866 resultados para Information Security, Safe Behavior, Users’ behavior, Brazilian users, threats
Resumo:
Quase um em cada dez pacientes é lesionado ao receber cuidados de saúde e, destes, muitos sofrem lesões incapacitantes ou morte todos os anos. Entendendo a importância e o impacto negativo das falhas na segurança do paciente em âmbito global e a influência que a cultura e o clima de segurança exercem sobre a adoção de ações e decisões mais seguras, este estudo teve por objetivo a analise da cultura de segurança do paciente em instituições hospitalares, por meio da mensuração do clima de segurança. Trata-se de pesquisa quantitativa, transversal, do tipo Survey, em que para a realização da coleta de dados foi aplicado o Questionário de Atitudes de Segurança, adaptação transcultural para o Brasil do Safety Attitudes Questionnaire (SAQ) - Short Form 2006. O estudo ocorreu em dois hospitais gerais do estado de São Paulo, localizados em diferentes regiões metropolitanas, sendo um público e o outro privado. Os profissionais Médicos, Enfermeiros, Técnicos e Auxiliares de Enfermagem, Fisioterapeutas, Farmacêuticos e Nutricionistas, que atuavam nestes hospitais há pelo menos 6 meses, com carga horária de trabalho semanal de no mínimo 20 horas, constituíram a população deste estudo. Foi realizado um estudo piloto com 25 profissionais em cada hospital e a prevalência resultante deste teste foi utilizada no cálculo do tamanho amostral com nível de significância de 5%, erro relativo de 10% e perda de 20%, resultando em um total de 235 participantes. Os profissionais escolhidos como parte da amostra foram sorteados empregando-se amostragem aleatória simples computadorizada. As variáveis de cada domínio da escala quando testadas pelo Teste Kolmogorov-Smirnov não apresentaram normalidade. Deste modo, foi aplicado o Teste Mann-Whitney para comparar os valores das pontuações entre os hospitais e entre as categorias profissionais. Com relação aos resultados houve índice de participação de 86,8% da amostra sorteada, prevalecendo os sujeitos com 5 a 20 anos de tempo na especialidade, do gênero feminino, e trabalhadores da enfermagem. Não houve diferenças significantes dentre as pontuações obtidas pelos dois hospitais. Os participantes do estudo apresentaram percepção negativa quanto ao clima de segurança do paciente, com domínios Reconhecimento do Estresse e Percepção da Gestão apresentando resultados negativos, tanto para a amostra como um todo quanto por hospital. Os domínios Clima de Trabalho em Equipe, Satisfação no Trabalho e Comportamento Seguro/Práticas Seguras resultaram em percepções positivas para todas as categorias profissionais. Já o domínio Percepção da Gestão do Hospital resultou em percepção negativa para todas estas. Os Médicos e os Técnicos e Auxiliares de Enfermagem apresentaram percepções negativas em mais domínios. Em contrapartida, os Enfermeiros foram os únicos a apresentar atitude de segurança do paciente positiva, com escore total do SAQ exibindo diferença significante quando comparado a todas as outras categorias, apresentando também percepção positiva em maior número de domínios. Concluiu-se que existe a necessidade de abordagem relacionada ao Reconhecimento do Estresse dos profissionais, além dos aspectos do Gerenciamento. As categorias profissionais diferiram entre si com relação às percepções sobre a atitude de segurança do paciente. Desta forma, o desenvolvimento da cultura de segurança deve englobar todas as categorias profissionais, uma vez que esta abrange toda a organização, destacando-se a necessidade de enfoque de ações com relação a categoria dos Médicos e dos Técnicos e Auxiliares de Enfermagem. Além disso, ficou evidente o papel de destaque e liderança dos profissionais Enfermeiros nos processos de melhoria da qualidade, e colocando-os em posição privilegiada para conduzir os esforços de melhoria contínua da qualidade nos serviços de saúde
Resumo:
Dopamine is the biological molecule responsible, among other functions, of the heart beat and blood pressure regulation. Its loss, in the human body, can result in serious diseases such as Parkinson's, schizophrenia or depression. Structurally, this molecule belongs to the group of catecholamines, together with epinephrine (adrenaline) and norepinephrine (noradrenaline). The hydroquinone moiety of the molecule can be easily oxidized to quinone, rendering the electrochemical methods a convenient approach for the development of dopamine biosensors. The reactivity of similar aromatic molecules, such as catechol and hydroquinone, at well-ordered platinum surfaces, has recently been investigated in our group. In this paper, we extend these studies to the structurally related molecule dopamine. The study has been performed in neutral pH, since this is closer to the natural conditions for these molecules in biological media. Cyclic voltammetry and in situ infra-red spectroscopy have been combined to extract information about the behavior of this molecule on well-defined platinum surfaces. Dopamine appears to be electrochemically active and reveals interesting adsorption phenomena at low potentials (0.15–0.25 V vs RHE), sensitive to the single crystal orientation. The adsorption of dopamine on these surfaces is very strong, taking place at much lower potentials than the electron transfer from solution species. Specifically, the voltammetry of Pt(1 1 1) and Pt(1 0 0) in dopamine solutions shows an oxidation peak at potentials close to the onset of hydrogen evolution, which is related to the desorption of hydrogen and the adsorption of dopamine. On the other hand, adsorption on Pt(1 1 0) is irreversible and the surface appears totally blocked. Spectroscopic results indicate that dopamine is adsorbed flat on the surface. At potentials higher than 0.6 V vs RHE the three basal planes show a common redox process. The initial formation of the quinone moiety is followed by a chemical step resulting in the formation of 5,6-dihydroxyindoline quinone as final product. This oxidation process has also been investigated by vibrational spectroscopy.
Resumo:
Cover title.
Resumo:
Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our method uses reachability matrices to identify potentially undesirable information flows based on the fault modes of the system's components.
Resumo:
Interpolated data are an important part of the environmental information exchange as many variables can only be measured at situate discrete sampling locations. Spatial interpolation is a complex operation that has traditionally required expert treatment, making automation a serious challenge. This paper presents a few lessons learnt from INTAMAP, a project that is developing an interoperable web processing service (WPS) for the automatic interpolation of environmental data using advanced geostatistics, adopting a Service Oriented Architecture (SOA). The “rainbow box” approach we followed provides access to the functionality at a whole range of different levels. We show here how the integration of open standards, open source and powerful statistical processing capabilities allows us to automate a complex process while offering users a level of access and control that best suits their requirements. This facilitates benchmarking exercises as well as the regular reporting of environmental information without requiring remote users to have specialized skills in geostatistics.
Resumo:
Some basic types of archiving programs are described in the paper in addition to their advantages and disadvantages with respect to the analysis of security in archiving. Analysis and appraisal are performed on the results obtained during the described experiments.
Resumo:
Az innovációterjedés vizsgálatának számos módszere ismert a szakirodalomban, a leggyakoribb a szociológiai alapú közelítés, melynek marketingvonatkozásait alapvetően Rogers (1962) dolgozta fel. Rogers elmélete kettős – egyrészt elméleti szegmentációt nyújt az innováció elfogadásához, másrészt bemutatja a sikeres innovációelfogadás tényezőit. Az elmélet további alkalmazása során egy viszonylag egységes, de – mint ahogy a szerzők 2005-ben végzett kutatásából kiderült – nem feltétlen valós kép alakult ki az egyes fogyasztói csoportokról. A legtöbb innovációs kutatás kvantitatív jellegű, amily eleve feltételezi, hogy pontosan ismerjük a probléma szerkezetét. Radikálisan új megoldások esetében azonban nem feltétlenül rendelkezünk ilyen ismeretekkel, s szükséges lehet egy feltáró kutatás elvégzése. A szerzők vizsgálatukban alapvetően kvalitatív kutatási technikákat alkalmaztak: a résztvevők megfigyelését, a strukturálatlan interjút, mélyinterjút egyaránt használták, és a felhasználók, illetve az érdekelt vállalatok széles körét vonták be a kutatásba. _____________ In their paper the authors study the user acceptance of a new innovation, wifi applications in a technologically less developed market with qualitative research techniques. They used Rogers’ framework of aspects of the diffusion of innovation, to explore whether those factors are traceable and have influence in the spreading of hotspot. Their objective was to explore the factors of diffusion of innovation in a less developed market, what the major possible success factors of introducing wifi solutions for operating hotspots. They found that current users show two separate groups: one group is the technology freak, trend follower innovators. The other group is also technologically well-educated more conservative – security sensitive professional users, innovators in the sense of using the new technology at the earliest stage, but hold negative attitudes towards the new application in question. This raises the question whether companies are to approach these innovators with differentiated strategy.
Resumo:
This work aims to understand how cloud computing contextualizes the IT government and decision agenda, in the light of the multiple streams model, considering the current status of public IT policies, the dynamics of the agenda setting for the area, the interface between the various institutions, and existing initiatives on the use of cloud computing in government. Therefore, a qualitative study was conducted through interviews with a group of policy makers and the other group consists of IT managers. As analysis technique, this work made use of content analysis and analysis of documents, with some results by word cloud. As regards the main results to overregulation to the area, usually scattered in various agencies of the federal government, which hinders the performance of the managers. Identified a lack of knowledge of standards, government programs, regulations and guidelines. Among these he highlighted a lack of understanding of the TI Maior Program, the lack of effectiveness of the National Broadband Plan in view of the respondents, as well as the influence of Internet Landmark as an element that can jam the advances in the use of computing cloud in the Brazilian government. Also noteworthy is the bureaucratization of the acquisition of goods to IT services, limited, in many cases, technological advances. Regarding the influence of the actors, it was not possible to identify the presence of a political entrepreneur, and it was noticed a lack of political force. Political flow was affected only by changes within the government. Fragmentation was a major factor for the theme of weakening the agenda formation. Information security was questioned by the respondents pointed out that the main limitation coupled with the lack of training of public servants. In terms of benefits, resource economy is highlighted, followed by improving efficiency. Finally, the discussion about cloud computing needs to advance within the public sphere, whereas the international experience is already far advanced, framing cloud computing as a responsible element for the improvement of processes, services and economy of public resources
Resumo:
This research seeks to understand how the problem of information security is treated in Brazil by the public thematization and also how it can affect the political and economic aspects of both Brazilian companies and government by using a study case based on the document leak event of the National Security Agency by Snowden. For this, the study case of sites, blogs and news portal coverage was carried out from the perspective of evidential paradigm, studies of movement and event concept. We are interested in examining how the media handles the information security topic and what its impact on national and international political relations. The subject matter was considered the largest data leakage in history of the NSA, which ranks as the world's largest agency of expression intelligence. This leak caused great repercussions in Brazil since it was revealed that the country was the most watched by the United States of America, behind only USA itself. The consequences were: a big tension between Brazil and the US and a public discussion about privacy and freedom on Internet. The research analyzed 256 publications released by Brazilian media outlets in digital media, in the period between June and July 2013.
Resumo:
This research seeks to understand how the problem of information security is treated in Brazil by the public thematization and also how it can affect the political and economic aspects of both Brazilian companies and government by using a study case based on the document leak event of the National Security Agency by Snowden. For this, the study case of sites, blogs and news portal coverage was carried out from the perspective of evidential paradigm, studies of movement and event concept. We are interested in examining how the media handles the information security topic and what its impact on national and international political relations. The subject matter was considered the largest data leakage in history of the NSA, which ranks as the world's largest agency of expression intelligence. This leak caused great repercussions in Brazil since it was revealed that the country was the most watched by the United States of America, behind only USA itself. The consequences were: a big tension between Brazil and the US and a public discussion about privacy and freedom on Internet. The research analyzed 256 publications released by Brazilian media outlets in digital media, in the period between June and July 2013.
Resumo:
Cyber-physical systems tightly integrate physical processes and information and communication technologies. As today’s critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecurity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Using this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.
Resumo:
Abstract There has been a great deal of interest in the area of cyber security in recent years. But what is cyber security exactly? And should society really care about it? We look at some of the challenges of being an academic working in the area of cyber security and explain why cyber security is, to put it rather simply, hard! Speaker Biography Keith Martin Prof. Keith Martin is Professor of Information Security at Royal Holloway, University of London. He received his BSc (Hons) in Mathematics from the University of Glasgow in 1988 and a PhD from Royal Holloway in 1991. Between 1992 and 1996 he held a Research Fellowship at the University of Adelaide, investigating mathematical modelling of cryptographic key distribution problems. In 1996 he joined the COSIC research group of the Katholieke Universiteit Leuven in Belgium, working on security for third generation mobile communications. Keith rejoined Royal Holloway in January 2000, became a Professor in Information Security in 2007 and was Director of the Information Security Group between 2010 and 2015. Keith's research interests range across cyber security, but with a focus on cryptographic applications. He is the author of 'Everyday Cryptography' published by Oxford University Press.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
Peer-to-peer information sharing has fundamentally changed customer decision-making process. Recent developments in information technologies have enabled digital sharing platforms to influence various granular aspects of the information sharing process. Despite the growing importance of digital information sharing, little research has examined the optimal design choices for a platform seeking to maximize returns from information sharing. My dissertation seeks to fill this gap. Specifically, I study novel interventions that can be implemented by the platform at different stages of the information sharing. In collaboration with a leading for-profit platform and a non-profit platform, I conduct three large-scale field experiments to causally identify the impact of these interventions on customers’ sharing behaviors as well as the sharing outcomes. The first essay examines whether and how a firm can enhance social contagion by simply varying the message shared by customers with their friends. Using a large randomized field experiment, I find that i) adding only information about the sender’s purchase status increases the likelihood of recipients’ purchase; ii) adding only information about referral reward increases recipients’ follow-up referrals; and iii) adding information about both the sender’s purchase as well as the referral rewards increases neither the likelihood of purchase nor follow-up referrals. I then discuss the underlying mechanisms. The second essay studies whether and how a firm can design unconditional incentive to engage customers who already reveal willingness to share. I conduct a field experiment to examine the impact of incentive design on sender’s purchase as well as further referral behavior. I find evidence that incentive structure has a significant, but interestingly opposing, impact on both outcomes. The results also provide insights about senders’ motives in sharing. The third essay examines whether and how a non-profit platform can use mobile messaging to leverage recipients’ social ties to encourage blood donation. I design a large field experiment to causally identify the impact of different types of information and incentives on donor’s self-donation and group donation behavior. My results show that non-profits can stimulate group effect and increase blood donation, but only with group reward. Such group reward works by motivating a different donor population. In summary, the findings from the three studies will offer valuable insights for platforms and social enterprises on how to engineer digital platforms to create social contagion. The rich data from randomized experiments and complementary sources (archive and survey) also allows me to test the underlying mechanism at work. In this way, my dissertation provides both managerial implication and theoretical contribution to the phenomenon of peer-to-peer information sharing.
Resumo:
The investigation communities spread all over the planet create considerable amounts of knowledge while developing their activities. The most known way of communicating this knowledge is through papers publishing, books and reports, among others. These documents are stored in libraries and even more nowadays, in the Internet, allowing people to access up dated information more efficiently than ever. However, this great amount of available information can represent an obstacle to its transformation in knowledge. It is therefore relevant the implementation of mechanisms that enable this transformation. In this dissertation a proposal for creation of a new information service is presented. It concerns a service of collaborative bibliographic revision, which supports the investigators in this specific task as well as in registering its results, thus providing future revisions by third party. The developed model takes its grounds in a documental background accessible through a commercial libraries management system, under which a "web" of semantically enriched connections is established and that register preferential paths for exploring this background, according to multiple criteria as well as notes to documents and paths themselves. A prototype is presented it implements the fundamental ideas of the model, which at its basic level represents an access interface to a repository of documents in electronic form. Based on this level there are two others, focussed on the registration of information added by the users of the service. The results emerged from this prototype clearly show the viability of the model.