26 resultados para provable security
em Université de Lausanne, Switzerland
Resumo:
In 2006, a medico-legal consultation service devoted to adult victims of interpersonal violence was set up at the Lausanne University Hospital Centre, Switzerland: the Violence Medical Unit. Most patients are referred to the consultation by the Emergency Department. They are received by forensic nurses for support, forensic examination (in order to establish medical report) and community orientation. Between 2007 and 2009, among community violence, aggressions by security agents of nightclubs on clients have increased from 6% to 10%. Most of the victims are young men who had drunk alcohol before the assault. 25.7% presented one or several fractures, all of them in the head area. These findings raise questions about the ability of security agents of nightclubs to deal adequately with obviously risky situations and ensure client security.
Resumo:
Since the early nineties, several hundreds of Chinese immigrants have settled in what has become known as the 'Chinese wholesalers area'. For the past two years, Chinese wholesalers in Aubervilliers have been calling on public authorities to address the problem of street robberies and violent thefts, which they experience on a daily basis. Yet, they have been encouraged by the authorities to ensure their own protection, by - amongst other things - installing surveillance cameras to film the streets. This is illegal according to French legislation on camera surveillance. Knowing this, why have surveillance cameras been adopted as a solution? This question guides the ethnographic analysis presented here of a situation where the installation of surveillance cameras was locally negotiated by the main actors involved - namely, the wholesalers' representatives and the police.
Resumo:
OBJECTIVE: To assess whether formatting the medical order sheet has an effect on the accuracy and security of antibiotics prescription. DESIGN: Prospective assessment of antibiotics prescription over time, before and after the intervention, in comparison with a control ward. SETTING: The medical and surgical intensive care unit (ICU) of a university hospital. PATIENTS: All patients hospitalized in the medical or surgical ICU between February 1 and April 30, 1997, and July 1 and August 31, 2000, for whom antibiotics were prescribed. INTERVENTION: Formatting of the medical order sheet in the surgical ICU in 1998. MEASUREMENTS AND MAIN RESULTS: Compliance with the American Society of Hospital Pharmacists' criteria for prescription safety was measured. The proportion of safe orders increased in both units, but the increase was 4.6 times greater in the surgical ICU (66% vs. 74% in the medical ICU and 48% vs. 74% in the surgical ICU). For unsafe orders, the proportion of ambiguous orders decreased by half in the medical ICU (9% vs. 17%) and nearly disappeared in the surgical ICU (1% vs. 30%). The only missing criterion remaining in the surgical ICU was the drug dose unit, which could not be preformatted. The aim of antibiotics prescription (either prophylactic or therapeutic) was indicated only in 51% of the order sheets. CONCLUSIONS: Formatting of the order sheet markedly increased security of antibiotics prescription. These findings must be confirmed in other settings and with different drug classes. Formatting the medical order sheet decreases the potential for prescribing errors before full computerized prescription is available.
Resumo:
Summary The field of public finance focuses on the spending and taxing activities of governments and their influence on the allocation of resources and distribution of income. This work covers in three parts different topics related to public finance which are currently widely discussed in media and politics. The first two parts deal with issues on social security, which is in general one of the biggest spending shares of governments. The third part looks at the main income source of governments by analyzing the perceived value of tax competition. Part one deals with the current problem of increased early retirement by focusing on Switzerland as a special case. Early retirement is predominantly considered to be the result of incentives set by social security and the tax system. But the Swiss example demonstrates that the incidence of early retirement has dramatically increased even in the absence of institutional changes. We argue that the wealth effect also plays an important role in the retirement decision for middle and high income earners. An actuarially fair, but mandatory funded system with a relatively high replacement rate may thus contribute to a low labor market participation rate of elderly workers. We provide evidence using a unique dataset on individual retirement decisions in Swiss pension funds, allowing us to perfectly control for pension scheme details. Our findings suggest that affordability is a key determinant in the retirement decisions. The higher the accumulated pension capital, the earlier men, and to a smaller extent women, tend to leave the workforce. The fact that early retirement has become much more prevalent in the last 15 years is a further indicator of the importance of a wealth effect, as the maturing of the Swiss mandatory funded pension system over that period has led to an increase in the effective replacement rates for middle and high income earners. Part two covers the theoretical side of social security. Theories analyzing optimal social security benefits provide important qualitative results, by mainly using one general type of an economy. Economies are however very diverse concerning numerous aspects, one of the most important being the wealth level. This can lead to significant quantitative benefit differences that imply differences in replacement rates and levels of labor supply. We focus on several aspects related to this fact. In a within cohort social security model, we introduce disability insurance with an imperfect screening mechanism. We then vary the wealth level of the model economy and analyze how the optimal social security benefit structure or equivalently, the optimal replacement rates, changes depending on the wealth level of the economy, and if the introduction of disability insurance into a social security system is preferable for all economies. Second, the screening mechanism of disability insurance and the threshold level at which people are defined as disabled can differ. For economies with different wealth levels, we determine for different thresholds the screening level that maximizes social welfare. Finally, part three turns to the income of governments, by adding an element to the controversy on tax competition versus tax harmonization.2 Inter-jurisdictional tax competition can generate at least two potential benefits or costs: On a public level, tax competition may result in a lower or higher efficiency in the production of public services. But there is also a more private benefit in the form of an option for individuals to move to a community with a lower tax rate in the future. To explore the value citizens attach to tax competition we analyze a unique popular vote for a complete tax harmonization between communities in the third largest Swiss canton, Vaud. Although a majority of voters would have seemingly benefited from replacing the current tax rate by a revenue-neutral average tax rate, the proposal was rejected by a large margin. Our estimates suggest that the estimated combined perceived benefit from tax competition is in the range of 10%.
Resumo:
This article presents the legislative and judicial practice relating to the "autonomous implementation" of EU law in Switzerland. Given that "euro-compatibility" is the central consideration behind this legislative policy, one would expect Swiss authorities to have devised legislative and hermeneutical techniques guaranteeing high fidelity to EU "mother law". That is not the case, however, and as this article shows much is lost in the translation from EU to Swiss Law
Resumo:
The arbuscular mycorrhizal symbiosis is formed between arbuscular mycorrhizal fungi (AMF) and plant roots. The fungi provide the plant with inorganic phosphate (P). The symbiosis can result in increased plant growth. Although most global food crops naturally form this symbiosis, very few studies have shown that their practical application can lead to large-scale increases in food production. Application of AMF to crops in the tropics is potentially effective for improving yields. However, a main problem of using AMF on a large-scale is producing cheap inoculum in a clean sterile carrier and sufficiently concentrated to cheaply transport. Recently, mass-produced in vitro inoculum of the model mycorrhizal fungus Rhizophagus irregularis became available, potentially making its use viable in tropical agriculture. One of the most globally important food plants in the tropics is cassava. We evaluated the effect of in vitro mass-produced R. irregularis inoculum on the yield of cassava crops at two locations in Colombia. A significant effect of R. irregularis inoculation on yield occurred at both sites. At one site, yield increases were observed irrespective of P fertilization. At the other site, inoculation with AMF and 50% of the normally applied P gave the highest yield. Despite that AMF inoculation resulted in greater food production, economic analyses revealed that AMF inoculation did not give greater return on investment than with conventional cultivation. However, the amount of AMF inoculum used was double the recommended dose and was calculated with European, not Colombian, inoculum prices. R. irregularis can also be manipulated genetically in vitro, leading to improved plant growth. We conclude that application of in vitro R. irregularis is currently a way of increasing cassava yields, that there is a strong potential for it to be economically profitable and that there is enormous potential to improve this efficiency further in the future.
Resumo:
Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff.
Resumo:
There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.
Resumo:
Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.