Information Sharing for IT Security Professionals
ERIC Educational Resources Information Center
Petersen, Rodney J.
2008-01-01
Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their long history of collaboration and openness. Information sharing has become part of the national fabric as IT security professionals attempt to secure cyber…
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
Quality and security - They work together
NASA Technical Reports Server (NTRS)
Carr, Richard; Tynan, Marie; Davis, Russell
1991-01-01
This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.
Measuring Human Performance within Computer Security Incident Response Teams
DOE Office of Scientific and Technical Information (OSTI.GOV)
McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel
Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less
Data Privacy and Security in Higher Education
ERIC Educational Resources Information Center
Williams, Tracy
2003-01-01
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Transportation Security Institute : recruiting next generation professionals.
DOT National Transportation Integrated Search
2013-08-01
The Center for Transportation Training and Research (CTTR), as part of Texas Southern University : (TSU), served as host for the 2013 Transportation Security Institute (TSI) in Houston and : surrounding area. The 2013 Houston TSI focuses on the missi...
Transportation Security Institute: recruiting next generation professionals.
DOT National Transportation Integrated Search
2012-08-01
"The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...
Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel
2014-04-01
The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.
Money, Status and Composition: Assumptions Underlying the Crisis of Part-Time Instruction.
ERIC Educational Resources Information Center
Staples, Katherine
Part-time instructors make up an increasingly large percentage of college faculty. In English departments, part-time instructors take on the least prestigious and most demanding work--the teaching of writing--for low wages and without job security or professional recognition. This unfair treatment stems from the belief that the study and teaching…
NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2014-02-01
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.
ERIC Educational Resources Information Center
Rosow, Jerome M.; Zager, Robert
This volume, Interim Report No. 3 in a 3-year study, considers literacy programs designed to qualify employees for promotions or professional advancement. It adopts a multidimensional definition of moving ahead, one that extends to monetary rewards, career development, and employment security. The volume is divided into two parts: report and case…
Salloch, Sabine
2018-06-05
Dual Use Research of Concern (DURC) constitutes a major challenge for research practice and oversight on the local, national and international level. The situation in Germany is shaped by two partly competing suggestions of how to regulate security-related research: The German Ethics Council, as an independent political advisory body, recommended a series of measures, including national legislation on DURC. Competing with that, the German National Academy of Sciences and the German Research Foundation, as two major professional bodies, presented a strategy which draws on the self-control of science and, inter alia, suggests expanding the scope of research ethics committees (RECs) to an evaluation of DURC. This situation is taken as an occasion to further discuss the scope and limits of professional self-control with respect to security-related research. The role of RECs as professional bodies of science is particularly analyzed, referring to the theoretical backgrounds of professionalism. Two key sociological features of professionalism - ethical orientation and professional self-control - are discussed with respect to the practice of biomedical science. Both attributes are then analyzed with respect to the assessment of DURC by RECs. In conclusion, it is stated that issues of biosecurity transcend the boundaries of the scientific community and that a more comprehensive strategy should be implemented encompassing both professional self-control and legal oversight.
Student Experiential Opportunities in National Security Careers
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less
Bendtsen, Preben; Anderson, Peter; Wojnar, Marcin; Newbury-Birch, Dorothy; Müssener, Ulrika; Colom, Joan; Karlsson, Nadine; Brzózka, Krzysztof; Spak, Fredrik; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Okulicz-Kozaryn, Katarzyna; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Palacio, Jorge; Baena, Begoña; Slodownik, Luiza; van Steenkiste, Ben; Wolstenholme, Amy; Wallace, Paul; Keurhorst, Myrna N; Laurant, Miranda G H; Gual, Antoni
2015-07-01
To determine the relation between existing levels of alcohol screening and brief intervention rates in five European jurisdictions and role security and therapeutic commitment by the participating primary healthcare professionals. Health care professionals consisting of, 409 GPs, 282 nurses and 55 other staff including psychologists, social workers and nurse aids from 120 primary health care centres participated in a cross-sectional 4-week survey. The participants registered all screening and brief intervention activities as part of their normal routine. The participants also completed the Shortened Alcohol and Alcohol Problems Perception Questionnaire (SAAPPQ), which measure role security and therapeutic commitment. The only significant but small relationship was found between role security and screening rate in a multilevel logistic regression analysis adjusted for occupation of the provider, number of eligible patients and the random effects of jurisdictions and primary health care units (PHCU). No significant relationship was found between role security and brief intervention rate nor between therapeutic commitment and screening rate/brief intervention rate. The proportion of patients screened varied across jurisdictions between 2 and 10%. The findings show that the studied factors (role security and therapeutic commitment) are not of great importance for alcohol screening and BI rates. Given the fact that screening and brief intervention implementation rate has not changed much in the last decade in spite of increased policy emphasis, training initiatives and more research being published, this raises a question about what else is needed to enhance implementation. © The Author 2015. Medical Council on Alcohol and Oxford University Press. All rights reserved.
6 CFR 9.15 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.15 Section 9.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Own Employees § 9.15 Professional and technical services. (a) The prohibition on the...
6 CFR 9.23 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.23 Section 9.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Other than Own Employees § 9.23 Professional and technical services. (a) The...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
ERIC Educational Resources Information Center
Johnson, Kenneth T.
2017-01-01
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L
2018-03-01
While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Nazi, Kim M
2013-04-04
Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals' accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings.
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
NASA Astrophysics Data System (ADS)
Fleischmann, Kenneth R.
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
Mayers, Pat; Alperstein, Melanie; Duncan, Madeleine; Olckers, Lorna; Gibbs, Trevor
2006-03-01
Multi-professional education has traditionally aimed to develop health professionals who are able to collaborate effectively in comprehensive healthcare delivery. The respective professions learn about their differences in order to work together, rather than developing unity in their commitment to a shared vision of professionalism and service. In this, the second of two papers, the 'nuts and bolts' or practicalities of designing a transformed curriculum for a multi-professional course with a difference is described. Guidelines for the curriculum design process, which seeks to be innovative, grounded in theory and relevant to the learning of the students and the ultimately the health of the patients, include: valuing education; gaining buy-in; securing buy-out; defining of roles; seeking consensus; negotiating difference and expediting decisions. The phases of the design process are described, as well as the educational outcomes envisaged during the process. Reflections of the designers, in particular on what it means to be a multi-professional team, and a reconceptualization of multi-professional education are presented as challenges for educators of health professionals.
Code of Federal Regulations, 2011 CFR
2011-07-01
... attorneys in chapter 7 and chapter 11, but may be used by all professionals as appropriate. Asset Analysis... motions; analyses, objections and allowances of claims. Employee Benefits/Pensions: Review issues such as...: Matters under §§ 361, 363 and 364 including cash collateral and secured claims; loan document analysis...
Code of Federal Regulations, 2013 CFR
2013-07-01
... attorneys in chapter 7 and chapter 11, but may be used by all professionals as appropriate. Asset Analysis... motions; analyses, objections and allowances of claims. Employee Benefits/Pensions: Review issues such as...: Matters under §§ 361, 363 and 364 including cash collateral and secured claims; loan document analysis...
Code of Federal Regulations, 2014 CFR
2014-07-01
... attorneys in chapter 7 and chapter 11, but may be used by all professionals as appropriate. Asset Analysis... motions; analyses, objections and allowances of claims. Employee Benefits/Pensions: Review issues such as...: Matters under §§ 361, 363 and 364 including cash collateral and secured claims; loan document analysis...
Code of Federal Regulations, 2012 CFR
2012-07-01
... attorneys in chapter 7 and chapter 11, but may be used by all professionals as appropriate. Asset Analysis... motions; analyses, objections and allowances of claims. Employee Benefits/Pensions: Review issues such as...: Matters under §§ 361, 363 and 364 including cash collateral and secured claims; loan document analysis...
ERIC Educational Resources Information Center
Forbes, Joan, Ed.; Watson, Cate, Ed.
2011-01-01
Can we imagine different ways of working together to secure better outcomes for children and families? What are the complex issues that underlie the apparently simple call for "joined-up" services? Children's services in many countries around the world are being transformed as part of the call for "joined-up working for joined-up…
Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model
ERIC Educational Resources Information Center
Kassa, Woldeloul
2016-01-01
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
Ways to Improve DoD 8570 IY Security Certification
ERIC Educational Resources Information Center
Bates, Justin D.
2017-01-01
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
Conducted electrical weapons within healthcare: a comprehensive use of force model.
Ho, Jeffrey D; Williams, Martin F; Coplen, Michael J
2014-01-01
Healthcare settings are experiencing increased amounts of violent activity that are challenging to the health care security profession. There is difficulty in addressing this issue completely. Some of this difficulty is because of factors that include inexperienced and untrained clinicians and administrators that are often the decision-makers in the health care setting. As part of an effective solution, we propose that a security plan, including a comprehensive use of force program incorporating conducted electrical weapons, is a necessary and best-practice goal. This paper outlines the background of the problem and discusses the challenges we encountered in reaching this goal as well as the benefits we have discovered along the way. This paper will be beneficial to any healthcare security professional that is interested in enhancing or improving their current health care security use of force model to further counter the increasing violent activity in their respective healthcare setting.
Implementing AORN recommended practices for a safe environment of care, part II.
Kennedy, Lynne
2014-09-01
Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.
[The 20th century legal framework regarding risk at work and occupational health in Colombia].
Arango-Soler, Juan M; Luna-García, Jairo E; Correa-Moreno, Yerson A; Campos, Adriana C
2013-01-01
Analyzing the 20th century Colombian legal framework from the point of view of labor law, social security and public health for identifying concepts regarding occupational health and professional risk and trying to establish convergence and differences between such foci and whether they fulfilled a complementary view. This work involved documentary research by means of thematic categorical analysis of the laws and statutes promulgated in 20th century Colombia, considering the main element or entity which should have regulated that related to professional risk or occupational health. The development of the 20th century Colombian legal framework regarding health at work was periodized, revealing the predominance of a view of social law focused on protecting dependent workers' work-related risks, as part of a tendency extending to the Colombian Sistema General de Riesgos Laborales. The proposed stages used for organizing the legal framework concerning social security regarding professional risk and occupational health facilitated some important elements being recognized concerning the social, legal and institutional context from which workers' health laws emerged. Tension was noted concerning statutes orientated towards redress and compensation regarding accidents at work and legislation emphasizing prevention.
Systems Engineering: From Dream to Reality
2011-04-01
at the 23rd Systems and Software Technology Conference (SSTC), 16-19 May 2011, Salt Lake City, UT. Sponsored in part by the USAF. U.S. Government or...Simulation, and Enterprise Security. Prior to this, he was Senior Research Scientist and Principal Member of the Technical Staff at AEgis Technologies ...Software Professional Development Program at AFIT He was a consultant for . the Software Technology Support Center for six years. Dr. Cook has a
Practice improvement, part II: update on patient communication technologies.
Roett, Michelle A; Coleman, Mary Thoesen
2013-11-01
Patient portals (ie, secure web-based services for patient health record access) and secure messaging to health care professionals are gaining popularity slowly. Advantages of web portals include timely communication and instruction, access to appointments and other services, and high patient satisfaction. Limitations include inappropriate use, security considerations, organizational costs, and exclusion of patients who are uncomfortable with or unable to use computers. Attention to the organization's strategic plan and office policies, patient and staff expectations, workflow and communication integration, training, marketing, and enrollment can facilitate optimal use of this technology. Other communication technologies that can enhance patient care include automated voice or text reminders and brief electronic communications. Social media provide another method of patient outreach, but privacy and access are concerns. Incorporating telehealthcare (health care provided via telephone or Internet), providing health coaching, and using interactive health communication applications can improve patient knowledge and clinical outcomes and provide social support. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.
NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2013-03-01
The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff. Furthermore, it is necessary to further train their existing employees in the practical applications of mobile forensics owing to the fact that a lot of companies are trusted with very sensitive data. Inspired by these facts, this paper - a continuation of a paper of January 2012 [1] which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses training approaches and practical exercises to investigate Android mobile devices.
Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio
2015-08-01
The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.
2013-07-01
This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.
Between security and military identities: The case of Israeli security experts.
Grassiani, Erella
2018-02-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.
Between security and military identities: The case of Israeli security experts
Grassiani, Erella
2018-01-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228
2013-12-01
the liberal international relations theory from the political and philosophical theories of John Locke, Adam Smith, John Stuart Mill, and Immanuel... theory and usefulness of such global diplomacy and the practice of police exchanges with many different countries throughout the world is the Los Angeles...by Jon Hall . In the article, Hall notes, the art of persuasion was a major part of the ancients educational system and the ancients understood that
Role of the U.S. Military in the Professionalization of the Armed Forces of Liberia
2015-06-12
professionalizing the AFL. The GEF states, “Partner nations provide for their own security, contribute effectively to broader regional or global security...facilitates the development of important professional and personal relationships that effectively strengthen military alliances and the international...Forces of Liberia (AFL) presents a developing opportunity to contribute to the broader U.S. interests. However, in order to ensure stability within
Commitment to nursing: results of a qualitative interview study.
Gould, Dinah; Fontenla, Marina
2006-04-01
The aims of the study were to explore opportunities to undergo continuing professional education, family friendly policy and holding an innovative or traditional post on nurses' job satisfaction and professional and organizational commitment. Qualified nurses have become a scare resource in the National Health Service. Managers need to be aware of the work-related factors most likely to secure nurses' professional and organizational commitment which will contribute to the retention. Commitment is thought to be increased if opportunities for continuing professional education are good. Family friendly policy is also important. Less is known about the relationship between type of nursing work and commitment. An in-depth, exploratory approach to data collection were taken, employing an interview guide with open-ended questions. Data were collected with 27 nurses in clinical grades in two contrasting trusts. Family friendly policies emerged as most important in securing nursing commitment. Those in innovative posts whose work entailed social hours and greater professional autonomy also displayed greater levels of job satisfaction. Opportunities for continuing professional education had less influence on professional and organizational commitment. Providing flexible or social working hours appears to be more influential than providing opportunities for continuing professional education in securing nursing commitment in this exploratory study.
Müthing, Jannis; Jäschke, Thomas
2017-01-01
Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271
Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M
2017-10-18
Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.
Frohde, Kenny; Brooks, David J
Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.
Security auditing: a prescription for keeping protection programs healthy.
Luizzo, Anthony
2010-01-01
The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.
2013-01-01
Background Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. Objective The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. Methods In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Results Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals’ accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Conclusions Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings. PMID:23557596
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eipeldauer, Mary D; Shelander Jr, Bruce R
2012-01-01
The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less
Fires, A Joint Professional Bulletin for US Field & Air Defense Artillerymen. July-August 07
2007-08-01
Zafaraniya area of southeast Baghdad in the Karada Security District. (Photo by SSgt Bronco Suzuki, USAF) The Fires staff wishes to thank RCW...not “cut and run.” External Support. The UN was suc- cessful in stabilizing El Salvador after an exceptionally bloody civil war, in large part by...involving neighboring states that were desperate to keep the conflict from spilling over El Salvador’s borders onto their soil. A family in Northern
Dupont, C; Gonnaud, F; Touzet, S; Luciani, F; Perié, M-A; Molenat, F; Evrard, A; Fernandez, M-P; Roy, J; Rudigoz, R-C
2008-11-01
Early prenatal interview has needed the implementation of a new communication tool between follow-up pregnancy professionals: a link sheet filled and carried by patients. To assess the utilization of link sheet by trained professionals, the contribution of the interview and the patient acceptation of the link sheet. Descriptive survey from the database of link sheets returned by professionals to Aurore perinatal network and semi-guided interviews with 100 randomized patients. One thousand one hundred and nineteen link sheets were sent to Aurore perinatal network by 55 professionals out of 78 trained. For primipare, precocious prenatal interview contribution has concerned health care security (60%) and emotional security (56%). For multipare, this contribution has concerned mainly emotional security (80%). No interviewed patient has refused link sheet principle. Link sheet principle, like implemented by Aurore perinatal network, seems pertinent to professionals and patients but it constitutes only one of the elements of network elaboration of personalized care.
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
Ethical Hacking in Information Security Curricula
ERIC Educational Resources Information Center
Trabelsi, Zouheir; McCoey, Margaret
2016-01-01
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pepper, Susan E.
2014-10-10
Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
A Portable Computer Security Workshop
ERIC Educational Resources Information Center
Wagner, Paul J.; Phillips, Andrew T.
2006-01-01
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Video calls from lay bystanders to dispatch centers - risk assessment of information security.
Bolle, Stein R; Hasvold, Per; Henriksen, Eva
2011-09-30
Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
He, Ying; Johnson, Chris
2017-12-01
Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.
Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: no malicious intent.
Jack, Caron; Singh, Yashik; Mars, Maurice
2013-01-01
Information and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the workplace and at home, and whether their current computer practices meets legal and ethical requirements. The aims of this study were to determine the use of computers by healthcare practitioners in the workplace and home; the use and approach to data storage, encryption and security of patient data and patient email; and the use of informed consent to transmit data by email. A self-administered questionnaire was administered to 400 health care providers from the state and private health care sectors. The questionnaire covered computer use in the workplace and at home, sharing of computers, data encryption and storage, email use, encryption of emails and storage, and the use of informed consent for email communication. 193 doctors and 207 nurses in the private and public sectors completed the questionnaire. Forty (10%) of participants do not use a computer. A third of health professionals were the only users of computers at work or at home. One hundred and ninety-eight respondents (55%) did not know if the data on the computers were encrypted, 132 (36.7%) knew that the data were not encrypted and 30 (8.3%) individuals knew that the data on the computers they were using were encrypted. Few doctors, 58 (16%), received emails from patients, with doctors more likely to receive emails from patients than nurses (p = 0.0025). Thirty-one percent of individuals did not respond to the emails. Emails were saved by 40 (69%) recipients but only 5 (12.5%) doctors encrypted the messages, 19 (47.5%) individuals knowingly did not encrypt and 16 (40.0%) did not know if they encrypted the data. While 20% of health professionals have emailed patient data, but only 41.7% gained consent to do so. Most health professionals as sampled in South Africa are not compliant with the National Health Act or the Electronic Communications Transactions Act of South Africa or guidelines from regulatory bodies when managing patient data on computers. Many appear ignorant or lack the ability to comply with simple data security procedures.
Making Technology Work for Campus Security
ERIC Educational Resources Information Center
Floreno, Jeff; Keil, Brad
2010-01-01
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
Women's experiences of social support during the first year following primary breast cancer surgery.
Drageset, Sigrunn; Lindstrøm, Torill Christine; Giske, Tove; Underlid, Kjell
2016-06-01
The aim of this qualitative follow-up study was to describe women's individual experiences of social support during their first year after primary breast cancer surgery. Individual semi-structured interviews with 10 women 1 year after surgery analysed by Kvales' meaning condensation method. Sharing experiences, being understood as an individual, continuity, and information and explanations were themes identified. Sharing mutual experiences increased the women's knowledge regarding cancer, increased experience of support and minimised rumination. After 1 year, the women felt that the network around them had 'normalised' and was less supportive. Being seen as a person, not as 'a diagnosis being treated', and continuity of professional support were important, giving feelings of security and trust. The women felt uncertainty after loss of professional support post-treatment. Information and explanations regarding treatment and treatment-related problems were essential. Mutual sharing of experiences is an important part of social support. Continuity, availability, information and respect were essential aspects of experienced professional support. © 2015 Nordic College of Caring Science.
ERIC Educational Resources Information Center
Kyslenko, Dmytro
2017-01-01
The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…
NASA Astrophysics Data System (ADS)
Belanger, James Durham
Since the formation of the Transportation Security Administration (TSA) following the September 11, 2001 terrorist's attacks few studies involving commercial flight crewmember perceptions' of the organization's efficacy have been conducted, nor has there been any research into the effects on crewmember morale and professionalism resulting from their interactions with the TSA. This researcher surveyed 624 flight crewmembers, using a multiple-choice instrument to ascertain both their perceptions of TSA effectiveness involving an array of security issues, in addition to how crewmember interactions with the TSA may have affected their morale and professionalism. A 2-sample t-test measured the difference in the means of pilots and flight attendants regarding the study's scope, as did 2-way ANOVA and Tukey HSD comparisons, which factored in gender. The study found that crewmembers indicated some confidence in the areas of passenger and baggage screening and the Armed Pilot Program, with less confidence regarding ancillary personnel screening, airport perimeter security, and in both crewmember anti-terrorist training and human error issues. Statistical testing indicated varying differences in sample means concerning all study related issues. Finally, crewmembers indicated some effects on morale and professionalism, with a majority indicating a negative effect on both.
Francis, Karen L; Mills, Jane E
2011-01-01
Nurses and midwives represent the largest group of health professionals in the Australian health care system. In rural environments nurses and midwives make up a greater proportion of the health workforce than in urban settings, which makes their role in service provision even more significant. The role and scope of these nurses and midwives' practice is by necessity more generalist than specialist, which results in disciplinary strengths and weaknesses. As generalist health professionals they work in diverse settings such as public hospitals, multi-purpose services, community health, aged care and in non-government and private for profit and no-profit organisations including general practices. Their scope of practice covers prevention, intervention and rehabilitation and is lifespan inclusive. Rural nurses and midwives are older than their metropolitan based counterparts, work part-time and traditionally have limited access to professional development often due to ineffective locum relief programs. Workplace inflexibility, access to acceptable housing and partner employment are factors cited as inhibitors to growing this workforces. The future of the rural nursing and midwifery workforce will only be secured if Government invests to a greater degree in both education and training and the development of a nationally agreed remuneration scale that allows for part-time work.
Medical device integration using mobile telecommunications infrastructure.
Moorman, Bridget A; Cockle, Richard A
2013-01-01
Financial pressures, an aging population, and a rising number of patients with chronic diseases, have encouraged the use of remote monitoring technologies. This usually entails at least one physiological parameter measurement for a clinician. Mobile telecommunication technologies lend themselves to this functionality, and in some cases, avoid some of the issues encountered with device integration. Moreover, the inherent characteristics of the mobile telecommunications infrastructure allow a coupling of business and clinical functions that were not possible before. Table I compares and contrasts some key aspect of device integration in and out of a healthcare facility. An HTM professional may be part of the team that acquires and/or manages a system using a mobile telecommunications technology. It is important for HTM professionals to ensure the data is in a standard format so that the interfaces across this system don't become brittle and break easily if one part changes. Moreover, the security and safety considerations of the system and the data should be a primary consideration in and y purchase, with attention given to the proper environmental and encryption mechanisms. Clinical engineers and other HTM professionals are unique in that they understand the patient/clinician/device interface and the need to ensure its safety and effectiveness regardless of geographical environment.
A Unified Approach to Information Security Compliance
ERIC Educational Resources Information Center
Adler, M. Peter
2006-01-01
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Rep. Platts, Todd Russell [R-PA-19
2010-07-01
House - 07/23/2010 Referred to the Subcommittee on Military Personnel. (All Actions) Notes: For further action, see H.R.5116, which became Public Law 111-358 on 1/4/2011. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
7 CFR 1940.336 - Contracting for professional services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 13 2010-01-01 2009-01-01 true Contracting for professional services. 1940.336... Contracting for professional services. (a) Assistance from outside experts and professionals can be secured... conflict of interest, contractors competing for the work will be required to execute a disclosure statement...
Evolving the Role of Campus Security
ERIC Educational Resources Information Center
May, Vern
2008-01-01
One of the problems security professionals see in security is that there are few benchmarks to quantify the effectiveness of proactive security initiatives. This hurts them with funding support and also with ensuring community buy-in outside of crisis situations. The reactive nature of many institutions makes it difficult to move forward with…
Exploring the Educational Needs of the Homeland Security Community
ERIC Educational Resources Information Center
France, Paul
2012-01-01
This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…
Petersson, Pia; Blomqvist, Kerstin
2011-03-01
The aim of this study was to make sense of the Swedish concept 'trygghet' by using stories from daily life in a Participatory Action Research project. In Sweden, attempts to implement core values to ensure high quality health and social care for older people are given high priority and concepts such as security and dignity are often used. As concepts are abstract they are difficult to transform into practical work. One group of six assistant nurses and one group of five Registered Nurses working in a municipality participated in Story Dialogue Method and four older women were interviewed. 'Trygghet' was found to be an internal sense - an intrinsic state based on faith and trust in oneself and others called Sense of security. External factors that strengthened Sense of security were to be part of a community, to recognize and be familiar with things and situations and to use various kinds of aids. A prerequisite for the professionals being able to support the care receivers adequately is that they have a sense of security themselves, and that they are allowed to operate in a system that facilitates for the care receivers to maintain trustworthy and reliable relations over time. © 2010 Blackwell Publishing Ltd.
Analysis of health professional security behaviors in a real clinical setting: an empirical study.
Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis
2015-06-01
The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
The power of survivor advocacy: making car trunks escapable
McLoughlin, E.; Fennell, J.
2000-01-01
Survivor advocates are powerful workers for injury prevention. Some of the major prevention successes have been due in large part to their efforts. This case history examines the four year campaign to prevent entrapment in car trunks (or boot) through the routine installation of interior trunk releases. It traces how a life altering event began a cluster of activities leading to product redesign and regulation to prevent injury. The following elements were key: data and the lack thereof, identification of possible solutions, newsworthy tragedies and media advocacy, politics and sympathetic lawmakers, an agency with regulatory authority, manufacturers, and trade associations. Survivors can assist the injury field because the personal and the professional complement each other in advocacy. Public health professionals can assist survivor advocates by sharing research, data and organizational skills, and by helping to secure grants. PMID:11003178
The power of survivor advocacy: making car trunks escapable.
McLoughlin, E; Fennell, J
2000-09-01
Survivor advocates are powerful workers for injury prevention. Some of the major prevention successes have been due in large part to their efforts. This case history examines the four year campaign to prevent entrapment in car trunks (or boot) through the routine installation of interior trunk releases. It traces how a life altering event began a cluster of activities leading to product redesign and regulation to prevent injury. The following elements were key: data and the lack thereof, identification of possible solutions, newsworthy tragedies and media advocacy, politics and sympathetic lawmakers, an agency with regulatory authority, manufacturers, and trade associations. Survivors can assist the injury field because the personal and the professional complement each other in advocacy. Public health professionals can assist survivor advocates by sharing research, data and organizational skills, and by helping to secure grants.
Implementing an electronic medication overview in Belgium.
Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree
2014-12-16
An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.
Guidelines for Working with Law Enforcement Agencies
ERIC Educational Resources Information Center
Corn, Michael
2007-01-01
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises
ERIC Educational Resources Information Center
Shah, Ashish
2017-01-01
Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729
ERIC Educational Resources Information Center
Nerland, Monika; Karseth, Berit
2015-01-01
This paper examines how professional associations engage themselves in efforts to develop, regulate and secure knowledge in their respective domains, with special emphasis on standardisation. The general emphasis on science in society brings renewed attention to the knowledge base of professionals, and positions professional bodies as key…
Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte
2013-01-01
Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS.
An Innovative Model for Professional Development
ERIC Educational Resources Information Center
McMurray, Sharon; O'Neill, Susan; Thompson, Ross
2016-01-01
This paper considers an innovative model of continuing professional development in addressing the needs of children with literacy difficulties, namely the Special Educational Needs Continuing Professional Development Literacy Project. Stranmillis University College, in partnership with St Mary's University College, Belfast secured £4.06 million…
New security and privacy laws require basic changes in professional practice
NASA Astrophysics Data System (ADS)
Sykes, David M.
2005-09-01
Everybody knows about HIPAA-but what about GLBA? FIPA? The Patriot Act? Homeland Security? NCLB? FCRA? CASB1? PIPEDA? All of these are recent laws that impact acoustical design. Throw in the American Hospital Association/ASHE and AIA's about-to-be-released ``Guidelines for the Design of Healthcare Facilities'' as well as the redrafting of DCID 6/9 and it looks like time for careful examination of some professional practices relating to security and privacy. Should INCE members join with and endorse the ASA's recently formed Joint TCAA/TCN Subcommittee which aims to fill a policy vacuum in Washington and Ottawa relating to the fundamental protection of citizens' rights to privacy? This group will formulate consistent guidelines to enable federal and state agencies in the US and Canada to enforce and monitor their laws-will their guidelines affect INCE members? Those who advise or give expert testimony to government agencies, defense/security organizations, courts, and large institutions in financial services, healthcare or education likely find themselves in a rapidly shifting landscape and recognize the need to respond with new research and professional practices.
Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut
2017-01-01
The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.
Clinical prioritisations of healthcare for the aged--professional roles.
Nortvedt, P; Pedersen, R; Grøthe, K H; Nordhaug, M; Kirkevold, M; Slettebø, A; Brinchmann, B S; Andersen, B
2008-05-01
Although fair distribution of healthcare services for older patients is an important challenge, qualitative research exploring clinicians' considerations in clinical prioritisation within this field is scarce. To explore how clinicians understand their professional role in clinical prioritisations in healthcare services for old patients. A semi-structured interview-guide was employed to interview 45 clinicians working with older patients. The interviews were analysed qualitatively using hermeneutical content analysis. 20 physicians and 25 nurses working in public hospitals and nursing homes in different parts of Norway. The clinicians struggle with not being able to attend to the comprehensive needs of older patients, and being unfaithful to professional ideals and expectations. There is a tendency towards lowering the standards and narrowing the role of the clinician. This is done in order to secure the vital needs of the patient, but is at the expense of good practice and holistic role modelling. Increased specialisation, advances and increase in medical interventions, economical incentives, organisational structures, and biomedical paradigms, may all contribute to a narrowing of the clinicians' role. Distributing healthcare services in a fair way is generally not described as integral to the clinicians' role in clinical prioritisations. If considerations of justice are not included in clinicians' role, it is likely that others will shape major parts of their roles and responsibilities in clinical prioritisations. Fair distribution of healthcare services for older patients is possible only if clinicians accept responsibility in these questions.
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2014 CFR
2014-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2010 CFR
2010-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2013 CFR
2013-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2012 CFR
2012-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
32 CFR 806b.44 - Personal information that requires protection.
Code of Federal Regulations, 2011 CFR
2011-07-01
... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...
Ifediora, Chris Onyebuchi
2017-04-01
The after-hours house call (AHHC) services in Australia has gained huge popularity in recent years, but it is not clear how well supported the involved doctors feel regarding the clinical, professional and security aspects of their work. It is important that this knowledge gap is filled given that appropriate support helps engender quality in health service delivery. This is a questionnaire-based electronic survey involving a sample frame of all 300 doctors participating in AHHC through the National Home Doctor Service. National Home Doctor Service is Australia's largest AHHC service provider. A total of 168 valid responses (56.0%) were received. Overall, the mean support levels were mild to moderate, ranging from 2.4 to 2.8 out of 4.0 for all three parameters. Specifically, 65.3% of the respondents felt well-supported on clinical issues, 64.7% on professional issues and 43.2% on security issues. Australian-trained doctors were less likely to feel well supported on all aspects [Clinical: odds ratio (OR) 0.38, confidence interval (CI) 0.16 to 0.90; Professional: OR 0.30, CI 0.13 to 0.72; and Security: OR 0.22; CI 0.09 to 0.53] compared with overseas-trained ones. Unsurprisingly, doctors who adopted protective measures felt significantly better supported regarding security (OR 2.75; CI 1.31 to 5.78). There is room for improvement regarding support on AHHC in Australia, and concerned Surgeries should ensure that where available these supports are appropriately utilized. © 2016 John Wiley & Sons, Ltd.
Biggs, Adam T; Mitroff, Stephen R
2015-11-01
Professional visual searches, such as those conducted by airport security personnel, often demand highly accurate performance. As many factors can hinder accuracy, it is critical to understand the potential influences. Here, we examined how explicit decision-making criteria might affect multiple-target search performance. Non-professional searchers (college undergraduates) and professional searchers (airport security officers) classified trials as 'safe' or 'dangerous', in one of two conditions. Those in the 'one = dangerous' condition classified trials as dangerous if they found one or two targets, and those in the 'one = safe' condition only classified trials as dangerous if they found two targets. The data suggest an important role of context that may be mediated by experience; non-professional searchers were more likely to miss a second target in the one = dangerous condition (i.e., when finding a second found target did not change the classification), whereas professional searchers were more likely to miss a second in the one = safe condition. © 2014 The British Psychological Society.
Watson, David
2016-08-01
In England and Wales, the Approved Mental Health Professional (AMHP) has final responsibility for applying under the Mental Health Act 1983 to admit an individual compulsorily and convey them to psychiatric hospital. The AMHP role is challenging and legally accountable and unique to the UK context. To analyse the motivation of individuals to become AMHPs, and identify factors which may affect motivation. Semi-structured interviews were conducted with 12 AMHPs from local authorities across Southern England. Ten participants were social workers, one was qualified as both a nurse and social worker, and one was a mental health nurse. Participants identify career progression and professional development as significant as well as the status and independence of the role and enhanced job security. Social work participants value the Mental Health Act assessment as a contained piece of work, with a high degree of professional discretion. AMHPs are motivated by an increase in professional status and job security, but also exercising independent judgment and authority in a time-limited intervention is emotionally and professionally rewarding.
2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)
2011-08-25
Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3
Mobile Device Security: Perspectives of Future Healthcare Workers
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992
Mobile Device Security: Perspectives of Future Healthcare Workers.
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
, exciting, entertaining, and useful for maintaining relationships. Professionally, people can use social HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of world. CENTCOM Personnel are reminded to use common sense when using social media. What are social media
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-28
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... on May 5, 2010, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed.... Specifically, the Exchange proposes to adopt a $0.18 per contract execution fee for ``professional customers...
A National Partnership for Careers in Public Safety and Security
ERIC Educational Resources Information Center
Coffee, Joseph
2007-01-01
A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…
Information Security in Higher Education. Professional Paper Series, #5.
ERIC Educational Resources Information Center
Elliott, Raymond; And Others
Intended to generate discussion and motivate proactive intervention in matters of information security, this paper defines and discusses some of the key issues relating to information security on college and university campuses based on in-depth interviews conducted at eight selected higher education institutions of varying size and composition in…
Harvey Cushing and some Australian connections: Part 2--post World War 1.
Roxanas, M G
2010-03-01
Part 1 of this article (see Vol 17, pp. 168-172) described the early life of Harvey Cushing and his encounters with Australian doctors, mostly in various military hospitals, in France, in World War 1. As none of the doctors he met at that time became neurosurgeons, and hence did not shape their professional development. When World War 1 ended, HC returned to a heavy schedule of operating at the Peter Bent Brigham Hospital and to his university obligations. He received the Companion of the Bath from the British Government for his war services and wrote the history of US Base Hospital No. 5, which he directed during the War. Cushing's reputation as a neurosurgeon was now secure and he was ready to play an even greater part as an academic neurosurgeon, teaching students from all parts of the world and continuing his researches into cerebral tumours and the pituitary gland. Copyright 2009 Elsevier Ltd. All rights reserved.
2011-10-01
said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most
49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 7 2014-10-01 2014-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...
49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 7 2012-10-01 2012-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...
49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 7 2011-10-01 2011-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...
49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 7 2013-10-01 2013-10-01 false Secure Printing Processes and Other Secure Processes A Appendix A to Part 580 Transportation Other Regulations Relating to Transportation (Continued... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-21
... Professionals'' May 15, 2012. I. Introduction On March 20, 2012, the Fixed Income Clearing Corporation (``FICC... Members and NYPC Clearing Members for certain ``market professionals.'' \\6\\ \\5\\ See Securities Exchange... professional'' cross-margining program aims to closely replicate the Options Clearing Corporation (``OCC...
Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte
2013-01-01
Introduction: Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). Method and materials: The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. Results: The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Discussion: Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS. PMID:23687464
Storing and using health data in a virtual private cloud.
Regola, Nathan; Chawla, Nitesh V
2013-03-13
Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical methods to the data and will also enable a wide variety of new applications that will be meaningful to patients and medical professionals. Researchers are often granted access to health care data to assist in the data mining process, but HIPAA regulations mandate comprehensive safeguards to protect the data. Often universities (and presumably other research organizations) have an enterprise information technology infrastructure and a research infrastructure. Unfortunately, both of these infrastructures are generally not appropriate for sensitive research data such as HIPAA, as they require special accommodations on the part of the enterprise information technology (or increased security on the part of the research computing environment). Cloud computing, which is a concept that allows organizations to build complex infrastructures on leased resources, is rapidly evolving to the point that it is possible to build sophisticated network architectures with advanced security capabilities. We present a prototype infrastructure in Amazon's Virtual Private Cloud to allow researchers and practitioners to utilize the data in a HIPAA-compliant environment.
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
Teaching Information Security with Workflow Technology--A Case Study Approach
ERIC Educational Resources Information Center
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang
2014-01-01
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Protecting the Privacy and Security of Your Health Information
... Access to Medical Records Privacy, Security, and HIPAA Laws, Regulation, and Policy Scientific Initiatives Standards & Technology Usability ... care providers and professionals, and the government. Federal laws require many of the key persons and organizations ...
Role of Outsourcing in Stress and Job Satisfaction of Information Technology Professionals
ERIC Educational Resources Information Center
Robinson, Janell R.
2016-01-01
Information technology (IT) outsourcing poses a potential job loss threat to IT professionals, which can decrease job security, job satisfaction, and organizational commitment. The problem that this study addressed was the perceived role of IT outsourcing in the job stress, job dissatisfaction, and turnover intention of IT professionals. The…
Beyond Performativity: A Pragmatic Model of Teacher Professional Learning
ERIC Educational Resources Information Center
Lloyd, Margaret; Davis, James P.
2018-01-01
The intent and content of teacher professional learning has changed in recent times to meet the demands of performativity. In this article, we offer and demonstrate a pragmatic way to map teacher professional learning that both meets current demands and secures a place for teacher-led catalytic learning. To achieve this, we position identified…
Redefining Professional Knowledge in Athletic Training: Whose Knowledge Is It Anyway?
ERIC Educational Resources Information Center
McKeon, Patrick O.; Medina McKeon, Jennifer M.; Geisler, Paul R.
2017-01-01
Context: As athletic training continues to evolve as a profession, several epistemological considerations must be considered. These include how we generate professional knowledge and how we secure and legitimize it in both professional and public spheres. Objective: The purpose of this commentary is to provide an overview of how athletic training…
Promoting Inter-Professional Teamwork and Learning--The Case of a Surgical Operating Theatre
ERIC Educational Resources Information Center
Collin, Kaija; Paloniemi, Susanna; Mecklin, Jukka-Pekka
2010-01-01
Hospitals, and surgical operating theatres (OTs) in particular, are environments in which inter-professional teamwork and learning are essential to secure patient safety and effective practice. However, it has been revealed in many studies that inter-professional collaborative work in hospital organisations faces many challenges and constraints.…
Social Security for Composers and Free Lances.
ERIC Educational Resources Information Center
Rossel-Majdan, Karl
1982-01-01
Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)
Lightfoote, Johnson B; Fielding, Julia R; Deville, Curtiland; Gunderman, Richard B; Morgan, Gail N; Pandharipande, Pari V; Duerinckx, Andre J; Wynn, Raymond B; Macura, Katarzyna J
2014-08-01
The ACR Commission for Women and General Diversity is committed to identifying barriers to a diverse physician workforce in radiology and radiation oncology (RRO), and to offering policy recommendations to overcome these barriers. Part 2 of a 2-part position article from the commission addresses issues regarding diversity and inclusion in the context of career choices and professional advancement. Barriers to improving diversity and representation in RRO are reviewed. Discussion focuses on the development and implementation of concrete strategies designed to eliminate the current subspecialty disparity and highlights the need for the ACR to introduce programs and incentives with targeted and achievable goals with measurable outcomes. Recommendations are made aimed at fostering an environment of inclusion and diversity, so as to secure a successful future for all members of the RRO workforce. The future of radiology will be enhanced by increasing diversity and representation in the professional workforce, which will allow us to better address the varied needs of increasingly diverse patient populations, and to mitigate disparities in healthcare access, delivery, and outcomes. By leveraging diverse backgrounds, experiences, and skills of those in RRO, we will create new, effective ways to not only educate our trainees, medical colleagues, and patients but also improve delivery of health care and our service to society. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of Dental Professional(s) B Appendix B to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF..., App. B Appendix B to Part 5—Criteria for Designation of Areas Having Shortages of Dental Professional... designated as having a shortage of dental professional(s) if both the following criteria are met: (a) The...
Code of Federal Regulations, 2012 CFR
2012-10-01
... of Dental Professional(s) B Appendix B to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF..., App. B Appendix B to Part 5—Criteria for Designation of Areas Having Shortages of Dental Professional... designated as having a shortage of dental professional(s) if both the following criteria are met: (a) The...
Code of Federal Regulations, 2010 CFR
2010-10-01
... of Dental Professional(s) B Appendix B to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF..., App. B Appendix B to Part 5—Criteria for Designation of Areas Having Shortages of Dental Professional... designated as having a shortage of dental professional(s) if both the following criteria are met: (a) The...
Code of Federal Regulations, 2014 CFR
2014-10-01
... of Dental Professional(s) B Appendix B to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF..., App. B Appendix B to Part 5—Criteria for Designation of Areas Having Shortages of Dental Professional... designated as having a shortage of dental professional(s) if both the following criteria are met: (a) The...
Code of Federal Regulations, 2011 CFR
2011-10-01
... of Dental Professional(s) B Appendix B to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF..., App. B Appendix B to Part 5—Criteria for Designation of Areas Having Shortages of Dental Professional... designated as having a shortage of dental professional(s) if both the following criteria are met: (a) The...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
... Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... Terms of Substance of the Proposed Rule Change The Exchange proposes to adopt ISE Rule 212 (Sales Value... supervision and regulation of the securities markets and securities professionals. To offset this obligation...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61426; File No. SR-Phlx-2010-05] Self... Professional Orders January 26, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934... PHLX, Inc. (``Phlx'' or ``Exchange'') filed with the Securities and Exchange Commission (``SEC'' or...
2008 Stability, Security, Transition and Reconstruction Operations Conference
2008-09-04
Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV
Biggs, Adam T; Mitroff, Stephen R
2014-01-01
Visual search, locating target items among distractors, underlies daily activities ranging from critical tasks (e.g., looking for dangerous objects during security screening) to commonplace ones (e.g., finding your friends in a crowded bar). Both professional and nonprofessional individuals conduct visual searches, and the present investigation is aimed at understanding how they perform similarly and differently. We administered a multiple-target visual search task to both professional (airport security officers) and nonprofessional participants (members of the Duke University community) to determine how search abilities differ between these populations and what factors might predict accuracy. There were minimal overall accuracy differences, although the professionals were generally slower to respond. However, the factors that predicted accuracy varied drastically between groups; variability in search consistency-how similarly an individual searched from trial to trial in terms of speed-best explained accuracy for professional searchers (more consistent professionals were more accurate), whereas search speed-how long an individual took to complete a search when no targets were present-best explained accuracy for nonprofessional searchers (slower nonprofessionals were more accurate). These findings suggest that professional searchers may utilize different search strategies from those of nonprofessionals, and that search consistency, in particular, may provide a valuable tool for enhancing professional search accuracy.
O'Neill, G; Masson, S; Bewick, L; Doyle, J; McGovern, R; Stoker, E; Wright, H; Newbury-Birch, D
2016-01-01
The National Institute for Health Care and Excellence recommend that alcohol screening and brief intervention (ASBI) should be routinely implemented in secondary care. This study used theoretical frameworks to understand how health professionals can be supported to adapt their behaviour and clinical practice. Staff training and support was conducted using theoretical frameworks. A 12-week study, delivering ASBI was carried out as part of routine practice in an endoscopy day-unit. Anonymised patient data were collected using the Alcohol Use Disorders Identification Tool (AUDIT) and whether patients received a brief intervention. Staff completed the Shortened Alcohol and Alcohol Problems Perceptions Questionnaire at three time points and took part in a focus group both pre and post study. For staff, levels or role adequacy, role legitimacy, motivation to discuss alcohol, security in their role, job satisfaction and commitment to working with patients who drink increased during the time of the study. 1598 individual patients were seen in the department in the timeframe. Of these, 1180 patients were approached (74%); 18% (n=207) of patients were AUDIT positive. This study has shown that it is possible to reach a high number of patients in a busy hospital out-patient department and deliver ASBI by working with staff using theoretical frameworks for training. Embedding evidence-based public health interventions into routine clinical environments is complex. The social system in which professionals operate requires consideration alongside individual professionals' real and perceived barriers and facilitators to change.
Dutch virtual integration of healthcare information.
de Graaf, J C; Vlug, A E; van Boven, G J
2007-01-01
As information technology creates opportunities for cooperation which crosses the boundaries between healthcare institutions, it will become an integral part of the Dutch healthcare system. Along with many involved organizations in healthcare the National IT Institute for Healthcare in the Netherlands (NICTIZ) is working on the realization of a national IT infrastructure for healthcare and a national electronic patient record (EPR). An underlying national architecture is designed to enable the Dutch EPR virtually, not in a national database, nor on a patient's smartcard. The required secure infrastructure provides generic functions for healthcare applications: patient identification, authentication and authorization of healthcare professionals. The first national applications in the EPR program using a national index of where patient data is stored, are the electronic medication record and the electronic record for after hours GP services. The rollout of the electronic medication record and electronic record for after hours GP services has been started in 2007. To guarantee progress of electronic data exchange in healthcare in the Netherlands we have primarily opted for two healthcare applications: the electronic medication record and the electronic record for after hours GP services. The use of a national switch-point containing the registry of where to find what information, guarantees that the professional receives the most recent information and omits large databases to contain downloaded data. Proper authorization, authentication as well as tracing by the national switchpoint also ensures a secure environment for the communication of delicate information.
Usage of insecure E-mail services among researchers with different scientific background.
Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago
2011-08-01
Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.
Effectiveness of the Civil Aviation Security Program.
1981-11-09
which have been prevented or deterred by airline and airport security procedures cannot be determined with certainty. The Federal Aviation Administration...finalized and issued. The new FAR Part 108, Air Carrier Security and complementary changes to FAR Part 107, Airport Security , and FAR Part 129, Operations...initiated audit of the claims and, if verified, action will be taken to seek funding for payment. Airport Security . Airport security measures continue to be
Food security practice in Kansas schools and health care facilities.
Yoon, Eunju; Shanklin, Carol W
2007-02-01
This pilot study investigated perceived importance and frequency of specific preventive measures, and food and nutrition professionals' and foodservice directors' willingness to develop a food defense management plan. A mail questionnaire was developed based on the US Department of Agriculture document, Biosecurity Checklist for School Foodservice Programs--Developing a Biosecurity Management Plan. The survey was sent to food and nutrition professionals and foodservice operators in 151 acute care hospitals, 181 long-term-care facilities, and 450 school foodservice operations. Chemical use and storage was perceived as the most important practice to protect an operation and was the practice implemented most frequently. Results of the study indicate training programs on food security are needed to increase food and nutrition professionals' motivation to implement preventive measures.
Defining the Role of the Professional Security Consultant.
ERIC Educational Resources Information Center
Webster, Jim
2002-01-01
Discusses the skill set that should be available in security consultants to higher education, including the ability to work with mechanical, architectural, electrical, landscaping, and telecommunications systems. Addresses the need to bring consultants into the building design phase. (EV)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-04
... Professionals'' March 29, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1... positions held by GSD Netting Members and NYPC Clearing Members for certain ``market professionals.'' \\5\\ \\4...\\ The NYPC-FICC ``market professional'' cross-margining program aims to closely replicate the Options...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... assessable professional reported or required to be reported by a municipal advisor to the MSRB on Form A-11... Assessment and Form A-11- Interim. For purposes of the interim assessment, an assessable professional of a...-Interim as an assessable professional any associated person (i) Who otherwise qualifies as an assessable...
2016-09-01
League (EPL), football, mass gatherings, National Football League (NFL), safety manuals, soccer , sports security, soccer , terrorism, terrorist...fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL...kurtbadenhausen/2015/07/15/the-worlds-50-most-valuable-sports- teams-2015/. 3 professional league, the English Premier soccer league, earns $2.7 billion.6 In
Code of Federal Regulations, 2011 CFR
2011-10-01
... of Veterinary Professional(s) G Appendix G to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS DESIGNATION OF HEALTH PROFESSIONAL(S) SHORTAGE AREAS Pt. 5, App. G Appendix G to Part 5—Criteria for Designation of Areas Having Shortages of Veterinary...
One health security: an important component of the global health security agenda.
Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle
2014-01-01
The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.
Lanièce, C; Sow, K; Desclaux, A
2016-10-01
Security agents are on the front line when patients arrive at health facilities, giving them a potential role to play in an Ebola virus disease (EVD) outbreak. The position of security agents within health services is poorly documented. A survey was conducted to clarify their understanding of Ebola pathology, to assess their need for information and to determine their role in patient management. The survey included both qualitative and quantitative aspects. 80 security agents of the Fann teaching hospital (Dakar) completed questionnaires, and 11 were interviewed. Qualitative analysis was performed with Dedoose and the quantitative analysis using Excel. The results show that security agents' activities go beyond their mission of security and control. They are involved in informing, orienting and assisting patients and those accompanying them in the hospital. The security agents have basic knowledge of EVD, but overestimate the risk of transmission. They want to be more informed and to have access to protective material. These results suggest that these professionals should be taken into account when developing response strategies to Ebola outbreaks. Their knowledge of and protection against the disease must be strengthened. Non-health professionals working in health facilities should be trained in order to be able to relay information to the public.
12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...
12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...
A university-state-corporation partnership for providing correctional mental health services.
Appelbaum, Kenneth L; Manning, Thomas D; Noonan, John D
2002-02-01
In September 1998 the University of Massachusetts Medical School, in partnership with a private vendor of correctional health care, began providing mental health services and other services to the Massachusetts Department of Correction. The experience with this partnership demonstrates that the involvement of a medical school with a correctional system has advantages for both. The correctional program benefits from enhanced quality of services, assistance with the recruitment and retention of skilled professionals, and expansion of training and continuing education programs. The medical school benefits by building its revenue base while providing a needed public service and through opportunities to extend its research and training activities. Successful collaboration requires that the medical school have an appreciation of security needs, a sensitivity to fiscal issues, and a readiness to work with inmates who have severe mental disorders and disruptive behavior. Correctional administrators, for their part, must support adequate treatment resources and must collaborate in the resolution of tensions between security and health care needs.
20 CFR 401.25 - Terms defined.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...
20 CFR 401.25 - Terms defined.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...
MacDonald, Kai; Sciolla, Andrés F; Folsom, David; Bazzo, David; Searles, Chris; Moutier, Christine; Thomas, Michael L; Borton, Katherine; Norcross, Bill
2015-01-01
The assessment and remediation of boundary-challenged health care professionals is enhanced through examination of individual risk factors. We assessed three such factors - attachment style, childhood trauma and maladaptive beliefs - in 100 attendees (mostly physicians) of a continuing medical education (CME) professional boundaries course. We propose a theoretical model that draws a causal arc from childhood maltreatment through insecure attachment and maladaptive beliefs to elevated risk for boundary violations. We administered the Experiences in Close Relationships Questionnaire Revised (ECR-R), Childhood Trauma Questionnaire (CTQ) and Young Schema Questionnaire (YSQ) to 100 health care professionals attending a CME course on professional boundaries. Experts rated participant autobiographies to determine attachment style and early adversities. Correlations and relationships between self-ratings and expert ratings and among different risk factors were examined. One fifth of participants reported moderate to severe childhood abuse; sixty percent reported moderate to severe emotional neglect. Despite this, average attachment anxiety and attachment avoidance were low, and more than half of participants were rated "secure" by experts. Childhood maltreatment was correlated with attachment anxiety and avoidance and predicted expert-rated insecure attachment and maladaptive beliefs. Our findings support a potential link between childhood adversity and boundary difficulties, partly mediated by insecure attachment and early maladaptive beliefs. Furthermore, these results suggest that boundary education programs and professional wellness programs may be enhanced with a focus on sequelae of childhood maltreatment, attachment and common maladaptive thinking patterns. Copyright © 2015 Elsevier Inc. All rights reserved.
The Role Of Moral Awareness In Computer Security
NASA Astrophysics Data System (ADS)
Stawinski, Arthur
1984-08-01
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011
2011-01-01
the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional
1988-03-01
Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy
Predicting Airport Screening Officers' Visual Search Competency With a Rapid Assessment.
Mitroff, Stephen R; Ericson, Justin M; Sharpe, Benjamin
2018-03-01
Objective The study's objective was to assess a new personnel selection and assessment tool for aviation security screeners. A mobile app was modified to create a tool, and the question was whether it could predict professional screeners' on-job performance. Background A variety of professions (airport security, radiology, the military, etc.) rely on visual search performance-being able to detect targets. Given the importance of such professions, it is necessary to maximize performance, and one means to do so is to select individuals who excel at visual search. A critical question is whether it is possible to predict search competency within a professional search environment. Method Professional searchers from the USA Transportation Security Administration (TSA) completed a rapid assessment on a tablet-based X-ray simulator (XRAY Screener, derived from the mobile technology app Airport Scanner; Kedlin Company). The assessment contained 72 trials that were simulated X-ray images of bags. Participants searched for prohibited items and tapped on them with their finger. Results Performance on the assessment significantly related to on-job performance measures for the TSA officers such that those who were better XRAY Screener performers were both more accurate and faster at the actual airport checkpoint. Conclusion XRAY Screener successfully predicted on-job performance for professional aviation security officers. While questions remain about the underlying cognitive mechanisms, this quick assessment was found to significantly predict on-job success for a task that relies on visual search performance. Application It may be possible to quickly assess an individual's visual search competency, which could help organizations select new hires and assess their current workforce.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-13
... Professional,\\9\\ Firm and Market Maker \\10\\ orders that remove liquidity from the BATS Options order book. The Exchange proposes to raise the fee to $0.44 per contract for Professional, Firm and Market Maker orders... ``Professional'' means any person or entity that (i) is not a broker or dealer in securities, and (ii) places...
Davoren, Mary; Byrne, Orla; O'Connell, Paul; O'Neill, Helen; O'Reilly, Ken; Kennedy, Harry G
2015-11-23
Patients admitted to a secure forensic hospital are at risk of a long hospital stay. Forensic hospital beds are a scarce and expensive resource and ability to identify the factors predicting length of stay at time of admission would be beneficial. The DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale are designed to assess need for therapeutic security and urgency of that need while the HCR-20 predicts risk of violence. We hypothesized that items on the DUNDRUM-1 and DUNDRUM-2 scales, rated at the time of pre-admission assessment, would predict length of stay in a medium secure forensic hospital setting. This is a prospective study. All admissions to a medium secure forensic hospital setting were collated over a 54 month period (n = 279) and followed up for a total of 66 months. Each patient was rated using the DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale as part of a pre-admission assessment (n = 279) and HCR-20 within 2 weeks of admission (n = 187). Episodes of harm to self, harm to others and episodes of seclusion whilst an in-patient were collated. Date of discharge was noted for each individual. Diagnosis at the time of pre-admission assessment (adjustment disorder v other diagnosis), predicted legal status (sentenced v mental health order) and items on the DUNDRUM-1 triage security scale and the DUNDRUM-2 triage urgency scale, also rated at the time of pre-admission assessment, predicted length of stay in the forensic hospital setting. Need for seclusion following admission also predicted length of stay. These findings may form the basis for a structured professional judgment instrument, rated prior to or at time of admission, to assist in estimating length of stay for forensic patients. Such a tool would be useful to clinicians, service planners and commissioners given the high cost of secure psychiatric care.
49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false Secure Printing Processes and Other Secure... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure... printing—a printing process utilized in the production of bank-notes and other security documents whereby...
Code of Federal Regulations, 2010 CFR
2010-10-01
... of Vision Care Professional(s) D Appendix D to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT... Pt. 5, App. D Appendix D to Part 5—Criteria for Designation of Areas Having Shortages of Vision Care... of vision care professional(s) if the following three criteria are met: 1. The area is a rational...
Code of Federal Regulations, 2011 CFR
2011-10-01
... of Vision Care Professional(s) D Appendix D to Part 5 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT... Pt. 5, App. D Appendix D to Part 5—Criteria for Designation of Areas Having Shortages of Vision Care... of vision care professional(s) if the following three criteria are met: 1. The area is a rational...
Opening a new office: the dentist's personal frontier.
Crafton, B Casey; Lofft, Alexander H
2006-01-01
The purpose of this article is to assist the dental practitioner by providing insight into commercial real estate and a framework for identifying and securing new office space, as well as by addressing concerns about the physical space of a dental practice. In the process of identifying and securing new office space, the dental practitioner can maximize efficiency and minimize risk by assembling a team of professionals to assist him or her. This team should be composed of an accountant and an attorney, as well as a dental equipment/design specialist and a commercial real estate professional. The professional team will provide invaluable assistance to the dentist, enabling him or her to avoid major financial, legal, logistic and real estate-related pitfalls inherent in establishing or moving a dental practice.
32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Personnel Security Determination Authorities E Appendix E to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. E Appendix E to Part 154—Personnel...
Investigating the Relationship between Need for Cognition and Skill in Ethical Hackers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Le Blanc, Katya; Freeman, Sarah
As technology gets more complex and increasingly connected, there is an increasing concern with cyber security. There is also a growing demand for cyber security professionals. Unfortunately there currently are not enough skilled professionals to meet that demand. In order to prepare the next generation of cyber security professionals to meet this demand, we need to understand what characteristics make skilled cyber security professionals. For this work, we focus on professionals who take an offensive approach to cyber security, so called ethical hackers. These hackers utilize many of the same skills that the adversaries that we defend against would use,more » with the goal of identifying vulnerabilities and address them before they are exploited by adversaries. A commonly held belief among ethical hackers is that hackers must possess exceptional curiosity and problem solving skills in order to be successful. Curiosity is has been studied extensively in psychology, but there is no consensus on what it is and how to measure it. Further, many existing inventories for assessing curiosity are targeted at measuring curiosity in children. Although there isn’t an accepted standard to assess curiosity in adults, a related construct, called Need for Cognition (may capture what is meant when people speak of curiosity. The Need for Cognition scale also captures the tendency toward preferring complex problems (which correlates with good problem solving skills), which may provide insight into what make skilled hackers. In addition to the Need for Cognition, we used a structured interview to assess hacker skill. Hackers rated their own skill on a scale from one to ten on a predefined list of hacker skills. They were then asked to rate a peer who they felt was most skilled in each of the skills. They were asked to rate two peers for each skill, one that they worked with directly and one person that was the most skilled in the field (these could be known by reputation only). The hypothesis is that hackers have a higher than average (i.e., compared to non-hackers) Need for cognition and that Need for Cognition will be positively correlated with self-reported and peer reported skill. We interviewed 20 cyber security researchers who specialize in offensive approaches. Based on the responses to the hacker skill inventory, we generated a self-reported skill score for each participant. We also developed a peer-rating for each participant based on the number of times each individual that was interviewed was named as the most skilled in a particular area. The results indicate that the sample of ethical hackers has a high Need for Cognition and that Need for cognition was related to both self-reported skill and peer-reported skill. The results are discussed in the context of training and recruitment of cyber security professionals.« less
Storing and Using Health Data in a Virtual Private Cloud
Regola, Nathan
2013-01-01
Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical methods to the data and will also enable a wide variety of new applications that will be meaningful to patients and medical professionals. Researchers are often granted access to health care data to assist in the data mining process, but HIPAA regulations mandate comprehensive safeguards to protect the data. Often universities (and presumably other research organizations) have an enterprise information technology infrastructure and a research infrastructure. Unfortunately, both of these infrastructures are generally not appropriate for sensitive research data such as HIPAA, as they require special accommodations on the part of the enterprise information technology (or increased security on the part of the research computing environment). Cloud computing, which is a concept that allows organizations to build complex infrastructures on leased resources, is rapidly evolving to the point that it is possible to build sophisticated network architectures with advanced security capabilities. We present a prototype infrastructure in Amazon’s Virtual Private Cloud to allow researchers and practitioners to utilize the data in a HIPAA-compliant environment. PMID:23485880
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2014 CFR
2014-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2013 CFR
2013-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
1988-12-01
medical services, professional mobility , job security, and education. These were among the "human rights" on which the socialist system was said to be...economic reform is to mean anything, job uncertainty will supersede full employment. Professional mobility , once an important safety valve against worker
77 FR 31851 - Privacy Act System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-30
... identification, U.S. visa number, FCC point of contact, visitor signature, professional title, organizational... pertinent records, or to another public authority or professional organization, if necessary to obtain... secured by limited access card readers. The computer servers themselves are password-protected. Access to...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2014 CFR
2014-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
12 CFR 19.243 - Removal, suspension, or debarment.
Code of Federal Regulations, 2012 CFR
2012-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...
77 FR 61659 - Proposed Information Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-10
... professional education programs and the renewal of the enrollment status for those individuals admitted... years. For additional information on renewals, see Circular 230 or visit the Office of Professional... Accounting Method for Dealers in Securities. OMB Number: 1545-1558. Revenue Procedure Number: Revenue...
12 CFR 308.602 - Removal, suspension, or debarment.
Code of Federal Regulations, 2011 CFR
2011-01-01
... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...
12 CFR 263.402 - Removal, suspension, or debarment.
Code of Federal Regulations, 2013 CFR
2013-01-01
... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...
Professional Development Needs as Perceived by Minnesota Industrial Arts/Technology Teachers.
ERIC Educational Resources Information Center
Johnson, Scott D.; Summers, Keith
1984-01-01
Describes a profile of professional development needs that was developed through a survey of 150 industrial arts/technology teachers in Minnesota. The greatest need was in the area of job environment: salary, job security, facilities and equipment, and discipline. (SK)
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
33 CFR 137.25 - Qualifications of the environmental professional.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...
MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security
2007-01-01
technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region
Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine
ERIC Educational Resources Information Center
Bystrova, Bogdana
2017-01-01
At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…
ERIC Educational Resources Information Center
Moran, Matthew; Hobbs, Christopher
2018-01-01
In recent years, nuclear security has gained prominence on the international security agenda. Driven by post 9/11 anxieties and the politicization of fears regarding nuclear terrorism, concerns in this area have spawned a wealth of initiatives, which seek to counter this threat. Principal among these have been efforts to promote nuclear security…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... information concerning associated persons. The proposed rule change was published for comment in the Federal...
1996-01-01
The American Nurses Association (ANA) is committed to safeguarding the public, protecting and advancing the careers of professional nurses, supporting individual and collective efforts by registered nurses to protect their clients and enhancing the professional development and job security of registered nurses. As the nation's health care system is restructured, ANA is actively engaged in initiatives to strengthen the economic and general welfare of registered nurses, the safety and care for the public, and, in partnership with the state nurses associations (SNAs), oppose efforts to replace registered nurses with inappropriate substitutes.
19 CFR Appendix D to Part 113 - Importer Security Filing Bond
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Importer Security Filing Bond D Appendix D to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. D Appendix D to Part 113—Importer Security Filing Bond This...
33 CFR 137.35 - Inquiries by an environmental professional.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...
33 CFR 137.35 - Inquiries by an environmental professional.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...
Professional Development: Catalyst for Change?
ERIC Educational Resources Information Center
Niederhauser, Dale; Wessling, Sarah
2011-01-01
Difficulty securing adequate professional development (PD) has long been a barrier to the effective implementation of educational technology. Concerns about the dearth of PD for helping teachers integrate technology into their instructional practices raised nearly 25 years ago appear to still hold true despite repeated calls for increased…
Professional Development Seen as Employment Capital
ERIC Educational Resources Information Center
Mackay, Margaret
2017-01-01
Practitioners need to invest in professional development to enhance credibility, job security and employment prospects. Employer expectations of continuing development as a performance measure link to the notion of career capital; namely that knowledge competence influences job advancement. This study uses an interpretivist approach to explore…
Flying Solo: Librarian, Manage Thyself.
ERIC Educational Resources Information Center
Siess, Judith A.
1999-01-01
Discusses solo librarians, or one-person librarians, and the benefits and disadvantages of being the only professional in a library. Topics include independence, variety, enhanced feelings of self-worth, professional isolation, lack of clerical support, lack of job security, low pay, and a list of pertinent resources. (LRW)
The strategic security officer.
Hodges, Charles
2014-01-01
This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.
Pakistan and Water: New Pressures on Global Security and Human Health
2011-01-01
The Indus River is the major source of water for the more than 180 million people of Pakistan. A rapidly increasing population over the past 60 years has created new pressures on water that was once a plentiful resource for the health and development of the country. Rising tensions between India and Pakistan, which share the Indus flow, may lead to violent confrontation in an already volatile part of the globe. The recent flooding, which affected more than 20 million people, drew attention to poor management of the rivers of Pakistan. Public health has the scientific knowledge and professional capacity to help develop water management practices that could improve population health in Pakistan. PMID:21421956
33 CFR 120.100 - Does this part apply to me?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...
33 CFR 120.100 - Does this part apply to me?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...
33 CFR 120.100 - Does this part apply to me?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...
33 CFR 120.100 - Does this part apply to me?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...
31 CFR 344.0 - What does this part cover?
Code of Federal Regulations, 2014 CFR
2014-07-01
... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...
31 CFR 344.0 - What does this part cover?
Code of Federal Regulations, 2011 CFR
2011-07-01
... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...
31 CFR 344.0 - What does this part cover?
Code of Federal Regulations, 2013 CFR
2013-07-01
... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...
31 CFR 344.0 - What does this part cover?
Code of Federal Regulations, 2010 CFR
2010-07-01
... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...
6 CFR Appendix A to Part 21 - Activities to Which This Part Applies
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...
6 CFR Appendix A to Part 21 - Activities to Which This Part Applies
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...
6 CFR Appendix A to Part 21 - Activities to Which This Part Applies
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...
6 CFR Appendix A to Part 21 - Activities to Which This Part Applies
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...
6 CFR Appendix A to Part 21 - Activities to Which This Part Applies
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...
Training in the Post-Terrorism Era.
ERIC Educational Resources Information Center
Caudron, Shari
2002-01-01
A survey of training professionals revealed how the terrorist attacks of September 11, 2001 changed employee attitudes toward training. Decreased travel, increased use of distance technologies, development of security and evacuation plans, and emphasis on such topics as diversity, stress management, and security are some of the changes. (JOW)
Former Nonproliferation Graduate Fellow Served at U.S. Mission
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brim, Cornelia P.
2014-10-01
Because of her training and professional experiences, Rosalyn Leitch, a Security Specialist at Pacific Northwest National Laboratory and former Nonproliferation Graduate Fellow with NIS (2012-2013) was able to transition into temporary assignment as UNVIE Acting Nuclear Security Attaché from November 2013 through February 2014.
2012-05-22
publication of the Security Cooperation Guidance ( SCG ), 32 U.S. Joint Chiefs of Staff, Joint Operation...format and content of the plans themselves. 2 The 2003 release of the classified SCG , which replaced TEPs with TSCPs, rendered CJCSM 3113.01 obsolete...interests while providing the SecDef increased visibility on and control over security cooperation activities, but the SCG was not as explicit in its
High-end Home Firewalls CIAC-2326
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W
Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managersmore » have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Price, Managing Director, Securities Industry and Financial Markets Association, dated October 4, 2012... other industry professionals will have difficulty pricing options during Limit States and Straddle... conditions have changed and (ii) gaming the obvious error rule to retroactively adjust market maker quotes by...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the SEC...
Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC.
Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... those who meet the Professional definition have certain technological and informational advantages over... Chapter I, Section I (Definitions). See also Securities Exchange Act Release Nos. 63028 (October 1, 2010... Professionals have the same technological and informational advantages as broker-dealers trading for their own...
Professional Challenges in School Counseling: Organizational, Institutional and Political
ERIC Educational Resources Information Center
Hatch, Trish A.
2008-01-01
The school counseling profession has struggled throughout history to secure a legitimate integral position in the educational mission of school. The profession is more likely to gain acceptance and be seen as a legitimate profession if we understand three theories that form the foundation of professional legitimacy: Organizational Theory,…
20 CFR 438.205 - Professional and technical services.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...
20 CFR 438.205 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...
78 FR 44459 - Designation of Health Professional(s) Shortage Areas
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-24
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service 42 CFR Part 5 Designation of Health Professional(s) Shortage Areas CFR Correction 0 In Title 42 of the Code of Federal Regulations, Parts 1 to 399... the phrase ``as having a mental health professional(s)'', insert the word ``shortage'' before the...
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
6 CFR 27.320 - Prohibition on ex parte communications during proceedings.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Prohibition on ex parte communications during proceedings. 27.320 Section 27.320 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.320 Prohibition on ex parte...
6 CFR 27.320 - Prohibition on ex parte communications during proceedings.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Prohibition on ex parte communications during proceedings. 27.320 Section 27.320 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.320 Prohibition on ex parte...
6 CFR 27.320 - Prohibition on ex parte communications during proceedings.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Prohibition on ex parte communications during proceedings. 27.320 Section 27.320 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.320 Prohibition on ex parte...
6 CFR 27.320 - Prohibition on ex parte communications during proceedings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prohibition on ex parte communications during proceedings. 27.320 Section 27.320 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.320 Prohibition on ex parte...
6 CFR 27.320 - Prohibition on ex parte communications during proceedings.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Prohibition on ex parte communications during proceedings. 27.320 Section 27.320 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.320 Prohibition on ex parte...
6 CFR Appendix A to Part 9 - Certification Regarding Lobbying
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Certification Regarding Lobbying A Appendix A to Part 9 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Pt. 9, App. A Appendix A to Part 9—Certification Regarding Lobbying Certification for Contracts...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... Activities; Proposed Information Collection; Comment Request; Securities Exchange Act Disclosure Rules (12 CFR Part 11) and Securities of Federal Savings Associations (12 CFR Part 194) AGENCY: Office of the... concerning its information collection titled, ``Securities Exchange Act Disclosure Rules (12 CFR part 11) and...
Caveats of smartphone applications for the cardiothoracic trainee.
Edlin, Joy C E; Deshpande, Ranjit P
2013-12-01
The clinical environment is becoming increasingly dominated by information technology, most recently the smartphone with its applications (apps) of a multitude of uses. There are already tens of thousands of medical apps available for download, to educate both patients and trainees, and many more are being designed to facilitate delivery of care. The rapid development of this technology has outgrown its quality evaluation and regulation, both urgently required to maintain patient safety, protect sensitive data, and ensure dissemination of accurate information. We review medical apps themed towards cardiothoracic surgery in terms of medical professional involvement in their content and design. iTunes and Play Store were searched for cardiothoracic surgery-themed medical apps, using the terms cardiothoracic, thoracic, cardiac, heart, lung, surgery, and variations thereof and including the term medical. A focused search yielded 379 apps, of which 6% were associated with a named medical professional, 15% with a publisher or professional society, and 63% with a user rating. The findings suggest inadequate input from the medical profession. The article discusses the pressing issues regarding quality evaluation, regulation, and information security, required for smartphones and handheld devices to become an integral and safe part of delivery of care. Copyright © 2013 The American Association for Thoracic Surgery. Published by Mosby, Inc. All rights reserved.
Seger, Wolfgang; Nüchtern, Elisabeth
2015-07-01
Medical experts who practice social medicine have a strong ethical approach for their professional positions. Their reports must reflect an objective, independent, high-quality assessment of interactions between health status and the disability of individuals. However, they must simultaneously consider the societal involvement of these individuals when determining the framework of the Statutory Health Insurance and Social Security Systems. Their task is to recommend sociomedical benefits that are tailored to suit personal needs and that respect the individual life situations of the persons involved, thus complementing the efforts of healthcare professionals in clinical settings. The editorial describes the self-conception of this medical specialty on behalf of the German Society of Social Medicine and Prevention (DGSMP). Policy makers in social insurances and social security systems generally must respect independent sociomedical recommendations as a crucial point for further realistic development activities.
The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.
Busdicker, Mike; Upendra, Priyanka
2017-09-02
This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.
Professional convergence in forensic practice.
Mercer, D; Mason, T; Richman, J
2001-06-01
This paper outlines the development and convergence of forensic science and secure psychiatric services in the UK, locating the professionalization of forensic nursing within a complex web of political, economic, and ideological structures. It is suggested that a stagnation of the therapeutic enterprise in high and medium security provision has witnessed an intrusion of medical power into the societal body. Expanding technologies of control and surveillance are discussed in relation to the move from modernity to postmodernity and the ongoing dynamic of medicalized offending. Four aspects of globalization are identified as impacting upon the organization and application of forensic practice: (i) organized capitalism and the exhaustion of the welfare state; (ii) security versus danger and trust versus risk; (iii) science as a meta-language; and (iv) foreclosure as a mechanism of censorship. Finally, as a challenge for the profession, some predictions are offered about the future directions or demise of forensic nursing.
12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...
Campbell, Robert J; Durigon, Louis
2003-01-01
Increasingly, health care professionals will need to retrieve, store, share, and send data using several types of wireless devices. These devices include personal digital assistants, laptops, Web tablets, cell phones, and clothing that monitor heart rate and blood pressure. Regardless of the device, several standards will vie for the right to provide the wireless communications link between the health care professional and the wired data resources located within a health care organization. This article identifies the top three technologies in the wireless communications field: Wireless Fidelity (WiFi), Mobile Communications, and Bluetooth; breaks down each according to its strengths and weaknesses; and makes recommendations for their use by health care professionals located inside and outside a health care facility. Where appropriate the discussion includes an explication of how a specific technology can be made secure from hackers and other security breeches.
Database Systems and Oracle: Experiences and Lessons Learned
ERIC Educational Resources Information Center
Dunn, Deborah
2005-01-01
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals
NASA Astrophysics Data System (ADS)
Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.
Schneider, Daniele; Signorelli, Marcos Claudio; Pereira, Pedro Paulo Gomes
2017-09-01
This study aimed to promote visibility of women working in public security along the Parana coast, articulating issues of gender, violence(s), and the health-disease process. The methodology was qualitative, through an ethnographic research which included 50 women (civilians, military policewomen, and prison officers) from municipalities along the Parana coast, between March 2014 and March 2015. Results revealed: 1) the dilemmas that these women are subjected to, facing the seasonal dynamics in the field of public security in the region; 2) exposure to violence (mainly institutional and gender-based) and its impact on these women's health; 3) power relations, marked by corporations' hierarchies and gender asymmetries between men and women in professional settings. In summary, this research highlighted the need to promote visibility of women working in public security institutions, considering the impact of violence and gender inequalities in their personal and professional lives, including the resistance and rearrangements promoted by these women in the institutions in response to their presence in a hegemonic and traditionally male environment.
Johannessen, A
2004-01-01
This is a summary of the Young Water Professionals Seminar involving more than 50 young people from all over the world working with water. The presentations and following discussion were very lively and were about how subsidies and trade barriers imposed by the developed countries are influencing the income-generating capacity of millions of people in the developing world. Even though this is a very complex issue not easily resolved during the seminar it was also clear that there are some fundamental problems that need to be addressed. The importance of looking for solutions at different levels (i.e. local, regional, national) was highlighted as well as the policy of double standards, preaching free trade but only for the benefit of overdeveloped countries themselves. Further it was discussed how to achieve basin security through food security, and managing water for food security. The conclusion was that win-win solutions would be made if agricultural subsidies were to be completely removed.
SocialRAD: an infrastructure for a secure, cooperative, asynchronous teleradiology system.
Figueiredo, João Filho Matos; Motta, Gustavo Henrique Matos Bezerra
2013-01-01
The popularity of teleradiology services has enabled a major advance in the provision of health services to areas with difficult geographical access. However, this potential has also brought with it a number of challenges: the large volume of data, characteristic of imaging tests, and security requirements designed to ensure confidentiality and integrity. Moreover, there is also a number of ethical questions involving the dominant model on the market, whereby this service is outsourced to private companies, and is not directly undertaken by professional radiologists. Therefore, the present paper proposes a cooperative model of teleradiology, where health professionals interact directly with the hospitals providing patient care. This has involved the integration of a wide range of technologies, such as the interconnection models Peer-to-Peer, Cloud Computing, Dynamic DNS, RESTful Web Services, as well as security and interoperability standards, with the aim of promoting a secure, collaborative asynchronous environment. The developed model is currently being used on an experimental basis, providing teleradiology support to cities in the north-eastern hinterland of Brazil, and is fulfilling all expectations.
Bible, J; Emery, R J; Williams, T; Wang, S
2006-11-01
Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.
12 CFR 151.40 - What definitions apply to this part?
Code of Federal Regulations, 2012 CFR
2012-01-01
... CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 151.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool of... a finite time period. Asset-backed security includes any rights or other assets designed to ensure...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
... Market Maker,\\5\\ Firm Proprietary and Customer (Professional) \\6\\ orders; and (ii) $0.78 per contract for Non-ISE Market Maker \\7\\ orders. Priority Customer \\8\\ orders are not charged a ``taker'' fee for... Proprietary and Customer (Professional) orders. Priority Customer orders are not charged a ``maker'' fee for...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
...\\ Market Maker Plus,\\8\\ Firm Proprietary, Customer (Professional),\\9\\ Non-ISE Market Maker,\\10\\ and Priority Customer.\\11\\ The Exchange is proposing to increase certain rebates for certain complex orders, as... determine whether or not they are meeting the Exchange's stated criteria. \\9\\ A Customer (Professional) is a...
ERIC Educational Resources Information Center
Thulth, Ahida Saleem; Sayej, Sumaya
2015-01-01
Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess of selected organizational factors (workload, available recourses and…
Relationship between Innovation and Professional Communication in the "Creative" Economy
ERIC Educational Resources Information Center
Hailey, David; Cox, Matthew; Loader, Emily
2010-01-01
We evaluate 45 jobs professional communicators might occupy. Specifically, we examine the impact of creativity on careers that may become more or less easily outsourced domestically or offshore in the future. We are unable to find any particular relationship between creativity, per se, and job security. Instead, we find that people with knowledge…
Professional Amnesia: A Suitable Case for Treatment
ERIC Educational Resources Information Center
Drummond, Mary Jane
2005-01-01
Early Years educators have always had a particularly secure feel for what lies at the heart of vibrant education, for "a principled understanding of learning." Here Mary Jane Drummond reminds the reader, not only that professional knowledge exists outside ring binders, but that, prior to their emergence, we did know some very important things we…
6 CFR 13.15 - Ex parte contacts.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Ex parte contacts. 13.15 Section 13.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.15 Ex parte contacts. No party or Person (except employees of the ALJ's office) will communicate in any way...
Homeland security challenges in nursing practice.
Boatright, Connie; McGlown, K Joanne
2005-09-01
Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.
Effects of cutbacks on motivating factors among nurses in primary health care.
Halldorsdottir, Sigridur; Einarsdottir, Emilia J; Edvardsson, Ingi Runar
2018-03-01
When financial cuts are made, staff redundancies and reorganisation in the healthcare system often follow. Little is known how such cutbacks affect work motivation of nurses in primary health care. Examine the effects of cutbacks on motivating factors among nurses in primary health care. A phenomenological approach involving a purposeful sample of ten nurses in primary health care. Average age 44. The participants identified the job itself, autonomy, independence, good communication with co-workers, and the potential for professional training, learning and development as the main internal motivational factors related to their work. However, increased stress and uncertainty, growing fatigue and understaffing were starting to have a negative impact on these internal motivational factors. Moreover, reduced opportunities for professional training and development had negative effects on the participants. Many saw these opportunities as a vital part of recognition for their job performance. Regarding external motivation, the factors identified were job security, salaries and rewards, and interaction with management. The participants expressed their interest in more consultation with managers and most preferred an increased flow of information from managers to staff members during cutbacks. Salaries, professional training opportunities and appreciation were rewards named by participants for a job well done. All agreed that salaries are stronger motivational factors than before cutbacks. In the case of cutbacks, nursing managers should increase consultations with staff and make sure that nurses maintain their independence, autonomy, opportunities for professional training as well as appreciation for job well done. © 2017 Nordic College of Caring Science.
Global drivers, sustainable manufacturing and systems ergonomics.
Siemieniuch, C E; Sinclair, M A; Henshaw, M J deC
2015-11-01
This paper briefly explores the expected impact of the 'Global Drivers' (such as population demographics, food security; energy security; community security and safety), and the role of sustainability engineering in mitigating the potential effects of these Global Drivers. The message of the paper is that sustainability requires a significant input from Ergonomics/Human Factors, but the profession needs some expansion in its thinking in order to make this contribution. Creating a future sustainable world in which people experience an acceptable way of life will not happen without a large input from manufacturing industry into all the Global Drivers, both in delivering products that meet sustainability criteria (such as durability, reliability, minimised material requirement and low energy consumption), and in developing sustainable processes to deliver products for sustainability (such as minimum waste, minimum emissions and low energy consumption). Appropriate changes are already being implemented in manufacturing industry, including new business models, new jobs and new skills. Considerable high-level planning around the world is in progress and is bringing about these changes; for example, there is the US 'Advanced Manufacturing National Program' (AMNP)', the German 'Industrie 4.0' plan, the French plan 'la nouvelle France industrielle' and the UK Foresight publications on the 'Future of Manufacturing'. All of these activities recognise the central part that humans will continue to play in the new manufacturing paradigms; however, they do not discuss many of the issues that systems ergonomics professionals acknowledge. This paper discusses a number of these issues, highlighting the need for some new thinking and knowledge capture by systems ergonomics professionals. Among these are ethical issues, job content and skills issues. Towards the end, there is a summary of knowledge extensions considered necessary in order that systems ergonomists can be fully effective in this new environment, together with suggestions for the means to acquire and disseminate the knowledge extensions. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.
The ISACA Business Model for Information Security: An Integrative and Innovative Approach
NASA Astrophysics Data System (ADS)
von Roessing, Rolf
In recent years, information security management has matured into a professional discipline that covers both technical and managerial aspects in an organisational environment. Information security is increasingly dependent on business-driven parameters and interfaces to a variety of organisational units and departments. In contrast, common security models and frameworks have remained largely technical. A review of extant models ranging from [LaBe73] to more recent models shows that technical aspects are covered in great detail, while the managerial aspects of security are often neglected.Likewise, the business view on organisational security is frequently at odds with the demands of information security personnel or information technology management. In practice, senior and executive level management remain comparatively distant from technical requirements. As a result, information security is generally regarded as a cost factor rather than a benefit to the organisation.
Balfe, Myles
2016-12-01
After 9/11/2001 the United States launched a global War on Terror. As part of this War, terrorism suspects were detained by the U.S. military and by the C.I.A. It is now widely recognized that the United States tortured a number of these detainees in the context of its 'enhanced interrogation' programme. This article examines how and why U.S. organizations developed standards that allowed healthcare professionals to become involved in torture; why the standards developed by U.S. security institutions failed to control the actions of enhanced interrogation personnel on the ground; and what the role of standards were in stopping the enhanced interrogation initiative. The article concludes by discussing the general lessons that the enhanced interrogation programme has for social science research on standards, namely that individuals can experience ambivalence when caught between competing organizational and professional standards and that it might be inherently difficult to successfully enact certain protocols when these relate to deviant or destructive acts. Copyright © 2016 Elsevier Ltd. All rights reserved.
12 CFR 551.40 - What definitions apply to this part?
Code of Federal Regulations, 2012 CFR
2012-01-01
... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...
12 CFR 551.40 - What definitions apply to this part?
Code of Federal Regulations, 2014 CFR
2014-01-01
... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...
12 CFR 551.40 - What definitions apply to this part?
Code of Federal Regulations, 2011 CFR
2011-01-01
... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...
17 CFR 232.11 - Definition of terms used in part 232.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Definition of terms used in part 232. 232.11 Section 232.11 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... this chapter) have the same meanings as in the federal securities laws and the rules, regulations and...
17 CFR 232.11 - Definition of terms used in part 232.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Definition of terms used in part 232. 232.11 Section 232.11 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... this chapter) have the same meanings as in the federal securities laws and the rules, regulations and...
17 CFR 232.11 - Definition of terms used in part 232.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Definition of terms used in part 232. 232.11 Section 232.11 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... this chapter) have the same meanings as in the federal securities laws and the rules, regulations and...
17 CFR 232.11 - Definition of terms used in part 232.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Definition of terms used in part 232. 232.11 Section 232.11 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... this chapter) have the same meanings as in the federal securities laws and the rules, regulations and...
6 CFR Appendix B to Part 9 - Disclosure Form To Report Lobbying
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Disclosure Form To Report Lobbying B Appendix B to Part 9 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Pt. 9, App. B Appendix B to Part 9—Disclosure Form To Report Lobbying ER06MR03.021...
Rusconi, Elena; Ferri, Francesca; Viding, Essi; Mitchener-Nissen, Timothy
2015-01-01
X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported attention to detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012). Here, we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score from the autism-spectrum quotient (AQ) questionnaire (Baron-Cohen et al., 2001) is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals. PMID:26321935
[The level of job satisfaction and its relation to midwives' subjective quality of life].
Babiarczyk, Beata; Małgorzata, Frás; Ulman-Włodarz, Izabela; Jarosova, Darja
2014-01-01
According to the so called Transactional Model of Quality of Life, job satisfaction is a part of subjective well-being. The aim of this study was to explore the relationships between professional commitment, expressed as job satisfaction or dissatisfaction, consideration of leaving the profession or/and workplace, and subjective assessment of well-being among midwives working at hospitals. The study was a part of the international research project, coordinated by the University of Ostrava. The group of respondents consisted of 176 midwives working at selected hospitals in the Silesian region. The study was conducted using the method of diagnostic survey, questionnaire techniques and standardized research tools, such as McCloskey/Mueller Satisfaction Scale (MMSS), Personal Wellbeing Index-Adult (PWI-A) and Subjective Emotional Habitual Wellbeing Scale (SEHP). The overall midwives' job satisfaction was found to be at a medium level. Respondents less satisfied with various aspects of work (interaction, co-workers, professional opportunities, praise/recognition, control/responsibility) and life (standard of living and achievements in life) were significantly more often considering changing their jobs. Dissatisfaction with the extrinsic rewards (salary, vacation, benefits package) had additionally influenced the frequency of considering changing the profession. The respondents were characterized by much lower sense of present and future security than that observed in Western countries, as well as by low satisfaction with standard of living and feeling part of the society. Job satisfaction and subjective well-being remain in strong relationship, and although it is difficult to determine the direction of these relationships, they seem to have a significant impact on each other.
The hobbyist phenomenon in physical security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Michaud, E. C.
Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less
ERIC Educational Resources Information Center
Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia
2012-01-01
Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…
Working Connections: Suzan Lee--UBS Securities LLC, New York
ERIC Educational Resources Information Center
Library Journal, 2004
2004-01-01
This article is about Suzan Lee of UBS Securities LLC in New York, a person who is dedicated to connecting aspiring professionals to opportunities in the world of special libraries. In 1999, Lee realized that most library students had only one resource for internships--their library schools--and that these offerings focused largely on public and…
ERIC Educational Resources Information Center
Warfield, Douglas L.
2011-01-01
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Santa Fe Community College Part-Time Faculty Professional Development Plan.
ERIC Educational Resources Information Center
Santa Fe Community Coll., NM.
Developed for faculty employed on a part-time basis at Santa Fe Community College (SFCC), this booklet explains the required and optional activities comprising the college's professional development program. Introductory sections reveal that part-time faculty members are required to participate in a number of professional development activities,…
The importance of effective catheter securement.
Fisher, Jayne
This article examines the importance of securing/fixing indwelling urinary catheters. The Oxford English dictionary interlinks the two words-'secure' and 'fix'-as having the same meaning. To secure the catheter should not be confused with 'support', whereby the weight of the urine drainage bag is supported with the use of velcro straps or a sleeve. The author introduces the need for the concept of this practice to be at the forefront of nurses' minds in all settings, and this is demonstrated through the use of case studies. Current guidance in this area is reviewed, as well as the problems that can arise when catheters are not secured properly and the available products for health professionals to use.
Corporate liability: security and violence--Part II.
Fiesta, J
1996-04-01
A hospital can be held liable for injuries resulting from failure to provide adequate, reasonable security Part II of "corporate Liability: Security and Violence" addresses negligent hiring and supervision practices, injury and domestic violence in the workplace and communication procedures.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-14
... categories: ISE Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary, Customer (Professional),\\8\\ Non-ISE Market Maker,\\9\\ and Priority Customer.\\10\\ The Exchange is proposing to increase certain rebate amounts... Customer (Professional) is a person who is not a broker/ dealer and is not a Priority Customer. \\9\\ A Non...
ERIC Educational Resources Information Center
Monroe, Eula Ewing
The Professional Development Center Network (PDC), a consortium of twenty public school districts, parochial schools, and Western Kentucky University, seeks to identify and secure resources to assist in the design and delivery of activities appropriate to the educational development of individual staff members through the online Information…
Operational Contract Support: Economic Impact Evaluation and Measures of Effectiveness
2017-12-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES...DATES COVERED MBA professional report 4. TITLE AND SUBTITLE OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES OF EFFECTIVENESS 5...evaluation, expeditionary economics , operational contract support, measure of effectiveness 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY
CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009
2009-12-01
an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary and Customer (Professional) \\8\\ orders; and (ii... for ISE Market Maker, Market Maker Plus, Firm Proprietary and Customer (Professional) orders; and (ii... Plus is an ISE Market Maker who is on the National Best Bid or National Best Offer 80% of the time for...
ERIC Educational Resources Information Center
Bowman, Thomas G.; Mazerolle, Stephanie M.; Dodge, Thomas M.
2013-01-01
Context: Preceptors play a vital role in athletic training education as they mentor and socialize athletic training students into their professional role. Exploring the benefits to serving as a preceptor is important to secure appropriate professional role models for students. Objective: To determine the benefits of serving as an athletic training…
6 CFR Appendix A to Part 27 - DHS Chemicals of Interest
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false DHS Chemicals of Interest A Appendix A to Part 27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Pt. 27, App. A Appendix A to Part 27—DHS Chemicals of Interest ER20NO07.008 ER20NO07.009...
6 CFR Appendix A to Part 27 - DHS Chemicals of Interest
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false DHS Chemicals of Interest A Appendix A to Part 27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Pt. 27, App. A Appendix A to Part 27—DHS Chemicals of Interest ER20NO07.008 ER20NO07.009...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
6 CFR Appendix A to Part 27 - DHS Chemicals of Interest
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false DHS Chemicals of Interest A Appendix A to Part 27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Pt. 27, App. A Appendix A to Part 27—DHS Chemicals of Interest ER20NO07.008 ER20NO07.009...
6 CFR Appendix A to Part 27 - DHS Chemicals of Interest
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false DHS Chemicals of Interest A Appendix A to Part 27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Pt. 27, App. A Appendix A to Part 27—DHS Chemicals of Interest ER20NO07.008 ER20NO07.009...
6 CFR Appendix A to Part 27 - DHS Chemicals of Interest
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false DHS Chemicals of Interest A Appendix A to Part 27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Pt. 27, App. A Appendix A to Part 27—DHS Chemicals of Interest ER20NO07.008 ER20NO07.009...
33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025) ER22OC03.000...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
17 CFR 405.2 - Reports to be made by registered government securities brokers and dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... government securities broker or dealer shall file Part I of Form BD-Y2K (§ 249.618 of this title) prepared as..., shall file Part II of Form BD-Y2K (§ 249.618 of this title). Part II of Form BD-Y2K shall address each... registered government securities broker or dealer that was not required to file Part II of Form BD-Y2K under...
Tjin A Tsoi, Sharon L N M; de Boer, Anthonius; Croiset, Gerda; Koster, Andries S; van der Burgt, Stéphanie; Kusurkar, Rashmi A
2018-01-31
Insufficient professional development may lead to poor performance of healthcare professionals. Therefore, continuing education (CE) and continuing professional development (CPD) are needed to secure safe and good quality healthcare. The aim of the study was to investigate the hypothesized associations and their directions between pharmacists' basic psychological needs in CE, their academic motivation, well-being, learning outcomes. Self-determination theory was used as a theoretical framework for this study. Data were collected through four questionnaires measuring: academic motivation, basic psychological needs (BPN), vitality and lifelong learning adaptability of pharmacists in the CE/CPD learning context. Structural equation modelling was used to analyze the data. Demographic factors like gender and working environment influenced the observed scores for frustration of BPN and factors like training status and working experience influenced the observed scores for academic motivation. A good model fit could be found only for a part of the hypothesized pathway. Frustration of BPN is positively directly related to the less desirable type of academic motivation, controlled motivation (0.88) and negatively directly related to vitality (- 1.61) and negatively indirectly related to learning outcomes in CE. Fulfillment or frustration of BPN are important predictors for well-being and learning outcomes. Further research should be conducted to discover how we can prevent these needs from being frustrated in order to design a motivating, vitalizing and sustainable CE/CPD system for pharmacists and other healthcare professionals. Basic psychological needs are very important predictors for well-being and learning outcomes. Further research should be conducted to discover how we can prevent these needs from being frustrated in order to design a motivating, vitalizing and sustainable CE/CPD system for pharmacists and other healthcare professionals.
Good work - how is it recognised by the nurse?
Christiansen, Bjørg
2008-06-01
The aim of this paper is to shed light on how nurses describe situations that reflect achievement and provide confirmation that they have done good work. Nurses' recognition of good work does not seem to have been the object of direct investigation, but is indirectly reflected in studies focusing on nurses' perceptions on work environments and the multifaceted nature of nursing. However, acknowledging high-quality performance in professional nurses can facilitate nurses in maintaining and strengthening the goals and values of the profession. This in turn can help nurses shoulder the multifaceted responsibilities they have to patients and next of kin. This paper is part of the Professional Learning in a Changing Society project, Institute of Educational Research, University of Oslo, funded by the Research Council of Norway. The project involves four professional groups. This paper, however, focuses on a group of 10 nurses, nine of whom work in hospitals and one in an outpatient clinic. A qualitative approach was chosen to gain insight into how nurses, as well as the other professional groups in the project, engage in processes of knowledge production and quality assurance work. Data presented in this paper derive from semi-structured in-depth interviews conducted during spring 2005 and focuses on the recognition of good work. The following themes were identified as essential in confirming that one did good work: securing fundamental needs of patients and next of kin; managing the flow of responsibilities; positive feedback. CONCLUSIONS. Good work seems to be related to specific situations and a sense of achievement by the respondents. Recognition of good work is not only rewarding and enjoyable; it may also serve as a source of consciousness raising for professional and ethical guidelines in the work place.
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
Code of Federal Regulations, 2013 CFR
2013-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
Code of Federal Regulations, 2012 CFR
2012-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
Code of Federal Regulations, 2011 CFR
2011-01-01
... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...
76 FR 22615 - Privacy Act; Implementation
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2011-OS-0003] 32 CFR Part 322... Part 322 Privacy. Accordingly, 32 CFR part 322 is amended as follows: PART 322--NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE PROGRAM 0 1. The authority citation for 32 CFR part 322.7 continues to...
A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment
NASA Astrophysics Data System (ADS)
Ula, M.; Ula, M.; Fuadi, W.
2017-02-01
As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.
Professional Development Planning and Design. Issues in Science Education.
ERIC Educational Resources Information Center
Rhoton, Jack; Bowers, Patricia
This book focuses on the professional development of teachers and discusses issues related to the planning and design of professional development programs. The content of the book is divided into three parts. Part 1, Standards-Based Reform and Professional Development includes: (1) "National Science Education Standards as a Catalyst for…
19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...
19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...
19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...
19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...
19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
... petroleum gas, ammonium nitrate and associated mixtures, anhydrous ammonia, and chlorine. The security zones... general regulations in 33 CFR part 165, subpart D, no person or vessel may enter or remain in a security.... Subpart D of 33 CFR part 165 contains additional provisions applicable to a security zone created by this...
Social Security and Part-Time Employment.
ERIC Educational Resources Information Center
Euzeby, Alain
1988-01-01
Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-30
... Part IV Securities and Exchange Commission 17 CFR Parts 240 and 249 Process for Submissions for Review of Security-Based Swaps for Mandatory Clearing and Notice Filing Requirements for Clearing...;#0; [[Page 82490
When security and medicine missions conflict: confidentiality in prison settings.
Allen, Scott A; Aburabi, Raed
2016-06-13
Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.
Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek
2015-10-14
Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.
Code of Federal Regulations, 2014 CFR
2014-01-01
... charges, printing, legal, and professional fees, postage, courier services, and office supplies; and (2... accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges, joint...
Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals
2014-10-01
of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance
ERIC Educational Resources Information Center
Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea
2016-01-01
How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…
Social Media Principles Applied to Critical Infrastructure Information Sharing
2013-12-01
shooters. The DHS works throughout the year to build partnerships with industries across a wide spectrum, to include commercial facilities. They...security professionals , industry association and security organizations, emergency managers, and planners and architects. Each of these stakeholder sets... Project Report.126 The DARPA SCP fellows identified 14 factors that affected the performance of any one team. Notable among the collection were
ERIC Educational Resources Information Center
James, Melissa; Warner, Sam
2005-01-01
Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…
Lethal and Legal The Ethics of Drone Strikes
2015-12-01
analysis, evaluation, and refinement of professional expertise in war, strategy, operations, national security, resource management , and responsible...in business studies and holds an M.Phil. in defence and security studies from the Defence College of Management and Technol- ogy, Defence Academy...in unsafe buildings, search and rescue missions in treacherous conditions, police searches for missing or wanted persons, traffic management , public
Psychosocial Needs of Boys in Secure Care for Serious or Persistent Offending
ERIC Educational Resources Information Center
Harrington, R. C.; Kroll, L.; Rothwell, J.; McCarthy, K.; Bradley, D.; Bailey, S.
2005-01-01
Background: The mental health of child offenders who are detained in secure settings is a matter of great public and professional concern but there has been little systematic longitudinal research on the outcomes of these problems once the young person has returned to the community. The aims of the present study were to describe the psychosocial…
ERIC Educational Resources Information Center
Maar, Michael C.
2013-01-01
This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
Introduction This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). Methods The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents’ concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Results Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). Conclusions This study underscores the need for enhanced measures to secure patients’ PHI to avoid undermining their trust. PMID:23975624
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents' concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). This study underscores the need for enhanced measures to secure patients' PHI to avoid undermining their trust.
Erosion of Digital Professionalism During Medical Students' Core Clinical Clerkships.
Mostaghimi, Arash; Olszewski, Aleksandra E; Bell, Sigall K; Roberts, David H; Crotty, Bradley H
2017-05-03
The increased use of social media, cloud computing, and mobile devices has led to the emergence of guidelines and novel teaching efforts to guide students toward the appropriate use of technology. Despite this, violations of professional conduct are common. We sought to explore professional behaviors specific to appropriate use of technology by looking at changes in third-year medical students' attitudes and behaviors at the beginning and conclusion of their clinical clerkships. After formal teaching about digital professionalism, we administered a survey to medical students that described 35 technology-related behaviors and queried students about professionalism of the behavior (on a 5-point Likert scale), observation of others engaging in the behavior (yes or no), as well as personal participation in the behavior (yes or no). Students were resurveyed at the end of the academic year. Over the year, perceptions of what is considered acceptable behavior regarding privacy, data security, communications, and social media boundaries changed, despite formal teaching sessions to reinforce professional behavior. Furthermore, medical students who observed unprofessional behaviors were more likely to participate in such behaviors. Although technology is a useful tool to enhance teaching and learning, our results reflect an erosion of professionalism related to information security that occurred despite medical school and hospital-based teaching sessions to promote digital professionalism. True alteration of trainee behavior will require a cultural shift that includes continual education, better role models, and frequent reminders for faculty, house staff, students, and staff. ©Arash Mostaghimi, Aleksandra E Olszewski, Sigall K Bell, David H Roberts, Bradley H Crotty. Originally published in JMIR Medical Education (http://mededu.jmir.org), 03.05.2017.
Robinson, Karen; Eck, Carol; Keck, Becky; Wells, Nancy
2003-09-01
Professional practice programs are designed to attract, retain, and reward nurses. This three-part series will describe Vanderbilt's performance-based career advancement system, the Vanderbilt Professional Nursing Practice Program (VPNPP). Part 1 outlines the overall program's foundation, philosophical background, and basic structure. The VPNPP is built upon Benner's work, distinguishing among four levels of practice: novice, competent, proficient, and expert. Work by many in the organization identified the expected behaviors for nurses at each level, which were then used to develop clear process evaluation criteria. Part 2 will examine the performance measurement and evaluation system created to support the program. The process of advancing within the program will be described in part 3.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.13 Marking... document. (b) Protective marking. The protective marking is: SENSITIVE SECURITY INFORMATION. (c... Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.13 Marking... document. (b) Protective marking. The protective marking is: SENSITIVE SECURITY INFORMATION. (c... Sensitive Security Information that is controlled under 49 CFR parts 15 and 1520. No part of this record may...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
ERIC Educational Resources Information Center
Ayed, Ahmad; Thulth, Ahida Saleem; Sayej, Sumaya
2015-01-01
Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess night shift and education/training developmental factors on performance of…
ERIC Educational Resources Information Center
Stark, Adam
2017-01-01
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Security and privacy of EHR systems--ethical, social and legal requirements.
Kluge, Eike-Henner W
2003-01-01
This paper addresses social, ethical and legal concerns about security and privacy that arise in the development of international interoperable health information systems. The paper deals with these concerns under four rubrics: the ethical status of electronic health records, the social and legal embedding of interoperable health information systems, the overall information-requirements healthcare as such, and the role of health information professionals as facilitators. It argues that the concerns that arise can be met if the development of interoperability protocols is guided by the seven basic principles of information ethics that have been enunciated in the IMIA Code of Ethics for Health Information Professionals and that are central to the ethical treatment of electronic health records.
NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2012-06-01
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.
Katcher, Murray L; Bayou, Billee; Anderson, Henry A; Davis, Jeffrey P
2005-09-01
The Wisconsin Division of Public Health (DPH) and its partners have developed the necessary public health infrastructure and core expertise to prepare for, and respond to, public health threats and emergencies. The infrastructure includes 12 public health preparedness consortia that have been established across the state. An important part of the response plan is to assure that the responder workforce is adequate to meet the need at the local, regional, and statewide levels. The responder workforce includes health professional volunteers who, if called on, will take on a variety of assigned roles relevant to a defined incident. In order to facilitate an organized system for volunteers to indicate their skills and availability, DPH has developed a secure and confidential database--the Wisconsin Emergency Assistance Volunteer Registry (WEAVR)--to collect and organize contact information on health professional volunteers and to make contact with volunteers when needed. Physicians, as well as other health professional volunteers, are critical to protect the health and safety of the community, especially if the need to dispense prophylactic medications or to vaccinate the entire population of Wisconsin arises. At the time of an event, volunteers will receive "just-in-time" training after reporting to their assigned location. In other states, physicians have found this emergency training to be of value to their overall practice of medicine. Information about how to sign on to WEAVR is provided.
Development of professional expertise in optometry.
Faucher, Caroline
2011-04-01
Development of professional expertise is the gradual transition from novice to expert within a profession. Studies on expertise in the profession of optometry have never been published. However, many studies have been performed in other health professions (e.g., nursing, medicine, physical therapy, occupational therapy). This report is an overview of the development of professional expertise that will highlight some applications for optometry. A 5-level scale of professional expertise development, divided into 2 parts, is described. The first part is the progression of students during their professional studies (novice, intermediate, competent). The second part is the professional development occurring during the practice years (advanced, expert). Personal and collective efforts are required to foster the progression toward expertise. Great interest for the profession, motivation, and deliberate practice are individual attitudes that help this progression. The "optometric community of practice," by means of university (professional) training, continuing education, and collaboration between colleagues, also contributes to this process. Professional development is an integral part of the Optometric Oath. Each clinical case is a potential learning experience contributing to one's professional development. Optometrists' attitudes are predominant factors in the progression from one level to another. Copyright © 2011 American Optometric Association. Published by Elsevier Inc. All rights reserved.
The Interface of Safety and Security in Transport: A Regional Perspective
DOE Office of Scientific and Technical Information (OSTI.GOV)
Welch, Tim; Duhamel, David A; Nandakumar, A. N.
Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios and developing transport security plans. Many participants also reported their appreciation of the workshop exercises that specifically focused on practical aspects of safety and security of transport of radioactive material. These workshop outcomes highlight the important role professionals can offer when they receive additional safety training and education for radioactive material in transport. Moreover, these professionals can help to increase capacity in countries with developing nuclear security regimes. This paper explores workshop outcomes and transportation regulations and guidelines for radioactive material.« less
77 FR 15596 - Privacy Act; Implementation
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-16
... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0032] 32 CFR Part 322 Privacy... levels of government. List of Subjects in 32 CFR Part 322 Privacy. Accordingly, 32 CFR part 322 is amended as follows: PART 322--NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 0 1. The authority...
17 CFR Appendix C to Part 145 - [Reserved
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false [Reserved] C Appendix C to Part 145 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION COMMISSION RECORDS AND INFORMATION Appendix C to Part 145 [Reserved] ...
17 CFR Appendix C to Part 40 - [Reserved
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false [Reserved] C Appendix C to Part 40 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES Appendix C to Part 40 [Reserved] ...
The Use of Practitioners as Part-Time Faculty in Postsecondary Professional Education
ERIC Educational Resources Information Center
Chan, Joseph
2010-01-01
Donald Schon's theory of reflective learning (1983, 1987) has been the model of professional education for decades. Yet little research is done to examine the role of practitioners as part-time teachers in professional education in light of his ideas. This research investigated four programmes of professional education in Hong Kong: (a) a master…
ERIC Educational Resources Information Center
Hill, E. Jeffrey; Martinson, Vjollca; Ferris, Maria
2004-01-01
This study investigates how the option for new-concept part-time (NPT) employment influences the ability of mothers of preschool children working in professional occupations to successfully integrate work and family responsibilities. Female NPT professionals (n=279) and female full-time (FT) professionals (n=250) were compared. The NPT group…
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
40 CFR 91.1008 - National security exemption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Exclusion and Exemption of Marine SI Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... request a national security exemption for any marine SI engine, otherwise subject to this part, which does...
17 CFR 403.6 - Compliance with part by futures commission merchants.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Compliance with part by futures commission merchants. 403.6 Section 403.6 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER...
17 CFR 4.12 - Exemption from provisions of part 4.
Code of Federal Regulations, 2010 CFR
2010-04-01
... part 4. 4.12 Section 4.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... said Act; (B) Will generally and routinely engage in the buying and selling of securities and securities derived instruments; (C) Will not enter into commodity futures and commodity options contracts for...
17 CFR Appendix B to Part 420 - Sample Large Position Report
Code of Federal Regulations, 2010 CFR
2010-04-01
..., and as collateral for financial derivatives and other securities transactions $ Total Memorandum 1... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Sample Large Position Report B Appendix B to Part 420 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-25
... as Medicare Part D) premiums. This new subpart implemented changes made to the Social Security Act... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 418 [Docket No. SSA-2010-0029] RIN 0960-AH22... Coverage Premiums AGENCY: Social Security Administration. ACTION: Final rule. SUMMARY: This final rule...
20 CFR 408.101 - What is this part about?
Code of Federal Regulations, 2010 CFR
2010-04-01
....101 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II... in this part 408 (Regulation No. 8 of the Social Security Administration) relate to the provisions of title VIII of the Social Security Act as added by Pub. L. 106-169 enacted December 14, 1999. Title VIII...
Fábregas Escurriola, Mireia; Lozano Moreno, Maribel; Burón Leandro, Raquel; Gomez Quintero, Ana María; Ballve, Jose Luis; Clemente Jiménez, María Lourdes; Puigdomènech Puig, Elisa; Casas More, Ramón; Garcia Rueda, Beatriz; Casajuana, Marc; Méndez-Aguirre, Marga; Garcia Bonias, David; Fernández Maestre, Soraya; Sánchez Fondevila, Jessica
2015-01-01
Background The use of information and communication technologies (ICTs) in the health service is increasing. In spite of limitations, such as lack of time and experience, the deployment of ICTs in the healthcare system has advantages which include patient satisfaction with secure messaging, and time saving benefits and utility for patients and health professionals. ICTs may be helpful as either interventions on their own or as complementary tools to help patients stop smoking. Objectives To gather opinions from both medical professionals and smokers about an email-based application that had been designed by our research group to help smoking cessation, and identify the advantages and disadvantages associated with interventions based on the utilization of ICTs for this purpose. Methods A qualitative, descriptive–interpretative study with a phenomenological perspective was performed to identify and interpret the discourses of the participating smokers and primary healthcare professionals. Data were obtained through two techniques: semi-structured individual interviews and discussion groups, which were recorded and later systematically and literally transcribed together with the interviewer’s notes. Data were analyzed with the ATLAS TI 6.0 programme. Results Seven individual interviews and four focal groups were conducted. The advantages of the application based on the email intervention designed by our research group were said to be the saving of time in consultations and ease of access for patients who found work timetables and following a programme for smoking cessation incompatible. The disadvantages were thought to be a lack of personal contact with the healthcare professional, and the possibility of cheating/ self-deception, and a greater probability of relapse on the part of the smokers. Conclusions Both patients and healthcare professionals viewed the email-based application to help patients stop smoking as a complementary aid to face-to-face consultations. Nevertheless, ICTs could not substitute personal contact in the smoking cessation programme. PMID:26340346
Trujillo Gómez, Jose Manuel; Díaz-Gete, Laura; Martín-Cantera, Carlos; Fábregas Escurriola, Mireia; Lozano Moreno, Maribel; Burón Leandro, Raquel; Gomez Quintero, Ana María; Ballve, Jose Luis; Clemente Jiménez, María Lourdes; Puigdomènech Puig, Elisa; Casas More, Ramón; Garcia Rueda, Beatriz; Casajuana, Marc; Méndez-Aguirre, Marga; Garcia Bonias, David; Fernández Maestre, Soraya; Sánchez Fondevila, Jessica
2015-01-01
The use of information and communication technologies (ICTs) in the health service is increasing. In spite of limitations, such as lack of time and experience, the deployment of ICTs in the healthcare system has advantages which include patient satisfaction with secure messaging, and time saving benefits and utility for patients and health professionals. ICTs may be helpful as either interventions on their own or as complementary tools to help patients stop smoking. To gather opinions from both medical professionals and smokers about an email-based application that had been designed by our research group to help smoking cessation, and identify the advantages and disadvantages associated with interventions based on the utilization of ICTs for this purpose. A qualitative, descriptive-interpretative study with a phenomenological perspective was performed to identify and interpret the discourses of the participating smokers and primary healthcare professionals. Data were obtained through two techniques: semi-structured individual interviews and discussion groups, which were recorded and later systematically and literally transcribed together with the interviewer's notes. Data were analyzed with the ATLAS TI 6.0 programme. Seven individual interviews and four focal groups were conducted. The advantages of the application based on the email intervention designed by our research group were said to be the saving of time in consultations and ease of access for patients who found work timetables and following a programme for smoking cessation incompatible. The disadvantages were thought to be a lack of personal contact with the healthcare professional, and the possibility of cheating/ self-deception, and a greater probability of relapse on the part of the smokers. Both patients and healthcare professionals viewed the email-based application to help patients stop smoking as a complementary aid to face-to-face consultations. Nevertheless, ICTs could not substitute personal contact in the smoking cessation programme.
ERIC Educational Resources Information Center
Peslak, Alan R.
2010-01-01
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Sustainable Transportation: Strategy for Security, Prosperity, and Peace
2014-11-01
number. 1 . REPORT DATE NOV 2014 2. REPORT TYPE 3 . DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Sustainable Transportation...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...licensed Professional Engineer in the state of Virginia. viii 1 SUSTAINABLE TRANSPORTATION: STRATEGY FOR SECURITY, PROSPERITY, AND PEACE Introduction
Birds of a Feather: Supporting Secure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Braswell III, H V
2006-04-24
Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less
Humaidi, Norshima; Balakrishnan, Vimala
2018-01-01
Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management-user values and the nature of compliance towards ISPs among selected health professionals, this study has made a unique contribution to the literature.
Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam
2017-01-01
Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.
Okeke, Sunday O.
2017-01-01
Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444
17 CFR Appendix C to Part 1 - [Reserved
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false [Reserved] C Appendix C to Part 1 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Appendix C to Part 1 [Reserved] ...
ERIC Educational Resources Information Center
Ai, Amy L.; Carrigan, Lynn T.
2007-01-01
Cardiovascular disease (CVD) is on the rise in the aging population of the United States. Heart disease is the leading cause of death, hospital bed use, and social security disability. Enhancing knowledge about CVD may improve social work's professional role in the health care system. This article focuses on a pressing CVD-related issue that needs…
A Code Of Ethics And Professional Conduct For NSA Intelligence Professionals
2015-02-17
protects the nation. Such releases may especially damage the cohesion of the workforce. Team Cohesion and Self - esteem The Greek philosopher...individual, the corporation , and the community, self -interest and the public good.” 25 Two aspects of this assertion accurately characterize NSA employees...reasons, most of which are thwarted by monitoring, security investigations, and self -reporting. Recently, individuals responsible for extremely damaging
LPTA Versus Tradeoff: Analysis of Contract Source Selection Strategies and Performance Outcomes
2016-06-01
methodologies contracting professionals employ to acquire what the DOD needs. Contracting professionals may use lowest price technically acceptable (LPTA) and...contract management process, source selection, lowest price technically acceptable, tradeoff 15. NUMBER OF PAGES 69 16. PRICE CODE 17. SECURITY...use lowest price technically acceptable (LPTA) and tradeoff strategies to procure requirements to maximize the overall best value to the government
Ethics Certification of Health Information Professionals.
Kluge, Eike-Henner; Lacroix, Paulette; Ruotsalainen, Pekka
2018-04-22
To provide a model for ensuring the ethical acceptability of the provisions that characterize the interjurisdictional use of eHealth, telemedicine, and associated modalities of health care deliveiy that are currently in place. Following the approach initiated in their Global Protection of Health Data project within the Security in Health Information Systems (SiHIS) working group of the International Medical Informatics Association (IMIA), the authors analyze and evaluate relevant privacy and security approaches that are intended to stem the erosion of patients' trustworthiness in the handling of their sensitive information by health care and informatics professionals in the international context. The authors found that while the majority of guidelines and ethical codes essentially focus on the role and functioning of the institutions that use EHRs and information technologies, little if any attention has been paid to the qualifications of the health informatics professionals (HIPs) who actualize and operate information systems to deal with or address relevant ethical issues. The apparent failure to address this matter indicates that the ethical qualification of HIPs remains an important security issue and that the Global Protection of Health Data project initiated by the SiHIS working group in 2015 should be expanded to develop into an internationally viable method of certification. An initial model to this effect is sketched and discussed. Georg Thieme Verlag KG Stuttgart.
Heilmaier, C; Mayor, A; Zuber, N; Fodor, P; Weishaupt, D
2016-03-01
Non-radiological medical professionals often need to remain in the scanning room during computed tomography (CT) examinations to supervise patients in critical condition. Independent of protective devices, their position significantly influences the radiation dose they receive. The purpose of this study was to assess if a traffic light system indicating areas of different radiation exposure improves non-radiological medical staff's radiation awareness and feeling of personal security. Phantom measurements were performed to define areas of different dose rates and colored stickers were applied on the floor according to a traffic light system: green = lowest, orange = intermediate, and red = highest possible radiation exposure. Non-radiological medical professionals with different years of working experience evaluated the system using a structured questionnaire. Kruskal-Wallis and Spearman's correlation test were applied for statistical analysis. Fifty-six subjects (30 physicians, 26 nursing staff) took part in this prospective study. Overall rating of the system was very good, and almost all professionals tried to stand in the green stickers during the scan. The system significantly increased radiation awareness and feeling of personal protection particularly in staff with ≤ 5 years of working experience (p < 0.05). The majority of non-radiological medical professionals stated that staying in the green stickers and patient care would be compatible. Knowledge of radiation protection was poor in all groups, especially among entry-level employees (p < 0.05). A traffic light system in the CT scanning room indicating areas with lowest, intermediate, and highest possible radiation exposure is much appreciated. It increases radiation awareness, improves the sense of personal radiation protection, and may support endeavors to lower occupational radiation exposure, although the best radiation protection always is to re-main outside the CT room during the scan. • A traffic light system indicating areas with different radiation exposure within the computed tomography scanner room is much appreciated by non-radiological medical staff. • The traffic light system increases non-radiological medical staff's radiation awareness and feeling of personal protection. • Knowledge on radiation protection was poor in non-radiological medical staff, especially in those with few working experience. © Georg Thieme Verlag KG Stuttgart · New York.
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.105 - Approval and amendments.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.105... designated official, each airport operator required to have a security program under this part must submit...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
49 CFR 1542.107 - Changed conditions affecting security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport... notification in writing. If approved by TSA, this written notification becomes a part of the airport security... section in the form of a proposed amendment to the airport operator's security program, as required under...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
[Psychiatry with open doors. Part 2: Therapeutic challenges].
Sollberger, D; Lang, U E
2014-03-01
In the previous part of the issue we argued that opening the doors of acute psychiatric inpatient wards is actually one of the anchor points on the way to an innovative psychiatry. It focuses on the patient's personality in a sense that this is taken as seriously as the psychiatric disorder itself. Patients and relatives should be enabled to participate in treatment decisions as they should experience that treatment teams are concerned about reliance, liability and security in therapeutic relationships in an empathetic way. The second part of the issue contributes to the therapeutic measures, the different skills and modifications of treatment frameworks in acute psychiatry (e.g. prevention of crowding in acute psychiatric inpatient units, education of staff, assessment of the risks of violence, de-escalation strategies and coping with suicidality). They might be helpful in implementing the outlined confidence about the essence of therapeutic relationships, autonomy and codetermination of patients in treatment. These suggestions might enhance a professional approach particularly with respect to prevention and also concerning acute interventions in situations of endangerment to self and others and of aggression and violence in the units. In this way they help to achieve the goal of open doors in psychiatry.
Baird, Theodore
2017-06-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.
Baird, Theodore
2017-01-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601
A security architecture for interconnecting health information systems.
Gritzalis, Dimitris; Lambrinoudakis, Costas
2004-03-31
Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.
32 CFR Appendix G to Part 154 - [Reserved
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...
32 CFR Appendix G to Part 154 - [Reserved
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...
32 CFR Appendix G to Part 154 - [Reserved
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...
32 CFR Appendix G to Part 154 - [Reserved
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...
32 CFR Appendix G to Part 154 - [Reserved
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false [Reserved] G Appendix G to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Appendix G to Part 154 [Reserved] ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-23
... the proposed Information Collection Request (ICR) titled: Part 41, Relating to Security Futures... COMMODITY FUTURES TRADING COMMISSION Agency Information Collection Activities; Proposed Collection; Comment Request: Part 41, Relating to Security Futures Products AGENCY: Commodity Futures Trading...
76 FR 61563 - Voluntary Surrender of Certificate of Registration
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-05
... 21 CFR Part 1301 Administrative practice and procedure, Drug traffic control, Security measures. 21 CFR Part 1309 Administrative practice and procedure, Drug traffic control, Exports, Imports, Security... DEPARTMENT OF JUSTICE Drug Enforcement Administration 21 CFR Parts 1301 and 1309 [Docket No. DEA...
Burrow, Simon; Mairs, Hilary; Pusey, Helen; Bradshaw, Timothy; Keady, John
2016-11-01
To understand the motivations and experiences of health and social care professionals undertaking part-time, accredited, continuing professional education in higher education. A review following systematic principles. Systematic searches for literature published between January 2000 and December 2015 using the databases: SCOPUS, Web of Science, Medline, PsychINFO, Social Policy and Practice and CINAHL. Studies were included if they were published in the English language and were qualitative in design, focussing on the motivations and experiences of staff engaged in part-time, accredited, higher education study. Three reviewers appraised the quality of the selected studies. Thirteen qualitative studies were identified for the review. Motivating factors for staff to engage in part-time, accredited, continuing professional development study included: personal and professional drivers, influence of workplace/management and funding and availability. Key themes in relation to how staff experienced study included: the demands of adjusting to the academic requirements of higher education study; the experience of juggling competing demands of study, work and family; and the presence or absence of support for part-time study in the personal and professional arenas. Health and social care professionals experience a number of challenges when engaging in part-time, continuing professional education in higher education institutions. A significant challenge is the juggling of competing demands of study, work and family, and this may have a negative impact on learning. Research is needed to inform how higher education can address the specific learning needs of this population and develop pedagogic approaches that are both responsive to need and support of effective learning. Copyright © 2016 Elsevier Ltd. All rights reserved.
17 CFR 4.12 - Exemption from provisions of part 4.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Exemption from provisions of part 4. 4.12 Section 4.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... pool for which it makes such claim: (A) Will be offered and sold pursuant to the Securities Act of 1933...
17 CFR 403.1 - Application of part to registered brokers and dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application of part to registered brokers and dealers. 403.1 Section 403.1 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER...
17 CFR 404.1 - Application of part to registered brokers and dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application of part to registered brokers and dealers. 404.1 Section 404.1 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RECORDKEEPING AND...
Wallin Lundell, Inger; Eulau, Louise; Bjarneby, Frida; Westerbotn, Margareta
2018-03-01
This study sought to describe how women in Mexico who have suffered from gender-based violence experience their encounters with healthcare professionals. Gender-based violence is a worldwide problem. Previous studies have described that women feel they are not being cared for appropriately during their encounters with healthcare professionals. This study was conducted in Mexico, which has a high rate of gender inequality. A descriptive, qualitative study was conducted. Face-to-face interviews were conducted with seven women. An inductive content analysis was used to analyse the interviews. The analyses resulted in four categories: Feelings of guilt about being abused, Feelings of being unimportant, Feelings of taking time and Feelings of being insecure/secure. The women emphasised the importance of healthcare professionals taking time out of their busy schedules for them. When they treated the women with respect and genuine interest, the women felt secure. When the healthcare professionals did not meet these expectations, feelings of frustration and mistrust were elicited. Feelings of being listened to and safety were considered important aspects in a positive encounter, whereas feeling a lack of time or interest often led to negative experiences such as frustration with and distrust of the healthcare system. These results imply that healthcare professionals may have deficiencies with regard to how these women are treated because these women do not feel that they receive the proper support. Education regarding how to approach women who have suffered from gender-based violence is essential for healthcare professionals to establish respectful encounters. The findings of this study stress that relatively simple efforts such as listening to these women's stories and providing them with genuine attention might substantially improve care. © 2017 John Wiley & Sons Ltd.
Safeguards and security research and development: Progress report, October 1994--September 1995
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rutherford, D.R.; Henriksen, P.W.
The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IVmore » is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.« less
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
Defending the Mentally Disabled.
ERIC Educational Resources Information Center
Cournos, Francine; And Others
1984-01-01
Discusses the role of mental health and social services personnel in helping patients apply for recertification for Supplementary Security Income (SSI) benefits. Describes the appeal process and provides guidelines for professionals. (JAC)
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... some disobedient children, you may need to obtain professional mental health treatment. Here are some situations where ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... for Referral to Pediatric Surgical Specialists Sports Medicine Professionals What is a Child Abuse Pediatrician? What is ...
Godwin, Diana; Hoang, Ha; Crocombe, Leonard
2016-06-01
Despite an increase in the supply of dental practitioners in Australia in recent years, there remains an unequal distribution of dental practitioners with more dental practitioners working in city areas. This is in part due to difficulties in attracting and retaining dental practitioners to rural practice. The aim of this study was to investigate the attitudes of Australian dental practitioners towards what may attract them to rural areas and why they may remain in them. A descriptive study, utilising telephone, semi-structured interviews with dental practitioners across Australia. Dental practitioners were recruited through their professional associations. Data were analysed using content and thematic analysis. Fifty participants; 34 dentists, eight oral health therapists, and eight dental prosthetists working in rural and urban areas of Australia. Four main themes were identified: Business Case: concerns related to income and employment security, Differences in Clinical Practices: differences in clinical treatments and professional work, Community: fitting in and belonging in the area in which you live and work, and Individual Factors: local area provision for lifestyle choices and circumstances. The most influential of these themes were business case and individual factors. Smaller rural areas, due to low populations and being unable to provide individuals with their lifestyle needs were considered unappealing for dental practitioners to live. Previous experience of rural areas was highly influential. The main factors influencing rural recruitment and retention were income sustainability and employment security, and individual factors. Dental practitioners felt that it was harder to earn a sustainable income and provide quality lifestyles for their family in rural areas. Previous experience of rural areas was influential towards long-term rural retention. These factors should be considered in order to develop effective strategies to address the unequal distribution of dental practitioners.
National ITS architecture security
DOT National Transportation Integrated Search
2003-10-01
This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC... Transportation Worker Identification Credential and must undergo a security threat assessment under 49 CFR part...
SAAPM 2016 - Eliminate Sexual Assault: Know Your Part, Do Your Part |
part of a team of professionals at a command that builds that command climate. Part of that is to not part of a team of professionals at a command that builds that command climate. Part of that is to not the influence of alcohol, so it's important to understand this approach and then be part of the
75 FR 32140 - Voluntary Surrender of Certificate of Registration
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-07
... 21 CFR Part 1301 Administrative practice and procedure, Drug traffic control, Security measures. 21 CFR Part 1309 Administrative practice and procedure, Drug traffic control, Exports, Imports, Security... DEPARTMENT OF JUSTICE Drug Enforcement Administration 21 CFR Parts 1301, 1309 [Docket No. DEA-304P...
17 CFR 300.502 - Claim for securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Claim for securities. 300.502 Section 300.502 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to Satisfaction...
ERIC Educational Resources Information Center
Svetcov, Eric
2004-01-01
When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…
2008-01-24
operations of large corporate jets and professionally managed fractional-ownership fleets — makes up about one- quarter of all GA operations and... 2018 , it is expected that there will be about 18,000 GA turbojets in service in the United States, compared to an estimate of slightly more than 10,000...spray a chemical blister agent into a packed college football stadium CRS-17 43 White House Homeland Security Council, David Howe, Senior Director for
Security analysis of standards-driven communication protocols for healthcare scenarios.
Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco
2012-12-01
The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Bunionette Deformity Correction
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... then an evaluation by a child mental-health professional would be helpful. Time to adjust Most shy ...
Creating Professional Development School Partnerships. A Resource Guide.
ERIC Educational Resources Information Center
Teitel, Lee; Del Prete, Tom
This three-part guide presents information and recommendations from the Massachusetts Professional Development School Network Steering Committee on how to develop a professional development school (PDS) partnership. Part 1 defines the PDS concept, presents a brief background account of its evolution, and discusses its potential for simultaneously…
Morel, Kenneth R
2009-11-01
In the context of forensic neuropsychological assessments, the professional interaction of law and psychology is viewed primarily as one where the retaining attorney or court dictates its needs to psychologists when resolving legal disputes. While this perspective is conceptually accurate, the positive and practical collaboration of law and psychology also relies on attorneys adhering to basic protections of sensitive psychological assessment procedures and tests. Objective testing is undermined when a practitioner of law engages in actions prior to, during, or following a neuropsychological examination in a manner that threatens the test security. An appreciation among practitioners of law and psychology regarding the necessity of test security is essential. This article reviews attorney actions that can affect test security, proposes a distinction by psychology between appropriate and problematic client preparation for a neuropsychological examination, integrates the available legal precedent regarding test security, and suggests productive measures to protect test security in medicolegal settings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security interests, mechanic's lienors, and judgment lien creditors. 70.145 Section 70.145 Alcohol, Tobacco... Lien for Taxes § 70.145 Purchasers, holders of security interests, mechanic's lienors, and judgment... in § 70.143(a) of this part), mechanic's lienor (as defined in § 70.143(b) of this part), or judgment...
Code of Federal Regulations, 2012 CFR
2012-04-01
... security interests, mechanic's lienors, and judgment lien creditors. 70.145 Section 70.145 Alcohol, Tobacco... Lien for Taxes § 70.145 Purchasers, holders of security interests, mechanic's lienors, and judgment... in § 70.143(a) of this part), mechanic's lienor (as defined in § 70.143(b) of this part), or judgment...
Code of Federal Regulations, 2014 CFR
2014-04-01
... security interests, mechanic's lienors, and judgment lien creditors. 70.145 Section 70.145 Alcohol, Tobacco... Lien for Taxes § 70.145 Purchasers, holders of security interests, mechanic's lienors, and judgment... in § 70.143(a) of this part), mechanic's lienor (as defined in § 70.143(b) of this part), or judgment...
Code of Federal Regulations, 2013 CFR
2013-04-01
... security interests, mechanic's lienors, and judgment lien creditors. 70.145 Section 70.145 Alcohol, Tobacco... Lien for Taxes § 70.145 Purchasers, holders of security interests, mechanic's lienors, and judgment... in § 70.143(a) of this part), mechanic's lienor (as defined in § 70.143(b) of this part), or judgment...
Code of Federal Regulations, 2011 CFR
2011-04-01
... security interests, mechanic's lienors, and judgment lien creditors. 70.145 Section 70.145 Alcohol, Tobacco... Lien for Taxes § 70.145 Purchasers, holders of security interests, mechanic's lienors, and judgment... in § 70.143(a) of this part), mechanic's lienor (as defined in § 70.143(b) of this part), or judgment...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-18
...; Conforming Changes to Regulations AGENCY: Social Security Administration. ACTION: Interim final rule with... monthly adjustment amounts (IRMAA) in order to conform to changes made to the Social Security Act (Act) by... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 418 [Docket No. SSA-2012-0011] RIN 0960-AH47...
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
33 CFR 106.140 - Maritime Security (MARSEC) Directive.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...
2013-05-01
partnership between U.S. and Colombian forces. This approach requires introspection, understanding, and adaptation across the U.S. national security...status. Not all national militaries focus on external threats. Some environmental or national capacity circumstances require military professionals...desired impact, outcomes, and outputs through a strategic planning process providing direction, consultation with stakeholders, and environmentally driven
[Quality management and participation into clinical database].
Okubo, Suguru; Miyata, Hiroaki; Tomotaki, Ai; Motomura, Noboru; Murakami, Arata; Ono, Minoru; Iwanaka, Tadashi
2013-07-01
Quality management is necessary for establishing useful clinical database in cooperation with healthcare professionals and facilities. The ways of management are 1) progress management of data entry, 2) liaison with database participants (healthcare professionals), and 3) modification of data collection form. In addition, healthcare facilities are supposed to consider ethical issues and information security for joining clinical databases. Database participants should check ethical review boards and consultation service for patients.
Anticipating and Understanding the Rebalance: Exercise Nine Innings, USMC Command and Staff College
2017-06-21
USPACOM, professional military education , PME, Command and Staff College, training, education , Exercise Nine Innings, regional security challenges The...essence, professional military education had to keep up with the tempo of the evolution of warfare in the twenty-first century. Knowing and...operations existing in differing phases of execution, gained great- er interest among education commands, the Marine Corps, and joint leader- ship.4
Cazier, Joseph A; Medlin, B Dawn
2006-09-27
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.
Cazier, Joseph A; Medlin, B. Dawn
2006-01-01
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366
European health telematics networks for positron emission tomography
NASA Astrophysics Data System (ADS)
Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios
2006-12-01
A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.
2011-01-01
Background Moving a forensic mental health patient from one level of therapeutic security to a lower level or to the community is influenced by more than risk assessment and risk management. We set out to construct and validate structured professional judgement instruments for consistency and transparency in decision making Methods Two instruments were developed, the seven-item DUNDRUM-3 programme completion instrument and the six item DUNDRUM-4 recovery instrument. These were assessed for all 95 forensic patients at Ireland's only forensic mental health hospital. Results The two instruments had good internal consistency (Cronbach's alpha 0.911 and 0.887). Scores distinguished those allowed no leave or accompanied leave from those with unaccompanied leave (ANOVA F = 38.1 and 50.3 respectively, p < 0.001). Scores also distinguished those in acute/high security units from those in medium or in low secure/pre-discharge units. Each individual item distinguished these levels of need significantly. The DUNDRUM-3 and DUNDRUM-4 correlated moderately with measures of dynamic risk and with the CANFOR staff rated unmet need (Spearman r = 0.5, p < 0.001). Conclusions The DUNDRUM-3 programme completion items distinguished significantly between levels of therapeutic security while the DUNDRUM-4 recovery items consistently distinguished those given unaccompanied leave outside the hospital and those in the lowest levels of therapeutic security. This data forms the basis for a prospective study of outcomes now underway. PMID:21722396
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Date of birth; (C) Social security number; (D) Payment history; (E) Account number; and (F) Name and... medium) by a health care provider who is a mental health professional documenting or analyzing the...
Percutaneous Achilles Tendon Lengthening
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Find ... Correspondence Regulatory and Public Meetings Stop the Bleed Professional Development Education Annual Meeting International Cord Blood Symposium ...
Van Ryzin, Mark J; Leve, Leslie D
2012-04-01
In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
49 CFR Appendix E to Part 40 - SAP Equivalency Requirements for Certification Organizations
Code of Federal Regulations, 2011 CFR
2011-10-01
... formal education, in-service training, and professional development courses. Part of any professional counselor's development is participation in formal and non-formal education opportunities within the field... is important if the individual is to be considered a professional in the field of alcohol and drug...
Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom
2009-04-16
Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors.
Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom
2009-01-01
Background Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Methods Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. Results The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Conclusion Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors. PMID:19371413
Cashmore, Aaron W; Indig, Devon; Hampton, Stephen E; Hegney, Desley G; Jalaludin, Bin B
2016-11-01
Little is known about the environmental and organisational determinants of workplace violence in correctional health settings. This paper describes the views of health professionals working in these settings on the factors influencing workplace violence risk. All employees of a large correctional health service in New South Wales, Australia, were invited to complete an online survey. The survey included an open-ended question seeking the views of participants about the factors influencing workplace violence in correctional health settings. Responses to this question were analysed using qualitative thematic analysis. Participants identified several factors that they felt reduced the risk of violence in their workplace, including: appropriate workplace health and safety policies and procedures; professionalism among health staff; the presence of prison guards and the quality of security provided; and physical barriers within clinics. Conversely, participants perceived workplace violence risk to be increased by: low health staff-to-patient and correctional officer-to-patient ratios; high workloads; insufficient or underperforming security staff; and poor management of violence, especially horizontal violence. The views of these participants should inform efforts to prevent workplace violence among correctional health professionals.
17 CFR 300.307 - Completion with cash or securities of customer.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Completion with cash or securities of customer. 300.307 Section 300.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION...
17 CFR 5.24 - Applicability of other parts of this chapter
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Applicability of other parts of this chapter 5.24 Section 5.24 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.24 Applicability of other parts of this chapter...
31 CFR 370.0 - What does this part cover?
Code of Federal Regulations, 2010 CFR
2010-07-01
... RELATING TO UNITED STATES SECURITIES General Information § 370.0 What does this part cover? (a) Scope. This... does not apply to transactions for the sale of United States Savings Bonds accomplished through savings... connection with United States securities. This part also provides regulations for the electronic submission...
Shoes and Orthotics for Diabetics
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... By working with a physician and a footwear professional, such as a certified pedorthist, many patients can ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Emotional Development: 2 Year Olds
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... probably refer your child to a mental health professional for a consultation. Last Updated 8/1/2009 ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Plantar Fibroma and Plantar Fibromatosis
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...
A physician's role following a breach of electronic health information.
Kim, Daniel; Schleiter, Kristin; Crigger, Bette-Jane; McMahon, John W; Benjamin, Regina M; Douglas, Sharon P
2010-01-01
The Council on Ethical and Judicial Affairs of the American Medical Association examines physicians' professional ethical responsibility in the event that the security of patients' electronic records is breached.
26 CFR 1.248-1 - Election to amortize organizational expenditures.
Code of Federal Regulations, 2011 CFR
2011-04-01
... original stock certificates, and the like; necessary accounting services; expenses of temporary directors... securities, such as commissions, professional fees, and printing costs. This is so even where the particular...
Finding an Eye Care Professional
... article rating hospitals in the United States. Website: http://health.usnews.com/best-hospitals For More Information ... ophthalmologists in the United States and abroad. Website: https://secure.aao.org/aao/find-ophthalmologist The American ...
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
Facing the terror of nuclear terrorism.
Johnson, Raymond H
2003-05-01
As America prepares for homeland security and the response to terrorism, more occupational safety professionals may find themselves called upon to deal with terror in their own neighborhoods. While thousands of safety professionals are well trained technically to deal with many types of terrorism, they may not be well prepared to deal with the greater challenge, namely the terror of terrorism. Dealing with terror requires hearing and responding to people's feelings before providing technical answers. For safety professionals to be most effective in dealing with terrorism, they can benefit from more training on how to deal with terror.
Everyday Excellence: A Framework for Professional Nursing Practice in Long-Term Care
Lyons, Stacie Salsbury; Specht, Janet Pringle; Karlman, Susan E.
2009-01-01
Registered nurses make measurable contributions to the health and wellness of persons living in nursing homes. However, most nursing homes do not employ adequate numbers of professional nurses with specialized training in the nursing care of older adults to positively impact resident outcomes. As a result, many people never receive excellent geriatric nursing while living in a long-term care facility. Nurses have introduced various professional practice models into health care institutions as tools for leading nursing practice, improving client outcomes, and achieving organizational goals. Problematically, few professional practice models have been implemented in nursing homes. This article introduces an evidence-based framework for professional nursing practice in long-term care. The Everyday Excellence framework is based upon eight guiding principles: Valuing, Envisioning, Peopling, Securing, Learning, Empowering, Leading, and Advancing Excellence. Future research will evaluate the usefulness of this framework for professional nursing practice. PMID:20077966
12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards
Code of Federal Regulations, 2011 CFR
2011-01-01
... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...
Mikkelsen, Maria Rudkjær; Hendriksen, Carsten; Schiødt, Frank Vinholt; Rydahl-Hansen, Susan
2015-12-01
To identify and describe conditions that limit or support patients, with alcoholic liver disease after surviving alcohol-induced hepatic encephalopathy, ability to cope with current and potential physical and psychosocial problems--in interaction with professionals and relatives--and to recommend appropriate interventions. Alcoholic liver disease patients surviving alcohol-induced hepatic encephalopathy have significantly impaired quality of life. Internationally, there is a lack of knowledge about the conditions that affect alcoholic liver disease patients' coping and rehabilitation. A grounded theory study. Semi-structured interviews, conducted with 11 alcoholic liver disease patients who were diagnosed with hepatic encephalopathy. The interview guide was inspired by Richard S. Lazarus's theory of stress and coping. The elements that support or limit alcoholic liver disease patients' ability to cope with physical and psychosocial problems in interaction with professionals and relatives were represented by the core category 'Struggle for preservation of identity as a significant individual'. It was characterised by three categories, which are interrelated and impact upon each other: 'Acknowledgement', 'Struggle to maintain control' and 'Achieving a sense of security'. Alcoholic liver disease patients experience a struggle to preserve their identity as a significant individual. It can be assumed that professionals and relatives in their interaction with, and support of, patients should focus on strengthening and preserving patients' identity in the form of acknowledgement, helping alcoholic liver disease patients maintain self-control and providing a safety net so patients feel a sense of security. It can be assumed that professionals should support alcoholic liver disease patients' appraisal of, and coping with, physical and psychosocial problems based on acknowledgment, understanding and a sympathetic attitude. Professionals should proactively approach patients when they withdraw. It may be useful for professionals to be aware of alcoholic liver disease patients' individual coping strategies and thereby their individual requirements for professional supportive intervention. © 2015 John Wiley & Sons Ltd.
Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona
2003-01-01
The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.
Inter-organizational future proof EHR systems. A review of the security and privacy related issues.
van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan
2009-03-01
Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.
The Army War College Review: Student Publications. Volume 2, Number 2. May 2016
2016-05-01
Character Development of U.S. Army Leaders – The Laissez - Fair Approach,” Military Review Online, September-October 2013, 30-39, http://usacac.army.mil/CAC2...intellectual work with professionals invested in U.S. national security, Landpower, strategic leadership , global security studies, and the advancement of...assumed the leadership chair of the Arctic Council for two years. President Obama appointed a well-qualified Special Representative for the Arctic
2015-12-01
professional development aspirations. An organization that realized a very similar narrative as the DHS is the Department of Defense (DOD), more...is one that finds itself imbedded in several debates surrounding the development of formalized education/preparatory efforts for its core civilian... development of formalized education efforts for its workforce. There is formalized preparatory training for several different kinds of homeland security
Challenges of the Global Century: Report of the Project on Globalization and National Security
2001-01-01
military and civilian leaders for service at the highest levels of national defense and security. The major components of NDU include the Industrial ...academic programs. In addition, it produces Joint Force Quarterly, a professional military journal published for the Chairman of the Joint Chiefs of...shocks become contagious. In these circumstances, it can both arouse anger at industrial democracies and facili- tate the growth of international crime
NASA Astrophysics Data System (ADS)
McCamey, Rotorua
The current economic and security challenges placed an additional burden on U.S. airlines to provide optimum service at reasonable costs to the flying public. In efforts to stay competitive, U.S. airlines increased foreign-based outsourcing of aircraft major repair and overhaul (MRO) mainly to reduce labor costs and conserve capital. This concentrated focus on outsourcing and restructuring, ignored job dissatisfaction among remaining employees which could reduce and or eliminate an airline's competitiveness. The purpose of this quantitative study was (a) to assess the relationship between increased levels of foreign-based MRO outsourcing and aviation professionals' job satisfaction (Y1); (b) to assess the influence of increased levels of foreign-based outsourcing on MRO control (Y2), MRO error rate (Y3), and MRO technical punctuality (Y4) as perceived by aviation professionals; and (c) to assess the influence of increased levels of foreign-based MRO outsourcing on technical skills (Y5) and morale ( Y6) as perceived by aviation professionals. The survey instrument was utilized based on Paul Spector's Job Satisfaction Questionnaire and MRO specific questions. A random sample of 300 U.S. airline participants was requested via MarketTools to meet required sample size of 110 as determined through a priori power analysis. Study data rendered 198 useable surveys of 213 total responses, and correlation, multiple regression, and ANOVA methods were used to test study hypotheses. The Spearman's rho for (Y 1) was statistically significant, p = .010 and multiple regression was statistically significant, p < .001. A one-way ANOVA indicated participants differed in their opinions of (Y2) through (Y6), Recommendations for future research include contrasting domestic and global MRO providers, and examining global aircraft parts suppliers and aviation technical training.
Ned-Sykes, Renée; Johnson, Catherine; Ridderhof, John C; Perlman, Eva; Pollock, Anne; DeBoy, John M
2015-05-15
These competency guidelines outline the knowledge, skills, and abilities necessary for public health laboratory (PHL) professionals to deliver the core services of PHLs efficiently and effectively. As part of a 2-year workforce project sponsored in 2012 by CDC and the Association of Public Health Laboratories (APHL), competencies for 15 domain areas were developed by experts representing state and local PHLs, clinical laboratories, academic institutions, laboratory professional organizations, CDC, and APHL. The competencies were developed and reviewed by approximately 170 subject matter experts with diverse backgrounds and experiences in laboratory science and public health. The guidelines comprise general, cross-cutting, and specialized domain areas and are divided into four levels of proficiency: beginner, competent, proficient, and expert. The 15 domain areas are 1) Quality Management System, 2) Ethics, 3) Management and Leadership, 4) Communication, 5) Security, 6) Emergency Management and Response, 7) Workforce Training, 8) General Laboratory Practice, 9) Safety, 10) Surveillance, 11) Informatics, 12) Microbiology, 13) Chemistry, 14) Bioinformatics, and 15) Research. These competency guidelines are targeted to scientists working in PHLs, defined as governmental public health, environmental, and agricultural laboratories that provide analytic biological and/or chemical testing and testing-related services that protect human populations against infectious diseases, foodborne and waterborne diseases, environmental hazards, treatable hereditary disorders, and natural and human-made public health emergencies. The competencies support certain PHL workforce needs such as identifying job responsibilities, assessing individual performance, and providing a guiding framework for producing education and training programs. Although these competencies were developed specifically for the PHL community, this does not preclude their broader application to other professionals in a variety of different work settings.
NASA Astrophysics Data System (ADS)
Brown, D.; Vargas, W.; Padilla, E.; Strickland, J.; Echols, E.; Johnson, A.; Williamson Whitney, V.; Ithier-Guzman, W.; Ricciardi, L.; Johnson, A.; Braxton, L.
2011-12-01
Historically, there has been a lack of ethnic and gender diversity in the geo-sciences. The Minorities Striving and Pursuing Higher Degrees of Success in Earth System Science (MS PHD'S) Professional Development Program provides a bridge to young scientists of diverse backgrounds who in turn will impact many. In a process of 3 phases, the program introduces the students to the scientific community through participation in professional and society meetings and networking with scientists and personnel within federal agencies, academic institutions and STEM-based industries. The program builds confidence, offers role models for professional development and provides students support during their education. Upon completion, students achieve a high level of self-actualization and self-esteem combined with individual growth. They become part of a community that continuously provides support and security to each other. This support is tangible through the mentor/mentee relationships which will help with individual growth throughout the mentoring cycle. Having role models and familiar faces to whom mentees can relate to will encourage our students to succeed in the STEM's field. To date, 159 students have participated in the program: 26 have successfully completed their PhD and 56 are currently enrolled in the PhD programs nationwide. The MS PHD'S Program creates a forum of diverse peoples by diverse peoples with diverse interest and strength, where the ongoing goal is to continually raise the bar for each individual. MS PHD'S establishes a nurturing goal-oriented environment for the geo scientist of the future who in turn will make profound contributions on a local, national and global scale. To conclude, MSPHD'S not only bridges the gap of unrepresented minorities in STEM careers, but also generates educational approaches to make the earth system sciences available to more, impacting all.
How to Keep Your Feet Flexible
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...
Osteopathic Medicine: What is a DO?
... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...
Summer Safety Tips - Staying Safe Outdoors
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... Families should attend community fireworks displays run by professionals rather than using fireworks at home. The AAP ...
Professional Development Leadership and the Diverse Learner. Issues in Science Education.
ERIC Educational Resources Information Center
Rhoton, Jack, Ed.; Bowers, Patricia, Ed.
This book focuses on the professional development of teachers and discusses issues related to science education reform. The content of the book is divided into two parts. Part 1, Professional Development: Implications for Science Leadership, chapters include: (1) "The Role of the Science Leader in Implementing Standards-Based Science Programs"…
ERIC Educational Resources Information Center
Levine, Marsha, Ed.; Trachtman, Roberta, Ed.
The 11 chapters in this book are organized into 3 parts. "Part 1: Making Changes at the Core" contains five chapters: (1) "Learning To Teach in Professional Development Schools" (Kenneth Zeichner and Maurine Miller); (2) "'Making It Happen': Creating a Subculture of Mentoring in a Professional Development School"…
Writing for professional publication. Part 4: Supporting your statements.
Fowler, John
Motivation, appropriate content and making good use of the author guidelines were topics covered in the first three articles of this series of writing for professional publication. In this fourth part, John Fowler, an experienced nursing lecturer and author, discusses the importance of avoiding unsupported statements in writing for professional publications.
Self-confidence in financial analysis: a study of younger and older male professional analysts.
Webster, R L; Ellis, T S
2001-06-01
Measures of reported self-confidence in performing financial analysis by 59 professional male analysts, 31 born between 1946 and 1964 and 28 born between 1965 and 1976, were investigated and reported. Self-confidence in one's ability is important in the securities industry because it affects recommendations and decisions to buy, sell, and hold securities. The respondents analyzed a set of multiyear corporate financial statements and reported their self-confidence in six separate financial areas. Data from the 59 male financial analysts were tallied and analyzed using both univariate and multivariate statistical tests. Rated self-confidence was not significantly different for the younger and the older men. These results are not consistent with a similar prior study of female analysts in which younger women showed significantly higher self-confidence than older women.
Power and confidence in professions: lessons for occupational therapy.
Clark, Florence A
2010-12-01
Powerful professions have the capacity to obtain leadership positions, advocate successfully in the policy arena, and secure the resources necessary to achieve their professional goals. Within the occupational therapy profession, cultivating power and confidence among our practitioners is essential to realize our full capacity for meeting society's occupational needs. Drawing from a historical analysis of the medical and nursing professions, this paper discusses the implications of power and disempowerment among health professions for their practitioners, clients, and public image. Theoretical perspectives on power from social psychology, politics, organizational management, and post-structuralism are introduced and their relevance to the profession of occupational therapy is examined. The paper concludes with recommendations for occupational therapy practitioners to analyze their individual sources of power and evaluate opportunities to develop confidence and secure power for their professional work--in venues both in and outside the workplace.
17 CFR 300.503 - Voidable securities transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION CORPORATION Rules Relating to... right of the Securities Investor Protection Corporation, in a direct payment procedure under section 10... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Voidable securities...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2010 CFR
2010-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2014 CFR
2014-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2013 CFR
2013-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2011 CFR
2011-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2012 CFR
2012-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...
PROFESSIONALISM IN THE ARMED FORCES
2017-04-06
basic American values from liberalism to conservatism" to permit " American military leaders to combine the political power which society thrusts upon...and civil societies is psychological more than physical.66 Quoting Epictetus, she notes the Stoic’s assertion "In our power are moral character and...the professional status conferred by the society he secures.6 Thesis In this paper I will analyze the specific failing of Rudolph Höss to meet
[Knowledge of occupational risk in IRCCS of Neurosciences].
Paladino, G; Giuliano, G; Monaco, S; Ottenga, F; Cristaudo, A; Guidi, M; Serretti, N; Talini, D
2002-01-01
A Professional Multicentric Audit, concerning Staff knowledge level about security on workplaces, was conducted by way of a standardized questionnaire given to 1022 (26.4%) IRCCS professional staff pertaining to Neurobiology. Four were the principal tasks of the questionnaire investigating the "sensibility" and "consciousness" concerning risk prevention on workplaces. It came out that there is a great variability in the knowledge level on this field, even if the "medium value" is "pretty good".
Position of the American Dietetic Association: nutrition services in managed care.
Chima, Cinda S; Pollack, Harold A
2002-10-01
It is the position of the American Dietetic Association that medical nutrition therapy is an essential component of disease management and healthcare provided by managed care organizations, and that such care must be provided by qualified nutrition professionals. Compared with traditional fee-for-service reimbursement systems, managed care presents new opportunities for dietetics professionals. Until recently, the lack of billing infrastructure has handicapped nutrition providers who wish to bill for their services and has made it difficult to track the outcomes of nutrition care. With the publication of current procedure terminology codes for medical nutrition therapy (MNT) and the implementation of MNT benefits in Medicare part B for diabetes and nondialysis kidney disease, commercial payers, including managed care organizations (MCOs) are likely to implement or expand their coverage of MNT. A large body of evidence supports the efficacy and cost-effectiveness of MNT coverage within managed care plans. This evidence includes cost analyses of conditions treated by MNT, and clinical trial data confirming the efficacy of MNT in improving patient outcomes. MNT is also an important part of national standards of care for many chronic disease conditions. Based on evidence supporting the role of MNT in improving patient outcomes, the Institute of Medicine (IOM) recommended that MNT services be reimbursed by Medicare when patients are referred by a physician. Provision of appropriate MNT can also help MCOs meet accreditation and quality standards established by entities such as the National Committee for Quality Assurance and the Joint Commission for the Accreditation of Health Care Organizations. Much of the work required to secure a place for MNT in MCOs will be done at the practitioner level, by nutrition professionals themselves. Registered dietitians must market MNT to their customers in managed care by addressing the needs of each player. By emphasizing the importance of MNT and other cost-effective forms of preventive care and disease management, MCOs will be well positioned to improve population health at modest cost.
32 CFR Appendix C to Part 154 - Tables for Requesting Investigations
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Tables for Requesting Investigations C Appendix C to Part 154 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. C Appendix C to Part 154—Tables for...
17 CFR Appendix D to Part 40 - Submission Cover Sheet and Instructions
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Submission Cover Sheet and Instructions D Appendix D to Part 40 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES Pt. 40, App. D Appendix D to Part 40—Submission Cover Sheet and...
17 CFR 210.1-02 - Definitions of terms used in Regulation S-X (17 CFR part 210).
Code of Federal Regulations, 2013 CFR
2013-04-01
... Regulation S-X (17 CFR part 210). 210.1-02 Section 210.1-02 Commodity and Securities Exchanges SECURITIES AND... POLICY AND CONSERVATION ACT OF 1975 Application of Regulation S-X (17 Cfr Part 210) § 210.1-02 Definitions of terms used in Regulation S-X (17 CFR part 210). Unless the context otherwise requires, terms...
17 CFR 210.1-02 - Definitions of terms used in Regulation S-X (17 CFR part 210).
Code of Federal Regulations, 2014 CFR
2014-04-01
... Regulation S-X (17 CFR part 210). 210.1-02 Section 210.1-02 Commodity and Securities Exchanges SECURITIES AND... POLICY AND CONSERVATION ACT OF 1975 Application of Regulation S-X (17 Cfr Part 210) § 210.1-02 Definitions of terms used in Regulation S-X (17 CFR part 210). Unless the context otherwise requires, terms...
17 CFR 210.1-02 - Definitions of terms used in Regulation S-X (17 CFR part 210).
Code of Federal Regulations, 2012 CFR
2012-04-01
... Regulation S-X (17 CFR part 210). 210.1-02 Section 210.1-02 Commodity and Securities Exchanges SECURITIES AND... POLICY AND CONSERVATION ACT OF 1975 Application of Regulation S-X (17 Cfr Part 210) § 210.1-02 Definitions of terms used in Regulation S-X (17 CFR part 210). Unless the context otherwise requires, terms...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
...) of the Social Security Act (the Act). This Ruling is effective as of the issuance date, and addresses..., 1870, 1879 and 1886 of the Social Security Act; 42 CFR Part 405 Subpart I, 411.402, Part 412, 419.21... for withdrawal of pending Part A claim appeals must be sent to the adjudicator with whom the appeal is...
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
37 CFR 5.1 - Applications and correspondence involving national security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...
2011-01-01
Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967
'Ike Wai Professional Development Model for Students and Post-docs
NASA Astrophysics Data System (ADS)
Bruno, B. C.
2016-12-01
'Ike Wai: Securing Hawaii's Water Future, funded by NSF EPSCoR, is an interdisciplinary research collaboration among geophysicists, geochemists, engineers, microbiologists, computational modelers, data scientists and social scientists. Key questions include: How much water is there? How does it flow? How long will it last? Undergraduate students, graduate students and post-docs are actively involved in the research, and their professional development is a key part of the project. An underlying principle is that students assume responsibility for their own learning and professional development. Based on the model created by the NSF Center for Microbial Oceanography: Research and Education (C-MORE) (Bruno et al, 2008; Guannel et al 2014, Bottjer et al 2014), the 'Ike Wai professional development program includes (1) Leadership. Each student and post-doc creates an Individualized Professional Development plan, which includes leadership training (provided by external facilitators) and assuming leadership roles (such as developing and implementing trainings for their peers). (2) EDventures. Based on the C-MORE model, EDventures combines proposal-writing training with the incentive of seed money. Rather than providing training a priori, the EDventures model encourages students and post-docs to write a proposal based on guidelines provided. Training occurs during a two-stage review stage: proposers respond to panel reviews and resubmit their proposal within a single review cycle. C-MORE EDventures alumni self-report statistically significant confidence gains on all questions posed. Their subsequent proposal success is envious: of the 12 proposals submitted by to NSF, 50% were funded. (Wood Charlson & Bruno, 2015) (3) Layered Mentoring Network. All ´Ike Wai participants serve as both mentor and mentee. Students are matched with a non-research mentor in addition to their advisor to promote a holistic approach to career development. They will also serve as mentors to more junior students. All mentors are trained and mentoring relationships are carefully monitored to allow for sharing of best practices and early detection of issues that could adversely impact retention.
ERIC Educational Resources Information Center
Allen, Archibald; Hailey, Pleasant L., Jr.
This instructor's manual contains job analysis and training curriculum for the positions of Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, and Community Security Aide. The two sections of the manual and their parts are as follows: Section I: A Model Curriculum for Resident…
ERIC Educational Resources Information Center
Sanford, Brian A.; McCaslin, N. L.
2004-01-01
This study was designed to describe the frequency of professional development activities provided to part-time occupational and technical program faculty. Additionally, the perceptions of occupational education officers concerning the instructional professional development needs and their appropriate delivery method(s) for these faculty members…
Educating Professionals. Responding to New Expectations for Competence and Accountability.
ERIC Educational Resources Information Center
Curry, Lynn; Wergin, John F.
This book offers a comprehensive examination of the importance of educating professionals for practice in the 21st century and why and how that education needs to differ from the curricula of today. The book contains 13 chapters divided among 3 main parts: part I explores the broad social trends and political forces affecting professionals and…