indicated worsening health. Healthcare professionals reviewed reports frequently, more than 4700 times throughout the study, and acted on the information provided. Patients answered questionnaires and were observed in their home environment when using the system. Results showed that the technology was accepted by participants: patients experienced an improved contact with clinicians; they felt more compliant with healthcare professionals' advice, and they felt more secure and more involved in their own care. Via the system, the healthcare professionals detected heart failure-related deteriorations at an earlier stage, and as a consequence, none of the patients were admitted into hospital care during the study.
Thackrah, Rosalie D; Thompson, Sandra C; Durey, Angela
2015-04-16
Culturally secure health care settings enhance accessibility by Aboriginal Australians and improve their satisfaction with service delivery. A culturally secure health service recognises and responds to the legitimate cultural rights of the recipients of care. Focus is upon the health care system as well as the practice and behaviours of the individuals within it. In an attempt to produce culturally secure practitioners, the inclusion of Aboriginal content in health professional programs at Australian universities is now widespread. Studies of medical students have identified the positive impact of this content on knowledge and attitudes towards Aboriginal people but relatively little is known about the responses of students in other health professional education programs. This study explored undergraduate midwifery students' knowledge and attitudes towards Aboriginal people, and the impact of Aboriginal content in their program. The study surveyed 44 students who were in their first, second and third years of a direct entry, undergraduate midwifery program at a Western Australian (WA) university. The first year students were surveyed before and after completion of a compulsory Aboriginal health unit. Second and third year students who had already completed the unit were surveyed at the end of their academic year. Pre- and post-unit responses revealed a positive shift in first year students' knowledge and attitudes towards Aboriginal people and evidence that teaching in the unit was largely responsible for this shift. A comparison of post-unit responses with those from students in subsequent years of their program revealed a significant decline in knowledge about Aboriginal issues, attitudes towards Aboriginal people and the influence of the unit on their views. Despite this, all students indicated a strong interest in more clinical exposure to Aboriginal settings. The inclusion of a unit on Aboriginal health in an undergraduate midwifery program has been shown to enhance knowledge and shift attitudes towards Aboriginal people in a positive direction. These gains may not be sustained, however, without vertical integration of content and reinforcement throughout the program. Additional midwifery-specific Aboriginal content related to pregnancy and birthing, and recognition of strong student interest in clinical placements in Aboriginal settings provide opportunities for future curriculum development.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.
Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship.more » The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.« less
How to Strengthen Your Ankle After a Sprain
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Sore Throat? Know When To Call the Doctor
... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...
How to Stretch Your Ankle After a Sprain
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Understanding Motherhood and Mood - Baby Blues and Beyond
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... requires immediate help. Talk to a Health Care Professional Screening for depression during and after pregnancy should ...
How to Assess Changes in Feet: Normal or Abnormal
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
76 FR 22911 - National Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-25
... discussions on professionalism of emergency management, approaches for National Incident Management System... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2007-0008] National Advisory Council AGENCY: Federal Emergency Management Agency, DHS. ACTION: Committee Management...
45 CFR 60.1 - The National Practitioner Data Bank.
Code of Federal Regulations, 2011 CFR
2011-10-01
... certain information relating to the professional competence and conduct of physicians, dentists and other health care practitioners. Section 1921 of the Social Security Act (42 U.S.C. 1396r-2) (section 1921...
48 CFR 52.228-11 - Pledges of Assets.
Code of Federal Regulations, 2010 CFR
2010-10-01
... securities held in book entry form); and/or (2) A recorded lien on real estate. The offeror will be required... of Professional Appraisal Practice, as promulgated by the Appraisal Foundation. (End of clause) [54...
Bustard, John D
2018-04-01
In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master's module in Ethical and Legal Issues in Cyber Security at Queens University Belfast. One significant aspect of the resulting design is that it encourages students to see ethical issues in systemic terms rather than from an individual perspective, with issues emerging from a conflict between different groups with different vested interests. Case studies are used to examine how personal and business priorities create conflicts that can lead to negative press, fines and punitive legal action. The module explores the reasons why organisations may be unaware of the risks associated with their actions and how an inappropriate response to an ethical issue can significantly aggravate a situation. The module has been delivered in three successive years since 2014 and been well received on each occasion. The paper describes the design of the module and the experience of delivering it, concluding with a discussion of the effectiveness of the approach.
Electronic transfer of sensitive patient data.
Detterbeck, A M W; Kaiser, J; Hirschfelder, U
2015-01-01
The purpose of this study was to develop decision-making aids and recommendations for dental practitioners regarding the utilization and sharing of sensitive digital patient data. In the current environment of growing digitization, healthcare professionals need detailed knowledge of secure data management to maximize confidentiality and minimize the risks involved in both archiving patient data and sharing it through electronic channels. Despite well-defined legal requirements, an all-inclusive technological solution does not currently exist. The need for a preliminary review and critical appraisal of common practices of data transfer prompted a search of the literature and the Web to identify viable methods of secure data exchange and to develop a flowchart. A strong focus was placed on the transmission of datasets both smaller than and larger than 10 MB, and on secure communication by smartphone. Although encryption of patient-related data should be routine, it is often difficult to implement. Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME) are viable standards for secure e-mail encryption. Sharing of high-volume data should be accomplished with the help of file encryption. Careful handling of sensitive patient data is mandatory, and it is the end-user's responsibility to meet any requirements for encryption, preferably by using free, open-source (and hence transparent) software.
Private Security Contractors in Iraq: Background, Legal Status, and Other Issues
2008-08-25
Directorate. 25 Peter Eisler , “Attacks on U.S. Convoys Plummet; Shipments Crucial to Rebuilding Iraq,” USA Today, July 22, 2008, p. A1; August Cole, “U.S...contracts. Named DynCorp since 1987 , it was acquired in 2003 by Computer Sciences Corporation (CSC) and now has nearly 14,000 employees in 30...5,000 security professionals, government officials, and corporate executives and their families worldwide.40 EOD Technologies, Inc., founded in 1987
Purdue University graduate certificate program in Veterinary Homeland Security.
Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E
2008-01-01
Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.
Petroleum Geology and the securities laws: Implications for professional practice
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, D.M. Jr.; Achuff, C.H.
1991-03-01
Many geologists' practice includes such activities as recommending prospects, estimating reserves, and assembling drilling deals. When other people's money is used to finance these and other activities, the geologist, knowingly or not, becomes subject to the securities laws. Full disclosure to investors of all relevant information is the primary securities law principle affecting geological practice. In particular, geologic recommendations or reports reaching investors must effectively communicate both the upside potential and the downside risks of the project. If investors feel misled, the geologist may be sued for statements made in or based on his or her reports or for failingmore » to discuss significant factors. To reduce this risk, professional reports should state the date of the report, what was done, for whom, what data and underlying assumptions were used, what remains to be done, what is recommended, and whether distribution of the report should be restricted, among other things. Always retain a copy in case questions about the report's contents arise. Remember, reports tend to be passed along with the project and can be used or misused several years later by successors in interest in the project. In today's litigious society, there is an increasing likelihood that geologists may have to defend their work in court. Geologists should be aware of the impact of the securities and other laws on their practice.« less
Parental attachment and Chinese adolescents' delinquency: The mediating role of moral disengagement.
Bao, Zhenzhou; Zhang, Wei; Lai, Xuefen; Sun, Wenqiang; Wang, Yanhui
2015-10-01
There is substantial literature documenting the negative association between secure parental attachment and lower adolescent delinquency, but little is known about the mediating mechanisms (i.e., how does parental attachment relate to delinquency?) underlying this relation. The present study examined whether secure parental attachment would be indirectly related to lower adolescent delinquency through lower adolescent moral disengagement. A total of 1766 adolescents (44% male; mean age = 14.25 years, SD = 1.54) living in an urban area of southern China completed anonymous questionnaires regarding parental attachment, moral disengagement and delinquency. After controlling for gender, age, socioeconomic status, and school variable, it was found that secure parental attachment was negatively associated with adolescent delinquency and this negative association was fully mediated by the extent of adolescent moral disengagement. These findings contribute to an understanding of the mechanisms underlying the development of adolescent delinquency and have important implications for intervention. Copyright © 2015 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Einberg, Eva-Lena; Lidell, Evy; Clausson, Eva K
2015-01-01
In recent years, a number of studies have demonstrated that stress and mental health problems have increased among adolescents and especially among girls, although little is still known concerning what girls experience in their everyday lives. The aim of this study was to describe the phenomenon of teenage girls' everyday lives, as experienced by the girls themselves. A phenomenological approach of reflective lifeworld research was used, and the findings are based on eight qualitative interviews with girls aged 13-16 years. The essence of teenage girls' everyday lives as experienced by the girls themselves can be described as consciousness regarding demands and unfairness and regarding the importance of connectedness and security. The girls are aware of the demands of appearance and success, and they are conscious of the gender differences in school and in the media that affect them. The girls are also conscious about the meaning of connectedness with friends and family, as well as the importance of the security of their confidence in friends and feeling safe where they stay. If teenage girls feel connected and secure, protective factors in the form of manageability and meaningfulness can act as a counterweight to the demands and unfairness of everyday life. For professionals who work with teenage girls, the results from this study can be important in their work to support these girls.
Einberg, Eva-Lena; Lidell, Evy; Clausson, Eva K.
2015-01-01
In recent years, a number of studies have demonstrated that stress and mental health problems have increased among adolescents and especially among girls, although little is still known concerning what girls experience in their everyday lives. The aim of this study was to describe the phenomenon of teenage girls’ everyday lives, as experienced by the girls themselves. A phenomenological approach of reflective lifeworld research was used, and the findings are based on eight qualitative interviews with girls aged 13–16 years. The essence of teenage girls’ everyday lives as experienced by the girls themselves can be described as consciousness regarding demands and unfairness and regarding the importance of connectedness and security. The girls are aware of the demands of appearance and success, and they are conscious of the gender differences in school and in the media that affect them. The girls are also conscious about the meaning of connectedness with friends and family, as well as the importance of the security of their confidence in friends and feeling safe where they stay. If teenage girls feel connected and secure, protective factors in the form of manageability and meaningfulness can act as a counterweight to the demands and unfairness of everyday life. For professionals who work with teenage girls, the results from this study can be important in their work to support these girls. PMID:26084273
Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.
Griggs, Kristen N; Ossipova, Olya; Kohlios, Christopher P; Baccarini, Alessandro N; Howson, Emily A; Hayajneh, Thaier
2018-06-06
As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI) generated by these devices, we propose utilizing blockchain-based smart contracts to facilitate secure analysis and management of medical sensors. Using a private blockchain based on the Ethereum protocol, we created a system where the sensors communicate with a smart device that calls smart contracts and writes records of all events on the blockchain. This smart contract system would support real-time patient monitoring and medical interventions by sending notifications to patients and medical professionals, while also maintaining a secure record of who has initiated these activities. This would resolve many security vulnerabilities associated with remote patient monitoring and automate the delivery of notifications to all involved parties in a HIPAA compliant manner.
ERIC Educational Resources Information Center
Vijaysimha, Indira
2013-01-01
Concerns about the professional development of teachers have a political dimension as governments around the world engage in the discourse on global standards and want to improve the quality of their school education. Increasingly, teachers are feeling the pressure of securing high achievement scores and large-scale assessments of student learning…
The effects of a STEM professional development intervention on elementary teachers
NASA Astrophysics Data System (ADS)
Dailey, Deborah D.
To improve and sustain science teaching and learning in the elementary grades, experts recommended school districts afford time in the day for science instruction, secure the necessary resources for an investigative classroom, and provide teachers with increased professional development opportunities that target content knowledge, pedagogical skills, and confidence in teaching science (e.g. Buczynski & Hansen, 2010; Brand & Moore, 2011; NSB, 2010). In particular, researchers recommended teachers receive quality professional development that is sustained over time and embedded in the real world of the classroom (e.g. Buczynski & Hansen, 2010; Cotabish & Robinson, 2012). The purpose of this dissertation was to examine changes in elementary teachers' science teaching perceptions, concerns, and science process skills during and after participation in a STEM-focused professional development intervention involving embedded support using peer coaching. The positive effects of sustained, embedded professional development programs on science instruction have been documented by multiple research studies (e.g. Buczynski & Hansen, 2010; Cotabish, Dailey, Hughes, & Robinson, 2011; Duran & Duran, 2005; Levitt, 2011); however, few studies have investigated the effects after removal of the professional development support (Johnson, Kahle, & Fargo, 2007; Shymansky, Yore, & Anderson, 2004). By examining the changes across three years (including one year after the conclusion of the professional development intervention), the researcher in the present study considered the dosage of intervention needed to bring about and preserve significant changes in the participant teachers. To measure the impact of the intervention on teachers, the researcher used quantitative data supported by qualitative interviews. Results indicated that changes in science teaching perceptions were realized after one year or 60 hours of intervention; however, it took two years or 120 hours of intervention to see significant changes in teachers' science process skills. Of particular significance, the changes in teachers' science teaching perceptions, concerns, and science process skills held constant one year after removal of the professional development support.
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
Certified Training for Nuclear and Radioactive Source Security Management.
Johnson, Daniel
2017-04-01
Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Dual Loyalty in Prison Health Care
Stöver, Heino; Wolff, Hans
2012-01-01
Despite the dissemination of principles of medical ethics in prisons, formulated and advocated by numerous international organizations, health care professionals in prisons all over the world continue to infringe these principles because of perceived or real dual loyalty to patients and prison authorities. Health care professionals and nonmedical prison staff need greater awareness of and training in medical ethics and prisoner human rights. All parties should accept integration of prison health services with public health services. Health care workers in prison should act exclusively as caregivers, and medical tasks required by the prosecution, court, or security system should be carried out by medical professionals not involved in the care of prisoners. PMID:22390510
Self-perceptions of well-being in professional helpers and volunteers operating in war contexts.
Veronese, Guido
2013-07-01
We carried out qualitative research with 61 health professionals and volunteer workers to explore their perceptions of their own and their clients' well-being in a context of political violence. We applied content analysis to identify the themes emerging from 8 focus group and 11 individual interviews. Participants were found to define the concept of well-being in terms of three key areas: security, participation, and development. Palestinian health providers see promotion of economic development and professional growth, involvement in political and social life, and resistance to the occupation as factors required to enhance well-being and quality of life for themselves and their clients.
A biometric method to secure telemedicine systems.
Zhang, G H; Poon, Carmen C Y; Li, Ye; Zhang, Y T
2009-01-01
Security and privacy are among the most crucial issues for data transmission in telemedicine systems. This paper proposes a solution for securing wireless data transmission in telemedicine systems, i.e. within a body sensor network (BSN), between the BSN and server as well as between the server and professionals who have assess to the server. A unique feature of this solution is the generation of random keys by physiological data (i.e. a biometric approach) for securing communication at all 3 levels. In the performance analysis, inter-pulse interval of photoplethysmogram is used as an example to generate these biometric keys to protect wireless data transmission. The results of statistical analysis and computational complexity suggest that this type of key is random enough to make telemedicine systems resistant to attacks.
Initial Evaluation: What Kind of Shape Are Your Feet In?
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Marklund, LeRoy A; Graham, Adrienne M; Morton, Patricia G; Hurst, Charles G; Motola, Ivette; Robinson, Donald W; Kelley, Vivian A; Elenberg, Kimberly J; Russler, Michael F; Boehm, Daniel E; Higgins, Dawn M; McAndrew, Patrick E; Williamson, Hope M; Atwood, Rodney D; Huebner, Kermit D; Brotons, Angel A; Miller, Geoffrey T; Rimpel, Laukton Y; Harris, Larry L; Santiago, Manuel; Cantrell, LeRoy
2010-01-01
Collaboration is used by the US National Security Council as a means to integrate inter-federal government agencies during planning and execution of common goals towards unified, national security. The concept of collaboration has benefits in the healthcare system by building trust, sharing resources, and reducing costs. The current terrorist threats have made collaborative medical training between military and civilian agencies crucial. This review summarizes the long and rich history of collaboration between civilians and the military in various countries and provides support for the continuation and improvement of collaborative efforts. Through collaboration, advances in the treatment of injuries have been realized, deaths have been reduced, and significant strides in the betterment of the Emergency Medical System have been achieved. This review promotes collaborative medical training between military and civilian medical professionals and provides recommendations for the future based on medical collaboration.
Women's experiences of social support during the first year following primary breast cancer surgery.
Drageset, Sigrunn; Lindstrøm, Torill Christine; Giske, Tove; Underlid, Kjell
2016-06-01
The aim of this qualitative follow-up study was to describe women's individual experiences of social support during their first year after primary breast cancer surgery. Individual semi-structured interviews with 10 women 1 year after surgery analysed by Kvales' meaning condensation method. Sharing experiences, being understood as an individual, continuity, and information and explanations were themes identified. Sharing mutual experiences increased the women's knowledge regarding cancer, increased experience of support and minimised rumination. After 1 year, the women felt that the network around them had 'normalised' and was less supportive. Being seen as a person, not as 'a diagnosis being treated', and continuity of professional support were important, giving feelings of security and trust. The women felt uncertainty after loss of professional support post-treatment. Information and explanations regarding treatment and treatment-related problems were essential. Mutual sharing of experiences is an important part of social support. Continuity, availability, information and respect were essential aspects of experienced professional support. © 2015 Nordic College of Caring Science.
Professionalizing action research--a meaningful strategy for modernizing services?
Hall, Julie E
2006-04-01
This paper outlines how a specific action research approach can be used to secure practice development in services which have found sustained change difficult. For the purpose of this paper discussion focuses upon using professionalizing action research (a form of action research) to secure transformation in acute inpatient mental health services. This speciality has experienced long-term difficultly in meaningful practice change. Not limited to this context parallels can be made with other health and social care services requiring significant modernization. The aim is to critically discuss the use of professionalizing action research as an approach to sustainable change. clarifies whether this method is a suitable vehicle for change, which is ideally suited to services which have a poor record of practice development. A review of action research and practice development literature forms the basis of this paper. The literature is sourced through bulletin boards, electronic databases and the British Library Classification Scheme. Keywords searched are action research, team learning, managing change and practice development. Following definition; the components of professionalizing action research are analysed using the themes of educative base, problem focus, improvement and involvement. The educative base of professionalizing action research is collaborative reflective practice which is used to initiate meaningful change, rooted in everyday practice. The benefit of this is that change actions are based in real-time situations. The problem focus component of professionalizing action research is used to emphasize the views of service users and carers. This is positive in terms of the patient and public involvement agenda although this theme does emphasize limitations of the approach. The final components are involvement and improvement, these are debated as pluralistic notions and the implications of this are acknowledged. Reviewing the literature and theoretical application indicates the value of professionalizing action research as a process for modernization. The strength of the approach lies in the opportunity for team learning and change which is grounded in the context of services and pursued through collaboration.
KernPaeP - a web-based pediatric palliative documentation system for home care.
Hartz, Tobias; Verst, Hendrik; Ueckert, Frank
2009-01-01
KernPaeP is a new web-based on- and offline documentation system, which has been developed for pediatric palliative care-teams supporting patient documentation and communication among health care professionals. It provides a reliable system making fast and secure home care documentation possible. KernPaeP is accessible online by registered users using any web-browser. Home care teams use an offline version of KernPaeP running on a netbook for patient documentation on site. Identifying and medical patient data are strictly separated and stored on two database servers. The system offers a stable, enhanced two-way algorithm for synchronization between the offline component and the central database servers. KernPaeP is implemented meeting highest security standards while still maintaining high usability. The web-based documentation system allows ubiquitous and immediate access to patient data. Sumptuous paper work is replaced by secure and comprehensive electronic documentation. KernPaeP helps saving time and improving the quality of documentation. Due to development in close cooperation with pediatric palliative professionals, KernPaeP fulfils the broad needs of home-care documentation. The technique of web-based online and offline documentation is in general applicable for arbitrary home care scenarios.
Gerritsen, D L; Dröes, R M; Ettema, T P; Boelens, E; Bos, J; Meihuizen, L; de Lange, J; Schölzel-Dorenbos, C J M; Hoogeveen, F
2010-12-01
Different definitions of quality of life (QOL) are found in the literature. This raised the question which domains are viewed as really important by persons with dementia. In an explorative study the opinions of persons with dementia (community-dwelling and living in nursing homes), were compared to those of professional carers and instruments for QOL in dementia. Data were gathered through interviews, focus groups and literature study. Most QOL-domains mentioned as important by persons with dementia were also acknowledged by carers and in measurement instruments. Some domains, however, were not mentioned by the carers ('sense of aesthetics', 'financial situation', 'being useful' and 'spirituality'), or not selected in the measuring instruments ('security and privacy', 'self-determination and freedom', 'being useful' and 'spirituality'). This indicates differences in perspectives on quality of life between persons with dementia, professional caregivers and researchers. Subsequently it was studied to what degree professionals focus on the QoL-domains that persons with dementia consider essential. Caregivers working on 29 units and 3 day care facilities of 13 nursing homes and in 12 meeting centers filled out a questionnaire (N = 374). They reported to focus at least to some degree on most domains considered important by persons with dementia. However, little attention was paid to the domains 'financial situation' and 'being useful'. Professionals offering daytime activities focused more than 24-hour care staff on 'attachment', 'enjoyment of activities', 'sense of aesthetics', and 'being useful'. This article is a translation and merging of 1) Dröes et al. Quality of life in dementia in perspective; an explorative study of variations in opinions among people with dementia and their professional caregivers, and in literature. Dementia: The International Journal 2006; 5 (4): 533-558, and 2) Gerritsen et al. Differences in perspective: do professional caregivers focus on the Quality of life domains that are important for people with dementia? American Journal of Alzheimer's Disease and Other Dementias 2007; 22:176-183.
Understanding the motivation: a qualitative study of dental students' choice of professional career.
Gallagher, J; Clarke, W; Wilson, N
2008-05-01
Given the changing nature of the dental workforce, and the need to retain the services of future members, it is important to understand why current dental students perceive that they were motivated to study dentistry. Qualitative research provides the opportunity to explore the underlying issues in addition to informing subsequent quantitative research. The objectives of this research were to investigate final-year dental students' motivation for studying dentistry and how they perceive this has been modified during their undergraduate degree programme. Purposive sampling of a representative group of 35 final-year dental students at King's College London Dental Institute to participate in audio-taped focus groups. Qualitative data were analysed using Framework Methodology. The findings suggest a strong emphasis on having a career, providing 'professional status', 'financial benefits', 'job security, flexibility and independence' and 'good quality of life'. Students reported being attracted by features of the job, supported to a greater or lesser extent by personal experience, family and friends. It appears however that students' initial motivation is being tempered by their experiences during their undergraduate degree programme, in particular, the 'responsibilities of an intensive professional education', their 'mounting student debt' and the perception of 'feeling undervalued'. This perception related to dentistry in general and National Health Service dentistry in particular, being undervalued, by government, patients, the public and members of the dental profession. Students' vision of a 'contained professional career' within health care, providing status and financial benefits, appears to have influenced their choice of dentistry. Pressures relating to student life and policy changes are perceived as impacting on key components of professional life, particularly status in the social and economic order. The implications for educators, professional leaders and policy makers are explored.
Professional paradox: identity formation in qualified doctors pursuing further training.
Chan, Mercedes; Pratt, Dan; Poole, Gary; Sidhu, Ravi
2018-03-01
Many newly qualified specialists and subspecialists pursue additional training. Although their motivations are many, the pursuit of further training as an alternative to unemployment is an emerging trend. Paradoxically, doctors continue as trainees with a consultant's credentials, and without the guarantee of eventual employment. This study explores seven doctors' experiences, the effects of further training on their professional identity formation (PIF), and how these effects are reconciled on a personal and professional level. This phenomenological study involved interviews with seven qualified Canadian specialists (three were female) who pursued additional training in response to a lack of available positions in their respective specialties. Template analysis generated theoretical constructs of influences on their PIF, and characteristics of their lived experiences. Four themes shaped PIF: setting and context; language and communication; responsibilities and privileges; and participants' visions of their future selves. Professional identity formation (PIF) continued to develop in further training, but was inconsistently affirmed by participants' communities of practice. Four major themes characterised training experiences: prescription; managing multiple masters; limiting access to others and community ties; and constantly questioning the value of extra training. Qualified doctors traverse professional paradoxes as they seek further education with no guarantee of employment and provide consultant-level care as 'trainees'. An identity dissonance emerges that may continue until a clear identity is prescribed for them. Although disruptive to these doctors' PIF and personal and professional lives, the long-term effects of additional training are unknown. Its utility and influence on securing employment and future job satisfaction are areas for further research. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.
Frenk, J
1985-01-01
Using data from a survey of 923 medical interns in Mexico, this article analyzes preferences for type of medical activity (general or specialized practice), type of site (ambulatory or hospital), and type of medical care institution (public assistance, social security, or private). Four independent variables are examined: social origin, medical school, place of internship, and assimilation to the internship hospital. The great majority of the interns expressed a preference for specialty practice, hospitals, and social security institutions. The role of social origin was to selectively direct students into different medical schools. From then on, the structural attributes of the school itself and of the place of internship, as well as the socialization experiences that took place there, emerged as the most important determinants of career preferences. Such a process, however, tended to produce a "social specialization" of interns in terms of the role they expect to play in the medical field. It is argued that this kind of specialization has negative implications for the professional status of physicians, although it also poses a challenge to the development of innovative theories about the process of professionalization in medicine.
[The 20th century legal framework regarding risk at work and occupational health in Colombia].
Arango-Soler, Juan M; Luna-García, Jairo E; Correa-Moreno, Yerson A; Campos, Adriana C
2013-01-01
Analyzing the 20th century Colombian legal framework from the point of view of labor law, social security and public health for identifying concepts regarding occupational health and professional risk and trying to establish convergence and differences between such foci and whether they fulfilled a complementary view. This work involved documentary research by means of thematic categorical analysis of the laws and statutes promulgated in 20th century Colombia, considering the main element or entity which should have regulated that related to professional risk or occupational health. The development of the 20th century Colombian legal framework regarding health at work was periodized, revealing the predominance of a view of social law focused on protecting dependent workers' work-related risks, as part of a tendency extending to the Colombian Sistema General de Riesgos Laborales. The proposed stages used for organizing the legal framework concerning social security regarding professional risk and occupational health facilitated some important elements being recognized concerning the social, legal and institutional context from which workers' health laws emerged. Tension was noted concerning statutes orientated towards redress and compensation regarding accidents at work and legislation emphasizing prevention.
Knowledge Claims, Jurisdictional Control and Professional Status: The Case of Nurse Prescribing
Kroezen, Marieke; van Dijk, Liset; Groenewegen, Peter P.; Francke, Anneke L.
2013-01-01
Over the past decades, professional boundaries in health care have come under pressure, and the expansion of prescriptive authority to include nurses touches on issues of professional domains and interprofessional competition. Knowledge claims play an important role in achieving jurisdictional control. Knowledge can take on multiple forms, ranging from indeterminate to technical (I/T ratio) and from everyday to exclusive knowledge. To investigate the interrelatedness of jurisdiction, knowledge claims and professional status, we examine which knowledge claims were made by the medical and nursing professions in the Netherlands to secure or obtain, respectively, jurisdictional control over prescribing, and which form this knowledge took. The study is based on thirteen semi-structured stakeholder interviews and an extensive document analysis. We found that the nursing profession in its knowledge claims strongly emphasized the technicality and everyday knowledge character of the prescribing task, by asserting that nurses were already prescribing medicines, albeit on an illegal basis. Their second claim focused on the indeterminate knowledge skills of nurses and stated that nurse prescribing would do justice to nurses’ skills and expertise. This is a strong claim in a quest for (higher) professional status. Results showed that the medical profession initially proclaimed that prescribing should be reserved for doctors as it is a task requiring medical knowledge, i.e. indeterminate knowledge. Gradually, however, the medical profession adjusted its claims and tried to reduce nurse prescribing to a task almost exclusively based on technicality knowledge, among others by stating that nurses could prescribe in routine cases, which would generate little professional status. By investigating the form that professional knowledge claims took, this study was able to show the interconnectedness of jurisdictional control, knowledge claims and professional status. Knowledge claims are not mere rhetoric, but actively influence the everyday realities of professional status, interprofessional competition and jurisdictional division between professions. PMID:24124613
Why nurses can be key partners in securing philanthropic investments.
Rivet, Nicole
2014-01-01
Fund-raisers can truly benefit from collaborating with nurses when they are seeking philanthropic support for their health care systems. Fund-raising is about developing new relationships with potential prospects and strengthening those with current donors. Nurses frequently have some of the best relationships with patients, and they often lead efforts to improve the quality of care in their hospitals. Their professional experience and their ability to connect with people are invaluable skills that can help secure philanthropic investments.
ERIC Educational Resources Information Center
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.
2003-01-01
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
The DISAM Journal of International Security Assistance Management. Volume 23, Number 1, Fall 2000
2000-01-01
Security Assistance Command Figure 1 The USASAC, including OPM-SANG, is staffed by 621 men and women , of whom 104 are military. These professionals are...by program managers. These program managers are like “front-line entreprenuers ” delivering products and services to their customers. They have been...NATO history was to be commanded by a Polish general in June 1988. The brigade of some 3000 men and women was composed of five national battalions
Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto
2005-01-01
In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.
Fallahi Khoshknab, Masoud; Oskouie, Fatemeh; Ghazanfari, Nahid; Najafi, Fereshteh; Tamizi, Zahra; Afshani, Shahla; Azadi, Ghazal
2015-07-01
There are high levels of sexual harassment in health care systems. Also, workplace violence occurs against ethnic and racial minorities. This study aimed to identify the frequency of and the factors contributing to and preventing sexual and racial harassment in the workplace towards health professionals in Iran. This cross-sectional study was conducted on 6500 out of 57000 health workers who were selected by multistage random sampling from some teaching hospitals in Iran. Data were collected using the questionnaire of "workplace violence in the health sector" developed by the International Labor Organization, International Council of Nurses, World Health Organization, and Public Services International. According to the findings, the frequencies of sexual harassment and racial harassment were, respectively, 4.7% and 12% for the 12 months prior to the study (2011). Among healthcare workers, nurses reported the highest rate of violence. The most important contributing factors in sexual and racial harassment were lack of security facilities (45.8%) and people's ignorance of employees' tasks (55.7%). The presence of security force, safety measures in the wards, and guards were noted as the most important preventive factor to harassment. Based on the results, the frequency of sexual and racial harassment is low, which can be attributed to underreporting due to cultural sensitivity or fear. So, identifying the reasons for refusal to report harassment, developing a clear mechanism for reporting and providing the necessary trainings to health workers are essential in order to deal with harassment.
42 CFR 422.206 - Interference with health care professionals' advice to enrollees prohibited.
Code of Federal Regulations, 2010 CFR
2010-10-01
... individual who is a patient and enrolled under an MA plan about— (i) The patient's health status, medical... construed to affect disclosure requirements under State law or under the Employee Retirement Income Security...
75 FR 11890 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... housed on a secure server and database. The results of the survey shall be used for inpatient quality... of records are necessary to ensure the well-being and safety of patients and that professional...
Implementing healthcare information security: standards can help.
Orel, Andrej; Bernik, Igor
2013-01-01
Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.
The cyber threat, trophy information and the fortress mentality.
Scully, Tim
2011-10-01
'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.
Mobile computing acceptance factors in the healthcare industry: a structural equation model.
Wu, Jen-Her; Wang, Shu-Ching; Lin, Li-Min
2007-01-01
This paper presents a revised technology acceptance model to examine what determines mobile healthcare systems (MHS) acceptance by healthcare professionals. Conformation factor analysis was performed to test the reliability and validity of the measurement model. The structural equation modeling technique was used to evaluate the causal model. The results indicated that compatibility, perceived usefulness and perceived ease of use significantly affected healthcare professional behavioral intent. MHS self-efficacy had strong indirect impact on healthcare professional behavioral intent through the mediators of perceived usefulness and perceived ease of use. Yet, the hypotheses for technical support and training effects on the perceived usefulness and perceived ease of use were not supported. This paper provides initial insights into factors that are likely to be significant antecedents of planning and implementing mobile healthcare to enhance professionals' MHS acceptance. The proposed model variables explained 70% of the variance in behavioral intention to use MHS; further study is needed to explore extra significant antecedents of new IT/IS acceptance for mobile healthcare. Such as privacy and security issue, system and information quality, limitations of mobile devices; the above may be other interesting factors for implementing mobile healthcare and could be conducted by qualitative research.
Employment programs and professionals with a disability.
Donelly, Michelle; Given, Fiona
2010-01-01
It is unclear whether or not open (competitive) employment programs are meeting the needs of the growing numbers of people with a disability seeking professional employment. To understand and describe the experience of a newly graduated professional (Michael) who was seeking open employment support and to analyze those experiences in relation to principles of effective open employment support. Michael a recently graduated accountant who also has a physical disability. A review of the literature was undertaken to identify recommended principles and practices for the conduct of effective open employment and career development programs. A case study was used to describe Michael's experiences as he sought professional employment. Michael's experiences were analysed in relation to recommended principles and practice. The analysis confirmed that the concerns Michael experienced about the supported employment program compromised the effectiveness of the support he received. Employment services based on models of independent living, disability service standards and remediation are likely to focus on the 'pathology' or performance 'deficits' of the person with a disability. Successful open employment models are more likely to place pre-eminence on the perspective of the person with a disability and effective practices for securing employment.
PKI security in large-scale healthcare networks.
Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos
2012-06-01
During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.
Groenen, Carola J M; Faber, Marjan J; Kremer, Jan A M; Vandenbussche, Frank P H A; van Duijnhoven, Noortje T L
2016-04-16
A personal health record (PHR) is an online application through which individuals can access, manage, and share their health information in a private, secure, and confidential environment. Personal health records empower patients, facilitate collaboration among healthcare professionals, and improve health outcomes. Given these anticipated positive effects, we want to implement a PHR, named MyPregn@ncy, in a Dutch maternity care setting and to evaluate its effects in routine care. This paper presents the study protocol. The effects of implementing a PHR in maternity care on patients and professionals will be identified in a stepped-wedge, cluster-randomised, controlled trial. The study will be performed in the region of Nijmegen, a Dutch area with an average of 4,500 births a year and more than 230 healthcare professionals involved in maternity care. Data analyses will describe the effects of MyPregn@ncy on health outcomes in maternity care, quality of care from the patients' perspectives, and collaboration among healthcare professionals. Additionally, a process evaluation of the implementation of MyPregn@ncy will be performed. Data will be collected using data from the Dutch perinatal registry, questionnaires, interviews, and log data. The study is expected to yield new information about the effects, strengths, possibilities, and challenges to the implementation and usage of a PHR in routine maternal care settings. Results may lead to new insights and improvements in the quality of maternal and perinatal care. Netherlands Trial Register: NTR4063.
Diagnosing water security in the rural North with an environmental security framework.
Penn, Henry J F; Loring, Philip A; Schnabel, William E
2017-09-01
This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.
Food security: who is being excluded? A case of older people with dementia in long-term care homes.
Vahabi, M; Schindel Martin, L
2014-07-01
To explore the extent of food security among older people, particularly those with cognitive impairments residing in Canadian long-term care homes (LTCHs) through a focused review of literature. Databases including Medline, Nursing and Health Sciences (SAGE), Psych Info, Social Sciences Abstract, the Cumulative Index of Nursing and Allied Health Literature (CINAHL) and HealthSTAR were searched for peer-reviewed articles related to food experiences of older individuals in industrialized countries including Canada. Only articles that were published in English between 1997-2012 were included. Sixty two studies met the inclusion criteria. Of those 17 focused on older adults in LTCHs. The review found that food security has rarely been examined among older persons living in LTCHs, and has never been examined within the context of cognitive impairment. While a few studies have focused on residents' satisfaction with foods that are provided to them in LTCHs, none have explored the extent of food security in this population. Furthermore, food satisfaction surveys in the LTCH are limited to the assessment of foods that are served to residents, and do not capture residents' food accessibility beyond the food dispensing routines of the organization. Thus, food quality, food preferences, and the traditional meanings and rituals associated with food consumption are not purposefully evaluated. In addition, LTCHs are not required to monitor residents' food satisfaction using a consistent, regular, and standardized approach and there is no regulation in the LTCH Act that requires LTCHs to assess their residents' food security. The findings highlight the need for: 1) expansion of food security research to non-community-based settings including LTCHs; 2) re-conceptualization of food security and modification of measurement tools to assess the extent and determinants of food security among older adults in LTCHs; 3) mandatory monitoring of food security via standardized and regular surveys tailored to meet the unique preferences and needs of the older population, particularly those with dementia; and 4) education of healthcare professionals regarding food security and its assessment in LTCHs.
Cooperative observation data center for planets: starting with the Mars 2009-2010 observation
NASA Astrophysics Data System (ADS)
Nakakushi, T.; Okyudo, M.; Tomita, A.
2009-12-01
We propose in this paper a plan to construct a planetary image data center on the internet, which links professional researchers and amateur observers all over the world. Such data archive projects have worked, at least for Mars. Since 2003, one of the authors (T. N.) have started a project to summarize Mars observations using such cooperative network observation data archives and to publish the summary as professional research papers (Nakakushi et al., 2004, 2005, and 2008). Planetary atmosphere varies in various timescales, which requires temporarily continuous observations. Cooperative observation which amateur observers join can keep the observation continuous and sustainable, so that it can be a strong weapon to reveal planetary climate and meteorology. For outer planets, in particular, we don't know synoptic "seasonal" variations because of their long periods of revolution. We need steady and persistent effort to accumulate observations. That is why we need amateur observers' high-level observation techniques. To do so, we also needs systems to provide (and reproduce) data for users in an appropriate manner. We start from Mars with our own new date archive website, because we have much experience in terms of Mars. Next, we will expand the system for all the planets. Roughly said, there will be 3 steps to expand the project to all the planets: (1) to construct our own Mars cooperative observation data center, (2) to link it with professional studies, (3) to construct cooperative observation data center for all planets. And 4 problems to tackle: (1) to develop web interfaces for users to submit data, (2) to develop interfaces for managers, (3) to secure finances, (4) to secure professional researchers. 2009 and 2010 are a good apparition for Mars observation. We manage the Mars image data website, find problems and solutions in detail, and search for ways to expand it to all the planet and to enable sustainable management.
Code of Federal Regulations, 2011 CFR
2011-10-01
... of vocational education means a school or institution (except an institution of professional or... HOMELAND SECURITY GENERAL NONDISCRIMINATION ON THE BASIS OF SEX IN EDUCATION PROGRAMS OR ACTIVITIES... regulations, the term: Administratively separate unit means a school, department, or college of an educational...
Antimicrobial stewardship through a one health lens: Observations from Washington State
USDA-ARS?s Scientific Manuscript database
Antibiotic resistance is a global health crisis that threatens patient care, public health, agriculture, economic growth and national security. It has recently attracted increasing attention from healthcare professionals, public health officials, federal governments, international agencies, the publ...
Privacy Perspectives for Online Searchers: Confidentiality with Confidence?
ERIC Educational Resources Information Center
Duberman, Josh; Beaudet, Michael
2000-01-01
Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…
Rep. Latham, Tom [R-IA-3
2013-12-12
House - 01/27/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
A Review of Education and Training for Officers (RETO). Volume 4. Rank- Independent Issue
1978-06-30
Orris Kelly, current Chief of Army Chaplains, conducted a si-tilar study at the Army War College, when he was student there in 1573. One hundred and...seventy- eight students of his class responded to Kelly’s questicnnaire. A consensus considered the following "core" values desirable: economic security...Melville A. Drisko, Jr., did research in the area of professional. military ethics while a student in 1976-1977 at the Army War. College. He employed a
1983-01-01
this project, a series of exploratory studies were conducted with 4- year and community college students to develon the Learning Activities...capabilities needed for our national security" (Bement, 1980). Three specific goals for this program in Fiscal Year 1981 are: 1. Provide real growth in the...percent compared to FY 1980; this is about the average increase for all Department of Defense research programs this year ; ( this increase is about
Internationally educated nurses in Canada: predictors of workforce integration.
Covell, Christine L; Primeau, Marie-Douce; Kilpatrick, Kelley; St-Pierre, Isabelle
2017-04-04
Global trends in migration accompanied with recent changes to the immigrant selection process may have influenced the demographic and human capital characteristics of internationally educated nurses (IENs) in Canada and in turn the assistance required to facilitate their workforce integration. This study aimed to describe the demographic and human capital profile of IENs in Canada, to explore recent changes to the profile, and to identify predictors of IENs' workforce integration. A cross-sectional, descriptive, correlational survey design was used. Eligible IENs were immigrants, registered and employed as regulated nurses in Canada. Data were collected in 2014 via online and paper questionnaires. Descriptive statistics were used to examine the data by year of immigration. Logistic regression modeling was employed to identify predictors of IENs' workforce integration measured as passing the licensure exam to acquire professional recertification and securing employment. The sample consisted of 2280 IENs, representative of all Canadian provincial jurisdictions. Since changes to the immigrant selection process in 2002, the IEN population in Canada has become more racially diverse with greater numbers emigrating from developing countries. Recent arrivals (after 2002) had high levels of human capital (knowledge, professional experience, language proficiency). Some, but not all, benefited from the formal and informal assistance available to facilitate their workforce integration. Professional experience and help studying significantly predicted if IENs passed the licensure exam on their first attempt. Bridging program participation and assistance from social networks in Canada were significant predictors if IENs had difficulty securing employment. Nurses will continue to migrate from a wide variety of countries throughout the world that have dissimilar nursing education and health systems. Thus, IENs are not a homogenous group, and a "one size fits all" model may not be effective for facilitating their professional recertification and employment in the destination country. Canada, as well as other countries, could consider using a case management approach to develop and tailor education and forms of assistance to meet the individual needs of IENs. Using technology to reach IENs who have not yet immigrated or have settled outside of urban centers are other potential strategies that may facilitate their timely entrance into the destination countries' nursing workforce.
Tartakovsky, Eugene; Abu Kheit, Ayat
2017-01-01
The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.
Colonnesi, Cristina; van Polanen, Marleen; Tavecchio, Louis W C; Fukkink, Ruben G
2017-08-01
Mind-mindedness refers to the caregiver's ability to be attuned to the child's mental states. Within the parent-child relationship, mind-mindedness relates to parents' sensitive caregiving, and to children's secure attachment. However, the same relations are still unexplored in out-of-home care settings. We investigated the associations between childcare professionals' mind-mindedness, sensitive responsiveness and respect for autonomy, and child-caregiver attachment security. Moreover, we examined whether these relations are influenced by caregivers' and children's gender. Participants were 17 caregiver couples (17 males, 17 females) and 34 three-year-old children (17 boys, 17 girls), recruited in childcare centers. Mind-mindedness toward the boy or the girl (dyadic) or both children (non-dyadic), sensitive responsiveness and respect for autonomy were assessed during a semi-structured play. Attachment security was assessed through observations. Male and female caregivers had equivalent scores of mind-mindedness, sensitive responsiveness, and respect for autonomy. Similarly, children were securely attached to male and female caregivers. Girls' and boys' secure attachment was predicted by caregivers' use of non-dyadic mind-related comments. For girls, but not for boys, the relation was partially mediated by caregivers' respect for autonomy. The results are discussed in terms of their relevance for the quality of child-caregiver relationships, and children's socio-emotional development. Copyright © 2017 Elsevier Inc. All rights reserved.
THE NEXT GENERATION SAFEGUARDS PROFESSIONAL NETWORK: PROGRESS AND NEXT STEPS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhernosek, Alena V; Lynch, Patrick D; Scholz, Melissa A
2011-01-01
President Obama has repeatedly stated that the United States must ensure that the international safeguards regime, as embodied by the International Atomic Energy Agency (IAEA), has 'the authority, information, people, and technology it needs to do its job.' The U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA) works to implement the President's vision through the Next Generation Safeguards Initiative (NGSI), a program to revitalize the U.S. DOE national laboratories safeguards technology and human capital base so that the United States can more effectively support the IAEA and ensure that it meets current and emerging challenges to the internationalmore » safeguards system. In 2009, in response to the human capital development goals of NGSI, young safeguards professionals within the Global Nuclear Security Technology Division at Oak Ridge National Laboratory launched the Next Generation Safeguards Professional Network (NGSPN). The purpose of this initiative is to establish working relationships and to foster collaboration and communication among the next generation of safeguards leaders. The NGSPN is an organization for, and of, young professionals pursuing careers in nuclear safeguards and nonproliferation - as well as mid-career professionals new to the field - whether working within the U.S. DOE national laboratory complex, U.S. government agencies, academia, or industry or at the IAEA. The NGSPN is actively supported by the NNSA, boasts more than 70 members, maintains a website and newsletter, and has held two national meetings as well as an NGSPN session and panel at the July 2010 Institute of Nuclear Material Management Annual Meeting. This paper discusses the network; its significance, goals and objectives; developments and progress to date; and future plans.« less
- Oklahoma Water Resources Center
INTERDISCIPLINARY PROGRAMS Environmental Sciences Master of International Agriculture Degree Program OSU Home Professional Development Training (Baton Rouge, LA; 8/5-10) Global Water Security for Agriculture and Natural Oklahoma City Center for Health Sciences Division of Agriculture Institute of Technology Veterinary
77 FR 60450 - Senior Executive Service Performance Review Board
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-03
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Senior Executive Service Performance... announces the appointment of the members of the Senior Executive Service Performance Review Boards for the... appropriate personnel actions for incumbents of Senior Executive Service, Senior Level and Senior Professional...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-03
... Letter'') and Jeanine Rodgers Caruso, President, National Association of Independent Public Finance Advisors, dated March 12, 2013 (``NAIPFA Letter''). See also, Letters to Ronald W. Smith, Corporate... dealers (``dealers''), their municipal finance professionals (``MFPs''), political action committees...
HIPAA Compliance and Training: A Perfect Storm for Professionalism Education?
Agris, Julie L; Spandorfer, John M
2016-12-01
The HIPAA Rules continue to support and bolster the importance of protecting the privacy and security of patients' protected health information. The HIPAA training requirements are at the cornerstone of meaningful implementation and provide a ripe opportunity for critical education.
Faculty Development in Business Education.
ERIC Educational Resources Information Center
Nastas, George, III
1985-01-01
The benefits and costs accruing to business faculty members who publish are discussed. Benefits include possible salary increases and/or promotions, job security, recognition, and professional stature. Costs include investing time without receiving payment. Suggestions are made for improving publication productivity, getting started, developing a…
Towards a global virtual community of female engineering students and professionals
NASA Astrophysics Data System (ADS)
Cotel, Aline; Rimer, Sara; Reddivari, Sahithya
2014-11-01
ct- The need for strategies to empower Liberian women is exemplified in the recent study carried out by ActionAid International, which examined the state of Liberian undergraduate women in urban areas. The results show that these women often face sexual intimidation by faculty and instructors, women are often excluded from student organizations, there exists a lack of institutional support for female organizations at the universities, and that the women do not feel safe in the university due to low security standards. The situation is even direr for the female engineering students with less than 5% of the engineering student population being women, therefore they are quite isolated in their engineering studies with minimal role models and professional support as they persist. We have planned a leadership camp for female Liberian engineering undergraduate women. The ultimate goal is to empower the Liberian women engineers with the skills, support and inspiration necessary to becoming successful engineering professionals. The leadership camp is planned and facilitated collaboratively by the members of the University of Michigan Society of Women Engineers (UM-SWE) student chapter and the Liberia Society of Women Engineers (L-SWE) student organization. The 2 week-long leadership camp has a workshop-based format with two themes: (i) academic and professional skills, and (ii) student organization development. Funded by UM CRLT, IRWG, STEM Africa.
Gulmans, Jitske; Vollenbroek-Hutten, Miriam M R; Visser, Jacqueline J W; Nijeweme-d'Hollosy, Wendy Oude; van Gemert-Pijnen, J E W C Lisette; van Harten, Wim H
2010-01-01
We developed a secure, web-based system for parent-professional and inter-professional communication. The aim was to improve communication in the care of children with cerebral palsy. We conducted a six-month trial of the system in three Dutch health-care regions. The participants were the parents of 30 cerebral palsy patients and 120 professional staff involved in their care. Information about system usage was extracted from the system's database. The experience of the parents and professionals was evaluated by a questionnaire after six months. The system proved to be technically robust and reliable. A total of 21 parents (70%) and 66 professionals (55%) used the system. The parents submitted 111 questions and 59 responses, with a mean of 5 questions (range 1-17) and 3 responses (range 1-9) per parent. The professionals submitted 79 questions and 237 responses, with a mean of 2 questions (range 1-8) and 4 responses (range 1-23) per professional. Most parents (95%) and some professionals (30%) reported value in using the system, which ranged from efficiency and accessibility to flexibility and transparency. The web-based communication system was technically feasible and produced improved parent-professional and inter-professional communication. It may be especially valuable if frequent interventions or consultations about a child's care are required, involving complex care networks of different professionals and organisations.
Greenberg, Sheldon F
2007-09-01
In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.
[Concept for a National Implant Registry to Improve Patient Safety].
Prantl, L; von Fritschen, U; Liebau, J; von Hassel, J; Baur, E M; Vogt, P M; Giunta, R E; Horch, R E
2016-12-01
Since the introduction of silicone implants, several events have led to considerable uncertainty among the patients, public, and users. So far, however, the necessary steps to significantly improving patient safety have not been taken in any of these cases. Requiring stricter approvals for medical devices, improving monitoring by the regulatory authorities and the revision of the Medical Devices Directive are all initial steps in the right direction towards a change in policy, but are insufficient as an early warning system. After the introduction of registers was announced in the coalition agreement, the German Society of Plastic, Aesthetic and Reconstructive Surgeons (DGPRÄC), in close consultation with the Ministry of Health, has developed a concept which is presented here. The need for a uniform and legally binding central register for breast implants is fully supported by the entire medical profession. According to the concept presented by the DGPRÄC, three data qualities would be applicable: Safety data (mandatory), physician information (voluntary) and research data (optional, except if safety related). The public authorities are creating a unified, secure entry portal for all professional associations concerned. This register is based with the professional associations, and from there the mandatory security data will be forwarded to the public authorities. Decoding of the identity of the patient and doctor would only occur in specifically defined emergency situations such as product recalls. Automated tools in the security database provide early detection of problems, so that rapid clarification is possible in consultation with the professional associations, manufacturers and possibly patients. This concept as proposed by the DGPRÄC has thus far been very positively received in all discussions between the various parties concerned. © Georg Thieme Verlag KG Stuttgart · New York.
Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel
2018-06-12
Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.
Facilities as teaching tools: A transformative participatory professional development experience
NASA Astrophysics Data System (ADS)
Wilson, Eric A.
Resource consumption continues to increase as the population grows. In order to secure a sustainable future, society must educate the next generation to become "sustainability natives." Schools play a pivotal role in educating a sustainability-literate society. However, a disconnect exists between the hidden curriculum of the built environment and the enacted curriculum. This study employs a transformative participatory professional development model to instruct teachers on how to use their school grounds as teaching tools for the purpose of helping students make explicit choices in energy consumption, materials use, and sustainable living. Incorporating a phenomenological perspective, this study considers the lived experience of two sustainability coordinators. Grounded theory provides an interpretational context for the participants' interactions with each other and the professional development process. Through a year long professional development experience - commencing with an intense, participatory two-day workshop -the participants discussed challenges they faced with integrating facilities into school curriculum and institutionalizing a culture of sustainability. Two major needs were identified in this study. For successful sustainability initiatives, a hybrid model that melds top-down and bottom-up approaches offers the requisite mix of administrative support, ground level buy-in, and excitement vis-a-vis sustainability. Second, related to this hybrid approach, K-12 sustainability coordinators ideally need administrative capabilities with access to decision making, while remaining connected to students in a meaningful way, either directly in the classroom, as a mentor, or through work with student groups and projects.
Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent
2009-01-01
The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an “ephemeral electronic patient record”. However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure “google-like” access to medical records. PMID:19718446
A baseline assessment of emergency planning and preparedness in Italian universities.
Marincioni, Fausto; Fraboni, Rita
2012-04-01
Besides offering teaching and research services, schools and universities also must provide for the safety and security of their employees, students, and visitors. This paper describes emergency preparedness in a sample of Italian universities. In particular it examines risk perception within a specific professional category (university safety and security officers) in a specific cultural context (Italy). In addition, it discusses the transposition and implementation in a European Union (EU) member state of EU Council Directive 89/391/EEC of 12 June 1989, on the introduction of measures to encourage improvements in the safety and health of workers. The findings highlight heterogeneous and fragmented emergency management models within the Italian university system, underlining the need for a stricter framework of standardised safety protocols and emergency management guidelines. The study also points out that enhancing emergency planning and preparedness in Italian universities entails increasing safety leadership, employee engagement and individual responsibility for safety and security; essentially, it necessitates improving the culture of risk prevention. © 2012 The Author(s). Disasters © Overseas Development Institute, 2012.
Workarounds to computer access in healthcare organizations: you want my password or a dead patient?
Koppel, Ross; Smith, Sean; Blythe, Jim; Kothari, Vijay
2015-01-01
Workarounds to computer access in healthcare are sufficiently common that they often go unnoticed. Clinicians focus on patient care, not cybersecurity. We argue and demonstrate that understanding workarounds to healthcare workers' computer access requires not only analyses of computer rules, but also interviews and observations with clinicians. In addition, we illustrate the value of shadowing clinicians and conducing focus groups to understand their motivations and tradeoffs for circumvention. Ethnographic investigation of the medical workplace emerges as a critical method of research because in the inevitable conflict between even well-intended people versus the machines, it's the people who are the more creative, flexible, and motivated. We conducted interviews and observations with hundreds of medical workers and with 19 cybersecurity experts, CIOs, CMIOs, CTO, and IT workers to obtain their perceptions of computer security. We also shadowed clinicians as they worked. We present dozens of ways workers ingeniously circumvent security rules. The clinicians we studied were not "black hat" hackers, but just professionals seeking to accomplish their work despite the security technologies and regulations.
Conducted electrical weapons within healthcare: a comprehensive use of force model.
Ho, Jeffrey D; Williams, Martin F; Coplen, Michael J
2014-01-01
Healthcare settings are experiencing increased amounts of violent activity that are challenging to the health care security profession. There is difficulty in addressing this issue completely. Some of this difficulty is because of factors that include inexperienced and untrained clinicians and administrators that are often the decision-makers in the health care setting. As part of an effective solution, we propose that a security plan, including a comprehensive use of force program incorporating conducted electrical weapons, is a necessary and best-practice goal. This paper outlines the background of the problem and discusses the challenges we encountered in reaching this goal as well as the benefits we have discovered along the way. This paper will be beneficial to any healthcare security professional that is interested in enhancing or improving their current health care security use of force model to further counter the increasing violent activity in their respective healthcare setting.
Mission Assurance Modeling and Simulation: A Cyber Security Roadmap
NASA Technical Reports Server (NTRS)
Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna
2012-01-01
This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.
Coding ethical behaviour: the challenges of biological weapons.
Rappert, Brian
2003-10-01
Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.
Securing food from field to table: what can we do?
Li, Duo; Wahlqvist, Mark L
2011-01-01
Food security has emerged as one of the most pressing socio-economic and health issues of our time. While the formal processes of international and national governance are short-changing the need for action, an increasing number of professional science-based organisations are rallying to reduce the presence and risks of food insecurity. Examples are the Food in Health Security Network (FIHS) for the Asia Pacific region and the 'Healthy Agriculture, Healthy Nutrition, Healthy People’ initiative of the World Council on Genetics, Nutrition and Fitness for Health. The common denominator is the threat to ecosytems which are intrinsic to food and health systems. To increase their prospects for sustainability and health promotion, coordinated partnerships between agriculture and health as well as other sectors are imperative.
Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research
NASA Astrophysics Data System (ADS)
Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne
This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.
Ethics in Public Health Research
Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.
2008-01-01
Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010
Web-based Factors Affecting Online Purchasing Behaviour
NASA Astrophysics Data System (ADS)
Ariff, Mohd Shoki Md; Sze Yan, Ng; Zakuan, Norhayati; Zaidi Bahari, Ahamad; Jusoh, Ahmad
2013-06-01
The growing use of internet and online purchasing among young consumers in Malaysia provides a huge prospect in e-commerce market, specifically for B2C segment. In this market, if E-marketers know the web-based factors affecting online buyers' behaviour, and the effect of these factors on behaviour of online consumers, then they can develop their marketing strategies to convert potential customers into active one, while retaining existing online customers. Review of previous studies related to the online purchasing behaviour in B2C market has point out that the conceptualization and empirical validation of the online purchasing behaviour of Information and Communication Technology (ICT) literate users, or ICT professional, in Malaysia has not been clearly addressed. This paper focuses on (i) web-based factors which online buyers (ICT professional) keep in mind while shopping online; and (ii) the effect of web-based factors on online purchasing behaviour. Based on the extensive literature review, a conceptual framework of 24 items of five factors was constructed to determine web-based factors affecting online purchasing behaviour of ICT professional. Analysis of data was performed based on the 310 questionnaires, which were collected using a stratified random sampling method, from ICT undergraduate students in a public university in Malaysia. The Exploratory factor analysis performed showed that five factors affecting online purchase behaviour are Information Quality, Fulfilment/Reliability/Customer Service, Website Design, Quick and Details, and Privacy/Security. The result of Multiple Regression Analysis indicated that Information Quality, Quick and Details, and Privacy/Security affect positively online purchase behaviour. The results provide a usable model for measuring web-based factors affecting buyers' online purchase behaviour in B2C market, as well as for online shopping companies to focus on the factors that will increase customers' online purchase.
Oltra Rodríguez, Enrique; Fernández García, Benjamín; Cabiedes Miragaya, Laura; Riestra Rodríguez, Rosario; González Aller, Cristina; Osorio Álvarez, Sofía
2018-04-26
Nowadays minor surgery is performed by di- fferent professionals at primary as well as specialized care. Being a healthcare technology, minor surgery must be assessed in order to achieve an organizational efficiency. User's satisfaction must be one of the quality criteria. That is why an analysis of the quality perceived by users according to where minor surgery takes place and who carries it out is made. This study explores, conducting telephone surveys, the satisfaction of a sample of 275 minor surgery patients of two hospitals and three primary healthcare areas of Asturias. The survey is based on the SERVQUAL model adapting the one used by the Spanish Ministry of Health in 1977. A behavior pattern of satisfaction was established in terms of the variables that increase or diminish it. In every item, satisfaction was perceived as good or very good at least in 84% of the survey users and in the majority was over 95%. There was a significant difference in favour of primary care with respect to waiting time (p less than 0,001), explanations received (p=0,002) and security perceived (p=0,015). The more explanatory variables of excellent satisfaction were the sense of security and the staff attention. The kind of professional did not represent a conditioning factor and the level of healthcare only appeared to be so among those who did not feel safe showing to be less satisfied those treated in primary care. Good quality perceived by users does not seem to be penalized by the fact that minor surgery can be carried out at different healthcare levels or which specialist performs it.
Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI
NASA Astrophysics Data System (ADS)
Zúquete, André; Gomes, Helder; Cunha, João Paulo Silva
This paper describes the design and implementation of an e-Health authentication architecture using smartcards and a PKI. This architecture was developed to authenticate e-Health Professionals accessing the RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals' credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short-lived certificates and cross-certification agreements between RTS and e-Health institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional's role at their home institution for role-based authorization. Trust agreements between e-Health institutions and RTS are necessary in order to make the certificates recognized by the RTS. As a proof of concept, a prototype was implemented with Windows technology. The presented authentication architecture is intended to be applied to other medical telematic systems.
OS friendly microprocessor architecture: Hardware level computer security
NASA Astrophysics Data System (ADS)
Jungwirth, Patrick; La Fratta, Patrick
2016-05-01
We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.
Tense Times and Language Planning
ERIC Educational Resources Information Center
Bianco, Joseph Lo
2008-01-01
This article discusses the different effects arising from deliberations on language policy in conferences dominated by professionals compared with the interests, priorities and demands of geo-political and military security coming from defense interests. The paper proposes a three dimensional way to understand language policy: text, discourse and…
Exploring Service Logic in ESL
ERIC Educational Resources Information Center
Walker, John
2013-01-01
ESL is both a professional educational service and, particularly in post-compulsory contexts, a commercial activity. The effective management of ESL programs can secure quality outcomes for practitioners and students. Nevertheless, writings on ESL management do not figure prominently in the literature. In particular, the association between…
Commercial Activities and Copyright in Australian Universities
ERIC Educational Resources Information Center
Shelly, Marita
2008-01-01
With government funding for most Australian universities below 60% and falling a major strategic emphasis for universities has been on securing other sources of operating revenue, including commercial opportunities and partnerships. The implication of increasing commercial activities such as non-award and tailored professional programmes, contract…
46 CFR 11.505 - Engineer officer structure.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Engineer officer structure. 11.505 Section 11.505 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN REQUIREMENTS FOR OFFICER ENDORSEMENTS Professional Requirements for Engineer Officer § 11.505 Engineer officer structure...
46 CFR 11.505 - Engineer officer structure.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Engineer officer structure. 11.505 Section 11.505 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN REQUIREMENTS FOR OFFICER ENDORSEMENTS Professional Requirements for Engineer Officer § 11.505 Engineer officer structure...
46 CFR 11.505 - Engineer officer structure.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Engineer officer structure. 11.505 Section 11.505 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN REQUIREMENTS FOR OFFICER ENDORSEMENTS Professional Requirements for Engineer Officer § 11.505 Engineer officer structure...
46 CFR 11.505 - Engineer officer structure.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Engineer officer structure. 11.505 Section 11.505 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN REQUIREMENTS FOR OFFICER ENDORSEMENTS Professional Requirements for Engineer Officer § 11.505 Engineer officer structure...
29 CFR 1910.1051 - 1,3-Butadiene.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., duration, and results of samples taken; (E) Type of protective devices worn, if any; and (F) Name, social... social security number of the employee; (B) Physician's or other licensed health care professional's...: Good industrial hygiene practices recommend that engineering and work practice controls be used to...
77 FR 76572 - Decimalization Roundtable
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-28
... discuss the impact of tick sizes on small and mid-sized companies, market professionals, investors, and U...) of the Securities and Exchange Commission headquarters at 100 F Street NE., in Washington, DC. The... sizes on small and middle capitalization companies, the economic consequences (including the costs and...
Doing Our Homework: A Pre-Employment Screening Checklist for Better Head Start Hiring.
ERIC Educational Resources Information Center
McSherry, Jim; Caruso, Karen; Cagnetta, Mary
1999-01-01
Provides a checklist for screening potential Head Start employees. Components include checks for criminal record, credit history, motor vehicle records, social security number tracing, previous address research, education verification, work and personal reference interview, and professional license verification. (KB)
Success requires seizing opportunities.
Melum, M M
1987-01-01
The well-trained group of professionals had worked hard at the business they knew well. Their efforts had paid off--they were highly respected for their quality; their business grew; they had a close, trusting relationship with their customers; and they had the satisfaction of running their business as they alone knew to be best. As they looked ahead, they saw the personal security of a bright, safe future, of more of the same success. Then, slowly at first but building steadily to a feverish pace, their business and their lives were uprooted and torn apart in an all-encompassing economic and social earthquake. Now, with a force the professionals could hardly believe, let alone keep track of, the very definition of their business was changing, the trusting relationship with customers began to break down as massive numbers of new and different competitors vied for their business, many new players began to control how they ran their business, and security vanished into a confusion of competition, entrepreneurship, and risk.
Increasing clinical presence of mobile communication technology: avoiding the pitfalls.
Visvanathan, Akila; Gibb, Alan P; Brady, Richard R W
2011-10-01
Mobile communication technologies are employed in many diverse areas of healthcare delivery to provide improved quality and efficiency of communication and facilitate increased rapidity of data or information transfer. Mobile phones enable healthcare professionals to possess a portable platform from which to provide many healthcare-related applications and are a popular means to directly communicate with colleagues and patients. As involvement of mobile communication technology in healthcare delivery continues to rapidly expand, there are also important considerations of relevance to patient safety and security as a result. Here, we review the previous evidence of reported clinical risks associated with mobile communication technology, such as electromagnetic interference, confidentiality and data security, distraction/noise, infection control, and cross contamination. In conclusion, although mobile phones provide much putative potential improvement to healthcare delivery, further evaluation and research are required to both inform and protect health professionals and users of such technology in the healthcare environment and provide the evidence base to support the provision of clear and comprehensive guidelines.
A comprehensive approach to managing threats of violence on a university or college campus.
Regehr, Cheryl; Glancy, Graham D; Carter, Andrea; Ramshaw, Lisa
Horrifying, high profile acts of violence on campuses remain relatively rare, nevertheless, academic administrators are required to manage threats of violence on campus on an increasingly regular basis. These threats take two primary forms, those in which the perpetrator and the intended victim(s) are clearly identified, often involving repeated threats and threatening behaviour towards an individual; and those involving anonymous threats to commit acts of larger scale violence. Complicating factors in managing these threats include: fear contagion; mass media and social media attention; responsibilities to all members of the university community sometimes including individuals issuing the threat and the intended victims; demands for safety and security measures that are often at odds with professional advice; and permeable campus boundaries that cause security challenges. This paper considers the changing landscape of threat assessment and risk assessment on university and college campuses and suggests opportunities for partnerships between forensic mental health professionals and academic administrators. Copyright © 2017 Elsevier Ltd. All rights reserved.
Gallagher, Jennifer E; Clarke, Wendy; Eaton, Kenneth A; Wilson, Nairn H F
2007-11-16
New graduates in the UK presently spend one year in training as Vocational Dental Practitioners (VDPs) in preparation for primary dental care. There is a growing recognition that the emerging workforce has very different professional expectations to those of earlier generations, with implications for the profession, patients and the performance of health systems. The objectives of this study were to investigate why VDPs' in England and Wales perceive they chose dentistry as a professional career; how they perceive their vision has changed and the implications for their professional career plans, both short- and longterm. Purposive sampling of schemes was undertaken to include urban, rural and metropolitan schemes, schemes in areas with and without dental schools and geographic coverage across England and Wales. All VDPs in these schemes were initiated to participate in this qualitative study using focus groups. A topic guide was utilised to standardise data collection. Informants' views were recorded on tape and in field notes. Data were transcribed and analysed using Framework Methodology. A total of 99 VDPs participated in the 10 focus groups. Their choice of dentistry as a professional career was motivated by multiple categories of influence: 'academic', 'healthcare', 'lifestyle', the influence of 'family', 'friends', 'careers advice' and 'work experience'. Consideration of the features of the 'professional job' appears to have been key to their choice of dentistry and the 'active rejection of medicine' as an alternative career.Entry into the profession was proving a challenging process for some but not all VDPs. Informants perceived that their vision had been moderated as a result of 'personal student debt', 'national workforce initiatives', 'limitations on clinical practice' and the 'cost of additional training'.Short term goals focused around 'recovery from the past' and 'preparation for the future'. Longterm goals covered the spectrum of opportunities within dentistry. Factors influencing VDPs longterm career plans fell into six main categories: professional, personal, financial, political, social and cultural. VDPs chose dentistry because they perceived that it provides a financially lucrative, contained career in healthcare, with professional status, job security and the opportunity to work flexibly. They perceive that their vision is challenged by changes affecting education and the healthcare system. Longterm professional expectations were closely linked with their personal lives and support a vision of a favourable work/life balance.
Gallagher, Jennifer E; Clarke, Wendy; Eaton, Kenneth A; Wilson, Nairn HF
2007-01-01
Background New graduates in the UK presently spend one year in training as Vocational Dental Practitioners (VDPs) in preparation for primary dental care. There is a growing recognition that the emerging workforce has very different professional expectations to those of earlier generations, with implications for the profession, patients and the performance of health systems. The objectives of this study were to investigate why VDPs' in England and Wales perceive they chose dentistry as a professional career; how they perceive their vision has changed and the implications for their professional career plans, both short- and longterm. Methods Purposive sampling of schemes was undertaken to include urban, rural and metropolitan schemes, schemes in areas with and without dental schools and geographic coverage across England and Wales. All VDPs in these schemes were initiated to participate in this qualitative study using focus groups. A topic guide was utilised to standardise data collection. Informants' views were recorded on tape and in field notes. Data were transcribed and analysed using Framework Methodology. Results A total of 99 VDPs participated in the 10 focus groups. Their choice of dentistry as a professional career was motivated by multiple categories of influence: 'academic', 'healthcare', 'lifestyle', the influence of 'family', 'friends', 'careers advice' and 'work experience'. Consideration of the features of the 'professional job' appears to have been key to their choice of dentistry and the 'active rejection of medicine' as an alternative career. Entry into the profession was proving a challenging process for some but not all VDPs. Informants perceived that their vision had been moderated as a result of 'personal student debt', 'national workforce initiatives', 'limitations on clinical practice' and the 'cost of additional training'. Short term goals focused around 'recovery from the past' and 'preparation for the future'. Longterm goals covered the spectrum of opportunities within dentistry. Factors influencing VDPs longterm career plans fell into six main categories: professional, personal, financial, political, social and cultural. Conclusion VDPs chose dentistry because they perceived that it provides a financially lucrative, contained career in healthcare, with professional status, job security and the opportunity to work flexibly. They perceive that their vision is challenged by changes affecting education and the healthcare system. Longterm professional expectations were closely linked with their personal lives and support a vision of a favourable work/life balance. PMID:18005452
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model
NASA Astrophysics Data System (ADS)
Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal
How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.
Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: no malicious intent.
Jack, Caron; Singh, Yashik; Mars, Maurice
2013-01-01
Information and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the workplace and at home, and whether their current computer practices meets legal and ethical requirements. The aims of this study were to determine the use of computers by healthcare practitioners in the workplace and home; the use and approach to data storage, encryption and security of patient data and patient email; and the use of informed consent to transmit data by email. A self-administered questionnaire was administered to 400 health care providers from the state and private health care sectors. The questionnaire covered computer use in the workplace and at home, sharing of computers, data encryption and storage, email use, encryption of emails and storage, and the use of informed consent for email communication. 193 doctors and 207 nurses in the private and public sectors completed the questionnaire. Forty (10%) of participants do not use a computer. A third of health professionals were the only users of computers at work or at home. One hundred and ninety-eight respondents (55%) did not know if the data on the computers were encrypted, 132 (36.7%) knew that the data were not encrypted and 30 (8.3%) individuals knew that the data on the computers they were using were encrypted. Few doctors, 58 (16%), received emails from patients, with doctors more likely to receive emails from patients than nurses (p = 0.0025). Thirty-one percent of individuals did not respond to the emails. Emails were saved by 40 (69%) recipients but only 5 (12.5%) doctors encrypted the messages, 19 (47.5%) individuals knowingly did not encrypt and 16 (40.0%) did not know if they encrypted the data. While 20% of health professionals have emailed patient data, but only 41.7% gained consent to do so. Most health professionals as sampled in South Africa are not compliant with the National Health Act or the Electronic Communications Transactions Act of South Africa or guidelines from regulatory bodies when managing patient data on computers. Many appear ignorant or lack the ability to comply with simple data security procedures.
de Jong, Catharina C; Ros, Wynand Jg; van Leeuwen, Mia; Schrijvers, Guus
2016-11-24
Home-dwelling elderly patients with multimorbidity are at risk of fragmentation of care because of the many different professionals involved and a potentially unclear level of communication. Multidisciplinary communication seems to occur incidentally. Mutual feedback is needed for a professional team to provide consistent care and adequate support to the patient system. eHealth technology can improve outcomes. The aim of this study was to evaluate the use of a tool, Congredi, for electronic communication by professionals for the care of home-dwelling elderly patients. The research group was recruited through general practices and home care organizations. Congredi, a tool designed for multidisciplinary communication, was made available for professionals in primary care. It consists of a care plan and a communication channel (secure emailing). Professionals opened Congredi records for elderly patients who had 2 or more professionals involved. The records were the unit of analysis. Data were gathered from the Congredi system over a period of 42 weeks. An inclusion rate of 21.4% (203/950) was achieved; nearly half of the participants were nurses. During the study, professionals were active in 448 patient records; female professionals were prevalent. In the patient records, 3 types of actions (care activities, emailing, and process activities) were registered. Most activities occurred in the multidisciplinary records (mean 12.2), which had twice the number of activities of monodisciplinary records (6.35), and solo records had a mean of 3.43 activities. Most activities were care activities (mean 9.14), emailing had a mean of 0.89 activities, and process activities had a mean of 0.29. An e-communication tool (Congredi) was usable for improving multidisciplinary communication among professionals. It even seemed to yield results for 40% of the professionals who used the e-care plan on their own. The content of the tool provided an active communication practice, with significant increases observed in the actions that must be shared for the effective coordination of care. ©Catharina C de Jong, Wynand JG Ros, Mia van Leeuwen, Guus Schrijvers. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 24.11.2016.
Combining conceptual graphs and argumentation for aiding in the teleexpertise.
Doumbouya, Mamadou Bilo; Kamsu-Foguem, Bernard; Kenfack, Hugues; Foguem, Clovis
2015-08-01
Current medical information systems are too complex to be meaningfully exploited. Hence there is a need to develop new strategies for maximising the exploitation of medical data to the benefit of medical professionals. It is against this backdrop that we want to propose a tangible contribution by providing a tool which combines conceptual graphs and Dung׳s argumentation system in order to assist medical professionals in their decision making process. The proposed tool allows medical professionals to easily manipulate and visualise queries and answers for making decisions during the practice of teleexpertise. The knowledge modelling is made using an open application programming interface (API) called CoGui, which offers the means for building structured knowledge bases with the dedicated functionalities of graph-based reasoning via retrieved data from different institutions (hospitals, national security centre, and nursing homes). The tool that we have described in this study supports a formal traceable structure of the reasoning with acceptable arguments to elucidate some ethical problems that occur very often in the telemedicine domain. Copyright © 2015 Elsevier Ltd. All rights reserved.
Fallahi Khoshknab, Masoud; Oskouie, Fatemeh; Ghazanfari, Nahid; Najafi, Fereshteh; Tamizi, Zahra; Afshani, Shahla; Azadi, Ghazal
2015-01-01
Background There are high levels of sexual harassment in health care systems. Also, workplace violence occurs against ethnic and racial minorities. This study aimed to identify the frequency of and the factors contributing to and preventing sexual and racial harassment in the workplace towards health professionals in Iran. Methods This cross-sectional study was conducted on 6500 out of 57000 health workers who were selected by multistage random sampling from some teaching hospitals in Iran. Data were collected using the questionnaire of “workplace violence in the health sector” developed by the International Labor Organization, International Council of Nurses, World Health Organization, and Public Services International. Results According to the findings, the frequencies of sexual harassment and racial harassment were, respectively, 4.7% and 12% for the 12 months prior to the study (2011). Among healthcare workers, nurses reported the highest rate of violence. The most important contributing factors in sexual and racial harassment were lack of security facilities (45.8%) and people’s ignorance of employees’ tasks (55.7%). The presence of security force, safety measures in the wards, and guards were noted as the most important preventive factor to harassment. Conclusion Based on the results, the frequency of sexual and racial harassment is low, which can be attributed to underreporting due to cultural sensitivity or fear. So, identifying the reasons for refusal to report harassment, developing a clear mechanism for reporting and providing the necessary trainings to health workers are essential in order to deal with harassment. PMID:26171404
NASA Astrophysics Data System (ADS)
Ma, Jinqiang
2017-09-01
To carry out the identification of the professional skills of the soldiers is to further promote the regularization of the needs of the fire brigade, in accordance with the “public security active forces soldiers professional skills identification implementation approach” to meet the needs of candidates for mobile learning to solve the paper learning materials bring a lot of inconvenience; This article uses the Android technology to develop a set of soldiers professional skills Identification Theory learning app, the learning software based on mobile learning, learning function is perfect, you can learn to practice, to achieve the goal of learning at any time, to enhance the soldier's post ability has a good practical value.
Davoren, Mary; Byrne, Orla; O'Connell, Paul; O'Neill, Helen; O'Reilly, Ken; Kennedy, Harry G
2015-11-23
Patients admitted to a secure forensic hospital are at risk of a long hospital stay. Forensic hospital beds are a scarce and expensive resource and ability to identify the factors predicting length of stay at time of admission would be beneficial. The DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale are designed to assess need for therapeutic security and urgency of that need while the HCR-20 predicts risk of violence. We hypothesized that items on the DUNDRUM-1 and DUNDRUM-2 scales, rated at the time of pre-admission assessment, would predict length of stay in a medium secure forensic hospital setting. This is a prospective study. All admissions to a medium secure forensic hospital setting were collated over a 54 month period (n = 279) and followed up for a total of 66 months. Each patient was rated using the DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale as part of a pre-admission assessment (n = 279) and HCR-20 within 2 weeks of admission (n = 187). Episodes of harm to self, harm to others and episodes of seclusion whilst an in-patient were collated. Date of discharge was noted for each individual. Diagnosis at the time of pre-admission assessment (adjustment disorder v other diagnosis), predicted legal status (sentenced v mental health order) and items on the DUNDRUM-1 triage security scale and the DUNDRUM-2 triage urgency scale, also rated at the time of pre-admission assessment, predicted length of stay in the forensic hospital setting. Need for seclusion following admission also predicted length of stay. These findings may form the basis for a structured professional judgment instrument, rated prior to or at time of admission, to assist in estimating length of stay for forensic patients. Such a tool would be useful to clinicians, service planners and commissioners given the high cost of secure psychiatric care.
A political economic theory of the dental care market.
Lipscomb, J; Douglass, C W
1982-01-01
A theory of the dental care market is introduced which proposes that the vertically integrated (local/state/national) structure of the profession services as an organizational vehicle both for intra-professional debate and for developing provider-oriented dental care policy. We suggest that a special relationship exists between professionalism and professional regulation. Such regulation has functioned simultaneously to limit competition and to foster a prized consumption commodity for providers: professionalism and professional esteem. The organized pursuit of this commodity inherently dampens competition. Professionalism itself plays a crucial role in: 1) securing for organized dentistry a form of state regulation in which the providers themselves are the principal decision-makers; and 2) influencing provider and consumer market behavior in several significant respects, the net result being the formation of maintenance of a type of "leadership cartel" in the local market. Thus, a political-economic theory of the dental care market formally acknowledges professionalism as valued by established dentists and recent graduates as a central determining influence. Traditional models of pure competition and monopoly emerge as special, extreme cases of the general theory. Hypotheses are offered regarding consumer and provider behavior, market dynamics, and health policy and regulation. PMID:7091455
Tovian, Steven M
2016-12-01
Interprofessionalism is a cornerstone for health care reform and is an important dimension for success for the practice of professional psychology in integrated care settings, whether in academic health centers, ambulatory clinics, or in independent practice. This article examines salient skills that have allowed the author to practice in both primary and tertiary health care settings, as well as in academic health centers and independent community practice. The scientist practitioner model of professional psychology has served to guide the author as a "roadmap" for successful collaborative, integrated care in the changing health care environment. The author emphasizes that marketing of health services in professional psychology is crucial for achieving the goals of interprofessionalism, and to secure a role for professional psychology in health care reform. Future challenges to psychology in health care are discussed with implications for training and practice.
Vitari, Claudio; Ologeanu-Taddei, Roxana
2018-03-21
Like other sectors, the healthcare sector has to deal with the issue of users' acceptance of IT. In healthcare, different factors affecting healthcare professionals' acceptance of software applications have been investigated. Unfortunately, inconsistent results have been found, maybe because the different studies focused on different IT and occupational groups. Consequently, more studies are needed to investigate these implications for recent technology, such as Electronic Health Records (EHR). Given these findings in the existing literature, we pose the following research question: "To what extent do the different categories of clinical staff (physicians, paraprofessionals and administrative personnel) influence the intention to use an EHR and its antecedents?" To answer this research question we develop a research model that we empirically tested via a survey, including the following variables: intention to use, ease of use, usefulness, anxiety, self-efficacy, trust, misfit and data security. Our purpose is to clarify the possible differences existing between different staff categories. For the entire personnel, all the hypotheses are confirmed: anxiety, self-efficacy, trust influence ease of use; ease of use, misfit, self-efficacy, data security impact usefulness; usefulness and ease of use contribute to intention to use the EHR. They are also all confirmed for physicians, residents, carers and nurses but not for secretaries and assistants. Secretaries' and assistants' perception of the ease of use of EHR does not influence their intention to use it and they could not be influenced by self-efficacy in the development of their perception of the ease of use of EHR. These results may be explained by the fact that secretaries, unlike physicians and nurses, have to follow rules and procedures for their work, including working with EHR. They have less professional autonomy than healthcare professionals and no medical responsibility. This result is also in line with previous literature highlighting that administrators are more motivated by the use of IT in healthcare.
Heiland, Frank; Yin, Na
2015-01-01
Purpose Recent studies report systematic differences in how individuals categorize the severity of identical health and work limitation vignettes. We investigate how health professionals and disability recipients characterize the severity of work limitations and whether their reporting patterns are robust to demographic, education, and health characteristics. We use the results to illustrate the potential impact of reporting heterogeneity on the distribution of work disability estimated from self-reported categorical health and disability data. Method Nationally representative data on anchoring disability vignettes from the 2004 Health and Retirement Study (HRS) are used to investigate how respondents with an occupation background in health and Social Security disability beneficiaries categorize work limitation vignettes. Using pain, cardiovascular health, and depression vignettes, we estimate generalized ordered probit models (N = 2,660 individuals or 39,681 person-vignette observations) that allow the severity thresholds to vary by respondent characteristics. Results We find that health professionals (excluding nurses) and disability recipients tend to classify identical work limitations as more severe compared to non-health professional non-disabled respondents. For disability recipients, the differences are most pronounced and particularly visible in the tails of the work limitations distribution. For health professionals, we observe smaller differences, affecting primarily the classification of mildly and moderately severe work limitations. The patterns for health professionals (excluding nurses) are robust to demographics, education, and health conditions. The greater likelihood of viewing the vignette person as more severely work limited observed among disability recipients is mostly explained by the fact that these respondents also tend to be in poorer health which itself predicts a more inclusive scale. Conclusions Knowledge of reporting scales from health professionals and disabled individuals can benefit researchers in a broad range of applications in health and disability research. They may be useful as reference scales to evaluate disability survey data. Such knowledge may be beneficial when studying disability programs. Given the increasing availability of anchoring vignette data in surveys, this is a promising area for future evaluation research. PMID:25966316
ERIC Educational Resources Information Center
Kiss, Elizabeth
2006-01-01
Earning, spending, saving and investing, and using credit are important aspects of money management that teens need to understand as they move into adulthood. Family and consumer sciences (FCS) professionals have a long history of addressing this important life skill. This brief article describes the High School Financial Planning Program (HSFPP),…
First United States Army Observers of Military Conflicts in Post Napoleonic Europe (1855-1871)
2015-06-12
United States during this era of free security fueled expansive increases in all sectors of American life to include the professionalism of the American...children and elderly. Chief Black Kettle was a survivor of the Sand Creek Massacre and was later
If Not Us, Who? Social Media Policy and the Ischool Classroom
ERIC Educational Resources Information Center
Nathan, Lisa P.; MacGougan, Alice; Shaffer, Elizabeth
2014-01-01
Social networking tools offer opportunities for innovative, participative pedagogical practice within traditional institutional frameworks. However, tensions continue to develop within this space: between creativity and security, personal and professional identity, privacy and openness. We argue that iSchools are uniquely positioned to create…
Warrant Officer Orientation Course (WOOC) Evaluation
1981-10-01
Army Mainte- nance Management System, Security Awareness, Organizational Effectiveness, Introduction to Management , Enlisted Personnel Management...Orientation Introduction to Management Professional Ethics USA Officer Evaluation Reporting System (OES) Military Correspondence Military...Organizational Effectiveness, Introduction to Management , Enlisted Personnal Management System, and The Army Functional Files System and The Army
Teachers' Emotions: An Illustrated Discussion.
ERIC Educational Resources Information Center
Golby, Michael
1996-01-01
Considers the situations of two women teachers who have profound commitments to their pupils and who gain considerable emotional security from this. Argues that they tend to define school matters outside of teaching as distractions. Suggests that professional development requires a whole-school approach with greater emotional commitment to…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-01
.... Securities Offering. Series 86 Research Analyst--Analysis..... From $160 to $175. Series 87 Research Analyst... Order Processing Assistant Representatives, Research Analysts and Operations Professionals, respectively... examination.\\7\\ \\6\\ PROCTOR is a computer system that is specifically designed for the administration and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-31
... provide the public with optimum opportunity to comment on the interim rule, DHS will reopen the comment... Aigbe, Chief, Regulatory Products Division, U.S. Citizenship and Immigration Services, Department of... Products Division, U.S. Citizenship and Immigration Services, Department of Homeland Security, 20...
The Legal Implications of Storing Student Data: Preparing for and Responding to Data Breaches
ERIC Educational Resources Information Center
Beaudin, Katie
2017-01-01
This chapter outlines the varying threats that IR professionals face when securely storing and managing data, as well as the regulatory structure in place to control data management. Advice is offered on how best to structure and manage student data.
20 CFR 438.300 - Professional and technical services.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 438.300 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... the negotiation of a contract is allowable. However, communications with the intent to influence made..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...
Issues and Challenges Facing the Minority Woman Dentist.
ERIC Educational Resources Information Center
Sinkford, Jeanne C.
1992-01-01
The status of minority women dentists is reviewed, and initiatives to improve it are noted. Issues and challenges for African-American female dentists are outlined, including negative racial/gender stereotypes, lack of advancement opportunities, difficulties in starting practices and securing professional and social support systems, lack of…
2012-03-01
Capt Low was a member of the Sigma Iota Epsilon professional management fraternity. He has performed as an on-equipment and off-equipment...FAA Certification, Military Commercial Derivative Aircraft, Multi-Attribute Decision Making 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF
Tabak, Izabela; Zabłocka-Żytka, Lidia; Ryan, Peter; Poma, Stefano Zanone; Joronen, Katja; Viganò, Giovanni; Simpson, Wendy; Paavilainen, Eija; Scherbaum, Norbert; Smith, Martin; Dawson, Ian
2016-08-01
The lack of pan-European guidelines for empowering children of parents with mental illness led to the EU project CAMILLE - Empowerment of Children and Adolescents of Mentally Ill Parents through Training of Professionals working with children and adolescents. The aim of this initial task in the project was to analyse needs, expectations and consequences for children with respect to living with a parent with mental illness from the perspective of professionals and family members. This qualitative research was conducted in England, Finland, Germany, Italy, Norway, Poland and Scotland with 96 professionals, parents with mental illness, adult children and partners of parents with mental illness. A framework analysis method was used. Results of the study highlighted that the main consequences described for children of parental mental illness were role reversal; emotional and behavioural problems; lack of parent's attention and stigma. The main needs of these children were described as emotional support, security and multidisciplinary help. Implications for practice are that professionals working with parents with mental illness should be aware of the specific consequences for the children and encourage parents in their parental role; multi-agency collaboration is necessary; schools should provide counselling and prevent stigma. © 2016 Australian College of Mental Health Nurses Inc.
[Social network analysis: a method to improve safety in healthcare organizations].
Marqués Sánchez, Pilar; González Pérez, Marta Eva; Agra Varela, Yolanda; Vega Núñez, Jorge; Pinto Carral, Arrate; Quiroga Sánchez, Enedina
2013-01-01
Patient safety depends on the culture of the healthcare organization involving relationships between professionals. This article proposes that the study of these relations should be conducted from a network perspective and using a methodology called Social Network Analysis (SNA). This methodology includes a set of mathematical constructs grounded in Graph Theory. With the SNA we can know aspects of the individual's position in the network (centrality) or cohesion among team members. Thus, the SNA allows to know aspects related to security such as the kind of links that can increase commitment among professionals, how to build those links, which nodes have more prestige in the team in generating confidence or collaborative network, which professionals serve as intermediaries between the subgroups of a team to transmit information or smooth conflicts, etc. Useful aspects in stablishing a safety culture. The SNA would analyze the relations among professionals, their level of communication to communicate errors and spontaneously seek help and coordination between departments to participate in projects that enhance safety. Thus, they related through a network, using the same language, a fact that helps to build a culture. In summary, we propose an approach to safety culture from a SNA perspective that would complement other commonly used methods.
Mayes, Christopher; Blakely, Brette; Kerridge, Ian; Komesaroff, Paul; Olver, Ian; Lipworth, Wendy
2016-02-01
Social, political, and economic environments play an active role in nurturing professional virtue. Yet, these environments can also lead to the erosion of virtue. As such, professional virtue is fragile and vulnerable to environmental shifts. While physicians are often considered to be among the most virtuous of professional groups, concern has also always existed about the impact of commercial arrangements on physicians' willingness and capacity to enact their professional virtues. This article examines the ways in which commercial arrangements have been negotiated to secure medical virtue from real or perceived threats of erosion. In particular, we focus on the concern surrounding conflicts of interest arising from commercial arrangements that have developed as a result of neoliberal economic and social policies. The deregulation of medical markets and privatization of services have produced new commercial relationships that are often misunderstood by patients, publics, and physicians themselves. 'Conflicts of interest' policies have been introduced in an attempt to safeguard ethical conduct and medical practice. However, a number of virtue ethicists have critiqued these policies as inadequate for securing virtue. We examine the ways in which commercial arrangements have been seen to impact upon medical virtue, both historically and in the context of modern medicine (using the example of fertility services in Australia). We then describe and critique current efforts to restore clinical virtue through both conflict of interest policies and through virtue ethics. Finally, we suggest some possible ways of addressing the corrosive effects of neoliberalism on medical virtue.
Internal dental school environmental factors promoting faculty survival and success.
Masella, Richard S
2005-04-01
A career in dental academics offers ample rewards and challenges. To promote successful careers in dental education, prospective and new dental faculty should possess a realistic view of the dental school work environment, akin to the informed consent so valuable to patients and doctors. Self-assessment of personal strengths and weaknesses provides helpful information in matching faculty applicants with appropriate dental schools. Essential prehiring information also includes a written job description detailing duties and responsibilities, professional development opportunities, and job performance evaluation protocol. Prehiring awareness of what constitutes excellence in job performance will aid new faculty in allotting time to productive venues. New faculty should not rely solely on professional expertise to advance careers. Research and regular peer-reviewed publications are necessary elements in academic career success, along with the ability to secure governmental, private foundation, and corporate grant support. Tactful self-promotion and self-definition to the dental school community are faculty responsibilities, along with substantial peer collaboration. The recruitment period is a singular opportunity to secure job benefits and privileges. It is also the time to gain knowledge of institutional culture and assess administrative and faculty willingness to collaborate on teaching, research, professional development, and attainment of change. Powerful people within dental schools and parent institutions may influence faculty careers and should be identified and carefully treated. The time may come to leave one's position for employment at a different dental school or to step down from full-time academics. Nonetheless, the world of dental and health professional education in 2005 is rapidly expanding and offers unlimited opportunities to dedicated, talented, and informed educators.
RESTORING SAFETY: AN ATTACHMENT-BASED APPROACH TO CLINICAL WORK WITH A TRAUMATIZED TODDLER.
Ribaudo, Julie
2016-01-01
This clinical case study explores the integration of infancy research, brain development, attachment theory, and models of infant-parent/child-parent psychotherapy to address the needs of abused and neglected young children placed in foster or adoptive homes. Traumatized children employ defensive strategies to survive when there is no "good enough" caregiver (D.W. Winnicott, 1953, p. 94), and helping professionals can provide therapeutic experiences to develop or restore a child's sense of safety. With the case example of Anthony and his foster/adoptive parents, I illustrate how to manage and contain a traumatized child's terror, rage, and grief through therapeutic sessions with the parent and child together, and supportive parental guidance. I promote attention to the child's ability to self-integrate and to regulate his own affect, and encourages secure-base parental responses that facilitate a child's shift toward secure attachment behavior. © 2015 Michigan Association for Infant Mental Health.
Valdez-Martinez, E; Garduño-Espinosa, J; Martinez-Salgado, H; Porter, J D H
2004-07-01
To identify the structure, composition and work of the local research ethics committees (LRECs) of the Mexican Institute of Social Security (IMSS) in Mexico. A descriptive cross-sectional study was performed that included all LRECs of the IMSS. A total of 335 questionnaires coded in advance were posted to each LREC secretary. The requested information was from January to December 2001. The response rate was 100%. Two hundred and thirty-eight (71%) LRECs were reported as 'active' during the evaluation period. Although almost all LRECs were composed of diverse professionals, physicians dominated the LRECs' membership. The rejection rate for research projects was lower than 1 per 1000, and less than half of the LRECs held meetings to issue a report of projects' evaluation. LRECs need to foster good ethical research; implementation of an audit system to examine their work might help improve LRECs' performance and accountability.
Heidenreich, Kaja; Bremer, Anders; Materstvedt, Lars Johan; Tidefelt, Ulf; Svantesson, Mia
2017-12-14
In Moral Case Deliberation (MCD), healthcare professionals discuss ethically difficult patient situations in their daily practice. There is a lack of knowledge regarding the content of MCD and there is a need to shed light on this ethical reflection in the midst of clinical practice. Thus, the aim of the study was to describe the content of healthcare professionals' moral reasoning during MCD. The design was qualitative and descriptive, and data consisted of 22 audio-recorded inter-professional MCDs, analysed with content analysis. The moral reasoning centred on how to strike the balance between personal convictions about what constitutes good care, and the perceived dissonant care preferences held by the patient. The healthcare professionals deliberated about good care in relation to demands considered to be unrealistic, justifications for influencing the patient, the incapacitated patient's nebulous interests, and coping with the conflict between using coercion to achieve good while protecting human dignity. Furthermore, as a basis for the reasoning, the healthcare professionals reflected on how to establish a responsible relationship with the vulnerable person. This comprised acknowledging the patient as a susceptible human being, protecting dignity and integrity, defining their own moral responsibility, and having patience to give the patient and family time to come to terms with illness and declining health. The profound struggle to respect the patient's autonomy in clinical practice can be understood through the concept of relational autonomy, to try to secure both patients' influence and at the same time take responsibility for their needs as vulnerable humans.
Kerai, Paresh; Wood, Pene; Martin, Mary
2014-03-01
Australia introduced its version of personal health records in July 2012. Success of the personally controlled electronic health record (PCEHR) relies on acceptance during the early stages. The main aim of this study was to investigate the views of a sample of elderly people in a non-metropolitan region in Australia on the PCEHR, and to assess their acceptance levels of this concept. A self-administered questionnaire was distributed to a non-probability convenience sample of respondents recruited from meetings of Probus, a community club for active business and professional retirees. Approximately three-quarters of the respondents had computer and Internet access at home. If not accessed at home a computer at a general practitioner's practice was seen as beneficial in accessing the PCEHR. Respondents felt that access to their health record would help them make decisions about their own health and improve their communication with healthcare providers. The majority of respondents were in favour of the PCEHR although some expressed concerns about the security of their PCEHR. There was mixed opinion surrounding the access by health professionals to an individual's PCEHR. This study has revealed important information about views of the PCEHR. While the respondents were generally in favour of the concept, there were still some concerns about the security of the PCEHR suggesting further reassurance may be required. The study also highlighted some measures, in particular provision of General Practitioner computer access points and print-out facilities that may need to be considered during these initial implementation stages in order to improve adoption rates once the technology is fully available. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G
2012-07-13
We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'.
2012-01-01
Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'. PMID:22794187
Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek
2015-10-14
Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.
[Data security and the handling of patient data in home monitoring systems].
Heydenreich, F; Jürgens, C; Tost, F
2009-09-01
Data security must be considered seriously in the context of telemedical home monitoring because of the transmission and communication of patients' personal data. The contract governing medical treatment allows the ophthalmologist to process all data relevant to treatment. In Germany the legal framework for this purpose is provided by the Data Protection Act, various German hospital acts, and codes of medical professional conduct. In principle, these rules apply to telemedical home monitoring as well as to common physician-patient relationships. The patient must be informed extensively in an understandable manner and must give his or her written consent. However, the advanced options of new IT technologies demand the development of technical and organizational concepts that guarantee compliance with legal and regulatory affairs, assure data security, and prevent data abuse.
DOT National Transportation Integrated Search
2002-01-01
This primer was written for transportation professionals and public safety officials from cities, counties, and States who are responsible for day-to-day management and operations within a metropolitan region. It is intended to help agencies and orga...
12 CFR 563b.150 - What must I include in my application for conversion?
Code of Federal Regulations, 2010 CFR
2010-01-01
... legal opinion indicating that any marketing materials comply with all applicable securities laws. (4) An..., attorney, investment banker, appraiser, or other professional who prepared, reviewed, passed upon, or... requests. (b) OTS will not accept for filing, and will return, any application for conversion that is...
Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations
2015-12-01
USBP agent, intelligence ( BPA -I), information sharing, capability gap analysis process (CGAP), Tucson Sector Red Team 15. NUMBER OF PAGES 109 16...27 2. BPA -I .............................................................................................28 3. BPA -I Requirements...71 APPENDIX A. PROFESSIONAL INTELLIGENCE ASSOCIATIONS— ADDITIONAL OPPORTUNITIES FOR BPA -IS
34 CFR 668.46 - Institutional security policies and crime statistics.
Code of Federal Regulations, 2014 CFR
2014-07-01
... recognized by that religious order or denomination as someone who provides confidential counseling, and is... whose official responsibilities include providing mental health counseling to members of the institution... professional counselors, if and when they deem it appropriate, to inform the persons they are counseling of any...
34 CFR 668.46 - Institutional security policies and crime statistics.
Code of Federal Regulations, 2012 CFR
2012-07-01
... recognized by that religious order or denomination as someone who provides confidential counseling, and is... whose official responsibilities include providing mental health counseling to members of the institution... professional counselors, if and when they deem it appropriate, to inform the persons they are counseling of any...
34 CFR 668.46 - Institutional security policies and crime statistics.
Code of Federal Regulations, 2013 CFR
2013-07-01
... recognized by that religious order or denomination as someone who provides confidential counseling, and is... whose official responsibilities include providing mental health counseling to members of the institution... professional counselors, if and when they deem it appropriate, to inform the persons they are counseling of any...
Is Media Literacy Passive or Active?
ERIC Educational Resources Information Center
Brooks, Zachary S.
2010-01-01
The ability to "read" and "write", i.e. literacy, was once considered a trade secret by the professional scribes who depended on it for job security. The ability to read and write is still the most commonly understood notion of literacy, but technological developments require that the definition of literacy be expanded and…
26 CFR 1.248-1 - Election to amortize organizational expenditures.
Code of Federal Regulations, 2013 CFR
2013-04-01
... meetings, terms of original stock certificates, and the like; necessary accounting services; expenses of... stock or other securities, such as commissions, professional fees, and printing costs. This is so even... organizational expenditure is a change in method of accounting to which sections 446 and 481(a) apply if the...
26 CFR 1.248-1 - Election to amortize organizational expenditures.
Code of Federal Regulations, 2014 CFR
2014-04-01
... meetings, terms of original stock certificates, and the like; necessary accounting services; expenses of... stock or other securities, such as commissions, professional fees, and printing costs. This is so even... organizational expenditure is a change in method of accounting to which sections 446 and 481(a) apply if the...
26 CFR 1.248-1 - Election to amortize organizational expenditures.
Code of Federal Regulations, 2012 CFR
2012-04-01
... meetings, terms of original stock certificates, and the like; necessary accounting services; expenses of... stock or other securities, such as commissions, professional fees, and printing costs. This is so even... organizational expenditure is a change in method of accounting to which sections 446 and 481(a) apply if the...
Widening the Tenure Track: A University Offers Some Instructors an Unusual Level of Job Security.
ERIC Educational Resources Information Center
Fogg, Piper
2003-01-01
Describes a program at Western Michigan University that offers full-time, nontenure-track employees the opportunity to earn tenure, providing new tenure rights to instructors who teach in certain professional fields. Describes opposition to the program and reactions of those affected. (SLD)
2014-06-13
experience with partner departments; and 3) acculturation of all partners through immersion in these interagency partner developments.” Also in the...military student to create an acculturation process in which both the DOD and non-DOD personnel gain an understanding of the processes and cultures of
2016-06-01
Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) N /A...Minister Yulia Tymoshenko and former professional boxer Vitali Klitschko, who managed to become the Mayor of Kyiv and who had a wide following in
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-10
...., Digital Management Group, Mercury Air Group, Inc., Greenwood, and Professional Maintenance of Charleston... Solutions, Becht Engineering, Engineering Support Systems, Manufacturing Management Services, US Securities, WB Wells, Belcan, American Engineers, CH2M Hill Engineers, Inc., Digital Management Group, Mercury...
Small Community Training & Education
training and adult education professionals. Â National Technical Information Service (NTIS) This U.S residents of New Jersey and beyond through education and public service. Â Operator Training Committee of Water Wastewater Training Security Conservation & Water Efficiency Water for All Americans Water We
The High School Writing Center: Establishing and Maintaining One.
ERIC Educational Resources Information Center
Farrell, Pamela B., Ed.
Focusing on high school writing centers, this collection of essays discusses a variety of issues associated with the writing center, including the process of securing the principal's support, setting goals, working out physical arrangements, training tutors and professional staff, fostering student participation, and record keeping. Essays and…
From SRI to ESG: The Changing World of Responsible Investing
ERIC Educational Resources Information Center
Caplan, Lauren; Griswold, John S.; Jarvis, William F.
2013-01-01
Thoughtful investment professionals continue to debate whether a portfolio's long-term performance can be enhanced by including environmental, social, and governance (ESG) considerations in the security selection process, but responsible investing is more than a passing trend. The terms socially-responsible investing, mission-related investing,…