985 resultados para Coefficient of Information Security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The article discusses the issues of resistance; that is resistance by prisoners to the various manifestations of power operating in high security prisons, as well as that of attempted shifts in the regime from physical to psychological control. Other topics highlighted include legitimacy and 'official discourse', mourning and the construction of 'ungrievable lives' and the importance of finding a way out of the cycle of violence, which high security regimes perpetuate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Review question/objective What are the most effective information sharing strategies used to reduce anxiety in families of patients undergoing elective surgery? This review seeks to synthesize the best available evidence in relation to the most effective information-sharing intervention to reduce anxiety for families waiting for patients undergoing an elective surgical procedure. The specific objectives are to review the effectiveness of evidence of interventions designed to reduce the anxiety of families waiting whilst their loved one undergoes a surgical intervention. A variety of interventions exist and include surgical nurse liaison services, intraoperative reporting either by face-to-face or telephone delivery, informational cards, visual information screens, and intraoperative paging devices for families. Inclusion criteria Types of participants All studies of family members over 18 years of age waiting for patients undergoing an elective surgical procedure will be included, including those waiting for both adult and paediatric patients. Studies of families waiting for other patient populations, eg emergency surgery, chemotherapy or intensive care patients will be excluded. Types of intervention(s)/phenomena of interest All information-sharing Interventions for families of patients undergoing an elective surgical procedure will be included, including but not limited to: surgical nurse liaison services, in-person intraoperative reporting, visual information screens, paging devices, informational cards and telephone delivery of intraoperative progress reports. Interventions that take place during the intraoperative phase of care only will be included in the review. Preadmission information sharing interventions will be excluded. Types of outcomes The outcomes of interest include: Primary outcome: the level of anxiety amongst family members or close relatives whilst waiting for patients undergoing surgery, as measured by a validated instrument (such as the S-Anxiety portion of the State-Trait Anxiety Inventory).4 Secondary outcomes: family satisfaction and other measurements that may be considered indicators of stress and anxiety, such as mean arterial pressure (MAP) and heart rate.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Expert searchers engage with information in a variety of professional settings, as information brokers, reference librarians, information architects and faculty who teach advanced searching. As my recent research shows, the expert searcher’s information experience is defined by profound discernment of critical concepts about information, and a fluid ability to apply this knowledge to their engagement with the information environment. The information experience of the expert searcher means active and intentional participation with the processes and players that created that information environment. Expert searchers become an integral and seamless part of their information environment and also play a role in facilitating the information experiences of others. In this chapter, after discussing my understanding of the concept of information experience, I outline how I used threshold concept theory to explore the information experience of expert searchers. Through the findings, I identify four threshold concepts in the acquisition of search expertise that provide new perspectives on the information experience of the expert searcher. These new perspectives have implications for search engine design and how advanced search skills are taught. Finally, I consider how the fresh insights about the expert searcher’s experiences contribute to wider understanding about information experience.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Health Information Exchange (HIE) is an interesting phenomenon. It is a patient centric health and/or medical information management scenario enhanced by integration of Information and Communication Technologies (ICT). While health information systems are repositioning complex system directives, in the wake of the ‘big data’ paradigm, extracting quality information is challenging. It is anticipated that in this talk, ICT enabled healthcare scenarios with big data analytics will be shared. In addition, research and development regarding big data analytics, such as current trends of using these technologies for health care services and critical research challenges when extracting quality of information to improve quality of life will be discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

I develop a model of individuals’ intentions to discontinue information system use. Understanding these intentions is important because they give insights into users’ willingness to carry out system tasks, and provide a basis for maintenance decisions as well as possible replacement decisions. I offer a first conceptualization of factors determining users’ discontinuance intentions on basis of existing literature on technology use, status quo bias and dual factor concepts. The model is grounded in rational choice theory to distinguish determinants of a conscious decision between continuing or discontinuing IS use. I provide details on the empirical test of the model through a field study of IS users in a retail organization. The work will have implications for theory on information systems continuance and dual-factor logic in information system use. The empirical findings will provide suggestions for managers dealing with cessation of information systems and work routine changes in organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Whilst waiting for patients undergoing surgery, a lack of information regarding the patient’s status and the outcome of surgery, can contribute to the anxiety experienced by family members. Effective strategies for providing information to families are therefore required. Objectives To synthesize the best available evidence in relation to the most effective information-sharing interventions to reduce anxiety for families waiting for patients undergoing an elective surgical procedure. Inclusion criteria Types of participants All studies of family members over 18 years of age waiting for patients undergoing an elective surgical procedure were included, including those waiting for both adult and pediatric patients.   Types of intervention All information-sharing interventions for families of patients undergoing an elective surgical procedure were eligible for inclusion in the review. Types of studies All randomized controlled trials (RCTs) quasi-experimental studies, case-controlled and descriptive studies, comparing one information-sharing intervention to another or to usual care were eligible for inclusion in the review. Types of outcomes Primary outcome: The level of anxiety amongst family members or close relatives whilst waiting for patients undergoing surgery, as measured by a validated instrument such as the S-Anxiety portion of the State-Trait Anxiety Inventory (STAI). Secondary outcomes: Family satisfaction and other measurements that may be considered indicators of stress and anxiety, such as mean arterial pressure (MAP) and heart rate. Search strategy A comprehensive search, restricted to English language only, was undertaken of the following databases from 1990 to May 2013: Medline, CINAHL, EMBASE, ProQuest, Web of Science, PsycINFO, Scopus, Dissertation and Theses PQDT (via ProQuest), Current Contents, CENTRAL, Google Scholar, OpenGrey, Clinical Trials, Science.gov, Current Controlled Trials and National Institute for Clinical Studies (NHMRC). Methodological quality Two independent reviewers critically appraised retrieved papers for methodological quality using the standardized critical appraisal instruments for randomized controlled trials and descriptive studies from the Joanna Briggs Institute Meta Analysis of Statistics Assessment and Review Instruments (JBI-MAStARI). Data extraction Two independent reviewers extracted data from included papers using a customized data extraction form. Data synthesis Statistical pooling was not possible, mainly due to issues with data reporting in two of the studies, therefore the results are presented in narrative form. Results Three studies with a total of 357 participants were included in the review. In-person reporting to family members was found to be effective in comparison with usual care in which no reports were provided. Telephone reporting was also found to be effective at reducing anxiety, in comparison with usual care, although not as effective as in-person reporting. The use of paging devices to keep family members informed were found to increase, rather than decrease anxiety. Conclusions Due to the lack of high quality research in this area, the strength of the conclusions are limited. It appears that in-person and telephone reporting to family members decreases anxiety, however the use of paging devices increases anxiety.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Adults with primary brain tumors and their caregivers have significant information needs. This review assessed the effect of interventions to improve information provision for adult primary brain tumor patients and/or their caregivers. Methods: We included randomized or nonrandomized trials testing educational interventions that had outcomes of information provision, knowledge, understanding, recall, or satisfaction with the intervention, for adults diagnosed with primary brain tumors and/or their family or caregivers. PubMed, MEDLINE, EMBASE and Cochrane Reviews databases were searched for studies published between 1980 and June 2014. Results: Two randomized controlled, one non-randomized controlled, and 10 single group pre-post trials enrolled more than 411 participants. Five group, four practice/process change and four individual interventions assessed satisfaction (12 studies), knowledge (four studies) or information provision (2 studies). Nine studies reported high rates of satisfaction. Three studies showed statistically significant improvements over time in knowledge and two showed greater information was provided to intervention than control group participants, although statistical testing was not performed. Discussion: The trials assessed intermediate outcomes such as satisfaction, and only 4/13 reported on knowledge improvements. Few trials had a randomized controlled design and risk of bias was either evident or could not be assessed in most domains.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of seafood ecolabels is expanding in the world marketplace, but so are labels indicating other product attributes, such as country of origin and wild vs. farmed. The interactive effects of these labels and attributes in evaluating consumers' preferences for ecolabeled seafood are relatively unexplored. In this paper we investigate (1) the direct and interactive effects of seafood ecolabels with other common fish labels, and (2) how consumers' perceptions about the state of marine stocks and the valuation of ecolabels may be affected by different information. We find moderate interactive effects between ecolabels and country of origin labels, whereas the valuation for seafood ecolabels is fairly high. In terms of information, we find that consumers' perceptions about fish stock levels changed (negatively) after receiving information on declining stock levels, and more sensationalized information led to increased change. However, valuation for a seafood ecolabel increases only when the information was perceived positively (credible/interesting); whereas exaggerated information (which was also perceived less credible) had insignificant effects on WTP.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hardware ventures are emerging entrepreneurial firms that create new market offerings based on development of digital devices. These ventures are important elements in the global economy but have not yet received much attention in the literature. Our interest in examining hardware ventures is specifically in the role that information system (IS) resources play in enabling them. We ask how the role of IS resources for hardware ventures can be conceptualized and develop a framework for assessment. Our framework builds on the distinction of operand and operant resources and distinguishes between two key lifecycle stages of hardware ventures: start-up and growth. We show how this framework can be used to discuss the role, nature, and use of IS for hardware ventures and outline empirical research strategies that flow from it. Our work contributes to broadening and enriching the IS field by drawing attention to its role in significant and novel phenomena.