927 resultados para consultants, information aggregation, committes, motives, career concerns


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In economic literature, information deficiencies and computational complexities have traditionally been solved through the aggregation of agents and institutions. In inputoutput modelling, researchers have been interested in the aggregation problem since the beginning of 1950s. Extending the conventional input-output aggregation approach to the social accounting matrix (SAM) models may help to identify the effects caused by the information problems and data deficiencies that usually appear in the SAM framework. This paper develops the theory of aggregation and applies it to the social accounting matrix model of multipliers. First, we define the concept of linear aggregation in a SAM database context. Second, we define the aggregated partitioned matrices of multipliers which are characteristic of the SAM approach. Third, we extend the analysis to other related concepts, such as aggregation bias and consistency in aggregation. Finally, we provide an illustrative example that shows the effects of aggregating a social accounting matrix model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: In spite of the relapsing nature of inflammatory bowel diseases (IBD), on average, 40% of IBD patients are nonadherent to treatments. On the other hand, they are often actively seeking information on their disease. The relationship between information seeking behaviour and adherence to treatment is poorly documented. The main aim of this study was to examine this association among IBD patients. Methods: We used data from the Swiss IBD cohort study. Baseline data included questions on adherence to ongoing treatments. A survey was conducted in October 2009 to assess information sources and themes searched by patients. Crude odds ratio (OR) and 95% CI were calculated for the association between adherence and information seeking. Adjustment for potential confounders and main known risk factors was performed using multivariate logistic regression. Differences in the proportions of information sources and themes were compared between adherent and non-adherent patients. Results: The number of patients eligible was 488. Nineteen percent (N = 99) were non-adherent to treatment and one third (N = 159) were active information seekers. Crude OR for being non-adherent was 69% higher among information seekers compared to non-seekers (OR = 1.69; 95%CI 0.99 2.87). Adjusted OR for non-adherence was OR = 2.39 (95%CI 1.32 4.34) for information seekers compared to non-seekers. Family doctors were 15.2% more often consulted (p = 0.019) among patients who were adherent to treatment compared to those who were not, as were books and TV (+13.1%; p = 0.048). No difference was observed for internet or gastroenterologists as sources of information. Themes of information linked to tips for disease management were 14.2% more often searched among non-adherent patients (p = 0.028) compared to adherent. No difference was observed for the other themes (research and development on IBD, therapies, basic information on the disease, patients' experiences sharing, miscellaneous). Conclusions: Active information seeking was shown to be strongly associated with non-adherence to treatment in a population of IBD patients in Switzerland. Surprisingly themes related to therapies were not especially those on which nonadherent patients focused. Indeed, management of symptoms and everyday life with the disease seemed to be the most pressing information concerns of patients. Results suggest that the family doctor plays an important role in the multidisciplinary care approach needed for IBD patients.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The automatic interpretation of conventional traffic signs is very complex and time consuming. The paper concerns an automatic warning system for driving assistance. It does not interpret the standard traffic signs on the roadside; the proposal is to incorporate into the existing signs another type of traffic sign whose information will be more easily interpreted by a processor. The type of information to be added is profuse and therefore the most important object is the robustness of the system. The basic proposal of this new philosophy is that the co-pilot system for automatic warning and driving assistance can interpret with greater ease the information contained in the new sign, whilst the human driver only has to interpret the "classic" sign. One of the codings that has been tested with good results and which seems to us easy to implement is that which has a rectangular shape and 4 vertical bars of different colours. The size of these signs is equivalent to the size of the conventional signs (approximately 0.4 m2). The colour information from the sign can be easily interpreted by the proposed processor and the interpretation is much easier and quicker than the information shown by the pictographs of the classic signs

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: Although young males encounter sexually-related concerns, they are mostly absent from specialized services. Our objective is to assess whether the internet is used by boys to find answers to these types of problems and questions. Methods: In the context of a qualitative study assessing young males' barriers to access sexual and reproductive health facilities, we conducted two focus groups gathering 12 boys aged 17-20. Discussions were triggered through the presentation of four vignettes corresponding to questions posted by 17-20 year old boys and girls on an information website for adolescents (www.ciao.ch), concerning various sexual dysfunction situations. In order to avoid having to talk about their own experience, participants were asked what they would do in those cases. Results: In general, the internet was mentioned quite thoroughly as a means of searching for information through research engines and a place to address professionals for advice.Within the hierarchy of consultation possibilities, the internet was given the first place as a way to deal with these types of problems presenting many advantages: (1) the internet enables to maintain intimacy; (2) it is anonymous (use of a pseudo); (3) it avoids having to confront someone face-to-face with personal problems which can be embarrassing and challenging for one's pride; (4) it is free; and (5) it is accessible at all times. In other words, participants value the internet as a positive tool to avoid many barriers which prevent offline consultations to take place. Most participants consider the internet at least as a first step in trying to solve a problem; for instance, by better defining the seriousness of a problem and judging if it is worth consulting a doctor. However, despite the positive qualities of the internet, they do put forward the importance of having specialists answering questions, trustworthiness, and being followed-up by the same person. Participants suggested that a strategy to break down barriers for boys to consult in face-to-face settings is to have a consultation on the internet as a first step which could then guide the person to an in-person consultation if necessary. Conclusions: The internet as a means of obtaining information or consulting received high marks overall. Although the internet cannot replace an in-person consultation, the screen and the keyboard have the advantage of not involving a face-to-face encounter and raise the possibility of discussing sexual problems anonymously and in private. The internet tools together with other new technologies should continue to develop in a secure manner as a space providing prevention messages and to become an easy access door to sexual and reproductive health services for young men, which can then guide youths to appropriate resource persons. Sources of support: This study was supported by the Maurice Chalumeau Foundation, Switzerland.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OBJECTIVE: When potentially dangerous patients reveal criminal fantasies to their therapists, the latter must decide whether this information has to be transmitted to a third person in order to protect potential victims. We were interested in how medical and legal professionals handle such situations in the context of prison medicine and forensic evaluations. We aimed to explore the motives behind their actions and to compare these professional groups. METHOD: A mail survey was conducted among medical and legal professionals using five fictitious case vignettes. For each vignette, participants were asked to answer questions exploring what the professional should do in the situation and to explain their justification for the chosen response. RESULTS: A total of 147 questionnaires were analysed. Agreement between participants varied from one scenario to another. Overall, legal professionals tended to disclose information to a third party more easily than medical professionals, the latter tending to privilege confidentiality and patient autonomy over security. Perception of potential danger in a given situation was not consistently associated with actions. CONCLUSION: Professionals' opinions and attitudes regarding the confidentiality of potentially dangerous patients differ widely and appear to be subjectively determined. Shared discussions about clinical situations could enhance knowledge and competencies and reduce differences between professional groups.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Rebuild Iowa Agriculture and Environment Task Force respectfully submits its report to the Rebuild Iowa Advisory Commission (RIAC) for consideration of the impacts of the tornadoes, storms, high winds, and flooding affecting Iowa’s agriculture sector and environment. The Task Force was required to address very complex and multi-faceted issues. Understanding that there were a broad range of immediate concerns, as well as critical issues that need to be addressed in the future, the Task Force structured its work in two sessions. To better address the issues and priorities of the Task Force, this report categorizes the issues as agriculture, conservation, environment, and livestock.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Rebuild Iowa Cultural Heritage and Records Retention Task Force respectfully submits its report to the Rebuild Iowa Advisory Commission (RIAC) for its consideration of the impacts of the tornadoes, storms, and flooding on Iowans and their cultural, historical, and arts institutions and organizations and records collections and archives. As the RIAC fulfills its obligations to guide the recovery and reconstruction of Iowa, the cknowledgement that culture and records as Iowa’s identity is important, and that if these items of cultural heritage vanish from Iowa’s landscape, the items that Iowans associate with their history, traditions, and sense of place also disappears. Iowa is certainly not the only state that has experienced this type of disaster; however, many states have not recognized culture and records as critical concerns as part of the recovery and rebuilding process. When rebuilding Iowa stronger, smarter, and safer, quality of life is an important consideration for attracting new residents, making it a necessity to keep culture alive and thriving in Iowa. Additionally, the cultural arts constitute a vital economic industry, providing employment to thousands of Iowa’s citizens and generating millions of dollars in local and government revenue across the state. In the case of records, these items are irreplaceable and provide important information for the daily workings of government and life in our state, and maintain vital records of Iowa’s heritage and traditions. This report provides background information on the damages incurred in Iowa from the disasters and additional context for policy and rebuilding discussions. It also offers recommendations to the RIAC for steps that might be taken to address the significant and important challenges faced by Iowa’s cultural, historical, and arts institutions and organizations; individual artists and other cultural workers; and records retention entities and officials. Supplement to main report.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background. Despite the chronic and relapsing nature of inflammatory bowel diseases (IBD), at least 30% to 45% of the patients are noncompliant to treatment. IBD patients often seek information about their disease. Aim. To examine the association between information-seeking activity and treatment compliance among IBD patients. To compare information sources and concerns between compliant and noncompliant patients. Methods. We used data from the Swiss IBD cohort study, and from a qualitative survey conducted to assess information sources and concerns. Crude and adjusted odds ratios (OR) for noncompliance were calculated. Differences in the proportions of information sources and concerns were compared between compliant and noncompliant patients. Results. A total of 512 patients were included. About 18% (n = 99) of patients were reported to be noncompliant to drug treatment and two-thirds (n = 353) were information seekers. The OR for noncompliance among information seekers was 2.44 (95%CI: 1.34-4.41) after adjustment for confounders and major risk factors. General practitioners were 15.2% more often consulted (p = 0.019) among compliant patients, as were books and television (+13.1%; p = 0.048), whereas no difference in proportions was observed for sources such as internet or gastroenterologists. Information on tips for disease management were 14.2% more often sought among noncompliant patients (p = 0.028). No difference was observed for concerns on research and development on IBD or therapies. Conclusion. In Switzerland, IBD patients noncompliant to treatment were more often seeking disease-related information than compliant patients. Daily management of symptoms and disease seemed to be an important concern of those patients.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work, the calcium-induced aggregation of phosphatidylserine liposomes is probed by means of the analysis of the kinetics of such process as well as the aggregate morphology. This novel characterization of liposome aggregation involves the use of static and dynamic light-scattering techniques to obtain kinetic exponents and fractal dimensions. For salt concentrations larger than 5 mM, a diffusion-limited aggregation regime is observed and the Brownian kernel properly describes the time evolution of the diffusion coefficient. For slow kinetics, a slightly modified multiple contact kernel is required. In any case, a time evolution model based on the numerical resolution of Smoluchowski's equation is proposed in order to establish a theoretical description for the aggregating system. Such a model provides an alternative procedure to determine the dimerization constant, which might supply valuable information about interaction mechanisms between phospholipid vesicles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many assays to evaluate the nature, breadth, and quality of antigen-specific T cell responses are currently applied in human medicine. In most cases, assay-related protocols are developed on an individual laboratory basis, resulting in a large number of different protocols being applied worldwide. Together with the inherent complexity of cellular assays, this leads to unnecessary limitations in the ability to compare results generated across institutions. Over the past few years a number of critical assay parameters have been identified which influence test performance irrespective of protocol, material, and reagents used. Describing these critical factors as an integral part of any published report will both facilitate the comparison of data generated across institutions and lead to improvements in the assays themselves. To this end, the Minimal Information About T Cell Assays (MIATA) project was initiated. The objective of MIATA is to achieve a broad consensus on which T cell assay parameters should be reported in scientific publications and to propose a mechanism for reporting these in a systematic manner. To add maximum value for the scientific community, a step-wise, open, and field-spanning approach has been taken to achieve technical precision, user-friendliness, adequate incorporation of concerns, and high acceptance among peers. Here, we describe the past, present, and future perspectives of the MIATA project. We suggest that the approach taken can be generically applied to projects in which a broad consensus has to be reached among scientists working in fragmented fields, such as immunology. An additional objective of this undertaking is to engage the broader scientific community to comment on MIATA and to become an active participant in the project.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although many larger Iowa cities have staff traffic engineers who have a dedicated interest in safety, smaller jurisdictions do not. Rural agencies and small communities must rely on consultants, if available, or local staff to identify locations with a high number of crashes and to devise mitigating measures. However, smaller agencies in Iowa have other available options to receive assistance in obtaining and interpreting crash data. These options are addressed in this manual. Many proposed road improvements or alternatives can be evaluated using methods that do not require in-depth engineering analysis. The Iowa Department of Transportation (DOT) supported developing this manual to provide a tool that assists communities and rural agencies in identifying and analyzing local roadway-related traffic safety concerns. In the past, a limited number of traffic safety professionals had access to adequate tools and training to evaluate potential safety problems quickly and efficiently and select possible solutions. Present-day programs and information are much more conducive to the widespread dissemination of crash data, mapping, data comparison, and alternative selections and comparisons. Information is available and in formats that do not require specialized training to understand and use. This manual describes several methods for reviewing crash data at a given location, identifying possible contributing causes, selecting countermeasures, and conducting economic analyses for the proposed mitigation. The Federal Highway Administration (FHWA) has also developed other analysis tools, which are described in the manual. This manual can also serve as a reference for traffic engineers and other analysts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This document contains statistics and reports about Iowa public libraries. It includes tables, graphs, maps and information about the use of public libraries, loans, holdings, data by region and population and much more. The information was compiled for a consultants meeting for the Iowa State Traveling Library.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This document contains statistics and reports about Iowa public libraries, particularly in the areas of reference and information services. It includes tables, graphs, maps and information about the use of public libraries, loans, holdings, data by region and population and much more. The information was compiled for a consultants meeting for the Iowa State Traveling Library.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent literature has discussed the unintended consequences of clinical information technologies (IT) on patient safety, yet there has been little discussion about the safety concerns in the area of consumer health IT. This paper presents a range of safety concerns for consumers in social media, with a case study on YouTube. We conducted a scan of abstracts on 'quality criteria' related to YouTube. Five areas regarding the safety of YouTube for consumers were identifi ed: (a) harmful health material targeted at consumers (such as inappropriate marketing of tobaccoor direct-to-consumer drug advertising); (b) public display of unhealthy behaviour (such as people displaying self-injury behaviours or hurting others); (c) tainted public health messages (i.e. the rise of negative voices againstpublic health messages); (d) psychological impact from accessing inappropriate, offensive or biased social media content; and (e) using social media to distort policy and research funding agendas. The examples presented should contribute to a better understanding about how to promote a safe consumption and production of social media for consumers, and an evidence-based approach to designing social media interventions for health. The potential harm associated with the use of unsafe social media content on the Internet is a major concern. More empirical and theoretical studies are needed to examine how social media infl uences consumer health decisions, behaviours and outcomes, and devise ways to deter the dissemination of harmful infl uences in social media.