Sample records for systems security professional

  1. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Job Profiles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  2. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Behavioral Interview Guidelines by Job Roles

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  3. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Individual and Team Performance Guidelines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  4. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  5. [Application of classified protection of information security in the information system of air pollution and health impact monitoring].

    PubMed

    Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun

    2018-01-01

    To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.

  6. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs—Summary Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.

    2013-07-01

    This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

  7. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  8. Ethical Hacking in Information Security Curricula

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  9. A Security Checklist for ERP Implementations

    ERIC Educational Resources Information Center

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  10. The Role Of Moral Awareness In Computer Security

    NASA Astrophysics Data System (ADS)

    Stawinski, Arthur

    1984-08-01

    Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.

  11. Between security and military identities: The case of Israeli security experts.

    PubMed

    Grassiani, Erella

    2018-02-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.

  12. Between security and military identities: The case of Israeli security experts

    PubMed Central

    Grassiani, Erella

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228

  13. 2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)

    DTIC Science & Technology

    2011-08-25

    Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3

  14. Defining the Role of the Professional Security Consultant.

    ERIC Educational Resources Information Center

    Webster, Jim

    2002-01-01

    Discusses the skill set that should be available in security consultants to higher education, including the ability to work with mechanical, architectural, electrical, landscaping, and telecommunications systems. Addresses the need to bring consultants into the building design phase. (EV)

  15. The personal health record paradox: health care professionals' perspectives and the information ecology of personal health record systems in organizational and clinical settings.

    PubMed

    Nazi, Kim M

    2013-04-04

    Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals' accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings.

  16. Physicians' Self-Conceptions of Their Expertise in Statutory Health Insurance and Social Security Systems.

    PubMed

    Seger, Wolfgang; Nüchtern, Elisabeth

    2015-07-01

    Medical experts who practice social medicine have a strong ethical approach for their professional positions. Their reports must reflect an objective, independent, high-quality assessment of interactions between health status and the disability of individuals. However, they must simultaneously consider the societal involvement of these individuals when determining the framework of the Statutory Health Insurance and Social Security Systems. Their task is to recommend sociomedical benefits that are tailored to suit personal needs and that respect the individual life situations of the persons involved, thus complementing the efforts of healthcare professionals in clinical settings. The editorial describes the self-conception of this medical specialty on behalf of the German Society of Social Medicine and Prevention (DGSMP). Policy makers in social insurances and social security systems generally must respect independent sociomedical recommendations as a crucial point for further realistic development activities.

  17. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    DTIC Science & Technology

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  18. Poland since Martial Law

    DTIC Science & Technology

    1988-12-01

    medical services, professional mobility , job security, and education. These were among the "human rights" on which the socialist system was said to be...economic reform is to mean anything, job uncertainty will supersede full employment. Professional mobility , once an important safety valve against worker

  19. 77 FR 31851 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-30

    ... identification, U.S. visa number, FCC point of contact, visitor signature, professional title, organizational... pertinent records, or to another public authority or professional organization, if necessary to obtain... secured by limited access card readers. The computer servers themselves are password-protected. Access to...

  20. Information Sharing for IT Security Professionals

    ERIC Educational Resources Information Center

    Petersen, Rodney J.

    2008-01-01

    Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their long history of collaboration and openness. Information sharing has become part of the national fabric as IT security professionals attempt to secure cyber…

  1. Security and privacy of EHR systems--ethical, social and legal requirements.

    PubMed

    Kluge, Eike-Henner W

    2003-01-01

    This paper addresses social, ethical and legal concerns about security and privacy that arise in the development of international interoperable health information systems. The paper deals with these concerns under four rubrics: the ethical status of electronic health records, the social and legal embedding of interoperable health information systems, the overall information-requirements healthcare as such, and the role of health information professionals as facilitators. It argues that the concerns that arise can be met if the development of interoperability protocols is guided by the seven basic principles of information ethics that have been enunciated in the IMIA Code of Ethics for Health Information Professionals and that are central to the ethical treatment of electronic health records.

  2. An Examination of Information Security Training and Education for IT Professionals in a Community College: A Case Study

    ERIC Educational Resources Information Center

    Stark, Adam

    2017-01-01

    This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…

  3. Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine

    ERIC Educational Resources Information Center

    Bystrova, Bogdana

    2017-01-01

    At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…

  4. Report of the Public Cryptography Study Group.

    ERIC Educational Resources Information Center

    American Council on Education, Washington, DC.

    Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…

  5. 6 CFR 9.15 - Professional and technical services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.15 Section 9.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Own Employees § 9.15 Professional and technical services. (a) The prohibition on the...

  6. 6 CFR 9.23 - Professional and technical services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.23 Section 9.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Other than Own Employees § 9.23 Professional and technical services. (a) The...

  7. Database Systems and Oracle: Experiences and Lessons Learned

    ERIC Educational Resources Information Center

    Dunn, Deborah

    2005-01-01

    In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…

  8. A biometric method to secure telemedicine systems.

    PubMed

    Zhang, G H; Poon, Carmen C Y; Li, Ye; Zhang, Y T

    2009-01-01

    Security and privacy are among the most crucial issues for data transmission in telemedicine systems. This paper proposes a solution for securing wireless data transmission in telemedicine systems, i.e. within a body sensor network (BSN), between the BSN and server as well as between the server and professionals who have assess to the server. A unique feature of this solution is the generation of random keys by physiological data (i.e. a biometric approach) for securing communication at all 3 levels. In the performance analysis, inter-pulse interval of photoplethysmogram is used as an example to generate these biometric keys to protect wireless data transmission. The results of statistical analysis and computational complexity suggest that this type of key is random enough to make telemedicine systems resistant to attacks.

  9. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.

    PubMed

    Griggs, Kristen N; Ossipova, Olya; Kohlios, Christopher P; Baccarini, Alessandro N; Howson, Emily A; Hayajneh, Thaier

    2018-06-06

    As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI) generated by these devices, we propose utilizing blockchain-based smart contracts to facilitate secure analysis and management of medical sensors. Using a private blockchain based on the Ethereum protocol, we created a system where the sensors communicate with a smart device that calls smart contracts and writes records of all events on the blockchain. This smart contract system would support real-time patient monitoring and medical interventions by sending notifications to patients and medical professionals, while also maintaining a secure record of who has initiated these activities. This would resolve many security vulnerabilities associated with remote patient monitoring and automate the delivery of notifications to all involved parties in a HIPAA compliant manner.

  10. Perceptions of health care professionals on the safety and security at Odi District Hospital, Gauteng, South Africa

    PubMed Central

    Okeke, Sunday O.

    2017-01-01

    Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444

  11. Position statement. Restructuring, work redesign, and the job and career security of registered nurses. American Nurses Association.

    PubMed

    1996-01-01

    The American Nurses Association (ANA) is committed to safeguarding the public, protecting and advancing the careers of professional nurses, supporting individual and collective efforts by registered nurses to protect their clients and enhancing the professional development and job security of registered nurses. As the nation's health care system is restructured, ANA is actively engaged in initiatives to strengthen the economic and general welfare of registered nurses, the safety and care for the public, and, in partnership with the state nurses associations (SNAs), oppose efforts to replace registered nurses with inappropriate substitutes.

  12. A web-based communication system for integrated care in cerebral palsy: design features, technical feasibility and usability.

    PubMed

    Gulmans, Jitske; Vollenbroek-Hutten, Miriam M R; Visser, Jacqueline J W; Nijeweme-d'Hollosy, Wendy Oude; van Gemert-Pijnen, J E W C Lisette; van Harten, Wim H

    2010-01-01

    We developed a secure, web-based system for parent-professional and inter-professional communication. The aim was to improve communication in the care of children with cerebral palsy. We conducted a six-month trial of the system in three Dutch health-care regions. The participants were the parents of 30 cerebral palsy patients and 120 professional staff involved in their care. Information about system usage was extracted from the system's database. The experience of the parents and professionals was evaluated by a questionnaire after six months. The system proved to be technically robust and reliable. A total of 21 parents (70%) and 66 professionals (55%) used the system. The parents submitted 111 questions and 59 responses, with a mean of 5 questions (range 1-17) and 3 responses (range 1-9) per parent. The professionals submitted 79 questions and 237 responses, with a mean of 2 questions (range 1-8) and 4 responses (range 1-23) per professional. Most parents (95%) and some professionals (30%) reported value in using the system, which ranged from efficiency and accessibility to flexibility and transparency. The web-based communication system was technically feasible and produced improved parent-professional and inter-professional communication. It may be especially valuable if frequent interventions or consultations about a child's care are required, involving complex care networks of different professionals and organisations.

  13. The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information

    ERIC Educational Resources Information Center

    Johnson, Kenneth T.

    2017-01-01

    Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…

  14. KernPaeP - a web-based pediatric palliative documentation system for home care.

    PubMed

    Hartz, Tobias; Verst, Hendrik; Ueckert, Frank

    2009-01-01

    KernPaeP is a new web-based on- and offline documentation system, which has been developed for pediatric palliative care-teams supporting patient documentation and communication among health care professionals. It provides a reliable system making fast and secure home care documentation possible. KernPaeP is accessible online by registered users using any web-browser. Home care teams use an offline version of KernPaeP running on a netbook for patient documentation on site. Identifying and medical patient data are strictly separated and stored on two database servers. The system offers a stable, enhanced two-way algorithm for synchronization between the offline component and the central database servers. KernPaeP is implemented meeting highest security standards while still maintaining high usability. The web-based documentation system allows ubiquitous and immediate access to patient data. Sumptuous paper work is replaced by secure and comprehensive electronic documentation. KernPaeP helps saving time and improving the quality of documentation. Due to development in close cooperation with pediatric palliative professionals, KernPaeP fulfils the broad needs of home-care documentation. The technique of web-based online and offline documentation is in general applicable for arbitrary home care scenarios.

  15. Inter-organizational future proof EHR systems. A review of the security and privacy related issues.

    PubMed

    van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan

    2009-03-01

    Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.

  16. Warrant Officer Orientation Course (WOOC) Evaluation

    DTIC Science & Technology

    1981-10-01

    Army Mainte- nance Management System, Security Awareness, Organizational Effectiveness, Introduction to Management , Enlisted Personnel Management...Orientation Introduction to Management Professional Ethics USA Officer Evaluation Reporting System (OES) Military Correspondence Military...Organizational Effectiveness, Introduction to Management , Enlisted Personnal Management System, and The Army Functional Files System and The Army

  17. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    NASA Astrophysics Data System (ADS)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  18. How secure is your information system? An investigation into actual healthcare worker password practices.

    PubMed

    Cazier, Joseph A; Medlin, B Dawn

    2006-09-27

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.

  19. How Secure Is Your Information System? An Investigation into Actual Healthcare Worker Password Practices

    PubMed Central

    Cazier, Joseph A; Medlin, B. Dawn

    2006-01-01

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366

  20. An On-Line Information Management System for Resources for Staff Development for the Professional Development Center Network.

    ERIC Educational Resources Information Center

    Monroe, Eula Ewing

    The Professional Development Center Network (PDC), a consortium of twenty public school districts, parochial schools, and Western Kentucky University, seeks to identify and secure resources to assist in the design and delivery of activities appropriate to the educational development of individual staff members through the online Information…

  1. CrossTalk: The Journal of Defense Software Engineering. Volume 22, Number 7, Nov/Dec 2009

    DTIC Science & Technology

    2009-12-01

    an MBA, and is a Certified Corporate Trainer. Booz Allen Hamilton AF PKI SPO 4241 E Piedras DR STE 210 San Antonio,TX 78228 Phone: (210) 925-9129...Certified Secure Software Lifecycle Professional, and a Project Management Professional. General Dynamics C4 Systems AF PKI SPO 4241 E Piedras DR STE 210

  2. Birds of a Feather: Supporting Secure Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Braswell III, H V

    2006-04-24

    Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less

  3. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  4. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  5. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    NASA Astrophysics Data System (ADS)

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  6. Securing health sensing using integrated circuit metric.

    PubMed

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  7. Securing Health Sensing Using Integrated Circuit Metric

    PubMed Central

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  8. An exploratory risk perception study of attitudes toward homeland security systems.

    PubMed

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  9. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    PubMed

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  10. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Happenny, Sean F.

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less

  12. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    ERIC Educational Resources Information Center

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  13. Ways to Improve DoD 8570 IY Security Certification

    ERIC Educational Resources Information Center

    Bates, Justin D.

    2017-01-01

    The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…

  14. The Personal Health Record Paradox: Health Care Professionals’ Perspectives and the Information Ecology of Personal Health Record Systems in Organizational and Clinical Settings

    PubMed Central

    2013-01-01

    Background Despite significant consumer interest and anticipated benefits, overall adoption of personal health records (PHRs) remains relatively low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications for health care professionals and organizational delivery systems; however, these have received less attention. An exclusive focus on the PHR as a tool for consumer empowerment does not adequately take into account the social and organizational context of health care delivery, and the reciprocal nature of patient engagement. Objective The purpose of this study was to examine the experiences of physicians, nurses, and pharmacists at the Department of Veterans Affairs (VA) using an organizationally sponsored PHR to develop insights into the interaction of technology and processes of health care delivery. The conceptual framework for the study draws on an information ecology perspective, which recognizes that a vibrant dynamic exists among technologies, people, practices, and values, accounting for both the values and norms of the participants and the practices of the local setting. The study explores the experiences and perspectives of VA health care professionals related to patient use of the My HealtheVet PHR portal and secure messaging systems. Methods In-depth interviews were conducted with 30 VA health care professionals engaged in providing direct patient care who self-reported that they had experiences with at least 1 of 4 PHR features. Interviews were transcribed, coded, and analyzed to identify inductive themes. Organizational documents and artifacts were reviewed and analyzed to trace the trajectory of secure messaging implementation as part of the VA Patient Aligned Care Team (PACT) model. Results Study findings revealed a variety of factors that have facilitated or inhibited PHR adoption, use, and endorsement of patient use by health care professionals. Health care professionals’ accounts and analysis of organizational documents revealed a multidimensional dynamic between the trajectory of secure messaging implementation and its impact on organizational actors and their use of technology, influencing workflow, practices, and the flow of information. In effect, secure messaging was the missing element of complex information ecology and its implementation acted as a catalyst for change. Secure messaging was found to have important consequences for access, communication, patient self-report, and patient/provider relationships. Conclusions Study findings have direct implications for the development and implementation of PHR systems to ensure adequate training and support for health care professionals, alignment with clinical workflow, and features that enable information sharing and communication. Study findings highlight the importance of clinician endorsement and engagement, and the need to further examine both intended and unintended consequences of use. This research provides an integral step toward better understanding the social and organizational context and impact of PHR and secure messaging use in clinical practice settings. PMID:23557596

  15. A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment

    NASA Astrophysics Data System (ADS)

    Ula, M.; Ula, M.; Fuadi, W.

    2017-02-01

    As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.

  16. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  17. Social-Strata-Related Cardiovascular Health Disparity and Comorbidity in an Aging Society: Implications for Professional Care

    ERIC Educational Resources Information Center

    Ai, Amy L.; Carrigan, Lynn T.

    2007-01-01

    Cardiovascular disease (CVD) is on the rise in the aging population of the United States. Heart disease is the leading cause of death, hospital bed use, and social security disability. Enhancing knowledge about CVD may improve social work's professional role in the health care system. This article focuses on a pressing CVD-related issue that needs…

  18. Marketing and reputation aspects of neonatal safeguards and hospital-security systems.

    PubMed

    Smith, Alan D

    2009-01-01

    Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.

  19. Usage of insecure E-mail services among researchers with different scientific background.

    PubMed

    Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago

    2011-08-01

    Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.

  20. Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2014-02-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.

  1. 76 FR 22911 - National Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... discussions on professionalism of emergency management, approaches for National Incident Management System... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2007-0008] National Advisory Council AGENCY: Federal Emergency Management Agency, DHS. ACTION: Committee Management...

  2. Ethics Certification of Health Information Professionals.

    PubMed

    Kluge, Eike-Henner; Lacroix, Paulette; Ruotsalainen, Pekka

    2018-04-22

     To provide a model for ensuring the ethical acceptability of the provisions that characterize the interjurisdictional use of eHealth, telemedicine, and associated modalities of health care deliveiy that are currently in place.  Following the approach initiated in their Global Protection of Health Data project within the Security in Health Information Systems (SiHIS) working group of the International Medical Informatics Association (IMIA), the authors analyze and evaluate relevant privacy and security approaches that are intended to stem the erosion of patients' trustworthiness in the handling of their sensitive information by health care and informatics professionals in the international context.  The authors found that while the majority of guidelines and ethical codes essentially focus on the role and functioning of the institutions that use EHRs and information technologies, little if any attention has been paid to the qualifications of the health informatics professionals (HIPs) who actualize and operate information systems to deal with or address relevant ethical issues.  The apparent failure to address this matter indicates that the ethical qualification of HIPs remains an important security issue and that the Global Protection of Health Data project initiated by the SiHIS working group in 2015 should be expanded to develop into an internationally viable method of certification. An initial model to this effect is sketched and discussed. Georg Thieme Verlag KG Stuttgart.

  3. 76 FR 1507 - Departmental Offices; Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-10

    ... governmental, Tribal, self-regulatory or professional organizations if that organization has jurisdiction over... or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether...

  4. Collaboration between civilian and military healthcare professionals: a better way for planning, preparing, and responding to all hazard domestic events.

    PubMed

    Marklund, LeRoy A; Graham, Adrienne M; Morton, Patricia G; Hurst, Charles G; Motola, Ivette; Robinson, Donald W; Kelley, Vivian A; Elenberg, Kimberly J; Russler, Michael F; Boehm, Daniel E; Higgins, Dawn M; McAndrew, Patrick E; Williamson, Hope M; Atwood, Rodney D; Huebner, Kermit D; Brotons, Angel A; Miller, Geoffrey T; Rimpel, Laukton Y; Harris, Larry L; Santiago, Manuel; Cantrell, LeRoy

    2010-01-01

    Collaboration is used by the US National Security Council as a means to integrate inter-federal government agencies during planning and execution of common goals towards unified, national security. The concept of collaboration has benefits in the healthcare system by building trust, sharing resources, and reducing costs. The current terrorist threats have made collaborative medical training between military and civilian agencies crucial. This review summarizes the long and rich history of collaboration between civilians and the military in various countries and provides support for the continuation and improvement of collaborative efforts. Through collaboration, advances in the treatment of injuries have been realized, deaths have been reduced, and significant strides in the betterment of the Emergency Medical System have been achieved. This review promotes collaborative medical training between military and civilian medical professionals and provides recommendations for the future based on medical collaboration.

  5. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  6. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  7. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

  8. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  9. SocialRAD: an infrastructure for a secure, cooperative, asynchronous teleradiology system.

    PubMed

    Figueiredo, João Filho Matos; Motta, Gustavo Henrique Matos Bezerra

    2013-01-01

    The popularity of teleradiology services has enabled a major advance in the provision of health services to areas with difficult geographical access. However, this potential has also brought with it a number of challenges: the large volume of data, characteristic of imaging tests, and security requirements designed to ensure confidentiality and integrity. Moreover, there is also a number of ethical questions involving the dominant model on the market, whereby this service is outsourced to private companies, and is not directly undertaken by professional radiologists. Therefore, the present paper proposes a cooperative model of teleradiology, where health professionals interact directly with the hospitals providing patient care. This has involved the integration of a wide range of technologies, such as the interconnection models Peer-to-Peer, Cloud Computing, Dynamic DNS, RESTful Web Services, as well as security and interoperability standards, with the aim of promoting a secure, collaborative asynchronous environment. The developed model is currently being used on an experimental basis, providing teleradiology support to cities in the north-eastern hinterland of Brazil, and is fulfilling all expectations.

  10. High-end Home Firewalls CIAC-2326

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W

    Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managersmore » have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.« less

  11. Conception of a course for professional training and education in the field of computer and mobile forensics

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2012-06-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.

  12. What Are the Professional, Political, and Ethical Challenges of Co-Creating Health Care Systems?

    PubMed

    Singh, Guddi; Owens, John; Cribb, Alan

    2017-11-01

    Co-creation is seen by many as a means of meeting the multiple challenges facing contemporary health care systems by involving institutions, professionals, patients, and stakeholders in new roles, relationships, and collaborative practices. While co-creation has the potential to positively transform health care systems, it generates a number of political and ethical challenges that should not be overlooked. We suggest that those involved in envisioning and implementing co-creation initiatives pay close attention to significant questions of equity, power, and justice and to the fundamental challenge of securing a common vision of the aims of and agendas for health care systems. While such initiatives present significant opportunities for improvement, they need to be viewed in light of their accompanying professional, political, and ethical challenges. © 2017 American Medical Association. All Rights Reserved.

  13. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications

    NASA Astrophysics Data System (ADS)

    Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

    Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship.more » The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.« less

  15. Measuring Human Performance within Computer Security Incident Response Teams

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less

  16. Indirect effect of management support on users' compliance behaviour towards information security policies.

    PubMed

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management-user values and the nature of compliance towards ISPs among selected health professionals, this study has made a unique contribution to the literature.

  17. Matching Community and Technical College Professional/Technical Education Capacity to Employer Demand. Final Report.

    ERIC Educational Resources Information Center

    Sommers, Paul; Heg, Deena

    A project was conducted to improve the state of Washington's community and technical college system by developing and using an improved occupational forecasting system to assess and respond to education and training needs. First, long-term occupational forecast data from Washington's Employment Security Department were matched with technical and…

  18. A secure mobile multimedia system to assist emergency response teams.

    PubMed

    Belala, Yacine; Issa, Omneya; Gregoire, Jean-Charles; Wong, James

    2008-08-01

    Long wait times after injury and greater distances to travel between accident scenes and medical facilities contribute to increased, possibly unnecessary deaths. This paper describes a mobile emergency system aimed at reducing mortality by improving the readiness of hospital personnel, therefore allowing for more efficient treatment procedures to be performed when the victim arrives. The system is designed to provide a secure transmission of voice, medical data, and video in real-time over third-generation cellular networks. Test results obtained on a commercial network under real-life conditions demonstrate the ability to effectively transmit medical data over 3G networks, making them a viable option available to healthcare professionals.

  19. Draft secure medical database standard.

    PubMed

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  20. [Changes in workers' rehabilitation procedures under the Brazilian social security system: modernization or undermining of social protection?].

    PubMed

    Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari

    2008-11-01

    This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.

  1. Variety and evolution of American endoscopic image management and recording systems.

    PubMed

    Korman, L Y

    1996-03-01

    The rapid evolution of computing technology has and will continue to alter the practice of gastroenterology and gastrointestinal endoscopy. Development of communication standards for text, images, and security systems will be necessary for medicine to take advantage of high-speed computing and communications. Professional societies can have an important role in guiding the development process.

  2. Trade Secret Law and Information Systems: Can Your Students Keep a Secret?

    ERIC Educational Resources Information Center

    Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L.

    2011-01-01

    The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…

  3. Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI

    NASA Astrophysics Data System (ADS)

    Zúquete, André; Gomes, Helder; Cunha, João Paulo Silva

    This paper describes the design and implementation of an e-Health authentication architecture using smartcards and a PKI. This architecture was developed to authenticate e-Health Professionals accessing the RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals' credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short-lived certificates and cross-certification agreements between RTS and e-Health institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional's role at their home institution for role-based authorization. Trust agreements between e-Health institutions and RTS are necessary in order to make the certificates recognized by the RTS. As a proof of concept, a prototype was implemented with Windows technology. The presented authentication architecture is intended to be applied to other medical telematic systems.

  4. Why nurses can be key partners in securing philanthropic investments.

    PubMed

    Rivet, Nicole

    2014-01-01

    Fund-raisers can truly benefit from collaborating with nurses when they are seeking philanthropic support for their health care systems. Fund-raising is about developing new relationships with potential prospects and strengthening those with current donors. Nurses frequently have some of the best relationships with patients, and they often lead efforts to improve the quality of care in their hospitals. Their professional experience and their ability to connect with people are invaluable skills that can help secure philanthropic investments.

  5. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    PubMed

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  6. [Evaluation of health system decentralization and reform of the Social Security system in Colombia].

    PubMed

    Jaramillo, I

    2002-01-01

    The aim of this study is to present the results of the reforms in the health sector that have taken place in Colombia since 1990. These reforms replaced the previous national health system and the so-called Bismarkian social security system. The new system has three basic characteristics: a) the public subsidies are decentralized in the municipalities and territorial departments; b) the public hospitals have been converted into state social enterprises, which has led them towards a management model, and c) the health and social security system monopoly has been abolished and a system of health subsidies has been created for the poorest citizens. This article systematically collects secondary information extracted from the most important studies evaluating the health sector reforms in Colombia. The present author participated in some of these studies. The reforms have increased financial resources, which, has led to an increase in public system staff and their salaries. The availability of hospitals' budgetary resources has increased and the social security system has become wider, including 20% of the poorest population who have benefited from subsidies on demand. Ease of access and equity in the health system have significantly improved. However, indicators of public health have fallen and health professionals are critical of a system based on mediation, which increases transaction costs.

  7. Role of the U.S. Military in the Professionalization of the Armed Forces of Liberia

    DTIC Science & Technology

    2015-06-12

    professionalizing the AFL. The GEF states, “Partner nations provide for their own security, contribute effectively to broader regional or global security...facilitates the development of important professional and personal relationships that effectively strengthen military alliances and the international...Forces of Liberia (AFL) presents a developing opportunity to contribute to the broader U.S. interests. However, in order to ensure stability within

  8. Commitment to nursing: results of a qualitative interview study.

    PubMed

    Gould, Dinah; Fontenla, Marina

    2006-04-01

    The aims of the study were to explore opportunities to undergo continuing professional education, family friendly policy and holding an innovative or traditional post on nurses' job satisfaction and professional and organizational commitment. Qualified nurses have become a scare resource in the National Health Service. Managers need to be aware of the work-related factors most likely to secure nurses' professional and organizational commitment which will contribute to the retention. Commitment is thought to be increased if opportunities for continuing professional education are good. Family friendly policy is also important. Less is known about the relationship between type of nursing work and commitment. An in-depth, exploratory approach to data collection were taken, employing an interview guide with open-ended questions. Data were collected with 27 nurses in clinical grades in two contrasting trusts. Family friendly policies emerged as most important in securing nursing commitment. Those in innovative posts whose work entailed social hours and greater professional autonomy also displayed greater levels of job satisfaction. Opportunities for continuing professional education had less influence on professional and organizational commitment. Providing flexible or social working hours appears to be more influential than providing opportunities for continuing professional education in securing nursing commitment in this exploratory study.

  9. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    PubMed

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  10. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  11. Dual Loyalty in Prison Health Care

    PubMed Central

    Stöver, Heino; Wolff, Hans

    2012-01-01

    Despite the dissemination of principles of medical ethics in prisons, formulated and advocated by numerous international organizations, health care professionals in prisons all over the world continue to infringe these principles because of perceived or real dual loyalty to patients and prison authorities. Health care professionals and nonmedical prison staff need greater awareness of and training in medical ethics and prisoner human rights. All parties should accept integration of prison health services with public health services. Health care workers in prison should act exclusively as caregivers, and medical tasks required by the prosecution, court, or security system should be carried out by medical professionals not involved in the care of prisoners. PMID:22390510

  12. 77 FR 12635 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    .... Securities Offering. Series 86 Research Analyst--Analysis..... From $160 to $175. Series 87 Research Analyst... Order Processing Assistant Representatives, Research Analysts and Operations Professionals, respectively... examination.\\7\\ \\6\\ PROCTOR is a computer system that is specifically designed for the administration and...

  13. Issues and Challenges Facing the Minority Woman Dentist.

    ERIC Educational Resources Information Center

    Sinkford, Jeanne C.

    1992-01-01

    The status of minority women dentists is reviewed, and initiatives to improve it are noted. Issues and challenges for African-American female dentists are outlined, including negative racial/gender stereotypes, lack of advancement opportunities, difficulties in starting practices and securing professional and social support systems, lack of…

  14. Deception Using an SSH Honeypot

    DTIC Science & Technology

    2017-09-01

    the device itself but also the device’s cloud and mobile infrastructure. This increase in unsecured devices connected to the Internet presents...have SSH enabled on their systems without knowledge that this service is running. Computer -security professionals use several techniques to gain...early 2000s. Honeypots are decoy computer systems intended for no other purpose than to collect data on attackers. They gather information about

  15. Is emergency management an integrated element of business continuity management? A case study with security professionals in Western Australia.

    PubMed

    Frohde, Kenny; Brooks, David J

    Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.

  16. Security auditing: a prescription for keeping protection programs healthy.

    PubMed

    Luizzo, Anthony

    2010-01-01

    The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.

  17. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eipeldauer, Mary D; Shelander Jr, Bruce R

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less

  18. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  19. OS friendly microprocessor architecture: Hardware level computer security

    NASA Astrophysics Data System (ADS)

    Jungwirth, Patrick; La Fratta, Patrick

    2016-05-01

    We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.

  20. 77 FR 21587 - Bayer Cropscience, LP, Including On-Site Leased Workers From Jacobs PSG, Middough Associates, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-10

    ...., Digital Management Group, Mercury Air Group, Inc., Greenwood, and Professional Maintenance of Charleston... Solutions, Becht Engineering, Engineering Support Systems, Manufacturing Management Services, US Securities, WB Wells, Belcan, American Engineers, CH2M Hill Engineers, Inc., Digital Management Group, Mercury...

  1. Fostering next gen skills and communities of interest: Role of professional societies

    USDA-ARS?s Scientific Manuscript database

    Advancing toward the U.N. Millennium Development Goal to eradicate extreme poverty and hunger for a growing population will require the world’s agriculture to increase global food, feed, fiber, and fuel production on existing farmland with agricultural systems that enable food security; use resource...

  2. [Early prenatal interview: implementation of a sheet link "carried" by patient. The Aurore perinatal network experience].

    PubMed

    Dupont, C; Gonnaud, F; Touzet, S; Luciani, F; Perié, M-A; Molenat, F; Evrard, A; Fernandez, M-P; Roy, J; Rudigoz, R-C

    2008-11-01

    Early prenatal interview has needed the implementation of a new communication tool between follow-up pregnancy professionals: a link sheet filled and carried by patients. To assess the utilization of link sheet by trained professionals, the contribution of the interview and the patient acceptation of the link sheet. Descriptive survey from the database of link sheets returned by professionals to Aurore perinatal network and semi-guided interviews with 100 randomized patients. One thousand one hundred and nineteen link sheets were sent to Aurore perinatal network by 55 professionals out of 78 trained. For primipare, precocious prenatal interview contribution has concerned health care security (60%) and emotional security (56%). For multipare, this contribution has concerned mainly emotional security (80%). No interviewed patient has refused link sheet principle. Link sheet principle, like implemented by Aurore perinatal network, seems pertinent to professionals and patients but it constitutes only one of the elements of network elaboration of personalized care.

  3. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems;more » (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.« less

  4. The hobbyist phenomenon in physical security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michaud, E. C.

    Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less

  5. Index of cyber integrity

    NASA Astrophysics Data System (ADS)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  6. Fiscal Year 2014 Annual Report on BNLs Next Generation Safeguards Initiative Human Capital Development Activities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pepper, Susan E.

    2014-10-10

    Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.

  7. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    PubMed

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  8. Facilitating Secure Sharing of Personal Health Data in the Cloud.

    PubMed

    Thilakanathan, Danan; Calvo, Rafael A; Chen, Shiping; Nepal, Surya; Glozier, Nick

    2016-05-27

    Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors.

  9. A Portable Computer Security Workshop

    ERIC Educational Resources Information Center

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  10. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    PubMed

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  11. Video calls from lay bystanders to dispatch centers - risk assessment of information security

    PubMed Central

    2011-01-01

    Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387

  12. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    PubMed

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  13. Electronic Medical Records in Greece and Oman: A Professional's Evaluation of Structure and Value.

    PubMed

    Koutzampasopoulou Xanthidou, Ourania; Shuib, Liyana; Xanthidis, Dimitrios; Nicholas, David

    2018-06-01

    An Electronic Medical Record (EMR) is a patient's database record that can be transmitted securely. There are a diversity of EMR systems for different medical units to choose from. The structure and value of these systems is the focus of this qualitative study, from a medical professional's standpoint, as well as its economic value and whether it should be shared between health organizations. The study took place in the natural setting of the medical units' environments. A purposive sample of 40 professionals in Greece and Oman, was interviewed. The study suggests that: (1) The demographics of the EMR should be divided in categories, not all of them accessible and/or visible by all; (2) The EMR system should follow an open architecture so that more categories and subcategories can be added as needed and following a possible business plan (ERD is suggested); (3) The EMR should be implemented gradually bearing in mind both medical and financial concerns; (4) Sharing should be a patient's decision as the owner of the record. Reaching a certain level of maturity of its implementation and utilization, it is useful to seek the professionals' assessment on the structure and value of such a system.

  14. Self port scanning tool : providing a more secure computing Environment through the use of proactive port scanning

    NASA Technical Reports Server (NTRS)

    Kocher, Joshua E; Gilliam, David P.

    2005-01-01

    Secure computing is a necessity in the hostile environment that the internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world, These network ports are essentially the doorways from the internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid System Administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a website where SAs and Users can request a port scan of their computer. The results are then emailed to the requestor. This tool aids Users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or backdoors, and what ports can be closed.

  15. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  16. A secure EHR system based on hybrid clouds.

    PubMed

    Chen, Yu-Yi; Lu, Jun-Chao; Jan, Jinn-Ke

    2012-10-01

    Consequently, application services rendering remote medical services and electronic health record (EHR) have become a hot topic and stimulating increased interest in studying this subject in recent years. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. Sharing EHR information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. With the widespread use of EHR, building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructures for facilitating EHR sharing and EHR integration. In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.

  17. Systems Engineering: From Dream to Reality

    DTIC Science & Technology

    2011-04-01

    at the 23rd Systems and Software Technology Conference (SSTC), 16-19 May 2011, Salt Lake City, UT. Sponsored in part by the USAF. U.S. Government or...Simulation, and Enterprise Security. Prior to this, he was Senior Research Scientist and Principal Member of the Technical Staff at AEgis Technologies ...Software Professional Development Program at AFIT He was a consultant for . the Software Technology Support Center for six years. Dr. Cook has a

  18. Making Technology Work for Campus Security

    ERIC Educational Resources Information Center

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  19. Education and training in the MEDICOM system.

    PubMed

    Marinos, G; Palamas, S; Vlachos, I; Panou-Diamandi, O; Kalivas, D; Koutsouris, D

    2000-01-01

    MEDICOM system is a world wide telematics application for electronic commerce of medical devices. It has been designed so as to provide the health care professionals with a central Internet access to up-to-date information about medical equipment from multiple manufacturers, in a particular easy and friendly way. Moreover, the Medicom system will serve the health care professionals' requirements for high-quality information about specific products in a form of multimedia presentations and that of a secure communication channel with the community of manufacturers, especially for post marketing surveillance. The system will provide the medical staff (physicians and technicians) with demonstrations of the operation procedures and the functioning of high-tech equipment in a form of virtual models. Moreover, through the medicom system the end users of medical devices can have access to on line libraries and participate in special newsgroups. This paper discusses the architectural structure of the MEDICOM system with emphasis to its educational and training functionality.

  20. Women's experiences with healthcare professionals after suffering from gender-based violence: An interview study.

    PubMed

    Wallin Lundell, Inger; Eulau, Louise; Bjarneby, Frida; Westerbotn, Margareta

    2018-03-01

    This study sought to describe how women in Mexico who have suffered from gender-based violence experience their encounters with healthcare professionals. Gender-based violence is a worldwide problem. Previous studies have described that women feel they are not being cared for appropriately during their encounters with healthcare professionals. This study was conducted in Mexico, which has a high rate of gender inequality. A descriptive, qualitative study was conducted. Face-to-face interviews were conducted with seven women. An inductive content analysis was used to analyse the interviews. The analyses resulted in four categories: Feelings of guilt about being abused, Feelings of being unimportant, Feelings of taking time and Feelings of being insecure/secure. The women emphasised the importance of healthcare professionals taking time out of their busy schedules for them. When they treated the women with respect and genuine interest, the women felt secure. When the healthcare professionals did not meet these expectations, feelings of frustration and mistrust were elicited. Feelings of being listened to and safety were considered important aspects in a positive encounter, whereas feeling a lack of time or interest often led to negative experiences such as frustration with and distrust of the healthcare system. These results imply that healthcare professionals may have deficiencies with regard to how these women are treated because these women do not feel that they receive the proper support. Education regarding how to approach women who have suffered from gender-based violence is essential for healthcare professionals to establish respectful encounters. The findings of this study stress that relatively simple efforts such as listening to these women's stories and providing them with genuine attention might substantially improve care. © 2017 John Wiley & Sons Ltd.

  1. Using Information Technologies in Professional Training of Future Security Specialists in the USA, Great Britain, Poland and Israel

    ERIC Educational Resources Information Center

    Kyslenko, Dmytro

    2017-01-01

    The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…

  2. Analyzing commercial flight crewmember perceptions' regarding airline security effectiveness, morale, and professionalism

    NASA Astrophysics Data System (ADS)

    Belanger, James Durham

    Since the formation of the Transportation Security Administration (TSA) following the September 11, 2001 terrorist's attacks few studies involving commercial flight crewmember perceptions' of the organization's efficacy have been conducted, nor has there been any research into the effects on crewmember morale and professionalism resulting from their interactions with the TSA. This researcher surveyed 624 flight crewmembers, using a multiple-choice instrument to ascertain both their perceptions of TSA effectiveness involving an array of security issues, in addition to how crewmember interactions with the TSA may have affected their morale and professionalism. A 2-sample t-test measured the difference in the means of pilots and flight attendants regarding the study's scope, as did 2-way ANOVA and Tukey HSD comparisons, which factored in gender. The study found that crewmembers indicated some confidence in the areas of passenger and baggage screening and the Armed Pilot Program, with less confidence regarding ancillary personnel screening, airport perimeter security, and in both crewmember anti-terrorist training and human error issues. Statistical testing indicated varying differences in sample means concerning all study related issues. Finally, crewmembers indicated some effects on morale and professionalism, with a majority indicating a negative effect on both.

  3. Securing food from field to table: what can we do?

    PubMed

    Li, Duo; Wahlqvist, Mark L

    2011-01-01

    Food security has emerged as one of the most pressing socio-economic and health issues of our time. While the formal processes of international and national governance are short-changing the need for action, an increasing number of professional science-based organisations are rallying to reduce the presence and risks of food insecurity. Examples are the Food in Health Security Network (FIHS) for the Asia Pacific region and the 'Healthy Agriculture, Healthy Nutrition, Healthy People’ initiative of the World Council on Genetics, Nutrition and Fitness for Health. The common denominator is the threat to ecosytems which are intrinsic to food and health systems. To increase their prospects for sustainability and health promotion, coordinated partnerships between agriculture and health as well as other sectors are imperative.

  4. A Unified Approach to Information Security Compliance

    ERIC Educational Resources Information Center

    Adler, M. Peter

    2006-01-01

    The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…

  5. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    PubMed

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  6. Cyber-Security Concerns Mount as Student Hacking Hits Schools: Districts Straining to Safeguard Online Networks

    ERIC Educational Resources Information Center

    Borja, Rhea R.

    2006-01-01

    While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…

  7. Are personal health records safe? A review of free web-accessible personal health record privacy policies.

    PubMed

    Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-08-23

    Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.

  8. Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies

    PubMed Central

    Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    Background Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information. Objective To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. Methods We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. Results The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users’ accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Conclusions Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low. PMID:22917868

  9. Design and Implementation of Mobile Learning System for Soldiers’ Vocational Skill Identification Based on Android

    NASA Astrophysics Data System (ADS)

    Ma, Jinqiang

    2017-09-01

    To carry out the identification of the professional skills of the soldiers is to further promote the regularization of the needs of the fire brigade, in accordance with the “public security active forces soldiers professional skills identification implementation approach” to meet the needs of candidates for mobile learning to solve the paper learning materials bring a lot of inconvenience; This article uses the Android technology to develop a set of soldiers professional skills Identification Theory learning app, the learning software based on mobile learning, learning function is perfect, you can learn to practice, to achieve the goal of learning at any time, to enhance the soldier's post ability has a good practical value.

  10. 7 CFR 1940.336 - Contracting for professional services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Contracting for professional services. 1940.336... Contracting for professional services. (a) Assistance from outside experts and professionals can be secured... conflict of interest, contractors competing for the work will be required to execute a disclosure statement...

  11. Evolving the Role of Campus Security

    ERIC Educational Resources Information Center

    May, Vern

    2008-01-01

    One of the problems security professionals see in security is that there are few benchmarks to quantify the effectiveness of proactive security initiatives. This hurts them with funding support and also with ensuring community buy-in outside of crisis situations. The reactive nature of many institutions makes it difficult to move forward with…

  12. Exploring the Educational Needs of the Homeland Security Community

    ERIC Educational Resources Information Center

    France, Paul

    2012-01-01

    This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…

  13. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less

  14. Supervisory Control and Data Acquisition (SCADA) Security Awareness In a Resource Constrained Learning Environment

    DTIC Science & Technology

    2014-06-16

    SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their

  15. Defense R and D Issues: Their Importance in Long-Range Strategic Planning

    DTIC Science & Technology

    1975-06-01

    of negative worth to the national security ( money is wasted--needless anxiety--and matching or offsetting systems are purchased abroad). On the other... counterfeit tradeaway chips should not be developed and deployed. If a weapon system has no substantial potential strategic and/ or political worth to...professional Washington-watahers in Moscow must be presumed to be capable of distinguishing between an index of interest (large sums of money devoted to the

  16. Purdue University graduate certificate program in Veterinary Homeland Security.

    PubMed

    Amass, Sandra F; Blossom, Thaddaeus D; Ash, Marianne; McCay, Don; Mattix, Marc E

    2008-01-01

    Our nation lacks a critical mass of professionals trained to prevent and respond to food- and animal-related emergencies. Training veterinarians provides an immediate means of addressing this shortage of experts. Achievement of critical mass to effectively address animal-related emergencies is expedited by concurrent training of professionals and graduate students in related areas. Purdue University offers a Web-based Graduate Certificate in Veterinary Homeland Security to address this special area of need. The program is a collaborative effort among the Purdue University School of Veterinary Medicine, the Purdue Homeland Security Institute, the Indiana State Board of Animal Health, the Indiana State Police, and others with the overall goal of increasing capacity and preparedness to manage animal-related emergencies. Individuals with expertise in veterinary medicine, public health, animal science, or homeland security are encouraged to participate. The Web-based system allows courses to be delivered efficiently and effectively around the world and allows participants to continue their graduate education while maintaining full-time jobs. Participants enhance their understanding of natural and intentional threats to animal health, strengthen their skills in managing animal-health emergencies, and develop problem-solving expertise to become effective members of animal emergency response teams and of their communities. Students receive graduate credit from Purdue University that can be used toward the certificate and toward an advanced graduate degree. Currently, 70 participants from 28 states; Washington, DC; Singapore; and Bermuda are enrolled.

  17. Analysis of health professional security behaviors in a real clinical setting: an empirical study.

    PubMed

    Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis

    2015-06-01

    The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. [Secure e-mail between physicians--aspect of a telemedicine platform for the health care system].

    PubMed

    Goetz, C F

    2001-10-01

    Ever since the Roland-Berger-Study in 1997, the concept of a "telematics platform" for health care describes the combination of all technical and organizational components and services for the online transmission of patient data. This platform works on an interoperable collection of standards for addressing, security and content-description. In this context the security for application and transport data is based on data protection as well as medical non-disclosure rules. The methods of cryptography can provide security services for data transmitted realizing addressed, direct and indirect privacy. The first German health professional card, the electronic physicians' ID, provides central tools for such applications. First functionally simple pilot projects will prove the effectiveness of chosen methods in this year, even if not all identified construction sites in health care telematics have yet been lead towards a finalized solution.

  19. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  20. Implementing an electronic medication overview in Belgium.

    PubMed

    Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree

    2014-12-16

    An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.

  1. REGULATION OF AUSTRALIAN MEDICAL PROFESSIONALS AND NATIONAL SECURITY: LESSONS FROM THREE CASE STUDIES.

    PubMed

    Faunce, Thomas; McKenna, Michael; Rayner, Johanna; Hawes, Jazmin

    2016-03-01

    In recent times, Australia's national security concerns have had controversial impacts on regulation of Australian medical practitioners in areas related to immigration detention. This column explores three recent case studies relevant to this issue. The first involves the enactment of the Australian Border Force Act 2015 (Cth), which has a significant impact on the regulation of medical professionals who work with people in immigration detention. The second involves the decision of the High Court of Australia in Plaintiff M68/2015 v Minister for Immigration and Border Protection [2016] HCA 1 that an amendment to Australian federal legislation justified sending children back to immigration detention centres in Papua New Guinea and Nauru. This legislation was previously heavily criticised by the Australian Human Rights Commissioner. The third concerns the deregistration of Tareq Kamleh, an Australian doctor of German-Palestinian heritage who came to public attention on ANZAC Day 2015 with his appearance online in a propaganda video for the Islamic State terrorist organisation al-Dawla al-Islamyia fil Iraq wa'al Sham, also known as Islamic State of Iraq and Syria (ISIS) or Daesh. Australia's professional regulatory system should presumptively respect professional virtues, such as loyalty to the relief of individual patient suffering, when dealing with doctors (whether in Australia or ISIS-occupied Syria) working under regimes whose principles appear inconsistent with those of ethics and human rights.

  2. Advancing the chronic care road map: a contemporary overview.

    PubMed

    Ahmed, Sara; Gogovor, Amede; Kosseim, Mylene; Poissant, Lise; Riopelle, Richard; Simmonds, Maureen; Krelenbaum, Marilyn; Montague, Terrence

    2010-01-01

    In an effort to assess and advance the community-based model of chronic care, we reviewed a contemporary spectrum of Canadian chronic disease management and prevention (CDMP) programs with a participatory audience of administrators, academics, professional and non-professional providers and patients. While many questions remain unanswered, several common characteristics of CDMP success were apparent. These included community-based partnerships with aligned goals; inter-professional and non-professional care, including patient self-management; measured and shared information on practices and outcomes; and visible leadership. Principal improvement opportunities identified were the enhanced engagement of all stakeholders; further efficacy evidence for team care; facile information systems, with clear rationales for data selection, access, communication and security; and increased education of, and resource support for, patients and caregivers. Two immediate actions were suggested. One was a broad and continuing communication plan highlighting CDMP issues and opportunities. The other was a standardized survey of team structures, interventions, measurements and communications in ongoing CDMP programs, with a causal analysis of their relation to outcomes. In the longer term, the key needs requiring action were more inter-professional education of health human resources and more practical information systems available to all stakeholders. Things can be better.

  3. Implementing healthcare information security: standards can help.

    PubMed

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  4. Guidelines for Working with Law Enforcement Agencies

    ERIC Educational Resources Information Center

    Corn, Michael

    2007-01-01

    Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…

  5. Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises

    ERIC Educational Resources Information Center

    Shah, Ashish

    2017-01-01

    Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…

  6. Addressing mental health epidemic among university students via web-based, self-screening, and referral system: a preliminary study.

    PubMed

    Kim, Eung-Hun; Coumar, Anil; Lober, William B; Kim, Yongmin

    2011-03-01

    The prevalence and severity of mental health problems in college and university communities are alarming. However, the majority of students with mental disorders do not seek help from professionals. To help students assess their mental conditions and encourage them to take an active role in seeking care, we developed a web-based self-screening, referral, and secure communication system and evaluated it at the University of Washington for 17 months. The system handled more than 1000 screenings during the study period. Of the subjects who used the system, 75% noted that the system helped them to make a decision to receive help from professionals. The system was able to provide outreach to students with mental health concerns effectively, allow them to self-screen their conditions, and encourage them to receive professional assistance. The system provided students with 24/7 web-based access to the clinic, and more than 50% of the system use was made during off-hours. The system was well received by patients, referral managers, and care providers, and it was transferred to the clinic for daily clinical use. We believe that a web-based system like ours could be used as one way to tackle the growing epidemic of mental health problems among college and university students.

  7. Nurses' professionalism in Canada: a labor process analysis.

    PubMed

    Campbell, M L

    1992-01-01

    This article draws on a body of research conducted by the author over the past ten years on the social organization of nursing work. It explores questions surrounding nurses' contemporary labor process control and its meaning for nurses' professionalization and proletarianization. Both are dynamic processes, changing as public administration of the Canadian health care system changes and as nurses are successful in winning more complete self-regulation. Nurses are currently being articulated more and more securely to dominant ideas of public sector management through textually mediated technologies. Nurses find new upwardly mobile careers and challenging, responsible, and more respected work. However, as the generation of objective information for professional accountability, cost-accounting, and managerial decision-making becomes unified in computerized patient information systems, producing and using such information becomes a central and determining core of everyday nursing work. It organizes nurses into a "managed" practice of patient care, contradictory for them in many ways. Outstanding among these contradictions is a new professionalized standpoint of cost-efficiency that subordinates nurses' traditional interests and grounding of their work in the standpoint of care.

  8. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    PubMed Central

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  9. Privacy enhanced group communication in clinical environment

    NASA Astrophysics Data System (ADS)

    Li, Mingyan; Narayanan, Sreeram; Poovendran, Radha

    2005-04-01

    Privacy protection of medical records has always been an important issue and is mandated by the recent Health Insurance Portability and Accountability Act (HIPAA) standards. In this paper, we propose security architectures for a tele-referring system that allows electronic group communication among professionals for better quality treatments, while protecting patient privacy against unauthorized access. Although DICOM defines the much-needed guidelines for confidentiality of medical data during transmission, there is no provision in the existing medical security systems to guarantee patient privacy once the data has been received. In our design, we address this issue by enabling tracing back to the recipient whose received data is disclosed to outsiders, using watermarking technique. We present security architecture design of a tele-referring system using a distributed approach and a centralized web-based approach. The resulting tele-referring system (i) provides confidentiality during the transmission and ensures integrity and authenticity of the received data, (ii) allows tracing of the recipient who has either distributed the data to outsiders or whose system has been compromised, (iii) provides proof of receipt or origin, and (iv) can be easy to use and low-cost to employ in clinical environment.

  10. [Data security and the handling of patient data in home monitoring systems].

    PubMed

    Heydenreich, F; Jürgens, C; Tost, F

    2009-09-01

    Data security must be considered seriously in the context of telemedical home monitoring because of the transmission and communication of patients' personal data. The contract governing medical treatment allows the ophthalmologist to process all data relevant to treatment. In Germany the legal framework for this purpose is provided by the Data Protection Act, various German hospital acts, and codes of medical professional conduct. In principle, these rules apply to telemedical home monitoring as well as to common physician-patient relationships. The patient must be informed extensively in an understandable manner and must give his or her written consent. However, the advanced options of new IT technologies demand the development of technical and organizational concepts that guarantee compliance with legal and regulatory affairs, assure data security, and prevent data abuse.

  11. Facilitating Secure Sharing of Personal Health Data in the Cloud

    PubMed Central

    Nepal, Surya; Glozier, Nick

    2016-01-01

    Background Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. Objective This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. Methods We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). Results We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. Conclusions We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors. PMID:27234691

  12. The Knowledge Work of Professional Associations: Approaches to Standardisation and Forms of Legitimisation

    ERIC Educational Resources Information Center

    Nerland, Monika; Karseth, Berit

    2015-01-01

    This paper examines how professional associations engage themselves in efforts to develop, regulate and secure knowledge in their respective domains, with special emphasis on standardisation. The general emphasis on science in society brings renewed attention to the knowledge base of professionals, and positions professional bodies as key…

  13. Improving Radiation Awareness and Feeling of Personal Security of Non-Radiological Medical Staff by Implementing a Traffic Light System in Computed Tomography.

    PubMed

    Heilmaier, C; Mayor, A; Zuber, N; Fodor, P; Weishaupt, D

    2016-03-01

    Non-radiological medical professionals often need to remain in the scanning room during computed tomography (CT) examinations to supervise patients in critical condition. Independent of protective devices, their position significantly influences the radiation dose they receive. The purpose of this study was to assess if a traffic light system indicating areas of different radiation exposure improves non-radiological medical staff's radiation awareness and feeling of personal security. Phantom measurements were performed to define areas of different dose rates and colored stickers were applied on the floor according to a traffic light system: green = lowest, orange = intermediate, and red = highest possible radiation exposure. Non-radiological medical professionals with different years of working experience evaluated the system using a structured questionnaire. Kruskal-Wallis and Spearman's correlation test were applied for statistical analysis. Fifty-six subjects (30 physicians, 26 nursing staff) took part in this prospective study. Overall rating of the system was very good, and almost all professionals tried to stand in the green stickers during the scan. The system significantly increased radiation awareness and feeling of personal protection particularly in staff with ≤ 5 years of working experience (p < 0.05). The majority of non-radiological medical professionals stated that staying in the green stickers and patient care would be compatible. Knowledge of radiation protection was poor in all groups, especially among entry-level employees (p < 0.05). A traffic light system in the CT scanning room indicating areas with lowest, intermediate, and highest possible radiation exposure is much appreciated. It increases radiation awareness, improves the sense of personal radiation protection, and may support endeavors to lower occupational radiation exposure, although the best radiation protection always is to re-main outside the CT room during the scan. • A traffic light system indicating areas with different radiation exposure within the computed tomography scanner room is much appreciated by non-radiological medical staff. • The traffic light system increases non-radiological medical staff's radiation awareness and feeling of personal protection. • Knowledge on radiation protection was poor in non-radiological medical staff, especially in those with few working experience. © Georg Thieme Verlag KG Stuttgart · New York.

  14. Job security at isfahan university of medical sciences: implications on employees and types of contracts.

    PubMed

    Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte

    2013-01-01

    Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS.

  15. An Innovative Model for Professional Development

    ERIC Educational Resources Information Center

    McMurray, Sharon; O'Neill, Susan; Thompson, Ross

    2016-01-01

    This paper considers an innovative model of continuing professional development in addressing the needs of children with literacy difficulties, namely the Special Educational Needs Continuing Professional Development Literacy Project. Stranmillis University College, in partnership with St Mary's University College, Belfast secured £4.06 million…

  16. New security and privacy laws require basic changes in professional practice

    NASA Astrophysics Data System (ADS)

    Sykes, David M.

    2005-09-01

    Everybody knows about HIPAA-but what about GLBA? FIPA? The Patriot Act? Homeland Security? NCLB? FCRA? CASB1? PIPEDA? All of these are recent laws that impact acoustical design. Throw in the American Hospital Association/ASHE and AIA's about-to-be-released ``Guidelines for the Design of Healthcare Facilities'' as well as the redrafting of DCID 6/9 and it looks like time for careful examination of some professional practices relating to security and privacy. Should INCE members join with and endorse the ASA's recently formed Joint TCAA/TCN Subcommittee which aims to fill a policy vacuum in Washington and Ottawa relating to the fundamental protection of citizens' rights to privacy? This group will formulate consistent guidelines to enable federal and state agencies in the US and Canada to enforce and monitor their laws-will their guidelines affect INCE members? Those who advise or give expert testimony to government agencies, defense/security organizations, courts, and large institutions in financial services, healthcare or education likely find themselves in a rapidly shifting landscape and recognize the need to respond with new research and professional practices.

  17. Cyber Security and Reliability in a Digital Cloud

    DTIC Science & Technology

    2013-01-01

    a higher utilization of servers, lower professional support staff needs, economies of scale for the physical facility, and the flexibility to locate...as  a  system,  the  DoD  can  achieve  the  economies  of scale typically associated with large data centers.  Recommendation 3: The DoD CIO and DISA...providers will help set  standards for secure cloud computing across the  economy .  Recommendation 7: The DoD CIO and DISA should participate in the

  18. [Information security in health care].

    PubMed

    Ködmön, József; Csajbók, Zoltán Ernő

    2015-07-05

    Doctors, nurses and other medical professionals are spending more and more time in front of the computer, using applications developed for general practitioners, specialized care, or perhaps an integrated hospital system. The data they handle during healing and patient care are mostly sensitive data and, therefore, their management is strictly regulated. Finding our way in the jungle of laws, regulations and policies is not simple. Notwithstanding, our lack of information does not waive our responsibility. This study summarizes the most important points of international recommendations, standards and legal regulations of the field, as well as giving practical advices for managing medical and patient data securely and in compliance with the current legal regulations.

  19. Integrating Top-down and Bottom-up Cybersecurity Guidance using XML

    PubMed Central

    Lubell, Joshua

    2016-01-01

    This paper describes a markup-based approach for synthesizing disparate information sources and discusses a software implementation of the approach. The implementation makes it easier for people to use two complementary, but differently structured, guidance specifications together: the (top-down) Cybersecurity Framework and the (bottom-up) National Institute of Standards and Technology Special Publication 800-53 security control catalog. An example scenario demonstrates how the software implementation can help a security professional select the appropriate safeguards for restricting unauthorized access to an Industrial Control System. The implementation and example show the benefits of this approach and suggest its potential application to disciplines other than cybersecurity. PMID:27795810

  20. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  1. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  2. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  3. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  4. 32 CFR 806b.44 - Personal information that requires protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... study (unless the request for the information relates to the professional qualifications for Federal... relates to the professional qualifications for Federal employment). (l) Social Security Number. ...

  5. Medical image security in a HIPAA mandated PACS environment.

    PubMed

    Cao, F; Huang, H K; Zhou, X Q

    2003-01-01

    Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.

  6. Quality in Australian after-hours doctor home visits: exploring the clinical, professional and security supports available to involved practitioners.

    PubMed

    Ifediora, Chris Onyebuchi

    2017-04-01

    The after-hours house call (AHHC) services in Australia has gained huge popularity in recent years, but it is not clear how well supported the involved doctors feel regarding the clinical, professional and security aspects of their work. It is important that this knowledge gap is filled given that appropriate support helps engender quality in health service delivery. This is a questionnaire-based electronic survey involving a sample frame of all 300 doctors participating in AHHC through the National Home Doctor Service. National Home Doctor Service is Australia's largest AHHC service provider. A total of 168 valid responses (56.0%) were received. Overall, the mean support levels were mild to moderate, ranging from 2.4 to 2.8 out of 4.0 for all three parameters. Specifically, 65.3% of the respondents felt well-supported on clinical issues, 64.7% on professional issues and 43.2% on security issues. Australian-trained doctors were less likely to feel well supported on all aspects [Clinical: odds ratio (OR) 0.38, confidence interval (CI) 0.16 to 0.90; Professional: OR 0.30, CI 0.13 to 0.72; and Security: OR 0.22; CI 0.09 to 0.53] compared with overseas-trained ones. Unsurprisingly, doctors who adopted protective measures felt significantly better supported regarding security (OR 2.75; CI 1.31 to 5.78). There is room for improvement regarding support on AHHC in Australia, and concerned Surgeries should ensure that where available these supports are appropriately utilized. © 2016 John Wiley & Sons, Ltd.

  7. Differences in multiple-target visual search performance between non-professional and professional searchers due to decision-making criteria.

    PubMed

    Biggs, Adam T; Mitroff, Stephen R

    2015-11-01

    Professional visual searches, such as those conducted by airport security personnel, often demand highly accurate performance. As many factors can hinder accuracy, it is critical to understand the potential influences. Here, we examined how explicit decision-making criteria might affect multiple-target search performance. Non-professional searchers (college undergraduates) and professional searchers (airport security officers) classified trials as 'safe' or 'dangerous', in one of two conditions. Those in the 'one = dangerous' condition classified trials as dangerous if they found one or two targets, and those in the 'one = safe' condition only classified trials as dangerous if they found two targets. The data suggest an important role of context that may be mediated by experience; non-professional searchers were more likely to miss a second target in the one = dangerous condition (i.e., when finding a second found target did not change the classification), whereas professional searchers were more likely to miss a second in the one = safe condition. © 2014 The British Psychological Society.

  8. Becoming an Approved Mental Health Professional: an analysis of the factors that influence individuals to become Approved Mental Health Professionals.

    PubMed

    Watson, David

    2016-08-01

    In England and Wales, the Approved Mental Health Professional (AMHP) has final responsibility for applying under the Mental Health Act 1983 to admit an individual compulsorily and convey them to psychiatric hospital. The AMHP role is challenging and legally accountable and unique to the UK context. To analyse the motivation of individuals to become AMHPs, and identify factors which may affect motivation. Semi-structured interviews were conducted with 12 AMHPs from local authorities across Southern England. Ten participants were social workers, one was qualified as both a nurse and social worker, and one was a mental health nurse. Participants identify career progression and professional development as significant as well as the status and independence of the role and enhanced job security. Social work participants value the Mental Health Act assessment as a contained piece of work, with a high degree of professional discretion. AMHPs are motivated by an increase in professional status and job security, but also exercising independent judgment and authority in a time-limited intervention is emotionally and professionally rewarding.

  9. Distributed Computer Networks in Support of Complex Group Practices

    PubMed Central

    Wess, Bernard P.

    1978-01-01

    The economics of medical computer networks are presented in context with the patient care and administrative goals of medical networks. Design alternatives and network topologies are discussed with an emphasis on medical network design requirements in distributed data base design, telecommunications, satellite systems, and software engineering. The success of the medical computer networking technology is predicated on the ability of medical and data processing professionals to design comprehensive, efficient, and virtually impenetrable security systems to protect data bases, network access and services, and patient confidentiality.

  10. Mobile Device Security: Perspectives of Future Healthcare Workers

    PubMed Central

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992

  11. Mobile Device Security: Perspectives of Future Healthcare Workers.

    PubMed

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.

  12. An Analysis of Court Cases Involving Reduction in Force of K-12 Public School Employees, 1984-2010

    ERIC Educational Resources Information Center

    Pugh, Dale

    2012-01-01

    As more and more school systems are forced to implement reduction-in-force, litigation over reduction in the number of professional personnel, as well as job security, will continue to increase. As a result, there is a need for school administrators to develop a better understanding of the issues, outcomes, and legal trends resulting from…

  13. Data Privacy and Security in Higher Education

    ERIC Educational Resources Information Center

    Williams, Tracy

    2003-01-01

    As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…

  14. SOCIAL MEDIA SECURITY

    Science.gov Websites

    , exciting, entertaining, and useful for maintaining relationships. Professionally, people can use social HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of world. CENTCOM Personnel are reminded to use common sense when using social media. What are social media

  15. 75 FR 30095 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-28

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... on May 5, 2010, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed.... Specifically, the Exchange proposes to adopt a $0.18 per contract execution fee for ``professional customers...

  16. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  17. Information Security in Higher Education. Professional Paper Series, #5.

    ERIC Educational Resources Information Center

    Elliott, Raymond; And Others

    Intended to generate discussion and motivate proactive intervention in matters of information security, this paper defines and discusses some of the key issues relating to information security on college and university campuses based on in-depth interviews conducted at eight selected higher education institutions of varying size and composition in…

  18. [Analysis of fundamental chains of family planning systematic engineering in the countryside].

    PubMed

    Liu, S

    1991-02-01

    Establishment of a system for old age support in rural areas of China is an important aspect to ensure the success of a family planning (FP) program. The necessity of such a system was examined from the following perspective. 1st, children are sources of old age support due to lack of social security and pension systems in rural areas. This had been the key reason motivating some rural farmers to ignore FP regulations and continue to have children. Unless the livelihood of a rural population is ensured in some way, it is difficult to achieve FP program objectives. 2nd, the increasing life expectancy and declining fertility made the population age process occur rapidly, e.g., the population aged 65 and over will increase from 7% at the end of the century to 17% in the 2030s. Living and health care of the old age population at that time would be an important need for the society. 3rd, changes in family patterns from extended to nuclear families have gradually changed the position of old people in the family which made it unfeasible to rely entirely on children for old age support. Several systems of old age support have been suggested. Government and the community should take responsibility for establishing a social security system. The role of the government will be in educating the public on the importance of social security programs, training professionals to work in these programs, formulating laws and regulations on social security, and supporting a social security system through taxation and welfare programs. The communities may help set up the organizational structure and make financial contributions to the social security system. Insurance companies or commercial banks may set up special coverage or saving programs for old age support. The role of children to support parents would still be important for a certain period of time. The current pilot projects on a rural social security system in 270 countries were an important starting point for helping the rural population to reduce the need for children and to reduce the opposition to family planning programs.

  19. Support Tool in the Diagnosis of Major Depressive Disorder

    NASA Astrophysics Data System (ADS)

    Nunes, Luciano Comin; Pinheiro, Plácido Rogério; Pequeno, Tarcísio Cavalcante; Pinheiro, Mirian Calíope Dantas

    Major Depressive Disorder have been responsible for millions of professionals temporary removal, and even permanent, from diverse fields of activities around the world, generating damage to social, financial, productive systems and social security, and especially damage to the image of the individual and his family that these disorders produce in individuals who are patients, characteristics that make them stigmatized and discriminated into their society, making difficult their return to the production system. The lack of early diagnosis has provided reactive and late measures, only when the professional suffering psychological disorder is already showing signs of incapacity for working and social relationships. This article aims to assist in the decision making to establish early diagnosis of these types of psychological disorders. It presents a proposal for a hybrid model composed of expert system structured methodologies for decision support (Multi-Criteria Decision Analysis - MCDA) and representations of knowledge structured in logical rules of production and probabilities (Artificial Intelligence - AI).

  20. Old-and With Severe Heart Failure: Telemonitoring by Using Digital Pen Technology in Specialized Homecare: System Description, Implementation, and Early Results.

    PubMed

    Lind, Leili; Carlgren, Gunnar; Karlsson, Daniel

    2016-08-01

    Telehealth programs for heart failure have been studied using a variety of techniques. Because currently a majority of the elderly are nonusers of computers and Internet, we developed a home telehealth system based on digital pen technology. Fourteen patients (mean age, 84 years [median, 83 years]) with severe heart failure participated in a 13-month pilot study in specialized homecare. Participants communicated patient-reported outcome measures daily using the digital pen and health diary forms, submitting a total of 3 520 reports. The reports generated a total of 632 notifications when reports indicated worsening health. Healthcare professionals reviewed reports frequently, more than 4700 times throughout the study, and acted on the information provided. Patients answered questionnaires and were observed in their home environment when using the system. Results showed that the technology was accepted by participants: patients experienced an improved contact with clinicians; they felt more compliant with healthcare professionals' advice, and they felt more secure and more involved in their own care. Via the system, the healthcare professionals detected heart failure-related deteriorations at an earlier stage, and as a consequence, none of the patients were admitted into hospital care during the study.

  1. Fires. A Joint Professional Bulletin for U.S. Field and Air Defense Artillerymen. September-October 2011

    DTIC Science & Technology

    2011-10-01

    said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most

  2. [Primary care in Belgium].

    PubMed

    Sánchez-Sagrado, T

    2017-09-01

    Belgium is an attractive country to work in, not just for doctors but for all Spanish workers, due to it having the headquarters of European Union. The health job allure is double; on the one hand, the opportunity to find a decent job, and on the other, because it is possible to develop their professional abilities with patients of the same nationality in a health system with a different way of working. The Belgium health care system is based on security social models. Health care is financed by the government, social security contributions, and voluntary private health insurance. Primary care in Belgium is very different to that in Spain. Citizens may freely choose their doctor (general practitioner or specialist) increasing the lack of coordination between primary and specialized care. This leads to serious patient safety problems and loss of efficiency within the system. Belgium is a European country with room to improve preventive coverage. General practitioners are self-employed professionals with free choice of setting, and their salary is linked to their professional activity. Ambulatory care is subjected to co-payment, and this fact leads to great inequities on access to care. The statistics say that there is universal coverage but, in 2010, 14% of the population did not seek medical contact due to economic problems. It takes 3 years to become a General Practitioner and continuing medical education is compulsory to be revalidated. In general, Belgian and Spaniards living and working in Belgium are happy with the functioning of the health care system. However, as doctors, we should be aware that it is a health care system in which access is constrained for some people, and preventive coverage could be improved. Copyright © 2016 Sociedad Española de Médicos de Atención Primaria (SEMERGEN). Publicado por Elsevier España, S.L.U. All rights reserved.

  3. 77 FR 30032 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-21

    ... Professionals'' May 15, 2012. I. Introduction On March 20, 2012, the Fixed Income Clearing Corporation (``FICC... Members and NYPC Clearing Members for certain ``market professionals.'' \\6\\ \\5\\ See Securities Exchange... professional'' cross-margining program aims to closely replicate the Options Clearing Corporation (``OCC...

  4. Job Security at Isfahan University of Medical Sciences: Implications on Employees and Types of Contracts

    PubMed Central

    Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte

    2013-01-01

    Introduction: Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). Method and materials: The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. Results: The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Discussion: Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS. PMID:23687464

  5. [Basic consideration on the security checking of sick travelers at airports].

    PubMed

    Felkai, Péter; Mártai, István

    2012-09-02

    The authorities guarantee the safety of passengers during air travel by strict ground security measures. All of these measures are restrictive and can affect the health status of both healthy and ill travelers. Patients who are in critical condition or confined to a stretcher and have to be repatriated by stretcher on a regular flight, must pass the airport security check as well. But the developers of security system should take into account the medical safety of patients during the procedure. The relevant medical principles are painfully missing not only in Hungary, but unfortunately also at most international airports. On the basis of principles reviewed in the present publication, an unambiguous, professionally reconciled regulation is necessary that would serve as a guideline for airport management and authorities, as well as for the involved medical personnel. Although setting principles into practice requires a different solution at each airport, yet, passenger safety and patient safety have to be harmonized as soon as possible.

  6. Mobile computing acceptance factors in the healthcare industry: a structural equation model.

    PubMed

    Wu, Jen-Her; Wang, Shu-Ching; Lin, Li-Min

    2007-01-01

    This paper presents a revised technology acceptance model to examine what determines mobile healthcare systems (MHS) acceptance by healthcare professionals. Conformation factor analysis was performed to test the reliability and validity of the measurement model. The structural equation modeling technique was used to evaluate the causal model. The results indicated that compatibility, perceived usefulness and perceived ease of use significantly affected healthcare professional behavioral intent. MHS self-efficacy had strong indirect impact on healthcare professional behavioral intent through the mediators of perceived usefulness and perceived ease of use. Yet, the hypotheses for technical support and training effects on the perceived usefulness and perceived ease of use were not supported. This paper provides initial insights into factors that are likely to be significant antecedents of planning and implementing mobile healthcare to enhance professionals' MHS acceptance. The proposed model variables explained 70% of the variance in behavioral intention to use MHS; further study is needed to explore extra significant antecedents of new IT/IS acceptance for mobile healthcare. Such as privacy and security issue, system and information quality, limitations of mobile devices; the above may be other interesting factors for implementing mobile healthcare and could be conducted by qualitative research.

  7. THE NEXT GENERATION SAFEGUARDS PROFESSIONAL NETWORK: PROGRESS AND NEXT STEPS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhernosek, Alena V; Lynch, Patrick D; Scholz, Melissa A

    2011-01-01

    President Obama has repeatedly stated that the United States must ensure that the international safeguards regime, as embodied by the International Atomic Energy Agency (IAEA), has 'the authority, information, people, and technology it needs to do its job.' The U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA) works to implement the President's vision through the Next Generation Safeguards Initiative (NGSI), a program to revitalize the U.S. DOE national laboratories safeguards technology and human capital base so that the United States can more effectively support the IAEA and ensure that it meets current and emerging challenges to the internationalmore » safeguards system. In 2009, in response to the human capital development goals of NGSI, young safeguards professionals within the Global Nuclear Security Technology Division at Oak Ridge National Laboratory launched the Next Generation Safeguards Professional Network (NGSPN). The purpose of this initiative is to establish working relationships and to foster collaboration and communication among the next generation of safeguards leaders. The NGSPN is an organization for, and of, young professionals pursuing careers in nuclear safeguards and nonproliferation - as well as mid-career professionals new to the field - whether working within the U.S. DOE national laboratory complex, U.S. government agencies, academia, or industry or at the IAEA. The NGSPN is actively supported by the NNSA, boasts more than 70 members, maintains a website and newsletter, and has held two national meetings as well as an NGSPN session and panel at the July 2010 Institute of Nuclear Material Management Annual Meeting. This paper discusses the network; its significance, goals and objectives; developments and progress to date; and future plans.« less

  8. Teaching Information Security with Workflow Technology--A Case Study Approach

    ERIC Educational Resources Information Center

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  9. Protecting the Privacy and Security of Your Health Information

    MedlinePlus

    ... Access to Medical Records Privacy, Security, and HIPAA Laws, Regulation, and Policy Scientific Initiatives Standards & Technology Usability ... care providers and professionals, and the government. Federal laws require many of the key persons and organizations ...

  10. After 2015: The Next Security Era for Britain

    DTIC Science & Technology

    2012-03-01

    Defence Committee hearings , the population and its key communicators are measurably unconvinced about the necessity, success, and professionalism... immigrants the public can see that al Qaeda is faltering, and that for several years it has failed to grab the front-page space that it strives...is in principle systemic; without effective internal bor- ders, refugees landing in Italy, Spain , or Greece from the sea have comparative freedom of

  11. Hackers ring up big phone bills for hospitals.

    PubMed

    Gardner, E

    1992-11-02

    A big telephone bill--possibly in six figures--can be a painful way for a hospital to find out its phone system isn't secure. When unusually large long-distance bills start to show up, chances are a professional telephone hacker has broken in. According to experts, one in 15 businesses has been victimized by long-distance toll fraud, and loss estimates range from $900 million to $4 billion a year.

  12. The European Union Joint Procurement Agreement for cross-border health threats: what is the potential for this new mechanism of health system collaboration?

    PubMed

    Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut

    2017-01-01

    The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.

  13. Role of Outsourcing in Stress and Job Satisfaction of Information Technology Professionals

    ERIC Educational Resources Information Center

    Robinson, Janell R.

    2016-01-01

    Information technology (IT) outsourcing poses a potential job loss threat to IT professionals, which can decrease job security, job satisfaction, and organizational commitment. The problem that this study addressed was the perceived role of IT outsourcing in the job stress, job dissatisfaction, and turnover intention of IT professionals. The…

  14. Beyond Performativity: A Pragmatic Model of Teacher Professional Learning

    ERIC Educational Resources Information Center

    Lloyd, Margaret; Davis, James P.

    2018-01-01

    The intent and content of teacher professional learning has changed in recent times to meet the demands of performativity. In this article, we offer and demonstrate a pragmatic way to map teacher professional learning that both meets current demands and secures a place for teacher-led catalytic learning. To achieve this, we position identified…

  15. Redefining Professional Knowledge in Athletic Training: Whose Knowledge Is It Anyway?

    ERIC Educational Resources Information Center

    McKeon, Patrick O.; Medina McKeon, Jennifer M.; Geisler, Paul R.

    2017-01-01

    Context: As athletic training continues to evolve as a profession, several epistemological considerations must be considered. These include how we generate professional knowledge and how we secure and legitimize it in both professional and public spheres. Objective: The purpose of this commentary is to provide an overview of how athletic training…

  16. Promoting Inter-Professional Teamwork and Learning--The Case of a Surgical Operating Theatre

    ERIC Educational Resources Information Center

    Collin, Kaija; Paloniemi, Susanna; Mecklin, Jukka-Pekka

    2010-01-01

    Hospitals, and surgical operating theatres (OTs) in particular, are environments in which inter-professional teamwork and learning are essential to secure patient safety and effective practice. However, it has been revealed in many studies that inter-professional collaborative work in hospital organisations faces many challenges and constraints.…

  17. [Concept for a National Implant Registry to Improve Patient Safety].

    PubMed

    Prantl, L; von Fritschen, U; Liebau, J; von Hassel, J; Baur, E M; Vogt, P M; Giunta, R E; Horch, R E

    2016-12-01

    Since the introduction of silicone implants, several events have led to considerable uncertainty among the patients, public, and users. So far, however, the necessary steps to significantly improving patient safety have not been taken in any of these cases. Requiring stricter approvals for medical devices, improving monitoring by the regulatory authorities and the revision of the Medical Devices Directive are all initial steps in the right direction towards a change in policy, but are insufficient as an early warning system. After the introduction of registers was announced in the coalition agreement, the German Society of Plastic, Aesthetic and Reconstructive Surgeons (DGPRÄC), in close consultation with the Ministry of Health, has developed a concept which is presented here. The need for a uniform and legally binding central register for breast implants is fully supported by the entire medical profession. According to the concept presented by the DGPRÄC, three data qualities would be applicable: Safety data (mandatory), physician information (voluntary) and research data (optional, except if safety related). The public authorities are creating a unified, secure entry portal for all professional associations concerned. This register is based with the professional associations, and from there the mandatory security data will be forwarded to the public authorities. Decoding of the identity of the patient and doctor would only occur in specifically defined emergency situations such as product recalls. Automated tools in the security database provide early detection of problems, so that rapid clarification is possible in consultation with the professional associations, manufacturers and possibly patients. This concept as proposed by the DGPRÄC has thus far been very positively received in all discussions between the various parties concerned. © Georg Thieme Verlag KG Stuttgart · New York.

  18. [Value of the concept of attachment in somatic medicine].

    PubMed

    Attale, Catherine; M Consoli, Silla

    2005-01-15

    Since the nineteen nineties, the theory of attachment, initially developed in paedopsychiatry, has increasingly been applied to somatic medicine. The main fields explored have been the links between the individual's attachment style, response to stress and attitude towards health: seeking help from professionals, using health care systems and compliance to treatment. A so-called 'secure" attachment corresponds to an inner resource related to more constructive response to stressful events; an"insecure" attachment (including three categories: preoccupied,detached and fearful) can be considered a risk factor leading to less efficient adaptation to stress or "coping" with it. Attachment styles appear to influence attitudes towards health. Adults with secure attachment have positive expectations with regard to the help that care workers will provide and to the trust they can have in them. Detached-type insecure patients tend to minimize their signs of distress and do not necessarily seek help. Preoccupied-type insecure adults tend to maximize distress signals and excessively appeal to the medical corps. Fearful-type insecure patients only seek help in situations of great distress and rarely have faith in the health professionals.

  19. Transportation Security Institute : recruiting next generation professionals.

    DOT National Transportation Integrated Search

    2013-08-01

    The Center for Transportation Training and Research (CTTR), as part of Texas Southern University : (TSU), served as host for the 2013 Transportation Security Institute (TSI) in Houston and : surrounding area. The 2013 Houston TSI focuses on the missi...

  20. Social Security for Composers and Free Lances.

    ERIC Educational Resources Information Center

    Rossel-Majdan, Karl

    1982-01-01

    Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)

  1. Transportation Security Institute: recruiting next generation professionals.

    DOT National Transportation Integrated Search

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  2. Global drivers, sustainable manufacturing and systems ergonomics.

    PubMed

    Siemieniuch, C E; Sinclair, M A; Henshaw, M J deC

    2015-11-01

    This paper briefly explores the expected impact of the 'Global Drivers' (such as population demographics, food security; energy security; community security and safety), and the role of sustainability engineering in mitigating the potential effects of these Global Drivers. The message of the paper is that sustainability requires a significant input from Ergonomics/Human Factors, but the profession needs some expansion in its thinking in order to make this contribution. Creating a future sustainable world in which people experience an acceptable way of life will not happen without a large input from manufacturing industry into all the Global Drivers, both in delivering products that meet sustainability criteria (such as durability, reliability, minimised material requirement and low energy consumption), and in developing sustainable processes to deliver products for sustainability (such as minimum waste, minimum emissions and low energy consumption). Appropriate changes are already being implemented in manufacturing industry, including new business models, new jobs and new skills. Considerable high-level planning around the world is in progress and is bringing about these changes; for example, there is the US 'Advanced Manufacturing National Program' (AMNP)', the German 'Industrie 4.0' plan, the French plan 'la nouvelle France industrielle' and the UK Foresight publications on the 'Future of Manufacturing'. All of these activities recognise the central part that humans will continue to play in the new manufacturing paradigms; however, they do not discuss many of the issues that systems ergonomics professionals acknowledge. This paper discusses a number of these issues, highlighting the need for some new thinking and knowledge capture by systems ergonomics professionals. Among these are ethical issues, job content and skills issues. Towards the end, there is a summary of knowledge extensions considered necessary in order that systems ergonomists can be fully effective in this new environment, together with suggestions for the means to acquire and disseminate the knowledge extensions. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. 75 FR 66410 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... Terms of Substance of the Proposed Rule Change The Exchange proposes to adopt ISE Rule 212 (Sales Value... supervision and regulation of the securities markets and securities professionals. To offset this obligation...

  4. 75 FR 5360 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-02

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61426; File No. SR-Phlx-2010-05] Self... Professional Orders January 26, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934... PHLX, Inc. (``Phlx'' or ``Exchange'') filed with the Securities and Exchange Commission (``SEC'' or...

  5. Different predictors of multiple-target search accuracy between nonprofessional and professional visual searchers.

    PubMed

    Biggs, Adam T; Mitroff, Stephen R

    2014-01-01

    Visual search, locating target items among distractors, underlies daily activities ranging from critical tasks (e.g., looking for dangerous objects during security screening) to commonplace ones (e.g., finding your friends in a crowded bar). Both professional and nonprofessional individuals conduct visual searches, and the present investigation is aimed at understanding how they perform similarly and differently. We administered a multiple-target visual search task to both professional (airport security officers) and nonprofessional participants (members of the Duke University community) to determine how search abilities differ between these populations and what factors might predict accuracy. There were minimal overall accuracy differences, although the professionals were generally slower to respond. However, the factors that predicted accuracy varied drastically between groups; variability in search consistency-how similarly an individual searched from trial to trial in terms of speed-best explained accuracy for professional searchers (more consistent professionals were more accurate), whereas search speed-how long an individual took to complete a search when no targets were present-best explained accuracy for nonprofessional searchers (slower nonprofessionals were more accurate). These findings suggest that professional searchers may utilize different search strategies from those of nonprofessionals, and that search consistency, in particular, may provide a valuable tool for enhancing professional search accuracy.

  6. Food security practice in Kansas schools and health care facilities.

    PubMed

    Yoon, Eunju; Shanklin, Carol W

    2007-02-01

    This pilot study investigated perceived importance and frequency of specific preventive measures, and food and nutrition professionals' and foodservice directors' willingness to develop a food defense management plan. A mail questionnaire was developed based on the US Department of Agriculture document, Biosecurity Checklist for School Foodservice Programs--Developing a Biosecurity Management Plan. The survey was sent to food and nutrition professionals and foodservice operators in 151 acute care hospitals, 181 long-term-care facilities, and 450 school foodservice operations. Chemical use and storage was perceived as the most important practice to protect an operation and was the practice implemented most frequently. Results of the study indicate training programs on food security are needed to increase food and nutrition professionals' motivation to implement preventive measures.

  7. Bringing the medical library to the office desktop.

    PubMed

    Brown, S R; Decker, G; Pletzke, C J

    1991-01-01

    This demonstration illustrates LRC Remote Computer Services- a dual operating system, multi-protocol system for delivering medical library services to the medical professional's desktop. A working model draws resources from CD-ROM and magnetic media file services, Novell and AppleTalk network protocol suites and gating, LAN and asynchronous (dial-in) access strategies, commercial applications for MS-DOS and Macintosh workstations and custom user interfaces. The demonstration includes a discussion of issues relevant to the delivery of said services, particularly with respect to maintenance, security, training/support, staffing, software licensing and costs.

  8. 77 FR 20445 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-04

    ... Professionals'' March 29, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1... positions held by GSD Netting Members and NYPC Clearing Members for certain ``market professionals.'' \\5\\ \\4...\\ The NYPC-FICC ``market professional'' cross-margining program aims to closely replicate the Options...

  9. 76 FR 48197 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-08

    ... assessable professional reported or required to be reported by a municipal advisor to the MSRB on Form A-11... Assessment and Form A-11- Interim. For purposes of the interim assessment, an assessable professional of a...-Interim as an assessable professional any associated person (i) Who otherwise qualifies as an assessable...

  10. Enhancing the NFLs Counter-Terrorism Efforts: Is the Leagues Security Scheme Able to Effectively Thwart Terrorist Attacks

    DTIC Science & Technology

    2016-09-01

    League (EPL), football, mass gatherings, National Football League (NFL), safety manuals, soccer , sports security, soccer , terrorism, terrorist...fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL...kurtbadenhausen/2015/07/15/the-worlds-50-most-valuable-sports- teams-2015/. 3 professional league, the English Premier soccer league, earns $2.7 billion.6 In

  11. Combining conceptual graphs and argumentation for aiding in the teleexpertise.

    PubMed

    Doumbouya, Mamadou Bilo; Kamsu-Foguem, Bernard; Kenfack, Hugues; Foguem, Clovis

    2015-08-01

    Current medical information systems are too complex to be meaningfully exploited. Hence there is a need to develop new strategies for maximising the exploitation of medical data to the benefit of medical professionals. It is against this backdrop that we want to propose a tangible contribution by providing a tool which combines conceptual graphs and Dung׳s argumentation system in order to assist medical professionals in their decision making process. The proposed tool allows medical professionals to easily manipulate and visualise queries and answers for making decisions during the practice of teleexpertise. The knowledge modelling is made using an open application programming interface (API) called CoGui, which offers the means for building structured knowledge bases with the dedicated functionalities of graph-based reasoning via retrieved data from different institutions (hospitals, national security centre, and nursing homes). The tool that we have described in this study supports a formal traceable structure of the reasoning with acceptable arguments to elucidate some ethical problems that occur very often in the telemedicine domain. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Cooperative observation data center for planets: starting with the Mars 2009-2010 observation

    NASA Astrophysics Data System (ADS)

    Nakakushi, T.; Okyudo, M.; Tomita, A.

    2009-12-01

    We propose in this paper a plan to construct a planetary image data center on the internet, which links professional researchers and amateur observers all over the world. Such data archive projects have worked, at least for Mars. Since 2003, one of the authors (T. N.) have started a project to summarize Mars observations using such cooperative network observation data archives and to publish the summary as professional research papers (Nakakushi et al., 2004, 2005, and 2008). Planetary atmosphere varies in various timescales, which requires temporarily continuous observations. Cooperative observation which amateur observers join can keep the observation continuous and sustainable, so that it can be a strong weapon to reveal planetary climate and meteorology. For outer planets, in particular, we don't know synoptic "seasonal" variations because of their long periods of revolution. We need steady and persistent effort to accumulate observations. That is why we need amateur observers' high-level observation techniques. To do so, we also needs systems to provide (and reproduce) data for users in an appropriate manner. We start from Mars with our own new date archive website, because we have much experience in terms of Mars. Next, we will expand the system for all the planets. Roughly said, there will be 3 steps to expand the project to all the planets: (1) to construct our own Mars cooperative observation data center, (2) to link it with professional studies, (3) to construct cooperative observation data center for all planets. And 4 problems to tackle: (1) to develop web interfaces for users to submit data, (2) to develop interfaces for managers, (3) to secure finances, (4) to secure professional researchers. 2009 and 2010 are a good apparition for Mars observation. We manage the Mars image data website, find problems and solutions in detail, and search for ways to expand it to all the planet and to enable sustainable management.

  13. [A health system's neoliberal reform: evidence from the Mexican case].

    PubMed

    López-Arellano, Oliva; Jarillo-Soto, Edgar C

    2017-07-27

    This study addressed the shaping of Mexico's health system in recent years, with an analysis of the social determination conditioning the system's current formulation, the consequences for the population's living and working conditions, and the technical and legal reform measures that shaped the system's transformation. The article then analyzes the survival of social security institutions and the introduction of an individual insurance model and its current implications and consequences. From the perspective of the right to health, the article compares the measures, resources, and interventions in both health care models and highlights the relevance of the social security system for Popular Insurance. The article concludes that the measures implemented to reform the Mexican health system have failed to achieve the intended results; on the contrary, they have led to a reduction in interventions, rising costs, and a decrease in the installed capacity and professional personnel for the system's operation, thus falling far short of solving the problem, rather aggravating the inequities without solving the system's structural contradictions. Health systems face new challenges, inevitably requiring that the analyses be situated in a broader framework rather than merely focusing on the functional, administrative, and financial operation of the systems in the respective countries.

  14. ICS logging solution for network-based attacks using Gumistix technology

    NASA Astrophysics Data System (ADS)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  15. An end-to-end secure patient information access card system.

    PubMed

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  16. One health security: an important component of the global health security agenda.

    PubMed

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  17. [Security agents on the front line against Ebola: roles, perceptions and knowledge in Fann Teaching Hospital, Dakar, Senegal].

    PubMed

    Lanièce, C; Sow, K; Desclaux, A

    2016-10-01

    Security agents are on the front line when patients arrive at health facilities, giving them a potential role to play in an Ebola virus disease (EVD) outbreak. The position of security agents within health services is poorly documented. A survey was conducted to clarify their understanding of Ebola pathology, to assess their need for information and to determine their role in patient management. The survey included both qualitative and quantitative aspects. 80 security agents of the Fann teaching hospital (Dakar) completed questionnaires, and 11 were interviewed. Qualitative analysis was performed with Dedoose and the quantitative analysis using Excel. The results show that security agents' activities go beyond their mission of security and control. They are involved in informing, orienting and assisting patients and those accompanying them in the hospital. The security agents have basic knowledge of EVD, but overestimate the risk of transmission. They want to be more informed and to have access to protective material. These results suggest that these professionals should be taken into account when developing response strategies to Ebola outbreaks. Their knowledge of and protection against the disease must be strengthened. Non-health professionals working in health facilities should be trained in order to be able to relay information to the public.

  18. 20 CFR 401.25 - Terms defined.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...

  19. 20 CFR 401.25 - Terms defined.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., partnerships, and unincorporated business or professional groups of two or more persons. Information means... physical characteristics; earnings information; professional fees paid to an individual and other financial... Bureau of the Census, the General Accounting Office, or to Congress. Social Security Administration (SSA...

  20. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    PubMed

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  1. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks

    PubMed Central

    Singh, Hardeep

    2016-01-01

    Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066

  2. Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011

    DTIC Science & Technology

    2011-01-01

    the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional

  3. A Formal Specification and Verification Method for the Prevention of Denial of Service in Ada Services

    DTIC Science & Technology

    1988-03-01

    Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy

  4. Structuring Cooperative Nuclear RIsk Reduction Initiatives with China.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brandt, Larry; Reinhardt, Jason Christian; Hecker, Siegfried

    The Stanford Center for International Security and Cooperation engaged several Chinese nuclear organizations in cooperative research that focused on responses to radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas. Initiatives were identified in three primary research areas: 1) detection and interdiction of smuggled nuclear materials; 2) nuclear forensics; and 3) radiological (“dirty bomb”) threats and countermeasures. Initial work emphasized the application of systems and risk analysis tools, which proved effective in structuring the collaborations. The extensive engagementsmore » between national security nuclear experts in China and the U.S. during the research strengthened professional relationships between these important communities.« less

  5. Predicting Airport Screening Officers' Visual Search Competency With a Rapid Assessment.

    PubMed

    Mitroff, Stephen R; Ericson, Justin M; Sharpe, Benjamin

    2018-03-01

    Objective The study's objective was to assess a new personnel selection and assessment tool for aviation security screeners. A mobile app was modified to create a tool, and the question was whether it could predict professional screeners' on-job performance. Background A variety of professions (airport security, radiology, the military, etc.) rely on visual search performance-being able to detect targets. Given the importance of such professions, it is necessary to maximize performance, and one means to do so is to select individuals who excel at visual search. A critical question is whether it is possible to predict search competency within a professional search environment. Method Professional searchers from the USA Transportation Security Administration (TSA) completed a rapid assessment on a tablet-based X-ray simulator (XRAY Screener, derived from the mobile technology app Airport Scanner; Kedlin Company). The assessment contained 72 trials that were simulated X-ray images of bags. Participants searched for prohibited items and tapped on them with their finger. Results Performance on the assessment significantly related to on-job performance measures for the TSA officers such that those who were better XRAY Screener performers were both more accurate and faster at the actual airport checkpoint. Conclusion XRAY Screener successfully predicted on-job performance for professional aviation security officers. While questions remain about the underlying cognitive mechanisms, this quick assessment was found to significantly predict on-job success for a task that relies on visual search performance. Application It may be possible to quickly assess an individual's visual search competency, which could help organizations select new hires and assess their current workforce.

  6. 77 FR 2108 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ... Professional,\\9\\ Firm and Market Maker \\10\\ orders that remove liquidity from the BATS Options order book. The Exchange proposes to raise the fee to $0.44 per contract for Professional, Firm and Market Maker orders... ``Professional'' means any person or entity that (i) is not a broker or dealer in securities, and (ii) places...

  7. The Impact of an eHealth Portal on Health Care Professionals' Interaction with Patients: Qualitative Study.

    PubMed

    Das, Anita; Faxvaag, Arild; Svanæs, Dag

    2015-11-24

    People who undergo weight loss surgery require a comprehensive treatment program to achieve successful outcomes. eHealth solutions, such as secure online portals, create new opportunities for improved health care delivery and care, but depend on the organizational delivery systems and on the health care professionals providing it. So far, these have received limited attention and the overall adoption of eHealth solutions remains low. In this study, a secure eHealth portal was implemented in a bariatric surgery clinic and offered to their patients. During the study period of 6 months, 60 patients and 5 health care professionals had access. The portal included patient information, self-management tools, and communication features for online dialog with peers and health care providers at the bariatric surgery clinic. The aim of this study was to characterize and assess the impact of an eHealth portal on health care professionals' interaction with patients in bariatric surgery. This qualitative case study involved a field study consisting of contextual interviews at the clinic involving observing and speaking with personnel in their actual work environment. Semi-structured in-depth interviews were conducted with health care professionals who interacted with patients through the portal. Analysis of the collected material was done inductively using thematic analysis. The analysis revealed two main dimensions of using an eHealth portal in bariatric surgery: the transparency it represents and the responsibility that follows by providing it. The professionals reported the eHealth portal as (1) a source of information, (2) a gateway to approach and facilitate the patients, (3) a medium for irrevocable postings, (4) a channel that exposes responsibility and competence, and (5) a tool in the clinic. By providing an eHealth portal to patients in a bariatric surgery program, health care professionals can observe patients' writings and revelations thereby capturing patient challenges and acting and implementing measures. Interacting with patients through the portal can prevent dropouts and deterioration of patients' health. However, professionals report on organizational challenges and personal constraints related to communicating with patients in writing online. Further development of guidelines and education of health care professionals about how to handle, prioritize, communicate, and facilitate patients online is required in addition to increased attention to the organizational infrastructures and incentives for enabling such solutions in health care.

  8. Opening a new office: the dentist's personal frontier.

    PubMed

    Crafton, B Casey; Lofft, Alexander H

    2006-01-01

    The purpose of this article is to assist the dental practitioner by providing insight into commercial real estate and a framework for identifying and securing new office space, as well as by addressing concerns about the physical space of a dental practice. In the process of identifying and securing new office space, the dental practitioner can maximize efficiency and minimize risk by assembling a team of professionals to assist him or her. This team should be composed of an accountant and an attorney, as well as a dental equipment/design specialist and a commercial real estate professional. The professional team will provide invaluable assistance to the dentist, enabling him or her to avoid major financial, legal, logistic and real estate-related pitfalls inherent in establishing or moving a dental practice.

  9. Rights of dental patients in the EU - a legal assessment.

    PubMed

    Van den Bossche, Anne-Marie; Ploscar, Paula

    2012-11-30

    This contribution presents the legal framework for intra-European mobility of dental patients. After presenting the EU competences in respect of healthcare and a brief look into the various routes of patient mobility, the article sets out the rules for access to dental care, treatment abroad and reimbursement through social security. In addition, we focus on the impact of European Union (EU) law upon national systems in respect of professional insurance, complaints procedures and information mechanisms. In conclusion, we reflect on the development in EU law of an independent set of rights to cross-border dental care and its consequences for financing and reimbursement of care, as well as for national practices in respect of professional liability and insurance.

  10. Design and implementation of a smart card based healthcare information system.

    PubMed

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  11. Investigating the Relationship between Need for Cognition and Skill in Ethical Hackers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Le Blanc, Katya; Freeman, Sarah

    As technology gets more complex and increasingly connected, there is an increasing concern with cyber security. There is also a growing demand for cyber security professionals. Unfortunately there currently are not enough skilled professionals to meet that demand. In order to prepare the next generation of cyber security professionals to meet this demand, we need to understand what characteristics make skilled cyber security professionals. For this work, we focus on professionals who take an offensive approach to cyber security, so called ethical hackers. These hackers utilize many of the same skills that the adversaries that we defend against would use,more » with the goal of identifying vulnerabilities and address them before they are exploited by adversaries. A commonly held belief among ethical hackers is that hackers must possess exceptional curiosity and problem solving skills in order to be successful. Curiosity is has been studied extensively in psychology, but there is no consensus on what it is and how to measure it. Further, many existing inventories for assessing curiosity are targeted at measuring curiosity in children. Although there isn’t an accepted standard to assess curiosity in adults, a related construct, called Need for Cognition (may capture what is meant when people speak of curiosity. The Need for Cognition scale also captures the tendency toward preferring complex problems (which correlates with good problem solving skills), which may provide insight into what make skilled hackers. In addition to the Need for Cognition, we used a structured interview to assess hacker skill. Hackers rated their own skill on a scale from one to ten on a predefined list of hacker skills. They were then asked to rate a peer who they felt was most skilled in each of the skills. They were asked to rate two peers for each skill, one that they worked with directly and one person that was the most skilled in the field (these could be known by reputation only). The hypothesis is that hackers have a higher than average (i.e., compared to non-hackers) Need for cognition and that Need for Cognition will be positively correlated with self-reported and peer reported skill. We interviewed 20 cyber security researchers who specialize in offensive approaches. Based on the responses to the hacker skill inventory, we generated a self-reported skill score for each participant. We also developed a peer-rating for each participant based on the number of times each individual that was interviewed was named as the most skilled in a particular area. The results indicate that the sample of ethical hackers has a high Need for Cognition and that Need for cognition was related to both self-reported skill and peer-reported skill. The results are discussed in the context of training and recruitment of cyber security professionals.« less

  12. The dual use of research ethics committees: why professional self-governance falls short in preserving biosecurity.

    PubMed

    Salloch, Sabine

    2018-06-05

    Dual Use Research of Concern (DURC) constitutes a major challenge for research practice and oversight on the local, national and international level. The situation in Germany is shaped by two partly competing suggestions of how to regulate security-related research: The German Ethics Council, as an independent political advisory body, recommended a series of measures, including national legislation on DURC. Competing with that, the German National Academy of Sciences and the German Research Foundation, as two major professional bodies, presented a strategy which draws on the self-control of science and, inter alia, suggests expanding the scope of research ethics committees (RECs) to an evaluation of DURC. This situation is taken as an occasion to further discuss the scope and limits of professional self-control with respect to security-related research. The role of RECs as professional bodies of science is particularly analyzed, referring to the theoretical backgrounds of professionalism. Two key sociological features of professionalism - ethical orientation and professional self-control - are discussed with respect to the practice of biomedical science. Both attributes are then analyzed with respect to the assessment of DURC by RECs. In conclusion, it is stated that issues of biosecurity transcend the boundaries of the scientific community and that a more comprehensive strategy should be implemented encompassing both professional self-control and legal oversight.

  13. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  14. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  15. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  16. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  17. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  18. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  19. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  20. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  1. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  2. 12 CFR 19.243 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Public Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged... results in a violation of applicable professional standards in circumstances in which an accountant knows...

  3. 77 FR 61659 - Proposed Information Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-10

    ... professional education programs and the renewal of the enrollment status for those individuals admitted... years. For additional information on renewals, see Circular 230 or visit the Office of Professional... Accounting Method for Dealers in Securities. OMB Number: 1545-1558. Revenue Procedure Number: Revenue...

  4. 12 CFR 308.602 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... in conduct that results in a violation of applicable professional standards, including those... Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in negligent conduct... applicable professional standards in circumstances in which an accountant knows, or should know, that...

  5. 12 CFR 263.402 - Removal, suspension, or debarment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... recklessly engaged in conduct that results in a violation of applicable professional standards, including... Company Accounting Oversight Board and the Securities and Exchange Commission; (iii) Has engaged in... violation of applicable professional standards in circumstances in which an accountant knows, or should know...

  6. Professional Development Needs as Perceived by Minnesota Industrial Arts/Technology Teachers.

    ERIC Educational Resources Information Center

    Johnson, Scott D.; Summers, Keith

    1984-01-01

    Describes a profile of professional development needs that was developed through a survey of 150 industrial arts/technology teachers in Minnesota. The greatest need was in the area of job environment: salary, job security, facilities and equipment, and discipline. (SK)

  7. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  8. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  9. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  10. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  11. 33 CFR 137.25 - Qualifications of the environmental professional.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Qualifications of the environmental professional. 137.25 Section 137.25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL...

  12. MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security

    DTIC Science & Technology

    2007-01-01

    technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region

  13. From Communities of Interest to Communities of Practice: The Role and Impact of Professional Development in Nuclear Security Education

    ERIC Educational Resources Information Center

    Moran, Matthew; Hobbs, Christopher

    2018-01-01

    In recent years, nuclear security has gained prominence on the international security agenda. Driven by post 9/11 anxieties and the politicization of fears regarding nuclear terrorism, concerns in this area have spawned a wealth of initiatives, which seek to counter this threat. Principal among these have been efforts to promote nuclear security…

  14. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  15. Advancing U.S. Foreign Policy Through Homeland Security: The Logic for International Training and Professional Exchanges

    DTIC Science & Technology

    2013-12-01

    the liberal international relations theory from the political and philosophical theories of John Locke, Adam Smith, John Stuart Mill, and Immanuel... theory and usefulness of such global diplomacy and the practice of police exchanges with many different countries throughout the world is the Los Angeles...by Jon Hall . In the article, Hall notes, the art of persuasion was a major part of the ancients educational system and the ancients understood that

  16. Two management systems in a nursing private practice group.

    PubMed

    Zahourek, R P

    1979-09-01

    Entry into private practice can be rewarding for nurses who are willing to risk personal, financial, and professional security. Among the problems faced by the nurse in this new role is the administration of the practice, since few, if any, adequate models exist. This article describes the struggle of nurses in one private nursing practice, Creative Health Services, to meet their needs for individual freedom within an organization that is regulated sufficiently to maintain its viability.

  17. 76 FR 70207 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-10

    ...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... information concerning associated persons. The proposed rule change was published for comment in the Federal...

  18. Access and privacy rights using web security standards to increase patient empowerment.

    PubMed

    Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E

    2008-01-01

    Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer such principles into national laws. A perspective is given on the state of the art concerning web security standards, which can be used to easily engineer health information systems complying with the patient empowering goals. In conclusion health systems with the characteristics thus described are technically feasible and should be generally implemented and deployed.

  19. Safety and Security Interface Technology Initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less

  20. The role of training in IBA implementation beyond primary health care settings in the UK

    PubMed Central

    Thom, Betsy; Herring, Rachel; Bayley, Mariana

    2016-01-01

    Abstract There has been a considerable drive to encourage a wide range of professional groups to incorporate alcohol screening (or identification) and brief advice (IBA) into their everyday practice. This article aims to examine the role of training in promoting IBA delivery in contexts outside primary care and other health settings. The data are drawn mainly from a structured online survey supplemented by illustrative material from nine qualitative interviews and insights from an expert workshop. Findings support the results from other research that issues relating to role relevance and role security continue to act as barriers to professional change. Furthermore, issues of organisational commitment and organisational barriers are insufficiently addressed in strategy to promote wider use of IBA. The article concludes that development of appropriate training for alcohol IBA needs to take account of the role of IBA within a complex interactive system of related services and help seeking pathways and consider how training can contribute to changing both professional attitudes and behaviours and organisational approaches to implementing and sustaining IBA in everyday professional practice. PMID:28018054

  1. 33 CFR 137.35 - Inquiries by an environmental professional.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...

  2. 33 CFR 137.35 - Inquiries by an environmental professional.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Inquiries by an environmental professional. 137.35 Section 137.35 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY...

  3. Professional Development: Catalyst for Change?

    ERIC Educational Resources Information Center

    Niederhauser, Dale; Wessling, Sarah

    2011-01-01

    Difficulty securing adequate professional development (PD) has long been a barrier to the effective implementation of educational technology. Concerns about the dearth of PD for helping teachers integrate technology into their instructional practices raised nearly 25 years ago appear to still hold true despite repeated calls for increased…

  4. Professional Development Seen as Employment Capital

    ERIC Educational Resources Information Center

    Mackay, Margaret

    2017-01-01

    Practitioners need to invest in professional development to enhance credibility, job security and employment prospects. Employer expectations of continuing development as a performance measure link to the notion of career capital; namely that knowledge competence influences job advancement. This study uses an interpretivist approach to explore…

  5. Flying Solo: Librarian, Manage Thyself.

    ERIC Educational Resources Information Center

    Siess, Judith A.

    1999-01-01

    Discusses solo librarians, or one-person librarians, and the benefits and disadvantages of being the only professional in a library. Topics include independence, variety, enhanced feelings of self-worth, professional isolation, lack of clerical support, lack of job security, low pay, and a list of pertinent resources. (LRW)

  6. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  7. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  8. Training in the Post-Terrorism Era.

    ERIC Educational Resources Information Center

    Caudron, Shari

    2002-01-01

    A survey of training professionals revealed how the terrorist attacks of September 11, 2001 changed employee attitudes toward training. Decreased travel, increased use of distance technologies, development of security and evacuation plans, and emphasis on such topics as diversity, stress management, and security are some of the changes. (JOW)

  9. Former Nonproliferation Graduate Fellow Served at U.S. Mission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brim, Cornelia P.

    2014-10-01

    Because of her training and professional experiences, Rosalyn Leitch, a Security Specialist at Pacific Northwest National Laboratory and former Nonproliferation Graduate Fellow with NIS (2012-2013) was able to transition into temporary assignment as UNVIE Acting Nuclear Security Attaché from November 2013 through February 2014.

  10. Professional's Attitudes Do Not Influence Screening and Brief Interventions Rates for Hazardous and Harmful Drinkers: Results from ODHIN Study.

    PubMed

    Bendtsen, Preben; Anderson, Peter; Wojnar, Marcin; Newbury-Birch, Dorothy; Müssener, Ulrika; Colom, Joan; Karlsson, Nadine; Brzózka, Krzysztof; Spak, Fredrik; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Okulicz-Kozaryn, Katarzyna; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Palacio, Jorge; Baena, Begoña; Slodownik, Luiza; van Steenkiste, Ben; Wolstenholme, Amy; Wallace, Paul; Keurhorst, Myrna N; Laurant, Miranda G H; Gual, Antoni

    2015-07-01

    To determine the relation between existing levels of alcohol screening and brief intervention rates in five European jurisdictions and role security and therapeutic commitment by the participating primary healthcare professionals. Health care professionals consisting of, 409 GPs, 282 nurses and 55 other staff including psychologists, social workers and nurse aids from 120 primary health care centres participated in a cross-sectional 4-week survey. The participants registered all screening and brief intervention activities as part of their normal routine. The participants also completed the Shortened Alcohol and Alcohol Problems Perception Questionnaire (SAAPPQ), which measure role security and therapeutic commitment. The only significant but small relationship was found between role security and screening rate in a multilevel logistic regression analysis adjusted for occupation of the provider, number of eligible patients and the random effects of jurisdictions and primary health care units (PHCU). No significant relationship was found between role security and brief intervention rate nor between therapeutic commitment and screening rate/brief intervention rate. The proportion of patients screened varied across jurisdictions between 2 and 10%. The findings show that the studied factors (role security and therapeutic commitment) are not of great importance for alcohol screening and BI rates. Given the fact that screening and brief intervention implementation rate has not changed much in the last decade in spite of increased policy emphasis, training initiatives and more research being published, this raises a question about what else is needed to enhance implementation. © The Author 2015. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  11. Security Cooperation and Professional Military Education: Developing Better Theater Campaign Planners

    DTIC Science & Technology

    2012-05-22

    publication of the Security Cooperation Guidance ( SCG ), 32 U.S. Joint Chiefs of Staff, Joint Operation...format and content of the plans themselves. 2 The 2003 release of the classified SCG , which replaced TEPs with TSCPs, rendered CJCSM 3113.01 obsolete...interests while providing the SecDef increased visibility on and control over security cooperation activities, but the SCG was not as explicit in its

  12. Medical device integration using mobile telecommunications infrastructure.

    PubMed

    Moorman, Bridget A; Cockle, Richard A

    2013-01-01

    Financial pressures, an aging population, and a rising number of patients with chronic diseases, have encouraged the use of remote monitoring technologies. This usually entails at least one physiological parameter measurement for a clinician. Mobile telecommunication technologies lend themselves to this functionality, and in some cases, avoid some of the issues encountered with device integration. Moreover, the inherent characteristics of the mobile telecommunications infrastructure allow a coupling of business and clinical functions that were not possible before. Table I compares and contrasts some key aspect of device integration in and out of a healthcare facility. An HTM professional may be part of the team that acquires and/or manages a system using a mobile telecommunications technology. It is important for HTM professionals to ensure the data is in a standard format so that the interfaces across this system don't become brittle and break easily if one part changes. Moreover, the security and safety considerations of the system and the data should be a primary consideration in and y purchase, with attention given to the proper environmental and encryption mechanisms. Clinical engineers and other HTM professionals are unique in that they understand the patient/clinician/device interface and the need to ensure its safety and effectiveness regardless of geographical environment.

  13. Design, implementation and migration of security systems as an extreme project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scharmer, Carol; Trujillo, David

    2010-08-01

    Decision Trees, algorithms, software code, risk management, reports, plans, drawings, change control, presentations, and analysis - all useful tools and efforts but time consuming, resource intensive, and potentially costly for projects that have absolute schedule and budget constraints. What are necessary and prudent efforts when a customer calls with a major security problem that needs to be fixed with a proven, off-the-approval-list, multi-layered integrated system with high visibility and limited funding and expires at the end of the Fiscal Year? Whether driven by budget cycles, safety, or by management decree, many such projects begin with generic scopes and funding allocatedmore » based on a rapid management 'guestimate.' Then a Project Manager (PM) is assigned a project with a predefined and potentially limited scope, compressed schedule, and potentially insufficient funding. The PM is tasked to rapidly and cost effectively coordinate a requirements-based design, implementation, test, and turnover of a fully operational system to the customer, all while the customer is operating and maintaining an existing security system. Many project management manuals call this an impossible project that should not be attempted. However, security is serious business and the reality is that rapid deployment of proven systems via an 'Extreme Project' is sometimes necessary. Extreme Projects can be wildly successful but require a dedicated team of security professionals lead by an experienced project manager using a highly-tailored and agile project management process with management support at all levels, all combined with significant interface with the customer. This paper does not advocate such projects or condone eliminating the valuable analysis and project management techniques. Indeed, having worked on a well-planned project provides the basis for experienced team members to complete Extreme Projects. This paper does, however, provide insight into what it takes for projects to be successfully implemented and accepted when completed under extreme conditions.« less

  14. Design implementation and migration of security systems as an extreme project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scharmer, Carol

    2010-10-01

    Decision Trees, algorithms, software code, risk management, reports, plans, drawings, change control, presentations, and analysis - all useful tools and efforts but time consuming, resource intensive, and potentially costly for projects that have absolute schedule and budget constraints. What are necessary and prudent efforts when a customer calls with a major security problem that needs to be fixed with a proven, off-the-approval-list, multi-layered integrated system with high visibility and limited funding and expires at the end of the Fiscal Year? Whether driven by budget cycles, safety, or by management decree, many such projects begin with generic scopes and funding allocatedmore » based on a rapid management 'guestimate.' Then a Project Manager (PM) is assigned a project with a predefined and potentially limited scope, compressed schedule, and potentially insufficient funding. The PM is tasked to rapidly and cost effectively coordinate a requirements-based design, implementation, test, and turnover of a fully operational system to the customer, all while the customer is operating and maintaining an existing security system. Many project management manuals call this an impossible project that should not be attempted. However, security is serious business and the reality is that rapid deployment of proven systems via an 'Extreme Project' is sometimes necessary. Extreme Projects can be wildly successful but require a dedicated team of security professionals lead by an experienced project manager using a highly-tailored and agile project management process with management support at all levels, all combined with significant interface with the customer. This paper does not advocate such projects or condone eliminating the valuable analysis and project management techniques. Indeed, having worked on a well-planned project provides the basis for experienced team members to complete Extreme Projects. This paper does, however, provide insight into what it takes for projects to be successfully implemented and accepted when completed under extreme conditions.« less

  15. 78 FR 16726 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Price, Managing Director, Securities Industry and Financial Markets Association, dated October 4, 2012... other industry professionals will have difficulty pricing options during Limit States and Straddle... conditions have changed and (ii) gaming the obvious error rule to retroactively adjust market maker quotes by...

  16. 76 FR 60953 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the SEC...

  17. 76 FR 29014 - Self-Regulatory Organizations; NASDAQ Stock Market, LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... those who meet the Professional definition have certain technological and informational advantages over... Chapter I, Section I (Definitions). See also Securities Exchange Act Release Nos. 63028 (October 1, 2010... Professionals have the same technological and informational advantages as broker-dealers trading for their own...

  18. Professional Challenges in School Counseling: Organizational, Institutional and Political

    ERIC Educational Resources Information Center

    Hatch, Trish A.

    2008-01-01

    The school counseling profession has struggled throughout history to secure a legitimate integral position in the educational mission of school. The profession is more likely to gain acceptance and be seen as a legitimate profession if we understand three theories that form the foundation of professional legitimacy: Organizational Theory,…

  19. 20 CFR 438.205 - Professional and technical services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...

  20. 20 CFR 438.205 - Professional and technical services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...

  1. When the business of nursing was the nursing business: the private duty registry system, 1900-1940.

    PubMed

    Whelan, Jean C

    2012-05-31

    In the initial decades of the 20th century, most nurses worked in the private sector as private duty nurses dependent on their own resources for securing and obtaining employment with individual patients. To organize and systematize the ways in which nurses sought jobs, a structure of private duty registries, agencies which connected nurses with patients, was established via professional nurse associations. This article describes the origins of the private duty nurse labor market as the main employment field for early nurses and ways in which the private duty registry system connected nurses and patients. The impact of professional nurses associations and two registries, (New York and Chicago) illustrates how the business of nursing was carried out, including registry formation, operation, and administration. Private duty nurses are compelling examples of a previous generation of nurse entrepreneurs. The discussion identifies problems and challenges of private nursing practice via registries, including the decline and legacy of this innovative nurse role. The story of early 20th century nurse owned and operated registries provides an early and critical historical illustration of the realization of nurse power, entrepreneurship, and control over professional practice that we still learn from today.

  2. Patient and health care professional views and experiences of computer agent-supported health care.

    PubMed

    Neville, Ron G; Greene, Alexandra C; Lewis, Sue

    2006-01-01

    To explore patient and health care professional (HCP) views towards the use of multi-agent computer systems in their GP practice. Qualitative analysis of in-depth interviews and analysis of transcriptions. Urban health centre in Dundee, Scotland. Five representative healthcare professionals and 11 patients. Emergent themes from interviews revealed participants' attitudes and beliefs, which were coded and indexed. Patients and HCPs had similar beliefs, attitudes and views towards the implementation of multi-agent systems (MAS). Both felt modern communication methods were useful to supplement, not supplant, face-to-face consultations between doctors and patients. This was based on the immense trust these patients placed in their doctors in this practice, which extended to trust in their choice of communication technology and security. Rapid access to medical information increased patients' sense of shared partnership and self-efficacy. Patients and HCPs expressed respect for each other's time and were keen to embrace technology that made interactions more efficient, including for the altruistic benefit of others less technically competent. Patients and HCPs welcomed the introduction of agent technology to the delivery of health care. Widespread use will depend more on the trust patients place in their own GP than on technological issues.

  3. Welcoming with risk classification in teaching hospitals: assessment of structure, process and result.

    PubMed

    Vituri, Dagmar Willamowius; Inoue, Kelly Cristina; Bellucci Júnior, José Aparecido; de Oliveira, Carlos Aparecido; Rossi, Robson Marcelo; Matsuda, Laura Misue

    2013-01-01

    To assess, from the worker's viewpoint, the structure, the process and the results of the Emergency Hospital Services that have taken up the guideline of "Welcoming with Risk Classification" in two teaching hospitals of the state of Paraná. Quantitative and descriptive research, exploratory and prospective, using random sampling stratified by professional category, comprising a universe of 216 professional people. They found some points of agreement regarding the promotion of a welcoming and humane environment; privacy and security; welcome and shelter of the companion and also the sheltering and classification of all patients; however, there was disagreement about the comfort of the environment, reference system and counter-reference, prioritisation of seriously ill patients in post-classification service, communication between the members of the multi-professional team and reassessment of the guideline. The workers assess the development of the guideline as being precarious, due mainly to the lack of physical structure, due to the lack of physical structure and shortcomings in the service process.

  4. Sense of security - searching for its meaning by using stories: a Participatory Action Research study in health and social care in Sweden.

    PubMed

    Petersson, Pia; Blomqvist, Kerstin

    2011-03-01

    The aim of this study was to make sense of the Swedish concept 'trygghet' by using stories from daily life in a Participatory Action Research project. In Sweden, attempts to implement core values to ensure high quality health and social care for older people are given high priority and concepts such as security and dignity are often used. As concepts are abstract they are difficult to transform into practical work. One group of six assistant nurses and one group of five Registered Nurses working in a municipality participated in Story Dialogue Method and four older women were interviewed. 'Trygghet' was found to be an internal sense - an intrinsic state based on faith and trust in oneself and others called Sense of security. External factors that strengthened Sense of security were to be part of a community, to recognize and be familiar with things and situations and to use various kinds of aids. A prerequisite for the professionals being able to support the care receivers adequately is that they have a sense of security themselves, and that they are allowed to operate in a system that facilitates for the care receivers to maintain trustworthy and reliable relations over time. © 2010 Blackwell Publishing Ltd.

  5. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  6. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.

    PubMed

    Busdicker, Mike; Upendra, Priyanka

    2017-09-02

    This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.

  7. Professional convergence in forensic practice.

    PubMed

    Mercer, D; Mason, T; Richman, J

    2001-06-01

    This paper outlines the development and convergence of forensic science and secure psychiatric services in the UK, locating the professionalization of forensic nursing within a complex web of political, economic, and ideological structures. It is suggested that a stagnation of the therapeutic enterprise in high and medium security provision has witnessed an intrusion of medical power into the societal body. Expanding technologies of control and surveillance are discussed in relation to the move from modernity to postmodernity and the ongoing dynamic of medicalized offending. Four aspects of globalization are identified as impacting upon the organization and application of forensic practice: (i) organized capitalism and the exhaustion of the welfare state; (ii) security versus danger and trust versus risk; (iii) science as a meta-language; and (iv) foreclosure as a mechanism of censorship. Finally, as a challenge for the profession, some predictions are offered about the future directions or demise of forensic nursing.

  8. Impacts of Vehicle (In)Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chugg, J.; Rohde, K.

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cybermore » entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial discussion of how a vehicle can be used as a new threat vector to penetrate secure facilities will be presented. This includes how a modern automobile can be used as the exploitation mechanism for nearby devices such as laptops, cell phones, and wireless access points. Additional discussion will highlight how vehicle security might impact transportation of nuclear material through remote exploitation of a moving vehicle. The final discussion will include what possible implications might be relative to the physical protection systems at nuclear facilities. The audience will also be given details regarding the complexity of attack, thus implying the likelihood of successful exploitation, and information on how such attacks may be mitigated. Emerging security products for automobiles will be discussed and other mitigation methods will be detailed (e.g. disabling vehicle cellular modems). As a result, the audience will have a greater understanding of how to add vehicle security as a part of a comprehensive nuclear security policy.Finally, this paper will highlight the similarities between CAN Bus and other broadcast serial bus networks such as Profibus or DeviceNet, helping educate the reader on how susceptible this type of networking is to nefarious attacks and how it might affect components connected to many different nuclear systems, including control systems, safety systems, emergency systems, and support systems.« less

  9. Wireless communication in health care: who will win the right to send data boldly where no data has gone before?

    PubMed

    Campbell, Robert J; Durigon, Louis

    2003-01-01

    Increasingly, health care professionals will need to retrieve, store, share, and send data using several types of wireless devices. These devices include personal digital assistants, laptops, Web tablets, cell phones, and clothing that monitor heart rate and blood pressure. Regardless of the device, several standards will vie for the right to provide the wireless communications link between the health care professional and the wired data resources located within a health care organization. This article identifies the top three technologies in the wireless communications field: Wireless Fidelity (WiFi), Mobile Communications, and Bluetooth; breaks down each according to its strengths and weaknesses; and makes recommendations for their use by health care professionals located inside and outside a health care facility. Where appropriate the discussion includes an explication of how a specific technology can be made secure from hackers and other security breeches.

  10. [Experience feedback committee: a method for patient safety improvement].

    PubMed

    François, P; Sellier, E; Imburchia, F; Mallaret, M-R

    2013-04-01

    An experience feedback committee (CREX, Comité de Retour d'EXpérience) is a method which contributes to the management of safety of care in a medical unit. Originally used for security systems of civil aviation, the method has been adapted to health care facilities and successfully implemented in radiotherapy units and in other specialties. We performed a brief review of the literature for studies reporting data on CREX established in hospitals. The review was performed using the main bibliographic databases and Google search results. The CREX is designed to analyse incidents reported by professionals. The method includes monthly meetings of a multi-professional committee that reviews the reported incidents, chooses a priority incident and designates a "pilot" responsible for investigating the incident. The investigation of the incident involves a systemic analysis method and a written synthesis presented at the next meeting of the committee. The committee agrees on actions for improvement that are suggested by the analysis and follows their implementation. Systems for the management of health care, including reporting systems, are organized into three levels: the medical unit, the hospital and the country as a triple loop learning process. The CREX is located in the base level, short loop of risk management and allows direct involvement of care professionals in patient safety. Safety of care has become a priority of health systems. In this context, the CREX can be a useful vehicle for the implementation of a safety culture in medical units. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  11. Improving computer security by health smart card.

    PubMed

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual national implementation of the CPS project and the introduction of new functions using electronic signatures and encryption.

  12. On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    NASA Astrophysics Data System (ADS)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.

  13. Public security female workers at the coast of Paraná, Brazil: intersections of gender, work, violence(s), and health.

    PubMed

    Schneider, Daniele; Signorelli, Marcos Claudio; Pereira, Pedro Paulo Gomes

    2017-09-01

    This study aimed to promote visibility of women working in public security along the Parana coast, articulating issues of gender, violence(s), and the health-disease process. The methodology was qualitative, through an ethnographic research which included 50 women (civilians, military policewomen, and prison officers) from municipalities along the Parana coast, between March 2014 and March 2015. Results revealed: 1) the dilemmas that these women are subjected to, facing the seasonal dynamics in the field of public security in the region; 2) exposure to violence (mainly institutional and gender-based) and its impact on these women's health; 3) power relations, marked by corporations' hierarchies and gender asymmetries between men and women in professional settings. In summary, this research highlighted the need to promote visibility of women working in public security institutions, considering the impact of violence and gender inequalities in their personal and professional lives, including the resistance and rearrangements promoted by these women in the institutions in response to their presence in a hegemonic and traditionally male environment.

  14. Summary and conclusions from the SIWI Seminar for Young Water Professionals Drainage basin security--implications of virtual water trade and agricultural subsidies at regional, national and local levels.

    PubMed

    Johannessen, A

    2004-01-01

    This is a summary of the Young Water Professionals Seminar involving more than 50 young people from all over the world working with water. The presentations and following discussion were very lively and were about how subsidies and trade barriers imposed by the developed countries are influencing the income-generating capacity of millions of people in the developing world. Even though this is a very complex issue not easily resolved during the seminar it was also clear that there are some fundamental problems that need to be addressed. The importance of looking for solutions at different levels (i.e. local, regional, national) was highlighted as well as the policy of double standards, preaching free trade but only for the benefit of overdeveloped countries themselves. Further it was discussed how to achieve basin security through food security, and managing water for food security. The conclusion was that win-win solutions would be made if agricultural subsidies were to be completely removed.

  15. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    PubMed

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.

  16. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    PubMed

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  17. Evaluating the Use of Remote Sensing Data in the USAID Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Brickley, Elizabeth B.

    2011-01-01

    The US Agency for International Development (USAID) s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. Here we analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000-2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices and food access parameters in their analysis of food security problems. The reports display large scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data was used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10%, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  18. 77 FR 42036 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... Market Maker,\\5\\ Firm Proprietary and Customer (Professional) \\6\\ orders; and (ii) $0.78 per contract for Non-ISE Market Maker \\7\\ orders. Priority Customer \\8\\ orders are not charged a ``taker'' fee for... Proprietary and Customer (Professional) orders. Priority Customer orders are not charged a ``maker'' fee for...

  19. 77 FR 16304 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-20

    ...\\ Market Maker Plus,\\8\\ Firm Proprietary, Customer (Professional),\\9\\ Non-ISE Market Maker,\\10\\ and Priority Customer.\\11\\ The Exchange is proposing to increase certain rebates for certain complex orders, as... determine whether or not they are meeting the Exchange's stated criteria. \\9\\ A Customer (Professional) is a...

  20. Selected Organizational Factors Affecting Performance of Professional Nurses in North West Bank Governmental Hospitals

    ERIC Educational Resources Information Center

    Thulth, Ahida Saleem; Sayej, Sumaya

    2015-01-01

    Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess of selected organizational factors (workload, available recourses and…

  1. Relationship between Innovation and Professional Communication in the "Creative" Economy

    ERIC Educational Resources Information Center

    Hailey, David; Cox, Matthew; Loader, Emily

    2010-01-01

    We evaluate 45 jobs professional communicators might occupy. Specifically, we examine the impact of creativity on careers that may become more or less easily outsourced domestically or offshore in the future. We are unable to find any particular relationship between creativity, per se, and job security. Instead, we find that people with knowledge…

  2. Professional Amnesia: A Suitable Case for Treatment

    ERIC Educational Resources Information Center

    Drummond, Mary Jane

    2005-01-01

    Early Years educators have always had a particularly secure feel for what lies at the heart of vibrant education, for "a principled understanding of learning." Here Mary Jane Drummond reminds the reader, not only that professional knowledge exists outside ring binders, but that, prior to their emergence, we did know some very important things we…

  3. Homeland security challenges in nursing practice.

    PubMed

    Boatright, Connie; McGlown, K Joanne

    2005-09-01

    Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.

  4. [Medical doctor in mountain rescue service - a profession's perspective].

    PubMed

    Putzke, Matthias

    2008-01-01

    Helicopter emergency services (HEMS) carrying doctors trained in emergency medicine represent a well established system for primary care with increasing professionalism since their implementation in the seventies until now. However, considerable differences persist in Europe concerning the structure as well as integration of the system in the entire organisation of area-wide demands. Based on the particular geographic conditions in the alps which are highly associated with challenges for man and material a dense network of helicopter airbases has been established. Hence, this system accounts for the social, economical and touristic requirements of this region in terms of providing sufficient emergency medical treatment. In addition to statutory and professional provisions qualification requirements for emergency doctors comprehend extensive alpine training. Primarily this provides personal safety as well as security for the entire team and the patient which particularly applies for technical rope rescue. Advanced all-season training is compulsory due to seasonal differences in casualties. Well harmonized training with cross-border validity is not available to-date. Hence, the development of obligatory standard operating procedures should be the major goal of medical associations and societies.

  5. The Impact of an eHealth Portal on Health Care Professionals’ Interaction with Patients: Qualitative Study

    PubMed Central

    Faxvaag, Arild; Svanæs, Dag

    2015-01-01

    Background People who undergo weight loss surgery require a comprehensive treatment program to achieve successful outcomes. eHealth solutions, such as secure online portals, create new opportunities for improved health care delivery and care, but depend on the organizational delivery systems and on the health care professionals providing it. So far, these have received limited attention and the overall adoption of eHealth solutions remains low. In this study, a secure eHealth portal was implemented in a bariatric surgery clinic and offered to their patients. During the study period of 6 months, 60 patients and 5 health care professionals had access. The portal included patient information, self-management tools, and communication features for online dialog with peers and health care providers at the bariatric surgery clinic. Objective The aim of this study was to characterize and assess the impact of an eHealth portal on health care professionals’ interaction with patients in bariatric surgery. Methods This qualitative case study involved a field study consisting of contextual interviews at the clinic involving observing and speaking with personnel in their actual work environment. Semi-structured in-depth interviews were conducted with health care professionals who interacted with patients through the portal. Analysis of the collected material was done inductively using thematic analysis. Results The analysis revealed two main dimensions of using an eHealth portal in bariatric surgery: the transparency it represents and the responsibility that follows by providing it. The professionals reported the eHealth portal as (1) a source of information, (2) a gateway to approach and facilitate the patients, (3) a medium for irrevocable postings, (4) a channel that exposes responsibility and competence, and (5) a tool in the clinic. Conclusions By providing an eHealth portal to patients in a bariatric surgery program, health care professionals can observe patients’ writings and revelations thereby capturing patient challenges and acting and implementing measures. Interacting with patients through the portal can prevent dropouts and deterioration of patients’ health. However, professionals report on organizational challenges and personal constraints related to communicating with patients in writing online. Further development of guidelines and education of health care professionals about how to handle, prioritize, communicate, and facilitate patients online is required in addition to increased attention to the organizational infrastructures and incentives for enabling such solutions in health care. PMID:26601678

  6. [Information, knowledge and healthcare practice: professionals participation as the key element of the gear].

    PubMed

    Adam, Paula; Permanyer-Miralda, Gaietà; Solà-Morales, Oriol; Canela-Soler, Jaume

    2010-02-01

    This article analyzes the role of ICT within the complicated gear between information, knowledge and healthcare practices, which particular focus on two specific cases: the digitalization process of the healthcare system and the application of knowledge into the healthcare practices. In both cases, international and local experiences suggest, and sometimes demonstrate the importance of the participation, capacity-building and empowerment of healthcare practitioners for the generation, transfer and use of information and knowledge empowered by the digital tools which should bring into the system better performance, more efficacy, efficiency, equity, equality, security, quality. 2010 Elsevier España S.L. All rights reserved.

  7. The ISACA Business Model for Information Security: An Integrative and Innovative Approach

    NASA Astrophysics Data System (ADS)

    von Roessing, Rolf

    In recent years, information security management has matured into a professional discipline that covers both technical and managerial aspects in an organisational environment. Information security is increasingly dependent on business-driven parameters and interfaces to a variety of organisational units and departments. In contrast, common security models and frameworks have remained largely technical. A review of extant models ranging from [LaBe73] to more recent models shows that technical aspects are covered in great detail, while the managerial aspects of security are often neglected.Likewise, the business view on organisational security is frequently at odds with the demands of information security personnel or information technology management. In practice, senior and executive level management remain comparatively distant from technical requirements. As a result, information security is generally regarded as a cost factor rather than a benefit to the organisation.

  8. [Clinical ethics committees in Mexico: their development in the Mexican Institute of Social Security].

    PubMed

    Valdez-Martínez, Edith; Bedolla, Miguel

    2007-01-01

    The Mexican Institute of Social Security (IMSS) considers the relevance of ethics in a similar context than other countries have developed. According to these considerations, IMSS implemented formally of system of local committees on clinical ethics (CLEC), not only to provide support when ethical dilemmas emerge, but to facilitate the development of an ethics culture among health professionals. The implementation of the CLEC network started in 2004, and since then, its number has increased across the country. Currently IMSS has 78 CLECs. Their number continues to grow due to the level of awareness about the importance of ethics for making medical decisions. In November 2006 the first CLEC national meeting was held and the need to redefine strategies to improve performance of CLECS emerged. This article reports the current situation of the CLECs in Mexico.

  9. XRIndex: a brief screening tool for individual differences in security threat detection in x-ray images

    PubMed Central

    Rusconi, Elena; Ferri, Francesca; Viding, Essi; Mitchener-Nissen, Timothy

    2015-01-01

    X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported attention to detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012). Here, we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score from the autism-spectrum quotient (AQ) questionnaire (Baron-Cohen et al., 2001) is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals. PMID:26321935

  10. Development of Standardized Clinical Training Cases for Diagnosis of Sexual Abuse using a Secure Telehealth Application

    ERIC Educational Resources Information Center

    Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia

    2012-01-01

    Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…

  11. Working Connections: Suzan Lee--UBS Securities LLC, New York

    ERIC Educational Resources Information Center

    Library Journal, 2004

    2004-01-01

    This article is about Suzan Lee of UBS Securities LLC in New York, a person who is dedicated to connecting aspiring professionals to opportunities in the world of special libraries. In 1999, Lee realized that most library students had only one resource for internships--their library schools--and that these offerings focused largely on public and…

  12. The Perceptions of U.S.-Based IT Security Professionals about the Effectiveness of IT Security Frameworks: A Quantitative Study

    ERIC Educational Resources Information Center

    Warfield, Douglas L.

    2011-01-01

    The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…

  13. Human capital flight challenges within an equitable health system.

    PubMed

    Udonwa, N E

    2007-01-01

    The issue of human capital flight has been discussed at different forums with a consensus opinion that it has its merits and demerits to equitable health system. Most often one nation becomes a substantial net exporter of talent, leaving the provider nation at risk of depleting its natural supply of talent. This paper looks into the historical perspective of human capital flight or "brain drain", and its burden. It attempts to elucidate the various causes and suggested solutions. The paper's objective is to educate colleagues on the conceptual and contextual imperatives of the issue. Using a convenient sample of key informants who were medical colleagues in Nigeria relevant information was sourced from these colleagues, documents from the postgraduate medical college of Nigeria and the internet on maters relating to human capital flight and brain drain. Every year, thousands of qualified doctors, and other professionals leave Nigeria tempted by significantly higher wages, brighter prospects for employment and education, stability, food security. It appears that the potential exposure to different working conditions, resources and professional environments can be of advantage to the country, should Nigeria be able to recall these professionals. It also appears that necessary economic reforms that make staying at home rewarding, that is--good leadership, and policy planning that seriously looks into rural development, among other issues, are keys ingredients to reversing the trend in order to ensure a more equitable health system.

  14. The importance of effective catheter securement.

    PubMed

    Fisher, Jayne

    This article examines the importance of securing/fixing indwelling urinary catheters. The Oxford English dictionary interlinks the two words-'secure' and 'fix'-as having the same meaning. To secure the catheter should not be confused with 'support', whereby the weight of the urine drainage bag is supported with the use of velcro straps or a sleeve. The author introduces the need for the concept of this practice to be at the forefront of nurses' minds in all settings, and this is demonstrated through the use of case studies. Current guidance in this area is reviewed, as well as the problems that can arise when catheters are not secured properly and the available products for health professionals to use.

  15. 77 FR 35727 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... categories: ISE Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary, Customer (Professional),\\8\\ Non-ISE Market Maker,\\9\\ and Priority Customer.\\10\\ The Exchange is proposing to increase certain rebate amounts... Customer (Professional) is a person who is not a broker/ dealer and is not a Priority Customer. \\9\\ A Non...

  16. Operational Contract Support: Economic Impact Evaluation and Measures of Effectiveness

    DTIC Science & Technology

    2017-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES...DATES COVERED MBA professional report 4. TITLE AND SUBTITLE OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES OF EFFECTIVENESS 5...evaluation, expeditionary economics , operational contract support, measure of effectiveness 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY

  17. 77 FR 28914 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary and Customer (Professional) \\8\\ orders; and (ii... for ISE Market Maker, Market Maker Plus, Firm Proprietary and Customer (Professional) orders; and (ii... Plus is an ISE Market Maker who is on the National Best Bid or National Best Offer 80% of the time for...

  18. Mentoring and Personal Relationships Are Perceived Benefits of Serving as an Athletic Training Preceptor

    ERIC Educational Resources Information Center

    Bowman, Thomas G.; Mazerolle, Stephanie M.; Dodge, Thomas M.

    2013-01-01

    Context: Preceptors play a vital role in athletic training education as they mentor and socialize athletic training students into their professional role. Exploring the benefits to serving as a preceptor is important to secure appropriate professional role models for students. Objective: To determine the benefits of serving as an athletic training…

  19. Attitudes toward the large-scale implementation of an incident reporting system.

    PubMed

    Braithwaite, Jeffrey; Westbrook, Mary; Travaglia, Joanne

    2008-06-01

    An electronic Incident Information Management System implemented system-wide by the Department of Health, New South Wales, Australia was evaluated. We hypothesized that health professionals (i) would support the system via utilization and favourable attitudes and (ii) that their usage and attitudes would vary according to profession with nurses being most, and doctors least, favourably disposed. An online, anonymous questionnaire survey of 2185 health practitioners. Undertaking system training, satisfaction with training, reporting incidents, incident reporting rates since system introduction and attitude questions focusing on use, security and evaluation of the system and workplace safety cultures. The first hypothesis received partial support. The majority of respondents had undertaken training and rated it highly. Most had reported incidents and maintained their previous reporting levels. Most attitudes regarding using the system and its security were favourable. Mixed attitudes were held about workplace safety cultures and the value of the system. Deficiencies in quality of reporting, feedback on incident reports and resources to analyse incident data were problems identified. The second hypothesis was confirmed. Nurses were most, and doctors least, likely to undertake training, report incidents and express favourable attitudes. Allied health responses were intermediate to those of the other professions. The system implementation was relatively successful, but more so with some professions. Problems identified indicated that expectations as to the goals achievable in the short term were optimistic, but these are amenable to planned interventions.

  20. Diagnosing water security in the rural North with an environmental security framework.

    PubMed

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. An eConsent-based System Architecture Supporting Cooperation in Integrated Healthcare Networks.

    PubMed

    Bergmann, Joachim; Bott, Oliver J; Hoffmann, Ina; Pretschner, Dietrich P

    2005-01-01

    The economical need for efficient healthcare leads to cooperative shared care networks. A virtual electronic health record is required, which integrates patient related information but reflects the distributed infrastructure and restricts access only to those health professionals involved into the care process. Our work aims on specification and development of a system architecture fulfilling these requirements to be used in concrete regional pilot studies. Methodical analysis and specification have been performed in a healthcare network using the formal method and modelling tool MOSAIK-M. The complexity of the application field was reduced by focusing on the scenario of thyroid disease care, which still includes various interdisciplinary cooperation. Result is an architecture for a secure distributed electronic health record for integrated care networks, specified in terms of a MOSAIK-M-based system model. The architecture proposes business processes, application services, and a sophisticated security concept, providing a platform for distributed document-based, patient-centred, and secure cooperation. A corresponding system prototype has been developed for pilot studies, using advanced application server technologies. The architecture combines a consolidated patient-centred document management with a decentralized system structure without needs for replication management. An eConsent-based approach assures, that access to the distributed health record remains under control of the patient. The proposed architecture replaces message-based communication approaches, because it implements a virtual health record providing complete and current information. Acceptance of the new communication services depends on compatibility with the clinical routine. Unique and cross-institutional identification of a patient is also a challenge, but will loose significance with establishing common patient cards.

  2. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  3. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  4. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  5. How Professionals Share an E-Care Plan for the Elderly in Primary Care: Evaluating the Use of an E-Communication Tool by Different Combinations of Professionals.

    PubMed

    de Jong, Catharina C; Ros, Wynand Jg; van Leeuwen, Mia; Schrijvers, Guus

    2016-11-24

    Home-dwelling elderly patients with multimorbidity are at risk of fragmentation of care because of the many different professionals involved and a potentially unclear level of communication. Multidisciplinary communication seems to occur incidentally. Mutual feedback is needed for a professional team to provide consistent care and adequate support to the patient system. eHealth technology can improve outcomes. The aim of this study was to evaluate the use of a tool, Congredi, for electronic communication by professionals for the care of home-dwelling elderly patients. The research group was recruited through general practices and home care organizations. Congredi, a tool designed for multidisciplinary communication, was made available for professionals in primary care. It consists of a care plan and a communication channel (secure emailing). Professionals opened Congredi records for elderly patients who had 2 or more professionals involved. The records were the unit of analysis. Data were gathered from the Congredi system over a period of 42 weeks. An inclusion rate of 21.4% (203/950) was achieved; nearly half of the participants were nurses. During the study, professionals were active in 448 patient records; female professionals were prevalent. In the patient records, 3 types of actions (care activities, emailing, and process activities) were registered. Most activities occurred in the multidisciplinary records (mean 12.2), which had twice the number of activities of monodisciplinary records (6.35), and solo records had a mean of 3.43 activities. Most activities were care activities (mean 9.14), emailing had a mean of 0.89 activities, and process activities had a mean of 0.29. An e-communication tool (Congredi) was usable for improving multidisciplinary communication among professionals. It even seemed to yield results for 40% of the professionals who used the e-care plan on their own. The content of the tool provided an active communication practice, with significant increases observed in the actions that must be shared for the effective coordination of care. ©Catharina C de Jong, Wynand JG Ros, Mia van Leeuwen, Guus Schrijvers. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 24.11.2016.

  6. A baseline assessment of emergency planning and preparedness in Italian universities.

    PubMed

    Marincioni, Fausto; Fraboni, Rita

    2012-04-01

    Besides offering teaching and research services, schools and universities also must provide for the safety and security of their employees, students, and visitors. This paper describes emergency preparedness in a sample of Italian universities. In particular it examines risk perception within a specific professional category (university safety and security officers) in a specific cultural context (Italy). In addition, it discusses the transposition and implementation in a European Union (EU) member state of EU Council Directive 89/391/EEC of 12 June 1989, on the introduction of measures to encourage improvements in the safety and health of workers. The findings highlight heterogeneous and fragmented emergency management models within the Italian university system, underlining the need for a stricter framework of standardised safety protocols and emergency management guidelines. The study also points out that enhancing emergency planning and preparedness in Italian universities entails increasing safety leadership, employee engagement and individual responsibility for safety and security; essentially, it necessitates improving the culture of risk prevention. © 2012 The Author(s). Disasters © Overseas Development Institute, 2012.

  7. When security and medicine missions conflict: confidentiality in prison settings.

    PubMed

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  8. 12 CFR 1271.30 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... charges, printing, legal, and professional fees, postage, courier services, and office supplies; and (2... accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges, joint...

  9. Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals

    DTIC Science & Technology

    2014-10-01

    of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance

  10. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    ERIC Educational Resources Information Center

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  11. Social Media Principles Applied to Critical Infrastructure Information Sharing

    DTIC Science & Technology

    2013-12-01

    shooters. The DHS works throughout the year to build partnerships with industries across a wide spectrum, to include commercial facilities. They...security professionals , industry association and security organizations, emergency managers, and planners and architects. Each of these stakeholder sets... Project Report.126 The DARPA SCP fellows identified 14 factors that affected the performance of any one team. Notable among the collection were

  12. Coping With Their Lives Women, Learning Disabilities, Self-Harm And The Secure Unit: A Q-Methodological Study

    ERIC Educational Resources Information Center

    James, Melissa; Warner, Sam

    2005-01-01

    Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…

  13. Lethal and Legal The Ethics of Drone Strikes

    DTIC Science & Technology

    2015-12-01

    analysis, evaluation, and refinement of professional expertise in war, strategy, operations, national security, resource management , and responsible...in business studies and holds an M.Phil. in defence and security studies from the Defence College of Management and Technol- ogy, Defence Academy...in unsafe buildings, search and rescue missions in treacherous conditions, police searches for missing or wanted persons, traffic management , public

  14. Psychosocial Needs of Boys in Secure Care for Serious or Persistent Offending

    ERIC Educational Resources Information Center

    Harrington, R. C.; Kroll, L.; Rothwell, J.; McCarthy, K.; Bradley, D.; Bailey, S.

    2005-01-01

    Background: The mental health of child offenders who are detained in secure settings is a matter of great public and professional concern but there has been little systematic longitudinal research on the outcomes of these problems once the young person has returned to the community. The aims of the present study were to describe the psychosocial…

  15. An Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection

    ERIC Educational Resources Information Center

    Maar, Michael C.

    2013-01-01

    This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…

  16. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers

    PubMed Central

    Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N

    2014-01-01

    Introduction This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). Methods The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents’ concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Results Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). Conclusions This study underscores the need for enhanced measures to secure patients’ PHI to avoid undermining their trust. PMID:23975624

  17. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers.

    PubMed

    Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N

    2014-01-01

    This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents' concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). This study underscores the need for enhanced measures to secure patients' PHI to avoid undermining their trust.

  18. [The System and Human Resources for Occupational Health in Republic Of Indonesia for Japanese Enterprises to Manage Proper Occupational Health Activities at Overseas Workplaces].

    PubMed

    Hiraoka, Ko; Kajiki, Shigeyuki; Kobayashi, Yuichi; Adi, Nuri Purwito; Soemarko, Dewi Sumaryani; Uehara, Masamichi; Nakanishi, Shigemoto; Mori, Koji

    2017-11-30

    To consider the appropriate occupational health system for Japanese enterprises in Indonesia with information on the regulations and development of the specialists. In this study, we used the information-gathering checklist developed by Kajiki et al. Along with literature and internet surveys, we surveyed local corporations owned and operated by Indonesians, central government agencies in charge of medical and health issues, a Japanese independent administrative agency supporting subsidiaries of overseas Japanese enterprises, and an educational institution formulating specialized occupational physician training curricula. In Indonesia, the Ministry of Manpower and the Ministry of Health administer occupational health matters. The act No. 1 on safety serves as the fundamental regulation. We confirmed at least 40 respective regulations in pertinent areas, such as the placement of medical and health professionals, health examinations, occupational disease, and occupational health service agencies. There are some regulations that indicate only an outline of activities but not details. Occupational physicians and safety officers are the two professional roles responsible for occupational health activities. A new medical insurance system was started in 2014, and a workers' compensation system was also established in 2017 in Indonesia according to the National Social Security System Act. Although safety and health laws and regulations exist in Indonesia, their details are unclear and the quality of expert human resources needed varies. To conduct high-quality occupational health activities from the standpoint of Japanese companies' headquarters, the active promotion of employing highly specialized professionals and cooperation with educational institutions is recommended.

  19. Erosion of Digital Professionalism During Medical Students' Core Clinical Clerkships.

    PubMed

    Mostaghimi, Arash; Olszewski, Aleksandra E; Bell, Sigall K; Roberts, David H; Crotty, Bradley H

    2017-05-03

    The increased use of social media, cloud computing, and mobile devices has led to the emergence of guidelines and novel teaching efforts to guide students toward the appropriate use of technology. Despite this, violations of professional conduct are common. We sought to explore professional behaviors specific to appropriate use of technology by looking at changes in third-year medical students' attitudes and behaviors at the beginning and conclusion of their clinical clerkships. After formal teaching about digital professionalism, we administered a survey to medical students that described 35 technology-related behaviors and queried students about professionalism of the behavior (on a 5-point Likert scale), observation of others engaging in the behavior (yes or no), as well as personal participation in the behavior (yes or no). Students were resurveyed at the end of the academic year. Over the year, perceptions of what is considered acceptable behavior regarding privacy, data security, communications, and social media boundaries changed, despite formal teaching sessions to reinforce professional behavior. Furthermore, medical students who observed unprofessional behaviors were more likely to participate in such behaviors. Although technology is a useful tool to enhance teaching and learning, our results reflect an erosion of professionalism related to information security that occurred despite medical school and hospital-based teaching sessions to promote digital professionalism. True alteration of trainee behavior will require a cultural shift that includes continual education, better role models, and frequent reminders for faculty, house staff, students, and staff. ©Arash Mostaghimi, Aleksandra E Olszewski, Sigall K Bell, David H Roberts, Bradley H Crotty. Originally published in JMIR Medical Education (http://mededu.jmir.org), 03.05.2017.

  20. Evaluating the Use of Remote Sensing Data in the U.S. Agency for International Development Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly Elizabeth; Brickley, Elizabeth B

    2012-01-01

    The U.S. Agency for International Development (USAID)'s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods, and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. We analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000 to 2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices, and food access parameters in their analysis of food security problems. The reports display large-scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data were used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10% of the time, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  1. Impact of Night Shift and Training Development Factors on Performance of Professional Nurses in North West Bank Governmental Hospitals

    ERIC Educational Resources Information Center

    Ayed, Ahmad; Thulth, Ahida Saleem; Sayej, Sumaya

    2015-01-01

    Background: Organizational factors are considered to be the cornerstone in achieving psychological and professional security at work, which in turn are positively reflected in job performance both quantitatively and qualitatively. Aim of the Study: The study aimed to assess night shift and education/training developmental factors on performance of…

  2. Local research ethics committees of the Mexican Institute of Social Security: results of a national survey.

    PubMed

    Valdez-Martinez, E; Garduño-Espinosa, J; Martinez-Salgado, H; Porter, J D H

    2004-07-01

    To identify the structure, composition and work of the local research ethics committees (LRECs) of the Mexican Institute of Social Security (IMSS) in Mexico. A descriptive cross-sectional study was performed that included all LRECs of the IMSS. A total of 335 questionnaires coded in advance were posted to each LREC secretary. The requested information was from January to December 2001. The response rate was 100%. Two hundred and thirty-eight (71%) LRECs were reported as 'active' during the evaluation period. Although almost all LRECs were composed of diverse professionals, physicians dominated the LRECs' membership. The rejection rate for research projects was lower than 1 per 1000, and less than half of the LRECs held meetings to issue a report of projects' evaluation. LRECs need to foster good ethical research; implementation of an audit system to examine their work might help improve LRECs' performance and accountability.

  3. Square pegs in round holes: information systems, hospitals and the significance of contextual awareness.

    PubMed

    Tjora, Aksel Hagen; Scambler, Graham

    2009-02-01

    The considerable emphasis in the development and implementation of clinical information systems in hospitals internationally seems to have had a limited effect. In particular, the implementation of electronic patient record (EPR) systems has been slower and more difficult than anticipated and with little change in efficiency and security. This paper suggests why this might be the case. Well established research findings within the field of computer supported cooperative work (CSCW--an interdisciplinary research field between informatics and the social sciences) are cited to construct a case for greater awareness of (1) inter- and intra-professional interests, and (2) broader social and health policy contexts. We draw on Gouldner's work [(1957). Cosmopolitans and locals: toward an analysis of latent social roles--I. Administrative Science Quarterly, 2(3), 281-306; (1958). Cosmopolitans and locals: toward an analysis of latent social roles--II. Administrative Science Quarterly, 2 (4), 444-480] on organisational roles to develop a discussion of professional awareness; a pivotal notion is also the interactionist one of the hospital as a 'negotiated order'. Drawing for illustrative purposes on the Norwegian experience (that is, reviewing research on hospital information systems in Norway), we contend that enhanced awareness of the hospital itself as a social system may be a precondition of cost-effective hospital information and communication technologies.

  4. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.

    PubMed

    Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek

    2015-10-14

    Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.

  5. The Interface of Safety and Security in Transport: A Regional Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Welch, Tim; Duhamel, David A; Nandakumar, A. N.

    Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios and developing transport security plans. Many participants also reported their appreciation of the workshop exercises that specifically focused on practical aspects of safety and security of transport of radioactive material. These workshop outcomes highlight the important role professionals can offer when they receive additional safety training and education for radioactive material in transport. Moreover, these professionals can help to increase capacity in countries with developing nuclear security regimes. This paper explores workshop outcomes and transportation regulations and guidelines for radioactive material.« less

  6. Student Experiential Opportunities in National Security Careers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less

  7. How basic psychological needs and motivation affect vitality and lifelong learning adaptability of pharmacists: a structural equation model.

    PubMed

    Tjin A Tsoi, Sharon L N M; de Boer, Anthonius; Croiset, Gerda; Koster, Andries S; van der Burgt, Stéphanie; Kusurkar, Rashmi A

    2018-01-31

    Insufficient professional development may lead to poor performance of healthcare professionals. Therefore, continuing education (CE) and continuing professional development (CPD) are needed to secure safe and good quality healthcare. The aim of the study was to investigate the hypothesized associations and their directions between pharmacists' basic psychological needs in CE, their academic motivation, well-being, learning outcomes. Self-determination theory was used as a theoretical framework for this study. Data were collected through four questionnaires measuring: academic motivation, basic psychological needs (BPN), vitality and lifelong learning adaptability of pharmacists in the CE/CPD learning context. Structural equation modelling was used to analyze the data. Demographic factors like gender and working environment influenced the observed scores for frustration of BPN and factors like training status and working experience influenced the observed scores for academic motivation. A good model fit could be found only for a part of the hypothesized pathway. Frustration of BPN is positively directly related to the less desirable type of academic motivation, controlled motivation (0.88) and negatively directly related to vitality (- 1.61) and negatively indirectly related to learning outcomes in CE. Fulfillment or frustration of BPN are important predictors for well-being and learning outcomes. Further research should be conducted to discover how we can prevent these needs from being frustrated in order to design a motivating, vitalizing and sustainable CE/CPD system for pharmacists and other healthcare professionals. Basic psychological needs are very important predictors for well-being and learning outcomes. Further research should be conducted to discover how we can prevent these needs from being frustrated in order to design a motivating, vitalizing and sustainable CE/CPD system for pharmacists and other healthcare professionals.

  8. An Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and Discussion

    ERIC Educational Resources Information Center

    Peslak, Alan R.

    2010-01-01

    One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…

  9. Sustainable Transportation: Strategy for Security, Prosperity, and Peace

    DTIC Science & Technology

    2014-11-01

    number. 1 . REPORT DATE NOV 2014 2. REPORT TYPE 3 . DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Sustainable Transportation...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...licensed Professional Engineer in the state of Virginia. viii 1 SUSTAINABLE TRANSPORTATION: STRATEGY FOR SECURITY, PROSPERITY, AND PEACE Introduction

  10. The health professions and the performance of future health systems in low-income countries: support or obstacle?

    PubMed

    Dussault, Gilles

    2008-05-01

    This paper discusses the present and future role of the health professions in health services delivery systems in low-income countries. Unlike richer countries, most low-income countries do not have a tradition of labour market regulation and the capacity of the professions themselves to regulate the provision of health services by their members tends to be weak. The paper looks at the impact of professional monopolies on the performance of health services delivery systems, e.g. equity of access, effectiveness of services, efficiency in the use of scarce resources, responsiveness to users' needs, including protection against the financial impact of utilising health services. It identifies issues which policy-makers face in relation to opening the health labour market while guaranteeing the safety and security of services provided by professionals. The suggestion is made that a "social contract", granting privileges of practice in exchange of a commitment to actively maintain and enhance the quality of their services, may be a viable course of action. This would require that the actors in the policy process collaborate in strengthening the capacity of regulatory agencies to perform their role.

  11. How can the German Electronic Health Card support patient's role in care management.

    PubMed

    Pharow, Peter; Blobel, Bernd; Hildebrand, Claudia

    2008-01-01

    All types of advanced communication, collaboration, and cooperation in healthcare require a strong involvement of all addressed parties including health professionals and patients. Modern healthcare aims at involving patients having them take over responsibility for their own health status. Allowing them to take on their changed roles as emancipated partners in advanced care management, health professionals need to be educated and patients need to be empowered. From a security viewpoint, health issues have to be communicated via trusted health networks. To provide communication and cooperation between professionals and patients as well as to guarantee the required level of involvement of patients in shared care management environments, cards are widely used as person identifiers, on the one hand, and as security tokens, on the other. Being introduced as storage media and portable personalized application system, cards enable a patient controlled access to personalized health services as well as proper use and exchange of personal health data for specific purposes such as emergency. Furthermore, cards allow access to the wider electronic patient record via pointers or tickets. Cards can empower patients. The German Electronic Health Card (eGK) shall thus support care management and specific workflow processes e.g. for prescription and disease management. Regardless whether designed as data or pointer card - international standardization is a prerequisite also for national solutions. The more information patients have regarding different procedures and processes in healthcare, the more are they able to play their dedicated role within care management. Cards can and will contribute by allowing patients to get controlled access to administrative and medical data stored either on cards or in networks. Card holders determine who has access to their health information.

  12. A Code Of Ethics And Professional Conduct For NSA Intelligence Professionals

    DTIC Science & Technology

    2015-02-17

    protects the nation. Such releases may especially damage the cohesion of the workforce. Team Cohesion and Self - esteem The Greek philosopher...individual, the corporation , and the community, self -interest and the public good.” 25 Two aspects of this assertion accurately characterize NSA employees...reasons, most of which are thwarted by monitoring, security investigations, and self -reporting. Recently, individuals responsible for extremely damaging

  13. LPTA Versus Tradeoff: Analysis of Contract Source Selection Strategies and Performance Outcomes

    DTIC Science & Technology

    2016-06-01

    methodologies contracting professionals employ to acquire what the DOD needs. Contracting professionals may use lowest price technically acceptable (LPTA) and...contract management process, source selection, lowest price technically acceptable, tradeoff 15. NUMBER OF PAGES 69 16. PRICE CODE 17. SECURITY...use lowest price technically acceptable (LPTA) and tradeoff strategies to procure requirements to maximize the overall best value to the government

  14. Brisement

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  15. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    PubMed

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  16. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America

    PubMed Central

    Baird, Theodore

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601

  17. From Dr. Steven Ashby, Director of PNNL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashby, Steven

    Powered by the creativity and imagination of more than 4,000 exceptional scientists, engineers and support professionals, at PNNL we advance the frontiers of science and address some of the most challenging problems in energy, the environment and national security. As DOE’s premier chemistry, environmental sciences and data analytics laboratory, we provide national leadership in four areas: deepening our understanding of climate science; inventing the future power grid; preventing nuclear proliferation; and speeding environmental remediation. Other areas where we make important contributions include energy storage, microbial biology and cyber security. PNNL also is home to EMSL (the Environmental Molecular Sciences Laboratory),more » one of DOE’s scientific user facilities. We apply these science strengths to address both national and international problems in complex adaptive systems that are too difficult for one institution to tackle alone. Take earth systems, for instance. The earth is a complex adaptive system because it involves everything from climate and microbial communities in the soil to emissions from cars and coal-powered industrial plants. All of these factors and others ultimately influence not only our environment and overall quality of life, but cause the earth to adapt in ways that must be further addressed. PNNL researchers are playing a vital role in finding solutions across every area of this complex adaptive system.« less

  18. Dentistry - a professional contained career in healthcare. A qualitative study of Vocational Dental Practitioners' professional expectations.

    PubMed

    Gallagher, Jennifer E; Clarke, Wendy; Eaton, Kenneth A; Wilson, Nairn H F

    2007-11-16

    New graduates in the UK presently spend one year in training as Vocational Dental Practitioners (VDPs) in preparation for primary dental care. There is a growing recognition that the emerging workforce has very different professional expectations to those of earlier generations, with implications for the profession, patients and the performance of health systems. The objectives of this study were to investigate why VDPs' in England and Wales perceive they chose dentistry as a professional career; how they perceive their vision has changed and the implications for their professional career plans, both short- and longterm. Purposive sampling of schemes was undertaken to include urban, rural and metropolitan schemes, schemes in areas with and without dental schools and geographic coverage across England and Wales. All VDPs in these schemes were initiated to participate in this qualitative study using focus groups. A topic guide was utilised to standardise data collection. Informants' views were recorded on tape and in field notes. Data were transcribed and analysed using Framework Methodology. A total of 99 VDPs participated in the 10 focus groups. Their choice of dentistry as a professional career was motivated by multiple categories of influence: 'academic', 'healthcare', 'lifestyle', the influence of 'family', 'friends', 'careers advice' and 'work experience'. Consideration of the features of the 'professional job' appears to have been key to their choice of dentistry and the 'active rejection of medicine' as an alternative career.Entry into the profession was proving a challenging process for some but not all VDPs. Informants perceived that their vision had been moderated as a result of 'personal student debt', 'national workforce initiatives', 'limitations on clinical practice' and the 'cost of additional training'.Short term goals focused around 'recovery from the past' and 'preparation for the future'. Longterm goals covered the spectrum of opportunities within dentistry. Factors influencing VDPs longterm career plans fell into six main categories: professional, personal, financial, political, social and cultural. VDPs chose dentistry because they perceived that it provides a financially lucrative, contained career in healthcare, with professional status, job security and the opportunity to work flexibly. They perceive that their vision is challenged by changes affecting education and the healthcare system. Longterm professional expectations were closely linked with their personal lives and support a vision of a favourable work/life balance.

  19. Dentistry – a professional contained career in healthcare. A qualitative study of Vocational Dental Practitioners' professional expectations

    PubMed Central

    Gallagher, Jennifer E; Clarke, Wendy; Eaton, Kenneth A; Wilson, Nairn HF

    2007-01-01

    Background New graduates in the UK presently spend one year in training as Vocational Dental Practitioners (VDPs) in preparation for primary dental care. There is a growing recognition that the emerging workforce has very different professional expectations to those of earlier generations, with implications for the profession, patients and the performance of health systems. The objectives of this study were to investigate why VDPs' in England and Wales perceive they chose dentistry as a professional career; how they perceive their vision has changed and the implications for their professional career plans, both short- and longterm. Methods Purposive sampling of schemes was undertaken to include urban, rural and metropolitan schemes, schemes in areas with and without dental schools and geographic coverage across England and Wales. All VDPs in these schemes were initiated to participate in this qualitative study using focus groups. A topic guide was utilised to standardise data collection. Informants' views were recorded on tape and in field notes. Data were transcribed and analysed using Framework Methodology. Results A total of 99 VDPs participated in the 10 focus groups. Their choice of dentistry as a professional career was motivated by multiple categories of influence: 'academic', 'healthcare', 'lifestyle', the influence of 'family', 'friends', 'careers advice' and 'work experience'. Consideration of the features of the 'professional job' appears to have been key to their choice of dentistry and the 'active rejection of medicine' as an alternative career. Entry into the profession was proving a challenging process for some but not all VDPs. Informants perceived that their vision had been moderated as a result of 'personal student debt', 'national workforce initiatives', 'limitations on clinical practice' and the 'cost of additional training'. Short term goals focused around 'recovery from the past' and 'preparation for the future'. Longterm goals covered the spectrum of opportunities within dentistry. Factors influencing VDPs longterm career plans fell into six main categories: professional, personal, financial, political, social and cultural. Conclusion VDPs chose dentistry because they perceived that it provides a financially lucrative, contained career in healthcare, with professional status, job security and the opportunity to work flexibly. They perceive that their vision is challenged by changes affecting education and the healthcare system. Longterm professional expectations were closely linked with their personal lives and support a vision of a favourable work/life balance. PMID:18005452

  20. [Security aspects on the Internet].

    PubMed

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  1. Defending the Mentally Disabled.

    ERIC Educational Resources Information Center

    Cournos, Francine; And Others

    1984-01-01

    Discusses the role of mental health and social services personnel in helping patients apply for recertification for Supplementary Security Income (SSI) benefits. Describes the appeal process and provides guidelines for professionals. (JAC)

  2. Subtalar Arthroscopy

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  3. Peroneal Tendinosis

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  4. Ankle Cheilectomy

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  5. Disobedient Child

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... some disobedient children, you may need to obtain professional mental health treatment. Here are some situations where ...

  6. Distraction Arthroplasty

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  7. Pediatric Specialists

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... for Referral to Pediatric Surgical Specialists Sports Medicine Professionals What is a Child Abuse Pediatrician? What is ...

  8. Dutch virtual integration of healthcare information.

    PubMed

    de Graaf, J C; Vlug, A E; van Boven, G J

    2007-01-01

    As information technology creates opportunities for cooperation which crosses the boundaries between healthcare institutions, it will become an integral part of the Dutch healthcare system. Along with many involved organizations in healthcare the National IT Institute for Healthcare in the Netherlands (NICTIZ) is working on the realization of a national IT infrastructure for healthcare and a national electronic patient record (EPR). An underlying national architecture is designed to enable the Dutch EPR virtually, not in a national database, nor on a patient's smartcard. The required secure infrastructure provides generic functions for healthcare applications: patient identification, authentication and authorization of healthcare professionals. The first national applications in the EPR program using a national index of where patient data is stored, are the electronic medication record and the electronic record for after hours GP services. The rollout of the electronic medication record and electronic record for after hours GP services has been started in 2007. To guarantee progress of electronic data exchange in healthcare in the Netherlands we have primarily opted for two healthcare applications: the electronic medication record and the electronic record for after hours GP services. The use of a national switch-point containing the registry of where to find what information, guarantees that the professional receives the most recent information and omits large databases to contain downloaded data. Proper authorization, authentication as well as tracing by the national switchpoint also ensures a secure environment for the communication of delicate information.

  9. The use of information and communication technology (ICT) in dentistry.

    PubMed

    Knott, N J

    2013-02-01

    As the use of information and communication technology (ICT) becomes more widespread in dentistry the risk of breaching electronic commerce laws and patient confidentiality increases. It is necessary to be aware of the responsibilities internet usage entails, especially within a dental practice where the protection of patient information is of the utmost importance. More should be done to outline the various precautions that should be taken to ensure ICT security within the professional domain, as it would appear dentistry has been neglected with regard to receiving the proper ICT education, training and support systems.

  10. [Data protection. Barrier or helpful orientation for cooperation in early intervention?].

    PubMed

    Schönecker, L; Meysen, T

    2010-11-01

    From birth until the age of 3 years, the health care system is the central help system and point of contact for parents with their children. Professionals in health care are given considerable trust. However, many of the essential services, especially for families with increased needs, can only be found in the child welfare system. The authors describe a plan for a lawful and functionally adequate transition between the two systems that eases access to additional help. Functional data protection secures a relationship of trust between the doctor and patient. It requires the promotion of a consensual transition. If the transmission of information is necessary, not without the knowledge but without the consent of the parents, the law permits the transfer of information under certain conditions. For doctors, midwifes, pediatric nurses, and other health professionals, this results in a legal examination program with respect to the supporting relationship to their patient. On the one hand, it contains an assessment of the child's endangerment and, on the other hand, an estimation of the sustainability of the assistance they entered into for the prevention of further harm or the solicitation of voluntary utilization of additional help. The article introduces the different new federal state laws on data transfer without consent in cases of potential child endangerment.

  11. The nature of international health security.

    PubMed

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  12. Beyond Firewalls: Professional Certification Ensures Your Staff Will Understand Information Security in Its Proper Context

    ERIC Educational Resources Information Center

    Svetcov, Eric

    2004-01-01

    When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…

  13. Securing General Aviation

    DTIC Science & Technology

    2008-01-24

    operations of large corporate jets and professionally managed fractional-ownership fleets — makes up about one- quarter of all GA operations and... 2018 , it is expected that there will be about 18,000 GA turbojets in service in the United States, compared to an estimate of slightly more than 10,000...spray a chemical blister agent into a packed college football stadium CRS-17 43 White House Homeland Security Council, David Howe, Senior Director for

  14. Security analysis of standards-driven communication protocols for healthcare scenarios.

    PubMed

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  15. Cavus Foot Surgery

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  16. Bunionette Deformity Correction

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  17. Shyness in Children

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... then an evaluation by a child mental-health professional would be helpful. Time to adjust Most shy ...

  18. Test security in medicolegal cases: proposed guidelines for attorneys utilizing neuropsychology practice.

    PubMed

    Morel, Kenneth R

    2009-11-01

    In the context of forensic neuropsychological assessments, the professional interaction of law and psychology is viewed primarily as one where the retaining attorney or court dictates its needs to psychologists when resolving legal disputes. While this perspective is conceptually accurate, the positive and practical collaboration of law and psychology also relies on attorneys adhering to basic protections of sensitive psychological assessment procedures and tests. Objective testing is undermined when a practitioner of law engages in actions prior to, during, or following a neuropsychological examination in a manner that threatens the test security. An appreciation among practitioners of law and psychology regarding the necessity of test security is essential. This article reviews attorney actions that can affect test security, proposes a distinction by psychology between appropriate and problematic client preparation for a neuropsychological examination, integrates the available legal precedent regarding test security, and suggests productive measures to protect test security in medicolegal settings.

  19. An Enduring Investment for Global Stability: Establishing Professional Values as the Foundation of Building Partnership Capacity in a Fiscally Constrained 21st Century

    DTIC Science & Technology

    2013-05-01

    partnership between U.S. and Colombian forces. This approach requires introspection, understanding, and adaptation across the U.S. national security...status. Not all national militaries focus on external threats. Some environmental or national capacity circumstances require military professionals...desired impact, outcomes, and outputs through a strategic planning process providing direction, consultation with stakeholders, and environmentally driven

  20. [Quality management and participation into clinical database].

    PubMed

    Okubo, Suguru; Miyata, Hiroaki; Tomotaki, Ai; Motomura, Noboru; Murakami, Arata; Ono, Minoru; Iwanaka, Tadashi

    2013-07-01

    Quality management is necessary for establishing useful clinical database in cooperation with healthcare professionals and facilities. The ways of management are 1) progress management of data entry, 2) liaison with database participants (healthcare professionals), and 3) modification of data collection form. In addition, healthcare facilities are supposed to consider ethical issues and information security for joining clinical databases. Database participants should check ethical review boards and consultation service for patients.

  1. Anticipating and Understanding the Rebalance: Exercise Nine Innings, USMC Command and Staff College

    DTIC Science & Technology

    2017-06-21

    USPACOM, professional military education , PME, Command and Staff College, training, education , Exercise Nine Innings, regional security challenges The...essence, professional military education had to keep up with the tempo of the evolution of warfare in the twenty-first century. Knowing and...operations existing in differing phases of execution, gained great- er interest among education commands, the Marine Corps, and joint leader- ship.4

  2. European health telematics networks for positron emission tomography

    NASA Astrophysics Data System (ADS)

    Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios

    2006-12-01

    A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.

  3. The DUNDRUM Quartet: validation of structured professional judgement instruments DUNDRUM-3 assessment of programme completion and DUNDRUM-4 assessment of recovery in forensic mental health services

    PubMed Central

    2011-01-01

    Background Moving a forensic mental health patient from one level of therapeutic security to a lower level or to the community is influenced by more than risk assessment and risk management. We set out to construct and validate structured professional judgement instruments for consistency and transparency in decision making Methods Two instruments were developed, the seven-item DUNDRUM-3 programme completion instrument and the six item DUNDRUM-4 recovery instrument. These were assessed for all 95 forensic patients at Ireland's only forensic mental health hospital. Results The two instruments had good internal consistency (Cronbach's alpha 0.911 and 0.887). Scores distinguished those allowed no leave or accompanied leave from those with unaccompanied leave (ANOVA F = 38.1 and 50.3 respectively, p < 0.001). Scores also distinguished those in acute/high security units from those in medium or in low secure/pre-discharge units. Each individual item distinguished these levels of need significantly. The DUNDRUM-3 and DUNDRUM-4 correlated moderately with measures of dynamic risk and with the CANFOR staff rated unmet need (Spearman r = 0.5, p < 0.001). Conclusions The DUNDRUM-3 programme completion items distinguished significantly between levels of therapeutic security while the DUNDRUM-4 recovery items consistently distinguished those given unaccompanied leave outside the hospital and those in the lowest levels of therapeutic security. This data forms the basis for a prospective study of outcomes now underway. PMID:21722396

  4. 45 CFR 164.501 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) Date of birth; (C) Social security number; (D) Payment history; (E) Account number; and (F) Name and... medium) by a health care provider who is a mental health professional documenting or analyzing the...

  5. Percutaneous Achilles Tendon Lengthening

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  6. Where to Donate Blood

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Find ... Correspondence Regulatory and Public Meetings Stop the Bleed Professional Development Education Annual Meeting International Cord Blood Symposium ...

  7. Validity evidence for the Security Scale as a measure of perceived attachment security in adolescence.

    PubMed

    Van Ryzin, Mark J; Leve, Leslie D

    2012-04-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  8. Occurrence of post traumatic stress symptoms and their relationship to professional quality of life (ProQoL) in nursing staff at a forensic psychiatric security unit: a cross-sectional study.

    PubMed

    Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom

    2009-04-16

    Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors.

  9. Occurrence of post traumatic stress symptoms and their relationship to professional quality of life (ProQoL) in nursing staff at a forensic psychiatric security unit: a cross-sectional study

    PubMed Central

    Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom

    2009-01-01

    Background Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Methods Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. Results The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Conclusion Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors. PMID:19371413

  10. Factors influencing workplace violence risk among correctional health workers: insights from an Australian survey.

    PubMed

    Cashmore, Aaron W; Indig, Devon; Hampton, Stephen E; Hegney, Desley G; Jalaludin, Bin B

    2016-11-01

    Little is known about the environmental and organisational determinants of workplace violence in correctional health settings. This paper describes the views of health professionals working in these settings on the factors influencing workplace violence risk. All employees of a large correctional health service in New South Wales, Australia, were invited to complete an online survey. The survey included an open-ended question seeking the views of participants about the factors influencing workplace violence in correctional health settings. Responses to this question were analysed using qualitative thematic analysis. Participants identified several factors that they felt reduced the risk of violence in their workplace, including: appropriate workplace health and safety policies and procedures; professionalism among health staff; the presence of prison guards and the quality of security provided; and physical barriers within clinics. Conversely, participants perceived workplace violence risk to be increased by: low health staff-to-patient and correctional officer-to-patient ratios; high workloads; insufficient or underperforming security staff; and poor management of violence, especially horizontal violence. The views of these participants should inform efforts to prevent workplace violence among correctional health professionals.

  11. Shoes and Orthotics for Diabetics

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... By working with a physician and a footwear professional, such as a certified pedorthist, many patients can ...

  12. How to Tape an Ankle

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  13. Emotional Development: 2 Year Olds

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... probably refer your child to a mental health professional for a consultation. Last Updated 8/1/2009 ...

  14. How to "Read" Your Footprint

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  15. Plantar Fibroma and Plantar Fibromatosis

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  16. Muscle Cramp - A Common Pain

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...

  17. A physician's role following a breach of electronic health information.

    PubMed

    Kim, Daniel; Schleiter, Kristin; Crigger, Bette-Jane; McMahon, John W; Benjamin, Regina M; Douglas, Sharon P

    2010-01-01

    The Council on Ethical and Judicial Affairs of the American Medical Association examines physicians' professional ethical responsibility in the event that the security of patients' electronic records is breached.

  18. 26 CFR 1.248-1 - Election to amortize organizational expenditures.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... original stock certificates, and the like; necessary accounting services; expenses of temporary directors... securities, such as commissions, professional fees, and printing costs. This is so even where the particular...

  19. Finding an Eye Care Professional

    MedlinePlus

    ... article rating hospitals in the United States. Website: http://health.usnews.com/best-hospitals For More Information ... ophthalmologists in the United States and abroad. Website: https://secure.aao.org/aao/find-ophthalmologist The American ...

  20. Facing the terror of nuclear terrorism.

    PubMed

    Johnson, Raymond H

    2003-05-01

    As America prepares for homeland security and the response to terrorism, more occupational safety professionals may find themselves called upon to deal with terror in their own neighborhoods. While thousands of safety professionals are well trained technically to deal with many types of terrorism, they may not be well prepared to deal with the greater challenge, namely the terror of terrorism. Dealing with terror requires hearing and responding to people's feelings before providing technical answers. For safety professionals to be most effective in dealing with terrorism, they can benefit from more training on how to deal with terror.

  1. Everyday Excellence: A Framework for Professional Nursing Practice in Long-Term Care

    PubMed Central

    Lyons, Stacie Salsbury; Specht, Janet Pringle; Karlman, Susan E.

    2009-01-01

    Registered nurses make measurable contributions to the health and wellness of persons living in nursing homes. However, most nursing homes do not employ adequate numbers of professional nurses with specialized training in the nursing care of older adults to positively impact resident outcomes. As a result, many people never receive excellent geriatric nursing while living in a long-term care facility. Nurses have introduced various professional practice models into health care institutions as tools for leading nursing practice, improving client outcomes, and achieving organizational goals. Problematically, few professional practice models have been implemented in nursing homes. This article introduces an evidence-based framework for professional nursing practice in long-term care. The Everyday Excellence framework is based upon eight guiding principles: Valuing, Envisioning, Peopling, Securing, Learning, Empowering, Leading, and Advancing Excellence. Future research will evaluate the usefulness of this framework for professional nursing practice. PMID:20077966

  2. Coping and rehabilitation in alcoholic liver disease patients after hepatic encephalopathy--in interaction with professionals and relatives.

    PubMed

    Mikkelsen, Maria Rudkjær; Hendriksen, Carsten; Schiødt, Frank Vinholt; Rydahl-Hansen, Susan

    2015-12-01

    To identify and describe conditions that limit or support patients, with alcoholic liver disease after surviving alcohol-induced hepatic encephalopathy, ability to cope with current and potential physical and psychosocial problems--in interaction with professionals and relatives--and to recommend appropriate interventions. Alcoholic liver disease patients surviving alcohol-induced hepatic encephalopathy have significantly impaired quality of life. Internationally, there is a lack of knowledge about the conditions that affect alcoholic liver disease patients' coping and rehabilitation. A grounded theory study. Semi-structured interviews, conducted with 11 alcoholic liver disease patients who were diagnosed with hepatic encephalopathy. The interview guide was inspired by Richard S. Lazarus's theory of stress and coping. The elements that support or limit alcoholic liver disease patients' ability to cope with physical and psychosocial problems in interaction with professionals and relatives were represented by the core category 'Struggle for preservation of identity as a significant individual'. It was characterised by three categories, which are interrelated and impact upon each other: 'Acknowledgement', 'Struggle to maintain control' and 'Achieving a sense of security'. Alcoholic liver disease patients experience a struggle to preserve their identity as a significant individual. It can be assumed that professionals and relatives in their interaction with, and support of, patients should focus on strengthening and preserving patients' identity in the form of acknowledgement, helping alcoholic liver disease patients maintain self-control and providing a safety net so patients feel a sense of security. It can be assumed that professionals should support alcoholic liver disease patients' appraisal of, and coping with, physical and psychosocial problems based on acknowledgment, understanding and a sympathetic attitude. Professionals should proactively approach patients when they withdraw. It may be useful for professionals to be aware of alcoholic liver disease patients' individual coping strategies and thereby their individual requirements for professional supportive intervention. © 2015 John Wiley & Sons Ltd.

  3. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.

    PubMed

    Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona

    2003-01-01

    The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.

  4. The Army War College Review: Student Publications. Volume 2, Number 2. May 2016

    DTIC Science & Technology

    2016-05-01

    Character Development of U.S. Army Leaders – The Laissez - Fair Approach,” Military Review Online, September-October 2013, 30-39, http://usacac.army.mil/CAC2...intellectual work with professionals invested in U.S. national security, Landpower, strategic leadership , global security studies, and the advancement of...assumed the leadership chair of the Arctic Council for two years. President Obama appointed a well-qualified Special Representative for the Arctic

  5. What Can History Teach Us A Comparative Historical Analysis On the Reserve Officer Training Corps and the Department of Homeland Security

    DTIC Science & Technology

    2015-12-01

    professional development aspirations. An organization that realized a very similar narrative as the DHS is the Department of Defense (DOD), more...is one that finds itself imbedded in several debates surrounding the development of formalized education/preparatory efforts for its core civilian... development of formalized education efforts for its workforce. There is formalized preparatory training for several different kinds of homeland security

  6. Challenges of the Global Century: Report of the Project on Globalization and National Security

    DTIC Science & Technology

    2001-01-01

    military and civilian leaders for service at the highest levels of national defense and security. The major components of NDU include the Industrial ...academic programs. In addition, it produces Joint Force Quarterly, a professional military journal published for the Chairman of the Joint Chiefs of...shocks become contagious. In these circumstances, it can both arouse anger at industrial democracies and facili- tate the growth of international crime

  7. How to Keep Your Feet Flexible

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  8. How to Assess Your Shoe IQ

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  9. Osteopathic Medicine: What is a DO?

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...

  10. Summer Safety Tips - Staying Safe Outdoors

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... Families should attend community fireworks displays run by professionals rather than using fireworks at home. The AAP ...

  11. Self-confidence in financial analysis: a study of younger and older male professional analysts.

    PubMed

    Webster, R L; Ellis, T S

    2001-06-01

    Measures of reported self-confidence in performing financial analysis by 59 professional male analysts, 31 born between 1946 and 1964 and 28 born between 1965 and 1976, were investigated and reported. Self-confidence in one's ability is important in the securities industry because it affects recommendations and decisions to buy, sell, and hold securities. The respondents analyzed a set of multiyear corporate financial statements and reported their self-confidence in six separate financial areas. Data from the 59 male financial analysts were tallied and analyzed using both univariate and multivariate statistical tests. Rated self-confidence was not significantly different for the younger and the older men. These results are not consistent with a similar prior study of female analysts in which younger women showed significantly higher self-confidence than older women.

  12. Power and confidence in professions: lessons for occupational therapy.

    PubMed

    Clark, Florence A

    2010-12-01

    Powerful professions have the capacity to obtain leadership positions, advocate successfully in the policy arena, and secure the resources necessary to achieve their professional goals. Within the occupational therapy profession, cultivating power and confidence among our practitioners is essential to realize our full capacity for meeting society's occupational needs. Drawing from a historical analysis of the medical and nursing professions, this paper discusses the implications of power and disempowerment among health professions for their practitioners, clients, and public image. Theoretical perspectives on power from social psychology, politics, organizational management, and post-structuralism are introduced and their relevance to the profession of occupational therapy is examined. The paper concludes with recommendations for occupational therapy practitioners to analyze their individual sources of power and evaluate opportunities to develop confidence and secure power for their professional work--in venues both in and outside the workplace.

  13. Barriers to healthcare coordination in market-based and decentralized public health systems: a qualitative study in healthcare networks of Colombia and Brazil

    PubMed Central

    Vargas, Ingrid; Mogollón-Pérez, Amparo Susana; De Paepe, Pierre; Ferreira da Silva, Maria Rejane; Unger, Jean-Pierre; Vázquez, María-Luisa

    2016-01-01

    Although integrated healthcare networks (IHNs) are promoted in Latin America in response to health system fragmentation, few analyses on the coordination of care across levels in these networks have been conducted in the region. The aim is to analyse the existence of healthcare coordination across levels of care and the factors influencing it from the health personnel’ perspective in healthcare networks of two countries with different health systems: Colombia, with a social security system based on managed competition and Brazil, with a decentralized national health system. A qualitative, exploratory and descriptive–interpretative study was conducted, based on a case study of healthcare networks in four municipalities. Individual semi-structured interviews were conducted with a three stage theoretical sample of (a) health (112) and administrative (66) professionals of different care levels, and (b) managers of providers (42) and insurers (14). A thematic content analysis was conducted, segmented by cases, informant groups and themes. The results reveal poor clinical information transfer between healthcare levels in all networks analysed, with added deficiencies in Brazil in the coordination of access and clinical management. The obstacles to care coordination are related to the organization of both the health system and the healthcare networks. In the health system, there is the existence of economic incentives to compete (exacerbated in Brazil by partisan political interests), the fragmentation and instability of networks in Colombia and weak planning and evaluation in Brazil. In the healthcare networks, there are inadequate working conditions (temporary and/or part-time contracts) which hinder the use of coordination mechanisms, and inadequate professional training for implementing a healthcare model in which primary care should act as coordinator in patient care. Reforms are needed in these health systems and networks in order to modify incentives, strengthen the state planning and supervision functions and improve professional working conditions and skills. PMID:26874327

  14. Not just another multi-professional course! Part 2: nuts and bolts of designing a transformed curriculum for multi-professional learning.

    PubMed

    Mayers, Pat; Alperstein, Melanie; Duncan, Madeleine; Olckers, Lorna; Gibbs, Trevor

    2006-03-01

    Multi-professional education has traditionally aimed to develop health professionals who are able to collaborate effectively in comprehensive healthcare delivery. The respective professions learn about their differences in order to work together, rather than developing unity in their commitment to a shared vision of professionalism and service. In this, the second of two papers, the 'nuts and bolts' or practicalities of designing a transformed curriculum for a multi-professional course with a difference is described. Guidelines for the curriculum design process, which seeks to be innovative, grounded in theory and relevant to the learning of the students and the ultimately the health of the patients, include: valuing education; gaining buy-in; securing buy-out; defining of roles; seeking consensus; negotiating difference and expediting decisions. The phases of the design process are described, as well as the educational outcomes envisaged during the process. Reflections of the designers, in particular on what it means to be a multi-professional team, and a reconceptualization of multi-professional education are presented as challenges for educators of health professionals.

  15. PROFESSIONALISM IN THE ARMED FORCES

    DTIC Science & Technology

    2017-04-06

    basic American values from liberalism to conservatism" to permit " American military leaders to combine the political power which society thrusts upon...and civil societies is psychological more than physical.66 Quoting Epictetus, she notes the Stoic’s assertion "In our power are moral character and...the professional status conferred by the society he secures.6 Thesis In this paper I will analyze the specific failing of Rudolph Höss to meet

  16. [Knowledge of occupational risk in IRCCS of Neurosciences].

    PubMed

    Paladino, G; Giuliano, G; Monaco, S; Ottenga, F; Cristaudo, A; Guidi, M; Serretti, N; Talini, D

    2002-01-01

    A Professional Multicentric Audit, concerning Staff knowledge level about security on workplaces, was conducted by way of a standardized questionnaire given to 1022 (26.4%) IRCCS professional staff pertaining to Neurobiology. Four were the principal tasks of the questionnaire investigating the "sensibility" and "consciousness" concerning risk prevention on workplaces. It came out that there is a great variability in the knowledge level on this field, even if the "medium value" is "pretty good".

  17. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    PubMed Central

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271

  18. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    PubMed

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.

  19. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    PubMed Central

    2011-01-01

    Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967

  20. [Accesibility and effectivity in Mexico].

    PubMed

    García-Peña, Carmen; González-González, César

    2011-01-01

    This is an analysis of two of the dimensions of a health system: accessibility and effectiveness, taking account the objectives of a health system (improving the health of the population, provide appropriate treatment for users of health services and ensure financial security for health) cannot be achieved exclusively by a well-functioning health system and the provision of medical services, being that the health status is explained by many factors and social determinants that deal with the conditions of people and their health behaviors and the level of individual co-responsibility. Despite the advances in the Mexican health system which has greatly improved the health conditions of the population, there is a lag in investment in health, with the major investment challenges as such, coordination between all levels, distribution of human, technological and financial resources, the autonomy of professional practice, the innovation of attention schemes, and modernization of trade unions.

  1. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    PubMed

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  2. Exploring undergraduate midwifery students' readiness to deliver culturally secure care for pregnant and birthing Aboriginal women.

    PubMed

    Thackrah, Rosalie D; Thompson, Sandra C; Durey, Angela

    2015-04-16

    Culturally secure health care settings enhance accessibility by Aboriginal Australians and improve their satisfaction with service delivery. A culturally secure health service recognises and responds to the legitimate cultural rights of the recipients of care. Focus is upon the health care system as well as the practice and behaviours of the individuals within it. In an attempt to produce culturally secure practitioners, the inclusion of Aboriginal content in health professional programs at Australian universities is now widespread. Studies of medical students have identified the positive impact of this content on knowledge and attitudes towards Aboriginal people but relatively little is known about the responses of students in other health professional education programs. This study explored undergraduate midwifery students' knowledge and attitudes towards Aboriginal people, and the impact of Aboriginal content in their program. The study surveyed 44 students who were in their first, second and third years of a direct entry, undergraduate midwifery program at a Western Australian (WA) university. The first year students were surveyed before and after completion of a compulsory Aboriginal health unit. Second and third year students who had already completed the unit were surveyed at the end of their academic year. Pre- and post-unit responses revealed a positive shift in first year students' knowledge and attitudes towards Aboriginal people and evidence that teaching in the unit was largely responsible for this shift. A comparison of post-unit responses with those from students in subsequent years of their program revealed a significant decline in knowledge about Aboriginal issues, attitudes towards Aboriginal people and the influence of the unit on their views. Despite this, all students indicated a strong interest in more clinical exposure to Aboriginal settings. The inclusion of a unit on Aboriginal health in an undergraduate midwifery program has been shown to enhance knowledge and shift attitudes towards Aboriginal people in a positive direction. These gains may not be sustained, however, without vertical integration of content and reinforcement throughout the program. Additional midwifery-specific Aboriginal content related to pregnancy and birthing, and recognition of strong student interest in clinical placements in Aboriginal settings provide opportunities for future curriculum development.

  3. How to Strengthen Your Ankle After a Sprain

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  4. Sore Throat? Know When To Call the Doctor

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Physicians ... Media Center The DO JAOA AOA Health Watch Professional Development AOA Board Certification Continuing Medical Education Research ...

  5. How to Stretch Your Ankle After a Sprain

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  6. Understanding Motherhood and Mood - Baby Blues and Beyond

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... requires immediate help. Talk to a Health Care Professional Screening for depression during and after pregnancy should ...

  7. How to Assess Changes in Feet: Normal or Abnormal

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  8. 45 CFR 60.1 - The National Practitioner Data Bank.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... certain information relating to the professional competence and conduct of physicians, dentists and other health care practitioners. Section 1921 of the Social Security Act (42 U.S.C. 1396r-2) (section 1921...

  9. 48 CFR 52.228-11 - Pledges of Assets.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... securities held in book entry form); and/or (2) A recorded lien on real estate. The offeror will be required... of Professional Appraisal Practice, as promulgated by the Appraisal Foundation. (End of clause) [54...

  10. A university-state-corporation partnership for providing correctional mental health services.

    PubMed

    Appelbaum, Kenneth L; Manning, Thomas D; Noonan, John D

    2002-02-01

    In September 1998 the University of Massachusetts Medical School, in partnership with a private vendor of correctional health care, began providing mental health services and other services to the Massachusetts Department of Correction. The experience with this partnership demonstrates that the involvement of a medical school with a correctional system has advantages for both. The correctional program benefits from enhanced quality of services, assistance with the recruitment and retention of skilled professionals, and expansion of training and continuing education programs. The medical school benefits by building its revenue base while providing a needed public service and through opportunities to extend its research and training activities. Successful collaboration requires that the medical school have an appreciation of security needs, a sensitivity to fiscal issues, and a readiness to work with inmates who have severe mental disorders and disruptive behavior. Correctional administrators, for their part, must support adequate treatment resources and must collaborate in the resolution of tensions between security and health care needs.

  11. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    DTIC Science & Technology

    2008-08-25

    Directorate. 25 Peter Eisler , “Attacks on U.S. Convoys Plummet; Shipments Crucial to Rebuilding Iraq,” USA Today, July 22, 2008, p. A1; August Cole, “U.S...contracts. Named DynCorp since 1987 , it was acquired in 2003 by Computer Sciences Corporation (CSC) and now has nearly 14,000 employees in 30...5,000 security professionals, government officials, and corporate executives and their families worldwide.40 EOD Technologies, Inc., founded in 1987

  12. Petroleum Geology and the securities laws: Implications for professional practice

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, D.M. Jr.; Achuff, C.H.

    1991-03-01

    Many geologists' practice includes such activities as recommending prospects, estimating reserves, and assembling drilling deals. When other people's money is used to finance these and other activities, the geologist, knowingly or not, becomes subject to the securities laws. Full disclosure to investors of all relevant information is the primary securities law principle affecting geological practice. In particular, geologic recommendations or reports reaching investors must effectively communicate both the upside potential and the downside risks of the project. If investors feel misled, the geologist may be sued for statements made in or based on his or her reports or for failingmore » to discuss significant factors. To reduce this risk, professional reports should state the date of the report, what was done, for whom, what data and underlying assumptions were used, what remains to be done, what is recommended, and whether distribution of the report should be restricted, among other things. Always retain a copy in case questions about the report's contents arise. Remember, reports tend to be passed along with the project and can be used or misused several years later by successors in interest in the project. In today's litigious society, there is an increasing likelihood that geologists may have to defend their work in court. Geologists should be aware of the impact of the securities and other laws on their practice.« less

  13. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    PubMed

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  14. Internationally educated nurses in Canada: predictors of workforce integration.

    PubMed

    Covell, Christine L; Primeau, Marie-Douce; Kilpatrick, Kelley; St-Pierre, Isabelle

    2017-04-04

    Global trends in migration accompanied with recent changes to the immigrant selection process may have influenced the demographic and human capital characteristics of internationally educated nurses (IENs) in Canada and in turn the assistance required to facilitate their workforce integration. This study aimed to describe the demographic and human capital profile of IENs in Canada, to explore recent changes to the profile, and to identify predictors of IENs' workforce integration. A cross-sectional, descriptive, correlational survey design was used. Eligible IENs were immigrants, registered and employed as regulated nurses in Canada. Data were collected in 2014 via online and paper questionnaires. Descriptive statistics were used to examine the data by year of immigration. Logistic regression modeling was employed to identify predictors of IENs' workforce integration measured as passing the licensure exam to acquire professional recertification and securing employment. The sample consisted of 2280 IENs, representative of all Canadian provincial jurisdictions. Since changes to the immigrant selection process in 2002, the IEN population in Canada has become more racially diverse with greater numbers emigrating from developing countries. Recent arrivals (after 2002) had high levels of human capital (knowledge, professional experience, language proficiency). Some, but not all, benefited from the formal and informal assistance available to facilitate their workforce integration. Professional experience and help studying significantly predicted if IENs passed the licensure exam on their first attempt. Bridging program participation and assistance from social networks in Canada were significant predictors if IENs had difficulty securing employment. Nurses will continue to migrate from a wide variety of countries throughout the world that have dissimilar nursing education and health systems. Thus, IENs are not a homogenous group, and a "one size fits all" model may not be effective for facilitating their professional recertification and employment in the destination country. Canada, as well as other countries, could consider using a case management approach to develop and tailor education and forms of assistance to meet the individual needs of IENs. Using technology to reach IENs who have not yet immigrated or have settled outside of urban centers are other potential strategies that may facilitate their timely entrance into the destination countries' nursing workforce.

  15. Organizational impact of governmental audit of blood transfusion services in Norway: A qualitative study.

    PubMed

    Åsprang, Aud Frøysa; Frich, Jan C; Braut, Geir Sverre

    2015-10-01

    Little is known about the organizational impact of supervisory activities in blood banks. We did a study with the aim to explore health professional's experiences with the external audit of blood transfusion services in Norway. The audit and supervision brought attention to deficiencies in systems and practices, and had been a catalyst for quality improvement. We identify facilitators and barriers to change. While audits can bring attention to known deficiencies, and trigger improvement processes which previously have not been prioritized, involvement of senior management is important to secure change across departments. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. Teachers as Professionals: Accountable and Autonomous? Review of the Report of the Justice Verma Commission on Teacher Education. August 2012. Department of School Education and Literacy, Ministry of Human Resource Development, Government of India

    ERIC Educational Resources Information Center

    Vijaysimha, Indira

    2013-01-01

    Concerns about the professional development of teachers have a political dimension as governments around the world engage in the discourse on global standards and want to improve the quality of their school education. Increasingly, teachers are feeling the pressure of securing high achievement scores and large-scale assessments of student learning…

  17. Clinical audit of emergency unit before and after establishment of the emergency medicine department.

    PubMed

    Amini, Afshin; Dindoost, Payam; Moghimi, Mehrdad; Kariman, Hamid; Shahrami, Ali; Dolatabadi, Ali Arhami; Ali-Mohammadi, Hossein; Alavai-Moghaddam, Mostafa; Derakhshanfar, Hojjat; Hatamabadi, HamidReza; Heidari, Kamran; Alamdari, Shahram; Meibodi, Mohammad Kalantar; Shojaee, Majid; Foroozanfar, Mohammad Mehdi; Hashemi, Behrooz; Sabzeghaba, Anita; Kabir, Ali

    2012-02-01

    To assess the deficiencies and potential areas through a medical audit of the emergency departments, in six general hospitals affiliated to Shahid Beheshti University of Medical Sciences at Tehran, Iran, after preparing specific wards-based international standards. A checklist was completed for all hospitals which met our eligibility criteria mainly observation and interviews with head nurses and managers of the emergency medicine unit of the hospitals before (2003) and after (2008) the establishment of emergency departments there. Domains studied included staffing, education and continuing professional development (CPD), facility (design), equipment, ancillary services, medical records, manuals and references, research, administration, pre-hospital care, information systems, disaster planning, bench-marking and hospital accreditation. Education and CPD (p = 0.042), design and facility (p = 0.027), equipment (p = 0.028), and disaster (p = 0.026) had significantly improved after the establishment of emergency departments. Nearly all domains showed a positive change though it was non-significant in a few. In terms of observation, better improvement was seen in disaster, security, design, and research. According to the score for each domain compared to what it was in the earlier phase, better improvement was observed in hospital accreditation, information systems, security, disaster planning, and research. Security, disaster planning, research, design and facility had improved in hospitals that wave studied, while equipment, records, ancillary services, administration and bench-marking had the lowest improvement even after the establishment of emergency department, and, hence, needed specific attention.

  18. MS PHD'S: Bridging the Gap of Academic and Career Success Through Educational and Professional Development for Minorities

    NASA Astrophysics Data System (ADS)

    Brown, D.; Vargas, W.; Padilla, E.; Strickland, J.; Echols, E.; Johnson, A.; Williamson Whitney, V.; Ithier-Guzman, W.; Ricciardi, L.; Johnson, A.; Braxton, L.

    2011-12-01

    Historically, there has been a lack of ethnic and gender diversity in the geo-sciences. The Minorities Striving and Pursuing Higher Degrees of Success in Earth System Science (MS PHD'S) Professional Development Program provides a bridge to young scientists of diverse backgrounds who in turn will impact many. In a process of 3 phases, the program introduces the students to the scientific community through participation in professional and society meetings and networking with scientists and personnel within federal agencies, academic institutions and STEM-based industries. The program builds confidence, offers role models for professional development and provides students support during their education. Upon completion, students achieve a high level of self-actualization and self-esteem combined with individual growth. They become part of a community that continuously provides support and security to each other. This support is tangible through the mentor/mentee relationships which will help with individual growth throughout the mentoring cycle. Having role models and familiar faces to whom mentees can relate to will encourage our students to succeed in the STEM's field. To date, 159 students have participated in the program: 26 have successfully completed their PhD and 56 are currently enrolled in the PhD programs nationwide. The MS PHD'S Program creates a forum of diverse peoples by diverse peoples with diverse interest and strength, where the ongoing goal is to continually raise the bar for each individual. MS PHD'S establishes a nurturing goal-oriented environment for the geo scientist of the future who in turn will make profound contributions on a local, national and global scale. To conclude, MSPHD'S not only bridges the gap of unrepresented minorities in STEM careers, but also generates educational approaches to make the earth system sciences available to more, impacting all.

  19. The Frequency, Contributing and Preventive Factors of Harassment towards Health Professionals in Iran.

    PubMed

    Fallahi Khoshknab, Masoud; Oskouie, Fatemeh; Ghazanfari, Nahid; Najafi, Fereshteh; Tamizi, Zahra; Afshani, Shahla; Azadi, Ghazal

    2015-07-01

    There are high levels of sexual harassment in health care systems. Also, workplace violence occurs against ethnic and racial minorities. This study aimed to identify the frequency of and the factors contributing to and preventing sexual and racial harassment in the workplace towards health professionals in Iran. This cross-sectional study was conducted on 6500 out of 57000 health workers who were selected by multistage random sampling from some teaching hospitals in Iran. Data were collected using the questionnaire of "workplace violence in the health sector" developed by the International Labor Organization, International Council of Nurses, World Health Organization, and Public Services International. According to the findings, the frequencies of sexual harassment and racial harassment were, respectively, 4.7% and 12% for the 12 months prior to the study (2011). Among healthcare workers, nurses reported the highest rate of violence. The most important contributing factors in sexual and racial harassment were lack of security facilities (45.8%) and people's ignorance of employees' tasks (55.7%). The presence of security force, safety measures in the wards, and guards were noted as the most important preventive factor to harassment. Based on the results, the frequency of sexual and racial harassment is low, which can be attributed to underreporting due to cultural sensitivity or fear. So, identifying the reasons for refusal to report harassment, developing a clear mechanism for reporting and providing the necessary trainings to health workers are essential in order to deal with harassment.

  20. Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.

    PubMed

    Bustard, John D

    2018-04-01

    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master's module in Ethical and Legal Issues in Cyber Security at Queens University Belfast. One significant aspect of the resulting design is that it encourages students to see ethical issues in systemic terms rather than from an individual perspective, with issues emerging from a conflict between different groups with different vested interests. Case studies are used to examine how personal and business priorities create conflicts that can lead to negative press, fines and punitive legal action. The module explores the reasons why organisations may be unaware of the risks associated with their actions and how an inappropriate response to an ethical issue can significantly aggravate a situation. The module has been delivered in three successive years since 2014 and been well received on each occasion. The paper describes the design of the module and the experience of delivering it, concluding with a discussion of the effectiveness of the approach.

  1. Certified Training for Nuclear and Radioactive Source Security Management.

    PubMed

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Self-perceptions of well-being in professional helpers and volunteers operating in war contexts.

    PubMed

    Veronese, Guido

    2013-07-01

    We carried out qualitative research with 61 health professionals and volunteer workers to explore their perceptions of their own and their clients' well-being in a context of political violence. We applied content analysis to identify the themes emerging from 8 focus group and 11 individual interviews. Participants were found to define the concept of well-being in terms of three key areas: security, participation, and development. Palestinian health providers see promotion of economic development and professional growth, involvement in political and social life, and resistance to the occupation as factors required to enhance well-being and quality of life for themselves and their clients.

  3. Initial Evaluation: What Kind of Shape Are Your Feet In?

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Home ... The content is not intended to substitute for professional medical advice, diagnoses or treatments. If you need ...

  4. Professionalizing action research--a meaningful strategy for modernizing services?

    PubMed

    Hall, Julie E

    2006-04-01

    This paper outlines how a specific action research approach can be used to secure practice development in services which have found sustained change difficult. For the purpose of this paper discussion focuses upon using professionalizing action research (a form of action research) to secure transformation in acute inpatient mental health services. This speciality has experienced long-term difficultly in meaningful practice change. Not limited to this context parallels can be made with other health and social care services requiring significant modernization. The aim is to critically discuss the use of professionalizing action research as an approach to sustainable change. clarifies whether this method is a suitable vehicle for change, which is ideally suited to services which have a poor record of practice development. A review of action research and practice development literature forms the basis of this paper. The literature is sourced through bulletin boards, electronic databases and the British Library Classification Scheme. Keywords searched are action research, team learning, managing change and practice development. Following definition; the components of professionalizing action research are analysed using the themes of educative base, problem focus, improvement and involvement. The educative base of professionalizing action research is collaborative reflective practice which is used to initiate meaningful change, rooted in everyday practice. The benefit of this is that change actions are based in real-time situations. The problem focus component of professionalizing action research is used to emphasize the views of service users and carers. This is positive in terms of the patient and public involvement agenda although this theme does emphasize limitations of the approach. The final components are involvement and improvement, these are debated as pluralistic notions and the implications of this are acknowledged. Reviewing the literature and theoretical application indicates the value of professionalizing action research as a process for modernization. The strength of the approach lies in the opportunity for team learning and change which is grounded in the context of services and pursued through collaboration.

  5. Assessment of the work environment of faculty of a Medical College in Pakistan.

    PubMed

    Saeed, Abid; Butt, Zahid Ahmad

    2014-01-01

    Extensive research is done on nursing work environments but less is known about the job conditions and environments of other health professionals. This study was aimed to fill this information gap by highlighting the factors affecting the work environment and stressors causing turnover of staff. A cross sectional study was conducted in Bolan Medical College Quetta for the assessment of working environment of the faculty from 22nd April to 22nd July 2012. All permanent teaching staff was included. A structured questionnaire was adopted fromI health sciences association of Alberta (HSSA), 2006 work Environment Survey. An observational check list for assessment of the physical environment /infrastructure and other general physical stuff was used. The faculty menibers were-not-satisfied with the security and safety of their work place but were satisfied with salaries, employer, and management. Work teams and relationship between employees and employers were respectful with good communication. Majority found their work times stressful and opportunities for on job trainings and professional development, adequate tools, equipment and conditions were mostly lacking. The overall working environment is not that good and few areas need serious attention like: professional development, trainings, adequate equipment, and security.

  6. [Effects of social origins and professional socialization on the vocational preferences of medical interns in Mexico].

    PubMed

    Frenk, J

    1985-01-01

    Using data from a survey of 923 medical interns in Mexico, this article analyzes preferences for type of medical activity (general or specialized practice), type of site (ambulatory or hospital), and type of medical care institution (public assistance, social security, or private). Four independent variables are examined: social origin, medical school, place of internship, and assimilation to the internship hospital. The great majority of the interns expressed a preference for specialty practice, hospitals, and social security institutions. The role of social origin was to selectively direct students into different medical schools. From then on, the structural attributes of the school itself and of the place of internship, as well as the socialization experiences that took place there, emerged as the most important determinants of career preferences. Such a process, however, tended to produce a "social specialization" of interns in terms of the role they expect to play in the medical field. It is argued that this kind of specialization has negative implications for the professional status of physicians, although it also poses a challenge to the development of innovative theories about the process of professionalization in medicine.

  7. [The 20th century legal framework regarding risk at work and occupational health in Colombia].

    PubMed

    Arango-Soler, Juan M; Luna-García, Jairo E; Correa-Moreno, Yerson A; Campos, Adriana C

    2013-01-01

    Analyzing the 20th century Colombian legal framework from the point of view of labor law, social security and public health for identifying concepts regarding occupational health and professional risk and trying to establish convergence and differences between such foci and whether they fulfilled a complementary view. This work involved documentary research by means of thematic categorical analysis of the laws and statutes promulgated in 20th century Colombia, considering the main element or entity which should have regulated that related to professional risk or occupational health. The development of the 20th century Colombian legal framework regarding health at work was periodized, revealing the predominance of a view of social law focused on protecting dependent workers' work-related risks, as part of a tendency extending to the Colombian Sistema General de Riesgos Laborales. The proposed stages used for organizing the legal framework concerning social security regarding professional risk and occupational health facilitated some important elements being recognized concerning the social, legal and institutional context from which workers' health laws emerged. Tension was noted concerning statutes orientated towards redress and compensation regarding accidents at work and legislation emphasizing prevention.

  8. Care control and collaborative working in a prison hospital.

    PubMed

    Foster, John; Bell, Linda; Jayasinghe, Neil

    2013-03-01

    This paper reports findings from a qualitative research project, using interviews, focus groups and participant observations, which sought to investigate "good practice" in a nurse-led prison hospital wing for male prisoners. The study raised issues about tensions between "caring" and "control" of prisoners from the perspectives of professionals working or visiting the wing. This paper discusses collaborative working between professionals from different backgrounds, including nurses and healthcare (prison) officers who were based on the wing and others who visited such as probation, medical, Inreach team or Counselling Advice, Referral, Assessment and Through Care team staff (CARAT). The key finding was that there is a balance between therapy and security/risk. In order to maintain this, the two main groups based on the hospital wing--nurses and prison officers--moved between at times cooperating, coordinating and collaborating with each other to maintain this balance. Other themes were care and control, team working, individual and professional responsibilities and communication issues. Enhancing the role of nurses should be encouraged so that therapy remains paramount, and we conclude with some recommendations to encourage collaborative working in prison healthcare settings to ensure that therapy continues to be paramount while security and safety are maintained.

  9. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    ERIC Educational Resources Information Center

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  10. The DISAM Journal of International Security Assistance Management. Volume 23, Number 1, Fall 2000

    DTIC Science & Technology

    2000-01-01

    Security Assistance Command Figure 1 The USASAC, including OPM-SANG, is staffed by 621 men and women , of whom 104 are military. These professionals are...by program managers. These program managers are like “front-line entreprenuers ” delivering products and services to their customers. They have been...NATO history was to be commanded by a Polish general in June 1988. The brigade of some 3000 men and women was composed of five national battalions

  11. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  12. Influences on Researchers' Commitment.

    ERIC Educational Resources Information Center

    Bailey, Jeffrey G.

    1994-01-01

    A study in a new university investigated the relative importance of six factors (job security/promotion, availability of research resources, contribution to university mission, personal stimulation/challenge, colleague relationship, and professional recognition/development) on research commitment and productivity. Discipline, rank, and gender were…

  13. 42 CFR 422.206 - Interference with health care professionals' advice to enrollees prohibited.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... individual who is a patient and enrolled under an MA plan about— (i) The patient's health status, medical... construed to affect disclosure requirements under State law or under the Employee Retirement Income Security...

  14. 75 FR 11890 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... housed on a secure server and database. The results of the survey shall be used for inpatient quality... of records are necessary to ensure the well-being and safety of patients and that professional...

  15. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  16. Lightweight application for generating clinical research information systems: MAGIC.

    PubMed

    Leskošek, Brane; Pajntar, Marjan

    2015-12-01

    Our purpose was to build and test a lightweight solution for generating clinical research information systems (CRIS) that would allow non-IT professionals with basic knowledge of computer usage to quickly define and build a ready-to-use, safe and secure web-based clinical research system for data management. We use the acronym MAGIC (Medical Application Generator InteraCtive) for the system. The generated CRIS should be very easy to build and use, so a common LAMP (Linux Apache MySQL Perl) platform was used, which also enables short development cycles. The application was built and tested using eXtreme Programming (XP) principles by a small development team consisting of one informatics specialist, one physician and one graphical designer/programmer. The parameter and graphical user interface (GUI) definitions for the CRIS can be made by non-IT professionals using an intuitive English-language-like formalism called application definition language (ADL). From these definitions, the MAGIC builds an end-user CRIS that can be used on a wide variety of platforms (from standard workstations to hand-held devices). A working example of a national health-care-quality assessment program is presented to illustrate this process. The lightweight application for generating CRIS (MAGIC) has proven to be useful for both clinical and analytical users in real working environment. To achieve better performance and interoperability, we are planning to recompile the application using XML schemas (XSD) in HL7 CDA or openEHR archetypes formats used for parameters definition and for data interchange between different information systems.

  17. PKI security in large-scale healthcare networks.

    PubMed

    Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos

    2012-06-01

    During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.

  18. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  19. [Public health stewardship and governance regarding the Colombian healthcare system, 2012-2013].

    PubMed

    Roth-Deubel, André N; Molina-Marín, Gloria

    2013-01-01

    Analysing decision-making concerning public health issues regarding the Colombian healthcare system from a market economy-based approach. This study involved applying Glaser and Strauss's grounded theory in six Colombian cities during 2012: Bogotá, Barranquilla, Bucaramanga, Leticia, Medellin and Pasto. 120 individual interviews were conducted with professionals involved in decision-making, running public healthcare programmes and making policy within public and private institutions. Fourteen focus groups were held with community organisation leaders. The findings suggested national and municipal health authorities' weak stewardship and ineffective governance regarding public healthcare policy and programmes, related to a lack of staff trained in public health management issues. In turn, this was related to political parties' interference and private insurers' particular interests and the structural fragmentation of functions and actors within the health system, thereby limiting public health development. A new axiology is necessary for achieving effective governance (I.e. cooperation between Colombian Healthcare Social Security System actors) to overcome current incompetence and financial self-interest predominating within the Colombian healthcare system.

  20. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  1. Sustaining and growing the rural nursing and midwifery workforce: understanding the issues and isolating directions for the future.

    PubMed

    Francis, Karen L; Mills, Jane E

    2011-01-01

    Nurses and midwives represent the largest group of health professionals in the Australian health care system. In rural environments nurses and midwives make up a greater proportion of the health workforce than in urban settings, which makes their role in service provision even more significant. The role and scope of these nurses and midwives' practice is by necessity more generalist than specialist, which results in disciplinary strengths and weaknesses. As generalist health professionals they work in diverse settings such as public hospitals, multi-purpose services, community health, aged care and in non-government and private for profit and no-profit organisations including general practices. Their scope of practice covers prevention, intervention and rehabilitation and is lifespan inclusive. Rural nurses and midwives are older than their metropolitan based counterparts, work part-time and traditionally have limited access to professional development often due to ineffective locum relief programs. Workplace inflexibility, access to acceptable housing and partner employment are factors cited as inhibitors to growing this workforces. The future of the rural nursing and midwifery workforce will only be secured if Government invests to a greater degree in both education and training and the development of a nationally agreed remuneration scale that allows for part-time work.

  2. 44 CFR 19.105 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... of vocational education means a school or institution (except an institution of professional or... HOMELAND SECURITY GENERAL NONDISCRIMINATION ON THE BASIS OF SEX IN EDUCATION PROGRAMS OR ACTIVITIES... regulations, the term: Administratively separate unit means a school, department, or college of an educational...

  3. Antimicrobial stewardship through a one health lens: Observations from Washington State

    USDA-ARS?s Scientific Manuscript database

    Antibiotic resistance is a global health crisis that threatens patient care, public health, agriculture, economic growth and national security. It has recently attracted increasing attention from healthcare professionals, public health officials, federal governments, international agencies, the publ...

  4. Cultural Styles of Persuasion

    ERIC Educational Resources Information Center

    Glenn, E. S.; And Others

    1977-01-01

    Offers an alternative methodology for studying persuasive strategies by examining the persuasive strategies selected by professional persuaders representing those cultures being studied. Analyzes the persuasive styles of United States, Soviet Union and Arab diplomats involved in international negotiations in the Security Council of the United…

  5. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    ERIC Educational Resources Information Center

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  6. To provide protections for certain sports medicine professionals who provide certain medical services in a secondary State.

    THOMAS, 113th Congress

    Rep. Latham, Tom [R-IA-3

    2013-12-12

    House - 01/27/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Effects of cutbacks on motivating factors among nurses in primary health care.

    PubMed

    Halldorsdottir, Sigridur; Einarsdottir, Emilia J; Edvardsson, Ingi Runar

    2018-03-01

    When financial cuts are made, staff redundancies and reorganisation in the healthcare system often follow. Little is known how such cutbacks affect work motivation of nurses in primary health care. Examine the effects of cutbacks on motivating factors among nurses in primary health care. A phenomenological approach involving a purposeful sample of ten nurses in primary health care. Average age 44. The participants identified the job itself, autonomy, independence, good communication with co-workers, and the potential for professional training, learning and development as the main internal motivational factors related to their work. However, increased stress and uncertainty, growing fatigue and understaffing were starting to have a negative impact on these internal motivational factors. Moreover, reduced opportunities for professional training and development had negative effects on the participants. Many saw these opportunities as a vital part of recognition for their job performance. Regarding external motivation, the factors identified were job security, salaries and rewards, and interaction with management. The participants expressed their interest in more consultation with managers and most preferred an increased flow of information from managers to staff members during cutbacks. Salaries, professional training opportunities and appreciation were rewards named by participants for a job well done. All agreed that salaries are stronger motivational factors than before cutbacks. In the case of cutbacks, nursing managers should increase consultations with staff and make sure that nurses maintain their independence, autonomy, opportunities for professional training as well as appreciation for job well done. © 2017 Nordic College of Caring Science.

  8. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  9. Mobile healthcare applications: system design review, critical issues and challenges.

    PubMed

    Baig, Mirza Mansoor; GholamHosseini, Hamid; Connolly, Martin J

    2015-03-01

    Mobile phones are becoming increasingly important in monitoring and delivery of healthcare interventions. They are often considered as pocket computers, due to their advanced computing features, enhanced preferences and diverse capabilities. Their sophisticated sensors and complex software applications make the mobile healthcare (m-health) based applications more feasible and innovative. In a number of scenarios user-friendliness, convenience and effectiveness of these systems have been acknowledged by both patients as well as healthcare providers. M-health technology employs advanced concepts and techniques from multidisciplinary fields of electrical engineering, computer science, biomedical engineering and medicine which benefit the innovations of these fields towards healthcare systems. This paper deals with two important aspects of current mobile phone based sensor applications in healthcare. Firstly, critical review of advanced applications such as; vital sign monitoring, blood glucose monitoring and in-built camera based smartphone sensor applications. Secondly, investigating challenges and critical issues related to the use of smartphones in healthcare including; reliability, efficiency, mobile phone platform variability, cost effectiveness, energy usage, user interface, quality of medical data, and security and privacy. It was found that the mobile based applications have been widely developed in recent years with fast growing deployment by healthcare professionals and patients. However, despite the advantages of smartphones in patient monitoring, education, and management there are some critical issues and challenges related to security and privacy of data, acceptability, reliability and cost that need to be addressed.

  10. Correlation Research of Medical Security Management System Network Platform in Medical Practice

    NASA Astrophysics Data System (ADS)

    Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang

    Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.

  11. [The state of the art on nutrition, food safety and food security].

    PubMed

    Bonaccorsi, Guglielmo; Lorini, Chiara; Porchia, Barbara Rita; Capecchi, Leonardo; Malavolti, Marcella; Aggazzotti, Gabriella

    2014-01-01

    In Italy, public health is experiencing a phase of crisis. A contraction of services and a staff reallocation have affected in particular Food Hygiene services. We explored Pubmed and Google Ngram Viewer© to define the state of the art of research in food and nutritional field from a quantitative point of view and we focused on some areas of interest in terms of improvement of professional practice. The Italian contribution to food and nutritional research is still limited. Our findings seem to demonstrate the need of an alliance between the world of research and Public Health services, so as to develop a sustainable and effective health system.

  12. 76 FR 58786 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...

  13. 31 CFR 306.23 - Securities eligible to be held in the Legacy Treasury Direct® Book-entry Securities System.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Legacy Treasury Direct® Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury... Securities eligible to be held in the Legacy Treasury Direct® Book-entry Securities System. (a) Eligible... book-entry securities system. (b) Conversion of Registered Security to book-entry form to be held in...

  14. Sex-specific relationships among attachment security, social values, and sensation seeking in early adolescence: implications for adolescents' externalizing problem behaviour.

    PubMed

    Sarracino, Diego; Presaghi, Fabio; Degni, Silvia; Innamorati, Marco

    2011-06-01

    In early adolescence, attachment security reflects not only the quality of ongoing relationships with parents, but also how adolescents process social relationships with "others" - that is, their "social value orientation" - with possible implications for adolescents' risk-taking. In this study, a sample of Italian early adolescents were administered self-report measures in order to examine the relationships (a) between early adolescents' perceived attachment security to mothers and fathers, social values (related to family and the socio-cultural context), and sensation seeking (as a temperamental predisposition to risk-taking), and (b) between these variables and adolescents' externalizing problem behaviour. Adolescents were more securely attached to the same-sexed parent. Further, attachment security with the opposite-sexed parent predicted more conservative social value orientations, and lower levels of problem behaviour. In contrast, sensation seeking predicted self-enhancement and openness-to-change values to a greater extent, and, in girls, lower levels of attachment security to mothers and fathers. Copyright © 2010 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  15. - Oklahoma Water Resources Center

    Science.gov Websites

    INTERDISCIPLINARY PROGRAMS Environmental Sciences Master of International Agriculture Degree Program OSU Home Professional Development Training (Baton Rouge, LA; 8/5-10) Global Water Security for Agriculture and Natural Oklahoma City Center for Health Sciences Division of Agriculture Institute of Technology Veterinary

  16. 77 FR 60450 - Senior Executive Service Performance Review Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-03

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Senior Executive Service Performance... announces the appointment of the members of the Senior Executive Service Performance Review Boards for the... appropriate personnel actions for incumbents of Senior Executive Service, Senior Level and Senior Professional...

  17. 78 FR 20156 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-03

    ... Letter'') and Jeanine Rodgers Caruso, President, National Association of Independent Public Finance Advisors, dated March 12, 2013 (``NAIPFA Letter''). See also, Letters to Ronald W. Smith, Corporate... dealers (``dealers''), their municipal finance professionals (``MFPs''), political action committees...

  18. HIPAA Compliance and Training: A Perfect Storm for Professionalism Education?

    PubMed

    Agris, Julie L; Spandorfer, John M

    2016-12-01

    The HIPAA Rules continue to support and bolster the importance of protecting the privacy and security of patients' protected health information. The HIPAA training requirements are at the cornerstone of meaningful implementation and provide a ripe opportunity for critical education.

  19. Faculty Development in Business Education.

    ERIC Educational Resources Information Center

    Nastas, George, III

    1985-01-01

    The benefits and costs accruing to business faculty members who publish are discussed. Benefits include possible salary increases and/or promotions, job security, recognition, and professional stature. Costs include investing time without receiving payment. Suggestions are made for improving publication productivity, getting started, developing a…

  20. A virtual intranet and data-warehousing for healthcare co-operation.

    PubMed

    Kerkri, E M; Quantin, C; Grison, T; Allaert, F A; Tchounikine, A; Yétongnon, K

    2001-01-01

    As patient's medical data is disseminated in different health structures, developing a medical or epidemiological patient-oriented data warehouse has some specific requirements compared to intra healthcare structure data-warehousing projects. The difference is that the healthcare structures implicated in a patient-oriented data warehouse project require some considerations about the confidentiality of the patient data and of the activities of healthcare structures. Building a data-warehousing system at a regional level, for example in cancerology, requires the participation of all concerned health structures, as well as different health professionals. The heterogeneity of sources medical data of has to be taken into account for choosing between several organizational configurations of the data warehousing system. In top of data warehousing, we propose a concept of Virtual Intranet, which provides a solution to the problem of medical information security arising from heterogeneous sources.

  1. Psychiatric care or social defense? The origins of a controversy over the responsibility of the mentally ill in French forensic psychiatry.

    PubMed

    Protais, Caroline

    2014-01-01

    While some countries like Belgium chose a penal system clearly inspired by social-defense theories for mentally disturbed criminals, the French law hasn't been consistent and varies from the enlightened classical law and social-defense law. Indeed paragraph 1 of article 122-1 states that people whose discernment or control is abolished by a psychiatric disorder are non-responsible respecting the classical logic of law. On the other hand, Paragraph 2 of Article 122-1 allows the mentally ill to be judged responsible whereas no institution exists to take care about them. Then the system of psychiatric care in prisons present as a solution for professionals wishing to promote a system where people are punished and socially rehabilitated. Thus these forensic psychiatrists don't refer to paragraph 1 of article 122-1 and even people presenting serious mental disorders are considered responsible. Moreover, if a controversy has always existed between psychiatrists who argue a large conception of mental irresponsibility and professionals who defend the right to punish and to conclude that responsibility even for mentally disturbed criminals, the controversy becomes more important in French forensic psychiatry after the Second World War. If until the 1970s the practice of imposing responsibility for mentally ill individuals shows itself as a humanism, it occurs more within a security perspective today. © 2013.

  2. Climate change and human health: a One Health approach.

    PubMed

    Patz, Jonathan A; Hahn, Micah B

    2013-01-01

    Climate change adds complexity and uncertainty to human health issues such as emerging infectious diseases, food security, and national sustainability planning that intensify the importance of interdisciplinary and collaborative research. Collaboration between veterinary, medical, and public health professionals to understand the ecological interactions and reactions to flux in a system can facilitate clearer understanding of climate change impacts on environmental, animal, and human health. Here we present a brief introduction to climate science and projections for the next century and a review of current knowledge on the impacts of climate-driven environmental change on human health. We then turn to the links between ecological and evolutionary responses to climate change and health. The literature on climate impacts on biological systems is rich in both content and historical data, but the connections between these changes and human health is less understood. We discuss five mechanisms by which climate changes impacts on biological systems will be felt by the human population: Modifications in Vector, Reservoir, and Pathogen Lifecycles; Diseases of Domestic and Wild Animals and Plants; Disruption of Synchrony Between Interacting Species; Trophic Cascades; and Alteration or Destruction of Habitat. Each species responds to environmental changes differently, and in order to predict the movement of disease through ecosystems, we have to rely on expertise from the fields of veterinary, medical, and public health, and these health professionals must take into account the dynamic nature of ecosystems in a changing climate.

  3. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  4. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  5. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  6. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  7. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    NASA Astrophysics Data System (ADS)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  8. Exploring patient satisfaction levels, self-rated oral health status and associated variables among citizens covered for dental insurance through a National Social Security Scheme in India.

    PubMed

    Singh, Abhinav; Purohit, Bharathi M

    2017-06-01

    To assess patient satisfaction, self-rated oral health and associated factors, including periodontal status and dental caries, among patients covered for dental insurance through a National Social Security Scheme in New Delhi, India. A total of 1,498 patients participated in the study. Satisfaction levels and self-rated oral-health scores were measured using a questionnaire comprising 12 closed-ended questions. Clinical data were collected using the Community Periodontal Index (CPI) and the decayed, missing and filled teeth (DMFT) index. Regression analysis was conducted to evaluate factors associated with dental caries, periodontal status and self-rated oral health. Areas of concern included poor cleanliness within the hospital, extensive delays for appointments, waiting time in hospital and inadequate interpersonal and communication skills among health-care professionals. Approximately 51% of the respondents rated their oral health as fair to poor. Younger age, no tobacco usage, good periodontal status and absence of dental caries were significantly associated with higher oral health satisfaction, with odds ratios of 3.94, 2.38, 2.58 and 2.09, respectively (P ≤ 0.001). The study indicates poor satisfaction levels with the current dental care system and a poor self-rated oral health status among the study population. Some specific areas of concern have been identified. These findings may facilitate restructuring of the existing dental services under the National Social Security Scheme towards creating a better patient care system. © 2017 FDI World Dental Federation.

  9. New-generation security network with synergistic IP sensors

    NASA Astrophysics Data System (ADS)

    Peshko, Igor

    2007-09-01

    Global Dynamic Monitoring and Security Network (GDMSN) for real-time monitoring of (1) environmental and atmospheric conditions: chemical, biological, radiological and nuclear hazards, climate/man-induced catastrophe areas and terrorism threats; (2) water, soil, food chain quantifiers, and public health care; (3) large government/public/ industrial/ military areas is proposed. Each GDMSN branch contains stationary or mobile terminals (ground, sea, air, or space manned/unmanned vehicles) equipped with portable sensors. The sensory data are transferred via telephone, Internet, TV, security camera and other wire/wireless or optical communication lines. Each sensor is a self-registering, self-reporting, plug-and-play, portable unit that uses unified electrical and/or optical connectors and operates with IP communication protocol. The variant of the system based just on optical technologies cannot be disabled by artificial high-power radio- or gamma-pulses or sunbursts. Each sensor, being supplied with a battery and monitoring means, can be used as a separate portable unit. Military personnel, police officers, firefighters, miners, rescue teams, and nuclear power plant personnel may individually use these sensors. Terminals may be supplied with sensors essential for that specific location. A miniature "universal" optical gas sensor for specific applications in life support and monitoring systems was designed and tested. The sensor is based on the physics of absorption and/or luminescence spectroscopy. It can operate at high pressures and elevated temperatures, such as in professional and military diving equipment, submarines, underground shelters, mines, command stations, aircraft, space shuttles, etc. To enable this capability, the multiple light emitters, detectors and data processing electronics are located within a specially protected chamber.

  10. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  11. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...

  12. The Frequency, Contributing and Preventive Factors of Harassment towards Health Professionals in Iran

    PubMed Central

    Fallahi Khoshknab, Masoud; Oskouie, Fatemeh; Ghazanfari, Nahid; Najafi, Fereshteh; Tamizi, Zahra; Afshani, Shahla; Azadi, Ghazal

    2015-01-01

    Background There are high levels of sexual harassment in health care systems. Also, workplace violence occurs against ethnic and racial minorities. This study aimed to identify the frequency of and the factors contributing to and preventing sexual and racial harassment in the workplace towards health professionals in Iran. Methods This cross-sectional study was conducted on 6500 out of 57000 health workers who were selected by multistage random sampling from some teaching hospitals in Iran. Data were collected using the questionnaire of “workplace violence in the health sector” developed by the International Labor Organization, International Council of Nurses, World Health Organization, and Public Services International. Results According to the findings, the frequencies of sexual harassment and racial harassment were, respectively, 4.7% and 12% for the 12 months prior to the study (2011). Among healthcare workers, nurses reported the highest rate of violence. The most important contributing factors in sexual and racial harassment were lack of security facilities (45.8%) and people’s ignorance of employees’ tasks (55.7%). The presence of security force, safety measures in the wards, and guards were noted as the most important preventive factor to harassment. Conclusion Based on the results, the frequency of sexual and racial harassment is low, which can be attributed to underreporting due to cultural sensitivity or fear. So, identifying the reasons for refusal to report harassment, developing a clear mechanism for reporting and providing the necessary trainings to health workers are essential in order to deal with harassment. PMID:26171404

  13. Blockchain Technology: A Data Framework to Improve Validity, Trust, and Accountability of Information Exchange in Health Professions Education.

    PubMed

    Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel

    2018-06-12

    Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.

  14. Barriers to healthcare coordination in market-based and decentralized public health systems: a qualitative study in healthcare networks of Colombia and Brazil.

    PubMed

    Vargas, Ingrid; Mogollón-Pérez, Amparo Susana; De Paepe, Pierre; Ferreira da Silva, Maria Rejane; Unger, Jean-Pierre; Vázquez, María-Luisa

    2016-07-01

    Although integrated healthcare networks (IHNs) are promoted in Latin America in response to health system fragmentation, few analyses on the coordination of care across levels in these networks have been conducted in the region. The aim is to analyse the existence of healthcare coordination across levels of care and the factors influencing it from the health personnel' perspective in healthcare networks of two countries with different health systems: Colombia, with a social security system based on managed competition and Brazil, with a decentralized national health system. A qualitative, exploratory and descriptive-interpretative study was conducted, based on a case study of healthcare networks in four municipalities. Individual semi-structured interviews were conducted with a three stage theoretical sample of (a) health (112) and administrative (66) professionals of different care levels, and (b) managers of providers (42) and insurers (14). A thematic content analysis was conducted, segmented by cases, informant groups and themes. The results reveal poor clinical information transfer between healthcare levels in all networks analysed, with added deficiencies in Brazil in the coordination of access and clinical management. The obstacles to care coordination are related to the organization of both the health system and the healthcare networks. In the health system, there is the existence of economic incentives to compete (exacerbated in Brazil by partisan political interests), the fragmentation and instability of networks in Colombia and weak planning and evaluation in Brazil. In the healthcare networks, there are inadequate working conditions (temporary and/or part-time contracts) which hinder the use of coordination mechanisms, and inadequate professional training for implementing a healthcare model in which primary care should act as coordinator in patient care. Reforms are needed in these health systems and networks in order to modify incentives, strengthen the state planning and supervision functions and improve professional working conditions and skills. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine.

  15. Conducted electrical weapons within healthcare: a comprehensive use of force model.

    PubMed

    Ho, Jeffrey D; Williams, Martin F; Coplen, Michael J

    2014-01-01

    Healthcare settings are experiencing increased amounts of violent activity that are challenging to the health care security profession. There is difficulty in addressing this issue completely. Some of this difficulty is because of factors that include inexperienced and untrained clinicians and administrators that are often the decision-makers in the health care setting. As part of an effective solution, we propose that a security plan, including a comprehensive use of force program incorporating conducted electrical weapons, is a necessary and best-practice goal. This paper outlines the background of the problem and discusses the challenges we encountered in reaching this goal as well as the benefits we have discovered along the way. This paper will be beneficial to any healthcare security professional that is interested in enhancing or improving their current health care security use of force model to further counter the increasing violent activity in their respective healthcare setting.

  16. Coding ethical behaviour: the challenges of biological weapons.

    PubMed

    Rappert, Brian

    2003-10-01

    Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.

  17. Security Concerns in Android mHealth Apps

    PubMed Central

    He, Dongjing; Naveed, Muhammad; Gunter, Carl A.; Nahrstedt, Klara

    2014-01-01

    Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients. This paper presents a series of three studies of the mHealth apps in Google Play that show that mHealth apps make widespread use of unsecured Internet communications and third party servers. Both of these practices would be considered problematic under HIPAA, suggesting that increased use of mHealth apps could lead to less secure treatment of health data unless mHealth vendors make improvements in the way they communicate and store data. PMID:25954370

  18. Security Concerns in Android mHealth Apps.

    PubMed

    He, Dongjing; Naveed, Muhammad; Gunter, Carl A; Nahrstedt, Klara

    2014-01-01

    Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients. This paper presents a series of three studies of the mHealth apps in Google Play that show that mHealth apps make widespread use of unsecured Internet communications and third party servers. Both of these practices would be considered problematic under HIPAA, suggesting that increased use of mHealth apps could lead to less secure treatment of health data unless mHealth vendors make improvements in the way they communicate and store data.

  19. Ethics in Public Health Research

    PubMed Central

    Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.

    2008-01-01

    Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010

  20. 76 FR 43993 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ...; System of Records AGENCY: National Security Agency/Central Security Service, Department of Defense. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security.... FOR FURTHER INFORMATION CONTACT: Ms. Anne Hill, National Security Agency/Central Security Service...

Top