7 resultados para confidentiality
em University of Queensland eSpace - Australia
Resumo:
Current pharmacotherapies for psychiatric disorders are generally incompletely effective. Many patients do not respond well or suffer adverse reactions to these drugs, which can result in poor patient compliance and poor treatment outcome. Adverse drug reactions and non-response are likely to be influenced by genetic polymorphisms. Pharmacogenetics holds some promise for improving the treatment of mood disorders by utilising information about genetic polymorphisms to match patients to the drug therapy that is the most effective with the fewest side effects. Pharmacogenomics promises to facilitate the development of new drugs for treatment. However, these technologies raise many ethical, economic and regulatory issues that need to be addressed before they can be integrated into psychiatry, and medicine more generally. We discuss ethical and policy issues arising from pharmacogenetic testing and pharmacogenomics research, such as informed consent, privacy and confidentiality, research on vulnerable persons and discrimination; and economic viability of pharmacogenetics and pharmacogenomics. We conclude with recommendations for the regulation and distribution of pharmacogenetic testing services and pharmacogenomic drugs.
Resumo:
The therapeutic letter has a long history, with roots in psychoanalytic work and continuing application in family therapy. The advent of e-mail has allowed another form for therapeutic written communication which, while incorporating the benefits of therapeutic letters, adds to these. It has also opened up some potential risks. This article incorporates a brief review of the literature covering therapeutic written communication and offers a case example where e-mail was used as an adjunct in face-to-face therapy with a client who experienced attachment difficulties. This therapy was informed by systemic and psychoanalytic traditions. The authors explore a variety of technical matters including the timing and Crafting of e-mail responses, the integration of written communication with face-to-face therapy, impact on the therapeutic relationship and management of crisis. Ethical issues such as confidentiality and duty of care are also considered.
Resumo:
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.
Resumo:
All staff members of a child and adolescent mental health service were invited to participate in a survey about the use of email. Sixty-two of the 105 staff members responded to the survey, a participation rate of 59%. Of the respondents, 32 were allied health staff, 10 were nurses, seven were administrative staff, six were medical staff, three were operational staff and four were acting in a combination of these roles. The respondents reported extensive work-related email usage and considered that they were confident in using email despite low levels of training. However, they did not feel that they understood the legal and ethical issues involved. Furthermore, there was limited incorporation of email into standard record keeping. The majority of respondents thought that increased use of email would lead to a greater workload, a consequence they considered would probably increase over time. Many commented on the quick and practical use of this medium, but were wary about using email with individuals outside the service organization, especially if it were to contain clinical material. There was low use of email directly with clients, and clinicians were ambivalent about incorporating email into therapy. The results suggest that it is timely to consider the utility and appropriateness of email communication with clients and external service providers, and to formulate guidelines and procedures to ensure the confidentiality of client information and the safety of clients and staff.
Resumo:
Objective: The aim of this paper is to examine some of the factors that facilitate and hinder interagency collaboration between child protection services and mental health services in cases where there is a parent with a mental illness and there are protection concerns for the child(ren). The paper reports on agency practices, worker attitudes and experiences, and barriers to effective collaboration. Method: A self-administered, cross-sectional survey was developed and distributed via direct mail or via line supervisors to workers in statutory child protection services, adult mental health services, child and youth mental health services, and Suspected Child Abuse and Neglect (SCAN) Teams. There were 232 completed questionnaires returned, with an overall response rate of 21%. Thirty-eight percent of respondents were statutory child protection workers. 39% were adult mental health workers, 16% were child and youth mental health workers, and 4% were SCAN Team medical officers (with 3% missing data). Results: Analysis revealed that workers were engaging in a moderate amount of interagency contact, but that they were unhappy with the support provided by their agency. Principle components analysis and multivariate analysis of variance (MANOVA) on items assessing attitudes toward other workers identified four factors, which differed in rates of endorsement: inadequate training, positive regard for child protection workers, positive regard for mental health workers, and mutual mistrust (from highest to lowest level of endorsement). The same procedure identified the relative endorsement of five factors extracted from items about potential barriers: inadequate resources, confidentiality, gaps in interagency processes, unrealistic expectations, and professional knowledge domains and boundaries. Conclusions: Mental health and child protection professionals believe that collaborative practice is necessary; however, their efforts are hindered by a lack of supportive structures and practices at the organizational level. (c) 2005 Published by Elsevier Ltd.
Resumo:
Our research described in this paper identifies a three part premise relating to the spyware paradigm. Firstly the data suggests spyware is proliferating at an exponential rate. Secondly ongoing research confirms that spyware produces many security risks – including that of privacy/confidentiality breaches via illicit data collection and reporting. Thirdly, anti-spyware controls are improving but are still considered problematic for several reasons. Our research then concludes that control measures to counter this very significant challenge should merit compliance auditing – and this auditing may effectively target the vital message passing performed by all illicit data collection spyware. Our research then evolves into an experiment involving the design and implementation of a software audit tool to conduct the desired compliance auditing. The software audit tool is positioned at the protected network’s gateway. The software audit tool uses ‘phone-home’ IP addresses as spyware signatures to detect the presence of the offending software. The audit tool also has the capability to differentiate legitimate message passing software from that produced by spyware – and ‘learn’ both new spyware signatures and new legitimate message passing profiles. The testing stage of the software has proven successful – albeit using very limited levels of network message passing variety and frequency.
Resumo:
Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.