816 resultados para Information security
Resumo:
Newsletter for Information Technology Department
Resumo:
Newsletter for Information Technology Department
Resumo:
Newsletter for Information Technology Department
Resumo:
Newsletter for Information Technology Department
Resumo:
Newsletter for Information Technology Department
Resumo:
Newsletter for Information Technology Department
Resumo:
In a distributed key distribution scheme, a set of servers helps a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some servers and some users has no information about the key of a noncorrupted group. In this work, we formalize the security analysis of one such scheme which was not considered in the original proposal. We prove the scheme is secure in the random oracle model, assuming that the Decisional Diffie-Hellman (DDH) problem is hard to solve. We also detail a possible modification of that scheme and the one in which allows us to prove the security of the schemes without assuming that a specific hash function behaves as a random oracle. As usual, this improvement in the security of the schemes is at the cost of an efficiency loss.
Resumo:
OBJECTIVE: When potentially dangerous patients reveal criminal fantasies to their therapists, the latter must decide whether this information has to be transmitted to a third person in order to protect potential victims. We were interested in how medical and legal professionals handle such situations in the context of prison medicine and forensic evaluations. We aimed to explore the motives behind their actions and to compare these professional groups. METHOD: A mail survey was conducted among medical and legal professionals using five fictitious case vignettes. For each vignette, participants were asked to answer questions exploring what the professional should do in the situation and to explain their justification for the chosen response. RESULTS: A total of 147 questionnaires were analysed. Agreement between participants varied from one scenario to another. Overall, legal professionals tended to disclose information to a third party more easily than medical professionals, the latter tending to privilege confidentiality and patient autonomy over security. Perception of potential danger in a given situation was not consistently associated with actions. CONCLUSION: Professionals' opinions and attitudes regarding the confidentiality of potentially dangerous patients differ widely and appear to be subjectively determined. Shared discussions about clinical situations could enhance knowledge and competencies and reduce differences between professional groups.
Resumo:
\documentstyle[portada,11pt]{article}This paper shows that the presence of private information in aneconomy can be a source of market incompleteness even when it is feasibleto issue a set of securities that completely eliminates the informationalasymmetries in equilibrium. We analyze a simple security design model in which avolume maximizing futures exchange chooses not only the characteristics ofeach individual contract but also the number of contracts. Agents have rationalexpectations and differ in information, endowments and, possibly, attitudestoward risk. The emergence of complete or incomplete markets in equilibriumdepends on whether the {\it adverse selection effect} is stronger or weakerthan the {\it Hirshleifer effect}, as new securitiesare issued and prices reveal more information. When the Hirshleifer effectdominates, the exchange chooses an incomplete set of financial contracts, andthe equilibrium price is partially revealing.
Resumo:
This paper analyzes the choice between limit and market orders in animperfectly competitive noisy rational expectations economy. There is a uniqueinsider, who takes into account the effect their trading has on prices. If theinsider behaves as a price taker, she will choose market orders if her privateinformation is very precise and she will choose limit orders otherwise. On thecontrary, if the insider recognizes and exploits her ability to affect themarket price, her optimal choice is to place limit orders whatever the precisionof her private information.
Resumo:
In this paper we explore the mechanisms that allow securities analysts to value companies in contexts of Knightian uncertainty, that is, in the face of information that is unclear, subject to unforeseeable contingencies or to multiple interpretations. We address this question with a grounded-theory analysis of the reports written on Amazon.com by securities analyst Henry Blodget and rival analysts during the years 1998-2000. Our core finding is that analysts' reports are structured by internally consistent associations that includecategorizations, key metrics and analogies. We refer to these representations as calculative frames, and propose that analysts function as frame-makers - that is, asspecialized intermediaries that help investors value uncertain stocks. We conclude by considering the implications of frame-making for the rise of new industry categories, analysts' accuracy, and the regulatory debate on analysts'independence.
Resumo:
Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff.
Resumo:
The purpose of the Introduction to Homeland Security and Emergency Management for Local Officials is to provide you with information regarding this system. Inside, you will learn about local and state emergency management and homeland security; the phases of homeland security and emergency management; hazards that affect the state; comprehensive planning requirements; emergency declarations; available state and federal assistance; and other important topics that will help you become more versed in homeland security and emergency management in Iowa.
Resumo:
Address sustainability in all efforts. Sustainability should be at the core of all levels of homeland security and emergency management effort in Iowa. Capabilities need to be built for the long term, and without a sustainability plan in place, projects can quickly deplete uncertain levels of funding. Utilize an all-hazards methodology. Developing capabilities that are effective during a variety of disaster and emergency scenarios represents sound planning and resource management. Enhance capabilities through joint planning, training and exercise. Effective capabilities developed through coordinated planning efforts and an ongoing joint training and exercising program to ensure sustainment of prepared response. Utilize a collaborative approach to build capability. We will utilize whatever partnerships are necessary to build capability in the most effective manner possible. Regional partnerships have been, and will continue to be, in the forefront of the State of Iowa’s efforts to build and enhance capability. Enhance statewide capabilities. Whenever possible, we will identify and augment existing resources to provide statewide capability during a disaster or terrorist attack. Awareness, outreach and education. Open communication is critical to the success of any initiative. All projects implemented will have awareness, education and outreach components to ensure that all stakeholders are informed as to their responsibilities, capabilities and access. Information sharing and a common operating picture. The timely exchange of critical/actionable information is imperative to the success of every operation. The identification of a common operating picture allows decision makers to make informed decisions based on a unified understanding of the events around them.