295 resultados para confidentiality
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.
Resumo:
El desarrollo que está presentando el tema, hace que la información al respecto resulte algo limitada, no es mucha la literatura que hasta el momento se haya producido, especialmente en países donde la vida del Habeas Data es más corta. Por ello es que nuestra investigación resulta una herramienta
Resumo:
The Rome Statute of the International Criminal Court (ICC) is silent on the issue of national truth commissions. How the ICC might treat these bodies and the information they may hold is uncertain. The overlapping nature of the investigations likely to be carried out by the ICC and future truth-seeking bodies may, however, give rise to areas of tension, particularly where truth commissions hold confidential or self-incriminating information. This article questions whether the traditional truth-seeking powers to grant confidentiality and compel the provision of self-incriminating statements are compatible with the prosecutorial framework of the ICC. It considers how such information is likely to be dealt with by the ICC and analyses whether effective truth seeking can be carried out in the absence of such powers.
Resumo:
Recent developments in the fields of veterinary epidemiology and economics are critically reviewed and assessed. The impacts of recent technological developments in diagnosis, genetic characterisation, data processing and statistical analysis are evaluated. It is concluded that the acquisition and availability of data remains the principal constraint to the application of available techniques in veterinary epidemiology and economics, especially at population level. As more commercial producers use computerised management systems, the availability of data for analysis within herds is improving. However, consistency of recording and diagnosis remains problematic. Recent trends to the development of national livestock databases intended to provide reassurance to consumers of the safety and traceability of livestock products are potentially valuable sources of data that could lead to much more effective application of veterinary epidemiology and economics. These opportunities will be greatly enhanced if data from different sources, such as movement recording, official animal health programmes, quality assurance schemes, production recording and breed societies can be integrated. However, in order to realise such integrated databases, it will be necessary to provide absolute control of user access to guarantee data security and confidentiality. The potential applications of integrated livestock databases in analysis, modelling, decision-support, and providing management information for veterinary services and livestock producers are discussed. (c) 2004 Elsevier B.V. All rights reserved.
Resumo:
Researchers often experience difficulties with the negotiation of access into firms for the purpose of data collection. The question we explore is: What are the main obstacles associated with access negotiation into firms; and what strategies do researchers employ to increase their chances of success? Our research work on the tendering process of contractors took place between 2006 and 2008. We successfully negotiated access into four firms (two each in Ghana and the UK) to observe live examples of tender preparation The techniques we employed in negotiating access were personal contacts, contacting firms through online details and professional institutions, etc. With all of this effort, our average success rate was less than 5 per cent. The main obstacles encountered were firms’ reluctance because of commercial sensitiveness and fear that the data could eventually be divulged to their competitors or end up in the public domain. However, some firms agreed mainly because of the written assurances of confidentiality and anonymity in reporting the study; reputation of the researchers’ academic institution; gatekeepers who spoke to their colleagues on our behalf; academic purpose of the study; and a feedback report which was promised in return for access to the case studies. Although the access through personal contacts is by far the easiest, it is not always possible. Researchers can approach firms as complete strangers, especially in a foreign country, and that could make the firms more likely to assist the research.
Resumo:
Doctor-patient jokes are universally popular because of the information asymmetries within the diagnostic relationship. We contend that entrepreneurial diagnosis is present in markets where consumers are unable to diagnose their own problems and, instead, may rely on the entrepreneur to diagnose them. Entrepreneurial diagnosis is a cognitive skill possessed by the entrepreneur. It is an identifiable subset of entrepreneurial judgment and can be modeled – which we attempt to do. In order to overcome the information asymmetries and exploit opportunities, we suggest that entrepreneurs must invest in market making innovations (as distinct from product innovations) such as trustworthy reputations. The diagnostic entrepreneur described in this paper represents a creative response to difficult diagnostic problems and helps to explain the success of many firms whose products are not particularly innovative but which are perceived as offering high standards of service. These firms are trusted not only for their truthfulness about the quality of their product, but for their honesty, confidentiality and understanding in helping customers identify the most appropriate product to their needs.
Resumo:
Catastrophe risk models used by the insurance industry are likely subject to significant uncertainty, but due to their proprietary nature and strict licensing conditions they are not available for experimentation. In addition, even if such experiments were conducted, these would not be repeatable by other researchers because commercial confidentiality issues prevent the details of proprietary catastrophe model structures from being described in public domain documents. However, such experimentation is urgently required to improve decision making in both insurance and reinsurance markets. In this paper we therefore construct our own catastrophe risk model for flooding in Dublin, Ireland, in order to assess the impact of typical precipitation data uncertainty on loss predictions. As we consider only a city region rather than a whole territory and have access to detailed data and computing resources typically unavailable to industry modellers, our model is significantly more detailed than most commercial products. The model consists of four components, a stochastic rainfall module, a hydrological and hydraulic flood hazard module, a vulnerability module, and a financial loss module. Using these we undertake a series of simulations to test the impact of driving the stochastic event generator with four different rainfall data sets: ground gauge data, gauge-corrected rainfall radar, meteorological reanalysis data (European Centre for Medium-Range Weather Forecasts Reanalysis-Interim; ERA-Interim) and a satellite rainfall product (The Climate Prediction Center morphing method; CMORPH). Catastrophe models are unusual because they use the upper three components of the modelling chain to generate a large synthetic database of unobserved and severe loss-driving events for which estimated losses are calculated. We find the loss estimates to be more sensitive to uncertainties propagated from the driving precipitation data sets than to other uncertainties in the hazard and vulnerability modules, suggesting that the range of uncertainty within catastrophe model structures may be greater than commonly believed.
Resumo:
We argue that it is important for researchers and service providers to not only recognize the rights of children and young people with learning disabilities to have a ‘voice’, but also to work actively towards eliciting views from all. A set of guidelines for critical self-evaluation by those engaged in systematically collecting the views of children and young people with learning disabilities is proposed. The guidelines are based on a series of questions concerning: research aims and ethics (encompassing access/gatekeepers; consent/assent; confidentiality/anonymity/secrecy, recognition, feedback and ownership; and social responsibility) sampling, design and communication
Resumo:
Background Somali-born women constitute one of the largest groups of childbearing refugee women in Sweden after more than two decades of political violence in Somalia. In Sweden, these women encounter antenatal care that includes routine questions about violence being asked. The aim of the study was to explore how Somali-born women understand and relate to violence and wellbeing during their migration transition and their views on being approached with questions about violence in Swedish antenatal care. Method Qualitative interviews (22) with Somali-born women (17) living in Sweden were conducted and analysed using thematic analysis. Findings A balancing actbetween keeping private life private and the new welfare system was identified, where the midwife's questions about violence were met with hesitance. The midwife was, however, considered a resource for access to support services in the new society. A focus on pragmatic strategies to move on in life, rather than dwelling on potential experiences of violence and related traumas, was prominent. Social networks, spiritual faith and motherhood were crucial for regaining coherence in the aftermath of war. Dialogue and mutual adjustments were identified as strategies used to overcome power tensions in intimate relationships undergoing transition. Conclusions If confidentiality and links between violence and health are explained and clarified during the care encounter, screening for violence can be more beneficial in relation to Somali-born women. The focus on “moving on” and rationality indicates strength and access to alternative resources, but needs to be balanced against risks for hidden needs in care encounters. A care environment with continuity of care and trustful relationships enhances possibilities for the midwife to balance these dual perspectives and identify potential needs. Collaborations between Somali communities, maternity care and social service providers can contribute with support to families in transition and bridge gaps to formal social and care services.
Resumo:
In recent decades, library associations have advocated for the adoption of privacy and confidentiality policies as practical support to the Library Code of Ethics with a threefold purpose to (1) define and uphold privacy practices within the library, (2) convey privacy practices to patrons and, (3) protect against potential liability and public relations problems. The adoption of such policies has been instrumental in providing libraries with effective responses to surveillance initiatives such as warrantless requests and the USA PATRIOT ACT. Nevertheless, as reflected in recent news stories, the rapid emergence of data brokerage relationships and technologies and the increasing need for libraries to utilize third party vendor services have increased opportunities for data surveillers to access patrons’ personal information and reading habits, which are funneled and made available through multiple online library service platforms. Additionally, the advice that libraries should “contract for the same level of privacy reflected in their privacy policies” is no longer realistic given that the existence of multiple vendor contracts negotiated at arms length is likely to produce varying privacy terms and even varying definitions of what constitutes personal information (PII). These conditions sharply threaten the effectiveness and relevance of library privacy policies and privacy initiatives in that such policies increasingly offer false comfort by failing to reflect privacy weaknesses in the data sharing landscape and vendor contracts when library-vendor contracts fail to keep up with vendor data sharing capabilities. While some argue that library privacy ethics are antiquated and rendered obscure in the current online sharing economy PEW studies point to pronounced public discomfort with increasing privacy erosion. At the same time, new directions in FTC enforcement raise the possibility that public institutions’ privacy policies may serve as swords to unfair or deceptive commercial trade practices – offering the potential of renewed relevance for library privacy and confidentiality policies. This dual coin of public concern and the potential for enhanced FTC enforcement suggests that when crafting privacy polices libraries must now walk the knife’s edge by offering patrons both realistic notice about the limitations of protections the library can ensure while at the same time publicly holding vendors accountable to library privacy ethics and expectations. Potential solutions for how to walk this edge are developed and offered as a subject for further discussion to assist the modification of model policies for both public and academic libraries alike.
Resumo:
A presente dissertação tem por objetivo criar um modelo de compras de rMRO (manutenção, reparos e operações) baseado na Internet, para a Michelin no Brasil. Atualmente, a empresa Michelin está participando de uma comunidade virtual, sob a forma de um "vertal", criada pelas maiores empresas da indústria de pneu e borracha (Michelin, Goodyear, Pirelli, Continental, Cooper, Sumitomo, entre outras), e cuja intenção é desenvolver uma praça de mercado global para realização das suas compras e aprovisionamentos. A Rubbernetwork.com (RNC) foi fundada como uma empresa independente, reunindo o conjunto das compras da indústria de pneu e borracha, representando um valor de mais de cinqüenta bilhões de dólares por ano gastos em matérias-primas, equipamentos, maquinário, bens e serviços. Esta central de compras permitirá a seus membros aumentar a eficácia de suas operações e realizar economias substanciais nos custos de transação. Cada transação será protegida por apropriados sistemas advindos da implementação da tecnologia da informação, a fim de garantir a confidencialidade de todas as atividades comerciais de cada empresa individualmente. Os membros participantes estão convencidos de que a iniciativa possibilitará economias significativas e melhorará a eficiência de suas cadeias de valor. A comunidade virtual será aberta a todos os fabricantes e fornecedores relacionados à indústria de pneu e borracha, sendo também bem vindas oportunidades 2 de interação com outras comunidades virtuais, especialmente aquelas associadas à indústria automotiva. É dentro do contexto de implementação do projeto Rubbernetwork.com (RNC) que a dissertação se desenvolverá, tecendo estratégias e modelos de negócios concernentes aos processos de compras relacionados a MRO (manutenção, reparos e operações). O desenvolvimento de um "vertal" na Internet não impede que portais horizontais complementares, e não excludentes, sejam também acrescidos como alternativa de negócios. Há de se dar um tratamento específico às compras diárias que envolvem um grande número de diferentes fornecedores, várias áreas internas na empresa e consomem tempo desnecessário em trabalhos burocráticos, sem fins estratégicos. Cabe ressaltar que tal categoria de compras, denominada MRO, apesar de seu baixo valor por produto ou serviço adquirido, gera um elevado volume de transações e um alto impacto operacional. Pelo fato de tratar-se de uma experiência inovadora em setor de características próprias - mercado de pneu e borracha -, e de estar-se criando uma expectativa de cooperação entre empresas concorrentes, em busca da racionalização do processo de compras e divisão de custos operacionais, a metodologia utilizada, quanto aos seus fins, será exploratória e aplicada I. Quanto aos meios de investigação, a pesquisa realizada será: de campo, estudo de caso e bibliográfica. O universo da pesquisa restringir-se-á à empresa Michelin, onde o processo de compras de MRO baseado na Internet será contemplado, através de levantamento de dados nos E.UA e França, a fim de propor-se um modelo para a Michelin Brasil.
Resumo:
Este estudo objetivou verificar a percepção do consumidor sobre a relação entre as variáveis independentes: uso de dados secundários não autorizados, percepção de invasão de privacidade, percepção de proteção de privacidade, percepção de confidencialidade, percepção de autenticação, percepção de erro, comportamento intencional de uso e a variável dependente propensão à compra on line. Realizou-se um levantamento com aplicação de questionários em uma amostra de 451 usuários de Internet, alunos de graduação e de pós-graduação das Instituições de Ensino Superior de São Luís, Maranhão. A análise estatística englobou Análise Descritiva e Regressão Múltipla. Concluiu-se que apenas uma variável, comportamento intencional de uso, está correlacionada à variável dependente. Algumas limitações, implicações e sugestões de pesquisa futura foram analisadas neste estudo.
Resumo:
More over, the information has become the main asset of the institutions. Being thus, the Information Security (IS) is getting attention as one of the activities of extreme importance in the corporations. Guarantee the confidentiality, integrity, availability, no deny and legality becomes something very important for the day-by-day of the businesses. An analysis of the risk, passing through the assessment of the threats and vulnerabilities, is mandatory to let grow the activities of the institutions. Digital Certification came into IS to guarantee the Not Deny (ND) because it makes the unquestioned identification of the person that makes the action. Therefore, Information Security can be defined as a knowledge field focused in the protection of the information assets against: unauthorized access, improper modifications, not availability, deny of authorship and illegality.
Resumo:
Este trabalho tem por objetivo estimar um modelo empírico para relacionar os gastos em publicidade com a receita das firmas, de forma a servir como ferramenta de tomada de decisão, para isso vamos fazer um estudo de caso da indústria de telecomunicações. A Indústria de comunicação (publicidade) no Brasil, segundo dados do IBGE de 2008, é responsável por 4% do PIB, gerando receitas da ordem 115 bilhões de reais. Com 113 mil empresas que geram 711 mil empregos, ocupam 866 mil pessoas e pagam 11,8 bilhões em salários e encargos. No entanto, a maioria dos gestores de marketing declara não ter instrumentos para medir o impacto de suas ações no resultado das empresas. O modelo empírico será estimado tendo como base dados mensais dos serviços de ligações de longa distância nacional da Embratel para o período de janeiro de 2009 até dezembro de 2011. As informações quase sempre não disponíveis, só puderam ser usadas devido ao compromisso de confidencialidade. A partir de técnicas de cointegração, foi calculada a elasticidade de longo prazo da receita em relação aos gastos com publicidade e ao preço, assim com as respectivas velocidades de ajustamento aos desvios de curto prazo. Os resultados sugerem que a receita responde positivamente às variações dos gastos em publicidade, embora o percentual seja relativamente baixo, através do teorema de Dorfman-Steiner conseguimos indicar que o ponto ótimo da relação entre gastos com publicidade e a receita seria de aproximadamente 20%, respeitadas as limitações do modelo.