352 resultados para confidentiality


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To explore general practitioners' perceptions of the effects of their profession and training on their attitudes to illness in themselves and colleagues. Design: Qualitative study using focus groups and indepth interviews. Setting: Primary care in Northern Ireland. Participants: 27 general practitioners, including six recently appointed principals and six who also practised occupational medicine part time. Main outcome measures: Participants' views about their own and colleagues' health. Results: Participants were concerned about the current level of illness within the profession. They described their need to portray a healthy image to both patients and colleagues. This hindered acknowledgement of personal illness and engaging in health screening. Embarrassment in adopting the role of a patient and concerns about confidentiality also influenced their reactions to personal illness. Doctors' attitudes can impede their access to appropriate health care for themselves, their families, and their colleagues. A sense of conscience towards patients and colleagues and the working arrangements of the practice were cited as reasons for working through illness and expecting colleagues to do likewise. Conclusions: General practitioners perceive that their professional position and training adversely influence their attitudes to illness in themselves and their colleagues. Organisational changes within general practice, including revalidation, must take account of barriers experienced by general practitioners in accessing health care. Medical education and culture should strive to promote appropriate self care among doctors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Audio scrambling can be employed to ensure confidentiality in audio distribution. We first describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then focus on MP3 audio scrambling. We perform scrambling based on a set of keys which allows for a set of audio outputs having different qualities. During descrambling, the number of keys provided and the number of rounds of descrambling performed will decide the audio output quality. We also perform scrambling by using multiple keys on the MP3 audio format. With a subset of keys, we can descramble to obtain a low quality audio. However, we can obtain the original quality audio by using all of the keys. Our experiments show that the proposed algorithms are effective, fast, simple to implement while providing flexible control over the progressive quality of the audio output. The security level provided by the scheme is sufficient for protecting MP3 music content.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Postal and electronic questionnaires are widely used for data collection in epidemiological studies but non-response reduces the effective sample size and can introduce bias. Finding ways to increase response to postal and electronic questionnaires would improve the quality of health research. Objectives: To identify effective strategies to increase response to postal and electronic questionnaires. Search strategy: We searched 14 electronic databases to February 2008 and manually searched the reference lists of relevant trials and reviews, and all issues of two journals. We contacted the authors of all trials or reviews to ask about unpublished trials. Where necessary, we also contacted authors to confirm methods of allocation used and to clarify results presented. We assessed the eligibility of each trial using pre-defined criteria. Selection criteria: Randomised controlled trials of methods to increase response to postal or electronic questionnaires. Data collection and analysis: We extracted data on the trial participants, the intervention, the number randomised to intervention and comparison groups and allocation concealment. For each strategy, we estimated pooled odds ratios (OR) and 95% confidence intervals (CI) in a random-effects model. We assessed evidence for selection bias using Egger's weighted regression method and Begg's rank correlation test and funnel plot. We assessed heterogeneity among trial odds ratios using a Chi 2 test and the degree of inconsistency between trial results was quantified using the I 2 statistic. Main results: Postal We found 481 eligible trials.The trials evaluated 110 different ways of increasing response to postal questionnaires.We found substantial heterogeneity among trial results in half of the strategies. The odds of response were at least doubled using monetary incentives (odds ratio 1.87; 95% CI 1.73 to 2.04; heterogeneity P < 0.00001, I 2 = 84%), recorded delivery (1.76; 95% CI 1.43 to 2.18; P = 0.0001, I 2 = 71%), a teaser on the envelope - e.g. a comment suggesting to participants that they may benefit if they open it (3.08; 95% CI 1.27 to 7.44) and a more interesting questionnaire topic (2.00; 95% CI 1.32 to 3.04; P = 0.06, I 2 = 80%). The odds of response were substantially higher with pre-notification (1.45; 95% CI 1.29 to 1.63; P < 0.00001, I 2 = 89%), follow-up contact (1.35; 95% CI 1.18 to 1.55; P < 0.00001, I 2 = 76%), unconditional incentives (1.61; 1.36 to 1.89; P < 0.00001, I 2 = 88%), shorter questionnaires (1.64; 95%CI 1.43 to 1.87; P < 0.00001, I 2 = 91%), providing a second copy of the questionnaire at follow up (1.46; 95% CI 1.13 to 1.90; P < 0.00001, I 2 = 82%), mentioning an obligation to respond (1.61; 95% CI 1.16 to 2.22; P = 0.98, I 2 = 0%) and university sponsorship (1.32; 95% CI 1.13 to 1.54; P < 0.00001, I 2 = 83%). The odds of response were also increased with non-monetary incentives (1.15; 95% CI 1.08 to 1.22; P < 0.00001, I 2 = 79%), personalised questionnaires (1.14; 95% CI 1.07 to 1.22; P < 0.00001, I 2 = 63%), use of hand-written addresses (1.25; 95% CI 1.08 to 1.45; P = 0.32, I 2 = 14%), use of stamped return envelopes as opposed to franked return envelopes (1.24; 95% CI 1.14 to 1.35; P < 0.00001, I 2 = 69%), an assurance of confidentiality (1.33; 95% CI 1.24 to 1.42) and first class outward mailing (1.11; 95% CI 1.02 to 1.21; P = 0.78, I 2 = 0%). The odds of response were reduced when the questionnaire included questions of a sensitive nature (0.94; 95% CI 0.88 to 1.00; P = 0.51, I 2 = 0%). Electronic: We found 32 eligible trials. The trials evaluated 27 different ways of increasing response to electronic questionnaires. We found substantial heterogeneity among trial results in half of the strategies. The odds of response were increased by more than a half using non-monetary incentives (1.72; 95% CI 1.09 to 2.72; heterogeneity P < 0.00001, I 2 = 95%), shorter e-questionnaires (1.73; 1.40 to 2.13; P = 0.08, I 2 = 68%), including a statement that others had responded (1.52; 95% CI 1.36 to 1.70), and a more interesting topic (1.85; 95% CI 1.52 to 2.26). The odds of response increased by a third using a lottery with immediate notification of results (1.37; 95% CI 1.13 to 1.65), an offer of survey results (1.36; 95% CI 1.15 to 1.61), and using a white background (1.31; 95% CI 1.10 to 1.56). The odds of response were also increased with personalised e-questionnaires (1.24; 95% CI 1.17 to 1.32; P = 0.07, I 2 = 41%), using a simple header (1.23; 95% CI 1.03 to 1.48), using textual representation of response categories (1.19; 95% CI 1.05 to 1.36), and giving a deadline (1.18; 95% CI 1.03 to 1.34). The odds of response tripled when a picture was included in an e-mail (3.05; 95% CI 1.84 to 5.06; P = 0.27, I 2 = 19%). The odds of response were reduced when "Survey" was mentioned in the e-mail subject line (0.81; 95% CI 0.67 to 0.97; P = 0.33, I 2 = 0%), and when the e-mail included a male signature (0.55; 95% CI 0.38 to 0.80; P = 0.96, I 2 = 0%). Authors' conclusions: Health researchers using postal and electronic questionnaires can increase response using the strategies shown to be effective in this systematic review. Copyright © 2009 The Cochrane Collaboration. Published by John Wiley & Sons, Ltd.


--------------------------------------------------------------------------------

Reaxys Database Information|

--------------------------------------------------------------------------------

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper outlines the use of phasor measurement unit (PMU) records to validate models of fixed speed induction generator (FSIG)-based wind farms during frequency transients. Wind turbine manufacturers usually create their own proprietary models which they can supply to power system utilities for stability studies, subject to confidentiality agreements. However, it is desirable to confirm the accuracy of supplied models with measurements from the particular installation, in order to assess their validity under real field conditions. This is prudent due to possible changes in control algorithms and design retrofits, not accurately reflected or omitted in the supplied model. One important aspect of such models, especially for smaller power systems with limited inertia, is their accuracy during system frequency transients. This paper, therefore, assesses the accuracy of FSIG models with regard to frequency stability, and hence validates a subset of the model dynamics. Such models can then be used with confidence to assess wider system stability implications. The measured and simulated response of a wind farm using doubly fed induction generator (DFIG) technology is also assessed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several short-term studies have investigated the effects of a vegetable oil emulsion on subsequent food intake, although findings have been inconsistent. This work aimed to review all studies, and investigate differences in study outcomes based on methodology. All known studies were identified. Data were abstracted from published studies (n = 7). Details of unpublished studies were gained from investigators/sponsors (n = 5), or were unavailable for reasons of confidentiality (n = 4). Available data were combined using meta-analyses. A combined appetite suppressant effect of the emulsion compared with control was found for test meal intake at approximately 4, 12 and 36 h post-treatment: smallest combined mean difference (random effects model) = 0.53 MJ (95% confidence interval 0.20, 0.86), P < 0.01. However, considerable heterogeneity (variability) between study results was also found (smallest I2 = 94%, P < 0.01), questioning the predictive validity of the above findings. Meta-regression suggested this heterogeneity to be related to differences in the processed nature of the product, treatment dose and in particular year of study (smallest B = 0.54, 95% confidence interval 0.06, 1.03, P = 0.04), although again heterogeneity was found. The only consistent finding was a lack of effect on food intake 4 h post-preload in studies conducted after 2003. These results suggest a small but inconsistent appetite suppressant effect of the vegetable oil emulsion. However, due to the large heterogeneity, no definitive conclusions can be drawn.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Variation across research ethics boards (REBs) in conditions placed on access to medical records for research purposes raises concerns around negative impacts on research quality and on human subject protection, including privacy. Aim: To study variation in REB consent requirements for retrospective chart review and who may have access to the medical record for data abstraction. Methods: Thirty 90-min face-to-face interviews were conducted with REB chairs and administrators affiliated with faculties of medicine in Canadian universities, using structured questions around a case study with open-ended responses. Interviews were recorded, transcribed and coded manually. Results: Fourteen sites (47%) required individual patient consent for the study to proceed as proposed. Three (10%) indicated that their response would depend on how potentially identifying variables would be managed. Eleven sites (38%) did not require consent. Two (7%) suggested a notification and opt-out process. Most stated that consent would be required if identifiable information was being abstracted from the record. Among those not requiring consent, there was substantial variation in recognising that the abstracted information could potentially indirectly re-identify individuals. Concern over access to medical records by an outside individual was also associated with requirement for consent. Eighteen sites (60%) required full committee review. Sixteen (53%) allowed an external research assistant to abstract information from the health record. Conclusions: Large variation was found across sites in the requirement for consent for research involving access to medical records. REBs need training in best practices for protecting privacy and confidentiality in health research. A forum for REB chairs to confidentially share concerns and decisions about specific studies could also reduce variation in decisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Clinical psychologists often use qualitative methods to explore sensitive topics with vulnerable individuals, yet there has been little discussion of the specific ethical issues involved. For clinicians conducting qualitative research, there are likely to be ethical dilemmas associated with being both a researcher and a practitioner. We argue that this overarching issue frames all other ethical issues raised. This article provides an overview of the range of ethical issues that have been discussed in general in relation to qualitative research and considers the specific nature of these in relation to the discipline of clinical psychology. Such issues will be exemplified by reference to some of our own research and practice and the extant literature. We conclude with some suggestions for good practice, although our aim is to trigger debate rather than to establish prescriptive guidelines.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fieldwork that takes place in conflict or transitional regions is becoming increasingly popular amongst early-career and more seasoned researchers, but is an area that retains an air of mystery and remains an exotic form of knowledge gathering. There exists a paucity of personal reflection on the challenges associated with conducting fieldwork in conflicted or transitional regions and a limited amount of insight into the practical steps taken in advance of and when immersed in the field. Such reticence to share honest fieldwork experiences, particularly the more challenging research that takes place in conflict or transitional settings aids in creating a culture of silence. This paper attempts to counteract this silence by drawing on the challenges experienced by two early career researchers conducting fieldwork in Uganda and Palestine, focusing on the practical steps taken in advance of entering the field, and the challenges faced whilst engaged in fieldwork. Specific challenges are highlighted throughout, including: physical access to areas in conflict; engaging with reluctant research participants; the emotional impact of fieldwork on the researcher; maintaining confidentiality; researching with vulnerable victims; and ensuring appropriate knowledge exchange between researchers and participants. The paper concludes by emphasising the requirement for greater reflection on the inherently personal challenges associated with conducting fieldwork in conflicted or transitional settings and highlights the view that fieldwork is a privileged position that carries great responsibilities which must be upheld to ensure the sustainability of future research. This paper hopes to contribute to the wider debate on conducting fieldwork and the challenges associated with working in conflicted or transitional regions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While transnational antitrust enforcement is becoming only more common, the access to foreign-based evidence remains a considerable practical challenge. This article appraises considerations and concerns surrounding confidentiality, and looks into ways of their possible accommodation. It further identifies and critically evaluates the existing mechanisms allowing for inter-agency confidential information/ evidence sharing in competition law enforcement. The article outlines the shortcomings of the current framework and points to novel unilateral approaches. In the latter regard the focus is devoted to Australia, where the competition agency is empowered to share confidential information with foreign counterparts, also without any underlying bilateral agreement and on a non-reciprocal basis. This solution shows that a pragmatic and workable approach to inter-agency evidence sharing can be achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article outlines the changes to the definition of sexual offences in Northern Ireland following the implementation of the Sexual offences Northern Ireland Order 2008 in 2009, and its implications for nurses working with sexually active children in a range of clinical settings. The paper outlines the key changes for practice and addresses the needs of children in three different age groups with emphasis on children aged 13-15 years, and reviews mandatory reporting, the differences between the rights of children to consent and confidentiality, developmental sexual experimentation and sexual health promotion. It reviews related policy and guidance and makes clear the differences between sexual abuse and exploitation, and experimentation. It seeks to advise the Safeguarding Committee of the Department of Health Northern Ireland on how best to support nurses working with sexually active children and when this activity should be discussed with line managers and safeguarding specialists or referred to the safeguarding authorities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research project analysed the role and effectiveness of LIFT via a multi-method study which included semi-structured interviews with policy elites and users, as well as case studies and an exploratory analysis of the financial characteristics of three LIFT Companies. While the team felt that it was able to identify key aspects relating to the advantages and drawbacks surrounding LIFT, some aspects relating to the representativeness of the study was adversely affected by a reluctance of PCTs to participate in the case study analysis and commercial confidentiality restrictions. The study was nonetheless able to identify important issues in relation to the funding and procurement of primary care premises and services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated encryption algorithms protect both the confidentiality and integrity of messages in a single processing pass. We show how to utilize the L◦P ◦S transform of the Russian GOST R 34.11-2012 standard hash “Streebog” to build an efficient, lightweight algorithm for Authenticated Encryption with Associated Data (AEAD) via the Sponge construction. The proposed algorithm “StriBob” has attractive security properties, is faster than the Streebog hash alone, twice as fast as the GOST 28147-89 encryption algorithm, and requires only a modest amount of running-time memory. StriBob is a Round 1 candidate in the CAESAR competition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents the results from an analysis of data from service providers and young adults who were formerly in state care about how information about the sexual health of young people in state care is managed. In particular, the analysis focuses on the perceived impact of information sharing between professionals on young people. Twenty-two service providers from a range of professions including social work, nursing and psychology, and 19 young people aged 18–22 years who were formerly in state care participated in the study. A qualitative approach was employed in which participants were interviewed in depth and data were analysed using modified analytical induction (Bogdan & Biklen, 2007). Findings suggest that within the care system in which service provider participants worked it was standard practice that sensitive information about a young person’s sexual health would be shared across team members, even where there appeared to be no child protection issues. However, the accounts of the young people indicated that they experienced the sharing of information in this way as an invasion of their privacy. An unintended outcome of a high level of information sharing within teams is that the privacy of the young person in care is compromised in a way that is not likely to arise in the case of young people who are not in care. This may deter young people from availing themselves of the sexual health services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of educating the public through generic healthy eating messages has pervaded dietary health promotion efforts over the years and continues to do so through various media, despite little evidence for any enduring impact upon eating behaviour. There is growing evidence, however, that tailored interventions such as those that could be delivered online can be effective in bringing about healthy dietary behaviour change. The present paper brings together evidence from qualitative and quantitative studies that have considered the public perspective of genomics, nutrigenomics and personalised nutrition, including those conducted as part of the EU-funded Food4Me project. Such studies have consistently indicated that although the public hold positive views about nutrigenomics and personalised nutrition, they have reservations about the service providers' ability to ensure the secure handling of health data. Technological innovation has driven the concept of personalised nutrition forward and now a further technological leap is required to ensure the privacy of online service delivery systems and to protect data gathered in the process of designing personalised nutrition therapies.