19 resultados para secure audit

em CentAUR: Central Archive University of Reading - UK


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The medicines use review (MUR) service was introduced in England and Wales in 2005 to improve patients’ knowledge and use of medicines through a private, patient–pharmacist consultation. The pharmacist completes a standard form as a record of the MUR consultation and the patient receives a copy. The 2008 White Paper, Pharmacy in England[1] notes some MURs are of poor or questionable quality and there are anecdotal reports that pharmacists elect to conduct ‘easy’ MURs with patients on a single prescribed medicine only.[2] In 2009, the Royal Pharmaceutical Society of Great Britain (RPSGB) launched a multi-disciplinary audit template to review the effectiveness of MURs and improve their quality.[3] Prior to this, we conducted a retrospective MUR audit in a 1-month period in 2008. Our aims were to report on findings from this audit and the validity of using MUR forms as data for audit.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the essential needs to implement a successful e-Government web application is security. Web application firewalls (WAF) are the most important tool to secure web applications against the increasing number of web application attacks nowadays. WAFs work in different modes depending on the web traffic filtering approach used, such as positive security mode, negative security mode, session-based mode, or mixed modes. The proposed WAF, which is called (HiWAF), is a web application firewall that works in three modes: positive, negative and session based security modes. The new approach that distinguishes this WAF among other WAFs is that it utilizes the concepts of Artificial Intelligence (AI) instead of regular expressions or other traditional pattern matching techniques as its filtering engine. Both artificial neural networks and fuzzy logic concepts will be used to implement a hybrid intelligent web application firewall that works in three security modes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows various representations of information to be used in the enforcement of secure information flow in deterministic or nondeterministic systems. A flexible semantics-based analysis technique is presented, which uses the input-output relational model induced by an attacker's observational power, to compute the information released by the computational system. An illustrative attacker model demonstrates the use of the technique to develop a termination-sensitive analysis. The technique allows the development of various information flow analyses, parametrised by the attacker's observational power, which can be used to enforce what declassification policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the cost-effectiveness of British regional policy during the 1930s. It takes issue with Correlli Barnett, who has argued that regional policy measures introduced from 1945 were already shown to be inefficient by the failure of similar assistance during the 1930s. The evolution of the main 1930s initiatives that influenced post-war policy is discussed and their effectiveness assessed. When account is taken of savings in government welfare payments these initiatives are shown to have been very cost-effective, producing an annual return to the exchequer of around 56%, or more.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Supreme audit institutions (SAIs) have an important role in assessing value for money in the delivery of public services. Assessing value for money necessarily involves assessing counterfactuals: good value for money has been achieved if a policy could not reasonably have been delivered more efficiently, effectively, or economically. Operations research modelling has the potential to help in the assessment of these counterfactuals. However, is such modelling too arcane, complex, and technically burdensome for organisations that, like SAIs, operate in a time- and resource-constrained and politically charged environment? We report on three applications of modelling at the UK's SAI, the National Audit Office, in the context of studies on demand management in tax collection, end-of-life care, and health-care associated infections. In all cases, the models have featured in the audit reports and helped study teams come to a value-for-money judgment. We conclude that OR modelling is indeed a valuable addition to the value-for-money auditor's methodological tool box.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Concern for the environmental impact of organizations’ activities has led to the recognition and demand for organizations to manage and report on their carbon footprint. However, there is no limit as to the areas of carbon footprints required in such annual environmental reports. To deliver improvements in the quality of carbon footprint management and reporting, there is a need to identify the main elements of carbon footprint strategy that can be endorsed, supported and encouraged by facility managers. The study investigates carbon footprint elements managed and reported upon by facility manager in the UK. Drawing on a questionnaire survey of 256 facility managers in the UK, the key elements of carbon footprints identified in carbon footprint reports are examined. The findings indicate that the main elements are building energy consumption, waste disposal and water consumption. Business travel in terms of using public transport, air travel and company cars are also recognized as important targets and objectives for the carbon footprint strategy of several FM (facilities management) organizations.