352 resultados para confidentiality


Relevância:

10.00% 10.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El desarrollo que está presentando el tema, hace que la información al respecto resulte algo limitada, no es mucha la literatura que hasta el momento se haya producido, especialmente en países donde la vida del Habeas Data es más corta. Por ello es que nuestra investigación resulta una herramienta

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Rome Statute of the International Criminal Court (ICC) is silent on the issue of national truth commissions. How the ICC might treat these bodies and the information they may hold is uncertain. The overlapping nature of the investigations likely to be carried out by the ICC and future truth-seeking bodies may, however, give rise to areas of tension, particularly where truth commissions hold confidential or self-incriminating information. This article questions whether the traditional truth-seeking powers to grant confidentiality and compel the provision of self-incriminating statements are compatible with the prosecutorial framework of the ICC. It considers how such information is likely to be dealt with by the ICC and analyses whether effective truth seeking can be carried out in the absence of such powers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent developments in the fields of veterinary epidemiology and economics are critically reviewed and assessed. The impacts of recent technological developments in diagnosis, genetic characterisation, data processing and statistical analysis are evaluated. It is concluded that the acquisition and availability of data remains the principal constraint to the application of available techniques in veterinary epidemiology and economics, especially at population level. As more commercial producers use computerised management systems, the availability of data for analysis within herds is improving. However, consistency of recording and diagnosis remains problematic. Recent trends to the development of national livestock databases intended to provide reassurance to consumers of the safety and traceability of livestock products are potentially valuable sources of data that could lead to much more effective application of veterinary epidemiology and economics. These opportunities will be greatly enhanced if data from different sources, such as movement recording, official animal health programmes, quality assurance schemes, production recording and breed societies can be integrated. However, in order to realise such integrated databases, it will be necessary to provide absolute control of user access to guarantee data security and confidentiality. The potential applications of integrated livestock databases in analysis, modelling, decision-support, and providing management information for veterinary services and livestock producers are discussed. (c) 2004 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Researchers often experience difficulties with the negotiation of access into firms for the purpose of data collection. The question we explore is: What are the main obstacles associated with access negotiation into firms; and what strategies do researchers employ to increase their chances of success? Our research work on the tendering process of contractors took place between 2006 and 2008. We successfully negotiated access into four firms (two each in Ghana and the UK) to observe live examples of tender preparation The techniques we employed in negotiating access were personal contacts, contacting firms through online details and professional institutions, etc. With all of this effort, our average success rate was less than 5 per cent. The main obstacles encountered were firms’ reluctance because of commercial sensitiveness and fear that the data could eventually be divulged to their competitors or end up in the public domain. However, some firms agreed mainly because of the written assurances of confidentiality and anonymity in reporting the study; reputation of the researchers’ academic institution; gatekeepers who spoke to their colleagues on our behalf; academic purpose of the study; and a feedback report which was promised in return for access to the case studies. Although the access through personal contacts is by far the easiest, it is not always possible. Researchers can approach firms as complete strangers, especially in a foreign country, and that could make the firms more likely to assist the research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Doctor-patient jokes are universally popular because of the information asymmetries within the diagnostic relationship. We contend that entrepreneurial diagnosis is present in markets where consumers are unable to diagnose their own problems and, instead, may rely on the entrepreneur to diagnose them. Entrepreneurial diagnosis is a cognitive skill possessed by the entrepreneur. It is an identifiable subset of entrepreneurial judgment and can be modeled – which we attempt to do. In order to overcome the information asymmetries and exploit opportunities, we suggest that entrepreneurs must invest in market making innovations (as distinct from product innovations) such as trustworthy reputations. The diagnostic entrepreneur described in this paper represents a creative response to difficult diagnostic problems and helps to explain the success of many firms whose products are not particularly innovative but which are perceived as offering high standards of service. These firms are trusted not only for their truthfulness about the quality of their product, but for their honesty, confidentiality and understanding in helping customers identify the most appropriate product to their needs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Catastrophe risk models used by the insurance industry are likely subject to significant uncertainty, but due to their proprietary nature and strict licensing conditions they are not available for experimentation. In addition, even if such experiments were conducted, these would not be repeatable by other researchers because commercial confidentiality issues prevent the details of proprietary catastrophe model structures from being described in public domain documents. However, such experimentation is urgently required to improve decision making in both insurance and reinsurance markets. In this paper we therefore construct our own catastrophe risk model for flooding in Dublin, Ireland, in order to assess the impact of typical precipitation data uncertainty on loss predictions. As we consider only a city region rather than a whole territory and have access to detailed data and computing resources typically unavailable to industry modellers, our model is significantly more detailed than most commercial products. The model consists of four components, a stochastic rainfall module, a hydrological and hydraulic flood hazard module, a vulnerability module, and a financial loss module. Using these we undertake a series of simulations to test the impact of driving the stochastic event generator with four different rainfall data sets: ground gauge data, gauge-corrected rainfall radar, meteorological reanalysis data (European Centre for Medium-Range Weather Forecasts Reanalysis-Interim; ERA-Interim) and a satellite rainfall product (The Climate Prediction Center morphing method; CMORPH). Catastrophe models are unusual because they use the upper three components of the modelling chain to generate a large synthetic database of unobserved and severe loss-driving events for which estimated losses are calculated. We find the loss estimates to be more sensitive to uncertainties propagated from the driving precipitation data sets than to other uncertainties in the hazard and vulnerability modules, suggesting that the range of uncertainty within catastrophe model structures may be greater than commonly believed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We argue that it is important for researchers and service providers to not only recognize the rights of children and young people with learning disabilities to have a ‘voice’, but also to work actively towards eliciting views from all. A set of guidelines for critical self-evaluation by those engaged in systematically collecting the views of children and young people with learning disabilities is proposed. The guidelines are based on a series of questions concerning: research aims and ethics (encompassing access/gatekeepers; consent/assent; confidentiality/anonymity/secrecy, recognition, feedback and ownership; and social responsibility) sampling, design and communication

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Somali-born women constitute one of the largest groups of childbearing refugee women in Sweden after more than two decades of political violence in Somalia. In Sweden, these women encounter antenatal care that includes routine questions about violence being asked. The aim of the study was to explore how Somali-born women understand and relate to violence and wellbeing during their migration transition and their views on being approached with questions about violence in Swedish antenatal care. Method Qualitative interviews (22) with Somali-born women (17) living in Sweden were conducted and analysed using thematic analysis. Findings A balancing actbetween keeping private life private and the new welfare system was identified, where the midwife's questions about violence were met with hesitance. The midwife was, however, considered a resource for access to support services in the new society. A focus on pragmatic strategies to move on in life, rather than dwelling on potential experiences of violence and related traumas, was prominent. Social networks, spiritual faith and motherhood were crucial for regaining coherence in the aftermath of war. Dialogue and mutual adjustments were identified as strategies used to overcome power tensions in intimate relationships undergoing transition. Conclusions If confidentiality and links between violence and health are explained and clarified during the care encounter, screening for violence can be more beneficial in relation to Somali-born women. The focus on “moving on” and rationality indicates strength and access to alternative resources, but needs to be balanced against risks for hidden needs in care encounters. A care environment with continuity of care and trustful relationships enhances possibilities for the midwife to balance these dual perspectives and identify potential needs. Collaborations between Somali communities, maternity care and social service providers can contribute with support to families in transition and bridge gaps to formal social and care services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ethical constraints applying to lawyers are largely found in formal restrictions in legislation - ethical duties arise as a result of a lawyer's service to the public - business ethics - corporatisation and the push for Multi-Disciplinary Practices (MDPs) - duty of confidentiality - avoiding conflicts of interest - the advent of MDP will add further pressures to lawyers juggling competing interests.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The article examines the background, aims and scope of recent legislation enacted in New South Wales, Victoria and South Australia to protect from disclosure in court of "confidential communications" generated in the context of counselling persons who allege that they were victims of sexual offences. In drafting the "confidential communications" legislation, the legislators undertook a difficult task of balancing the public interest in therapeutic confidentiality that would encourage victims of sexual assaults to report these offences and seek psychological and psychiatric care on the one hand, and the public interest in fairness of the trial, which may be prejudiced by exclusion of evidence pertinent to the forensic process on the other. In South Australia this task was fulfilled with greater success than in New South Wales and Victoria.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background : Optimising the use of electronic data offers many opportunities to health services, particularly in rural and remote areas. These include reducing the effect of distance on access to clinical information and sharing information where there are multiple service providers for a single patient. The increasing compilation of large electronic databases of patient information and the ease with which electronic information can be transferred has raised concerns about the privacy and confidentiality of such records.
Aims & rationale/Objectives : This review aims to identify legal and ethical standards for areas of electronic governance where a lack of clarity may currently impede innovation in health service delivery.
Methods : This paper describes best practices for storage and transfer of electronic patient data based on an examination of Australian legislative requirements and a review of a number of current models. This will firstly allow us to identify basic legal requirements of electronic governance as well as areas of ambiguity not fully addressed by legislation. An examination of current models will suggest recommendations for best practice in areas lacking sufficient legal guidance.
Principal findings : We have identified the following four areas of importance, and shall discuss relevant details:
1) Patients' right of ownership to electronic patient records. 2) Custodial issues with data stored in centralised health care institutions 3) IT Security, including hierarchical level access, data encryption, data transfer standards and physical security 4) Software applications usage.
Discussion : Our examination of several models of best practice for the transfer of electronic patient data, both in Australia and internationally, identifies and clarifies many unresolved issues of electronic governance. This paper will also inform future policy in this area.
Implications : Clarification will facilitate the future development of beneficial technology-based innovations by rural health services.
Presentation type : Poster

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reports a study by the Centre for the Study of Economic Crime at Rand Afrikaans University into the characteristics of money laundering schemes in South Africa; these were discussed at a workshop on December 5 2001. Outlines the 1998 Proceeds of Crime Act (POCA), the 1992 Drugs and Drug Trafficking Act and their general money laundering provisions, including negligence and intent, defence and penalties; also the racketeering provisions of POCA. Moves on to the reporting of suspicious transactions, where the POCA provisions will be repealed by the new Financial Intelligence Centre Act (FICA); this covers general obligations, secrecy and confidentiality, penalties, preventing tipping-off, and reporting statistics. Gives examples of the schemes themselves, which fall into broad themes: purchase of goods and properties, abuse of businesses and financial institutions, cash and currency, and the informal sector; case studies include S v Dustigar, Motsepe v Commissioner of Inland Revenue, S v Van Zyl, S v Caswell, and Director of Public Prosecutions: Cape of Good Hope v Bathgate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australia is a country, similar to other developed nations, confronting an ageing population with complex demographics. Ensuring continued healthcare for the ageing, while providing sufficient support for the already aged population requiring assistance, is at the forefront of the national agenda. Varied initiatives are with foci to leverage the advantages of lCTs leading to e-Health provisioning and assisted technologies. While these initiatives increasingly put budgetary constraints on local and federal governments, there is also a case for offshore resourcing of non-critical health services, to support, streamline and enhance the continuum of care, as the nation faces acute shortages of medical practitioners and nurses. However, privacy and confidentiality concerns in this context are a significant issue in Australia. In this paper, we take the position that if the National and state electronic health records system initiatives, are fully implemented, offshore resourcing can be a feasible complementary option resulting in a win-win situation of cutting costs and enabling the continuum of healthcare.