706 resultados para Breach of trust


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In recent years, the healthcare sector has adopted the use of operational risk assessment tools to help understand the systems issues that lead to patient safety incidents. But although these problem-focused tools have improved the ability of healthcare organizations to identify hazards, they have not translated into measurable improvements in patient safety. One possible reason for this is a lack of support for the solution-focused process of risk control. This article describes a content analysis of the risk management strategies, policies, and procedures at all acute (i.e., hospital), mental health, and ambulance trusts (health service organizations) in the East of England area of the British National Health Service. The primary goal was to determine what organizational-level guidance exists to support risk control practice. A secondary goal was to examine the risk evaluation guidance provided by these trusts. With regard to risk control, we found an almost complete lack of useful guidance to promote good practice. With regard to risk evaluation, the trusts relied exclusively on risk matrices. A number of weaknesses were found in the use of this tool, especially related to the guidance for scoring an event's likelihood. We make a number of recommendations to address these concerns. The guidance assessed provides insufficient support for risk control and risk evaluation. This may present a significant barrier to the success of risk management approaches in improving patient safety. © 2013 Society for Risk Analysis.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Chinese Assoc Cryptol Res, State Key Lab Informat Secur, Inst Software, Grad Univ Chinese Acad Sci, Natl Nat Sci Fdn China

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Open environments involve distributed entities interacting with each other in an open manner. Many distributed entities are unknown to each other but need to collaborate and share resources in a secure fashion. Usually resource owners alone decide who is trusted to access their resources. Since resource owners in open environments do not have a complete picture of all trusted entities, trust management frameworks are used to ensure that only authorized entities will access requested resources. Every trust management system has limitations, and the limitations can be exploited by malicious entities. One vulnerability is due to the lack of globally unique interpretation for permission specifications. This limitation means that a malicious entity which receives a permission in one domain may misuse the permission in another domain via some deceptive but apparently authorized route; this malicious behaviour is called subterfuge. This thesis develops a secure approach, Subterfuge Safe Trust Management (SSTM), that prevents subterfuge by malicious entities. SSTM employs the Subterfuge Safe Authorization Language (SSAL) which uses the idea of a local permission with a globally unique interpretation (localPermission) to resolve the misinterpretation of permissions. We model and implement SSAL with an ontology-based approach, SSALO, which provides a generic representation for knowledge related to the SSAL-based security policy. SSALO enables integration of heterogeneous security policies which is useful for secure cooperation among principals in open environments where each principal may have a different security policy with different implementation. The other advantage of an ontology-based approach is the Open World Assumption, whereby reasoning over an existing security policy is easily extended to include further security policies that might be discovered in an open distributed environment. We add two extra SSAL rules to support dynamic coalition formation and secure cooperation among coalitions. Secure federation of cloud computing platforms and secure federation of XMPP servers are presented as case studies of SSTM. The results show that SSTM provides robust accountability for the use of permissions in federation. It is also shown that SSAL is a suitable policy language to express the subterfuge-safe policy statements due to its well-defined semantics, ease of use, and integrability.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Two key players in the Arctic and subarctic marine ecosystem are the calanoid copepods, Calanus finmarchicus and C. glacialis. Although morphologically very similar, these sibling species have different life cycles and roles in the Arctic pelagic marine ecosystem. Considering that the distribution of C. glacialis corresponds to Arctic water masses and C. finmarchicus to Atlantic water masses, the species are frequently used as climate indicators. Consequently, correct identification of the two species is essential if we want to understand climate-impacted changes on Calanus-dominated marine ecosystems such as the Arctic. Here, we present a novel morphological character (redness) to distinguish live females of C. glacialis and C. finmarchicus and compare it to morphological (prosome length) and genetic identification. The characters are tested on 300 live females of C. glacialis and C. finmarchicus from Disko Bay, western Greenland. Our analysis confirms that length cannot be used as a stand-alone criterion for separation. The results based on the new morphological character were verified genetically using a single mitochondrial marker (16S) and nuclear loci (six microsatellites and 12 InDels). The pigmentation criterion was also used on individuals (n = 89) from Young Sound fjord, northeast Greenland to determine whether the technique was viable in different geographical locations. Genetic markers based on mitochondrial and nuclear loci were corroborative in their identification of individuals and revealed no hybrids. Molecular identification confirmed that live females of the two species from Greenlandic waters, both East and West, can easily be separated by the red pigmentation of the antenna and somites of C. glacialis in contrast to the pale opaque antenna and somites of C. finmarchicus, confirming that the pigmentation criterion is valid for separation of the two species

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article describes the work of Newry Student Unit which operates in the Southern Health and Social Care Trust. The background to the unit is outlined and its development is discussed in the context of practice learning provision in Northern Ireland. The operation of the unit in providing Family and Child Care practice learning opportunities (PLOs) for student social workers is outlined and findings from evaluation questionnaires completed by students, college tutors and team leaders are presented. The paper highlights both the advantages and disadvantages of this model of PLO provision and concludes that it is a valuable resource for practice learning. Proposals for the development of the unit are discussed and it is suggested that the model has the potential be replicated in other areas of Northern Ireland.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Knowledge production in entrepreneurship requires inclusivity as well as diversity and pluralism in research perspectives and approaches. In this article, the authors address concerns about interpretivist research regarding validity, reliability, objectivity, generalizability, and communicability of results that militate against its more widespread acceptance. Following the nonfoundationalist argument that all observation is theory-laden, context specific, and that there are no external criteria against which to assess research design and execution and the data produced, the authors propose that quality must be internalized within the underlying research philosophy rather than something to be tested upon completion. This requires a shift from the notion of validity as an outcome to validation as a process. To elucidate this, they provide a guiding framework and present a case illustration that will assist an interpretivist entrepreneurship researcher to establish and demonstrate the quality of their work.