839 resultados para 280505 Data Security
Resumo:
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance
Resumo:
The concept of big data has already outperformed traditional data management efforts in almost all industries. Other instances it has succeeded in obtaining promising results that provide value from large-scale integration and analysis of heterogeneous data sources for example Genomic and proteomic information. Big data analytics have become increasingly important in describing the data sets and analytical techniques in software applications that are so large and complex due to its significant advantages including better business decisions, cost reduction and delivery of new product and services [1]. In a similar context, the health community has experienced not only more complex and large data content, but also information systems that contain a large number of data sources with interrelated and interconnected data attributes. That have resulted in challenging, and highly dynamic environments leading to creation of big data with its enumerate complexities, for instant sharing of information with the expected security requirements of stakeholders. When comparing big data analysis with other sectors, the health sector is still in its early stages. Key challenges include accommodating the volume, velocity and variety of healthcare data with the current deluge of exponential growth. Given the complexity of big data, it is understood that while data storage and accessibility are technically manageable, the implementation of Information Accountability measures to healthcare big data might be a practical solution in support of information security, privacy and traceability measures. Transparency is one important measure that can demonstrate integrity which is a vital factor in the healthcare service. Clarity about performance expectations is considered to be another Information Accountability measure which is necessary to avoid data ambiguity and controversy about interpretation and finally, liability [2]. According to current studies [3] Electronic Health Records (EHR) are key information resources for big data analysis and is also composed of varied co-created values [3]. Common healthcare information originates from and is used by different actors and groups that facilitate understanding of the relationship for other data sources. Consequently, healthcare services often serve as an integrated service bundle. Although a critical requirement in healthcare services and analytics, it is difficult to find a comprehensive set of guidelines to adopt EHR to fulfil the big data analysis requirements. Therefore as a remedy, this research work focus on a systematic approach containing comprehensive guidelines with the accurate data that must be provided to apply and evaluate big data analysis until the necessary decision making requirements are fulfilled to improve quality of healthcare services. Hence, we believe that this approach would subsequently improve quality of life.
Resumo:
With the ever increasing amount of eHealth data available from various eHealth systems and sources, Health Big Data Analytics promises enticing benefits such as enabling the discovery of new treatment options and improved decision making. However, concerns over the privacy of information have hindered the aggregation of this information. To address these concerns, we propose the use of Information Accountability protocols to provide patients with the ability to decide how and when their data can be shared and aggregated for use in big data research. In this paper, we discuss the issues surrounding Health Big Data Analytics and propose a consent-based model to address privacy concerns to aid in achieving the promised benefits of Big Data in eHealth.
Resumo:
Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. In this paper, we take a step closer to the adoption of the Information Accountability protocols and demonstrate their functionality through an implementation in FluxMED, a customisable EHR system.
Resumo:
[Excerpt] This second issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of Asia and the Pacific. The combined findings of this series, which also includes volumes on Europe, Africa, and the Americas, are published at 6-month intervals over a 2-year period. Each volume highlights features of social security programs in the particular region. This guide serves as an overview of programs in all regions. A few political jurisdictions have been excluded because they have no social security system or have issued no information regarding their social security legislation. In the absence of recent information, national programs reported in previous volumes may also be excluded. In this volume on Asia and the Pacific, the data reported are based on laws and regulations in force in July 2006 or on the last date for which information has been received.1 Information for each country on types of social security programs, types of mandatory systems for retirement income, contribution rates, and demographic and other statistics related to social security is shown in Tables 14 at the end of the guide. The country summaries show each system's major features. Separate programs in the public sector and specialized funds for such groups as agricultural workers, collective farmers, or the self-employed have not been described in any detail. Benefit arrangements of private employers or individuals are not described in any detail, even though such arrangements may be mandatory in some countries or available as alternatives to statutory programs. The country summaries also do not refer to international social security agreements that may be in force between two or more countries. Those agreements may modify coverage, contributions, and benefit provisions of national laws summarized in the country write-ups. Since the summary format requires brevity, technical terms have been developed that are concise as well as comparable and are applied to all programs. The terminology may therefore differ from national concepts or usage.
Resumo:
To evaluate the underreporting rate of death -cause data in Shandong province during 2012 to 2013 by capture -mark -recapture method and to provide the base for health strategy. Methods All counties were divided into 5 stratifications according the death rates of 2012, and 14 counties were selected, then 3 towns or streets were selected in each country, 10 villages or neighborhood committees were selected in each town (street). The death data collected from security bureau and civil affairs bureau were compared with the reporting death data from the National Cause of Death Surveillance, and the underreporting rate was calculated. Results In present study, 6 929 death cases were collected, it was found that 1 556 cases were underreported. The death cases estimated by CMR method were 6 227 cases (95%CI: 7 593-7 651), and the average underreporting rate was 23.15%. There were significantly differences between different stratifications (P<0.01). The underreporting rate in 0-4 years old group was 56.93%, the male underreporting rate was 22.31% and the female underreporting rate was 24.09%. There was no significant difference between male and female groups (P>0.05). Conclusion There is an obvious underreport in the cause of death surveillance of Shandong province, and the underreporting rates are different among the 5 stratifications. The underreporting rate is higher in 0-4 years old group, and the investigation of the death cause surveillance for young residents is not perfect in some countries. The investigation quality of the death cause surveillance should be improved, increasing the integrity of the report data and adjusting the mortalities in different stratifications for obtaining a accurate mortality in Shandong province.
Resumo:
Network data packet capture and replay capabilities are basic requirements for forensic analysis of faults and security-related anomalies, as well as for testing and development. Cyber-physical networks, in which data packets are used to monitor and control physical devices, must operate within strict timing constraints, in order to match the hardware devices' characteristics. Standard network monitoring tools are unsuitable for such systems because they cannot guarantee to capture all data packets, may introduce their own traffic into the network, and cannot reliably reproduce the original timing of data packets. Here we present a high-speed network forensics tool specifically designed for capturing and replaying data traffic in Supervisory Control and Data Acquisition systems. Unlike general-purpose "packet capture" tools it does not affect the observed network's data traffic and guarantees that the original packet ordering is preserved. Most importantly, it allows replay of network traffic precisely matching its original timing. The tool was implemented by developing novel user interface and back-end software for a special-purpose network interface card. Experimental results show a clear improvement in data capture and replay capabilities over standard network monitoring methods and general-purpose forensics solutions.
Resumo:
This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.
Resumo:
Dispersing a data object into a set of data shares is an elemental stage in distributed communication and storage systems. In comparison to data replication, data dispersal with redundancy saves space and bandwidth. Moreover, dispersing a data object to distinct communication links or storage sites limits adversarial access to whole data and tolerates loss of a part of data shares. Existing data dispersal schemes have been proposed mostly based on various mathematical transformations on the data which induce high computation overhead. This paper presents a novel data dispersal scheme where each part of a data object is replicated, without encoding, into a subset of data shares according to combinatorial design theory. Particularly, data parts are mapped to points and data shares are mapped to lines of a projective plane. Data parts are then distributed to data shares using the point and line incidence relations in the plane so that certain subsets of data shares collectively possess all data parts. The presented scheme incorporates combinatorial design theory with inseparability transformation to achieve secure data dispersal at reduced computation, communication and storage costs. Rigorous formal analysis and experimental study demonstrate significant cost-benefits of the presented scheme in comparison to existing methods.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
This workshop is jointly organized by EFMI Working Groups Security, Safety and Ethics and Personal Portable Devices in cooperation with IMIA Working Group "Security in Health Information Systems". In contemporary healthcare and personal health management the collection and use of personal health information takes place in different contexts and jurisdictions. Global use of health data is also expanding. The approach taken by different experts, health service providers, data subjects and secondary users in understanding privacy and the privacy expectations others may have is strongly context dependent. To make eHealth, global healthcare, mHealth and personal health management successful and to enable fair secondary use of personal health data, it is necessary to find a practical and functional balance between privacy expectations of stakeholder groups. The workshop will highlight these privacy concerns by presenting different cases and approaches. Workshop participants will analyse stakeholder privacy expectations that take place in different real-life contexts such as portable health devices and personal health records, and develop a mechanism to balance them in such a way that global protection of health data and its meaningful use is realized simultaneously. Based on the results of the workshop, initial requirements for a global healthcare information certification framework will be developed.
Resumo:
The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single destination multi-hop networks with eavesdroppers for two cases: when eavesdropper locations and channel gains are known and when their positions are unknown. We propose a two-phase solution which consists of finding activation sets and then obtaining transmit powers subject to SINR constraints for the case when eavesdropper locations are known. We introduce methods to find activation sets and compare their performance. Necessary but reasonable approximations are made in power minimization formulations for tractability reasons. For scenarios with no eavesdropper location information, we suggest vulnerability region (the area having zero secrecy rate) minimization over the network. Our results show that in the absence of location information average number of eavesdroppers who have access to data is reduced.
Resumo:
The World Food Summit in its meeting in Rome in 1999 estimated that 790 million people in the developing world do not have enough food to eat. This is more than the total populations of North America and Europe combined. Nigeria is one of the developing countries affected by hunger, deprivation and abject poverty by its citizenry inspite of its enormous natural and human resources. To reduce poverty and increase food supplies to the masses the Federal Government of Nigeria embarked on a programmed-tagged National Special Programme for Food Security (NSPFS) in the year 2002. The programme's broad objectives are to attain food security in the broadest sense and alleviate rural poverty in Nigeria. One of the areas of the programme's intervention is in the aquaculture and inland fisheries development because Nigeria imported 681mt of fish in 2003 with a total cost of about N50 million. The paper assesses the socio-economic conditions of one of the selected water bodies (Yamama Lake) with a view to introducing community-based fisheries management plan for the rational exploitation and management of the fishery and other aquatic resources of the water body thereby increasing fish supply and improving the living standard of the fisherfolk in the area. Data were collected using Participatory Rural Appraisal (PRA) tools and questionnaire administration
Resumo:
Women, all over the world have contributed in various ways to the social, political and economic development of the Society. In fact, the World Resource Institute recognizes that "women have profound and preserve effect onn the well-being of their families, communities and local ecosystems" (Gamble and Well 1997:211). Women constitute more than 50 percent of the Agricultural (Fisheries being a sub sector), labour force. A study on Women in Fisheries showed that they participate in all aspects of the sector (capture, culture, processing, marketing research, training and Extension services). This paper reports the result of the study on women's contributions in the development of the Fisheries Industry particularly their roles in Fish Food Security, Poverty Alleviation and high rates of women's adoption of Fisheries technologies. The Case-study research methodology is used to study the "How" and "Why" Women's Contribution in Fish Food Security and Poverty Alleviation is at the index level recorded for the gender. The study made use of "Case Study" Research Instrument; documents, interview, artefacts, direct observation and archival records. The sampling techniques were purposive for research audiences and simple random for fisher-folks in the chosen locations. Analysed data showed among others that in Fisheries Research women occupy very important positions as Heads of Division/Section, Fisheries Liasion/Extension Officers and Fisheries Laboratory Chiefs etc. The paper also gave results of women production, processing, marketing and other services statistics; it also discusses the "whys" of women's low capacity in fisheries development of the nation and finally suggested ways in improving women's optimal capacity utilization in fisheries development
Resumo:
The notions about women been limited to producing children like rates alone; cooking for the family, restricted within the fenced compound without any meaningful contributions in fish food production was dispelled during the course of the study. From the data gathered, the study revealed various contributions of women as regard fish food production as about 2% of the women are involved in direct fishing as this enhance food security of the family and the society. Also women dominate the entire post harvest and marketing sector and 70% started fishing business with their personal savings.Also, some of the women own boats and other fishing inputs, which they do give to the fishermen that could catch the fish and sell it to them. This has a way of enhancing fish catch and fish food security of the people as those men that would have sit idle for lack of fishing gears are now meaningfully engaged courtesy of the women financiers. Finally, the study also revealed that 46% of the women between N2,5000 to above N4,000 from marketing of fish, and also utilizenthe income generated to enhance the welfare of the households in the area of food, clothing and paying their children school fees hence reducing the level of poverty of their households