5 resultados para confidentiality
em Universidade Federal do Rio Grande do Norte(UFRN)
Resumo:
Institutional violence ranges from the most widespread lack of access to the poor quality of services provided. It includes abuses committed by virtue of the unequal power between patients and professionals within institutions. The aim of this study was to analyze the perception of women with regard to this type of violence, in the services offered at a reproductive health facility belonging to the National Health System (SUS) in Natal, Brazil. Interdisciplinary perspective is important, in that it provides interaction and complementarity between various disciplines, favoring, in an integrated way, a thematic approach in research activities, teaching and extension, involving professionals, students and researchers in medicine, social services, psychology, nursing, anthropology and physical therapy. A quantitative/qualitative approach was used, involving a sample of 401 women, as part of a transversal observational study. In the qualitative stage, which consisted of participatory observation and semi-structured interviews, we used an intentional sample of 10 individuals. The data were analyzed using logistic regression techniques, correspondence analysis and categorical thematic content analysis, showing that the 2 questions that investigated directly the perception of institutional violence obtained affirmative response frequencies of 28.2% and 31.8%, respectively. In regard to data collected in a field diary related to participatory observation, the main complaints referred to the health providerpatient relation, translated into dissatisfaction with the interpersonal relationship and with the resolution of the specific demand that required care. From content analysis, we classified 4 categories: Access; Information; Health professionalpatient relation; and Respect/dignity. We identified 6 subcategories: Impossibility of choice; Repressed demand; Communication difficulty; Asymmetric interpersonal relations; Privacy/confidentiality; Disrespect. We concluded, therefore, that the data presented show that in the reproductive health care programs, there are indicators of institutional violence. However, it is difficult to approach this phenomenon, mainly because of the power relations involved in the patient-health care provider interaction, resulting from unawareness that determinate situations violate sexual and reproductive rights. This can be explained by sociostructural questions that reveal marked inequalities, ratified by issues related to violation of the rights of National Health System (SUS) patients
Resumo:
The freedom of social communication referred to those freedoms exercised under of the media. The journalism is professional activity responsible for factual information, real, pluralistic and of the public interest, directed diffusely to social orientation. The right of the information, characterized as diffuse right or of fruition by uncertain and numerous holders, is subdivided in the right of the inform, inform yourself and right to be informed. The journalists, as occupants of a enlarged spectrum concerning of right of the inform, have responsibility for the information they disseminate, devoir that puts on the basis of the constitutional right to be informed. This duty is divided with journalistic companies, when them realized. In the research, examined the existence of constitutional guarantees the right to be informed. To answer the question, realized research to support bibliographical and documentary. The guaranty is a empirical preoccupation coated with legality, since lends itself effect concretize a right. Traced so a panel of guarantees of institutional imprint, substantive and procedural. Treating of the institutional guarantees the right to information, it would refer to true institutions (as the free press) and may begin subjective rights. In the case of substantial guarantees, we would have access to information, the confidentiality of the fonts and the incensurable feature of journalistic information. A guarantee peculiar would be constitution of bodies responsible for monitoring the quality of the vehicles of communication. Trace it also a panel strict of procedural safeguards, such as public civil action, the security s warrant, and the rights of petition and answer.
Resumo:
Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system
Resumo:
Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents
Resumo:
The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.