941 resultados para information disclosure
Resumo:
The disclosure of leniency materials held by competition authorities has recently been under the spot. On the one hand, these documents could greatly help cartel victims to prove the damage and the causation link when filing damage actions against cartelists. On the other hand, future cartelists could be deterred from applying for leniency since damage actions could be brought as a result of the information submitted by themselves. Neither the current legislation nor the case law have attained yet to sufficiently clarify how to deal with this clash of interests. Our approach obviously attempts to strike a balance between both interests. But not only that. We see the current debate as a great opportunity to boost the private enforcement of antitrust law through the positive spillovers of leniency programmes. We hence propose to build a bridge between the public and the private enforcement by enabling a partial disclosure of the documents.
Resumo:
"B-215075"--p. 1.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06
Resumo:
Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^
Resumo:
The information architecture supports information retrieval by users in Web environment. The design should be center in the information user, favoring usability. The Faculty of Industrial Engineering and Tourism of the Universidad Central "Marta Abreu" de Las Villas, lacks a site that enhances the disclosure of information to its members. Are presented as objectives of the study: 1) conduct a user survey to identify information needs of users, 2) establish guidelines for information architecture for the institution focused on users, 3) designing the information architecture for the institution and 4) designed to evaluate the proposal. Are presented as objectives of the study: 1) to realize a user study to identify the information needs of users, 2) establish guidelines for information architecture for the institution focused on users, 3) to design the information architecture for the institution and 4) to evaluate the proposal designed. To obtain results are used methods in the theoretical and empirical levels. Besides, are use techniques that favored the design and evaluation. Is designed the intranet of the Faculty of Industrial Engineering and Tourism. Is evaluated the proposed design for the validation of the results.
Resumo:
OBJECTIVE: Doctor-patient communication in oncology, particularly concerning diagnostic disclosure, is a crucial factor related to the quality of the doctor-patient relationship and the psychological state of the patient. The aims of our study were to investigate physicians' opinions and practice with respect to disclosure of a cancer diagnosis and to explore potential related factors. METHOD: A self-report questionnaire developed for our study was responded to by 120 physicians from Coimbra University Hospital Centre and its primary healthcare units. RESULTS: Some 91.7% of physician respondents generally disclosed a diagnosis, and 94.2% were of the opinion that the patient knowing the truth about a diagnosis had a positive effect on the doctor-patient relationship. A need for training about communicating with oncology patients was reported by 85.8% of participants. The main factors determining what information to provide to patients were: (1) patient intellectual and cultural level, (2) patient desire to know the truth, and (3) the existence of family. SIGNIFICANCE OF RESULTS: Our results point to a paradigm shift in communication with cancer patients where disclosure of the diagnosis should be made part of general clinical practice. Nevertheless, physicians still experience difficulties in revealing cancer diagnoses to patients and often lack the skills to deal with a patient's emotional responses, which suggests that more attention needs to be focused on communication skills training programs.
Resumo:
OBJECTIVE: Doctor-patient communication in oncology, particularly concerning diagnostic disclosure, is a crucial factor related to the quality of the doctor-patient relationship and the psychological state of the patient. The aims of our study were to investigate physicians' opinions and practice with respect to disclosure of a cancer diagnosis and to explore potential related factors. METHOD: A self-report questionnaire developed for our study was responded to by 120 physicians from Coimbra University Hospital Centre and its primary healthcare units. RESULTS: Some 91.7% of physician respondents generally disclosed a diagnosis, and 94.2% were of the opinion that the patient knowing the truth about a diagnosis had a positive effect on the doctor-patient relationship. A need for training about communicating with oncology patients was reported by 85.8% of participants. The main factors determining what information to provide to patients were: (1) patient intellectual and cultural level, (2) patient desire to know the truth, and (3) the existence of family. SIGNIFICANCE OF RESULTS: Our results point to a paradigm shift in communication with cancer patients where disclosure of the diagnosis should be made part of general clinical practice. Nevertheless, physicians still experience difficulties in revealing cancer diagnoses to patients and often lack the skills to deal with a patient's emotional responses, which suggests that more attention needs to be focused on communication skills training programs.
Resumo:
Database schemas, in many organizations, are considered one of the critical assets to be protected. From database schemas, it is not only possible to infer the information being collected but also the way organizations manage their businesses and/or activities. One of the ways to disclose database schemas is through the Create, Read, Update and Delete (CRUD) expressions. In fact, their use can follow strict security rules or be unregulated by malicious users. In the first case, users are required to master database schemas. This can be critical when applications that access the database directly, which we call database interface applications (DIA), are developed by third party organizations via outsourcing. In the second case, users can disclose partially or totally database schemas following malicious algorithms based on CRUD expressions. To overcome this vulnerability, we propose a new technique where CRUD expressions cannot be directly manipulated by DIAs any more. Whenever a DIA starts-up, the associated database server generates a random codified token for each CRUD expression and sends it to the DIA that the database servers can use to execute the correspondent CRUD expression. In order to validate our proposal, we present a conceptual architectural model and a proof of concept.
Resumo:
Child sexual abuse (CSA) disclosure is critical for survivor´s psychosocial adjustment later in life. The aim of the present study was to analyze the relationship between attributions of blame for child sexual abuse by the victim and the disclosure of the abuse to parents or caregivers while controlling for characteristics of the abuse. Female college students between 17 and 24 years of age (M = 19.44, SD = 1.64) from a southern Spanish University were surveyed. Of 1547 respondents, 153 (9.90%) reported having suffered some form of CSA before the age of 15. Information about the characteristics of abuse (age of onset, type of abuse suffered, continuity of abuse, and relationship with and age of the perpetrator) and the existence of abuse disclosure by the survivor was obtained from a self-reported questionnaire developed for the present study. The Attributions of Responsibility and Blame Scale (McMillen & Zuravin, 1997) was used to assess attributions made about CSA (self-blame, perpetrator blame and family blame). The results of a logistic regression model was statistically significant, χ² (9) = 43.856, p < .001. The model explained 41% (Nagelkerke R²) of the variance of abuse disclosure and correctly classified 85.6% of cases. Survivor disclosure was 5.50 times more likely to occur when the perpetrator was not a family member (Wald = 8.14, p < .01) and 3.95 times more likely to occur when there was not physical contact with the perpetrator (Wald = 4.30, p < .05). The occurrence of disclosure was also related to increased perpetrator age (Wald = 4.83, p < .05). With regard to the attributions of blame, the occurrence of disclosure was related to lower scores on self-blame (Wald = 6.78, p < .01) and higher scores on family blame (Wald = 9.67, p < .001). However, no relationship was found between perpetrator blame and disclosure of abuse. The results confirm the idea that not only self-blame attributions, but also family blame attributions are critical to the decision of a CSA victim to disclose abuse. The possibility that children who do not disclose abuse have a greater need to deny the occurrence of abuse, or have more confusion about being abused is discussed. Attributions of blame should be taken into serious consideration when evaluating children for possible sexual abuse.
Resumo:
Dissertação (mestrado)—Universidade de Brasília, Universidade Federal da Paraíba, Universidade Federal do Rio Grande do Norte, Programa Multiinstitucional e Inter-regional de Pós-Graduação em Ciências Contábeis, 2016.
Resumo:
Developments in information technology will drive the change in records management; however, it should be the health information managers who drive the information management change. The role of health information management will be challenged to use information technology to broker a range of requests for information from a variety of users, including he alth consumers. The purposes of this paper are to conceptualise the role of health information management in the context of a technologically driven and managed health care environment, and to demonstrat e how this framework has been used to review and develop the undergraduate program in health information management at the Queensland University of Technology.