997 resultados para Secret Sharing Schemes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Whilst waiting for patients undergoing surgery, a lack of information regarding the patient’s status and the outcome of surgery, can contribute to the anxiety experienced by family members. Effective strategies for providing information to families are therefore required. Objectives To synthesize the best available evidence in relation to the most effective information-sharing interventions to reduce anxiety for families waiting for patients undergoing an elective surgical procedure. Inclusion criteria Types of participants All studies of family members over 18 years of age waiting for patients undergoing an elective surgical procedure were included, including those waiting for both adult and pediatric patients.   Types of intervention All information-sharing interventions for families of patients undergoing an elective surgical procedure were eligible for inclusion in the review. Types of studies All randomized controlled trials (RCTs) quasi-experimental studies, case-controlled and descriptive studies, comparing one information-sharing intervention to another or to usual care were eligible for inclusion in the review. Types of outcomes Primary outcome: The level of anxiety amongst family members or close relatives whilst waiting for patients undergoing surgery, as measured by a validated instrument such as the S-Anxiety portion of the State-Trait Anxiety Inventory (STAI). Secondary outcomes: Family satisfaction and other measurements that may be considered indicators of stress and anxiety, such as mean arterial pressure (MAP) and heart rate. Search strategy A comprehensive search, restricted to English language only, was undertaken of the following databases from 1990 to May 2013: Medline, CINAHL, EMBASE, ProQuest, Web of Science, PsycINFO, Scopus, Dissertation and Theses PQDT (via ProQuest), Current Contents, CENTRAL, Google Scholar, OpenGrey, Clinical Trials, Science.gov, Current Controlled Trials and National Institute for Clinical Studies (NHMRC). Methodological quality Two independent reviewers critically appraised retrieved papers for methodological quality using the standardized critical appraisal instruments for randomized controlled trials and descriptive studies from the Joanna Briggs Institute Meta Analysis of Statistics Assessment and Review Instruments (JBI-MAStARI). Data extraction Two independent reviewers extracted data from included papers using a customized data extraction form. Data synthesis Statistical pooling was not possible, mainly due to issues with data reporting in two of the studies, therefore the results are presented in narrative form. Results Three studies with a total of 357 participants were included in the review. In-person reporting to family members was found to be effective in comparison with usual care in which no reports were provided. Telephone reporting was also found to be effective at reducing anxiety, in comparison with usual care, although not as effective as in-person reporting. The use of paging devices to keep family members informed were found to increase, rather than decrease anxiety. Conclusions Due to the lack of high quality research in this area, the strength of the conclusions are limited. It appears that in-person and telephone reporting to family members decreases anxiety, however the use of paging devices increases anxiety.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a class of unconditionally stable difference schemes based on the Pad´e approximation is presented for the Riesz space-fractional telegraph equation. Firstly, we introduce a new variable to transform the original dfferential equation to an equivalent differential equation system. Then, we apply a second order fractional central difference scheme to discretise the Riesz space-fractional operator. Finally, we use (1, 1), (2, 2) and (3, 3) Pad´e approximations to give a fully discrete difference scheme for the resulting linear system of ordinary differential equations. Matrix analysis is used to show the unconditional stability of the proposed algorithms. Two examples with known exact solutions are chosen to assess the proposed difference schemes. Numerical results demonstrate that these schemes provide accurate and efficient methods for solving a space-fractional hyperbolic equation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Historically, the paper hand-held record (PHR) has been used for sharing information between hospital clinicians, general practitioners and pregnant women in a maternity shared-care environment. Recently in alignment with a National e-health agenda, an electronic health record (EHR) was introduced at an Australian tertiary maternity service to replace the PHR for collection and transfer of data. The aim of this study was to examine and compare the completeness of clinical data collected in a PHR and an EHR. Methods We undertook a comparative cohort design study to determine differences in completeness between data collected from maternity records in two phases. Phase 1 data were collected from the PHR and Phase 2 data from the EHR. Records were compared for completeness of best practice variables collected The primary outcome was the presence of best practice variables and the secondary outcomes were the differences in individual variables between the records. Results Ninety-four percent of paper medical charts were available in Phase 1 and 100% of records from an obstetric database in Phase 2. No PHR or EHR had a complete dataset of best practice variables. The variables with significant improvement in completeness of data documented in the EHR, compared with the PHR, were urine culture, glucose tolerance test, nuchal screening, morphology scans, folic acid advice, tobacco smoking, illicit drug assessment and domestic violence assessment (p = 0.001). Additionally the documentation of immunisations (pertussis, hepatitis B, varicella, fluvax) were markedly improved in the EHR (p = 0.001). The variables of blood pressure, proteinuria, blood group, antibody, rubella and syphilis status, showed no significant differences in completeness of recording. Conclusion This is the first paper to report on the comparison of clinical data collected on a PHR and EHR in a maternity shared-care setting. The use of an EHR demonstrated significant improvements to the collection of best practice variables. Additionally, the data in an EHR were more available to relevant clinical staff with the appropriate log-in and more easily retrieved than from the PHR. This study contributes to an under-researched area of determining data quality collected in patient records.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret Millionaires Club is an animated series of 26 webisodes featuring Warren Buffett (CEO and largest shareholder of Berkshire Hathaway) as a secret mentor to a group of kids who learn practical life lessons during fun-filled adventures in business.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and integrity checks change and the target address will not be computed correctly. In this paper, we present an attack based on tracking stack pointer modifications to break the scheme and provide implementation details. The key element of the attack is to remove the fingerprint and integrity check generating code from the program after disassociating the target address from the fingerprint and integrity value. Using the debugging tools that give vast control to the attacker to track stack pointer operations, we perform both subtractive and watermark replacement attacks. The major steps in the attack are automated resulting in a fast and low-cost attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rise of the peer economy poses complex new regulatory challenges for policy-makers. The peer economy, typified by services like Uber and AirBnB, promises substantial productivity gains through the more efficient use of existing resources and a marked reduction in regulatory overheads. These services are rapidly disrupting existing established markets, but the regulatory trade-offs they present are difficult to evaluate. In this paper, we examine the peer economy through the context of ride-sharing and the ongoing struggle over regulatory legitimacy between the taxi industry and new entrants Uber and Lyft. We first sketch the outlines of ride-sharing as a complex regulatory problem, showing how questions of efficiency are necessarily bound up in questions about levels of service, controls over pricing, and different approaches to setting, upholding, and enforcing standards. We outline the need for data-driven policy to understand the way that algorithmic systems work and what effects these might have in the medium to long term on measures of service quality, safety, labour relations, and equality. Finally, we discuss how the competition for legitimacy is not primarily being fought on utilitarian grounds, but is instead carried out within the context of a heated ideological battle between different conceptions of the role of the state and private firms as regulators. We ultimately argue that the key to understanding these regulatory challenges is to develop better conceptual models of the governance of complex systems by private actors and the available methods the state has of influencing their actions. These struggles are not, as is often thought, struggles between regulated and unregulated systems. The key to understanding these regulatory challenges is to better understand the important regulatory work carried out by powerful, centralised private firms – both the incumbents of existing markets and the disruptive network operators in the peer-economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The only effective and scalable way to regulate the actions of people on the internet is through online intermediaries. These are the institutions that facilitate communication: internet service providers, search engines, content hosts, and social networks. Governments, private firms, and civil society organisations are increasingly seeking to influence these intermediaries to take more responsibility to prevent or respond to IP infringements. Around the world, intermediaries are increasingly subject to a variety of obligations to help enforce IP rights, ranging from informal social and governmental pressure, to industry codes and private negotiated agreements, to formal legislative schemes. This paper provides an overview of this emerging shift in regulatory approaches, away from legal liability and towards increased responsibilities for intermediaries. This shift straddles two different potential futures: an optimistic set of more effective, more efficient mechanisms for regulating user behaviour, and a dystopian vision of rule by algorithm and private power, without the legitimising influence of the rule of law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rise of the peer economy poses complex new regulatory challenges for policy-makers. The peer economy, typified by services like Uber and AirBnB, promises substantial productivity gains through the more efficient use of existing resources and a marked reduction in regulatory overheads. These services are rapidly disrupting existing established markets, but the regulatory trade-offs they present are difficult to evaluate. In this paper, we examine the peer economy through the context of ride-sharing and the ongoing struggle over regulatory legitimacy between the taxi industry and new entrants Uber and Lyft. We first sketch the outlines of ride-sharing as a complex regulatory problem, showing how questions of efficiency are necessarily bound up in questions about levels of service, controls over pricing, and different approaches to setting, upholding, and enforcing standards. We outline the need for data-driven policy to understand the way that algorithmic systems work and what effects these might have in the medium to long term on measures of service quality, safety, labour relations, and equality. Finally, we discuss how the competition for legitimacy is not primarily being fought on utilitarian grounds, but is instead carried out within the context of a heated ideological battle between different conceptions of the role of the state and private firms as regulators. We ultimately argue that the key to understanding these regulatory challenges is to develop better conceptual models of the governance of complex systems by private actors and the available methods the state has of influencing their actions. These struggles are not, as is often thought, struggles between regulated and unregulated systems. The key to understanding these regulatory challenges is to better understand the important regulatory work carried out by powerful, centralised private firms – both the incumbents of existing markets and the disruptive network operators in the peer-economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his visit to the G20 in Brisbane, President Barack Obama sought to promote his ambitious Pacific Rim trade agreement — the Trans-Pacific Partnership (TPP). He told an audience at the University of Queensland: We’ll keep leading the effort to realize the Trans-Pacific Partnership to lower barriers, open markets, export goods, and create good jobs for our people. But with the 12 countries of the TPP making up nearly 40 percent of the global economy, this is also about something bigger. It is our chance to put in place new, high standards for trade in the 21st century that uphold our values. So, for example, we are pushing new standards in this trade agreement, requiring countries that participate to protect their workers better and to protect the environment better, and protect intellectual property that unleashes innovation, and baseline standards to ensure transparency and rule of law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines a series of controversies within the life sciences over data sharing. Part 1 focuses upon the agricultural biotechnology firm Syngenta publishing data on the rice genome in the journal Science, and considers proposals to reform scientific publishing and funding to encourage data sharing. Part 2 examines the relationship between intellectual property rights and scientific publishing, in particular copyright protection of databases, and evaluates the declaration of the Human Genome Organisation that genomic databases should be global public goods. Part 3 looks at varying opinions on the information function of patent law, and then considers the proposals of Patrinos and Drell to provide incentives for private corporations to release data into the public domain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to investigate how social media may support information encountering (i.e., where individuals encounter useful and interesting information while seeking or browsing for some other information) and how this may lead to facilitation of tacit knowledge creation and sharing. The study employed a qualitative survey design that interviewed twenty-four physicians who were active users of social media to better understand the phenomenon of information encountering on social media. The data was analysed using the thematic analysis approach. The study found six main ways through which social media supports information encountering. Furthermore, drawing upon knowledge creation theories, the study concluded that information encountering on social media facilitates tacit knowledge creation and sharing among individuals. The study provides new directions for further empirical investigations to examine whether information encountering on social media actually leads to tacit knowledge creation and sharing. The findings of the study may also provide opportunities for users to adopt social media effectively or gain greater value from social media use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As patterns of media use become more integrated with mobile technologies and multiple screens, a new mode of viewer engagement has emerged in the form of connected viewing, which allows for an array of new relationships between audiences and media texts in the digital space. This exciting new collection brings together twelve original essays that critically engage with the socially-networked, multi-platform, and cloud-based world of today, examining the connected viewing phenomenon across television, film, video games, and social media. The result is a wide-ranging analysis of shifting business models, policy matters, technological infrastructure, new forms of user engagement, and other key trends affecting screen media in the digital era. Connected Viewing contextualizes the dramatic transformations taking place across both media industries and national contexts, and offers students and scholars alike a diverse set of methods and perspectives for studying this critical moment in media culture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The centrality of knowledge sharing to organizations’ sustainability has been established. This research explores and illustrates the influences for individual professionals and paraprofessionals – specifically civil engineers and design drafters – to share their deep, personally constructed knowledge, in a public sector provider of railways infrastructure. It investigates the extent to which: (i) knowledge sharing will be positively influenced by the professional identity, values and knowledge culture to achieve organizational and project goals, and; (ii) sharing of deep personal expertise will be influenced by the quality of relational capital among individuals and individual perspectives. It finds that knowledge sharing develops within frameworks established through the alignment among sector, profession and organization values. However, individual behavior is found to be most strongly influenced by the presence and quality of relational capital and individuals’ personal perspectives.