6 resultados para confidentiality

em Aston University Research Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Focal points: Patient views on pharmacists' access to medical records was studied using a self-completion questionnaire in medical practice and two community pharmacies There was some support for pharmacist access to records with a third of the sample being unsure There was a majority support when the purpose was clearly pharmacy related A clear majority was confident of confidentiality in the pharmacy

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: This paper sets out to contribute to the advancement of knowledge, particularly with regard to the processes of implementation and the role of managers engaged in such high commitment strategies and work practices. Design/methodology/approach: This study is part of a research project investigating the extent to which employee involvement predicts job performance (as well as job satisfaction, wellbeing and organisational commitment) in the NHS, using both quantitative and qualitative methods. The main focus of this paper is to present evidence from four of the 20 case studies to show the barriers to implementing employee involvement as well as highlighting the techniques and practices that have proven to be most successful. Findings: Employee involvement is used successfully by management and has enabled frontline staff to contribute their knowledge to their work. Research limitations/implications: The ethical issues of confidentiality and anonymity permeated the research process throughout. Practical implications: The link between "high commitment" strategies and organisational performance is of great interest to academics and practitioners alike. One of these "high commitment" strategies, namely employee involvement, has been an important HR strategy for the NHS in the UK. Originality/value: Other organisations can learn from the findings by implementing the successful parts. © Emerald Group Publishing Limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an agent's critical data to a value that is meaningless to the malicious host. The effectiveness of the obfuscation algorithm is enhanced by addition of noise code. The second approach consists of a mechanism that is able to protect the integrity of the agent using state information, recorded during the agent execution process in a remote host environment, to detect a manipulation attack by a malicious host. Both approaches are implemented using a master-slave agent architecture that operates on a distributed migration pattern. Two sets of experimental test were conducted. The first set of experiments measures the migration and migration+computation overheads of the itinerary and distributed migration patterns. The second set of experiments is used to measure the security overhead of the proposed approaches. The protection of the agent is assessed by analysis of its effectiveness under known attacks. Finally, an agent-based application, known as Secure Flight Finder Agent-based System (SecureFAS) is developed, in order to prove the function of the proposed approaches.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis analyses the impact of deregulation on the theory and practice of investment decision making in the electricity sector and appraises the likely effects on its long term future inefficiency. Part I describes the market and its shortcomings in promoting an optimal generation margin and plant mix and in reducing prices through competition. A full size operational model is developed to simulate hour by hour operation of the market and analyse its features. A relationship is established between the SMP and plant mix and between the LOLP and plant margin and it is shown bow a theoretical optimum can be derived when the combined LOLP payments and the capital costs of additional generation reach a minimum. A comparison of prices against an idealised bulk supply tariff is used to show how energy prices have risen some 12% in excess of what might have occurred under the CEGB regime. This part concludes with proposals to improve the marlconfidentiality. Part 2 demonstrates that the classical approach to generation investment appraisal is no longer valid and develops a new approach. It is shown how an individual generator can predict his utilisation and income to establish the worth of investment and demonstrates the validity of the operational model proposed. An empirical relationship is developed between profit and capacity and this is used to develop the theory to illustrate how companies interact. 1bree different economic models are developed to represent different market conditions and these are tested against the actual investment decisions since deregulation to demonstrate their appropriateness. It is shown that the current market mechanisms could lead to suboptimal investment. Part 3 discusses the essential role of transmission in enabling competition and reviews worldwide practices illustrating little consensus on charging for its use. Basic costing principles are described and a new model is developed to demonstrate bow a generator may strike supply agreements either side of an interconnector to influence prices so as to maximise his income. The optimal pricing strategy for the transmitter is also derived and consumer response is simulated .The concept of transmission uplift is developed and the operational model is extended to include transmission constraints and then used to establish monthly incremental transmission constraint cost functions. It is shown how these can be used to appraise investment options and optimally plan outages. Part 4 concludes by discussing the regulatory framework and its limitations in improving efficiency or encouraging the optimum levels of investment. The principal findings of the thesis are reviewed and potential market improvement are described. This part concludes with a discussion of alternative market structures and likely future developments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Duties owed in banker customer relationships, with reference to Greenwood duty, duty to inform customers of new accounts and services, duty of confidentiality, drawing cheques on insufficient funds and restricting lender's discretion.