WorldWideScience

Sample records for providing key information

  1. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  2. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  3. Strategic information systems planning for health service providers.

    Science.gov (United States)

    Moriarty, D D

    1992-01-01

    There is significant opportunity for health service providers to gain competitive advantage through the innovative use of strategic information systems. This analysis presents some key strategic information systems issues that will enable managers to identify opportunities within their organizations.

  4. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  5. Architectural Building A Public Key Infrastructure Integrated Information Space

    Directory of Open Access Journals (Sweden)

    Vadim Ivanovich Korolev

    2015-10-01

    Full Text Available The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature. It performs the analysis of trust models at the formation of certificates and their use. The article describes the relationships between the trust model and the architecture public key infrastructure. It contains conclusions in respect of the options for building the public key infrastructure for integrated informationspace.

  6. Providing long-acting reversible contraception services in Seattle school-based health centers: key themes for facilitating implementation.

    Science.gov (United States)

    Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann

    2015-06-01

    The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  7. Key diagnostic information for the oncologist

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2012-01-01

    Full text: The radiologists use many modalities for imaging of oncologic patients. In order to get the most out of these imaging studies oncologist have to provide with precise information: what is the working diagnosis, what treatment the patients has had and what is the clinical question should be answered by imaging study. The main indications for imaging are confirmation of diagnosis, evaluation of the patient for surgery or assessment of response to the therapy. These will influence the choice of the test, the protocol and interpretation of the results. Imaging plays a vital role in the management of patients with cancer. It is important not only for diagnosis, indicating sites of abnormality, and guiding biopsies, but it is also crucial in assessing disease extent and thereby determining treatment. The stage of cancer at the time of diagnosis is a key factor to define prognosis and is important element in determining appropriate treatment. The most clinically used cancer staging system is tumor node metastasis (TNM). Stage is determined from information on the tumor, regional nodes, and metastases and by grouping cases with similar prognosis. The criteria for defining anatomic extent of disease are specific for tumors at different anatomic sites and of different histologic types. Therefore, the criteria for T, N and M are defined separately for each tumor and histologic type. For Hodgkin and other lymphomas, a different system for the extent of disease and prognosis is used. It is mandatory for the radiologist to learn TNM system to provide the oncologist with key diagnostic information. Learning objectives: To understand TNM staging system for the most common malignancies To review the changes from the sixth to the seven edition of the American Joint committee on cancer staging manual To describe diagnostic information provided by CT and MRI in preoperative planning and after therapy To discuss the role of PET/CT imaging in oncology

  8. Information Security Governanceas as Key Performance Indicator for Financial Institutions

    OpenAIRE

    Krjukovs, D; Strauss, R

    2009-01-01

    Due to their nature financial institutions and their performance are in constant focus of attention from different stakeholder groups. These groups according to their functions and interests are implementing different sets of key performance indicators for financial institution performance assessment. In the proposed paper authors present a hypothesis of information security governance being a financial institution key performance indicator. Authors provide high level overview of ...

  9. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  10. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  11. Multicomponent reactions provide key molecules for secret communication.

    Science.gov (United States)

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  12. Patron Banning in the Nightlife Entertainment Districts: A Key Informant Perspective.

    Science.gov (United States)

    Miller, Peter; Curtis, Ashlee; Palmer, Darren; Warren, Ian; McFarlane, Emma

    2016-07-01

    Alcohol-related harm in and around licensed venues is associated with substantial costs. Many interventions have been introduced in an effort to combat these harms, and one such intervention is known as patron banning. Patron banning involves prohibiting patrons who have been violent or disorderly in a licensed venue in an attempt to reduce alcohol-related harm. It can be implemented by the venue, by members of police, or by liquor accords. This study aimed to obtain key informant perspectives on the benefits of patron banning as well as on the effectiveness of patron banning in reducing alcohol-related harm. Thirty-six key informants provided perspectives on patron banning through in-depth interviews that were part of a larger study. Key informants were supportive of patron banning for reducing alcohol-related harm, noting that it had many benefits including increased venue safety, general risk management, and deterrence of antisocial behavior. Although processes for banning were not always consistent, identification scanners were generally recognized as a way to ensure that patron banning was enforced. Key informants viewed patron banning as an effective measure for increasing patron safety and reducing alcohol-related harms.

  13. Obtaining and providing health information in the community pharmacy setting.

    Science.gov (United States)

    Iwanowicz, Susan L; Marciniak, Macary Weck; Zeolla, Mario M

    2006-06-15

    Community pharmacists are a valuable information resource for patients and other healthcare providers. The advent of new information technology, most notably the Internet, coupled with the rapid availability of new healthcare information, has fueled this demand. Pharmacy students must receive training that enables them to meet this need. Community advanced pharmacy practice experiences (APPEs) provide an excellent opportunity for students to develop and master drug information skills in a real-world setting. Preceptors must ensure that students are familiar with drug information resources and can efficiently identify the most useful resource for a given topic. Students must also be trained to assess the quality of resources and use this information to effectively respond to drug or health information inquiries. This article will discuss key aspects of providing drug information in the community pharmacy setting and can serve as a guide and resource for APPE preceptors.

  14. Space-based observatories providing key data for climate change applications

    Science.gov (United States)

    Lecomte, J.; Juillet, J. J.

    2016-12-01

    The Sentinel-1 & 3 mission are part of the Copernicus program, previously known as GMES (Global Monitoring for Environment and Security), whose overall objective is to support Europe's goals regarding sustainable development and global governance of the environment by providing timely and quality data, information, services and knowledge. This European Earth Observation program is led by the European Commission and the space infrastructure is developed under the European Space Agency leadership. Many services will be developed through the Copernicus program among different thematic areas. The climate change is one of this thematic area and the Sentinel-1 & 3 satellites will provide key space-based observations in this area. The Sentinel-1 mission is based on a constellation of 2 identical satellites each one embarking C-SAR Instrument and provides capability for continuous radar mapping of the Earth with enhanced revisit frequency, coverage, timeliness and reliability for operational services and applications requiring long time series. In particular, Sentinel 1 provides all-weather, day-and-night estimates of soil moisture, wind speed and direction, sea ice, continental ice sheets and glaciers. The Sentinel-3 mission will mainly be devoted to the provision of Ocean observation data in routine, long term (20 years of operations) and continuous fashion with a consistent quality and a very high level of availability. Among these data, very accurate surface temperatures and topography measurements will be provided and will constitute key indicators, once ingested in climate change models, for identifying climate drivers and expected climate impacts. The paper will briefly recall the satellite architectures, their main characteristics and performance. The inflight performance and key features of their images or data of the 3 satellites namely Sentinel 1A, 1B and 3A will be reviewed to demonstrate the quality and high scientific potential of the data as well as their

  15. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  16. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  17. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  18. PROVIDING QUALITY – A KEY TO SUCCESS

    OpenAIRE

    Oana Staiculescu; Angel-Cristian Staiculescu

    2012-01-01

    Providing a high quality products and services is a key to business success. That is because high quality promotes customer satisfaction and customer satisfaction has a direct link to business revenue. Clients want quality products and services in order to feel they are getting value for money, especially in these hard economic times. Although it is well known that advertising may win new customers, quality can be the reason to keep them. A good manager is aware that the costs of winning mark...

  19. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  20. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    International Nuclear Information System (INIS)

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  1. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  2. Informing parents about expanded newborn screening: influences on provider involvement.

    Science.gov (United States)

    Hayeems, Robin Z; Miller, Fiona A; Little, Julian; Carroll, June C; Allanson, Judith; Chakraborty, Pranesh; Wilson, Brenda J; Bytautas, Jessica P; Christensen, Robert J

    2009-09-01

    Expanded newborn screening (NBS) identifies some disorders for which clinical benefit is uncertain, as well as "incidental" findings (eg, carrier status), thus enhancing the need to inform parents about NBS before sample collection. A self-complete survey was sent to a cross-sectional, stratified, random sample of 5 provider groups in Ontario (obstetricians, midwives, family physicians, pediatricians, and nurses). Univariate and multivariate analyses were used to investigate the effects of core beliefs, perceived barriers, and demographic characteristics on the reported frequency of informing parents about NBS before sample collection. Virtually all of the midwives and almost half of the nurses reported discussing NBS with parents, whereas less than one sixth of the physicians did so. Providers who perceived a responsibility to inform parents were 3 times more likely to report doing so than those who did not perceive this responsibility (odds ratio: 2.9 [95% confidence interval: 2.1-4.1]). Those who lacked confidence to inform parents were 70% less likely to discuss NBS with parents compared with those who did not experience this cognitive barrier (odds ratio: 0.3 [95% confidence interval: 0.2-0.4]). Controlling for these covariates, family physicians and obstetricians were more likely than pediatricians to inform parents. These results provide guidance for capacity building among providers who are positioned to inform parents about NBS before sample collection. Our findings call for targeted educational interventions that consider patterns of provider practice related to prenatal and NBS care, seek to redress confidence limitations, and engage key provider groups in the importance of this professional responsibility.

  3. AIS as key component in modern vessel traffic management and information systems

    Energy Technology Data Exchange (ETDEWEB)

    Lamers, W. [DaimlerChrysler Aerospace AG (DASA), Ulm (Germany)

    1999-07-01

    The objective of this paper is to provide information in respect to universal shipborne identification system (UAIS) as main sensor in various vessel traffic applications. The presented paper will give general information concerning AIS functionality and the standardisation process. Based on experience from recent projects and various IALA working group activities, a typical future VTMIS architectures is also presented being based on AIS as key sensor. The required key performance of AIS associated with the HW components will be described. The results from European technology study Indris are presented and discussed. Finally, a summary and conclusion from the presented material will complete the technical paper. The elaboration of this presentation has been carried out as a joint task between Mr. Andre van Berg, MDS Suedafrika und Mr. Walter Lamers, DASA Ulm. (orig.)

  4. Therapy Provider Phase Information

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Therapy Provider Phase Information dataset is a tool for providers to search by their National Provider Identifier (NPI) number to determine their phase for...

  5. Collaboration between employers and occupational health service providers: a systematic review of key characteristics.

    Science.gov (United States)

    Halonen, Jaana I; Atkins, Salla; Hakulinen, Hanna; Pesonen, Sanna; Uitti, Jukka

    2017-01-05

    Employees are major contributors to economic development, and occupational health services (OHS) can have an important role in supporting their health. Key to this is collaboration between employers and OHS. We reviewed the evidence regarding the characteristics of good collaboration between employers and OHS providers that is essential to construct more effective collaboration and services. A systematic review of the factors of good collaboration between employers and OHS providers was conducted. We searched five databases between January 2000 and March 2016 and back referenced included articles. Two reviewers evaluated 639 titles, 63 abstracts and 20 full articles, and agreed that six articles, all on qualitative studies, met the predetermined relevance and publication criteria and were included. Data were extracted by one reviewer and checked by a second reviewer and analysed using thematic analysis. Three themes and nine subthemes related to good collaboration were identified. The first theme included time, space and contract requirements for effective collaboration with three subthemes (i.e., key characteristics): flexible OHS/flexible contracts including tailor-made services accounting for the needs of the employer, geographical proximity of the stakeholders allowing easy access to services, and long-term contracts as collaboration develops over time. The second theme was related to characteristics of the dialogue in effective collaboration that consisted of shared goals, reciprocity, frequent contact and trust. According to the third theme the definition of roles of the stakeholders was important; OHS providers should have competence and knowledge about the workplace, become strategic partners with the employers as well as provide quality services. Although literature regarding collaboration between the employers and OHS providers was limited, we identified several key factors that contribute to effective collaboration. This information is useful in

  6. Collaboration between employers and occupational health service providers: a systematic review of key characteristics

    Directory of Open Access Journals (Sweden)

    Jaana I. Halonen

    2017-01-01

    Full Text Available Abstract Background Employees are major contributors to economic development, and occupational health services (OHS can have an important role in supporting their health. Key to this is collaboration between employers and OHS. We reviewed the evidence regarding the characteristics of good collaboration between employers and OHS providers that is essential to construct more effective collaboration and services. Methods A systematic review of the factors of good collaboration between employers and OHS providers was conducted. We searched five databases between January 2000 and March 2016 and back referenced included articles. Two reviewers evaluated 639 titles, 63 abstracts and 20 full articles, and agreed that six articles, all on qualitative studies, met the predetermined relevance and publication criteria and were included. Data were extracted by one reviewer and checked by a second reviewer and analysed using thematic analysis. Results Three themes and nine subthemes related to good collaboration were identified. The first theme included time, space and contract requirements for effective collaboration with three subthemes (i.e., key characteristics: flexible OHS/flexible contracts including tailor-made services accounting for the needs of the employer, geographical proximity of the stakeholders allowing easy access to services, and long-term contracts as collaboration develops over time. The second theme was related to characteristics of the dialogue in effective collaboration that consisted of shared goals, reciprocity, frequent contact and trust. According to the third theme the definition of roles of the stakeholders was important; OHS providers should have competence and knowledge about the workplace, become strategic partners with the employers as well as provide quality services. Conclusion Although literature regarding collaboration between the employers and OHS providers was limited, we identified several key factors that contribute

  7. Stakeholder engagement: a key component of integrating genomic information into electronic health records.

    Science.gov (United States)

    Hartzler, Andrea; McCarty, Catherine A; Rasmussen, Luke V; Williams, Marc S; Brilliant, Murray; Bowton, Erica A; Clayton, Ellen Wright; Faucett, William A; Ferryman, Kadija; Field, Julie R; Fullerton, Stephanie M; Horowitz, Carol R; Koenig, Barbara A; McCormick, Jennifer B; Ralston, James D; Sanderson, Saskia C; Smith, Maureen E; Trinidad, Susan Brown

    2013-10-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine.

  8. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  9. ASSESSMENT OF THE VOLUNTEERED GEOGRAPHIC INFORMATION FEEDBACK SYSTEM FOR THE DUTCH TOPOGRAPHICAL KEY REGISTER

    Directory of Open Access Journals (Sweden)

    M. Grus

    2015-08-01

    Full Text Available Since Topographical Key Register has become an open data the amount of users increased enormously. The highest grow was in the private users group. The increasing number of users and their growing demand for high actuality of the topographic data sets motivates the Dutch Kadaster to innovate and improve the Topographical Key Register (BRT. One of the initiatives was to provide a voluntary geographical information project aiming at providing a user-friendly feedback system adjusted to all kinds of user groups. The feedback system is a compulsory element of the Topographical Key Register in the Netherlands. The Dutch Kadaster is obliged to deliver a feedback system and the key-users are obliged to use it. The aim of the feedback system is to improve the quality and stimulate the usage of the data. The results of the pilot shows that the user-friendly and open to everyone feedback system contributes enormously to improve the quality of the topographic dataset.

  10. 5 CFR 890.910 - Provider information.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Provider information. 890.910 Section 890.910 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS..., and FEHB Benefit Payments § 890.910 Provider information. The hospital provider information used to...

  11. Perceptions of climate change and trust in information providers in rural Australia.

    Science.gov (United States)

    Buys, Laurie; Aird, Rosemary; van Megen, Kimberley; Miller, Evonne; Sommerfeld, Jeffrey

    2014-02-01

    Disagreement within the global science community about the certainty and causes of climate change has led the general public to question what to believe and whom to trust on matters related to this issue. This paper reports on qualitative research undertaken with Australian residents from two rural areas to explore their perceptions of climate change and trust in information providers. While overall, residents tended to agree that climate change is a reality, perceptions varied in terms of its causes and how best to address it. Politicians, government, and the media were described as untrustworthy sources of information about climate change, with independent scientists being the most trusted. The vested interests of information providers appeared to be a key reason for their distrust. The findings highlight the importance of improved transparency and consultation with the public when communicating information about climate change and related policies.

  12. Characterizing Urban Air Quality to Provide Actionable Information

    Science.gov (United States)

    Lary, D. J.

    2017-12-01

    The urbanization of national and global populations is associated with increasing challenges to creation of sustainable and livable communities. In urban environments, there is currently a lack of accurate actionable information on atmospheric composition on fine spatial and temporal scales. There is a pressing need to better characterize the complex spatial distribution of environmental features of cityscapes and improve understanding of their relationship to health and quality of life. This talk gives an overview of integrating sensing of atmospheric composition on multiple scales using a wide range of devices from distributed low cost-sensors, to aerial vehicles, to satellites. Machine learning plays a key role in providing both the cross-calibration and turning the exposure dosimetry into actionable insights for urban environments.

  13. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  14. Informed consent - Providing information about prenatal examinations

    DEFF Research Database (Denmark)

    Dahl, Katja; Kesmodel, Ulrik; Hvidman, Lone

    as well.The review is based on systematic search strategy in the electronic databases Medline and Science Citation. Additional studies were identified through reference lists of individual papers obtained. Improving knowledge scores and reducing decisional conflict can be obtained by group counselling...... pregnant women about prenatal examinations. Women's knowledge, decisional conflict, satisfaction and anxiety will be explored as compared with different ways and different groups of health professionals providing information. To what extent information empowers informed decision making will be explored...

  15. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  16. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  17. Key concepts in MR spectroscopy and practical approaches to gaining biochemical information in children

    Energy Technology Data Exchange (ETDEWEB)

    Astrakas, Loukas G. [University of Ioannina, Medical Physics, Medical School, P.O. Box 1186, Ioannina (Greece); Argyropoulou, Maria I. [University of Ioannina, Radiology, Medical School, Ioannina (Greece)

    2016-06-15

    Magnetic resonance spectroscopy (MRS) provides independent biochemical information and has become an invaluable adjunct to MRI and other imaging modalities. This review introduces key concepts and presents basic methodological steps regarding the acquisition and the interpretation of proton MRS. We review major brain metabolites and discuss MRS dependence on age, location, echo time and field strength. (orig.)

  18. World Key Information Service System Designed For EPCOT Center

    Science.gov (United States)

    Kelsey, J. A.

    1984-03-01

    An advanced Bell Laboratories and Western Electric designed electronic information retrieval system utilizing the latest Information Age technologies, and a fiber optic transmission system is featured at the Walt Disney World Resort's newest theme park - The Experimental Prototype Community of Tomorrow (EPCOT Center). The project is an interactive audio, video and text information system that is deployed at key locations within the park. The touch sensitive terminals utilizing the ARIEL (Automatic Retrieval of Information Electronically) System is interconnected by a Western Electric designed and manufactured lightwave transmission system.

  19. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  20. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  1. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    Science.gov (United States)

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  2. Internet health information in the patient-provider dialogue.

    Science.gov (United States)

    Hong, Traci

    2008-10-01

    A patient discussing Internet health information with a health care provider (referred to as "patient-provider communication about Internet health information") can contribute positively to health outcomes. Although research has found that once Internet access is achieved, there are no ethnic differences in Internet health information seeking, it is unclear if there are ethnic differences in patient-provider communication about Internet health information. To help fill this gap in the literature, the National Cancer Institute's Health Information National Trends Survey 2005 was analyzed with Stata 9. Two sets of logistic regression analyses were conducted, one for a subsample of Internet users (n = 3,244) and one for a subsample of Internet users who are first-generation immigrants (n = 563). The dependent variable was patient-provider communication about Internet health information, which assessed whether survey participants had discussed online health information with a health care provider. The predictor variables included trust of health care provider, trust of online health information, Internet use, health care coverage, frequency of visits to health care provider, health status, and demographics. Among all Internet users, Whites had higher levels of patient-provider communication about Internet health information than Blacks and Asians. Similarly, among Internet users who are immigrants, Whites had higher levels of patient-provider communication about Internet health information than Blacks and Asians. While the digital divide is narrowing in terms of Internet access, racial differences in patient-provider communication about Internet health information may undermine the potential benefits of the information age.

  3. Aerosol typing - key information from aerosol studies

    Science.gov (United States)

    Mona, Lucia; Kahn, Ralph; Papagiannopoulos, Nikolaos; Holzer-Popp, Thomas; Pappalardo, Gelsomina

    2016-04-01

    Aerosol typing is a key source of aerosol information from ground-based and satellite-borne instruments. Depending on the specific measurement technique, aerosol typing can be used as input for retrievals or represents an output for other applications. Typically aerosol retrievals require some a priori or external aerosol type information. The accuracy of the derived aerosol products strongly depends on the reliability of these assumptions. Different sensors can make use of different aerosol type inputs. A critical review and harmonization of these procedures could significantly reduce related uncertainties. On the other hand, satellite measurements in recent years are providing valuable information about the global distribution of aerosol types, showing for example the main source regions and typical transport paths. Climatological studies of aerosol load at global and regional scales often rely on inferred aerosol type. There is still a high degree of inhomogeneity among satellite aerosol typing schemes, which makes the use different sensor datasets in a consistent way difficult. Knowledge of the 4d aerosol type distribution at these scales is essential for understanding the impact of different aerosol sources on climate, precipitation and air quality. All this information is needed for planning upcoming aerosol emissions policies. The exchange of expertise and the communication among satellite and ground-based measurement communities is fundamental for improving long-term dataset consistency, and for reducing aerosol type distribution uncertainties. Aerosol typing has been recognized as one of its high-priority activities of the AEROSAT (International Satellite Aerosol Science Network, http://aero-sat.org/) initiative. In the AEROSAT framework, a first critical review of aerosol typing procedures has been carried out. The review underlines the high heterogeneity in many aspects: approach, nomenclature, assumed number of components and parameters used for the

  4. Implementation of eMental Health care: viewpoints from key informants from organizations and agencies with eHealth mandates.

    Science.gov (United States)

    Wozney, Lori; Newton, Amanda S; Gehring, Nicole D; Bennett, Kathryn; Huguet, Anna; Hartling, Lisa; Dyson, Michele P; McGrath, Patrick

    2017-06-02

    The use of technology such as computers, tablets, and smartphones to improve access to and the delivery of mental health care (eMental Health care) is growing worldwide. However, despite the rapidly expanding evidence base demonstrating the efficacy of eMental Health care, its implementation in clinical practice and health care systems remains fragmented. To date, no peer-reviewed, key-informant studies have reported on the perspectives of decision-makers concerned with whether and how to implement eMental Health care. From September to November 2015, we conducted 31 interviews with key informants responsible for leadership, policy, research, and/ or information technology in organizations influential in the adoption of technology for eMental Health care. Deductive and inductive thematic analyses of transcripts were conducted using the Behavior Change Wheel as an organizing framework. Frequency and intensity effect sizes were calculated for emerging themes to further explore patterns within the data. Key informant responses (n = 31) representing 6 developed countries and multiple organizations showed consensus on common factors impacting implementation: individual and organizational capacities (e.g., computer literacy skills [patients and providers], knowledge gaps about cyber security, limited knowledge of available services); motivational drivers of technology-based care (e.g., extending care, data analytics); and opportunities for health systems to advance eMental Health care implementation (e.g., intersectoral research, rapid testing cycles, sustainable funding). Frequency effect sizes showed strong associations between implementation and credibility, knowledge, workflow, patient empowerment, electronic medical record (EMR) integration, sustained funding and intersectoral networks. Intensity effect sizes showed the highest concentration of statements (>10% of all comments) related to funding, credibility, knowledge gaps, and patient empowerment. This study

  5. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  6. Evaluation of poison information services provided by a new poison information center.

    Science.gov (United States)

    Churi, Shobha; Abraham, Lovin; Ramesh, M; Narahari, M G

    2013-01-01

    The aim of this study is to assess the nature and quality of services provided by poison information center established at a tertiary-care teaching hospital, Mysore. This was a prospective observational study. The poison information center was officially established in September 2010 and began its functioning thereafter. The center is equipped with required resources and facility (e.g., text books, Poisindex, Drugdex, toll free telephone service, internet and online services) to provide poison information services. The poison information services provided by the center were recorded in documentation forms. The documentation form consists of numerous sections to collect information on: (a) Type of population (children, adult, elderly or pregnant) (b) poisoning agents (c) route of exposure (d) type of poisoning (intentional, accidental or environmental) (e) demographic details of patient (age, gender and bodyweight) (f) enquirer details (background, place of call and mode of request) (g) category and purpose of query and (h) details of provided service (information provided, mode of provision, time taken to provide information and references consulted). The nature and quality of poison information services provided was assessed using a quality assessment checklist developed in accordance with DSE/World Health Organization guidelines. Chi-Square test (χ(2)). A total of 419 queries were received by the center. A majority (n = 333; 79.5%) of the queries were asked by the doctors to provide optimal care (n = 400; 95.5%). Most of the queries were received during ward rounds (n = 201; 48.0%), followed by direct access (n = 147; 35.1%). The poison information services were predominantly provided through verbal communication (n = 352; 84.0%). Upon receipt of queries, the required service was provided immediately (n = 103; 24.6%) or within 10-20 min (n = 296; 70.6%). The queries were mainly related to intentional poisoning (n = 258; 64.5%), followed by accidental poisoning

  7. Application of Ethics for Providing Telemedicine Services and Information Technology.

    Science.gov (United States)

    Langarizadeh, Mostafa; Moghbeli, Fatemeh; Aliabadi, Ali

    2017-10-01

    Advanced technology has increased the use of telemedicine and Information Technology (IT) in treating or rehabilitating diseases. An increased use of technology increases the importance of the ethical issues involved. The need for keeping patients' information confidential and secure, controlling a number of therapists' inefficiency as well as raising the quality of healthcare services necessitates adequate heed to ethical issues in telemedicine provision. The goal of this review is gathering all articles that are published through 5 years until now (2012-2017) for detecting ethical issues for providing telemedicine services and Information technology. The reason of this time is improvement of telemedicine and technology through these years. This article is important for clinical practice and also to world, because of knowing ethical issues in telemedicine and technology are always important factors for physician and health providers. the required data in this research were derived from published electronic sources and credible academic articles published in such databases as PubMed, Scopus and Science Direct. The following key words were searched for in separation and combination: tele-health, telemedicine, ethical issues in telemedicine. A total of 503 articles were found. After excluding the duplicates (n= 93), the titles and abstracts of 410 articles were skimmed according to the inclusion criteria. Finally, 64 articles remained. They were reviewed in full text and 36 articles were excluded. At the end, 28 articles were chosen which met our eligibility criteria and were included in this study. Ethics has been of a great significance in IT and telemedicine especially the Internet since there are more chances provided for accessing information. It is, however, accompanied by a threat to patients' personal information. Therefore, suggestions are made to investigate ethics in technology, to offer standards and guidelines to therapists. Due to the advancement in

  8. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  9. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  10. Building Successful Information Systems – a Key for Successful Organization

    Directory of Open Access Journals (Sweden)

    Doina ROSCA

    2010-12-01

    Full Text Available Building Successful Information Systems – a Key for Successful OrganizationAbstract: An Information System (IS can have a major impact on corporate strategy and organizational success. The involvement of managers and decision makers in all aspects of information systems is a major factor for organizational success, including higher profits and lower costs. Some of the benefits business organization seek to achieve through information systems include: better safety, competitive advantage, fewer errors, greater accuracy, higher quality products, improved communications, increased efficiency and productivity, more efficient administration, superior financial and managerial decision making.

  11. Key performance indicators to benchmark hospital information systems - a delphi study.

    Science.gov (United States)

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  12. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  13. E-Skill Information Acquisition Software: A Key to Poverty Alleviation ...

    African Journals Online (AJOL)

    E-Skill Information Acquisition Software: A Key to Poverty Alleviation Or Self Reliance. ... has not helped matters. This project is about developing an e-skill transfer using software. ... Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  14. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  15. Federated health information architecture: Enabling healthcare providers and policymakers to use data for decision-making.

    Science.gov (United States)

    Kumar, Manish; Mostafa, Javed; Ramaswamy, Rohit

    2018-05-01

    Health information systems (HIS) in India, as in most other developing countries, support public health management but fail to enable healthcare providers to use data for delivering quality services. Such a failure is surprising, given that the population healthcare data that the system collects are aggregated from patient records. An important reason for this failure is that the health information architecture (HIA) of the HIS is designed primarily to serve the information needs of policymakers and program managers. India has recognised the architectural gaps in its HIS and proposes to develop an integrated HIA. An enabling HIA that attempts to balance the autonomy of local systems with the requirements of a centralised monitoring agency could meet the diverse information needs of various stakeholders. Given the lack of in-country knowledge and experience in designing such an HIA, this case study was undertaken to analyse HIS in the Bihar state of India and to understand whether it would enable healthcare providers, program managers and policymakers to use data for decision-making. Based on a literature review and data collected from interviews with key informants, this article proposes a federated HIA, which has the potential to improve HIS efficiency; provide flexibility for local innovation; cater to the diverse information needs of healthcare providers, program managers and policymakers; and encourage data-based decision-making.

  16. Perspectives on impacts of water quality on agriculture and community well-being-a key informant study from Sri Lanka.

    Science.gov (United States)

    Thoradeniya, Bhadranie; Pinto, Uthpala; Maheshwari, Basant

    2017-11-04

    Integrated management of water quality is critical for sustaining food production and achieving overall well-being of a community. Further, understanding people's perceptions and engagement can play an important role in achieving water and food security. The main aim of this study was to investigate the perspectives of community and other stakeholders as to how water quality impacts on agriculture, livelihood and community well-being within rural farming communities of two dry zone districts of Sri Lanka. The study adopted 'key informant interviews' as the methodology to investigate community and other stakeholder perspectives to collect primary data over a period of four months. The interview contents were then examined using a frequency matrix and graphed using an Excel graphing tool. The raw text was also analysed to understand the broader patterns in the text. A fuzzy logic cognitive map (FCM) was developed using the relationships between various concepts and linkages provided by the key informants. All key informants were concerned with the quality of drinking water they consume and the water used for their food preparation. Key informants representing the farming community indicated that the use of poor quality groundwater with higher levels of hardness has made growing crops difficult in the region. The key informants also identified extensive and ongoing use of agro-chemicals and fertilisers as a major source of pollution in water bodies in both spatio-temporal scale. Based on key informant interviews, possible initiatives that can help improve surface water and groundwater qualities for both drinking and agricultural use in the dry zone of Sri Lanka can be categorised into four broader themes, viz., provision of filtering/treatment systems, reduction in the use of agro-chemical and fertilisers, education of community stakeholders and support of alternative options for portable water supplies. The study indicates that in the key informants' view of

  17. Satisfaction with information provided to Danish cancer patients

    DEFF Research Database (Denmark)

    Ross, Lone; Petersen, Morten Aagaard; Johnsen, Anna Thit

    2013-01-01

    To validate five items (CPWQ-inf) regarding satisfaction with information provided to cancer patients from health care staff, assess the prevalence of dissatisfaction with this information, and identify factors predicting dissatisfaction.......To validate five items (CPWQ-inf) regarding satisfaction with information provided to cancer patients from health care staff, assess the prevalence of dissatisfaction with this information, and identify factors predicting dissatisfaction....

  18. Business intelligence key to success in the information age

    Directory of Open Access Journals (Sweden)

    Helmer Muñoz-Hernández

    2017-02-01

    Full Text Available This article aims to describe and classify in a more concrete way information systems, which are framed in what is properly called as "business intelligence". It begins analyzing each of the basic concepts and theoretical aspects and then detail in shaping transactional systems and the most important strategic systems including their benefits, their modes of use, and its disadvantages; It reflects on some cases actually exposed business globally, and the impact it has had the adoption of information systems in its corporate strategy as a key competitive advantages achieving considerable success. Finally, it concludes by describing the importance that has had the implementation of at least some of these information systems in strategic planning of organizations, especially in Colombia and Latin America.

  19. Primary Care Provider Views About Usefulness and Dissemination of a Web-Based Depression Treatment Information Decision Aid.

    Science.gov (United States)

    Beaulac, Julie; Westmacott, Robin; Walker, John R; Vardanyan, Gohar

    2016-06-08

    Decisions related to mental health are often complex, problems often remain undetected and untreated, information unavailable or not used, and treatment decisions frequently not informed by best practice or patient preferences. The objective of this paper was to obtain the opinions of health professionals working in primary health care settings about a Web-based information decision aid (IDA) for patients concerning treatment options for depression and the dissemination of the resources in primary care settings. Participants were recruited from primary care clinics in Winnipeg and Ottawa, Canada, and included 48 family physicians, nurses, and primary care staff. The study design was a qualitative framework analytic approach of 5 focus groups. Focus groups were conducted during regular staff meetings, were digitally recorded, and transcripts created. Analysis involved a content and theme analysis. Seven key themes emerged including the key role of the primary care provider, common questions about treatments, treatment barriers, sources of patient information, concern about quality and quantity of available information, positive opinions about the IDA, and disseminating the IDA. The most common questions mentioned were about medication and side effects and alternatives to medication. Patients have limited access to alternative treatment options owing to cost and availability. Practitioners evaluated the IDA positively. The resources were described as useful, supportive of providers' messages, and accessible for patients. There was unanimous consensus that information needs to be available electronically through the Internet.

  20. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  1. ADDRESSING VIEWS OF KEY INFORMANTS WHO ARE WORKING FOR WOMEN RIGHTS REGARDING INTIMATE PARTNER VIOLENCE

    Directory of Open Access Journals (Sweden)

    Nan Kyi Pyar Si

    2017-10-01

    Full Text Available Some married women are experiencing different types of intimate partner violence by their current or former husband. However, the awareness and services for those women are still needed. This study explored the key informants’ perspectives to provide more comprehensive services to those women. Qualitative feminist method was used and five participants were purposefully selected to interview in depth. Key informants reflected upon intimate partner violence as causes of intimate partner violence, why intimate partner violence cases were underreported, why didn’t women leave their violent partner, what they actually felt for intimate partner violence, gaps with intervention for survivors and planning for better outcome. It was found that awareness among women who experiencing violence and the people around them needed to be raised. And services provided for them also needed to be more concise and updated. Therefore, it is essentially important to extend education session to all people regarding violence against women. Collaboration and cooperation of government and non-governmental organizations is also helpful to decrease various kinds of violence committed to women.

  2. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  3. Pocket radar guide key facts, equations, and data

    CERN Document Server

    Curry, G Richard

    2010-01-01

    ThePocket Radar Guideis a concise collection of key radar facts and important radar data that provides you with necessary radar information when you are away from your office or references. It includes statements and comments on radar design, operation, and performance; equations describing the characteristics and performance of radar systems and their components; and tables with data on radar characteristics and key performance issues.It is intended to supplement other radar information sources by providing a pocket companion to refresh memory and provide details whenever you need them such a

  4. Pharmacy staff perceptions and self-reported behaviors related to providing contraceptive information and counseling.

    Science.gov (United States)

    Batra, Peter; Aquilino, Mary L; Farris, Karen B

    2015-01-01

    To evaluate pharmacy staff perspectives of a 2-year pharmacy intervention aimed at reducing unintended pregnancy in 18- to 30-year-old women. Pharmacy staff completed a 48-item, self-administered paper survey consisting of scaled and open-ended questions. 55 community pharmacies in 12 Iowa counties. All pharmacy staff participated, including pharmacists, pharmacy technicians, and other pharmacy employees. Online continuing education (CE) training was made available to all pharmacy staff. Promotional materials including posters, brochures, and shelf talkers were displayed in all of the pharmacies. Pharmacy staff perceptions and self-reported behaviors related to displaying posters, brochures, and shelf talkers in their pharmacies and providing contraceptive information and counseling to patients/customers. A total of 192 (43% return rate) pharmacy staff responded. Only 44% of respondents consistently provided contraceptive information and counseling, yet more than 90% felt that talking with patients/customers about contraceptives was easy, and more than 50% could do so privately. The study showed increased pharmacy staff desire to make this topic a priority. Community pharmacy staff can play a key role in educating and counseling young adult women about contraceptive health and pregnancy planning. This study indicates that staff are comfortable providing this service and that patients/customers are open to receiving guidance from pharmacists. However, pharmacy staff are missing additional opportunities to provide information and counseling. There is also a need for greater attention to provision of nonprescription contraceptive education.

  5. INTEGRATED INFORMATION SYSTEM ARCHITECTURE PROVIDING BEHAVIORAL FEATURE

    Directory of Open Access Journals (Sweden)

    Vladimir N. Shvedenko

    2016-11-01

    Full Text Available The paper deals with creation of integrated information system architecture capable of supporting management decisions using behavioral features. The paper considers the architecture of information decision support system for production system management. The behavioral feature is given to an information system, and it ensures extraction, processing of information, management decision-making with both automated and automatic modes of decision-making subsystem being permitted. Practical implementation of information system with behavior is based on service-oriented architecture: there is a set of independent services in the information system that provides data of its subsystems or data processing by separate application under the chosen variant of the problematic situation settlement. For creation of integrated information system with behavior we propose architecture including the following subsystems: data bus, subsystem for interaction with the integrated applications based on metadata, business process management subsystem, subsystem for the current state analysis of the enterprise and management decision-making, behavior training subsystem. For each problematic situation a separate logical layer service is created in Unified Service Bus handling problematic situations. This architecture reduces system information complexity due to the fact that with a constant amount of system elements the number of links decreases, since each layer provides communication center of responsibility for the resource with the services of corresponding applications. If a similar problematic situation occurs, its resolution is automatically removed from problem situation metamodel repository and business process metamodel of its settlement. In the business process performance commands are generated to the corresponding centers of responsibility to settle a problematic situation.

  6. Childhood disability in Malawi: a population based assessment using the key informant method.

    Science.gov (United States)

    Tataryn, Myroslava; Polack, Sarah; Chokotho, Linda; Mulwafu, Wakisa; Kayange, Petros; Banks, Lena Morgon; Noe, Christiane; Lavy, Chris; Kuper, Hannah

    2017-11-28

    Epidemiological data on childhood disability are lacking in Low and Middle Income countries (LMICs) such as Malawi, hampering effective service planning and advocacy. The Key Informant Method (KIM) is an innovative, cost-effective method for generating population data on the prevalence and causes of impairment in children. The aim of this study was to use the Key Informant Method to estimate the prevalence of moderate/severe, hearing, vision and physical impairments, intellectual impairments and epilepsy in children in two districts in Malawi and to estimate the associated need for rehabilitation and other services. Five hundred key informants (KIs) were trained to identify children in their communities who may have the impairment types included in this study. Identified children were invited to attend a screening camp where they underwent assessment by medical professionals for moderate/severe hearing, vision and physical impairments, intellectual impairments and epilepsy. Approximately 15,000 children were identified by KIs as potentially having an impairment of whom 7220 (48%) attended a screening camp. The estimated prevalence of impairments/epilepsy was 17.3/1000 children (95% CI: 16.9-17.7). Physical impairment (39%) was the commonest impairment type followed by hearing impairment (27%), intellectual impairment (26%), epilepsy (22%) and vision impairment (4%). Approximately 2100 children per million population could benefit from physiotherapy and occupational therapy and 300 per million are in need of a wheelchair. An estimated 1800 children per million population have hearing impairment caused by conditions that could be prevented or treated through basic primary ear care. Corneal opacity was the leading cause of vision impairment. Only 50% of children with suspected epilepsy were receiving medication. The majority (73%) of children were attending school, but attendance varied by impairment type and was lowest among children with multiple impairments (38

  7. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    Science.gov (United States)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  8. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  9. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  10. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  11. Biogeochemical cycles and biodiversity as key drivers of ecosystem services provided by soils

    Science.gov (United States)

    Smith, P.; Cotrufo, M. F.; Rumpel, C.; Paustian, K.; Kuikman, P. J.; Elliott, J. A.; McDowell, R.; Griffiths, R. I.; Asakawa, S.; Bustamante, M.; House, J. I.; Sobocká, J.; Harper, R.; Pan, G.; West, P. C.; Gerber, J. S.; Clark, J. M.; Adhya, T.; Scholes, R. J.; Scholes, M. C.

    2015-06-01

    Soils play a pivotal role in major global biogeochemical cycles (carbon, nutrient and water), while hosting the largest diversity of organisms on land. Because of this, soils deliver fundamental ecosystem services, and management to change a soil process in support of one ecosystem service can either provide co-benefits to other services or can result in trade-offs. In this critical review, we report the state-of-the-art understanding concerning the biogeochemical cycles and biodiversity in soil, and relate these to the provisioning, regulating, supporting and cultural ecosystem services which they underpin. We then outline key knowledge gaps and research challenges, before providing recommendations for management activities to support the continued delivery of ecosystem services from soils. We conclude that although there are knowledge gaps that require further research, enough is known to start improving soils globally. The main challenge is in finding ways to share knowledge with soil managers and policy-makers, so that best-practice management can be implemented. A key element of this knowledge sharing must be in raising awareness of the multiple ecosystem services underpinned by soils, and the natural capital they provide. The International Year of Soils in 2015 presents the perfect opportunity to begin a step-change in how we harness scientific knowledge to bring about more sustainable use of soils for a secure global society.

  12. The core business web a guide to key information resources

    CERN Document Server

    White, Gary W

    2013-01-01

    The best Business Web sites at your fingertips—24/7! The Core Business Web: A Guide to Key Information Resources is an essential resource that saves you from spending hours searching through thousands of Web sites for the business information you need. A distinguished panel of authors, all active in business librarianship, explores Web sites in their subject areas, selecting the very best from 25 functional areas of business. Each site was chosen based on the timeliness, relevance and reliability of its content, the site's ease of navigation and use, and the authority of the site's author or publisher. The rapid growth of the Internet has resulted in an ever-increasing number of Web sites offering potentially useful business information. The Core Business Web identifies, evaluates, and summarizes the most significant sites, including gateways or portals, directories, and meta-sites, to organize online resources into easy-to-follow links that allow you to access information quickly. Sites are categorized and ...

  13. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    International Nuclear Information System (INIS)

    Lan, Ganhui; Tu, Yuhai

    2016-01-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  14. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  15. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  16. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  17. Knowledge, skills, and abilities for key radiation protection positions at DOE facilities

    International Nuclear Information System (INIS)

    1997-01-01

    This document provides detailed qualification criteria for contractor key radiation protection personnel. Although federal key radiation protection positions are also identified, qualification standards for federal positions are provided in DOE O 360.1 and the DOE Technical Qualifications Program. Appendices B and D provide detailed listings for knowledge, skills, and abilities for contractor and DOE federal key radiation protection positions. This information may be used in developing position descriptions and individual development plans. Information provided in Appendix C may be useful in developing performance measures and assessing an individual's performance in his or her specific position. Additionally, Federal personnel may use this information to augment their Office/facility qualification standards under the Technical Qualifications Program

  18. COST ACCOUNTING AS THE KEY INFORMATION CORE OF THE COMPANY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Radmila Jablan STEFANOVIĆ

    2010-12-01

    Full Text Available The management is expected to lead the company towards the achievement of set objectives which, in the contemporary settings of marked external and internal complexity, inevitably requires sophisticated expert knowledge and skills, as well as quality information support. Cost accounting generates cost and performance information with the goal of qualitatively meeting information needs of, above all, internal users. It represents the essential part of the company’s accounting information system as a whole and it is often stressed as the key information core and a reliable information support for the company’s management in performing their managerial activities. The contemporary business environment inevitably requires the restructuring of cost accounting and new approaches to costing and cost management, in the attempt to improve the quality of cost information that has always been the object of particular interest. Moreover, only a flexibly designed cost accounting information system can qualitatively respond to the increasingly numerous and various information requirements. In this paper we discuss the role cost accounting has in offering adequate information support to managers at all managerial levels. We emphasize some of the new tools, techniques, concepts and approaches to costing and cost management

  19. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  20. Campus Health Centers' Lack of Information Regarding Providers: A Content Analysis of Division-I Campus Health Centers' Provider Websites.

    Science.gov (United States)

    Perrault, Evan K

    2018-07-01

    Campus health centers are a convenient, and usually affordable, location for college students to obtain health care. Staffed by licensed and trained professionals, these providers can generally offer similar levels of care that providers at off-campus clinics can deliver. Yet, previous research finds students may forgo this convenient, on-campus option partially because of a lack of knowledge regarding the quality of providers at these campus clinics. This study sought to examine where this information deficit may come from by analyzing campus health centers' online provider information. All Division-I colleges or universities with an on-campus health center, which had information on their websites about their providers (n = 294), had their providers' online information analyzed (n = 2,127 providers). Results revealed that schools commonly offer professional information (e.g., provider specialties, education), but very little about their providers outside of the medical context (e.g., hobbies) that would allow a prospective student patient to more easily relate. While 181 different kinds of credentials were provided next to providers' names (e.g., MD, PA-C, FNP-BC), only nine schools offered information to help students understand what these different credentials meant. Most schools had information about their providers within one-click of the homepage. Recommendations for improving online information about campus health center providers are offered.

  1. Sealed Radioactive Sources. Information, Resources, and Advice for Key Groups about Preventing the Loss of Control over Sealed Radioactive Sources

    International Nuclear Information System (INIS)

    2013-10-01

    Among its many activities to improve the safety and security of sealed sources, the IAEA has been investigating the root causes of major accidents and incidents since the 1980's and publishes findings so that others can learn from them. There are growing concerns today about the possibility that an improperly stored source could be stolen and used for malicious purposes. To improve both safety and security, information needs to be in the hands of those whose actions and decisions can prevent a source from being lost or stolen in the first place. The IAEA developed this booklet to help improve communication with key groups about hazards that may result from the loss of control over sealed radioactive sources and measures that should be implemented to prevent such loss of control. Many people may benefit from the information contained in this booklet, particularly those working with sources and those likely to be involved if control over a source is lost; especially: officials in government agencies, first responders, medical users, industrial users and the metal recycling industry. The general public may also benefit from an understanding of the fundamentals of radiation safety. This booklet is comprised of several stand-alone chapters intended to communicate with these key groups. Various accidents that are described and information that is provided are relevant to more than one key group and therefore, some information is repeated throughout the booklet. This booklet seeks to raise awareness of the importance of the safety and security of sealed radioactive sources. However, it is not intended to be a comprehensive 'how to' guide for implementing safety and security measures for sealed radioactive sources. For more information on these measures, readers are encouraged to consult the key IAEA safety and security-related publications identified in this booklet

  2. Some Key Technologies of Geospatial Information System for China Water Census

    Directory of Open Access Journals (Sweden)

    CAI Yang

    2015-05-01

    Full Text Available We have pioneered research on geospatial information system for national water census and its application. Aiming to the main issues such as information obtaining, data management, quality control, and project organization, the overall thought is given. It is based on taking fundamental data as supporting and data model as precursor, and viewing intelligent tool as protective role, and combing the management theory with technical methods. The key techniques developed include the digital basin extraction, data modeling orienting to the object of water resources, data acquisition and processing within certain rules and the application of multidimensional theme.

  3. Metagenomes provide valuable comparative information on soil microeukaryotes

    DEFF Research Database (Denmark)

    Jacquiod, Samuel Jehan Auguste; Stenbæk, Jonas; Santos, Susana

    2016-01-01

    has been identified. Our analyses suggest that publicly available metagenome data can provide valuable information on soil microeukaryotes for comparative purposes when handled appropriately, complementing the current view provided by ribosomal amplicon sequencing methods......., providing microbiologists with substantial amounts of accessible information. We took advantage of public metagenomes in order to investigate microeukaryote communities in a well characterized grassland soil. The data gathered allowed the evaluation of several factors impacting the community structure......, including the DNA extraction method, the database choice and also the annotation procedure. While most studies on soil microeukaryotes are based on sequencing of PCR-amplified taxonomic markers (18S rRNA genes, ITS regions), this work represents, to our knowledge, the first report based solely...

  4. Human and Citizen Rights Guarantees While Providing Information Security

    Directory of Open Access Journals (Sweden)

    Serhii Yesimov

    2018-05-01

    Full Text Available With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc. While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information. Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts. Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order. The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court

  5. 30 CFR 206.108 - Does MMS protect information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.108... MANAGEMENT PRODUCT VALUATION Federal Oil § 206.108 Does MMS protect information I provide? Certain information you submit to MMS regarding valuation of oil, including transportation allowances, may be exempt...

  6. 30 CFR 206.365 - Does MMS protect information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.365... MANAGEMENT PRODUCT VALUATION Geothermal Resources § 206.365 Does MMS protect information I provide? Certain information you submit to MMS regarding royalties or fees on geothermal resources or byproducts, including...

  7. Understanding Midwives’ Preferences for Providing Information About Newborn Bloodspot Screening

    Directory of Open Access Journals (Sweden)

    Stuart James Wright

    2018-01-01

    Full Text Available Background: Understanding preferences for information provision in the context of health care service provision is challenging because of the number of potential attributes that may influence preferences. This study aimed to identify midwives’ preferences for the process and outcomes of information provision in an expanded national newborn bloodspot screening program. Design: A sample of practicing midwives completed a hybrid-stated preference survey including a conjoint analysis (CA and discrete choice experiment to quantify preferences for the types of, and way in which, information should be provided in a newborn bloodspot screening program. Six conjoint analysis questions captured the impact of different types of information on parents’ ability to make a decision, and 10 discrete choice experiment questions identified preferences for four process attributes (including parents’ ability to make a decision. Results: Midwives employed by the UK National Health Service (n = 134 completed the survey. All types of information content were perceived to improve parents’ ability to make a decision except for the possibility of false-positive results. Late pregnancy was seen to be the best time to provide information, followed by day 3 postbirth. Information before 20 weeks of pregnancy was viewed as reducing parents’ ability to make a decision. Midwives preferred information to be provided by an individual discussion and did not think parents should receive information on the Internet. Conclusion: A hybrid stated preference survey design identified that a wide variety of information should be provided to maximize parents’ ability to make a decision ideally provided late in pregnancy or on day 3 postbirth.

  8. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  9. THE USE OF INFORMATION RESOURCES OF THE KNUKIM SCIENTIFIC LIBRARY FOR INFORMATION SERVICES PROVIDING

    Directory of Open Access Journals (Sweden)

    В. В. Степко

    2017-10-01

    Full Text Available The article highlights information resources of the scientific library of the Kiev National University of Culture and Arts and characterizes its use in the system of providing librarian and informational services for users. It is proved that the important information resource of the library is website, which provides additional opportunities for users, forming a positive image of the library in the virtual space. The site contains information on various directions of the library’s activities, librarian services, projects and media products. One of the main tasks of the library is formation and presentation on the website of the electronic catalog as a multifunctional bibliographic resource, which is the basis for informational services and the basic information product of the library. The creation of an electronic library continues as the essential element of providing qualitative and effective services to users. The article discusses the functioning of the “Virtual Help” service as an effective form of working with remote users. The authors also consider such an actual direction of the library’s activity as the presentation of the scientific and creative heritage of the university with help of “12 + books of the year” project. The aim of the project is to inform about new editions of university’s teachers published this year and presented in the library fund. The implementation of the patriotic innovation and educational project “Treasures of the Nation”, whose purpose is to study and popularize the elements of the intangible cultural heritage ofUkraine, is analyzed. The booktrails and flash presentations are considered as a means of presenting books prepared by the library staff. The preparation of longreed, a new format for submitting information on the Internet, is also considered. Thanks to the use of Tilda Publishing and ThingLink services, innovative products were created: a complex multimedia story that combined photos

  10. Information analysis of iris biometrics for the needs of cryptology key extraction

    Directory of Open Access Journals (Sweden)

    Adamović Saša

    2013-01-01

    Full Text Available The paper presents a rigorous analysis of iris biometric information for the synthesis of an optimized system for the extraction of a high quality cryptology key. Estimations of local entropy and mutual information were identified as segments of the iris most suitable for this purpose. In order to optimize parameters, corresponding wavelets were transformed, in order to obtain the highest possible entropy and mutual information lower in the transformation domain, which set frameworks for the synthesis of systems for the extraction of truly random sequences of iris biometrics, without compromising authentication properties. [Projekat Ministarstva nauke Republike Srbije, br. TR32054 i br. III44006

  11. Informative providing of processes of development on industrial enterprises

    OpenAIRE

    Kalinichenko, L.

    2010-01-01

    Information is definite by the basic resource of activity of enterprises. Suggestion in relation to the selection of informative subsystems of strategic, tactical, operative management is borne. The list of indexes in relation to estimation of the informative providing of functional processes of enterprise is offered.

  12. INFORMATIONKEY FACTOR FOR CONSUMER SATISFACTION?

    Directory of Open Access Journals (Sweden)

    Maria-Lavinia POPESCU

    2010-12-01

    Full Text Available Starting with the XIX century, we assist at one growth of information importance as following of development of government forms more complexes, of concurrence intensification and of development of communications systems. This process has been increased in the lasts years by the development of telecommunications and of computers systems, by the globalization process and by the intensification of concurrence by educational market, by the exchange and circulation liberalization, by the growth of complexity education institutions. Jim Knight affirms that „the exchange is a present reality in the framework of this the educational institutions must to learn to operate or they assume the failure risk”21. The requests of higher education reform impose by the transition at Bologna system, impose at universities and faculties remarkable efforts by adaptation. With all the reform elements applied, the current educational marketing informational system used in Romania presents big deficiencies especial regarding the quality of information provide at managers and at of institution externs.

  13. Information Systems Management: an Australasian view of key issues - 1996

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  14. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  15. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  16. Information processing in bacteria: memory, computation, and statistical physics: a key issues review.

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  17. Biogeochemical cycles and biodiversity as key drivers of ecosystem services provided by soils

    Science.gov (United States)

    Smith, P.; Cotrufo, M. F.; Rumpel, C.; Paustian, K.; Kuikman, P. J.; Elliott, J. A.; McDowell, R.; Griffiths, R. I.; Asakawa, S.; Bustamante, M.; House, J. I.; Sobocká, J.; Harper, R.; Pan, G.; West, P. C.; Gerber, J. S.; Clark, J. M.; Adhya, T.; Scholes, R. J.; Scholes, M. C.

    2015-11-01

    Soils play a pivotal role in major global biogeochemical cycles (carbon, nutrient, and water), while hosting the largest diversity of organisms on land. Because of this, soils deliver fundamental ecosystem services, and management to change a soil process in support of one ecosystem service can either provide co-benefits to other services or result in trade-offs. In this critical review, we report the state-of-the-art understanding concerning the biogeochemical cycles and biodiversity in soil, and relate these to the provisioning, regulating, supporting, and cultural ecosystem services which they underpin. We then outline key knowledge gaps and research challenges, before providing recommendations for management activities to support the continued delivery of ecosystem services from soils. We conclude that, although soils are complex, there are still knowledge gaps, and fundamental research is still needed to better understand the relationships between different facets of soils and the array of ecosystem services they underpin, enough is known to implement best practices now. There is a tendency among soil scientists to dwell on the complexity and knowledge gaps rather than to focus on what we do know and how this knowledge can be put to use to improve the delivery of ecosystem services. A significant challenge is to find effective ways to share knowledge with soil managers and policy makers so that best management can be implemented. A key element of this knowledge exchange must be to raise awareness of the ecosystems services underpinned by soils and thus the natural capital they provide. We know enough to start moving in the right direction while we conduct research to fill in our knowledge gaps. The lasting legacy of the International Year of Soils in 2015 should be for soil scientists to work together with policy makers and land managers to put soils at the centre of environmental policy making and land management decisions.

  18. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    Science.gov (United States)

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  19. 30 CFR 206.62 - Does MMS protect information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Does MMS protect information I provide? 206.62 Section 206.62 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR MINERALS REVENUE MANAGEMENT PRODUCT VALUATION Indian Oil § 206.62 Does MMS protect information I provide? The MMS will keep...

  20. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  1. Multiagency Initiative to Provide Greenhouse Gas Information

    Science.gov (United States)

    Boland, Stacey W.; Duren, Riley M.

    2009-11-01

    Global Greenhouse Gas Information System Workshop; Albuquerque, New Mexico, 20-22 May 2009; The second Greenhouse Gas Information System (GHGIS) workshop brought together 74 representatives from 28 organizations including U.S. government agencies, national laboratories, and members of the academic community to address issues related to the understanding, operational monitoring, and tracking of greenhouse gas emissions and carbon offsets. The workshop was held at Sandia National Laboratories and organized by an interagency collaboration among NASA centers, Department of Energy laboratories, and the U.S. National Oceanic and Atmospheric Administration. It was motivated by the perceived need for an integrated interagency, community-wide initiative to provide information about greenhouse gas sources and sinks at policy-relevant temporal and spatial scales. Such an initiative could significantly enhance the ability of national and regional governments, industry, and private citizens to implement and evaluate effective climate change mitigation policies.

  2. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  3. 47 CFR 79.2 - Accessibility of programming providing emergency information.

    Science.gov (United States)

    2010-10-01

    ..., widespread fires, discharge of toxic gases, widespread power failures, industrial explosions, civil disorders... of programming providing emergency information. (a) Definitions. (1) For purposes of this section, the definitions in §§ 79.1 and 79.3 apply. (2) Emergency information. Information, about a current...

  4. YouTube provides irrelevant information for the diagnosis and treatment of hip arthritis.

    Science.gov (United States)

    Koller, Ulrich; Waldstein, Wenzel; Schatz, Klaus-Dieter; Windhager, Reinhard

    2016-10-01

    YouTube is increasingly becoming a key source for people to satisfy the need for additional information concerning their medical condition. This study analyses the completeness of accurate information found on YouTube pertaining to hip arthritis. The present study analyzed 133 YouTube videos using the search terms: hip arthritis, hip arthritis symptoms, hip arthritis diagnosis, hip arthritis treatment and hip replacement. Two quality assessment checklists with a scale of 0 to 12 points were developed to evaluate available video content for the diagnosis and the treatment of hip arthritis. Videos were grouped into poor quality (grade 0-3), moderate quality (grade 4-7) and excellent quality (grade 8-12), respectively. Three independent observers assessed all videos using the new grading system and independently scored all videos. Discrepancies regarding the categories were clarified by consensus discussion. For intra-observer reliabilities, grading was performed at two occasions separated by four weeks. Eighty-four percent (n = 112) had a poor diagnostic information quality, 14% (n = 19) a moderate quality and only 2% (n = 2) an excellent quality, respectively. In 86% (n = 114), videos provided poor treatment information quality. Eleven percent (n = 15) of videos had a moderate quality and only 3% (n = 4) an excellent quality, respectively. The present study demonstrates that YouTube is a poor source for accurate information pertaining to the diagnosis and treatment of hip arthritis. These finding are of high relevance for clinicians as videos are going to become the primary source of information for patients. Therefore, high quality educational videos are needed to further guide patients on the way from the diagnosis of hip arthritis to its proper treatment.

  5. Information needs for problem holders/solution providers: EnviroTRADE

    International Nuclear Information System (INIS)

    Robson, W.M.; Harrington, M.W.; Harlan, C.P.

    1994-01-01

    EnviroTRADE (or Environmental Technologies for Remedial Actions Data Exchange) is a domestic and international information system that matches environmental problems with potential technologies solutions by combining state of the art information management techniques, graphical interfaces and a Geographic Information System (GIS). Its search and match algorithms locate technologies relevant to specific environmental problems and identify sites where technology may be applicable. EnviroTRADE also provides many other kinds of database searches and reports. EnviroTRADE is a graphical/textural information management system being developed for the cleanup program of US Department of energy's nuclear weapons complex. Its principal purpose is to provide a single, powerful, interactive data source on the many environmental restoration and waste management (ER/WM) problems and on the technologies currently under development and available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational database Management System (RDBMS) is employed for EnviroTRADE which accommodates graphical images, technical data, structured textural descriptions, and a variety of advanced multi-media data types. EnviroTRADE is a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues

  6. Information needs for problem holders/solution providers: EnviroTRADE

    Energy Technology Data Exchange (ETDEWEB)

    Robson, W.M. [Lawrence Livermore National Lab., CA (United States); Harrington, M.W.; Harlan, C.P. [Sandia National Labs., Livermore, CA (United States)

    1994-12-31

    EnviroTRADE (or Environmental Technologies for Remedial Actions Data Exchange) is a domestic and international information system that matches environmental problems with potential technologies solutions by combining state of the art information management techniques, graphical interfaces and a Geographic Information System (GIS). Its search and match algorithms locate technologies relevant to specific environmental problems and identify sites where technology may be applicable. EnviroTRADE also provides many other kinds of database searches and reports. EnviroTRADE is a graphical/textural information management system being developed for the cleanup program of US Department of energy`s nuclear weapons complex. Its principal purpose is to provide a single, powerful, interactive data source on the many environmental restoration and waste management (ER/WM) problems and on the technologies currently under development and available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational database Management System (RDBMS) is employed for EnviroTRADE which accommodates graphical images, technical data, structured textural descriptions, and a variety of advanced multi-media data types. EnviroTRADE is a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues.

  7. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants.

    Science.gov (United States)

    Umali, Elaine; McCool, Judith; Whittaker, Robyn

    2016-01-20

    The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning from past mHealth interventions and applying these

  8. Information Interaction: Providing a Framework for Information Architecture.

    Science.gov (United States)

    Toms, Elaine G.

    2002-01-01

    Discussion of information architecture focuses on a model of information interaction that bridges the gap between human and computer and between information behavior and information retrieval. Illustrates how the process of information interaction is affected by the user, the system, and the content. (Contains 93 references.) (LRW)

  9. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  10. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  11. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda.

    Science.gov (United States)

    Di Ruggiero, Erica; Cohen, Joanna E; Cole, Donald C

    2014-07-01

    Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization's Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. This qualitative study involved semi-structured interviews with representatives from three global institutions--the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization's conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative example. Catalytic events and policy

  12. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda

    Science.gov (United States)

    2014-01-01

    Background Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization’s Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. Methods This qualitative study involved semi-structured interviews with representatives from three global institutions – the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Results Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization’s conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Conclusions Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative

  13. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    Science.gov (United States)

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  14. Understanding price elasticities to inform public health research and intervention studies: key issues.

    Science.gov (United States)

    Nghiem, Nhung; Wilson, Nick; Genç, Murat; Blakely, Tony

    2013-11-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies.

  15. The Content-Provider Paradox: Universities in the Information Ecosystem.

    Science.gov (United States)

    Vaidhyanathan, Siva

    2002-01-01

    Asserts that universities' rush to abandon their role as "national parks" in the information ecosystem in favor of becoming profitable "content providers" has led to a paradox: to generate new knowledge, researchers and teachers need broad content freedom, but the role of content provider requires highly restrictive policies to…

  16. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  17. Key Factors of Quality in the Sector of Tourism Services Providers: Case Study: Czech Republic

    Directory of Open Access Journals (Sweden)

    Ida Vajčnerová

    2014-01-01

    Full Text Available The paper summarizes main results of partial research aimed at detection of the key factors affecting quality in the sector of tourism services providers, namely tour operators and travel agencies. A primary questionnaire survey was conducted; the researched factors were distributed in the context of service quality dimensions (Grönroos model; the dimensions were tested in relation to sex, age and education of the respondents (ANOVA; Brown-Forsythe test. Assurance was identified as the most important dimension. The output of the study is determining the significance of individual quality factors from the perspective of a potential customer when selecting a service provider.

  18. Trauma-informed care for children in the ambulance : international survey among pre-hospital providers

    NARCIS (Netherlands)

    Alisic, Eva; Tyler, Mark P; Giummarra, Melita J; Kassam-Adams, Rahim; Gouweloos, Juul; Landolt, Markus A; Kassam-Adams, Nancy

    2017-01-01

    Background: Pre-hospital providers, such as paramedics and emergency medical technicians, are in a position to provide key emotional support to injured children and their families. Objective: Our goal was to examine (a) pre-hospital providers' knowledge of traumatic stress in children, attitudes

  19. The Innovative Activity of Enterprises in the Context of Providing Information Security

    Directory of Open Access Journals (Sweden)

    Sazonets Olga M.

    2015-03-01

    Full Text Available The aim of the article is to study the peculiarities of the innovative activity in the context of providing the enterprise information security. By analyzing, systematizing and summarizing the scientific works of many scientists the essence of the concept of «information security» has been considered and components of the innovation development process from the standpoint of providing information security have been identified. The article discusses issues of providing information security on the basis of introducing innovations, which will allow achieving a state in which there would be realized a sustainable, protected from threats, development of the enterprise. It has been proved that the formation of the innovative enterprise policy should include measures to ensure information security. As a result of the study the types of threats to the enterprise information security have been identified. It has been determined that the innovation process in the field of information security is provided by means of research, administrative, industrial, technological and commercial activities leading to the emergence and commercialization of innovations. The prospect for further research in this area is determining a system of indicators for forecasting the integral innovation indicator of economic information security. The system of indicators for diagnostics of the enterprise information security level enables monitoring the indicators of the state of the enterprise innovation and information activity in order to prevent the emergence of threats.

  20. 30 CFR 210.40 - Will MMS keep the information I provide confidential?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS keep the information I provide... MINERALS REVENUE MANAGEMENT FORMS AND REPORTS General Provisions § 210.40 Will MMS keep the information I provide confidential? The MMS will treat information obtained under this part as confidential to the...

  1. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  2. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  3. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  4. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  5. Critical care providers refer to information tools less during communication tasks after a critical care clinical information system introduction.

    Science.gov (United States)

    Ballermann, Mark; Shaw, Nicola T; Mayes, Damon C; Gibney, R T Noel

    2011-01-01

    Electronic documentation methods may assist critical care providers with information management tasks in Intensive Care Units (ICUs). We conducted a quasi-experimental observational study to investigate patterns of information tool use by ICU physicians, nurses, and respiratory therapists during verbal communication tasks. Critical care providers used tools less at 3 months after the CCIS introduction. At 12 months, care providers referred to paper and permanent records, especially during shift changes. The results suggest potential areas of improvement for clinical information systems in assisting critical care providers in ensuring informational continuity around their patients.

  6. Providing information regarding exposures in pregnancy: a survey of North American Teratology Information Services.

    Science.gov (United States)

    Hancock, Rebecca L; Ungar, Wendy J; Einarson, Adrienne; Goodstadt, Michael; Koren, Gideon

    2008-04-01

    Teratology Information Services (TIS) provide information on exposures during pregnancy and breast-feeding. Maintaining ongoing funding is a challenge. The purpose was to gather descriptive information on current TIS operations. All North American TIS (16 American, 2 Canadian) completed a detailed survey. Service goal ranked as most important was correction of risk misperceptions. Inquiries were primarily for medications (mean 43.5%, S.D. 14.1), lactation exposures, and workplace exposures. Median employees per TIS: three (range 1-12.5). Two TIS only counsel health care professionals (HCPs). Main callers to remaining TIS were pregnant women (mean 46.8%, S.D. 22.8), physicians, and nurses. Calls per week varied (median 20, range 4-600). Median annual budget: US dollars 69,000 (range dollars 3000-335,000). Seventeen TIS collect patient data for research. This survey was the first to document TIS operations in North America and demonstrates a spectrum of clinical and research activities, and provides data for a future cost-benefit analysis of TIS.

  7. The dynamic information architecture system : a simulation framework to provide interoperability for process models

    International Nuclear Information System (INIS)

    Hummel, J. R.; Christiansen, J. H.

    2002-01-01

    As modeling and simulation becomes a more important part of the day-to-day activities in industry and government, organizations are being faced with the vexing problem of how to integrate a growing suite of heterogeneous models both within their own organizations and between organizations. The Argonne National Laboratory, which is operated by the University of Chicago for the United States Department of Energy, has developed the Dynamic Information Architecture System (DIAS) to address such problems. DIAS is an object-oriented, subject domain independent framework that is used to integrate legacy or custom-built models and applications. In this paper we will give an overview of the features of DIAS and give examples of how it has been used to integrate models in a number of applications. We shall also describe some of the key supporting DIAS tools that provide seamless interoperability between models and applications

  8. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  9. Development of an online information and support resource for adolescent idiopathic scoliosis patients considering surgery: perspectives of health care providers.

    Science.gov (United States)

    Macculloch, Radha; Nyhof-Young, Joyce; Nicholas, David; Donaldson, Sandra; Wright, James G

    2010-06-29

    Adolescents with idiopathic scoliosis who are considering spinal surgery face a major decision that requires access to in-depth information and support. Unfortunately, most online resources provide incomplete and inconsistent information and minimal social support. The aim of this study was to develop an online information and support resource for adolescent idiopathic scoliosis (AIS) patients considering spinal surgery. Prior to website development, a user-based needs assessment was conducted. The needs assessment involved a total of six focus groups with three stakeholder groups: (1) post-operative AIS patients or surgical candidates (10-18 years) (n = 11), (2) their parents (n = 6) and (3) health care providers (n = 11). This paper reports on the findings from focus groups with health care providers. Focus group methodology was used to invite a range of perspectives and stimulate discussion. During audio-recorded focus groups, an emergent table of website content was presented to participants for assessment of relevance, viability and comprehensiveness in targeting global domains of need. Specifically, effective presentation of content, desired aspects of information and support, and discussions about the value of peer support and the role of health professionals were addressed. Focus group transcripts were then subject to content analysis through a constant comparative review and analysis. Two focus groups were held with health care providers, consisting of 5 and 6 members respectively. Clinicians provided their perceptions of the information and support needs of surgical patients and their families and how this information and support should be delivered using internet technology. Health care providers proposed four key suggestions to consider in the development of this online resource: (1) create the website with the target audience in mind; (2) clearly state the purpose of the website and organize website content to support the user; (3) offer a

  10. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  11. Transparency of Mandatory Information Disclosure and Concerns of Health Services Providers and Consumers.

    Science.gov (United States)

    Yan, Yu-Hua; Kung, Chih-Ming; Fang, Shih-Chieh; Chen, Yi

    2017-01-09

    This study analyzed differences between transparency of information disclosure and related demands from the health service consumer's perspective. It also compared how health service providers and consumers are associated by different levels of mandatory information disclosure. We obtained our research data using a questionnaire survey (health services providers, n = 201; health service consumers, n = 384). Health service consumers do not have major concerns regarding mandatory information disclosure. However, they are concerned about complaint channels and settlement results, results of patient satisfaction surveys, and disclosure of hospital financial statements ( p transparency of information disclosure ( p information provided by hospitals. Thus, when a hospital discloses information, it is necessary for the government to consider the information's applicability. Toward improving medical expertise and information asymmetry, the government has to reduce the burden among health service consumers in dealing with this information, and it has to use the information effectively.

  12. Illicit Drug Users in the Tanzanian Hinterland: Population Size Estimation Through Key Informant-Driven Hot Spot Mapping.

    Science.gov (United States)

    Ndayongeje, Joel; Msami, Amani; Laurent, Yovin Ivo; Mwankemwa, Syangu; Makumbuli, Moza; Ngonyani, Alois M; Tiberio, Jenny; Welty, Susie; Said, Christen; Morris, Meghan D; McFarland, Willi

    2018-02-12

    We mapped hot spots and estimated the numbers of people who use drugs (PWUD) and who inject drugs (PWID) in 12 regions of Tanzania. Primary (ie, current and past PWUD) and secondary (eg, police, service providers) key informants identified potential hot spots, which we visited to verify and count the number of PWUD and PWID present. Adjustments to counts and extrapolation to regional estimates were done by local experts through iterative rounds of discussion. Drug use, specifically cocaine and heroin, occurred in all regions. Tanga had the largest numbers of PWUD and PWID (5190 and 540, respectively), followed by Mwanza (3300 and 300, respectively). Findings highlight the need to strengthen awareness of drug use and develop prevention and harm reduction programs with broader reach in Tanzania. This exercise provides a foundation for understanding the extent and locations of drug use, a baseline for future size estimations, and a sampling frame for future research.

  13. Current food chain information provides insufficient information for modern meat inspection of pigs.

    Science.gov (United States)

    Felin, Elina; Jukola, Elias; Raulo, Saara; Heinonen, Jaakko; Fredriksson-Ahomaa, Maria

    2016-05-01

    Meat inspection now incorporates a more risk-based approach for protecting human health against meat-borne biological hazards. Official post-mortem meat inspection of pigs has shifted to visual meat inspection. The official veterinarian decides on additional post-mortem inspection procedures, such as incisions and palpations. The decision is based on declarations in the food chain information (FCI), ante-mortem inspection and post-mortem inspection. However, a smooth slaughter and inspection process is essential. Therefore, one should be able to assess prior to slaughter which pigs are suitable for visual meat inspection only, and which need more profound inspection procedures. This study evaluates the usability of the FCI provided by pig producers and considered the possibility for risk ranking of incoming slaughter batches according to the previous meat inspection data and the current FCI. Eighty-five slaughter batches comprising 8954 fattening pigs were randomly selected at a slaughterhouse that receives animals from across Finland. The mortality rate, the FCI and the meat inspection results for each batch were obtained. The current FCI alone provided insufficient and inaccurate information for risk ranking purposes for meat inspection. The partial condemnation rate for a batch was best predicted by the partial condemnation rate calculated for all the pigs sent for slaughter from the same holding in the previous year (p<0.001) and by prior information on cough declared in the current FCI (p=0.02) statement. Training and information to producers are needed to make the FCI reporting procedures more accurate. Historical meat inspection data on pigs slaughtered from the same holdings and well-chosen symptoms/signs for reporting, should be included in the FCI to facilitate the allocation of pigs for visual inspection. The introduced simple scoring system can be easily used for additional information for directing batches to appropriate meat inspection procedures. To

  14. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  15. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  16. Graduate Curriculum for Biological Information Specialists: A Key to Integration of Scale in Biology

    Directory of Open Access Journals (Sweden)

    Carole L. Palmer

    2007-12-01

    Full Text Available Scientific data problems do not stand in isolation. They are part of a larger set of challenges associated with the escalation of scientific information and changes in scholarly communication in the digital environment. Biologists in particular are generating enormous sets of data at a high rate, and new discoveries in the biological sciences will increasingly depend on the integration of data across multiple scales. This work will require new kinds of information expertise in key areas. To build this professional capacity we have developed two complementary educational programs: a Biological Information Specialist (BIS masters degree and a concentration in Data Curation (DC. We believe that BISs will be central in the development of cyberinfrastructure and information services needed to facilitate interdisciplinary and multi-scale science. Here we present three sample cases from our current research projects to illustrate areas in which we expect information specialists to make important contributions to biological research practice.

  17. Managing minor incidents - Providing information for the public

    International Nuclear Information System (INIS)

    Joukovskaia, O.

    1999-01-01

    , it is needed to design a model of an effective system of informatively influencing human mind, given peculiarities of the present stage of the republic's development and features of its evolution under the post- Chernobyl conditions. To provide the public with real and objective information is a forefront problem while resolving these tasks. In this situation it is very important to define the most effective forms and ways of informing the public, to find out a degree to which people trust whatever information. To that end in 1997 conducted a sociological survey among attendees of re-training courses in the field of radiation control (employees of the Ministry of Health, Belarus Consumers' Cooperation Union, Ministry of Agriculture and Foodstuffs, those of Chernobyl divisions of district and region executive committees). It has been revealed that 27 of the respondents trust information of local authorities; Radio and television - 7.2%; foreign scientists - 51.1%; Belarussian scientists and specialists - 51.6% of the respondents. 82.5% of the responders think that the population is insufficiently informed about the questions of safe activity. Information on radio-ecological problems threatens only 72% of the respondents. This kind of information stimulate others to find recommendations on safe activity provision, to understand the situation. As a result of the investigation one can draw a conclusion that the current system of public informing on the Chernobyl problem is insufficient and ineffective, since on the background of a high interest to this problem one can notice a decrease in trust to the majority of information sources, which leads to blocking of adequate perception of the information provided. Bearing this in mind one must: 1. attract specialists working on the affected territories, specialists of radiation control network, doctors, teachers, journalists to information work with population of the affected territories; 2. organise open information data

  18. Internet-based information system of digital geological data providing

    Science.gov (United States)

    Yuon, Egor; Soukhanov, Mikhail; Markov, Kirill

    2015-04-01

    One of the Russian Federal аgency of mineral resources problems is to provide the geological information which was delivered during the field operation for the means of federal budget. This information should be present in the current, conditional form. Before, the leading way of presenting geological information were paper geological maps, slices, borehole diagrams reports etc. Technologies of database construction, including distributed databases, technologies of construction of distributed information-analytical systems and Internet-technologies are intensively developing nowadays. Most of geological organizations create their own information systems without any possibility of integration into other systems of the same orientation. In 2012, specialists of VNIIgeosystem together with specialists of VSEGEI started the large project - creating the system of providing digital geological materials with using modern and perspective internet-technologies. The system is based on the web-server and the set of special programs, which allows users to efficiently get rasterized and vectorised geological materials. These materials are: geological maps of scale 1:1M, geological maps of scale 1:200 000 and 1:2 500 000, the fragments of seamless geological 1:1M maps, structural zoning maps inside the seamless fragments, the legends for State geological maps 1:200 000 and 1:1 000 000, full author's set of maps and also current materials for international projects «Atlas of geological maps for Circumpolar Arctic scale 1:5 000 000» and «Atlas of Geologic maps of central Asia and adjacent areas scale 1:2 500 000». The most interesting and functional block of the system - is the block of providing structured and well-formalized geological vector materials, based on Gosgeolkart database (NGKIS), managed by Oracle and the Internet-access is supported by web-subsystem NGKIS, which is currently based on MGS-Framework platform, developed by VNIIgeosystem. One of the leading elements

  19. Providing Southern Perspectives on CSR

    DEFF Research Database (Denmark)

    Jeppesen, Søren; Kothuis, Bas

    The article seeks to contribute to the SMEs and CSR literature in developing countries by providing; a) a ‘Southern’ SME perspective, which includes the voices of managers and workers, b) a perspective of CSR, which opens up to informal CSR practices that SMEs undertake, and c) an analysis...... of the key institutional issues affecting the CSR practices of SMEs. It presents perceptions of CSR practices among 21 SMEs in the garment industry in South Africa, based on 40 interviews with managers and 19 interviews with workers through the use of qualitative and quantitative interview frameworks....... It highlights a high degree of similarities between managers and workers, though knowledge of (cognitive level) the concept ‘CSR’ differ considerably. Informal practices are widespread and of key importance to the SMEs, expressed by managers and workers alike. History, industry and manager-workers relations...

  20. Transparency of Mandatory Information Disclosure and Concerns of Health Services Providers and Consumers

    Science.gov (United States)

    Yan, Yu-Hua; Kung, Chih-Ming; Fang, Shih-Chieh; Chen, Yi

    2017-01-01

    Background: This study analyzed differences between transparency of information disclosure and related demands from the health service consumer’s perspective. It also compared how health service providers and consumers are associated by different levels of mandatory information disclosure. Methods: We obtained our research data using a questionnaire survey (health services providers, n = 201; health service consumers, n = 384). Results: Health service consumers do not have major concerns regarding mandatory information disclosure. However, they are concerned about complaint channels and settlement results, results of patient satisfaction surveys, and disclosure of hospital financial statements (p transparency of information disclosure (p < 0.001). Conclusions: It may not be possible for outsiders to properly interpret the information provided by hospitals. Thus, when a hospital discloses information, it is necessary for the government to consider the information’s applicability. Toward improving medical expertise and information asymmetry, the government has to reduce the burden among health service consumers in dealing with this information, and it has to use the information effectively. PMID:28075362

  1. 40 CFR 310.24 - What happens if I provide incorrect or false information?

    Science.gov (United States)

    2010-07-01

    ... false information? 310.24 Section 310.24 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... § 310.24 What happens if I provide incorrect or false information? (a) You must not knowingly or recklessly make any statement or provide any information in your reimbursement application that is false...

  2. 47 CFR 64.707 - Public dissemination of information by providers of operator services.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Public dissemination of information by providers of operator services. 64.707 Section 64.707 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... § 64.707 Public dissemination of information by providers of operator services. Providers of operator...

  3. Providing Global Change Information for Decision-Making: Capturing and Presenting Provenance

    Science.gov (United States)

    Ma, Xiaogang; Fox, Peter; Tilmes, Curt; Jacobs, Katherine; Waple, Anne

    2014-01-01

    Global change information demands access to data sources and well-documented provenance to provide evidence needed to build confidence in scientific conclusions and, in specific applications, to ensure the information's suitability for use in decision-making. A new generation of Web technology, the Semantic Web, provides tools for that purpose. The topic of global change covers changes in the global environment (including alterations in climate, land productivity, oceans or other water resources, atmospheric composition and or chemistry, and ecological systems) that may alter the capacity of the Earth to sustain life and support human systems. Data and findings associated with global change research are of great public, government, and academic concern and are used in policy and decision-making, which makes the provenance of global change information especially important. In addition, since different types of decisions benefit from different types of information, understanding how to capture and present the provenance of global change information is becoming more of an imperative in adaptive planning.

  4. Twitter for travel medicine providers.

    Science.gov (United States)

    Mills, Deborah J; Kohl, Sarah E

    2016-03-01

    Travel medicine practitioners, perhaps more so than medical practitioners working in other areas of medicine, require a constant flow of information to stay up-to-date, and provide best practice information and care to their patients. Many travel medicine providers are unaware of the popularity and potential of the Twitter platform. Twitter use among our travellers, as well as by physicians and health providers, is growing exponentially. There is a rapidly expanding body of published literature on this information tool. This review provides a brief overview of the ways Twitter is being used by health practitioners, the advantages that are peculiar to Twitter as a platform of social media, and how the interested practitioner can get started. Some key points about the dark side of Twitter are highlighted, as well as the potential benefits of using Twitter as a way to disseminate accurate medical information to the public. This article will help readers develop an increased understanding of Twitter as a tool for extracting useful facts and insights from the ever increasing volume of health information. © International Society of Travel Medicine, 2016. All rights reserved. Published by Oxford University Press. For permissions, please e-mail: journals.permissions@oup.com.

  5. Does providing nutrition information at vending machines reduce calories per item sold?

    Science.gov (United States)

    Dingman, Deirdre A; Schulz, Mark R; Wyrick, David L; Bibeau, Daniel L; Gupta, Sat N

    2015-02-01

    In 2010, the United States (US) enacted a restaurant menu labeling law. The law also applied to vending machine companies selling food. Research suggested that providing nutrition information on menus in restaurants might reduce the number of calories purchased. We tested the effect of providing nutrition information and 'healthy' designations to consumers where vending machines were located in college residence halls. We conducted our study at one university in Southeast US (October-November 2012). We randomly assigned 18 vending machines locations (residence halls) to an intervention or control group. For the intervention we posted nutrition information, interpretive signage, and sent a promotional email to residents of the hall. For the control group we did nothing. We tracked sales over 4 weeks before and 4 weeks after we introduced the intervention. Our intervention did not change what the residents bought. We recommend additional research about providing nutrition information where vending machines are located, including testing formats used to present information.

  6. The development of web program for providing RI-biomics technical information

    International Nuclear Information System (INIS)

    KI, Na Kyung; Kim, Joo Yeon; Jang, Sol Ah; Park, Tai Jin

    2014-01-01

    For designing the model of the web program, the demand survey for the technology and information has been performed for the students of the related departments, industrialists and researchers. And, the survey, such as advantages and disadvantages, for the current situations has been examined through comparison and analysis by the establishment type and operational process for the present operating web programs having the similar functions in Korea. The contents and web program for the technology and information system have been also developed by the question investigation and the expert opinions. This system for RI-Biomics has been developed by focusing the convenience for the information provision and the information search as the first constructing direction. Information has been collected by the operator in our institute and making contract with Global Trend Briefing of KISTI in Korea. The information collection in the web program has been designed as the direction regularly provided with RSS. Information has been then analyzed by constructing the expert pool provided from the advisory committee for the technology and information, and using them. The publicity for this web program has been performed by webzines and then it is noted that the publicity programs such as some events should be regularly developed when expanded and advanced to a community in future

  7. HIV rapid diagnostic testing by lay providers in a key population-led health service programme in Thailand.

    Science.gov (United States)

    Wongkanya, Rapeeporn; Pankam, Tippawan; Wolf, Shauna; Pattanachaiwit, Supanit; Jantarapakde, Jureeporn; Pengnongyang, Supabhorn; Thapwong, Prasopsuk; Udomjirasirichot, Apichat; Churattanakraisri, Yutthana; Prawepray, Nanthika; Paksornsit, Apiluk; Sitthipau, Thidadaow; Petchaithong, Sarayut; Jitsakulchaidejt, Raruay; Nookhai, Somboon; Lertpiriyasuwat, Cheewanan; Ongwandee, Sumet; Phanuphak, Praphan; Phanuphak, Nittaya

    2018-01-01

    Introduction:  Rapid diagnostic testing (RDT) for HIV has a quick turn-around time, which increases the proportion of people testing who receive their result. HIV RDT in Thailand has traditionally been performed only by medical technologists (MTs), which is a barrier to its being scaled up. We evaluated the performance of HIV RDT conducted by trained lay providers who were members of, or worked closely with, a group of men who have sex with men (MSM) and with transgender women (TG) communities, and compared it to tests conducted by MTs. Methods:  Lay providers received a 3-day intensive training course on how to perform a finger-prick blood collection and an HIV RDT as part of the Key Population-led Health Services (KPLHS) programme among MSM and TG. All the samples were tested by lay providers using Alere Determine HIV 1/2. HIV-reactive samples were confirmed by DoubleCheckGold Ultra HIV 1&2 and SD Bioline HIV 1/2. All HIV-positive and 10% of HIV-negative samples were re-tested by MTs using Serodia HIV 1/2. Results:  Of 1680 finger-prick blood samples collected and tested using HIV RDT by lay providers in six drop-in centres in Bangkok, Chiang Mai, Chonburi and Songkhla, 252 (15%) were HIV-positive. MTs re-tested these HIV-positive samples and 143 randomly selected HIV-negative samples with 100% concordant test results. Conclusion:  Lay providers in Thailand can be trained and empowered to perform HIV RDT as they were found to achieve comparable results in sample testing with MTs. Based on the task-shifting concept, this rapid HIV testing performed by lay providers as part of the KPLHS programme has great potential to enhance HIV prevention and treatment programmes among key at-risk populations.

  8. Discussion of a method for providing general risk information by linking with the nuclear information

    International Nuclear Information System (INIS)

    Shobu, Nobuhiro; Yokomizo, Shirou; Umezawa, Sayaka

    2004-06-01

    'Risk information navigator (http://www.ricotti.jp/risknavi/)', an internet tool for arousing public interest and fostering people's risk literacy, has been developed as the contents for the official website of Techno Community Square 'RICOTTI' (http://www.ricotti.jp) at TOKAI village. In this report we classified the risk information into the fields, Health/Daily Life', 'Society/Crime/Disaster' and Technology/Environment/Energy', for the internet tool contents. According to these categories we discussed a method for providing various risk information on general fields by linking with the information on nuclear field. The web contents are attached to this report with the CD-R media. (author)

  9. Survey of women's perceptions of information provided in the prevention or treatment of iron deficiency anaemia in an Australian tertiary obstetric hospital.

    Science.gov (United States)

    Vosnacos, Emma; Pinchon, Deborah J

    2015-06-01

    There is limited literature to understand the perceptions of Australian women regarding the information provided by healthcare professionals relating to the prevention and treatment of iron deficiency anaemia in pregnancy. To establish an insight into the key themes and trends within a tertiary obstetric hospital related to the provision of dietary advice and use of iron supplements in pregnancy. A prospective patient survey of pregnant women and women up to 4 weeks postnatal attending hospital. Of the 110 women who participated, 73.6% were provided with information on iron rich foods and 67% made dietary changes. Eighty percent of women were advised to take oral iron and 65.5% of women were taking it at the time of the survey. In women who had independently ceased oral iron, 41.7% failed to inform their healthcare professional. In the women who did inform their healthcare professional 89.5% received advice to help overcome the reason that led to cessation. The main causes included forgetfulness and side effects. Women were less likely to require intravenous iron if oral iron was commenced early. Compliance with recommended oral iron is variable within a population of pregnant women. Women are provided with information on a range of issues relating to the prevention and treatment of iron deficiency anaemia; yet there is a disparity between the information provided and the resulting action. Further research should focus on targeted measures to improve understanding and compliance with treatment from the both women's and health professionals perspective. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  10. Transparency of Mandatory Information Disclosure and Concerns of Health Services Providers and Consumers

    Directory of Open Access Journals (Sweden)

    Yu-Hua Yan

    2017-01-01

    Full Text Available Background: This study analyzed differences between transparency of information disclosure and related demands from the health service consumer’s perspective. It also compared how health service providers and consumers are associated by different levels of mandatory information disclosure. Methods: We obtained our research data using a questionnaire survey (health services providers, n = 201; health service consumers, n = 384. Results: Health service consumers do not have major concerns regarding mandatory information disclosure. However, they are concerned about complaint channels and settlement results, results of patient satisfaction surveys, and disclosure of hospital financial statements (p < 0.001. We identified significant differences in health service providers’ and consumers’ awareness regarding the transparency of information disclosure (p < 0.001. Conclusions: It may not be possible for outsiders to properly interpret the information provided by hospitals. Thus, when a hospital discloses information, it is necessary for the government to consider the information’s applicability. Toward improving medical expertise and information asymmetry, the government has to reduce the burden among health service consumers in dealing with this information, and it has to use the information effectively.

  11. Health Information Provided by Retail Health Food Outlets

    Directory of Open Access Journals (Sweden)

    Jaclyn Calder

    2000-01-01

    Full Text Available Alternative health practices have become increasingly popular in recent years. Many patients visit specific complementary practitioners, while others attempt to educate themselves, trusting advice from employees at local health food stores or the Internet. Thirty-two retail health food stores were surveyed on the nature of the information provided by their staff. A research assistant visited the stores and presented as the mother of a child in whom Crohn’s disease had been diagnosed. Seventy-two per cent (23 of 32 of store employees offered advice, such as to take nutritional and herbal supplements. Of the 23 stores where recommendations were made, 15 (65% based their recommendation on a source of information. Fourteen of the 15 stores using information sources used the same reference book. This had a significant impact on the recommendations; the use of nutritional supplements was favoured. In conclusion, retail health food stores are not as inconsistent as hypothesized, although there are many variances in the types of supplements recommended for the same chronic disease.

  12. Satisfaction with information provided to Danish cancer patients: validation and survey results.

    Science.gov (United States)

    Ross, Lone; Petersen, Morten Aagaard; Johnsen, Anna Thit; Lundstrøm, Louise Hyldborg; Groenvold, Mogens

    2013-11-01

    To validate five items (CPWQ-inf) regarding satisfaction with information provided to cancer patients from health care staff, assess the prevalence of dissatisfaction with this information, and identify factors predicting dissatisfaction. The questionnaire was validated by patient-observer agreement and cognitive interviews. The prevalence of dissatisfaction was assessed in a cross-sectional sample of all cancer patients in contact with hospitals during the past year in three Danish counties. The validation showed that the CPWQ performed well. Between 3 and 23% of the 1490 participating patients were dissatisfied with each of the measured aspects of information. The highest level of dissatisfaction was reported regarding the guidance, support and help provided when the diagnosis was given. Younger patients were consistently more dissatisfied than older patients. The brief CPWQ performs well for survey purposes. The survey depicts the heterogeneous patient population encountered by hospital staff and showed that younger patients probably had higher expectations or a higher need for information and that those with more severe diagnoses/prognoses require extra care in providing information. Four brief questions can efficiently assess information needs. With increasing demands for information, a wide range of innovative initiatives is needed. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  13. Unfree markets: socially embedded informal health providers in northern Karnataka, India.

    Science.gov (United States)

    George, Asha; Iyer, Aditi

    2013-11-01

    The dynamics of informal health markets in marginalised regions are relevant to policy discourse in India, but are poorly understood. We examine how informal health markets operate from the viewpoint of informal providers (those without any government-recognised medical degrees, otherwise known as RMPs) by drawing upon data from a household survey in 2002, a provider census in 2004 and ongoing field observations from a research site in Koppal district, Karnataka, India. We find that despite their illegality, RMPs depend on government and private providers for their training and referral networks. Buffeted by unregulated market pressures, RMPs are driven to provide allopathic commodities regardless of need, but can also be circumspect in their practice. Though motivated by profit, their socially embedded practice at community level at times undermines their ability to ensure payment of fees for their services. In addition, RMPs feel that communities can threaten them via violence or malicious rumours, leading them to seek political favour and social protection from village elites and elected representatives. RMPs operate within negotiated quid pro quo bargains that lead to tenuous reciprocity or fragile trust between them and the communities in which they practise. In the context of this 'unfree' market, some RMPs reported being more embedded in health systems, more responsive to communities and more vulnerable to unregulated market pressures than others. Understanding the heterogeneity, nuanced motivations and the embedded social relations that mark informal providers in the health systems, markets and communities they work in, is critical for health system reforms. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. Providing Consumers with Web-Based Information on the Environmental Effects of Automobiles

    Energy Technology Data Exchange (ETDEWEB)

    Saulsbury, J.W.

    2003-08-25

    The Department of Energy (DOE) and the Environmental Protection Agency (EPA) provide consumers with web-based information on the environmental effects of automobiles so that individuals can make informed choices about the vehicles they use or may purchase. DOE and EPA maintain a web site (www.fueleconomy.gov) that provides users with information about fuel economy [as well as greenhouse gas (GHG) emissions and air pollution emissions] for the cars and trucks they use or may consider purchasing. EPA also maintains a separate web site (www.epa.gov/greenvehicles) that offers similar information, with the focus on air pollution emissions rather than fuel economy. The American Council for an Energy-Efficient Economy (ACEEE) (www.greenercars.com) and the California Air Resources Board (CARB) (www.arb.ca.gov/msprog/ccbg/ccbg.htm) also maintain web sites that provide consumers with information on the environmental effects of automobiles. Through the National Transportation Research Center (NTRC) at Oak Ridge National Laboratory, DOE has supported some initial qualitative research with people who are interested in purchasing a new or used vehicle and whose actions identify them as at least somewhat concerned about the environment. The purpose of this research was to explore and understand how these people respond to the different ratings and measurements of environmental effects provided by the four web sites. The goal of the research is to optimize the communication of information provided on the DOE/EPA web site (www.fueleconomy.gov). Working with a private marketing research firm (The Looking Glass Group of Knoxville, Tennessee), NTRC staff initiated this research by meeting with two focus groups in Knoxville on February 27, 2001. To obtain information for comparison, staff from the NTRC and the Looking Glass Group also met with two focus groups in Los Angeles, California, on August 13, 2001.

  15. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person who provides documents under this part in response to a request by MMS to inform a decision on whether open...

  16. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care.

  17. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    Science.gov (United States)

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  18. High-level radioactive waste disposal: Key geochemical issues and information needs for site characterization

    International Nuclear Information System (INIS)

    Brooks, D.J.; Bembia, P.J.; Bradbury, J.W.; Jackson, K.C.; Kelly, W.R.; Kovach, L.A.; Mo, T.; Tesoriero, J.A.

    1986-01-01

    Geochemistry plays a key role in determining the potential of a high-level radioactive waste disposal site for long-term radionuclide containment and isolation. The Nuclear Regulatory Commission (NRC) has developed a set of issues and information needs important for characterizing geochemistry at the potential sites being investigated by the Department of Energy Basalt Waste Isolation Project, Nevada Nuclear Waste Storage Investigations project, and Salt Repository Project. The NRC site issues and information needs consider (1) the geochemical environment of the repository, (2) changes to the initial geochemical environment caused by construction and waste emplacement, and (3) interactions that affect the transport of waste radionuclides to the accessible environment. The development of these issues and information needs supports the ongoing effort of the NRC to identify and address areas of geochemical data uncertainty during prelicensing interactions

  19. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  20. McArthur River project - the future of Key Lake

    International Nuclear Information System (INIS)

    Spross, J.

    1994-01-01

    The Key Lake mill has operated since the fall of 1983. The ore from both Key Lake open pits will be depleted by 1997. It is planned to use this mill, located about 60 km southwest of McArthur, to process the McArthur River ore. While the geological data collected so far on the McArthur deposit are encouraging, more information of the deposit is needed before any detailed mine planning can begin. The surface drilling program identified the orebody and provided information on the geomechanical and hydrological properties of the overlying sandstone. It was proposed to conduct an underground exploration program to further delineate the orebody. This was approved following a public hearing and review process. This program involves the sinking of a 630 metre deep shaft and the driving of one or two drifts along a portion of the orebody. From these drifts, exploration drilling every 10 m to 15 m through the orebody will provide the information required for the preparation of a feasibility study and an Environmental Impact Statement (EIS). (author). 4 refs., 8 figs

  1. Zika Virus: Critical Information for Emergency Providers.

    Science.gov (United States)

    Shastry, Siri; Koenig, Kristi L; Hirshon, Jon Mark

    2016-08-01

    Zika virus is an arbovirus of the Flaviviridae family. It is primarily a minimally symptomatic mosquito-borne infection. However, with Zika's 2015 to 2016 introduction into the Western Hemisphere and its dramatic and rapid spread, it has become a public health concern, in large part due to congenital abnormalities associated with infection in pregnant women. In early 2016, the World Health Organization declared the microcephaly and other neurologic conditions associated with Zika virus infection a public health emergency of international concern. This article discusses the current epidemiologic and clinical understanding of Zika virus, focusing on critical information needed by emergency providers. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  3. Quantum key distribution session with 16-dimensional photonic states

    Science.gov (United States)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  4. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  5. Duty to provide pre-contractual information of crop insurance

    Directory of Open Access Journals (Sweden)

    Ivančević Katarina

    2016-01-01

    Full Text Available Crop insurance is one of the most important types of agricultural insurance. From the aspect of insurance technique, this insurance is very challenging and requires careful drafting of insurance terms and tariffs. This type of insurance can provide security to farmers in case of financial losses caused by numerous risks which they are exposed to. Insufficient knowledge of the opportunities that the insurance provides is caused in part by inaccurate and vague explanations that have been offered by insurers in negotiation stage to interested farmers. In this regard, an important novelty in Serbian law is the obligation of contractual information which was introduced by the new Insurance Law (IL. In this way, additional protection to users of the service of insurance in relation to the provisions of the obligation law is provided. The goal of this obligation is to allow a negotiator to gain a clear idea of the essential elements of the insurance contract, to consider the proposed coverage and make a reasonable decision whether to accept the conclusion of the insurance contract or not, i.e. under what conditions it should be concluded. Sanctions for failure in the obligation to inform act preventively and repressively on insurers. The aim of this study is analyse the legal and factual position of the service beneficiaries in terms of obligation of economically and experientially superior contractor of lawful and full information of a policyholder prior to the conclusion of an insurance contract in a very specific branch of insurance, such as crop insurance. The application of inductive-deductive and comparative-legal research method, points to certain doctrinal and normative solutions from other legal systems, legal provisions applicable in the law of the Republic of Serbia are critically set out, as well as the daily practice of insurance companies.

  6. Capturing information needs of care providers to support knowledge sharing and distributed decision making.

    Science.gov (United States)

    Rogers, M; Zach, L; An, Y; Dalrymple, P

    2012-01-01

    This paper reports on work carried out to elicit information needs at a trans-disciplinary, nurse-managed health care clinic that serves a medically disadvantaged urban population. The trans-disciplinary model provides a "one-stop shop" for patients who can receive a wide range of services beyond traditional primary care. However, this model of health care presents knowledge sharing challenges because little is known about how data collected from the non-traditional services can be integrated into the traditional electronic medical record (EMR) and shared with other care providers. There is also little known about how health information technology (HIT) can be used to support the workflow in such a practice. The objective of this case study was to identify the information needs of care providers in order to inform the design of HIT to support knowledge sharing and distributed decision making. A participatory design approach is presented as a successful technique to specify requirements for HIT applications that can support a trans-disciplinary model of care. Using this design approach, the researchers identified the information needs of care providers working at the clinic and suggested HIT improvements to integrate non-traditional information into the EMR. These modifications allow knowledge sharing among care providers and support better health decisions. We have identified information needs of care providers as they are relevant to the design of health information systems. As new technology is designed and integrated into various workflows it is clear that understanding information needs is crucial to acceptance of that technology.

  7. Geometric information provider platform

    Directory of Open Access Journals (Sweden)

    Meisam Yousefzadeh

    2015-07-01

    Full Text Available Renovation of existing buildings is known as an essential stage in reduction of the energy loss. Considerable part of renovation process depends on geometric reconstruction of building based on semantic parameters. Following many research projects which were focused on parameterizing the energy usage, various energy modelling methods were developed during the last decade. On the other hand, by developing accurate measuring tools such as laser scanners, the interests of having accurate 3D building models are rapidly growing. But the automation of 3D building generation from laser point cloud or detection of specific objects in that is still a challenge.  The goal is designing a platform through which required geometric information can be efficiently produced to support energy simulation software. Developing a reliable procedure which extracts required information from measured data and delivers them to a standard energy modelling system is the main purpose of the project.

  8. Multiple Information Fusion Face Recognition Using Key Feature Points

    Directory of Open Access Journals (Sweden)

    LIN Kezheng

    2017-06-01

    Full Text Available After years of face recognition research,due to the effect of illumination,noise and other conditions have led to the recognition rate is relatively low,2 d face recognition technology has couldn’t keep up with the pace of The Times the forefront,Although 3 d face recognition technology is developing step by step,but it has a higher complexity. In order to solve this problem,based on the traditional depth information positioning method and local characteristic analysis methods LFA,puts forward an improved 3 d face key feature points localization algorithm, and on the basis of the trained sample which obtained by complete cluster,further put forward the global and local feature extraction algorithm of weighted fusion. Through FRGC and BU-3DFE experiment data comparison and analysis of the two face library,the method in terms of 3 d face recognition effect has a higher robustness.

  9. Roles and responsibilities of pharmacists with respect to natural health products: key informant interviews.

    Science.gov (United States)

    Olatunde, Shade; Boon, Heather; Hirschkorn, Kristine; Welsh, Sandy; Bajcar, Jana

    2010-03-01

    Although many pharmacies sell natural health products (NHPs), there is no clear definition as to the roles and responsibilities (if any) of pharmacists with respect to these products. The purpose of this study was to explore pharmacy and stakeholder leaders' perceptions of pharmacists' professional NHP roles and responsibilities. Semi-structured key informant interviews were conducted with pharmacy leaders (n=17) and stakeholder (n=18) leaders representing consumers, complementary and alternative medicine practitioners, conventional health care practitioners, and industry across Canada. All participants believed a main NHP responsibility for pharmacists was in safety monitoring, although a one challenge identified in the interviews was pharmacists' general lack of NHP knowledge; however, stakeholder leaders did not expect pharmacists to be experts, but should have a basic level of knowledge about NHPs. Participants described pharmacists' professional roles and responsibilities for NHPs as similar to those for over-the-counter drugs; more awareness of existing NHP-related pharmacy policies is needed, and pharmacy owners/managers should provide additional training to ensure front-line pharmacists have appropriate knowledge of NHPs sold in the pharmacy. Copyright 2010 Elsevier Inc. All rights reserved.

  10. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  11. Training: Who Needs It? Research Report 1995. Key Issues for Providers.

    Science.gov (United States)

    Hotel and Catering Training Co., London (England).

    Aimed at all those involved in the supply of training and vocational education for the hospitality industry, this report summarizes findings of the research report, "Training Who Needs It?" It draws out and explores in more detail key issues relating to the provision of training, support, and related initiatives for the industry. Section…

  12. Providing Decision-Relevant Information for a State Climate Change Action Plan

    Science.gov (United States)

    Wake, C.; Frades, M.; Hurtt, G. C.; Magnusson, M.; Gittell, R.; Skoglund, C.; Morin, J.

    2008-12-01

    Carbon Solutions New England (CSNE), a public-private partnership formed to promote collective action to achieve a low carbon society, has been working with the Governor appointed New Hampshire Climate Change Policy Task Force (NHCCTF) to support the development of a state Climate Change Action Plan. CSNE's role has been to quantify the potential carbon emissions reduction, implementation costs, and cost savings at three distinct time periods (2012, 2025, 2050) for a range of strategies identified by the Task Force. These strategies were developed for several sectors (transportation and land use, electricity generation and use, building energy use, and agriculture, forestry, and waste).New Hampshire's existing and projected economic and population growth are well above the regional average, creating additional challenges for the state to meet regional emission reduction targets. However, by pursuing an ambitious suite of renewable energy and energy efficiency strategies, New Hampshire may be able to continue growing while reducing emissions at a rate close to 3% per year up to 2025. This suite includes efficiency improvements in new and existing buildings, a renewable portfolio standard for electricity generation, avoiding forested land conversion, fuel economy gains in new vehicles, and a reduction in vehicle miles traveled. Most (over 80%) of these emission reduction strategies are projected to provide net economic savings in 2025.A collaborative and iterative process was developed among the key partners in the project. The foundation for the project's success included: a diverse analysis team with leadership that was committed to the project, an open source analysis approach, weekly meetings and frequent communication among the partners, interim reporting of analysis, and an established and trusting relationship among the partners, in part due to collaboration on previous projects.To develop decision-relevant information for the Task Force, CSNE addressed

  13. 30 CFR 250.1406 - When will MMS notify me and provide penalty information?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false When will MMS notify me and provide penalty information? 250.1406 Section 250.1406 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE... (OCS) Civil Penalties § 250.1406 When will MMS notify me and provide penalty information? If the...

  14. 7 CFR 2902.6 - Providing product information to Federal agencies.

    Science.gov (United States)

    2010-01-01

    ... manufacturers and vendors to provide product, business contacts, and product information for designated items... characteristics, including verification of such characteristics if requested. (b) Advertising, labeling and marketing claims. Manufacturers and vendors are reminded that their advertising, labeling, and other...

  15. Providing public information in the Slovenian Nuclear Safety Administration

    International Nuclear Information System (INIS)

    Fon Jager, Mojca

    2000-01-01

    Full text: Good safety culture is strongly related to transparent and timely information. Experience has shown that radiation and nuclear safety are under continuous surveillance by the public. The provision of open and authentic information to the public is a fundamental policy of the SNSA. The SNSA endeavors to provide substantial and reliable information to the interested institutions, mass media and to the citizens through press conferences, public statements, media discussions, and active participation in domestic and international meetings, symposia and congresses, through publications, the Internet and direct contacts with the interested public. The SNSA regularly provides information on nuclear safety to the Government, the National Assembly and the citizens of the Republic of Slovenia. The Annual Report on Nuclear and Radiation Safety is published in Poroeevalec (Reporter) - the publication of the National Assembly - in autumn, and is available in public libraries throughout Slovenia. Annual Report is available also on the Internet (http://www.sigov.si/ursjv/uvod.html) in Slovene and English. Access to data of the Central Radiation Early Warning System of Slovenia (CROSS), recording the real time (at half-hour intervals) gamma dose rate levels, is also available through Internet. The report in English is sent every year to Slovenian embassies world-wide, to certain foreign embassies in Slovenia and to other organizations participating in the activities in the nuclear and radiological field. Reports on the SNSA activities are also published in the bulletin Okolje in prostor (Environment and Spatial Planning), published by the Ministry of Environment and Spatial Planning. The SNSA regularly contributes articles on courses, seminars and symposia attended at home and abroad. The articles are intended to give basic information on training and the names of contact persons to provide additional information on certain topics to those interested. More than half of

  16. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  17. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  18. Access to Opportunities for Bilingualism for Individuals with Developmental Disabilities: Key Informant Interviews.

    Science.gov (United States)

    de Valenzuela, Julia Scherba; Bird, Elizabeth Kay-Raining; Parkington, Karisa; Mirenda, Pat; Cain, Kate; MacLeod, Andrea A N; Segers, Eliane

    The purpose of this article is to describe the results of a thematic analysis of 79 semi-structured interviews collected at six research sites in four countries in relation to the inclusion and exclusion of students with developmental disabilities (DD) in and from special education and bilingual opportunities. The participants were individuals with expertise either in special needs and/or language education to support bilingualism (e.g., second language (L2) instruction), who served as key informants about service delivery and/or policy in these areas. Six themes emerged as salient during the analysis: we include all kids, special needs drives it, time/scheduling conflicts, IEP/IPP/statement drives it, it's up to the parents, and service availability. The results suggested that access to language programs and services is limited for children with DD, even though participants at all sites reported adherence to a philosophy of inclusion. A priority on special education services over language services was identified, as well as barriers to providing children with DD access to programs and services to support bilingual development. Some of these barriers included time and scheduling conflicts and limited service availability. Additionally, the role of parents in decision making was affirmed, although, in contrast to special education services, decision-making about participation or exemption from language programs was typically left up to the parents. Overall, the results suggest a need for greater attention to providing supports for both first (L1) and L2 language development for bilingual children with DD and greater access to available language programs. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Comment on ''Semiquantum-key distribution using less than four quantum states''

    International Nuclear Information System (INIS)

    Boyer, Michel; Mor, Tal

    2011-01-01

    For several decades it was believed that information-secure key distribution requires both the sender and receiver to have the ability to generate and/or manipulate quantum states. Earlier, we showed that quantum key distribution in which one party is classical is possible [Boyer, Kenigsberg, and Mor, Phys. Rev. Lett. 99, 140501 (2007)]. A surprising and very nice extension of that result was suggested by Zou, Qiu, Li, Wu, and Li [Phys. Rev. A 79, 052312 (2009)]. Their paper suggests that it is sufficient for the originator of the states (the person holding the quantum technology) to generate just one state. The resulting semiquantum key distribution, which we call here 'quantum key distribution with classical Alice' is indeed completely robust against eavesdropping. However, their proof (that no eavesdropper can get information without being possibly detected) is faulty. We provide here a fully detailed and direct proof of their very important result.

  20. 30 CFR 203.70 - What information must I provide after MMS approves relief?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false What information must I provide after MMS... information must I provide after MMS approves relief? You must submit reports to us as indicated in the following table. Sections 203.81, 203.90, and 203.91 describe what these reports must include. The MMS...

  1. Summary of Key Operating Statistics: Data Collected from the 2009 Annual Institutional Report

    Science.gov (United States)

    Accrediting Council for Independent Colleges and Schools, 2010

    2010-01-01

    The Accrediting Council for Independent Colleges and Schools (ACICS) provides the Summary of Key Operating Statistics (KOS) as an annual review of the performance and key measurements of the more than 800 private post-secondary institutions we accredit. This edition of the KOS contains information based on the 2009 Annual Institutional Reports…

  2. Family benefits - Obligation to provide information

    CERN Multimedia

    HR Department

    2015-01-01

    Pursuant to Article R V 1.38 of the Staff Regulations, members of the personnel are reminded that they are required to inform the Organization in writing, within 30 calendar days, of any change in their family situation (marriage, partnership, birth of a child, etc.) and of the amount of any financial benefit of a similar nature to those provided for in the Staff Regulations (e.g. family allowance, child allowance, infant allowance, non-resident allowance or international indemnity) to which they or a member of their family may be entitled from a source other than CERN.   The procedures to be followed are available in the Admin e-guide: https://admin-eguide.web.cern.ch/en/procedure/change-family-situation Members of the personnel are also reminded that any false declaration or failure to make a declaration with a view to deceiving others or achieving a gain resulting in a loss of funds or reputation for CERN constitutes fraud and may lead to disciplinary action in accordance with Article S ...

  3. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  4. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  5. Providing written information increases patient satisfaction: a web-based questionnaire survey of Japanese cancer survivors.

    Science.gov (United States)

    Sakai, Hitomi; Katsumata, Noriyuki; Takahashi, Miyako

    2017-07-01

    The Institute of Medicine (IOM) of the United States recommends that all cancer survivors be provided with a survivorship care plan (SCP), which includes a patient treatment summary and a follow-up care plan. However, SCPs have not been widely adopted in Japan. To provide basic data necessary for implementing SCPs in Japan, we aimed to investigate the forms of clinical and survivorship-related information that Japanese cancer survivors receive from their healthcare providers, and to examine whether written information increases their satisfaction. We performed a cross-sectional online survey of cancer survivors who underwent acute cancer treatment and had at least one follow-up with a physician in the past year. Cancer survivors provided the elements and forms (verbally and/or written) of information they received, as well as the degree of satisfaction with the information provided. Responses were obtained from 545 cancer survivors. Information elements such as surgical procedure (98.3%), surgical outcome (98.1%), and names of administered chemotherapy agents (97.8%) were commonly provided, whereas mental care resources and providers (29.7%), effects on marital relationship and sexual health (35.7%), and effects on fertility (43.4%) were less common. A large proportion of cancer survivors received verbal information only. For 18 of 20 elements, except for effects on fertility and duration of hormonal therapy, satisfaction was significantly higher when both forms of information were provided (P information can better meet the needs of Japanese cancer survivors. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  6. A CEO View of Key Issues in Australian Information Systems Management - 1997

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1998-05-01

    Full Text Available As part of a research programme on key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by their chief executive officers (CEOs as being important, problematic and critical over the next three to five years. The results reported are based on a relatively low response rate (though perhaps reasonable for the target group so should be regarded as only exploratory. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, disaster recovery, strategic management issues (BPR, competitive advantage, information architecture, people management issues (organisational learning, systems development and data management issues (effective use of the data resource, effectiveness/productivity of IS, effectiveness of software development, and their own support systems (EIS/DSS. This reflects their interest in a wide range of issues, but all with an organisation-wide focus. Non-critical issues were mostly related to the individual technologies and the place and role of IS in the organisation. While the CEOs showed some agreement with their chief information officers (CIOs on issues such as the IT infrastructure, competitive advantage, and organisational learning some distinct differences exist, particularly in relation to the quality and effectiveness of systems and processes and also how CEOs and CIOs perceive each other.

  7. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  8. Using imputation to provide location information for nongeocoded addresses.

    Directory of Open Access Journals (Sweden)

    Frank C Curriero

    2010-02-01

    Full Text Available The importance of geography as a source of variation in health research continues to receive sustained attention in the literature. The inclusion of geographic information in such research often begins by adding data to a map which is predicated by some knowledge of location. A precise level of spatial information is conventionally achieved through geocoding, the geographic information system (GIS process of translating mailing address information to coordinates on a map. The geocoding process is not without its limitations, though, since there is always a percentage of addresses which cannot be converted successfully (nongeocodable. This raises concerns regarding bias since traditionally the practice has been to exclude nongeocoded data records from analysis.In this manuscript we develop and evaluate a set of imputation strategies for dealing with missing spatial information from nongeocoded addresses. The strategies are developed assuming a known zip code with increasing use of collateral information, namely the spatial distribution of the population at risk. Strategies are evaluated using prostate cancer data obtained from the Maryland Cancer Registry. We consider total case enumerations at the Census county, tract, and block group level as the outcome of interest when applying and evaluating the methods. Multiple imputation is used to provide estimated total case counts based on complete data (geocodes plus imputed nongeocodes with a measure of uncertainty. Results indicate that the imputation strategy based on using available population-based age, gender, and race information performed the best overall at the county, tract, and block group levels.The procedure allows for the potentially biased and likely under reported outcome, case enumerations based on only the geocoded records, to be presented with a statistically adjusted count (imputed count with a measure of uncertainty that are based on all the case data, the geocodes and imputed

  9. Microtubules provide directional information for core PCP function

    Science.gov (United States)

    Matis, Maja; Russler-Germain, David A; Hu, Qie; Tomlin, Claire J; Axelrod, Jeffrey D

    2014-01-01

    Planar cell polarity (PCP) signaling controls the polarization of cells within the plane of an epithelium. Two molecular modules composed of Fat(Ft)/Dachsous(Ds)/Four-jointed(Fj) and a ‘PCP-core’ including Frizzled(Fz) and Dishevelled(Dsh) contribute to polarization of individual cells. How polarity is globally coordinated with tissue axes is unresolved. Consistent with previous results, we find that the Ft/Ds/Fj-module has an effect on a MT-cytoskeleton. Here, we provide evidence for the model that the Ft/Ds/Fj-module provides directional information to the core-module through this MT organizing function. We show Ft/Ds/Fj-dependent initial polarization of the apical MT-cytoskeleton prior to global alignment of the core-module, reveal that the anchoring of apical non-centrosomal MTs at apical junctions is polarized, observe that directional trafficking of vesicles containing Dsh depends on Ft, and demonstrate the feasibility of this model by mathematical simulation. Together, these results support the hypothesis that Ft/Ds/Fj provides a signal to orient core PCP function via MT polarization. DOI: http://dx.doi.org/10.7554/eLife.02893.001 PMID:25124458

  10. The changing face of government information providing access in the twenty-first century

    CERN Document Server

    Kumar, Suhasini L

    2006-01-01

    Learn what innovative changes lie in the future of government information The Changing Face of Government Information comprehensively examines the way government documents' librarians acquire, provide access, and provide reference services in the new electronic environment. Noted experts discuss the impact electronic materials have had on the Government Printing Office (GPO), the reference services within the Federal Depository Library Program (FDLP), and the new opportunities in the transition from paper-based information policy to an electronic e-government. This source reveals the latest changes in the field of government documents librarianship and the knowledge and expertise needed to teach users how to access what they need from this enormous wealth of government information. Major changes have taken place in the way government information is created, disseminated, accessed, and preserved. The Changing Face of Government Information explains in detail the tremendous change taking place in libraries and ...

  11. 77 FR 36281 - Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol

    Science.gov (United States)

    2012-06-18

    ...] Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol AGENCY... Register notice informs the public that OIG: (1) Intends to update the Provider Self-Disclosure Protocol... Provider Self-Disclosure Protocol (the Protocol) to establish a process for health care providers to...

  12. Key Design Properties for Shipping Information Pipeline

    DEFF Research Database (Denmark)

    Jensen, Thomas; Tan, Yao-Hua

    2015-01-01

    on paper, e-mail, phone and text message, and far too costly. This paper explores the design properties for a shared information infrastructure to exchange information between all parties in the supply chain, commercial parties as well as authorities, which is called a Shipping Information Pipeline...

  13. Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Azarderskhsh Reza

    2011-01-01

    Full Text Available Information security in infrastructureless wireless sensor networks (WSNs is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent research has shown that achieving survivability in WSNs requires a hierarchy and heterogeneous infrastructure. In this paper, to address security issues in the heterogeneous WSNs, we propose a secure clustering scheme along with a deterministic pairwise key management scheme based on public key cryptography. The proposed security mechanism guarantees that any two sensor nodes located in the same cluster and routing path can directly establish a pairwise key without disclosing any information to other nodes. Through security performance evaluation, it is shown that the proposed scheme guarantees node-to-node authentication, high resiliency against node capture, and minimum memory space requirement.

  14. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  15. FTA real-time transit information assessment : white paper on literature review of real-time transit information systems.

    Science.gov (United States)

    Real-time transit information systems are key technology applications within the transit industry designed to provide better customer service by disseminating timely and accurate information. Riders use this information to make various decisions abou...

  16. Opinion On Drug Information Services Provided In A Multi- Specialty Teaching Hospital

    Directory of Open Access Journals (Sweden)

    Vijayakumar TM, Poovi G & Dhanaraju MD

    2011-05-01

    Full Text Available Objective: To evaluate the various drug information queriesreceived, and to access the drug information services providedby the pharmacy practice department.Method: Drug information queries received during wardrounds, direct communication, telephone or internet etc. weredocumented in the drug information request anddocumentation forms prepared by the department over theperiod of January 2010 to June 2010. Various parameters likestatus of enquirer, their specialty, mode of receipt of query,purpose of query, type of query etc. were consider forevaluation.Results: Out of 208 queries received, major 56 (26.9% frommale medical ward. Maximum [82 (39.4 %] queries were fromthe physicians. 73 (35.0 % of the queries were about therecent advances and the updating of the information, It wasfound that mostly the mode of request was during wardrounds 85 (40.9%. Most of the queries [126 (60.6%] wereanswered by written or printout format. Majority of thequeries [195 (93.8 %] were answered directly to theenquirers through direct access. Most of the queries wereanswered through books in the department [86 (41.3 %].Conclusion: Results of the external auditing revealed thatrequestors were generally satisfied with the service provided.The drug information services provided by clinical pharmacistsat the hospital were found to be useful and beneficial to thehealthcare professionals and patients.

  17. Key Technologies and Applications of Satellite and Sensor Web-coupled Real-time Dynamic Web Geographic Information System

    Directory of Open Access Journals (Sweden)

    CHEN Nengcheng

    2017-10-01

    Full Text Available The geo-spatial information service has failed to reflect the live status of spot and meet the needs of integrated monitoring and real-time information for a long time. To tackle the problems in observation sharing and integrated management of space-borne, air-borne, and ground-based platforms and efficient service of spatio-temporal information, an observation sharing model was proposed. The key technologies in real-time dynamic geographical information system (GIS including maximum spatio-temporal coverage-based optimal layout of earth-observation sensor Web, task-driven and feedback-based control, real-time access of streaming observations, dynamic simulation, warning and decision support were detailed. An real-time dynamic Web geographical information system (WebGIS named GeoSensor and its applications in sensing and management of spatio-temporal information of Yangtze River basin including navigation, flood prevention, and power generation were also introduced.

  18. Quality and use of consumer information provided with home test kits: room for improvement.

    Science.gov (United States)

    Grispen, Janaica E J; Ickenroth, Martine H P; de Vries, Nanne K; van der Weijden, Trudy; Ronda, Gaby

    2014-10-01

    Diagnostic self-tests (tests on body materials that are initiated by consumers with the aim of diagnosing a disorder or risk factor) are becoming increasingly available. Although the pros and cons of self-testing are currently not clear, it is an existing phenomenon that is likely to gain further popularity. To examine consumers' use of and needs for information about self-testing, and to assess the quality of consumer information provided with home test kits, as perceived by consumers and as assessed using a checklist of quality criteria. A cross-sectional Internet survey among 305 self-testers assessed their use of and needs for information and their perception of the quality of consumer information provided with self-test kits. A meta-search engine was used to identify Dutch and English consumer information for home diagnostic tests available online at the time of the study. The quality of this consumer information was evaluated using a checklist of quality criteria. The consumers' information needs were in line with the most frequently used information, and the information was perceived as being of moderate to good quality. The information was mostly in agreement with clinical practice guidelines, although information on reliability and follow-up behaviour was limited. Approximately half of the instruction leaflets did not include information on the target group of the test. Although generally of moderate to good quality, some aspects of the information provided were in many cases insufficient. European legislation concerning self-tests and accompanying information needs to be adapted and adhered to more closely. © 2012 John Wiley & Sons Ltd.

  19. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    Science.gov (United States)

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  20. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    Directory of Open Access Journals (Sweden)

    Ran Zheng

    Full Text Available Surveillance video service (SVS is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  1. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  2. Key successes and challenges in providing mental health care in an urban male remand prison: a qualitative study.

    Science.gov (United States)

    Samele, Chiara; Forrester, Andrew; Urquía, Norman; Hopkin, Gareth

    2016-04-01

    This study aimed to describe the workings of an urban male remand prison mental health service exploring the key challenges and successes, levels of integration and collaboration with other services. A purposive sampling was used to recruit key prison and healthcare professionals for in-depth interviews. A thematic analysis was used to analyse transcripts based on an initial coding frame of several predefined themes. Other key themes were also identified. Twenty-eight interviews were conducted. Prisoners referred to the service had complex, sometimes acute mental illness requiring specialist assessment and treatment. Key successes of the in-reach service included the introduction of an open referral system, locating a mental health nurse at reception to screen all new prisoners and a zoning system to prioritise urgent or non-urgent cases. Achieving an integrated system of healthcare was challenging because of the numerous internal and external services operating across the prison, a highly transient population, limited time and space to deliver services and difficulties with providing inpatient care (e.g., establishing the criteria for admission and managing patient flow). Collaborative working between prison and healthcare staff was required to enable best care for prisoners. The prison mental health in-reach service worked well in assessing and prioritising those who required specialist mental health care. Although the challenges of working within the prison context limited what the in-reach team could achieve. Further work was needed to improve the unit environment and how best to target and deliver inpatient care within the prison.

  3. Practical private database queries based on a quantum-key-distribution protocol

    International Nuclear Information System (INIS)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  4. An Information System for Brownfield Regeneration: providing customised information according to stakeholders' characteristics and needs.

    Science.gov (United States)

    Rizzo, Erika; Pizzol, Lisa; Zabeo, Alex; Giubilato, Elisa; Critto, Andrea; Cosmo, Luca; Marcomini, Antonio

    2018-07-01

    In the EU brownfield presence is still considered a widespread problem. Even though, in the last decades, many research projects and initiatives developed a wealth of methods, guidelines, tools and technologies aimed at supporting brownfield regeneration. However, this variety of products had and still has a limited practical impact on brownfield revitalisation success, because they are not used in their entire potential due to their scarce visibility. Also, another problem that stakeholders face is finding customised information. To overcome this non-visibility and not-sufficient customisation of information, the Information System for Brownfield Regeneration (ISBR) has been developed, based on Artificial Neural Networks, which allows understanding stakeholders' information needs by providing tailored information. The ISBR has been tested by stakeholders from the EU project TIMBRE case studies, located in the Czech Republic, Germany, Poland and Romania. Data gained during tests allowed to understand stakeholders' information needs. Overall, stakeholders showed to be concerned first on remediation aspects, then on benchmarking information, which are valuable to improve practices in the complex field of brownfield regeneration, and then on the relatively new issue of sustainability applied to brownfield regeneration and remediation. Mature markets confirmed their interest for remediation-related aspects, highlighting the central role that risk assessment plays in the process. Emerging markets showed to seek information and tools for strategic and planning issues, like brownfield inventories and georeferenced data sets. Results led to conclude that a new improved platform, combining the ISBR functionalities with geo-referenced ones, would be useful and could represent a further research application. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Key Informant Perspectives on Federal Research Agency Policy and Systems and Scientific Workforce Diversity Development: A Companion Study

    Science.gov (United States)

    Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Manyibe, Edward O.; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Jennings-Jones, Desiree

    2017-01-01

    Purpose: In the previous analysis of key informant perspectives on minority research leaders' career development factors, we identified individual and sociocultural, institutional, and federal research agency (i.e., National Institute on Disability, Independent Living, and Rehabilitation Research; National Institutes of Health; Agency for…

  6. The effect of providing climate and health information on support for alternative electricity portfolios

    Science.gov (United States)

    Sergi, Brian; Davis, Alex; Azevedo, Inês

    2018-02-01

    Support for addressing climate change and air pollution may depend on the type of information provided to the public. We conduct a discrete choice survey assessing preferences for combinations of electricity generation portfolios, electricity bills, and emissions reductions. We test how participants’ preferences change when emissions information is explicitly provided to them. We find that support for climate mitigation increases when mitigation is accompanied by improvements to air quality and human health. We estimate that an average respondent would accept an increase of 19%-27% in their electricity bill if shown information stating that either CO2 or SO2 emissions are reduced by 30%. Furthermore, an average respondent is willing to pay an increase of 30%-40% in electricity bills when shown information stating that both pollutants are reduced by 30% simultaneously. Our findings suggest that the type of emissions information provided to the public will affect their support for different electricity portfolios.

  7. Multiple genetic interaction experiments provide complementary information useful for gene function prediction.

    Directory of Open Access Journals (Sweden)

    Magali Michaut

    Full Text Available Genetic interactions help map biological processes and their functional relationships. A genetic interaction is defined as a deviation from the expected phenotype when combining multiple genetic mutations. In Saccharomyces cerevisiae, most genetic interactions are measured under a single phenotype - growth rate in standard laboratory conditions. Recently genetic interactions have been collected under different phenotypic readouts and experimental conditions. How different are these networks and what can we learn from their differences? We conducted a systematic analysis of quantitative genetic interaction networks in yeast performed under different experimental conditions. We find that networks obtained using different phenotypic readouts, in different conditions and from different laboratories overlap less than expected and provide significant unique information. To exploit this information, we develop a novel method to combine individual genetic interaction data sets and show that the resulting network improves gene function prediction performance, demonstrating that individual networks provide complementary information. Our results support the notion that using diverse phenotypic readouts and experimental conditions will substantially increase the amount of gene function information produced by genetic interaction screens.

  8. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  9. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  10. Comics as a Medium for Providing Information on Adult Immunizations.

    Science.gov (United States)

    Muzumdar, Jagannath M; Pantaleo, Nicholas L

    2017-10-01

    This study compared the following effects of two vaccine information flyers-one developed by the Centers for Disease Control and Prevention (CDC) versus one adapted from this information to a comic medium (comic)-on adults: (a) attitude toward the flyer; (b) perceived informativeness of the flyer; (c) intention to seek more information about adult immunizations after viewing the flyer; and (d) intention to get immunized after viewing the flyer. A between-group, randomized trial was used to randomly assign adults (age 18 years or older) at an ambulatory care center to review the CDC or comic flyer. Participants were asked to complete a survey to measure several outcome variables. Items were measured using a 7-point semantic differential scale. Independent-samples t-test was used for comparisons. A total of 265 surveys (CDC n = 132 vs comic n = 133) were analyzed. The comic flyer had a statistically significant effect on participants' attitudes and their perception of the flyer's informativeness compared to the CDC flyer. Flyer type did not have a statistically significant effect on intention-related variables. The study findings showed that the comic flyer was positively evaluated compared to the CDC flyer. These findings could provide a new direction for developing adult educational materials.

  11. 29 CFR 37.38 - What information must grant applicants and recipients provide to CRC?

    Science.gov (United States)

    2010-07-01

    ... provide to CRC? 37.38 Section 37.38 Labor Office of the Secretary of Labor IMPLEMENTATION OF THE... information must grant applicants and recipients provide to CRC? In addition to the information which must be collected, maintained, and, upon request, submitted to CRC under § 37.37: (a) Each grant applicant and...

  12. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  13. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  14. Public service providers and users in the information society

    Directory of Open Access Journals (Sweden)

    Bernt Krohn Solvang

    2015-03-01

    Full Text Available The issue to be discussed in this article is to what extent does ICT create new challenges for the relationship between public service providers and users? It is important to recognize the concept of social capital because the concept is vital to the understanding of access to the information society and efficient functioning of government in its service to citizens. In this way we see social capital as a mediating “institution” between public authorities and the citizens (users.

  15. Providing Information about Reading Lists via a Dashboard Interface

    Directory of Open Access Journals (Sweden)

    Dr Jason Cooper

    2013-01-01

    Full Text Available As developers of the open source LORLS Resource/Reading List Management System we have developed a dashboard to better support academic staffs’ understanding of how their students use reading lists. This dashboard provides both graphical and tabulated information drawn from LORLS and the Aleph Integrated Library System. Development of the dashboard required changes to back-end functionality of LORLS such as logging views of reading lists and caching of loan data. Changes to the front end included the use of HTML5 canvas elements to generate pie charts and line graphs. Recently launched to academic staff at Loughborough University, the dashboard has already garnered much praise. It is hoped that further development of the dashboard will provide even more support for academics in the compilation of their reading lists.

  16. Use and satisfaction with key functions of a common commercial electronic health record: a survey of primary care providers.

    Science.gov (United States)

    Makam, Anil N; Lanham, Holly J; Batchelor, Kim; Samal, Lipika; Moran, Brett; Howell-Stampley, Temple; Kirk, Lynne; Cherukuri, Manjula; Santini, Noel; Leykum, Luci K; Halm, Ethan A

    2013-08-09

    Despite considerable financial incentives for adoption, there is little evidence available about providers' use and satisfaction with key functions of electronic health records (EHRs) that meet "meaningful use" criteria. We surveyed primary care providers (PCPs) in 11 general internal medicine and family medicine practices affiliated with 3 health systems in Texas about their use and satisfaction with performing common tasks (documentation, medication prescribing, preventive services, problem list) in the Epic EHR, a common commercial system. Most practices had greater than 5 years of experience with the Epic EHR. We used multivariate logistic regression to model predictors of being a structured documenter, defined as using electronic templates or prepopulated dot phrases to document at least two of the three note sections (history, physical, assessment and plan). 146 PCPs responded (70%). The majority used free text to document the history (51%) and assessment and plan (54%) and electronic templates to document the physical exam (57%). Half of PCPs were structured documenters (55%) with family medicine specialty (adjusted OR 3.3, 95% CI, 1.4-7.8) and years since graduation (nonlinear relationship with youngest and oldest having lowest probabilities) being significant predictors. Nearly half (43%) reported spending at least one extra hour beyond each scheduled half-day clinic completing EHR documentation. Three-quarters were satisfied with documenting completion of pneumococcal vaccinations and half were satisfied with documenting cancer screening (57% for breast, 45% for colorectal, and 46% for cervical). Fewer were satisfied with reminders for overdue pneumococcal vaccination (48%) and cancer screening (38% for breast, 37% for colorectal, and 31% for cervical). While most believed the problem list was helpful (70%) and kept an up-to-date list for their patients (68%), half thought they were unreliable and inaccurate (51%). Dissatisfaction with and suboptimal use

  17. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  18. Visualizing the Immune System: Providing Key Insights into HIV/SIV Infections

    Directory of Open Access Journals (Sweden)

    Jacob D. Estes

    2018-03-01

    Full Text Available Immunological inductive tissues, such as secondary lymphoid organs, are composed of distinct anatomical microenvironments for the generation of immune responses to pathogens and immunogens. These microenvironments are characterized by the compartmentalization of highly specialized immune and stromal cell populations, as well as the presence of a complex network of soluble factors and chemokines that direct the intra-tissue trafficking of naïve and effector cell populations. Imaging platforms have provided critical contextual information regarding the molecular and cellular interactions that orchestrate the spatial microanatomy of relevant cells and the development of immune responses against pathogens. Particularly in HIV/SIV disease, imaging technologies are of great importance in the investigation of the local interplay between the virus and host cells, with respect to understanding viral dynamics and persistence, immune responses (i.e., adaptive and innate inflammatory responses, tissue structure and pathologies, and changes to the surrounding milieu and function of immune cells. Merging imaging platforms with other cutting-edge technologies could lead to novel findings regarding the phenotype, function, and molecular signatures of particular immune cell targets, further promoting the development of new antiviral treatments and vaccination strategies.

  19. Using Vegetation Maps to Provide Information on Soil Distribution

    Science.gov (United States)

    José Ibáñez, Juan; Pérez-Gómez, Rufino; Brevik, Eric C.; Cerdà, Artemi

    2016-04-01

    Many different types of maps (geology, hydrology, soil, vegetation, etc.) are created to inventory natural resources. Each of these resources is mapped using a unique set of criteria, including scales and taxonomies. Past research has indicated that comparing the results of different but related maps (e.g., soil and geology maps) may aid in identifying deficiencies in those maps. Therefore, this study was undertaken in the Almería Province (Andalusia, Spain) to (i) compare the underlying map structures of soil and vegetation maps and (ii) to investigate if a vegetation map can provide useful soil information that was not shown on a soil map. To accomplish this soil and vegetation maps were imported into ArcGIS 10.1 for spatial analysis. Results of the spatial analysis were exported to Microsoft Excel worksheets for statistical analyses to evaluate fits to linear and power law regression models. Vegetative units were grouped according to the driving forces that determined their presence or absence (P/A): (i) climatophilous (climate is the only determinant of P/A) (ii); lithologic-climate (climate and parent material determine PNV P/A); and (iii) edaphophylous (soil features determine PNV P/A). The rank abundance plots for both the soil and vegetation maps conformed to Willis or Hollow Curves, meaning the underlying structures of both maps were the same. Edaphophylous map units, which represent 58.5% of the vegetation units in the study area, did not show a good correlation with the soil map. Further investigation revealed that 87% of the edaphohygrophylous units (which demand more soil water than is supplied by other soil types in the surrounding landscape) were found in ramblas, ephemeral riverbeds that are not typically classified and mapped as soils in modern systems, even though they meet the definition of soil given by the most commonly used and most modern soil taxonomic systems. Furthermore, these edaphophylous map units tend to be islands of biodiversity

  20. Does a ban on informal health providers save lives? Evidence from Malawi

    Science.gov (United States)

    Godlonton, Susan; Okeke, Edward N.

    2015-01-01

    Informal health providers ranging from drug vendors to traditional healers account for a large fraction of health care provision in developing countries. They are, however, largely unlicensed and unregulated leading to concern that they provide ineffective and, in some cases, even harmful care. A new and controversial policy tool that has been proposed to alter household health seeking behavior is an outright ban on these informal providers. The theoretical effects of such a ban are ambiguous. In this paper, we study the effect of a ban on informal (traditional) birth attendants imposed by the Malawi government in 2007. To measure the effect of the ban, we use a difference-in-difference strategy exploiting variation across time and space in the intensity of exposure to the ban. Our most conservative estimates suggest that the ban decreased use of traditional attendants by about 15 percentage points. Approximately three quarters of this decline can be attributed to an increase in use of the formal sector and the remainder is accounted for by an increase in relative/friend-attended births. Despite the rather large shift from the informal to the formal sector, we do not find any evidence of a statistically significant reduction in newborn mortality on average. The results are robust to a triple difference specification using young children as a control group. We examine several explanations for this result and find evidence consistent with quality of formal care acting as a constraint on improvements in newborn health. PMID:26681821

  1. Information Quality of a Nursing Information System depends on the nurses: A combined quantitative and qualitative evaluation

    NARCIS (Netherlands)

    Michel-Verkerke, M.B.

    2012-01-01

    Purpose Providing access to patient information is the key factor in nurses’ adoption of a Nursing Information System (NIS). In this study the requirements for information quality and the perceived quality of information are investigated. A teaching hospital in the Netherlands has developed a NIS as

  2. Contingency management: perspectives of Australian service providers.

    Science.gov (United States)

    Cameron, Jacqui; Ritter, Alison

    2007-03-01

    Given the very positive and extensive research evidence demonstrating efficacy and effectiveness of contingency management, it is important that Australia explore whether contingency management has a role to play in our own treatment context. Qualitative interviews were conducted with 30 experienced alcohol and drug practitioners, service managers and policy-makers in Victoria. Interviewees were selected to represent the range of drug treatment services types and included rural representation. A semi-structured interview schedule, covering their perceptions and practices of contingency management was used. All interviews were transcribed verbatim and analysed using N2 qualitative data analysis program. The majority of key informants were positively inclined toward contingency management, notwithstanding some concerns about the philosophical underpinnings. Concerns were raised in relation to the use of monetary rewards. Examples of the use of contingency management provided by key informants demonstrated an over-inclusive definition: all the examples did not adhere to the key principles of contingency management. This may create problems if a structured contingency management were to be introduced in Australia. Contingency management is an important adjunctive treatment intervention and its use in Australia has the potential to enhance treatment outcomes. No unmanageable barriers were identified in this study.

  3. Health care providers' use of a drug information service for pregnancy-related inquiries.

    Science.gov (United States)

    Patil, Avinash S; Patil, Neelima P; Lewis, Ashley N; Swamy, Geeta K; Murtha, Amy P

    2014-01-01

    To characterize pregnancy and lactation-related medication inquiries to a drug information center to identify classes of medications of most concern to providers. A secondary objective was to identify any trends in provider inquiries over the study period. A retrospective descriptive study of pregnancy and lactation-related inquiries to the University of North Carolina Health Care System Drug Information Center database between January 2001 and December 2010. University of North Carolina Health Care System Drug Information Center. Provider inquiries and responses were extracted and characterized by indication for treatment and reason for inquiry. Comparison of the first and second 5-year periods was performed to delineate trends. Descriptive statistics, Fisher's Exact and χ2 tests were used for analysis. Inquiry origin, time, and subject. 433 inquiries were retrieved over the study period from physicians (50%), pharmacists (21%), and nurses (18%). Inquiries were most often made during the antepartum period (34%), followed by the postpartum (28%) and preconception (22%) periods. The most frequent indications for inquiry were psychiatry (15%) and infectious diseases (14%), which remained constant throughout the study period. Safety was the most common reason for inquiry (52%). The responses provided to callers were limited due to lack of information availability 37% of the time. Psychiatry and infectious disease-related indications are the most frequent subjects of provider inquiry regarding medication use in pregnancy. Rates of inquiry remained constant throughout the past decade in most therapeutic areas. These findings are consistent with previous observations in other developed countries and suggest high-yield areas for pharmacist education.

  4. Facing the Maze: Young Cancer Survivors' Return to Education and Work-A Professional Expert Key Informant Study.

    Science.gov (United States)

    Pedersen, Kaspar Jessen; Boisen, Kirsten Arntz; Midtgaard, Julie; Elsbernd, Abbey; Larsen, Hanne Baekgaard

    2018-03-13

    An insufficient transition to normal life after cancer treatment in adolescent and young adults (AYAs) may lead to decreased occupational and educational opportunities throughout a survivor's lifespan. Key informant interviews were used to access unique knowledge of the healthcare, educational, and social systems. We used key informant interviews with professionals representing disciplines from healthcare, educational, and social systems (n = 15). Informants were recruited through purposive sampling and snowball sampling. Interviews were analyzed thematically using Malterud's Systematic Text Condensation and verified by member checking. We found four major themes: the impact of late effects, navigating the system, social reintegration, and the drive of youth. Although legal frameworks are often in place to assist AYA cancer survivors, navigating the public, educational, and social systems is a complex task and many AYAs do not have the required skill set or energy. Furthermore, AYA survivors often feel different from their peers and misunderstood by their surroundings, which may hinder reintegration into normal social life. In Scandinavia, healthcare and education are free of charge with equal access for all, primarily funded by government taxes. Therefore, insurance status and tuition fees should not constitute barriers for returning to education and work. However, this study finds that the public and educational systems are complex to navigate, and that AYAs face trouble mobilizing the energy to receive needed support.

  5. Comment on ``Semiquantum-key distribution using less than four quantum states''

    Science.gov (United States)

    Boyer, Michel; Mor, Tal

    2011-04-01

    For several decades it was believed that information-secure key distribution requires both the sender and receiver to have the ability to generate and/or manipulate quantum states. Earlier, we showed that quantum key distribution in which one party is classical is possible [Boyer, Kenigsberg, and Mor, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.99.140501 99, 140501 (2007)]. A surprising and very nice extension of that result was suggested by Zou, Qiu, Li, Wu, and Li [Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.79.052312 79, 052312 (2009)]. Their paper suggests that it is sufficient for the originator of the states (the person holding the quantum technology) to generate just one state. The resulting semiquantum key distribution, which we call here “quantum key distribution with classical Alice” is indeed completely robust against eavesdropping. However, their proof (that no eavesdropper can get information without being possibly detected) is faulty. We provide here a fully detailed and direct proof of their very important result.

  6. Development of technical information processing system (VII)

    International Nuclear Information System (INIS)

    Kim, Tae Whan; Choi, Kwang; Oh, Jeong Hoon; Jeong, Hyun Sook; Keum, Jong Yong

    1995-12-01

    The goal of this project is to establish integrated environment focused on enhanced information services to researchers through the providing of acquisition information, key phrase retrieval function, journal content information linked with various subsystems already developed. The results of the project are as follows. 1. It is possible to serve information on unreceivable materials among required materials throughout the system. 2. Retrieval efficiency is increased by the adding of key phrase retrieval function. 3. Rapidity of information service is enhanced by the providing of journal contents of each issue received and work performance of contents service is become higher. 4. It is possible to acquire, store, serve technical information needed in R and D synthetically and systematically throughout the development of total system linked with various subsystems required to technical information management and service. 21 refs. (Author)

  7. Characterization of Patient Interest in Provider-Based Consumer Health Information Technology: Survey Study.

    Science.gov (United States)

    Featherall, Joseph; Lapin, Brittany; Chaitoff, Alexander; Havele, Sonia A; Thompson, Nicolas; Katzan, Irene

    2018-04-19

    Consumer health information technology can improve patient engagement in their health care and assist in navigating the complexities of health care delivery. However, the consumer health information technology offerings of health systems are often driven by provider rather than patient perspectives and inadequately address patient needs, thus limiting their adoption by patients. Consideration given to patients as stakeholders in the development of such technologies may improve adoption, efficacy, and consumer health information technology resource allocation. The aims of this paper were to measure patient interest in different health system consumer health information technology apps and determine the influence of patient characteristics on consumer health information technology interest. Patients seen at the Cleveland Clinic Neurological Institute were electronically surveyed on their interest in using different consumer health information technology apps. A self-efficacy scale, Patient Health Questionnaire-9 depression screen, and EuroQol 5 dimensions health-related quality of life scale were also completed by patients. Logistic regression was used to determine the influence of patient characteristics on interest in consumer health information technology in the categories of self-management, education, and communication. The majority of 3852 patient respondents had an interest in all technology categories assessed in the survey. The highest interest was in apps that allow patients to ask questions of providers (3476/3852, 90.24%) and to schedule appointments (3211/3839, 83.64%). Patient interest in consumer health information technology was significantly associated with greater depression symptoms, worse quality of life, greater health self-efficacy, and smartphone ownership (Pinformation technology development and their perspectives should consistently guide development efforts. Health systems should consider focusing on consumer health information technologies

  8. Key Financial Metrics on Australia's Higher Education Sector--December 2016

    Science.gov (United States)

    Australian Government Tertiary Education Quality and Standards Agency, 2016

    2016-01-01

    This report is the second release of financial information held by Tertiary Education Quality and Standards Agency (TEQSA). It provides a snapshot of selected key financial metrics across the Australian higher education sector. Data in this report has been sourced from TEQSA's 2015 data collection and relates to financial years ended 31 December…

  9. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  10. Key influences in the design and implementation of mental health information systems in Ghana and South Africa.

    Science.gov (United States)

    Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A

    2016-01-01

    Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches

  11. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews.

    Science.gov (United States)

    Lo, Brian K; Morgan, Emily H; Folta, Sara C; Graham, Meredith L; Paul, Lynn C; Nelson, Miriam E; Jew, Nicolette V; Moffat, Laurel F; Seguin, Rebecca A

    2017-10-04

    Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  12. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews

    Directory of Open Access Journals (Sweden)

    Brian K. Lo

    2017-10-01

    Full Text Available Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  13. Composite Indexes Economic and Social Performance: Do they Provide Valuable Information?

    Directory of Open Access Journals (Sweden)

    Nasierowski Wojciech

    2016-01-01

    Full Text Available This paper examines the information content of the selected composite indexes, namely the Global Competitiveness Report Index, the Human Development Index, the Knowledge Economy Index, the Innovation Union Scoreboard, and the like. These indexes are examined from the viewpoint of country rankings. It is argued that these indexes provide highly similar information, which brings to question the usefulness of such a variety of approaches. This paper also explores the drawbacks of composite indexes, and questions whether these indexes can adequately serve as policy-setting mechanisms.

  14. Distributed Data Networks That Support Public Health Information Needs.

    Science.gov (United States)

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  15. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  16. 78 FR 11654 - Draft Guidance for Industry and Food and Drug Administration Staff; Providing Information About...

    Science.gov (United States)

    2013-02-19

    ...] Draft Guidance for Industry and Food and Drug Administration Staff; Providing Information About... Guidance for Industry and Food and Drug Administration Staff: Providing Information About Pediatric Uses of...ComplianceRegulatoryInformation/default.htm . To receive ``Draft Guidance for Industry and Food and Drug...

  17. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  18. Quantum cryptography using coherent states: Randomized encryption and key generation

    Science.gov (United States)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  19. Model of Providing Assistive Technologies in Special Education Schools.

    Science.gov (United States)

    Lersilp, Suchitporn; Putthinoi, Supawadee; Chakpitak, Nopasit

    2015-05-14

    Most students diagnosed with disabilities in Thai special education schools received assistive technologies, but this did not guarantee the greatest benefits. The purpose of this study was to survey the provision, use and needs of assistive technologies, as well as the perspectives of key informants regarding a model of providing them in special education schools. The participants were selected by the purposive sampling method, and they comprised 120 students with visual, physical, hearing or intellectual disabilities from four special education schools in Chiang Mai, Thailand; and 24 key informants such as parents or caregivers, teachers, school principals and school therapists. The instruments consisted of an assistive technology checklist and a semi-structured interview. Results showed that a category of assistive technologies was provided for students with disabilities, with the highest being "services", followed by "media" and then "facilities". Furthermore, mostly students with physical disabilities were provided with assistive technologies, but those with visual disabilities needed it more. Finally, the model of providing assistive technologies was composed of 5 components: Collaboration; Holistic perspective; Independent management of schools; Learning systems and a production manual for users; and Development of an assistive technology center, driven by 3 major sources such as Government and Private organizations, and Schools.

  20. Scientific support, soil information and education provided by the Austrian Soil Science Society

    Science.gov (United States)

    Huber, Sigbert; Baumgarten, Andreas; Birli, Barbara; Englisch, Michael; Tulipan, Monika; Zechmeister-Boltenstern, Sophie

    2015-04-01

    The Austrian Soil Science Society (ASSS), founded in 1954, is a non-profit organisation aiming at furthering all branches of soil science in Austria. The ASSS provides information on the current state of soil research in Austria and abroad. It organizes annual conferences for scientists from soil and related sciences to exchange their recent studies and offers a journal for scientific publications. Annually, ASSS awards the Kubiena Research Prize for excellent scientific studies provided by young scientists. In order to conserve and improve soil science in the field, excursions are organized, also in cooperation with other scientific organisations. Due to well-established contacts with soil scientists and soil science societies in many countries, the ASSS is able to provide its members with information about the most recent developments in the field of soil science. This contributes to a broadening of the current scientific knowledge on soils. The ASSS also co-operates in the organisation of excursions and meetings with neighbouring countries. Several members of the ASSS teach soil science at various Austrian universities. More detail on said conferences, excursions, publications and awards will be given in the presentation. Beside its own scientific journal, published once or twice a year, and special editions such as guidebooks for soil classification, the ASSS runs a website providing information on the Society, its activities, meetings, publications, awards and projects. Together with the Environment Agency Austria the ASSS runs a soil platform on the internet. It is accessible for the public and thus informs society about soil issues. This platform offers a calendar with national and international soil events, contacts of soil related organisations and networks, information on national projects and publications. The society has access to products, information material and information on educational courses. Last but not least information on specific soil

  1. Information as a key-element for the development and dissemination of bioenergy in Austria

    International Nuclear Information System (INIS)

    Schmidt, J.

    1999-01-01

    As one of the renewable energy sources which have to be developed to replace of CO 2 -intensive energy technologies the utilization of bio-energy has a lot of advantages: it is CO 2 - neutral; it is not dependent on imports and improves security of supply; has enormous potential of job creation for rural areas, in small and medium size enterprises; has an enormous market potential; biomass is a by-product in many industrial processes and its using would solve also the waste problem; biomass is an infinite energy source. Predominant market of the biomass for Europe is that for low temperature heating. Being underestimated this market is not attractive for high tech development and research perhaps because of the difficulties for collecting statistical data. Technologies vary from low efficient logwood boilers to sophisticated district heating plants. The strategy of the European Commission, referring to the White Paper, proposes to install 1mill sophisticated biomass heating systems in Europe till 2003. The low temperature heating market will be the most important for future information programmes and projects. For launching of biomass technologies onto a market it is necessary to inform the customer about it and the way to get it. The distribution systems have to rely on multipurpose equipment i.g. for different kind of bio-fuel. The information has to target the advantages of bio-energy fuels compared to the competing carriers like natural gas and oil. These advantages define the market niche. The information strategies include establishing of national and international networks and collaboration with other renewable energy sources associations and with the agricultural sector. The information related projects of the Austrian Biomass Association include: issuing a magazine, information campaigns, conferences, issuing of teaching materials for schools, information brochures and training programmes for plumbers so to be key-agents in the dissemination of small

  2. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  3. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  4. The Utility of Social Media in Providing Information on Zika Virus.

    Science.gov (United States)

    Chandrasekaran, Neeraja; Gressick, Kimberly; Singh, Vivek; Kwal, Jaclyn; Cap, Natalia; Koru-Sengul, Tulay; Curry, Christine L

    2017-10-23

    Introduction In 2015, there was an outbreak of Zika virus in Brazil that spread throughout the Americas. The association of Zika virus with birth defects in infants born to infected pregnant women created concern for women of childbearing age. Social media is an important platform for health promotion, communication, and education on preventative methods during Zika virus outbreaks. Methods We evaluated the utility of social media on providing information regarding Zika virus. Facebook, Instagram, Twitter, and YouTube were utilized for our study. A search of the term "#Zikavirus" on Twitter and Instagram, and "Zika virus" on Facebook and YouTube was performed. The first 50 search results were analyzed from each source. Only English, Spanish, or Portuguese results were included. Results were categorized into three groups: "Useful", "Not Useful", or "Misleading". Results Search was conducted on December 17th, 2016, with 185 results. Forty (21.6%) were from Facebook, 50 (27%) from Twitter, 48 (25.9%) from YouTube, and 47 (25.4%) from Instagram. A total of 104 (56.22%) results were "Useful", 67 (36.2%) "Not Useful", and 14 (7.5%) were "Misleading". There were significantly more "Useful" results compared to "Not Useful" and "Misleading" results (Fisher's exact: p < 0.0001). Conclusion Social media is a useful resource for providing relevant information on Zika virus. Young women can utilize social media for Zika virus information. The role of social media in public health should be further investigated and established. Patient education interventions should focus on social media impact on behavior modification and education of public to recognize useful information.

  5. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  6. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  7. Perceptions of informal care givers: health and support services provided to people with multiple sclerosis.

    Science.gov (United States)

    Buchanan, Robert; Radin, Dagmar; Chakravorty, Bonnie J; Tyry, Tuula

    2010-01-01

    About 30% of people with multiple sclerosis (MS) need some form of home care assistance, with 80% of that assistance provided by informal or unpaid care givers. This study focuses on the care givers to 530 more disabled people with MS, with the objective to learn more about informal care giving to people with greater dependency and need for assistance. The data presented in this study were collected in a national survey of 530 informal care givers to people with MS who have greater levels of physical dependency. About 70% of informal care givers responded that assisting the person with MS perform daily activities or personal care took up the largest amount of their care giving time. Care givers also reported a range of home and community-based services that would make care giving easier or improve the care provided. However, informal care givers generally reported low satisfaction with health insurance coverage of these services, especially coverage by health maintenance organizations and other managed care plans. Lack of health insurance coverage of needed home and community-based services can reduce the quality of informal care provided, as well as increase the burden of informal care giving.

  8. Twenty years of providing information on nuclear power. The experience of EDF

    International Nuclear Information System (INIS)

    Durr, M.; Ansel, P.; Chaussade, J.P.; Haller, P.; Hezard, L.; Hue, L.

    1995-01-01

    In France, the anti-nuclear protest movement became a real problem after 1968, as new sites were sought. Initially, information on nuclear power involved communication by the entities responsible for building the plants. Once Government officials and politicians overcame their initial hesitation, their support, which underscores the continuity of France's energy policy, came to play a major role in the public acceptance of nuclear power. Electricite de France (EDF) then had to master the art of informing and communicating with the public. The change in the parliamentary majority in 1981 did not call into question the nuclear programme, and new plants were commissioned with relative ease. The situation changed dramatically with the Chernobyl disaster. It therefore became vital to establish an efficient structure for crisis communications, and transparency became crucial. The focus shifted from launching new plants to operating existing facilities and restoring public confidence. While not neglecting the general public, the emphasis was on certain strategic segments of the population, notably teachers and health care professionals. Advertising campaigns are today aimed at certain segments of the public, whose opinion could well shift in favour of nuclear power. Lastly, EDF, as power plant operator, has to realize the importance of providing information on nuclear waste. Starting from a strategic policy of informing politicians and senior decision makers, in 1974 EDF began to focus on providing information that would 'educate' the public. This information was issued via technicians who had no specific training in communications techniques. In addition to the need to explain and justify its projects, EDF had to adopt a policy of transparency, and to dispense with the esoteric language of specialists and their preference for secrecy. After Chernobyl, EDF's managers made communications with the 'outside world' an integral part of their jobs. Nuclear information became a

  9. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  10. Nevada Applied Ecology Information Center: a review of technical information support provided to the Nevada Applied Ecology Group

    International Nuclear Information System (INIS)

    Fore, C.S.; Pfuderer, H.A.

    1983-01-01

    The Nevada Applied Ecology Information Center (NAEIC) was established in January 1972 to serve the needs of the Nevada Applied Ecology Group (NAEG) by identifying, collecting, analyzing, and disseminating technical information relevant to NAEG programs. Since its inception, the NAEIC has been active in providing specialized information support to NAEG staff in the following research areas: (1) environmental aspects of the transuranics; (2) historic literature (pre-1962) on plutonium and uranium; (3) cleanup and treatment of radioactively contaminated land; (4) bioenvironmental aspects of europium and rhodium; (5) NAEG contractor reports; and (6) uptake of radioactivity by food crops

  11. Six key topics informal carers of patients with breathlessness in advanced disease want to learn about and why: MRC phase I study to inform an educational intervention.

    Directory of Open Access Journals (Sweden)

    Morag Farquhar

    Full Text Available Breathlessness is a common symptom of advanced disease placing a huge burden on patients, health systems and informal carers (families and friends providing daily help and support. It causes distress and isolation. Carers provide complex personal, practical and emotional support yet often feel ill-prepared to care. They lack knowledge and confidence in their caring role. The need to educate carers and families about breathlessness is established, yet we lack robustly developed carer-targeted educational interventions to meet their needs.We conducted a qualitative interview study with twenty five purposively-sampled patient-carer dyads living with breathlessness in advanced disease (half living with advanced cancer and half with advanced chronic obstructive pulmonary disease (COPD. We sought to identify carers' educational needs (including what they wanted to learn about and explore differences by diagnostic group in order to inform an educational intervention for carers of patients with breathlessness in advanced disease.There was a strong desire among carers for an educational intervention on breathlessness. Six key topics emerged as salient for them: 1 understanding breathlessness, 2 managing anxiety, panic and breathlessness, 3 managing infections, 4 keeping active, 5 living positively and 6 knowing what to expect in the future. A cross-cutting theme was relationship management: there were tensions within dyads resulting from mismatched expectations related to most topics. Carers felt that knowledge-gains would not only help them to support the patient better, but also help them to manage their own frustrations, anxieties, and quality of life. Different drivers for education need were identified by diagnostic group, possibly related to differences in caring role duration and resulting impacts.Meeting the educational needs of carers requires robustly developed and evaluated interventions. This study provides the evidence-base for the content

  12. Motivation and challenges for use of malaria rapid diagnostic tests among informal providers in Myanmar: a qualitative study.

    Science.gov (United States)

    Sudhinaraset, May; Briegleb, Christina; Aung, Moe; Khin, Hnin Su Su; Aung, Tin

    2015-02-06

    Rapid diagnostic tests (RDTs) for malaria enable proper diagnosis and have been shown to reduce overuse of artemisinin combination therapy. Few studies have evaluated the feasibility and use of RDTs in the private sector in Myanmar. The objectives of the study were to: 1) understand the acceptability of using RDTs in the informal sector in Myanmar; 2) examine motivations for use among informal providers; and, 3) highlight decision-making and knowledge of providers for diagnostic testing and treatment. Qualitative interviews were conducted with 30 informal providers. Purposeful sampling was used to enrol study participants in the Mon and Shan State in Myanmar. All interviews were conducted in Burmese, translated into English, and two researchers coded all interviews using Atlas ti. Major themes identified included: 1) informal provider and outlet characteristics, including demographic and background characteristics; 2) the benefits and challenges of using RDTs according to providers; 3) provider experiences with using RDTs, including motivations for using the RDT; 4) adherence to test results, either positive or negative; and, 5) recommendations from informal providers to promote increased use of RDTs in their communities. This study found that introducing RDTs to informal providers in Myanmar was feasible, resulting in improved provider empowerment and patient-provider relationships. Specific challenges included facility infrastructure to use and dispose RDTs and provider knowledge. This varied across the type of informal provider, with itinerant drug vendors more comfortable and knowledgeable about RDTs compared to general retail sellers and medical drug representatives. This study found informal providers in Myanmar found the introduction of RDTs to be highly acceptable. Providers discussed improvement in service quality including provider empowerment and patient-provider relationships. The study also highlighted a number of challenges that informal providers

  13. Communication at an online infertility expert forum: provider responses to patients' emotional and informational cues.

    Science.gov (United States)

    Aarts, J W M; van Oers, A M; Faber, M J; Cohlen, B J; Nelen, W L D M; Kremer, J A M; van Dulmen, A M

    2015-01-01

    Online patient-provider communication has become increasingly popular in fertility care. However, it is not known to what extent patients express cues or concerns and how providers respond. In this study, we investigated cues and responses that occur in online patient-provider communication at an infertility-specific expert forum. We extracted 106 threads from the multidisciplinary expert forum of two Dutch IVF clinics. We performed the following analyses: (1) thematic analysis of patients' questions; and (2) rating patients' emotional and informational cues and subsequent professionals' responses using an adaptation of the validated Medical Interview Aural Rating Scale. Frequencies of themes, frequencies of cues and responses, and sequences (what cue is followed by what response) were extracted. Sixty-five infertile patients and 19 providers participated. The most common themes included medication and lifestyle. Patients gave more informational than emotional cues (106 versus 64). Responses to informational cues were mostly adequate (61%). The most common response to emotional cues was empathic acknowledgment (72%). Results indicate that an online expert forum could have a positive effect on patient outcomes, which should guide future research. Offering infertile patients an expert forum to communicate with providers can be a promising supplement to usual care in both providing information and addressing patients' concerns.

  14. Attitudes toward health care providers, collecting information about patients' race, ethnicity, and language.

    Science.gov (United States)

    Baker, David W; Hasnain-Wynia, Romana; Kandula, Namratha R; Thompson, Jason A; Brown, E Richard

    2007-11-01

    Experts recommend that health care providers (HCPs) collect patients' race/ethnicity and language, but we know little about public attitudes towards this. To determine attitudes towards HCPs collecting race/ethnicity and language data. A telephone survey was held with 563 Californians, including 105 whites, 97 blacks, 199 Hispanics (162 Spanish-speaking), 129 Asians (73 Chinese-speaking), and 33 multiracial individuals. Attitudes towards HCPs asking patients their race/ethnicity and preferred language, concerns about providing their own information, reactions to statements explaining the rationale for data collection, and attitudes towards possible policies. Most (87.8%) somewhat or strongly agreed that HCPs should collect race/ethnicity information and use this to monitor disparities, and 73.6% supported state legislation requiring this. Support for collection of patients' preferred language was even higher. However, 17.2% were uncomfortable (score 1-4 on 10-point scale) reporting their own race/ethnicity, and 46.3% of participants were somewhat or very worried that providing information could be used to discriminate against them. In addition, 35.9% of Hispanics were uncomfortable reporting their English proficiency. All statements explaining the rationale for data collection modestly increased participants' comfort level; the statement that this would be used for staff training increased comfort the most. Although most surveyed believe that HCPs should collect information about race/ethnicity and language, many feel uncomfortable giving this information and worry it could be misused. Statements explaining the rationale for collecting data may assuage concerns, but community engagement and legislation to prevent misuse may be needed to gain more widespread trust and comfort.

  15. Information Literacy in the workplace

    OpenAIRE

    Inskip, C.

    2015-01-01

    This talk aims to provide an overview of thinking and practice in workplace information literacy, an important developing area. It will consider the semantic gap between education and workplace settings and identify key issues around the challenges to library and information professionals in bridging that gap.

  16. The Persistence of Informality: Small-Scale Water Providers in Manila’s Post-Privatisation Era

    Directory of Open Access Journals (Sweden)

    Deborah Cheng

    2014-02-01

    Full Text Available This article troubles the notion of a formal-informal dichotomy in urban water provision. Whereas expansion of a water utility typically involves the replacement of informal providers, the experience in Manila demonstrates that the rapid connection of low-income areas actually hinges, in part, on the selective inclusion and exclusion of these smaller actors. In this sense, privatisation has not eliminated small-scale water provision, but has led to the reconfiguration of its usage, blurring the boundaries between formal and informal. By examining the spatial and temporal evolution of small-scale water provision in Manila’s post-privatisation era, I show how certain spaces are seen as less serviceable than others. Critically, small providers working in partnership with the utilities are sanctioned because they supplement the utilities’ operations. The areas in which they work are considered served, factoring into aggregate coverage statistics, even though their terms of service are often less desirable than those of households directly connected to the utilities. In contrast, small providers that operate outside of the utilities’ zones of coverage are considered inferior, to be replaced. The result is a differentiation in informality – one in which the private utilities largely determine modes of access and thus the spatialisation of informal water provision.

  17. Defining information need in health - assimilating complex theories derived from information science.

    Science.gov (United States)

    Ormandy, Paula

    2011-03-01

    Key policy drivers worldwide include optimizing patients' roles in managing their care; focusing services around patients' needs and preferences; and providing information to support patients' contributions and choices. The term information need penetrates many policy documents. Information need is espoused as the foundation from which to develop patient-centred or patient-led services. Yet there is no clear definition as to what the term means or how patients' information needs inform and shape information provision and patient care. The assimilation of complex theories originating from information science has much to offer considerations of patient information need within the context of health care. Health-related research often focuses on the content of information patients prefer, not why they need information. This paper extends and applies knowledge of information behaviour to considerations of information need in health, exposing a working definition for patient information need that reiterates the importance of considering the patient's goals and understanding the patient's context/situation. A patient information need is defined as 'recognition that their knowledge is inadequate to satisfy a goal, within the context/situation that they find themselves at a specific point in the time'. This typifies the key concepts of national/international health policy, the centrality and importance of the patient. The proposed definition of patient information need provides a conceptual framework to guide health-care practitioners on what to consider and why when meeting the information needs of patients in practice. This creates a solid foundation from which to inform future research. © 2010 The Author. Health Expectations © 2010 Blackwell Publishing Ltd.

  18. RAISING INFORMATION AND COMMUNICATION TECHNOLOGIES COMPETENCE OF SCIENTIFIC AND PEDAGOGICAL EMPLOYEES - A KEY REQUIREMENT OF THE QUALITY OF EDUCATIONAL PROCESS

    Directory of Open Access Journals (Sweden)

    Nataliia V. Morze

    2017-06-01

    Full Text Available In the article it was analyzed one of the basic conditions of providing the quality of higher education according to the system of internal quality assurance standards ESG (European quality assurance standards and guidelines to increase the ICT competence of scientific-pedagogical staff of the University. It was described the modular system of training for scientific and pedagogical staff of the Borys Grinchenko Kyiv University. Special attention is paid to the description of the system of raising the level of formation the ICT competence as one of the key competences of the modern teacher. The system of professional development, which is based on creating mixed studying and technology of "flipped classroom", formative assessment, innovative educational and ICT technologies according to the specially designed informative module "Informational and communication technologies", which allows scientific-pedagogical staff to use modern ICT and educational technologies effectively for their further applying in the provision of educational services and the development of quality of open educational content and open educational e-environment available to the student at any convenient time, which will significantly improve the quality of the educational process.

  19. American Society of Clinical Oncology Summit on Addressing Obesity Through Multidisciplinary Provider Collaboration: Key Findings and Recommendations for Action.

    Science.gov (United States)

    Ligibel, Jennifer A; Alfano, Catherine M; Hershman, Dawn L; Merrill, Janette K; Basen-Engquist, Karen; Bloomgarden, Zachary T; Demark-Wahnefried, Wendy; Dixon, Suzanne; Hassink, Sandra G; Jakicic, John M; Morton, John Magaña; Okwuosa, Tochi M; Powell-Wiley, Tiffany M; Rothberg, Amy E; Stephens, Mark; Streett, Sarah E; Wild, Robert A; Westman, Eric A; Williams, Ronald J; Wollins, Dana S; Hudis, Clifford A

    2017-11-01

    Given the increasing evidence that obesity increases the risk of developing and dying from malignancy, the American Society of Clinical Oncology (ASCO) launched an Obesity Initiative in 2013 that was designed to increase awareness among oncology providers and the general public of the relationship between obesity and cancer and to promote research in this area. Recognizing that the type of societal change required to impact the obesity epidemic will require a broad-based effort, ASCO hosted the "Summit on Addressing Obesity through Multidisciplinary Collaboration" in 2016. This meeting was held to review current challenges in addressing obesity within the respective health care provider communities and to identify priorities that would most benefit from a collective and cross-disciplinary approach. Efforts focused on four key areas: provider education and training; public education and activation; research; and policy and advocacy. Summit attendees discussed current challenges in addressing obesity within their provider communities and identified priorities that would most benefit from multidisciplinary collaboration. A synopsis of recommendations to facilitate future collaboration, as well as examples of ongoing cooperative efforts, provides a blueprint for multidisciplinary provider collaboration focused on obesity prevention and treatment. © 2017 The Obesity Society.

  20. Ethical principles of informed consent: exploring nurses' dual role of care provider and researcher.

    Science.gov (United States)

    Judkins-Cohn, Tanya M; Kielwasser-Withrow, Kiersten; Owen, Melissa; Ward, Jessica

    2014-01-01

    This article describes the ethical principles of autonomy, beneficence, and justice within the nurse researcher-participant relationship as these principles relate to the informed consent process for research. Within this process, the nurse is confronted with a dual role. This article describes how nurses, who are in the dual role of care provider and researcher, can apply these ethical principles to their practice in conjunction with the American Nurses Association's code of ethics for nurses. This article also describes, as an element of ethical practice, the importance of using participant-centered quality measures to aid informed decision making of participants in research. In addition, the article provides strategies for improving the informed consent process in nursing research. Finally, case scenarios are discussed, along with the application of ethical principles within the awareness of the dual role of the nurse as care provider and researcher. Copyright 2014, SLACK Incorporated.

  1. Understanding Barriers and Facilitators to Breast and Cervical Cancer Screening among Muslim Women in New York City: Perspectives from Key Informants.

    Science.gov (United States)

    Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona

    2017-01-01

    Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women's beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening.

  2. Fear appeals and confronting information campaigns. [Previously: Fear-based information campaigns.

    OpenAIRE

    2007-01-01

    Fear appeals or confronting information campaigns confront people in an often hard and sometimes even shocking way with the consequences of risky behaviour. This can have a positive impact on the attitudes and behavioural intentions of the target group, but only if key conditions are met. Those conditions are that the information does not only evoke fear, but also informs the target group individuals of their personal risk and provides them with feasible and effective behavioural alternatives...

  3. A novel authentication scheme using self-certified public keys for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-06-01

    Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.

  4. Adequacy of pharmacological information provided in pharmaceutical drug advertisements in African medical journals.

    Directory of Open Access Journals (Sweden)

    Oshikoya KA

    2009-06-01

    manufacturer on both the container and pack of the drug} were mentioned in 65.6% and 50% adverts, respectively. The product and package descriptions were provided in 57 (72.2% Nigerian medical journals, which was significantly higher than in other African medical journals 39 (37.9% (P<0.001.Conclusions: None of the drug advertisements in the journals adequately provided the basic information required by the WHO for appropriate prescribing. More guidance and regulation is needed to ensure adequate information is provided.

  5. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  6. Internet security information system implement method

    International Nuclear Information System (INIS)

    Liu Baoxu; Mei Jie; Xu Rongsheng; An Dehai; Yu Mingjian; Chen Xiangyang; Zheng Peng

    1999-01-01

    On the basis of analysis of the key elements that will affect the Internet Security Information System, the author takes UNIX Operating System as an example, and provides the important stages that must be considered when implementing the Internet Security Information System. An implemental model of the Internet Security Information System is given

  7. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  8. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  9. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    Science.gov (United States)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  10. The single evolutionary origin of chlorinated auxin provides a phylogenetically informative trait in the Fabaceae.

    Science.gov (United States)

    Lam, Hong Kiat; Ross, John J; McAdam, Erin L; McAdam, Scott A M

    2016-07-02

    Chlorinated auxin (4-chloroindole-3-acetic acid, 4-Cl-IAA), a highly potent plant hormone, was once thought to be restricted to species of the tribe Fabeae within the Fabaceae, until we recently detected this hormone in the seeds of Medicago, Melilotus and Trifolium species. The absence of 4-Cl-IAA in the seeds of the cultivated species Cicer aeritinum from the Cicerae tribe, immediately basal to the Fabeae and Trifolieae tribes, suggested a single evolutionary origin of 4-Cl-IAA. Here, we provide a more robust phylogenetic placement of the ability to produce chlorinated auxin by screening key species spanning this evolutionary transition. We report no detectable level of 4-Cl-IAA in Cicer echinospermum (a wild relative of C. aeritinum) and 4 species (Galega officinalis, Parochetus communis, Astragalus propinquus and A. sinicus) from tribes or clades more basal or sister to the Cicerae tribe. We did detect 4-Cl-IAA in the dry seeds of 4 species from the genus Ononis that are either basal to the genera Medicago, Melilotus and Trigonella or basal to, but still within, the Fabeae and Trifolieae (ex. Parochetus) clades. We conclude that the single evolutionary origin of this hormone in seeds can be used as a phylogenetically informative trait within the Fabaceae.

  11. Clearly written, easily comprehended? The readability of websites providing information on epilepsy.

    Science.gov (United States)

    Brigo, Francesco; Otte, Willem M; Igwe, Stanley C; Tezzon, Frediano; Nardone, Raffaele

    2015-03-01

    There is a general need for high-quality, easily accessible, and comprehensive health-care information on epilepsy to better inform the general population about this highly stigmatized neurological disorder. The aim of this study was to evaluate the health literacy level of eight popular English-written websites that provide information on epilepsy in quantitative terms of readability. Educational epilepsy material on these websites, including 41 Wikipedia articles, were analyzed for their overall level of readability and the corresponding academic grade level needed to comprehend the published texts on the first reading. The Flesch Reading Ease (FRE) was used to assess ease of comprehension while the Gunning Fog Index, Coleman-Liau Index, Flesch-Kincaid Grade Level, Automated Readability Index, and Simple Measure of Gobbledygook scales estimated the corresponding academic grade level needed for comprehension. The average readability of websites yielded results indicative of a difficult-to-fairly-difficult readability level (FRE results: 44.0±8.2), with text readability corresponding to an 11th academic grade level (11.3±1.9). The average FRE score of the Wikipedia articles was indicative of a difficult readability level (25.6±9.5), with the other readability scales yielding results corresponding to a 14th grade level (14.3±1.7). Popular websites providing information on epilepsy, including Wikipedia, often demonstrate a low level of readability. This can be ameliorated by increasing access to clear and concise online information on epilepsy and health in general. Short "basic" summaries targeted to patients and nonmedical users should be added to articles published in specialist websites and Wikipedia to ease readability. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. An evaluation of dental information sessions provided to childcare educators in NSW in 2010-2011.

    Science.gov (United States)

    Noller, Jennifer M

    2013-12-01

    Childcare services provide ideal settings to promote good oral health and help reduce tooth decay in young children. This paper reports the results of an evaluation of the dental information session component of the NSW Little Smiles Program provided by public oral health service professionals to childcare educators in NSW in 2010-2011. The evaluation sought to determine if a face-to-face information session provided to childcare educators by oral health professionals: (i) can improve the confidence of childcare educators to reach national quality standards that relate to oral health; and (ii) is an appropriate model to use. In 2010-2011, 163 dental information sessions were provided to 1716 participants from over 526 childcare centres across NSW. Results showed that a dental information session can improve the confidence of childcare educators to assist their service to reach the required national quality standards for oral hygiene and diet-related oral health issues. Further evaluation is required to determine if oral health can be embedded in the daily practice of childcare services and other options need to be explored to deliver the sessions in a more cost-effective way.

  13. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  15. Robustness bounds and practical limitations of quantum key distribution

    International Nuclear Information System (INIS)

    Khalique, Aeysha

    2008-01-01

    Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that

  16. Information Expensiveness Perceived by Vietnamese Patients with Respect to Healthcare Provider's Choice.

    Science.gov (United States)

    Quan-Hoang, Vuong

    2016-10-01

    Patients have to acquire information to support their decision on choosing a suitable healthcare provider. But in developing countries like Vietnam, accessibility issues remain an obstacle, thus adversely affect both quality and costliness of healthcare information. Vietnamese use both sources from health professionals and friends/relatives, especially when quality of the Internet-based cheaper sources appear to be still questionable. The search of information from both professionals and friends/relatives incurs some cost, which can be viewed as low or high depending low or high accessibility to the sources. These views potentially affect their choices. To investigate the effects that medical/health services information on perceived expensiveness of patients' labor costs. Two related objectives are a) establishing empirical relations between accessibility to sources and expensiveness; and, b) probabilistic trends of probabilities for perceived expensiveness. There is evidence for established relations among the variables "Convexp" and "Convrel" (all p's perceived expensiveness. a) Probabilistic trends show Vietnamese patients have propensity to value healthcare information highly and do not see it as "expensive"; b) The majority of Vietnamese households still take non-professional advices at their own risks; c) There is more for the public healthcare information system to do to reduce costliness and risk of information. The Internet-based health service users communities cannot replace this system.

  17. Elementary Principal Perceptions on Key Leadership Responsibilities Associated with Increased Student Achievement

    Science.gov (United States)

    Hopper, Lora E.

    2009-01-01

    Although research has provided a substantial amount of information about key characteristics of effective school leaders, there is a growing need for continued improvement and reflective practice on the continuous development of instructional leaders. The purpose of this study was to determine to what extent elementary principals perceive they are…

  18. Do Cuticular Hydrocarbons Provide Sufficient Information for Optimal Sex Allocation in the Ant Formica exsecta?

    DEFF Research Database (Denmark)

    van Zweden, Jelle Stijn; Vitikainen, Emma; D'Ettorre, Patrizia

    2011-01-01

    Split sex ratio theory predicts that when kin structure varies among colonies of social insects, in order to maximize the inclusive fitness, colonies with relatively high sister-sister relatedness should specialize in producing reproductive females, whereas in those with relatively low sister......-sister relatedness workers should bias their sex ratio towards males. However, in order to achieve this, workers need to be able to reliably assess the type of colony in which they live. The information on colony kin structure may be encoded in cuticular hydrocarbons (CHCs), assuming that genetic variability....... However, within-colony relatedness remains the key determinant of colony sex ratios. Based on our results, CHC variability cannot serve as accurate information on within-colony relatedness, kin structure, or full-sib affiliation, nor do workers seem to use colony CHC variability as a proxy for sex...

  19. Informed consent for phase I studies: evaluation of quantity and quality of information provided to patients.

    Science.gov (United States)

    Tomamichel, M; Sessa, C; Herzig, S; de Jong, J; Pagani, O; Willems, Y; Cavalli, F

    1995-04-01

    the patients. In 71% of the consultations the three dimensions of information scored more than 3 and balanced one another, indicating a successful consultation by the Meerwein model. The informed consent procedure applied was satisfactory from a quantitative point of view, and the main items of information were acceptable to the patients. Meerweins's model proved to be applicable and useful for identifying pitfalls in communication. Greater attention should be paid to the indirect messages and implied criticisms of the patients to improve their participation in decision making. Physicians should become more skillful in providing adequate information and improve their methods of communication.

  20. Effect of providing risk information on undergoing cervical cancer screening: a randomized controlled trial.

    Science.gov (United States)

    Fujiwara, Hiroyuki; Shimoda, Akihiro; Ishikawa, Yoshiki; Taneichi, Akiyo; Ohashi, Mai; Takahashi, Yoshifumi; Koyanagi, Takahiro; Morisawa, Hiroyuki; Takahashi, Suzuyo; Sato, Naoto; Machida, Shizuo; Takei, Yuji; Saga, Yasushi; Suzuki, Mitsuaki

    2015-01-01

    In Japan, the cervical cancer screening rate is extremely low. Towards improving the cervical cancer screening rate, encouraging eligible people to make an informed choice, which is a decision-making process that relies on beliefs informed by adequate information about the possible benefits and risks of screening, has attracted increased attention in the public health domain. However, there is concern that providing information on possible risks of screening might prevent deter from participating. In total, 1,912 women aged 20-39 years who had not participated in screening in the fiscal year were selected from a Japanese urban community setting. Participants were randomly divided into 3 groups. Group A received a printed reminder with information about the possible benefits of screening, group B received a printed reminder with information about possible benefits and risks, and group C received a printed reminder with simple information only (control group). Out of 1,912 participants, 169 (8.8%) participated in cervical cancer screening. In the intervention groups, 137 (10.9%) participated in cervical cancer screening, compared to only 32 (4.9%) of the control group (p < 0.001). In addition, logistic regression analysis revealed that there was no significant difference in screening rate between group A and group B (p = 0.372). Providing information on the possible risks of screening may not prevent people from taking part in cervical cancer screening among a Japanese non-adherent population.

  1. Can Raters with Reduced Job Descriptive Information Provide Accurate Position Analysis Questionnaire (PAQ) Ratings?

    Science.gov (United States)

    Friedman, Lee; Harvey, Robert J.

    1986-01-01

    Job-naive raters provided with job descriptive information made Position Analysis Questionnaire (PAQ) ratings which were validated against ratings of job analysts who were also job content experts. None of the reduced job descriptive information conditions enabled job-naive raters to obtain either acceptable levels of convergent validity with…

  2. Availability and accessibility of evidence-based information resources provided by medical libraries in Australia.

    Science.gov (United States)

    Ritchie, A; Sowter, B

    2000-01-01

    This article reports on the results of an exploratory survey of the availability and accessibility of evidence-based information resources provided by medical libraries in Australia. Although barriers impede access to evidence-based information for hospital clinicians, the survey revealed that Medline and Cinahl are available in over 90% of facilities. In most cases they are widely accessible via internal networks and the Internet. The Cochrane Library is available in 69% of cases. The Internet is widely accessible and most libraries provide access to some full-text, electronic journals. Strategies for overcoming restrictions and integrating information resources with clinical workflow are being pursued. State, regional and national public and private consortia are developing agreements utilising on-line technology. These could produce cost savings and more equitable access to a greater range of evidence-based resources.

  3. Medicare Provider Data - Hospice Providers

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Hospice Utilization and Payment Public Use File provides information on services provided to Medicare beneficiaries by hospice providers. The Hospice PUF...

  4. Greek Academic Librarians' Perceptions of the Impact of Google on Their Role as Information Providers

    Science.gov (United States)

    Garoufallou, Emmanouel; Balatsoukas, Panos; Siatri, Rania; Zafeiriou, Georgia; Asderi, S.; Ekizoglou; P.

    2008-01-01

    The increased popularity of Google search engine in the daily routine in one's workplace and in the academic information seeking process is undeniable. "Googling" challenges the traditional skills of librarians as information providers and the role of library and information service provision in the digital era. This paper reports on the…

  5. Do Dogs Provide Information Helpfully?

    Directory of Open Access Journals (Sweden)

    Patrizia Piotti

    Full Text Available Dogs are particularly skilful during communicative interactions with humans. Dogs' abilities to use human communicative cues in cooperative contexts outcompete those of other species, and might be the result of selection pressures during domestication. Dogs also produce signals to direct the attention of humans towards outside entities, a behaviour often referred to as showing behaviour. This showing behaviour in dogs is thought to be something dogs use intentionally and referentially. However, there is currently no evidence that dogs communicate helpfully, i.e. to inform an ignorant human about a target that is of interest to the human but not to the dog. Communicating with a helpful motive is particularly interesting because it might suggest that dogs understand the human's goals and need for information. In study 1, we assessed whether dogs would abandon an object that they find interesting in favour of an object useful for their human partner, a random novel distractor, or an empty container. Results showed that it was mainly self-interest that was driving the dogs' behaviour. The dogs mainly directed their behaviour towards the object they had an interest in, but dogs were more persistent when showing the object relevant to the human, suggesting that to some extent they took the humans interest into account. Another possibility is that dogs' behaviour was driven by an egocentric motivation to interact with novel targets and that the dogs' neophila might have masked their helpful tendencies. Therefore, in study 2 the dogs had initial access to both objects, and were expected to indicate only one (relevant or distractor. The human partner interacted with the dog using vocal communication in half of the trials, and remaining silent in the other half. Dogs from both experimental groups, i.e. indicating the relevant object or indicating the distractor, established joint attention with the human. However, the human's vocal communication and the

  6. Do Dogs Provide Information Helpfully?

    Science.gov (United States)

    Piotti, Patrizia; Kaminski, Juliane

    2016-01-01

    Dogs are particularly skilful during communicative interactions with humans. Dogs' abilities to use human communicative cues in cooperative contexts outcompete those of other species, and might be the result of selection pressures during domestication. Dogs also produce signals to direct the attention of humans towards outside entities, a behaviour often referred to as showing behaviour. This showing behaviour in dogs is thought to be something dogs use intentionally and referentially. However, there is currently no evidence that dogs communicate helpfully, i.e. to inform an ignorant human about a target that is of interest to the human but not to the dog. Communicating with a helpful motive is particularly interesting because it might suggest that dogs understand the human's goals and need for information. In study 1, we assessed whether dogs would abandon an object that they find interesting in favour of an object useful for their human partner, a random novel distractor, or an empty container. Results showed that it was mainly self-interest that was driving the dogs' behaviour. The dogs mainly directed their behaviour towards the object they had an interest in, but dogs were more persistent when showing the object relevant to the human, suggesting that to some extent they took the humans interest into account. Another possibility is that dogs' behaviour was driven by an egocentric motivation to interact with novel targets and that the dogs' neophila might have masked their helpful tendencies. Therefore, in study 2 the dogs had initial access to both objects, and were expected to indicate only one (relevant or distractor). The human partner interacted with the dog using vocal communication in half of the trials, and remaining silent in the other half. Dogs from both experimental groups, i.e. indicating the relevant object or indicating the distractor, established joint attention with the human. However, the human's vocal communication and the presence of the

  7. INFORMATIVE ADVERTISING: A MARKET INFORMATION PROVIDER OR A SEED OF MARKET POWER?

    Directory of Open Access Journals (Sweden)

    Anzhelika G. GERASYMENKO

    2012-07-01

    Full Text Available This paper investigates the role of informative advertising in creation and augment of market power as well as the ability of an advertiser to maximize the value of its economic rent. Informative advertising is considered to be a merit good unlike a persuasive one that is mostly associated with a bad. But analysis of the advertisement breakdown in Ukraine shows that the share of price advertisements, which are the most beneficial for the public, is negligible today. Further still those advertisements are mostly situated in the sectors, where price competition is the least strong. Another kind of informative advertising – differentiating advertising – turns from an instrument of informing consumers into the vehicle of manipulation of consumer choice. Using the blind tests the author has compared the quality and the prices of the range of advertised goods and has found out a low level of correlation between the variables. That means that informative advertising serves a function of informing consumers inefficiently. At the same time phantom differentiation and misleading advertising proliferation as well as informative advertising concentration on experience and credible goods instead search ones testify to effective serving a function of maximizing advertiser welfare.

  8. Maternal Healthcare Providers in Uttar Pradesh, India: How to Position Informal Practitioners within the System?

    Directory of Open Access Journals (Sweden)

    Chesta Sharma

    2014-12-01

    Full Text Available To understand the knowledge and services of informal providers and to explore their role in addressing the human resource gap in Uttar Pradesh, India, within the context of maternal health.The study is exploratory in nature, conducted in four blocks of four districts of Uttar Pradesh state, India. Semi-structured interviews were conducted with 114 informal providers.More than one-third (38% providers have some formal education and unrecognized degrees. Approximately three-fourths (74% of them have more than 5 years of work experience. They also provide delivery and in-patient services and have basic equipment available. However, they lack essential knowledge about maternal health. They have mixed opinion about their contribution towards maternal health but the only ones available. Therefore, despite lacking requisite knowledge, training and services, they become indispensable due to lack of emergency and timely public health services, and being the only ones existing in the community.Informal sector practitioners are a critical link in reaching out to population for health services in developing countries. As opposed to the general notion, they possess years of formal education, experience, informal trainings along with trust of communities. Thus, it becomes important to accept their presence and manage them to the best of their abilities even for specialized care like maternal health.

  9. 34 CFR 86.302 - What are the procedures used by the Secretary for providing information or technical assistance?

    Science.gov (United States)

    2010-07-01

    ... providing information or technical assistance? 86.302 Section 86.302 Education Office of the Secretary... information or technical assistance? (a) The Secretary provides information or technical assistance to an IHE in writing, through site visits, or by other means. (b) The IHE shall inform the Secretary of any...

  10. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  11. Considerations for Providing Etymological Information in the Advanced Ndebele Dictionary

    Directory of Open Access Journals (Sweden)

    Langa Khumalo

    2011-10-01

    Full Text Available

    Abstract: This article discusses the presentation of etymological information in the prospective Advanced Ndebele Dictionary (henceforth the AND which is still in its planning stage. The AND will be a successor to Isichazamazwi SesiNdebele (henceforth the ISN, a medium-sized, general-purpose, monolingual Ndebele dictionary published in 2001. The AND will not just be larger than the ISN, but will be more advanced with regard to the depth and scope of its lexical items and definitions. Whereas the ISN was based on a corpus size of about a million running words, the AND is envisaged to have as basis a corpus size of about five million. To this end, corpus expansion is an ongoing process. Again, unlike its forerunner, the AND will provide additional grammatical information for ach lexical item, including phonetic transcription, tone marking and etymology. It is the inclusion of etymological information in the AND that is critically examined in this article. There is a long tradition of providing etymological information in modern dictionaries from Oxford's New English Dictionary to ALRI's Duramazwi Guru reChiShona.

    Keywords: ETYMOLOGY, ADVANCED NDEBELE DICTIONARY, CULTURE, HERITAGE, LANGUAGE CONTACT

    Opsomming: Oorwegings vir die verskaffing van etimologiese inligting in die Gevorderde Ndebelewoordeboek. Hierdie artikel bespreek die aanbieding van etimo-logiese inligting in die toekomstige Gevorderde Ndebelewoordeboek (voortaan die GNW wat nog in sy beplanningstadium is. Die GNW sal 'n opvolger wees van die Isichazamazwi SesiNdebele (voortaan die ISN, 'n middelgroot, meerdoelige, eentalige Ndebelewoordeboek wat in 2001 gepubliseer is. Die GNW sal nie net groter as die ISN wees nie, maar sal meer gevorderd wees wat betref die diepte en omvang van sy leksikale items en definisies. Waar die ISN gebaseer was op 'n korpus-grootte van ongeveer 'n miljoen woordoptekeninge, word voorsien dat die GNW 'n korpusgrootte van ongeveer vyf miljoen as

  12. The Proteins API: accessing key integrated protein and genome information.

    Science.gov (United States)

    Nightingale, Andrew; Antunes, Ricardo; Alpi, Emanuele; Bursteinas, Borisas; Gonzales, Leonardo; Liu, Wudong; Luo, Jie; Qi, Guoying; Turner, Edd; Martin, Maria

    2017-07-03

    The Proteins API provides searching and programmatic access to protein and associated genomics data such as curated protein sequence positional annotations from UniProtKB, as well as mapped variation and proteomics data from large scale data sources (LSS). Using the coordinates service, researchers are able to retrieve the genomic sequence coordinates for proteins in UniProtKB. This, the LSS genomics and proteomics data for UniProt proteins is programmatically only available through this service. A Swagger UI has been implemented to provide documentation, an interface for users, with little or no programming experience, to 'talk' to the services to quickly and easily formulate queries with the services and obtain dynamically generated source code for popular programming languages, such as Java, Perl, Python and Ruby. Search results are returned as standard JSON, XML or GFF data objects. The Proteins API is a scalable, reliable, fast, easy to use RESTful services that provides a broad protein information resource for users to ask questions based upon their field of expertise and allowing them to gain an integrated overview of protein annotations available to aid their knowledge gain on proteins in biological processes. The Proteins API is available at (http://www.ebi.ac.uk/proteins/api/doc). © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  13. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  14. Proof-of-concept of real-world quantum key distribution with quantum frames

    International Nuclear Information System (INIS)

    Lucio-Martinez, I; Mo, X; Tittel, W; Chan, P; Hosier, S

    2009-01-01

    We propose a fibre-based quantum key distribution system, which employs polarization qubits encoded into faint laser pulses. As a novel feature, it allows sending of classical framing information via sequences of strong laser pulses that precede the quantum data. This allows synchronization, sender and receiver identification and compensation of time-varying birefringence in the communication channel. In addition, this method also provides a platform to communicate implementation specific information such as encoding and protocol in view of future optical quantum networks. We demonstrate in a long-term (37 h) proof-of-principle study that polarization information encoded in the classical control frames can indeed be used to stabilize unwanted qubit transformation in the quantum channel. All optical elements in our setup can be operated at Gbps rates, which is a first requirement for a future system delivering secret keys at Mbps. In order to remove another bottleneck towards a high rate system, we investigate forward error correction based on low-density parity-check codes.

  15. Modeling patients' acceptance of provider-delivered e-health.

    Science.gov (United States)

    Wilson, E Vance; Lankton, Nancy K

    2004-01-01

    Health care providers are beginning to deliver a range of Internet-based services to patients; however, it is not clear which of these e-health services patients need or desire. The authors propose that patients' acceptance of provider-delivered e-health can be modeled in advance of application development by measuring the effects of several key antecedents to e-health use and applying models of acceptance developed in the information technology (IT) field. This study tested three theoretical models of IT acceptance among patients who had recently registered for access to provider-delivered e-health. An online questionnaire administered items measuring perceptual constructs from the IT acceptance models (intrinsic motivation, perceived ease of use, perceived usefulness/extrinsic motivation, and behavioral intention to use e-health) and five hypothesized antecedents (satisfaction with medical care, health care knowledge, Internet dependence, information-seeking preference, and health care need). Responses were collected and stored in a central database. All tested IT acceptance models performed well in predicting patients' behavioral intention to use e-health. Antecedent factors of satisfaction with provider, information-seeking preference, and Internet dependence uniquely predicted constructs in the models. Information technology acceptance models provide a means to understand which aspects of e-health are valued by patients and how this may affect future use. In addition, antecedents to the models can be used to predict e-health acceptance in advance of system development.

  16. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    Science.gov (United States)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  17. Activity assays and immunoassays for plasma Renin and prorenin: information provided and precautions necessary for accurate measurement

    DEFF Research Database (Denmark)

    Campbell, Duncan J; Nussberger, Juerg; Stowasser, Michael

    2009-01-01

    into focus the differences in information provided by activity assays and immunoassays for renin and prorenin measurement and has drawn attention to the need for precautions to ensure their accurate measurement. CONTENT: Renin activity assays and immunoassays provide related but different information...... provided by these assays and of the precautions necessary to ensure their accuracy....

  18. Undocumented female immigrants in the urban informal sector: An ...

    African Journals Online (AJOL)

    Remember me ... organisations examining interlocking aspects that provides a solid picture of who is deemed to be a good leader. ... Key words: Informal female leadership, informal structures, social development, undocumented immigrants ...

  19. Do Dogs Provide Information Helpfully?

    Science.gov (United States)

    Piotti, Patrizia; Kaminski, Juliane

    2016-01-01

    Dogs are particularly skilful during communicative interactions with humans. Dogs’ abilities to use human communicative cues in cooperative contexts outcompete those of other species, and might be the result of selection pressures during domestication. Dogs also produce signals to direct the attention of humans towards outside entities, a behaviour often referred to as showing behaviour. This showing behaviour in dogs is thought to be something dogs use intentionally and referentially. However, there is currently no evidence that dogs communicate helpfully, i.e. to inform an ignorant human about a target that is of interest to the human but not to the dog. Communicating with a helpful motive is particularly interesting because it might suggest that dogs understand the human’s goals and need for information. In study 1, we assessed whether dogs would abandon an object that they find interesting in favour of an object useful for their human partner, a random novel distractor, or an empty container. Results showed that it was mainly self-interest that was driving the dogs’ behaviour. The dogs mainly directed their behaviour towards the object they had an interest in, but dogs were more persistent when showing the object relevant to the human, suggesting that to some extent they took the humans interest into account. Another possibility is that dogs’ behaviour was driven by an egocentric motivation to interact with novel targets and that the dogs’ neophila might have masked their helpful tendencies. Therefore, in study 2 the dogs had initial access to both objects, and were expected to indicate only one (relevant or distractor). The human partner interacted with the dog using vocal communication in half of the trials, and remaining silent in the other half. Dogs from both experimental groups, i.e. indicating the relevant object or indicating the distractor, established joint attention with the human. However, the human’s vocal communication and the presence

  20. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    Science.gov (United States)

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  1. The anti-human trafficking collaboration model and serving victims: Providers' perspectives on the impact and experience.

    Science.gov (United States)

    Kim, Hea-Won; Park, Taekyung; Quiring, Stephanie; Barrett, Diana

    2018-01-01

    A coalition model is often used to serve victims of human trafficking but little is known about whether the model is adequately meeting the needs of the victims. The purpose of this study was to examine anti-human trafficking collaboration model in terms of its impact and the collaborative experience, including challenges and lessons learned from the service providers' perspective. Mixed methods study was conducted to evaluate the impact of a citywide anti-trafficking coalition model from the providers' perspectives. Web-based survey was administered with service providers (n = 32) and focus groups were conducted with Core Group members (n = 10). Providers reported the coalition model has made important impacts in the community by increasing coordination among the key agencies, law enforcement, and service providers and improving quality of service provision. Providers identified the improved and expanded partnerships among coalition members as the key contributing factor to the success of the coalition model. Several key strategies were suggested to improve the coalition model: improved referral tracking, key partner and protocol development, and information sharing.

  2. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  3. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  4. Information Secrecy And Public-Key Cryptography | Mekuria | Zede ...

    African Journals Online (AJOL)

    The subject and need of information secrecy with emphasis to the choice of fully using an already established public channel is to be discussed. Related histories and current achievements made in the area of information hiding, notable persons who changed the course of its progress from ancient times to this last ...

  5. Transmission access and retail wheeling. The key questions

    International Nuclear Information System (INIS)

    Casazza, J.A.

    1996-01-01

    The key questions involving transmission access and retail wheeling are discussed, distinguishing between opposing views regarding the effect on system costs and the environment, particularly on optimal planning involving matching capacity and demand, generation use, demand side management, and economic operations. Also discussed are contrasting views regarding the effect of cost control pressures, regulatory advantages and disadvantages, the impact on system reliability, and the stranding of investment. The author's key concern is the effect of retail wheeling upon optimal planning and operation i.e., will competitors be willing to provide one another with the cost and technical information required for coordination? In his worst scenario, retail wheeling may lead to substantial production cost increases, lessened reliability, and unfair cost-shifting between customer classes. More optimistically, production costs and reliability may be unaffected and the cost-shifting could be salubrious. 7 figs., 11 refs

  6. Key drivers for informal project coordination among sub-contractors

    DEFF Research Database (Denmark)

    Aagaard, Annabeth; Eskerod, Pernille; Madsen, Erik Skov

    2015-01-01

    understandings. Still though, many sub-contractors choose not to coordinate informally. The purpose of this paper is to identify drivers that enhance or inhibits informal coordination in projects. A qualitative, explorative case study approach was applied. Fifteen SME sub-contractors within the offshore wind...... are massive. Six drivers which enhance informal coordination and three drivers which inhibit informal coordination among sub-contractors in projects were identified. The findings imply that management in project-oriented organizations can enhance informal coordination across project sub-contractors...... and by facilitating trust building, by emphasizing previous collaboration successes with the sub-contractors and the possibility of future common projects, by being explicit about expectations on informal coordination, and by developing sub-contractor contracts that are not as tight in economic terms, but instead...

  7. An Intelligent Virtual Human System For Providing Healthcare Information And Support

    Science.gov (United States)

    2011-01-01

    healthcare system, and also to other SMs and Veterans by way of a variety of social networking tools (e.g., 2nd Life, Facebook, etc.). The user can progress... CyberPsychology and Behavior 8, 3 (2005), 187-211. [2] T. Parsons & A.A. Rizzo, Affective Outcomes of Virtual Reality Exposure Therapy for Anxiety...VH System for Providing Healthcare Information and Support508 [4] G. Riva, Virtual Reality in Psychotherapy: Review, CyberPsychology and Behavior 8

  8. [Essential procedure and key methods for survey of traditional knowledge related to Chinese materia medica resources].

    Science.gov (United States)

    Cheng, Gong; Huang, Lu-qi; Xue, Da-yuan; Zhang, Xiao-bo

    2014-12-01

    The survey of traditional knowledge related to Chinese materia medica resources is the important component and one of the innovative aspects of the fourth national survey of the Chinese materia medica resources. China has rich traditional knowledge of traditional Chinese medicine (TCM) and the comprehensive investigation of TCM traditional knowledge aims to promote conservation and sustainable use of Chinese materia medica resources. Building upon the field work of pilot investigations, this paper introduces the essential procedures and key methods for conducting the survey of traditional knowledge related to Chinese materia medica resources. The essential procedures are as follows. First is the preparation phrase. It is important to review all relevant literature and provide training to the survey teams so that they have clear understanding of the concept of traditional knowledge and master key survey methods. Second is the field investigation phrase. When conducting field investigations, survey teams should identify the traditional knowledge holders by using the 'snowball method', record the traditional knowledge after obtaining prior informed concerned from the traditional knowledge holders. Researchers should fill out the survey forms provided by the Technical Specification of the Fourth National Survey of Chinese Materia Medica Resources. Researchers should pay particular attention to the scope of traditional knowledge and the method of inheriting the knowledge, which are the key information for traditional knowledge holders and potential users to reach mutual agreed terms to achieve benefit sharing. Third is the data compilation and analysis phrase. Researchers should try to compile and edit the TCM traditional knowledge in accordance with intellectual property rights requirements so that the information collected through the national survey can serve as the basic data for the TCM traditional knowledge database. The key methods of the survey include regional

  9. 25 CFR 115.803 - What information will be provided in a statement of performance?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false What information will be provided in a statement of performance? 115.803 Section 115.803 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL... provided in a statement of performance? The statement of performance will identify the source, type, and...

  10. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  11. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-01-01

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616

  12. Quantum information and coherence

    CERN Document Server

    Öhberg, Patrik

    2014-01-01

    This book offers an introduction to ten key topics in quantum information science and quantum coherent phenomena, aimed at graduate-student level. The chapters cover some of the most recent developments in this dynamic research field where theoretical and experimental physics, combined with computer science, provide a fascinating arena for groundbreaking new concepts in information processing. The book addresses both the theoretical and experimental aspects of the subject, and clearly demonstrates how progress in experimental techniques has stimulated a great deal of theoretical effort and vice versa. Experiments are shifting from simply preparing and measuring quantum states to controlling and manipulating them, and the book outlines how the first real applications, notably quantum key distribution for secure communication, are starting to emerge. The chapters cover quantum retrodiction, ultracold quantum gases in optical lattices, optomechanics, quantum algorithms, quantum key distribution, quantum cont...

  13. Quantum key distribution over multicore fiber based on silicon photonics

    DEFF Research Database (Denmark)

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    on quantum physics. In order to exchange secure information between users, quantum key distribution (QKD), a branch of Quantum Communications (QCs), provides good prospects for ultimate security based on the laws of quantum mechanics [2–7]. Most of QKD systems are implemented in a point-to-point link using...... generations, to HD-entanglement distribution. Furthermore, MCFs are expected as a good candidate for overcoming the capacity limit of a current optical communication system, as example the record capacity of 661 Tbits/s was obtained last year with a 30-cores fiber [8]. Proof of concept experiment has already...... requirements in terms of key generation are needed. A solution may be represented by new technologies applied to quantum world. In particular multicore fiber (MCF) open a new scenario for quantum communications, from high-dimensional (HD) spatial entanglement generation, to HD QKD and multi-user key...

  14. Ontology-Based Information Extraction for Business Intelligence

    Science.gov (United States)

    Saggion, Horacio; Funk, Adam; Maynard, Diana; Bontcheva, Kalina

    Business Intelligence (BI) requires the acquisition and aggregation of key pieces of knowledge from multiple sources in order to provide valuable information to customers or feed statistical BI models and tools. The massive amount of information available to business analysts makes information extraction and other natural language processing tools key enablers for the acquisition and use of that semantic information. We describe the application of ontology-based extraction and merging in the context of a practical e-business application for the EU MUSING Project where the goal is to gather international company intelligence and country/region information. The results of our experiments so far are very promising and we are now in the process of building a complete end-to-end solution.

  15. Relevance: An Interdisciplinary and Information Science Perspective

    Directory of Open Access Journals (Sweden)

    Howard Greisdorf

    2000-01-01

    Full Text Available Although relevance has represented a key concept in the field of information science for evaluating information retrieval effectiveness, the broader context established by interdisciplinary frameworks could provide greater depth and breadth to on-going research in the field. This work provides an overview of the nature of relevance in the field of information science with a cursory view of how cross-disciplinary approaches to relevance could represent avenues for further investigation into the evaluative characteristics of relevance as a means for enhanced understanding of human information behavior.

  16. Predictive Maintenance: One key to improved power plant availability

    International Nuclear Information System (INIS)

    Mobley; Allen, J.W.

    1986-01-01

    Recent developments in microprocessor technology has provided the ability to routinely monitor the actual mechanical condition of all rotating and reciprocating machinery and process variables (i.e. pressure, temperature, flow, etc.) of other process equipment within an operating electric power generating plant. This direct correlation between frequency domain vibration and actual mechanical condition of machinery and trending process variables of non-rotating equipment can provide the ''key'' to improving the availability and reliability, thermal efficiency and provide the baseline information necessary for developing a realistic plan for extending the useful life of power plants. The premise of utilizing microprocessor-based Predictive Maintenance to improve power plant operation has been proven by a number of utilities. This paper provides a comprehensive discussion of the TEC approach to Predictive Maintenance and examples of successful programs

  17. Prevalence and causes of severe visual impairment and blindness among children in the lorestan province of iran, using the key informant method.

    Science.gov (United States)

    Razavi, Hessom; Kuper, Hannah; Rezvan, Farhad; Amelie, Khatere; Mahboobi-Pur, Hassan; Oladi, Mohammad Reza; Muhit, Mohammad; Hashemi, Hassan

    2010-03-01

    To estimate the prevalence and causes of severe visual impairment and blindness among children in Lorestan province of Iran, and to assess the feasibility of the Key Informant Method in this setting. Potential cases were identified using the Key Informant Method, in 3 counties of Lorestan province during June through August 2008, and referred for examination. Causes of severe visual impairment/blindness were determined and categorized using standard World Health Organization methods. Of 123 children referred for examination, 27 children were confirmed to have severe visual impairment/blindness or blindness. The median age was11 years (interquartile range 6-13), and 59% were girls. After adjusting for non-attenders, the estimated prevalence of severe visual impairment/blindness was 0.04% (0.03-0.05). The main site of abnormality was retina (44%), followed by disorders of the whole eye (33%). The majority of causes had a hereditary etiology (70%), which was associated with a family history of blindness (P = 0.002). Potentially avoidable causes of severe visual impairment/blindness were found in 14 children (52%). Almost all children with severe visual impairment/blindness had a history of parental consanguinity (93%). Our findings suggest a moderate prevalence of childhood blindness in the Lorestan province of Iran, a high proportion of which may be avoidable, given improved access to ophthalmic and genetic counselling services in rural areas. The Key Informant Method is feasible in Iran; future research is discussed.

  18. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Science.gov (United States)

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  19. 42 CFR 51.46 - Disclosing information obtained from a provider of mental health services.

    Science.gov (United States)

    2010-10-01

    ... mental health services. 51.46 Section 51.46 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND... a provider of mental health services. (a) Except as provided in paragraph (b) of this section, if a... of mental health services, it may not disclose information from such records to the individual who is...

  20. Extracting key information from historical data to quantify the transmission dynamics of smallpox

    Directory of Open Access Journals (Sweden)

    Brockmann Stefan O

    2008-08-01

    Full Text Available Abstract Background Quantification of the transmission dynamics of smallpox is crucial for optimizing intervention strategies in the event of a bioterrorist attack. This article reviews basic methods and findings in mathematical and statistical studies of smallpox which estimate key transmission parameters from historical data. Main findings First, critically important aspects in extracting key information from historical data are briefly summarized. We mention different sources of heterogeneity and potential pitfalls in utilizing historical records. Second, we discuss how smallpox spreads in the absence of interventions and how the optimal timing of quarantine and isolation measures can be determined. Case studies demonstrate the following. (1 The upper confidence limit of the 99th percentile of the incubation period is 22.2 days, suggesting that quarantine should last 23 days. (2 The highest frequency (61.8% of secondary transmissions occurs 3–5 days after onset of fever so that infected individuals should be isolated before the appearance of rash. (3 The U-shaped age-specific case fatality implies a vulnerability of infants and elderly among non-immune individuals. Estimates of the transmission potential are subsequently reviewed, followed by an assessment of vaccination effects and of the expected effectiveness of interventions. Conclusion Current debates on bio-terrorism preparedness indicate that public health decision making must account for the complex interplay and balance between vaccination strategies and other public health measures (e.g. case isolation and contact tracing taking into account the frequency of adverse events to vaccination. In this review, we summarize what has already been clarified and point out needs to analyze previous smallpox outbreaks systematically.

  1. Computerized analysis of isometric tension studies provides important additional information about vasomotor activity

    Directory of Open Access Journals (Sweden)

    Vincent M.B.

    1997-01-01

    Full Text Available Concentration-response curves of isometric tension studies on isolated blood vessels are obtained traditionally. Although parameters such as Imax, EC50 and pA2 may be readily calculated, this method does not provide information on the temporal profile of the responses or the actual nature of the reaction curves. Computerized data acquisition systems can be used to obtain average data that represent a new source of otherwise inaccessible information, since early and late responses may be observed separately in detail

  2. Key attributes of the SAPHIRE risk and reliability analysis software for risk-informed probabilistic applications

    International Nuclear Information System (INIS)

    Smith, Curtis; Knudsen, James; Kvarfordt, Kellie; Wood, Ted

    2008-01-01

    The Idaho National Laboratory is a primary developer of probabilistic risk and reliability analysis (PRRA) tools, dating back over 35 years. Evolving from mainframe-based software, the current state-of-the-practice has led to the creation of the SAPHIRE software. Currently, agencies such as the Nuclear Regulatory Commission, the National Aeronautics and Aerospace Agency, the Department of Energy, and the Department of Defense use version 7 of the SAPHIRE software for many of their risk-informed activities. In order to better understand and appreciate the power of software as part of risk-informed applications, we need to recall that our current analysis methods and solution methods have built upon pioneering work done 30-40 years ago. We contrast this work with the current capabilities in the SAPHIRE analysis package. As part of this discussion, we provide information for both the typical features and special analysis capabilities, which are available. We also present the application and results typically found with state-of-the-practice PRRA models. By providing both a high-level and detailed look at the SAPHIRE software, we give a snapshot in time for the current use of software tools in a risk-informed decision arena

  3. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  4. Effect of Providing Information on Students' Knowledge and Concerns about Hydraulic Fracking.

    Science.gov (United States)

    Burger, Joanna; Nakata, Kimi; Liang, Laura; Pittfield, Taryn; Jeitner, Christian

    2015-01-01

    Governmental agencies, regulators, health professionals, and the public are faced with understanding and responding to new development practices and conditions in their local and regional environment. While hydraulic fracking (fracking) for shale gas has been practiced for over 50 years in some states, it is a relatively recent event in the northeastern United States. Providing environmental health information to the public about fracking requires understanding both the knowledge base and the perceptions of the public. The knowledge, perceptions, and concerns of college students about fracking were examined. Students were interviewed at Rutgers University in New Jersey, a state without any fracking, although fracking occurs in nearby Pennsylvania. Objectives were to determine (1) knowledge about fracking, (2) rating of concerns, (3) trusted information sources, (4) importance of fracking relative to other energy sources, and (5) the effect of a 15-min lecture and discussion on these aspects. On the second survey, students improved on their knowledge (except the components used for fracking), and their ratings changed for some concerns, perceived benefits, and trusted information sources. There was no change in support for further development of natural gas, but support for solar, wind, and wave energy decreased. Data suggest that students' knowledge and perceptions change with exposure to information, but many of these changes were due to students using the Internet to look up information immediately after the initial survey and lecture. Class discussions indicated a general lack of trust for several information sources available on the Web.

  5. The Drupal Environmental Information Management System Provides Standardization, Flexibility and a Platform for Collaboration

    Science.gov (United States)

    Gries, C.; Vanderbilt, K.; Reid, D.; Melendez-Colom, E.; San Gil, I.

    2013-12-01

    Over the last five years several Long-Term Ecological Research (LTER) sites have collaboratively developed a standardized yet flexible approach to ecological information management based on the open source Drupal content management system. These LTER sites adopted a common data model for basic metadata necessary to describe data sets, but also used for site management and web presence. Drupal core functionality provides web forms for easy management of information stored in this data model. Custom Drupal extensions were developed to generate XML files conforming to the Ecological Metadata Language (EML) for contribution to the LTER Network Information System (NIS) and other data archives. Each LTER site then took advantage of the flexibility Drupal provides to develop its unique web presence, choosing different themes and adding additional content to the websites. By nature, information presented is highly interlinked which can easily be modeled in Drupal entities and is further supported by a sophisticated tagging system (Fig. 1). Therefore, it is possible to provide the visitor with many different entry points to the site specific information presented. For example, publications and datasets may be grouped for each scientist, for each research project, for each major research theme at the site, making the information presented more accessible for different visitors. Experience gained during the early years was recently used to launch a complete re-write for upgrading to Drupal 7. LTER sites from multiple academic institutions pooled resources in order to partner with professional Drupal developers. Highlights of the new developments are streamlined data entry, improved EML output and integrity, support of IM workflows, a faceted data set search, a highly configurable data exploration tool with intelligent filtering and data download, and, for the mobile age, a responsive web design theme. Seven custom modules and a specific installation profile were developed

  6. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    Science.gov (United States)

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2018-02-01

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-10-12

    count rate of Bob’s detectors. In this detector-limited regime , it is advantageous to increase M to encode as much information as possible in each...High- rate field demonstration of large-alphabet quantum key distribution Catherine Lee,1, 2 Darius Bunandar,1 Zheshen Zhang,1 Gregory R. Steinbrecher...October 12, 2016) 2 Quantum key distribution (QKD) enables secure symmetric key exchange for information-theoretically secure com- munication via one-time

  8. 41 CFR 102-84.15 - Why must I provide information for the Annual Real Property Inventory?

    Science.gov (United States)

    2010-07-01

    ...; and (2) Establish information systems, implement inventory controls and conduct surveys, in accordance... information for the Annual Real Property Inventory? 102-84.15 Section 102-84.15 Public Contracts and Property... PROPERTY 84-ANNUAL REAL PROPERTY INVENTORIES § 102-84.15 Why must I provide information for the Annual Real...

  9. Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses

    Science.gov (United States)

    Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.

    2010-01-01

    An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…

  10. Economic contribution of recreating visitors to the Florida Keys/Key West

    Science.gov (United States)

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  11. Information dissemination and training: two key issues for consolidating and strengthening the results of health telematic projects.

    Science.gov (United States)

    Arcarese, T; Boi, S; Gagliardi, R

    2000-01-01

    The concepts expressed in this paper concerns the activities to be developed within HEALTHLINE, a European project under the Telematics Application programme. HEALTHLINE is an umbrella project which takes initiatives and provides links to other international projects on health telematics. The projects involved are NIVEMES and RISE; they represent the starting point from which a common approach will be developed. The experience gained from these projects has highlighted two emerging requirements: information dissemination and training. To fulfil the needs of information, an Internet corner will be set up; it will allow citizens and health professionals to find and exchange information as well as to discuss themes concerning health care. Due to the most advanced technologies recently introduced, the Health care sector has had to modify its traditional ways of working to aid professionals in exploiting new training techniques and Health Care provision methods. HEALTHLINE will focus on training and on the development of the use of new tools and services. Furthermore, the project will exploit the training methodologies based on multimedia technology for developing training-on-the-job modules. The entire system, in its final stage, will consist of a network for co-operating training and information dissemination; European sites in the project will share information, training material and provide education and information on tele-health, medical and health-care issues to health care providers, beneficiaries and the general public.

  12. Telemedicine Provides Non-Inferior Research Informed Consent for Remote Study Enrollment: A Randomized Controlled Trial

    Science.gov (United States)

    Bobb, Morgan R.; Van Heukelom, Paul G.; Faine, Brett A.; Ahmed, Azeemuddin; Messerly, Jeffrey T.; Bell, Gregory; Harland, Karisa K.; Simon, Christian; Mohr, Nicholas M.

    2016-01-01

    Objective Telemedicine networks are beginning to provide an avenue for conducting emergency medicine research, but using telemedicine to recruit participants for clinical trials has not been validated. The goal of this consent study is to determine whether patient comprehension of telemedicine-enabled research informed consent is non-inferior to standard face-to-face research informed consent. Methods A prospective, open-label randomized controlled trial was performed in a 60,000-visit Midwestern academic Emergency Department (ED) to test whether telemedicine-enabled research informed consent provided non-inferior comprehension compared with standard consent. This study was conducted as part of a parent clinical trial evaluating the effectiveness of oral chlorhexidine gluconate 0.12% in preventing hospital-acquired pneumonia among adult ED patients with expected hospital admission. Prior to being recruited into the study, potential participants were randomized in a 1:1 allocation ratio to consent by telemedicine versus standard face-to-face consent. Telemedicine connectivity was provided using a commercially available interface (REACH platform, Vidyo Inc., Hackensack, NJ) to an emergency physician located in another part of the ED. Comprehension of research consent (primary outcome) was measured using the modified Quality of Informed Consent (QuIC) instrument, a validated tool for measuring research informed consent comprehension. Parent trial accrual rate and qualitative survey data were secondary outcomes. Results One-hundred thirty-one patients were randomized (n = 64, telemedicine), and 101 QuIC surveys were completed. Comprehension of research informed consent using telemedicine was not inferior to face-to-face consent (QuIC scores 74.4 ± 8.1 vs. 74.4 ± 6.9 on a 100-point scale, p = 0.999). Subjective understanding of consent (p=0.194) and parent trial study accrual rates (56% vs. 69%, p = 0.142) were similar. Conclusion Telemedicine is non-inferior to face

  13. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Buddemeier, B R; Dillon, M B

    2009-01-21

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by

  14. Key successes and challenges in providing mental health care in an urban male remand prison: a qualitative study

    OpenAIRE

    Samele, Chiara; Forrester, Andrew; Urqu?a, Norman; Hopkin, Gareth

    2016-01-01

    Purpose This study aimed to describe the workings of an urban male remand prison mental health service exploring the key challenges and successes, levels of integration and collaboration with other services. Method A purposive sampling was used to recruit key prison and healthcare professionals for in-depth interviews. A thematic analysis was used to analyse transcripts based on an initial coding frame of several predefined themes. Other key themes were also identified. Results Twenty-eight i...

  15. Clinical social networking--a new revolution in provider communication and delivery of clinical information across providers of care?

    Science.gov (United States)

    Kolowitz, Brian J; Lauro, Gonzalo Romero; Venturella, James; Georgiev, Veliyan; Barone, Michael; Deible, Christopher; Shrestha, Rasu

    2014-04-01

    The adoption of social media technologies appears to enhance clinical outcomes through improved communications as reported by Bacigalupe (Fam Syst Heal 29(1):1-14, 2011). The ability of providers to more effectively, directly, and rapidly communicate among themselves as well as with patients should strengthen collaboration and treatment as reported by Bacigalupe (Fam Syst Heal 29(1):1-14, 2011). This paper is a case study in one organization's development of an internally designed and developed social technology solution termed "Unite." The Unite system combines social technologies' features including push notifications, messaging, community groups, and user lists with clinical workflow and applications to construct dynamic provider networks, simplify communications, and facilitate clinical workflow optimization. Modeling Unite as a social technology may ease adoption barriers. Developing a social network that is integrated with healthcare information systems in the clinical space opens the doors to capturing and studying the way in which providers communicate. The Unite system appears to have the potential to breaking down existing communication paradigms. With Unite, a rich set of usage data tied to clinical events may unravel alternative networks that can be leveraged to advance patient care.

  16. Customer-Provider Strategic Alignment: A Maturity Model

    Science.gov (United States)

    Luftman, Jerry; Brown, Carol V.; Balaji, S.

    This chapter presents a new model for assessing the maturity of a ­customer-provider relationship from a collaborative service delivery perspective: the Customer-Provider Strategic Alignment Maturity (CPSAM) Model. This model builds on recent research for effectively managing the customer-provider relationship in IT service outsourcing contexts and a validated model for assessing alignment across internal IT service units and their business customers within the same organization. After reviewing relevant literature by service science and information systems researchers, the six overarching components of the maturity model are presented: value measurements, governance, partnership, communications, human resources and skills, and scope and architecture. A key assumption of the model is that all of the components need be addressed to assess and improve customer-provider alignment. Examples of specific metrics for measuring the maturity level of each component over the five levels of maturity are also presented.

  17. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  18. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

    Science.gov (United States)

    Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu

    2008-10-14

    A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

  19. 77 FR 56712 - Agency Information Collection (Homeless Providers Grant and Per Diem Program) Activities Under...

    Science.gov (United States)

    2012-09-13

    ... Providers Grant and Per Diem Program) Activities Under OMB Review AGENCY: Veterans Health Administration... Resources and Housing Branch, New Executive Office Building, Room 10235, Washington, DC 20503, (202) 395... . Please refer to ``OMB Control No. 2900-0554.'' SUPPLEMENTARY INFORMATION: Titles: a. Homeless Providers...

  20. The Leadville Mine Drainage Tunnel Catastrophe: A Case Study of How Isotope Geochemistry Provided Forensic Evidence to Inform Policy Decisions

    Science.gov (United States)

    Williams, M. W.; Wireman, M.; Liu, F.; Gertson, J.

    2008-12-01

    A state of emergency was declared in February 2008 because of fears that a blocked drainage tunnel in the Leadville mining district of Colorado could cause a catastrophic flood. An estimated 1 billion gallons of metals-laden water poses an eminent threat to the city of Leadville and the headwaters of the Arkansas river. Within days of the declaration of a state of emergency, Governor Ritter and Senator Salazer of Colorado, along with a host of other local and statewide politicians, visited the site and emphasized the need to develop a fast yet safe mitigation plan. Here we provide information from a case study that illustrates how a suite of isotopic and hydrologic tools enables identification of critical, site-specific variables essential in developing a science plan to guide targeted remediation of the Leadville drainage tunnel. The isotopic tools, including both stable and radiogenic isotopes, provided clear and compelling evidence of water sources and flowpaths in an area that has undergone extensive perturbations, including the drilling of more than 2,000 mine shafts. This forensic evidence was the key information in developing a plan to plug the drainage tunnel several hundred feet underground, divert a major source of polluted water from reaching the collapsed tunnel and piping it to an existing treatment plant, and guidance on where to place pumps in additional mine shafts, and the drilling of new wells to pump water in case the plugging of the tunnel caused water to pool up and raise the water table to dangerous heights. This particular case of forensic hydrology using isotopic tools not only provides the scientific basis for an operational plan to defuse a life- and property-threatening situation, it also provides the basis for decommissioning an existing water treatment plant, which will result in savings of over 1 million annually in operational costs. Decommissioning the existing water treatment plant will pay for the tunnel mitigation within several

  1. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  2. Providing Data Quality Information for Remote Sensing Applications

    Science.gov (United States)

    Albrecht, F.; Blaschke, T.; Lang, S.; Abdulmutalib, H. M.; Szabó, G.; Barsi, Á.; Batini, C.; Bartsch, A.; Kugler, Zs.; Tiede, D.; Huang, G.

    2018-04-01

    The availability and accessibility of remote sensing (RS) data, cloud processing platforms and provided information products and services has increased the size and diversity of the RS user community. This development also generates a need for validation approaches to assess data quality. Validation approaches employ quality criteria in their assessment. Data Quality (DQ) dimensions as the basis for quality criteria have been deeply investigated in the database area and in the remote sensing domain. Several standards exist within the RS domain but a general classification - established for databases - has been adapted only recently. For an easier identification of research opportunities, a better understanding is required how quality criteria are employed in the RS lifecycle. Therefore, this research investigates how quality criteria support decisions that guide the RS lifecycle and how they relate to the measured DQ dimensions. Subsequently follows an overview of the relevant standards in the RS domain that is matched to the RS lifecycle. Conclusively, the required research needs are identified that would enable a complete understanding of the interrelationships between the RS lifecycle, the data sources and the DQ dimensions, an understanding that would be very valuable for designing validation approaches in RS.

  3. Information Society and Knowledge Economy - Essence and Key Relationships

    Directory of Open Access Journals (Sweden)

    Rafał Żelazny

    2015-04-01

    Full Text Available This paper focuses on essence and relationships between information society (IS and knowledge economy (KE concepts. The aim of this article is twofold. The first objective is to denominate the conceptual framework and relationships between IS and KE conceptions. The second is to present dependencies between the indexes of IS and KE development level in selected countries. Firstly, based on the notional relations between information and knowledge, there are characterized the relationships between concepts of information society, knowledge economy and knowledge society (KS. Secondly, using popular composite indexes evaluating the degree of IS and KE development i.e. Networked Readiness Index (NRI, ICT Development Index (IDI, Knowledge Economy Index (KEI and Summary Innovation Index (SII, there were studied corelations between information society and knowledge economy in 34 selected countries in 2012. The paper concludes by stating limits and implications for further research. This work contributes to systematization and integration of knowledge about the mutually permeable conceptions of information society and knowledge economy

  4. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    Science.gov (United States)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    sources. Information generated by our study will provide a valuable data set for better understanding DOM bio-geochemical dynamics along the Florida Keys ecosystem and information for future studies linking DOM and the coral community.

  5. EFFECT OF PROVIDING INFORMATION ON STUDENTS’ KNOWLEDGE AND CONCERNS ABOUT HYDRAULIC FRACKING

    Science.gov (United States)

    Burger, Joanna; Nakata, Kimi; Liang, Laura; Pittfield, Taryn; Jeitner, Christian

    2015-01-01

    Governmental agencies, regulators, health professionals, and the public are faced with understanding and responding to new development practices and conditions in their local and regional environment. While hydraulic fracking (fracking) for shale gas has been practiced for over 50 years in some states, it is a relatively recent event in the northeastern United States. Providing environmental health information to the public about fracking requires understanding both the knowledge base and the perceptions of the public. The knowledge, perceptions, and concerns of college students about fracking were examined. Students were interviewed at Rutgers University in New Jersey, a state without any fracking, although fracking occurs in nearby Pennsylvania. Objectives were to determine (1) knowledge about fracking, (2) rating of concerns, (3) trusted information sources, (4) importance of fracking relative to other energy sources, and (5) the effect of a 15-min lecture and discussion on these aspects. On the second survey, students improved on their knowledge (except the components used for fracking), and their ratings changed for some concerns, perceived benefits, and trusted information sources. There was no change in support for further development of natural gas, but support for solar, wind, and wave energy decreased. Data suggest that students’ knowledge and perceptions change with exposure to information, but many of these changes were due to students using the Internet to look up information immediately after the initial survey and lecture. Class discussions indicated a general lack of trust for several information sources available on the Web. PMID:25965194

  6. TELECOMMUTING AND HRM: A CASE STUDY OF AN INFORMATION TECHNOLOGY SERVICE PROVIDER

    Directory of Open Access Journals (Sweden)

    André Fernandes Bernardino

    2012-08-01

    Full Text Available With the development in information technology resources, a way of working has been standing out: telecommuting. This manner of working from a distance may offer a competitive advantage in attracting and retaining highly skilled professionals. The purpose of the research presented in this article is to identify guidelines for the implementation and management of telecommuting, as an alternative to overcome the shortage of qualified professionals in Information Technology (IT. The results, based on a case study of a Brazilian subsidiary of a multinational organization that provides IT services, shown that telecommuting (1 contributes to attracting and retaining qualified professionals in IT, (2 should be based on trustworthy relationships, (3 has to be supported by a strategy of decentralization of both structure and organizational assets.

  7. Does the Internet provide patients or clinicians with useful information regarding faecal incontinence? An observational study.

    Science.gov (United States)

    Leo, C A; Murphy, J; Hodgkinson, J D; Vaizey, C J; Maeda, Y

    2018-01-01

    The Internet has become an important platform for information communication. This study aim to investigate the utility of social media and search engines to disseminate faecal incontinence information. We looked into Social media platforms and search engines. There was not a direct patient recruitment and any available information from patients was already on public domain at the time of search. A quantitative analysis of types and volumes of information regarding faecal incontinence was made. Twelve valid pages were identified on Facebook: 5 (41%) pages were advertising commercial incontinence products, 4 (33%) pages were dedicated to patients support groups and 3 (25%) pages provided healthcare information. Also we found 192 Facebook posts. On Twitter, 2890 tweets were found of which 51% tweets provided healthcare information; 675 (45%) were sent by healthcare professionals to patients, 530 tweets (35.3%) were between healthcare professionals, 201 tweets (13.4%) were from medical journals or scientific books and 103 tweets (7%) were from hospitals or clinics with information about events and meetings. The second commonest type of tweets was advertising commercial incontinence products 27%. Patients tweeted to exchange information and advice between themselves (20.5%). In contrast, search engines as Google/Yahoo/Bing had a higher proportion of healthcare information (over 70%). Internet appears to have potential to be a useful platform for patients to learn about faecal incontinence and share information; however, given one lack of focus of available data, patients may struggle to identify valid and useful information.

  8. Quantum key distribution with hacking countermeasures and long term field trial.

    Science.gov (United States)

    Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J

    2017-05-16

    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.

  9. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  10. DOE waste information network: Data management and communications

    International Nuclear Information System (INIS)

    Fore, C.S.

    1986-01-01

    The U.S. Department of Energy's Waste Information Network (WIN) is an integral part of DOE's Hazardous Waste Remedial Actions Program. WIN has played an active role in the national program's mission to identify the magnitude and nature of existing DOE hazardous chemical and mixed radioactive waste streams and inventories and to provide a mechanism for disseminating pertinent information on technology activities. The information systems activity is structured into three key areas: data base development, data analysis, and data dissemination. As a result of this effort, several key data bases have been developed. Data dissemination is important to the use and management of the diversity of information and communication features developed by the program

  11. National indicators of health literacy: ability to understand health information and to engage actively with healthcare providers - a population-based survey among Danish adults.

    Science.gov (United States)

    Bo, Anne; Friis, Karina; Osborne, Richard H; Maindal, Helle Terkildsen

    2014-10-22

    Health literacy is a multidimensional concept covering a range of cognitive and social skills necessary for participation in health care. Knowledge of health literacy levels in general populations and how health literacy levels impacts on social health inequity is lacking. The primary aim of this study was to perform a population-based assessment of dimensions of health literacy related to understanding health information and to engaging with healthcare providers. Secondly, the aim was to examine associations between socio-economic characteristics with these dimensions of health literacy. A population-based survey was conducted between January and April 2013 in the Central Denmark Region. Postal invitations were sent to a random sample of 46,354 individuals >25 years of age. Two health literacy dimensions were selected from the Health Literacy Questionnaire (HLQ™): i) Understanding health information well enough to know what to do (5 items), and ii) Ability to actively engage with health care providers (5 items). Response options ranged from 1 (very difficult) to 4 (very easy). We investigated the level of perceived difficulty of each task, and the associations between the two dimensions and socio-economic characteristics. A total of 29,473 (63.6%) responded to the survey. Between 8.8%, 95% CI: 8.4-9.2 and 20.2%, 95% CI: 19.6-20.8 of the general population perceived the health literacy tasks as difficult or very difficult at the individual item level. On the scale level, the mean rating for i) understanding health information was 3.10, 95% CI: 3.09-3.10, and 3.07, 95% CI: 3.07-3.08 for ii) engagement with health care providers. Low levels of the two dimensions were associated with low income, low education level, living alone, and to non-Danish ethnicity. Associations with sex and age differed by the specific health literacy dimension. Estimates on two key dimensions of health literacy in a general population are now available. A substantial proportion of the

  12. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  13. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  14. Decision Trajectories in Dementia Care Networks: Decisions and Related Key Events.

    Science.gov (United States)

    Groen-van de Ven, Leontine; Smits, Carolien; Oldewarris, Karen; Span, Marijke; Jukema, Jan; Eefsting, Jan; Vernooij-Dassen, Myrra

    2017-10-01

    This prospective multiperspective study provides insight into the decision trajectories of people with dementia by studying the decisions made and related key events. This study includes three waves of interviews, conducted between July 2010 and July 2012, with 113 purposefully selected respondents (people with beginning to advanced stages of dementia and their informal and professional caregivers) completed in 12 months (285 interviews). Our multilayered qualitative analysis consists of content analysis, timeline methods, and constant comparison. Four decision themes emerged-managing daily life, arranging support, community living, and preparing for the future. Eight key events delineate the decision trajectories of people with dementia. Decisions and key events differ between people with dementia living alone and living with a caregiver. Our study clarifies that decisions relate not only to the disease but to living with the dementia. Individual differences in decision content and sequence may effect shared decision-making and advance care planning.

  15. The effect of touch-key size on the usability of In-Vehicle Information Systems and driving safety during simulated driving.

    Science.gov (United States)

    Kim, Heejin; Kwon, Sunghyuk; Heo, Jiyoon; Lee, Hojin; Chung, Min K

    2014-05-01

    Investigating the effect of touch-key size on usability of In-Vehicle Information Systems (IVISs) is one of the most important research issues since it is closely related to safety issues besides its usability. This study investigated the effects of the touch-key size of IVISs with respect to safety issues (the standard deviation of lane position, the speed variation, the total glance time, the mean glance time, the mean time between glances, and the mean number of glances) and the usability of IVISs (the task completion time, error rate, subjective preference, and NASA-TLX) through a driving simulation. A total of 30 drivers participated in the task of entering 5-digit numbers with various touch-key sizes while performing simulated driving. The size of the touch-key was 7.5 mm, 12.5 mm, 17.5 mm, 22.5 mm and 27.5 mm, and the speed of driving was set to 0 km/h (stationary state), 50 km/h and 100 km/h. As a result, both the driving safety and the usability of the IVISs increased as the touch-key size increased up to a certain size (17.5 mm in this study), at which they reached asymptotes. We performed Fitts' law analysis of our data, and this revealed that the data from the dual task experiment did not follow Fitts' law. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  16. Providing Meteorological Information for Controlled Burns at the Savannah River Site

    International Nuclear Information System (INIS)

    Buckley, R.

    1999-01-01

    Regional and local weather information are important for a variety of applications at the Savannah River Site (SRS), a Department of Energy (DOE) facility covering approximately 800 square kilometers of southwest South Carolina east of the Savannah River. For example, meteorological observations and forecasts are used to assess the consequences of an accidental radiological or chemical release. Traditionally, hazards posed by SRS operations have been associated with nuclear reactors, chemical reprocessing plants, fuel fabrication, or waste-vitrification facilities. However, recent events have shown site-specific meteorology to be a valuable tool to the United States Forest Service (USFS) in mitigating potential hazards from controlled burns that are conducted at the SRS. Prescribed burns at the SRS are important for a variety of reasons. The removal of thick undergrowth allows wildlife to more easily feed and migrate, accelerates the growth of young pine stands, and controls certain diseases that affect local pine forests (e.g. Adams et al. 1973). In addition, the removal of twigs, pine needles, or leaves (a fuel source) reduces the chance of serious wildfire damage. However, the threat of smoke inhalation and reduced visibility requires careful planning on the part of the fire professionals. At the SRS, approximately 100 square kilometers of land per year are burned in a controlled manner, mainly in the spring.To reduce the potentially harmful effects to any onsite activity, it is important that USFS personnel understand current and predicted weather patterns within the area. This paper discusses two sources of meteorological information that are provided to SRS-USFS personnel for use in planning forest burns: (1) a meteorological tower system which provides current data from a series of onsite locations, and (2) an operational prognostic mesoscale model used to generate forecast information. The forecast data supplements the basic National Weather Service (NWS

  17. An e-health driven laboratory information system to support HIV treatment in Peru: E-quity for laboratory personnel, health providers and people living with HIV

    Directory of Open Access Journals (Sweden)

    Caballero N Patricia

    2009-12-01

    Full Text Available Abstract Background Peru has a concentrated HIV epidemic with an estimated 76,000 people living with HIV (PLHIV. Access to highly active antiretroviral therapy (HAART expanded between 2004-2006 and the Peruvian National Institute of Health was named by the Ministry of Health as the institution responsible for carrying out testing to monitor the effectiveness of HAART. However, a national public health laboratory information system did not exist. We describe the design and implementation of an e-health driven, web-based laboratory information system - NETLAB - to communicate laboratory results for monitoring HAART to laboratory personnel, health providers and PLHIV. Methods We carried out a needs assessment of the existing public health laboratory system, which included the generation and subsequent review of flowcharts of laboratory testing processes to generate better, more efficient streamlined processes, improving them and eliminating duplications. Next, we designed NETLAB as a modular system, integrating key security functions. The system was implemented and evaluated. Results The three main components of the NETLAB system, registration, reporting and education, began operating in early 2007. The number of PLHIV with recorded CD4 counts and viral loads increased by 1.5 times, to reach 18,907. Publication of test results with NETLAB took an average of 1 day, compared to a pre-NETLAB average of 60 days. NETLAB reached 2,037 users, including 944 PLHIV and 1,093 health providers, during its first year and a half. The percentage of overall PLHIV and health providers who were aware of NETLAB and had a NETLAB password has also increased substantially. Conclusion NETLAB is an effective laboratory management tool since it is directly integrated into the national laboratory system and streamlined existing processes at the local, regional and national levels. The system also represents the best possible source of timely laboratory information for

  18. Psychometrics of an original measure of barriers to providing family planning information: Implications for social service providers.

    Science.gov (United States)

    Bell, Melissa M; Newhill, Christina E

    2017-07-01

    Social service professionals can face challenges in the course of providing family planning information to their clients. This article reports findings from a study that developed an original 27-item measure, the Reproductive Counseling Obstacle Scale (RCOS) designed to measure such obstacles based conceptually on Bandura's social cognitive theory (1986). We examine the reliability and factor structure of the RCOS using a sample of licensed social workers (N = 197). A 20-item revised version of the RCOS was derived using principal component factor analysis. Results indicate that barriers to discussing family planning, as measured by the RCOS, appear to be best represented by a two-factor solution, reflecting self-efficacy/interest and perceived professional obligation/moral concerns. Implications for practice and future research are discussed.

  19. EFFECT OF PROVIDING INFORMATION ON STUDENTS’ KNOWLEDGE AND CONCERNS ABOUT HYDRAULIC FRACKING

    OpenAIRE

    Burger, Joanna; Nakata, Kimi; Liang, Laura; Pittfield, Taryn; Jeitner, Christian

    2015-01-01

    Governmental agencies, regulators, health professionals, and the public are faced with understanding and responding to new development practices and conditions in their local and regional environment. While hydraulic fracking (fracking) for shale gas has been practiced for over 50 years in some states, it is a relatively recent event in the northeastern United States. Providing environmental health information to the public about fracking requires understanding both the knowledge base and the...

  20. 34 CFR 377.31 - What information must a grantee provide to eligible clients?

    Science.gov (United States)

    2010-07-01

    ... clients? 377.31 Section 377.31 Education Regulations of the Offices of the Department of Education... PROJECTS TO INCREASE CLIENT CHOICE PROGRAM What Post-Award Conditions Must Be Met by a Grantee? § 377.31 What information must a grantee provide to eligible clients? Each grantee shall advise all clients and...

  1. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Science.gov (United States)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  2. Governance and Public Sector Transformation in South Africa: Reporting and Providing Assurance on Service Delivery Information

    OpenAIRE

    Mariaan Roos

    2012-01-01

    Reporting on performance was legislatively established in South Africa in terms of the Public Finance Management Act, Act 1 of 1999, section 40 (3)(a). The auditing of the reported information was legislated in the Public Audit Act, Act 25 of 2004, section 20(2) (c). The objectives of the article are firstly to provide an overview of the development and application of the reporting and secondly providing assurance on service delivery information and thirdly to reflect on challenges to the imp...

  3. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  4. The SEA-change Model in Information Literacy: Assessing Information Literacy Development with Reflective Writing

    Directory of Open Access Journals (Sweden)

    Barbara Anne Sen

    2014-07-01

    Full Text Available Reflective writing is a key professional skill, and the University of Sheffield Information School seeks to develop this skill in our students through the use of reflective assessments. Reflection has been used as a means of supporting Information Literacy development in the Higher Education context and recent pedagogical IL frameworks highlight the important role of reflection. This paper presents an analysis of Undergraduate students’ reflective writing on one module. The writing is mapped against two models of reflection to understand the nature and depth of the students’ reflection and through this understand their Information literacy development, with the overall aim of improving the teaching and learning experience for the future. Key findings are that students did reflect deeply and identified a number of ways in which they felt their IL had developed (e.g. developing a knowledge of specialist sources, ways they could have improved their information literacy practices (e.g. through storing information in a more organised fashion, and ways that we could improve our teaching (e.g. by providing appropriate scaffolding for the activities.

  5. E-mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Directory of Open Access Journals (Sweden)

    Behzad NAZARI

    2015-01-01

    Full Text Available The present study highly supported the effective role of providing background information via e-mail by the teacher to write e-mail by the students in learners’ writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of Oxford English Language Placement Test (OELPT the students' proficiency level seems to be nearly the same. Participants were randomly assign into two groups of experimental and control, each consisting of 25 students. After the administration of the proficiency test, all groups were assigned to write topic 1 as the pre-test. Next, the teacher involved the learners in the new instruction (treatment. During writing topics 2, 3, 4, 5, 6, and 7 experimental group’s background knowledge was activated through e-mail before writing and e-mailing topics while the control group received no background knowledge activation through e-mail. After the treatment was given to the experimental group, the students in both groups were required to write another composition about the last topic, topic 8. Again, in this phase, none of the groups received any background information. The results indicated that providing background information via e-mail by the teacher to write e-mail by the students significantly improved learners’ writing ability.

  6. Information sharing for effective IT incident resolving in IT service provider networks: A financial service case study

    NARCIS (Netherlands)

    Vlietland, J.; Vliet, J.C.

    2015-01-01

    Information technology (IT)-enabled financial services are typically delivered by a network of interdependent IT service providers. Such networks need information to resolve IT incidents in their delivered IT services. The objective of this research is to identify the set of information that needs

  7. CALINX (California Information Exchange): a multi-stakeholder statewide initiative to improve healthcare information flows.

    Science.gov (United States)

    Hopkins, D S; Oswald, N; McCaffrey, K; Bressler, S; Davidson, N; Vela, L

    2000-01-01

    Given the diffusion of responsibilities for gathering and reporting healthcare information in a managed care environment, California stakeholders are taking concrete steps to break the deadlock on data and information flows that has characterized the industry for some time. The California Information Exchange (CALINX) was established to facilitate the implementation of the Health Insurance Portability and Accountability Act (HIPAA) standards in California and to create trust for data exchange between trading partners, without which data exchange still will not occur. Strategic directions are set by the chief executives of key associations and organizations representing purchasers, plans, providers, and consumers. Multi-stakeholder workgroups have produced detailed data guidelines for the HIPAA standards along with rules for exchange of key data sets between trading partners. These rules address frequency, timeliness, and accuracy of data submission. Both the data guidelines and the rules have been tested in live demonstration projects, and the results of these projects have been reported to substantiate the business case for implementation. Further incentives are being built into contracts between purchasers and plans, and between plans and providers. CALINX is currently promoting widespread adoption of the data guidelines and rules for exchange with all members of the industry.

  8. Providing information about prenatal screening for Down syndrome

    DEFF Research Database (Denmark)

    Skjøth, Mette Maria; Draborg, Eva; Pedersen, Claus Duedal

    2015-01-01

    BACKGROUND: In recent decades there have been advances in the options for prenatal screening. Screening programmes for Down syndrome are well established in many countries. It is important that pregnant women are well informed about the benefits and risks of screening. A variety of interventions...... screening for Down syndrome. DESIGN: SYSTEMATIC REVIEW: METHODS: A systematic search was performed using the PUBMED and EMBASE databases. The search terms included MeSH terms and free text and were combined by Boolean terms (AND, OR) with no restriction on language or time. MAIN OUTCOME MEASURES: Main...... information about prenatal screening for Down syndrome can improve their ability to make an informed choice. This article is protected by copyright. All rights reserved....

  9. A mine of information: can sports analytics provide wisdom from your data?

    OpenAIRE

    Passfield, Louis; Hopker, James G.

    2017-01-01

    This paper explores the notion that the availability and analysis of large datasets has the capacity to improve practice and change the nature of science in the sport and exercise setting. The increasing use of data and information technology in sport is giving rise to this change. Websites hold large data repositories and the development of wearable technology, mobile phone applications and related instruments for monitoring physical activity, training and competition, provide large data set...

  10. What is eHealth (6)? Development of a Conceptual Model for eHealth: Qualitative Study with Key Informants.

    Science.gov (United States)

    Shaw, Tim; McGregor, Deborah; Brunner, Melissa; Keep, Melanie; Janssen, Anna; Barnet, Stewart

    2017-10-24

    Despite rapid growth in eHealth research, there remains a lack of consistency in defining and using terms related to eHealth. More widely cited definitions provide broad understanding of eHealth but lack sufficient conceptual clarity to operationalize eHealth and enable its implementation in health care practice, research, education, and policy. Definitions that are more detailed are often context or discipline specific, limiting ease of translation of these definitions across the breadth of eHealth perspectives and situations. A conceptual model of eHealth that adequately captures its complexity and potential overlaps is required. This model must also be sufficiently detailed to enable eHealth operationalization and hypothesis testing. This study aimed to develop a conceptual practice-based model of eHealth to support health professionals in applying eHealth to their particular professional or discipline contexts. We conducted semistructured interviews with key informants (N=25) from organizations involved in health care delivery, research, education, practice, governance, and policy to explore their perspectives on and experiences with eHealth. We used purposeful sampling for maximum diversity. Interviews were coded and thematically analyzed for emergent domains. Thematic analyses revealed 3 prominent but overlapping domains of eHealth: (1) health in our hands (using eHealth technologies to monitor, track, and inform health), (2) interacting for health (using digital technologies to enable health communication among practitioners and between health professionals and clients or patients), and (3) data enabling health (collecting, managing, and using health data). These domains formed a model of eHealth that addresses the need for clear definitions and a taxonomy of eHealth while acknowledging the fluidity of this area and the strengths of initiatives that span multiple eHealth domains. This model extends current understanding of eHealth by providing clearly

  11. In private practice, informed consent is interpreted as providing explanations rather than offering choices: a qualitative study.

    Science.gov (United States)

    Delany, Clare M

    2007-01-01

    How do physiotherapists working in private practice understand and interpret the meaning and significance of informed consent in everyday clinical practice? Qualitative study using semi-structured interviews. Seventeen physiotherapists purposefully recruited from metropolitan private practices where treatment was on a one-on-one basis. Therapists defined informed consent as an implicit component of their routine clinical explanations, rather than a process of providing explicit patient choices. Therapists' primary concern was to provide information that led to a (therapist-determined) beneficial therapeutic outcome, rather than to enhance autonomous patient choice. Explicit patient choice and explicit informed consent were defined as important only if patients requested information or therapists recognised risks associated with the treatment. Physiotherapists defined informed consent within a context of achieving therapeutic outcomes rather than a context of respect for patient autonomy and autonomous choice. Physiotherapy practice guidelines developed to ensure compliance with ethical and legal obligations may therefore be followed only if they fit with therapists' understanding and interpretation of a desired therapeutic outcome.

  12. Assessing the quality of websites providing information on multiple sclerosis: evaluating tools and comparing sites.

    Science.gov (United States)

    Harland, Juliet; Bath, Peter

    2007-09-01

    The quality of health information available on the Internet has proved difficult to assess objectively. The Internet's growing popularity as a source of health information, accompanied by the lack of regulation of websites, has resulted in research that has developed and tested tools to evaluate health website quality. However, only a few studies have tested the validity and reliability of these tools. There is a lack of consensus about appropriate indicators with which to operationalize the concept of quality health information. This study aimed to contribute to this research by testing the validity and reliability of existing tools, through their application to websites that provided information about multiple sclerosis. Furthermore, a specific tool for evaluating multiple sclerosis information was developed, contributing to the debate about suitable criteria for measuring the ;quality' of health information on the web.

  13. Using Model-Based System Engineering to Provide Artifacts for NASA Project Life-Cycle and Technical Reviews Presentation

    Science.gov (United States)

    Parrott, Edith L.; Weiland, Karen J.

    2017-01-01

    This is the presentation for the AIAA Space conference in September 2017. It highlights key information from Using Model-Based Systems Engineering to Provide Artifacts for NASA Project Life-cycle and Technical Reviews paper.

  14. Using Key Informant Method to Determine the Prevalence and Causes of Childhood Blindness in South-Eastern Nigeria.

    Science.gov (United States)

    Aghaji, Ada E; Ezegwui, Ifeoma R; Shiweobi, Jude O; Mamah, Cyril C; Okoloagu, Mary N; Onwasigwe, Ernest N

    2017-12-01

    To determine the prevalence and causes of childhood blindness in an underserved community in south-eastern Nigeria using the key informant method. This was a descriptive cross-sectional study. Key informants (KI) appointed by their respective communities received 1-day training on identification of blind children in their communities. Two weeks later, the research team visited the agreed sites within the community and examined the identified children. The World Health Organization eye examination record for blind children was used for data collection. Data entry and analysis were done with the Statistical Package for Social Sciences (SPSS) version 17.0. Fifteen blind or severely visually impaired children (age range 3 months to 15 years) were identified in this community; nine of these were brought by the KIs. The prevalence of childhood blindness/severe visual impairment (BL/SVI) was 0.12 per 1000 children. By anatomical classification, operable cataract in 6 (40.0%) was the leading cause of BL/SVI in the series; followed by optic nerve lesions (atrophy/hypoplasia) in 3 (20.0%). The etiology of BL/SVI is unknown for the majority of the children (66.7%). It was presumed hereditary in four children (26.7%). Sixty percent of the blindness was judged avoidable. Only three children (20.0%) were enrolled in the Special Education Centre for the Blind. The prevalence of childhood BL/SVI in our study population is low but over half of the blindness is avoidable. There may be a significant backlog of operable childhood cataract in south-eastern Nigeria. The KI method is a practical method for case finding of blind children in rural communities.

  15. Evaluating Pharmacy Student Attitudes Toward the Medium of Comics for Providing Information on Adult Immunizations

    Directory of Open Access Journals (Sweden)

    Jagannath M. Muzumdar

    2015-01-01

    Full Text Available Objectives: This study aimed at designing and assessing educational materials for adult immunizations through the medium of comics. The study design evaluated the effects of two vaccine information flyers (a CDC flyer vs a flyer designed in Comic medium on participants’ attitude towards the flyers. Methods: A between-group, randomized trial was used to compare the effectiveness of two vaccine information flyers on participants’ attitude towards the flyers. Upon approval from the human subjects review committee, student participants (age ≥18 years were randomly assigned either the CDC or comic flyer. They were then asked to respond to survey items developed to measure the flyers’ effect on participants’ attitude towards the flyer. Items were measured using a 7-point semantic differential scale. Cronbach’s alpha was computed for reliability testing of the study instrument. Independent-samples t-test was used to compare means of the two groups with respect to their attitudes toward the flyer. Results: A total of 170 third-year pharmacy students participated in the study (N = 91 for Comic flyer & N = 79 for CDC flyer. There was a significant difference in attitudes toward the flyer between students who read comic flyers (mean = 6.14; SD = 0.62 and those who read CDC flyers (mean = 4.93; SD = 1.20. Additional comments provided by students further confirmed the quantitative findings of the study. Student responses to the use of comics as a medium of providing information on adult immunization were constructive and encouraging. Conclusion: The study findings showed that the flyer with comics was evaluated more attractive than the CDC flyer. The positive findings of our study could provide a new direction for developing educational materials about adult immunizations. Future research on comics, as a medium of communication, could explore its use as a tool for providing healthcare information to consumers.   Type: Original Research

  16. Measuring Sexual Behavior Stigma to Inform Effective HIV Prevention and Treatment Programs for Key Populations

    Science.gov (United States)

    Hargreaves, James R; Sprague, Laurel; Stangl, Anne L; Baral, Stefan D

    2017-01-01

    Background The levels of coverage of human immunodeficiency virus (HIV) treatment and prevention services needed to change the trajectory of the HIV epidemic among key populations, including gay men and other men who have sex with men (MSM) and sex workers, have consistently been shown to be limited by stigma. Objective The aim of this study was to propose an agenda for the goals and approaches of a sexual behavior stigma surveillance effort for key populations, with a focus on collecting surveillance data from 4 groups: (1) members of key population groups themselves (regardless of HIV status), (2) people living with HIV (PLHIV) who are also members of key populations, (3) members of nonkey populations, and (4) health workers. Methods We discuss strengths and weaknesses of measuring multiple different types of stigma including perceived, anticipated, experienced, perpetrated, internalized, and intersecting stigma as measured among key populations themselves, as well as attitudes or beliefs about key populations as measured among other groups. Results With the increasing recognition of the importance of stigma, consistent and validated stigma metrics for key populations are needed to monitor trends and guide immediate action. Evidence-based stigma interventions may ultimately be the key to overcoming the barriers to coverage and retention in life-saving antiretroviral-based HIV prevention and treatment programs for key populations. Conclusions Moving forward necessitates the integration of validated stigma scales in routine HIV surveillance efforts, as well as HIV epidemiologic and intervention studies focused on key populations, as a means of tracking progress toward a more efficient and impactful HIV response. PMID:28446420

  17. On providing the fault-tolerant operation of information systems based on open content management systems

    Science.gov (United States)

    Kratov, Sergey

    2018-01-01

    Modern information systems designed to service a wide range of users, regardless of their subject area, are increasingly based on Web technologies and are available to users via Internet. The article discusses the issues of providing the fault-tolerant operation of such information systems, based on free and open source content management systems. The toolkit available to administrators of similar systems is shown; the scenarios for using these tools are described. Options for organizing backups and restoring the operability of systems after failures are suggested. Application of the proposed methods and approaches allows providing continuous monitoring of the state of systems, timely response to the emergence of possible problems and their prompt solution.

  18. Libraries and key performance indicators a framework for practitioners

    CERN Document Server

    Appleton, Leo

    2017-01-01

    Libraries and Key Performance Indicators: A Framework for Practitioners explores ways by which libraries across all sectors can demonstrate their value and impact to stakeholders through quality assurance and performance measurement platforms, including library assessment, evaluation methodologies, surveys, and annual reporting. Whilst several different performance measurement tools are considered, the book's main focus is on one tool in particular: Key Performance Indicators (KPIs). KPIs are increasingly being used to measure the performance of library and information services, however, linking KPIs to quality outcomes, such as impact and value can prove very difficult. This book discusses, in detail, the concept of KPIs in the broader context of library assessment and performance measurement. Through reviewing some of the applied theory around using KPIs, along with harvesting examples of current best practices in KPI usage from a variety of different libraries, the book demystifies library KPIs, providing ...

  19. E-Mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Science.gov (United States)

    Nazari, Behzad; Ninknejad, Sahar

    2015-01-01

    The present study highly supported the effective role of providing background information via email by the teacher to write e-mail by the students in learners' writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of…

  20. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  1. Opportunities for Enhanced Strategic Use of Surveys, Medical Records, and Program Data for HIV Surveillance of Key Populations: Scoping Review

    Science.gov (United States)

    Baral, Stefan D; Edwards, Jessie K; Zadrozny, Sabrina; Hargreaves, James; Zhao, Jinkou; Sabin, Keith

    2018-01-01

    Background Normative guidelines from the World Health Organization recommend tracking strategic information indicators among key populations. Monitoring progress in the global response to the HIV epidemic uses indicators put forward by the Joint United Nations Programme on HIV/AIDS. These include the 90-90-90 targets that require a realignment of surveillance data, routinely collected program data, and medical record data, which historically have developed separately. Objective The aim of this study was to describe current challenges for monitoring HIV-related strategic information indicators among key populations ((men who have sex with men [MSM], people in prisons and other closed settings, people who inject drugs, sex workers, and transgender people) and identify future opportunities to enhance the use of surveillance data, programmatic data, and medical record data to describe the HIV epidemic among key populations and measure the coverage of HIV prevention, care, and treatment programs. Methods To provide a historical perspective, we completed a scoping review of the expansion of HIV surveillance among key populations over the past three decades. To describe current efforts, we conducted a review of the literature to identify published examples of SI indicator estimates among key populations. To describe anticipated challenges and future opportunities to improve measurement of strategic information indicators, particularly from routine program and health data, we consulted participants of the Third Global HIV Surveillance Meeting in Bangkok, where the 2015 World Health Organization strategic information guidelines were launched. Results There remains suboptimal alignment of surveillance and programmatic data, as well as routinely collected medical records to facilitate the reporting of the 90-90-90 indicators for HIV among key populations. Studies (n=3) with estimates of all three 90-90-90 indicators rely on cross-sectional survey data. Programmatic data and

  2. Exploring methods in information literacy research

    CERN Document Server

    Lipu, Suzanne; Lloyd, Annemaree

    2007-01-01

    This book provides an overview of approaches to assist researchers and practitioners to explore ways of undertaking research in the information literacy field. The first chapter provides an introductory overview of research by Dr Kirsty Williamson (author of Research Methods for Students, Academics and Professionals: Information Management and Systems) and this sets the scene for the rest of the chapters where each author explores the key aspects of a specific method and explains how it may be applied in practice. The methods covered include those representing qualitative, quantitative and mix

  3. Layered stigma among health-care and social service providers toward key affected populations in Jamaica and The Bahamas.

    Science.gov (United States)

    Rogers, S J; Tureski, K; Cushnie, A; Brown, A; Bailey, A; Palmer, Q

    2014-01-01

    While considerable research has documented stigma toward key populations affected by HIV and AIDS - men who have sex with men (MSM), sex workers (SWs) - it provided limited empirical evidence on the presence of layered stigma among health-care professionals providing services for these populations. C-Change conducted a survey among 332 staff of health-care and social service agencies in Jamaica and The Bahamas to understand the levels of stigma toward people living with HIV (PLHIV), including MSM and SWs and factors associated with stigma. While most health-care professionals responding to the survey said that PLHIV, MSM, and SWs deserved quality care, they expressed high levels of blame and negative judgments, especially toward MSM and SWs. Across a stigma assessment involving eight vignette characters, the highest levels of stigma were expressed toward PLHIV who were also MSM or SWs, followed by PLHIV, MSM, and SWs. Differences were assessed by gender, country, type of staff, type of agency, and exposure to relevant training. Findings indicate higher reported stigma among nonclinical vs. clinical staff, staff who worked in general vs. MSM/SW-friendly health facilities, and among untrained vs. training staff. This implies the need for targeted staff capacity strengthening as well as improved facility environments that are MSM/SW-friendly.

  4. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  5. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  6. Organising and presenting information.

    Science.gov (United States)

    Kankanady, Raghavendra; Wells, Marilyn

    2013-01-01

    Information management can be a daunting process for clinicians, health care providers and policy makers within the health care industry. This chapter discusses the importance of information classification and information architecture in the information economy and specific challenges faced within the health care industry. The healthcare sector has industry specific requirements for information management, standards and specifications for information presentation. Classification of information based on information criticality and the value in the health care industry is discussed in this paper. Presentation of information with reference to eHealth standards and specifications for healthcare information systems and their key requirements are also discussed, as are information architecture for eHealth implementation in Australia. This chapter also touches on information management and clinical governance since the importance of information governance is discussed by various researchers and how this is becoming of value to healthcare information management.

  7. Health science library and information services in the hospital.

    Science.gov (United States)

    Wakeley, P J; Marshall, S B; Foster, E C

    1985-01-01

    In an increasingly information-based society, hospitals need a variety of information for multiple purposes--direct patient care, staff development and training, continuing education, patient and community education, and administrative decision support. Health science library and information services play a key role in providing broad-based information support within the hospital. This guide identifies resources that will help administrators plan information services that are appropriate to their needs.

  8. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  9. A Mine of Information: Can Sports Analytics Provide Wisdom From Your Data?

    Science.gov (United States)

    Passfield, Louis; Hopker, James G

    2017-08-01

    This paper explores the notion that the availability and analysis of large data sets have the capacity to improve practice and change the nature of science in the sport and exercise setting. The increasing use of data and information technology in sport is giving rise to this change. Web sites hold large data repositories, and the development of wearable technology, mobile phone applications, and related instruments for monitoring physical activity, training, and competition provide large data sets of extensive and detailed measurements. Innovative approaches conceived to more fully exploit these large data sets could provide a basis for more objective evaluation of coaching strategies and new approaches to how science is conducted. An emerging discipline, sports analytics, could help overcome some of the challenges involved in obtaining knowledge and wisdom from these large data sets. Examples of where large data sets have been analyzed, to evaluate the career development of elite cyclists and to characterize and optimize the training load of well-trained runners, are discussed. Careful verification of large data sets is time consuming and imperative before useful conclusions can be drawn. Consequently, it is recommended that prospective studies be preferred over retrospective analyses of data. It is concluded that rigorous analysis of large data sets could enhance our knowledge in the sport and exercise sciences, inform competitive strategies, and allow innovative new research and findings.

  10. MODEL OF PROVIDING WITH DEVELOPMENT STRATEGY FOR INFORMATION TECHNOLOGIES IN AN ORGANIZATION

    Directory of Open Access Journals (Sweden)

    A. A. Kuzkin

    2015-03-01

    Full Text Available Subject of research. The paper presents research and instructional tools for assessment of providing with the development strategy for information technologies in an organization. Method. The corresponding assessment model is developed which takes into consideration IT-processes equilibrium according to selected efficiency factors of information technologies application. Basic results. The model peculiarity resides in applying neuro-fuzzy approximators where the conclusion is drawn upon fuzzy logic, and membership functions are adjusted through the use of neural networks. For the adequacy testing of the suggested model, due diligence result analysis has been carried out for the IT-strategy executed in the “Navigator” group of companies at the stage of implementation and support of new technologies and production methods. Data visualization with a circle diagram is applied for the comparative evaluation of the analysis results. The chosen model adequacy is proved by the agreement between predictive assessments for IT-strategy performance targets derived by means of the fuzzy cognitive model over 12 months planning horizon and the real values of these targets upon the expiry of the given planning term. Practical significance. The developed model application gives the possibility to solve the problem of sustainability assessment for the process of providing the required IT-strategy realization level based upon the fuzzy cognitive map analysis and to reveal IT-objectives changing tendencies for an organization over the stated planning interval.

  11. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  12. Information governance and security protecting and managing your company's proprietary information

    CERN Document Server

    Iannarelli, John G

    2014-01-01

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Provides a step-by-step outline for developing an information governance policy that is appropriate for your organization Includes real-world examples and cases to help illustrate key ...

  13. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    Science.gov (United States)

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  14. 76 FR 11980 - Stakeholder Input: Listening Session to Provide Information and Solicit Suggestions for...

    Science.gov (United States)

    2011-03-04

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Chapter I [Docket EPA-HQ-OW-2011-0119; FRL-9275-4] Stakeholder Input: Listening Session to Provide Information and Solicit Suggestions for Regulations... stakeholders. DATES: The listening sessions will be held at 210 Holiday Court, Annapolis, Maryland 21401, on...

  15. How doing a dynamical analysis of gait movement may provide information about Autism

    Science.gov (United States)

    Wu, D.; Torres, E.; Nguyen, J.; Mistry, S.; Whyatt, C.; Kalampratsidou, V.; Kolevzon, A.; Jose, J.

    Individuals with Autism Spectrum Disorder (ASD) are known to have deficits in language and social skills. They also have deficits on how they move. Why individuals get ASD? It is not generally known. There is, however, one particular group of children with a SHANK3 gene deficiency (Phelan-McDermid Syndrome (PMDS)) that present symptoms similar to ASD. We have been searching for universal mechanism in ASD going beyond the usual heterogeneous ASD symptoms. We studied motions in gaits for both PMDS patients and idiopathic ASD. We have examined their motions continuously at milliseconds time scale, away from naked eye detection. Gait is a complex process, requiring a complex integration and coordination of different joints' motions. Significant information about the development and/or deficits in the sensory system is hidden in our gaits. We discovered that the speed smoothness in feet motion during gaits is a critical feature that provides a significant distinction between subjects with ASD and typical controls. The differences in appearance of the speed fluctuations suggested a different coordination mechanism in subjects with disorders. Our work provides a very important feature in gait motion that has significant physiological information.

  16. Key ecological responses to nitrogen are altered by climate change

    Science.gov (United States)

    Greaver, T.L.; Clark, C.M.; Compton, J.E.; Vallano, D.; Talhelm, A. F.; Weaver, C.P.; Band, L.E.; Baron, Jill S.; Davidson, E.A.; Tague, C.L.; Felker-Quinn, E.; Lynch, J.A.; Herrick, J.D.; Liu, L.; Goodale, C.L.; Novak, K. J.; Haeuber, R. A.

    2016-01-01

    Climate change and anthropogenic nitrogen deposition are both important ecological threats. Evaluating their cumulative effects provides a more holistic view of ecosystem vulnerability to human activities, which would better inform policy decisions aimed to protect the sustainability of ecosystems. Our knowledge of the cumulative effects of these stressors is growing, but we lack an integrated understanding. In this Review, we describe how climate change alters key processes in terrestrial and freshwater ecosystems related to nitrogen cycling and availability, and the response of ecosystems to nitrogen addition in terms of carbon cycling, acidification and biodiversity.

  17. Provider-to-provider communication in dermatology and implications of missing clinical information in skin biopsy requisition forms: a systematic review.

    Science.gov (United States)

    Comfere, Nneka I; Sokumbi, Olayemi; Montori, Victor M; LeBlanc, Annie; Prokop, Larry J; Murad, M Hassan; Tilburt, Jon C

    2014-05-01

    Various components of the skin biopsy requisition form (SBRF) may contribute to accurate dermatopathologic interpretation. A search of electronic databases, including those of Ovid MEDLINE In-Process & Other Non-Indexed Citations, Ovid MEDLINE, Ovid EMBASE, the Cochrane Database of Systematic Reviews, the Cochrane Central Register of Controlled Trials, and Scopus, was conducted from inception to October 2011. Two authors independently screened all articles for eligibility. Inclusion criteria required material to represent original studies on skin biopsy and pathology requisition forms. Data abstracted from each article that met the inclusion criteria included details of the study characteristics, including the study location, type of pathology practice, specimen type, type of dermatoses, medical specialty of the requesting provider, suggested clinical components, and format of the SBRF. Of 32 titles and abstracts reviewed, seven articles were included. From these, we determined that dermatologists, general practitioners and surgeons completed SBRFs. Commonly included components were patient demographics and requesting clinician characteristics. Clinical information and differential diagnosis were provided in 4% (two of 48 surgeons) to 36% (18 of 50 dermatologists) of requisitions. Most SBRFs did not include information on specimen type, clinical morphology, photographs or clinical history. The limited medical literature demonstrates variation in the content of SBRFs across clinicians and practices, and suggests an important target for improvement in the quality of communication and dermatologic care by requesting clinicians and pathologists. © 2013 The International Society of Dermatology.

  18. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  19. Development and assessment of key skills in undergraduate students: An action-research experience

    Directory of Open Access Journals (Sweden)

    Ana Fernández-Santander

    2012-03-01

    Full Text Available Employers look for professionals able to work in a team, able to approach problems, with the capacity to analyze and resolve problems, under the constant renewal of knowledge and competencies. In this paper, a group of University teachers from different areas of knowledge presents an experience to introduce key employability skills in the higher education students’ curricula. This work has been developed under the action research scope. The first goal was to make an analysis of terms referred to key skills, generating an integrated denomination for each competency. The elaboration of general templates for key skills is proposed here as a useful tool that provides information about development, assessment and marking of each skill. Different types of rubrics and assessment templates, used during this experience, are presented. DOI: 10.18870/hlrc.v2i1.37

  20. Authenticated multi-user quantum key distribution with single particles

    Science.gov (United States)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  1. 42 CFR 433.127 - Termination of FFP for failure to provide access to claims processing and information retrieval...

    Science.gov (United States)

    2010-10-01

    ... claims processing and information retrieval systems. 433.127 Section 433.127 Public Health CENTERS FOR... PROGRAMS STATE FISCAL ADMINISTRATION Mechanized Claims Processing and Information Retrieval Systems § 433.127 Termination of FFP for failure to provide access to claims processing and information retrieval...

  2. System to provide 3D information on geological anomaly zone in deep subsea

    Science.gov (United States)

    Kim, W.; Kwon, O.; Kim, D.

    2017-12-01

    The study on building the ultra long and deep subsea tunnel of which length is 50km and depth is 200m at least, respectively, is underway in Korea. To analyze the geotechnical information required for designing and building subsea tunnel, topographic/geologiccal information analysis using 2D seabed geophysical prospecting and topographic, geologic, exploration and boring data were analyzed comprehensively and as a result, automation method to identify the geological structure zone under seabed which is needed to design the deep and long seabed tunnel was developed using geostatistical analysis. In addition, software using 3D visualized ground information to provide the information includes Gocad, MVS, Vulcan and DIMINE. This study is intended to analyze the geological anomaly zone for ultra deep seabed l and visualize the geological investigation result so as to develop the exclusive system for processing the ground investigation information which is convenient for the users. Particularly it's compatible depending on file of geophysical prospecting result and is realizable in Layer form and for 3D view as well. The data to be processed by 3D seabed information system includes (1) deep seabed topographic information, (2) geological anomaly zone, (3) geophysical prospecting, (4) boring investigation result and (5) 3D visualization of the section on seabed tunnel route. Each data has own characteristics depending on data and interface to allow interlocking with other data is granted. In each detail function, input data is displayed in a single space and each element is selectable to identify the further information as a project. Program creates the project when initially implemented and all output from detail information is stored by project unit. Each element representing detail information is stored in image file and is supported to store in text file as well. It also has the function to transfer, expand/reduce and rotate the model. To represent the all elements in

  3. Quantum information theory mathematical foundation

    CERN Document Server

    Hayashi, Masahito

    2017-01-01

    This graduate textbook provides a unified view of quantum information theory. Clearly explaining the necessary mathematical basis, it merges key topics from both information-theoretic and quantum- mechanical viewpoints and provides lucid explanations of the basic results. Thanks to this unified approach, it makes accessible such advanced topics in quantum communication as quantum teleportation, superdense coding, quantum state transmission (quantum error-correction) and quantum encryption. Since the publication of the preceding book Quantum Information: An Introduction, there have been tremendous strides in the field of quantum information. In particular, the following topics – all of which are addressed here – made seen major advances: quantum state discrimination, quantum channel capacity, bipartite and multipartite entanglement, security analysis on quantum communication, reverse Shannon theorem and uncertainty relation. With regard to the analysis of quantum security, the present book employs an impro...

  4. Practical round-robin differential-phase-shift quantum key distribution

    International Nuclear Information System (INIS)

    Zhang, Zhen; Yuan, Xiao; Cao, Zhu; Ma, Xiongfeng

    2017-01-01

    The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shift QKD protocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice. (paper)

  5. Providing anesthesia in resource-limited settings.

    Science.gov (United States)

    Dohlman, Lena E

    2017-08-01

    The article reviews the reality of anesthetic resource constraints in low and middle-income countries (LMICs). Understanding these limitations is important to volunteers from high-income countries who desire to teach or safely provide anesthesia services in these countries. Recently published information on the state of anesthetic resources in LMICs is helping to guide humanitarian outreach efforts from high-income countries. The importance of using context-appropriate anesthesia standards and equipment is now emphasized. Global health experts are encouraging equal partnerships between anesthesia health care providers working together from different countries. The key roles that ketamine and regional anesthesia play in providing well tolerated anesthesia for cesarean sections and other common procedures is increasingly recognized. Anesthesia can be safely given in LMICs with basic supplies and equipment, if the anesthesia provider is trained and vigilant. Neuraxial and regional anesthesia and the use of ketamine as a general anesthetic appear to be the safest alternatives in low-resource countries. Environmentally appropriate equipment should be encouraged and pulse oximeters should be in every anesthetizing location. LMICs will continue to need support from outside sources until capacity building has made more progress.

  6. Perceptions of Service Providers and Community Members on Intimate Partner Violence within a Latino Community

    Science.gov (United States)

    Lewis, M. Jane; West, Bernadette; Bautista, Leyna; Greenberg, Alexandra M.; Done-Perez, Iris

    2005-01-01

    This study examined perceptions regarding intimate partner abuse (IPV) in a largely Latino community in New Jersey through focus groups with Latino community members and key informant interviews with providers of services to this population. Questions examined definitions of partner abuse; perceptions of factors contributing to, or protecting…

  7. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  8. Bridging information requirements and information needs assessment: do scenarios and vignettes provide a link?

    Directory of Open Access Journals (Sweden)

    Christine Urquhart

    2001-01-01

    Full Text Available The aim of the paper is to compare the philosophies of the vignette and critical incident techniques in information behaviour research, with the methodologies used in object oriented analysis such as use case scenarios and CRC (class, responsibility, collaboration cards. The principles of object oriented analysis are outlined, noting the emphasis on obtaining the "storyline" or "scripts" for information requirements analysis through use cases and CRC cards.  The critical incident technique and vignettes are used to obtain valid interpretations of users" information behaviour, using a storyline approach for data collection (and analysis which is similar to that of object oriented analysis. Some examples illustrate how techniques developed in object oriented analysis could be used for data display in information behaviour studies. Concludes that the methods developed by software engineering could be adapted usefully for information behaviour research.

  9. Model of key success factors for Business Intelligence implementation

    Directory of Open Access Journals (Sweden)

    Peter Mesaros

    2016-07-01

    Full Text Available New progressive technologies recorded growth in every area. Information-communication technologies facilitate the exchange of information and it facilitates management of everyday activities in enterprises. Specific modules (such as Business Intelligence facilitate decision-making. Several studies have demonstrated the positive impact of Business Intelligence to decision-making. The first step is to put in place the enterprise. The implementation process is influenced by many factors. This article discusses the issue of key success factors affecting to successful implementation of Business Intelligence. The article describes the key success factors for successful implementation and use of Business Intelligence based on multiple studies. The main objective of this study is to verify the effects and dependence of selected factors and proposes a model of key success factors for successful implementation of Business Intelligence. Key success factors and the proposed model are studied in Slovak enterprises.

  10. [Application of laboratory information system in the management of the key indicators of quality inspection].

    Science.gov (United States)

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective and effective method to manage KIQI with the powerful management mode of database and information process capability on LIS.

  11. Governance and Public Sector Transformation in South Africa: Reporting and Providing Assurance on Service Delivery Information

    Directory of Open Access Journals (Sweden)

    Mariaan Roos

    2012-12-01

    Full Text Available Reporting on performance was legislatively established in South Africa in terms of the Public Finance Management Act, Act 1 of 1999, section 40 (3(a. The auditing of the reported information was legislated in the Public Audit Act, Act 25 of 2004, section 20(2 (c. The objectives of the article are firstly to provide an overview of the development and application of the reporting and secondly providing assurance on service delivery information and thirdly to reflect on challenges to the implementation thereof in South Africa. The aim through deploying these set objectives is to formulate possible future considerations for improved governance. As central part of the methodology, review of literature on reporting and audit of non-financialwas conducted. The research included scrutiny of the different philosophies and approaches adopted by different countries to the reporting and providing assurance on service delivery information. In this respect, the research reflects a comparative element. In South Africa the Auditor-General adopted a phasing-in approach. The development of the audit approach and audit procedures has reached a stable stage, nine years after the initial process started. The audit of performance information now forms an integral part of the regularity audit process. The analysis of audit findings of the period under study indicates a considerable improvement once initiated, but stagnation persists in subsequent years. Numerous challenges remain around the application of performance reporting in South Africa including non-compliance, the lack of sufficient and appropriate audit evidence, inconsistencies between the various strategic documents and the need to improve the usefulness of performance information. In conclusion the article proposes some steps to address the challenges.

  12. Information Literacy and Web 2.0: Is It Just Hype?

    Science.gov (United States)

    Godwin, Peter

    2009-01-01

    Purpose: The purpose of this paper is to demonstrate that Web 2.0 provides an exciting set of tools for librarians to help their students become more information-literate. Design/methodology/approach: Recently, information overload and Web 2.0 have led librarians to adopt practices labelled as Library 2.0. Information literacy can be the key to…

  13. The effect of providing nutritional information about fast-food restaurant menus on parents' meal choices for their children

    Science.gov (United States)

    Ahn, Jae-Young; Park, Hae-Ryun; Lee, Kiwon; Kwon, Sooyoun; Kim, Soyeong; Yang, Jihye; Song, Kyung-Hee

    2015-01-01

    BACKGROUND/OBJECTIVES To encourage healthier food choices for children in fast-food restaurants, many initiatives have been proposed. This study aimed to examine the effect of disclosing nutritional information on parents' meal choices for their children at fast-food restaurants in South Korea. SUBJECTS/METHODS An online experimental survey using a menu board was conducted with 242 parents of children aged 2-12 years who dined with them at fast-food restaurants at least once a month. Participants were classified into two groups: the low-calorie group (n = 41) who chose at least one of the lowest calorie meals in each menu category, and the high-calorie group (n = 201) who did not. The attributes including perceived empowerment, use of provided nutritional information, and perceived difficulties were compared between the two groups. RESULTS The low-calorie group perceived significantly higher empowerment with the nutritional information provided than did the high-calorie group (P = 0.020). Additionally, the low-calorie group was more interested in nutrition labeling (P nutritional value of menus when selecting restaurants for their children more than did the high-calorie group (P = 0.017). The low-calorie group used the nutritional information provided when choosing meals for their children significantly more than did the high-calorie group (P nutritional information provided (P = 0.012). CONCLUSIONS The results suggest that improving the empowerment of parents using nutritional information could be a strategy for promoting healthier parental food choices for their children at fast-food restaurants. PMID:26634057

  14. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  15. Australians with osteoarthritis: satisfaction with health care providers and the perceived helpfulness of treatments and information sources

    Directory of Open Access Journals (Sweden)

    Basedow M

    2016-08-01

    Full Text Available Martin Basedow,1 Peter Hibbert,1 Tamara Hooper,1 William Runciman,1 Adrian Esterman,2 1School of Psychology, Social Work and Social Policy, 2School of Nursing and Midwifery, University of South Australia, Adelaide, SA, Australia Objective: The aim of this study was to evaluate the satisfaction of Australian patients who suffer from osteoarthritis (OA with their health care providers and the perceived helpfulness of treatments and information sources. Methods: A self-administered questionnaire was conducted with a sample of 560 Australian patients who suffer from OA with questions about satisfaction with health care providers and the helpfulness of different treatment options and information sources. Logistic regression models were used to assess potential predictors of satisfaction. Thematic analysis was undertaken for attitudinal factors associated with satisfaction. Results: A total of 435 participants returned questionnaires (response rate 78%. Most respondents were highly satisfied with the care provided by their general practitioner (GP (84%, communication with their GP (88%, time spent with their GP (84%, and their ability to talk freely with their GP about their medical problem (93%, but less satisfied with their ability to talk freely about associated emotional problems (77%. Satisfaction with pharmacists (80%, rheumatologists (76%, and orthopedic surgeons (72% was high. Joint replacement surgery (91%, prescription anti-inflammatory medications (66%, aids and assistive devices (65%, intra-articular injections (63%, and prescription painkiller medications (62% were perceived as effective treatments. Less highly rated treatments were exercise (48%, physiotherapy (43%, and complementary medicines (29%. A majority of patients were satisfied with the information to manage their OA (65%. From the multivariable logistic regression analysis, four GP satisfaction factors were found to be predictors of overall satisfaction with GP care: the amount

  16. 76 FR 78935 - Agency Information Collection Activities: Proposed Collection; Comment Request; Inspection of...

    Science.gov (United States)

    2011-12-20

    ...; OMB No. 1660-0045] Agency Information Collection Activities: Proposed Collection; Comment Request... following any hurricane that may hit the Florida Keys, concerning compliance of insured buildings with the... , and will include any personal information you provide. Therefore, all information submitted will be...

  17. Phase II Practice-based Evidence in Nutrition (PEN) evaluation: interviews with key informants.

    Science.gov (United States)

    Bowden, Fran Martin; Lordly, Daphne; Thirsk, Jayne; Corby, Lynda

    2012-01-01

    Dietitians of Canada has collaborated with experts in knowledge translation and transfer, technology, and dietetic practice to develop and implement an innovative online decision-support system called Practice-based Evidence in Nutrition (PEN). A study was conducted to evaluate the perceived facilitators and barriers that enable dietitians to use or prevent them from using PEN. As part of the overall evaluation framework of PEN, a qualitative descriptive research design was used to address the research purpose. Individual, semi-structured telephone interviews with 17 key informants were completed, and the interview transcripts underwent qualitative content analysis. Respondents identified several facilitators of and barriers to PEN use. Facilitators included specificity to dietetics, rigorous/expert review, easy accessibility, current content, credible/secure material, well-organized/easy-to-use material, material that is valuable to practice, and good value for money. Barriers included perceived high cost, fee structuring/cost to students, certain organizational aspects, and a perceived lack of training for pathway contributors. This formative evaluation has indicated areas in which PEN could be improved and strategies to make PEN the standard for dietetic education and practice. Ensuring that PEN is meeting users' knowledge needs is of the utmost importance if dietitians are to remain on the cutting edge of scientific inquiry.

  18. The Evaluation of Vehicle Mass Reduction and Material Choice in Life Cycle Assessments: Key Factors and Dynamic Industries

    Science.gov (United States)

    Developments in the realm of lightweight materials for automotive use continue to be announced by the industry and by academia. This session will provide new and updated information on new generation of materials. Additionally, this session will focus on the key topics involved i...

  19. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  20. A case study detailing key considerations for implementing a telehealth approach to office ergonomics.

    Science.gov (United States)

    Ritchie, Catherine L W; Miller, Linda L; Antle, David M

    2017-01-01

    Telehealth approaches to delivering ergonomics assessment hold great potential to improve service delivery in rural and remote settings. This case study describes a telehealth-based ergonomics service delivery process, and compares in-person and telehealth-based ergonomics approaches at an Alberta-based non-profit advocacy group. This project demonstrates that telehealth approaches to ergonomics do not lead to significantly different scoring outcomes for assessment of ergonomics issues, when compared to in-person assessments. This project also outlines the importance of live real-time video conferencing to improving communication, attaining key assessment information, and demonstrating ergonomic adjustments. However, some key considerations of bandwidth and hardware capabilities need to be taken into account. Key communication strategies are outlined to improve rapport, maintain employee confidentiality, and reduce client anxiety around telehealth ergonomics assessments. This project provides further support for telehealth approaches to office ergonomics, and outlines some key implementation strategies and barriers that should be considered.

  1. Providing Market Information for Ethiopian Farmers: Extending Participatory Design

    DEFF Research Database (Denmark)

    Zewge, Amanuel; Dittrich, Yvonne; Bekele, Rahel

    In a developing country like Ethiopia, marketing of agricultural products is influenced by local, socioeconomic, cultural and IT infrastructure characteristics. ICT-based agriculture information systems have been proposed to support farmers with market information. However, such initiatives have...

  2. Consumer health information seeking as hypothesis testing.

    Science.gov (United States)

    Keselman, Alla; Browne, Allen C; Kaufman, David R

    2008-01-01

    Despite the proliferation of consumer health sites, lay individuals often experience difficulty finding health information online. The present study attempts to understand users' information seeking difficulties by drawing on a hypothesis testing explanatory framework. It also addresses the role of user competencies and their interaction with internet resources. Twenty participants were interviewed about their understanding of a hypothetical scenario about a family member suffering from stable angina and then searched MedlinePlus consumer health information portal for information on the problem presented in the scenario. Participants' understanding of heart disease was analyzed via semantic analysis. Thematic coding was used to describe information seeking trajectories in terms of three key strategies: verification of the primary hypothesis, narrowing search within the general hypothesis area and bottom-up search. Compared to an expert model, participants' understanding of heart disease involved different key concepts, which were also differently grouped and defined. This understanding provided the framework for search-guiding hypotheses and results interpretation. Incorrect or imprecise domain knowledge led individuals to search for information on irrelevant sites, often seeking out data to confirm their incorrect initial hypotheses. Online search skills enhanced search efficiency, but did not eliminate these difficulties. Regardless of their web experience and general search skills, lay individuals may experience difficulty with health information searches. These difficulties may be related to formulating and evaluating hypotheses that are rooted in their domain knowledge. Informatics can provide support at the levels of health information portals, individual websites, and consumer education tools.

  3. Providing patient information and education in practice: the role of the health librarian.

    Science.gov (United States)

    Truccolo, Ivana

    2016-06-01

    In this article, guest writer Ivana Truccolo presents an overview of her work at the Scientific and Patient Library of a Cancer Comprehensive Centre in Italy coordinating the patient education process. She discusses the historical evolution of the concept of patient education and how this has run alongside the role of the health librarian in the provision of consumer health information. Details are provided about various patient education programmes in place at the Centre. In particular, various activities are discussed including patient education classes, the development of patient education handouts and a narrative medicine programme which includes a literary competition. The article concludes with a specific outline of the role the health librarian can play in the provision of consumer health information and patient education. H.S. © 2016 Health Libraries Group.

  4. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  5. The informative providing of trade education is in industry of physical culture and sport of countries of former soviet spaces

    Directory of Open Access Journals (Sweden)

    Iryna Svistel’nik

    2016-04-01

    Full Text Available Purpose: to investigate the innovative forms of the informative providing of educational process in institutions of higher learning of physical culture and sport of countries: Ukraine, Republic of Belarus, Republic of Moldova, Republic of Kazakhstan, Republic of Uzbekistan, Russian Federation. Material & Methods: content-analysis of web sites and web pages of sporting institutions of higher learning of these countries. Results: the informative providing of institutions of higher learning of physical culture and sport of Ukraine, Belarus, Moldova, Kazakhstan, Uzbekistan and RF differs substantially, in spite of the fact that the specific of educating in these educational establishments is identical. Institutions of higher learning of physical culture and sport of Ukraine actively offer the innovative forms of the informative providing − give possibility to the students and teachers to take advantage of e-catalog, electronic repository, virtual bibliographic certificate, electronic delivery of document. Sporting institutions of higher learning of Belarus, Kazakhstan, Uzbekistan and Russian Federation carry out the informative providing by means of the electronic-library systems, in particular "Znanium.com" and "Rukont". The system "Rukont" is erected in the grade of the national inter-branch digital resource created on the base of state educational standard and contains the informative resource of different family: books, magazines, separate articles, and also audio, video data, multimedia. Collection of electronic versions of editions of electronic-library systems "Znanium.com" unites books, magazines, articles grouped on thematic and having a special purpose signs. The unique institute of higher of Republic of Moldova does not give electronic informative services, but uses the traditional forms of the informative providing by means of catalogues and card library indexes. Conclusions: higher educational establishments of physical culture and

  6. Criteria for the evaluation of a cloud-based hospital information system outsourcing provider.

    Science.gov (United States)

    Low, Chinyao; Hsueh Chen, Ya

    2012-12-01

    As cloud computing technology has proliferated rapidly worldwide, there has been a trend toward adopting cloud-based hospital information systems (CHISs). This study examines the critical criteria for selecting the CHISs outsourcing provider. The fuzzy Delphi method (FDM) is used to evaluate the primary indicator collected from 188 useable responses at a working hospital in Taiwan. Moreover, the fuzzy analytic hierarchy process (FAHP) is employed to calculate the weights of these criteria and establish a fuzzy multi-criteria model of CHISs outsourcing provider selection from 42 experts. The results indicate that the five most critical criteria related to CHISs outsourcing provider selection are (1) system function, (2) service quality, (3) integration, (4) professionalism, and (5) economics. This study may contribute to understanding how cloud-based hospital systems can reinforce content design and offer a way to compete in the field by developing more appropriate systems.

  7. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  8. Informing parliamentarians on nuclear energy

    International Nuclear Information System (INIS)

    1995-01-01

    This publication contains a selection of the papers presented at an international seminar on informing parliamentarians in the nuclear field. This seminar has been organized by the OECD Nuclear Energy Agency to respond to important information needs. As a matter of fact, providing clear and accurate information to decision-makers is a key element that contributes to the quality of work for legislation for a safe use of nuclear energy. The sessions dealt with : meeting the information needs of parliamentarians and other elected representatives on nuclear energy questions, actors and their respective roles in the information process, means and tools for communicating information on nuclear energy, case studies in communication with elected officials. Abstracts have been prepared for all of the papers in this volume. (TEC)

  9. Funding ATLAS 2012 key indicators for publicly funded research in Germany

    CERN Document Server

    Deutsche Forschungsgemeinschaft (DFG)

    2013-01-01

    The Funding ATLAS is a reporting system (previously referred to as the Funding Ranking) employed by the German Research Foundation (DFG) to provide information in the form of indicators of key developments in publicly funded research in Germany every three years. This English version of the Funding ATLAS 2012 presents selected findings from the more comprehensive German edition. At the core of the report are indicators that provide information on which subject areas have received funding at higher education and other research institutions in the period 2008-2010. This report also includes, as a supplement not found in the German edition, the decisions on the Excellence Initiative, which were taken shortly after the German edition of the Funding ATLAS 2012 was published. The report also addresses the subject of internationality by presenting selected indicators that show how attractive Germany's research institutions are for visiting scientists. In summary, the DFG Funding ATLAS furnishes reliable indicators o...

  10. Quantum-locked key distribution at nearly the classical capacity rate.

    Science.gov (United States)

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  11. What Is the Role of Informal Healthcare Providers in Developing Countries? A Systematic Review

    Science.gov (United States)

    Sudhinaraset, May; Ingram, Matthew; Lofthouse, Heather Kinlaw; Montagu, Dominic

    2013-01-01

    Informal health care providers (IPs) comprise a significant component of health systems in developing nations. Yet little is known about the most basic characteristics of performance, cost, quality, utilization, and size of this sector. To address this gap we conducted a comprehensive literature review on the informal health care sector in developing countries. We searched for studies published since 2000 through electronic databases PubMed, Google Scholar, and relevant grey literature from The New York Academy of Medicine, The World Bank, The Center for Global Development, USAID, SHOPS (formerly PSP-One), The World Health Organization, DFID, Human Resources for Health Global Resource Center. In total, 334 articles were retrieved, and 122 met inclusion criteria and chosen for data abstraction. Results indicate that IPs make up a significant portion of the healthcare sector globally, with almost half of studies (48%) from Sub-Saharan Africa. Utilization estimates from 24 studies in the literature of IP for healthcare services ranged from 9% to 90% of all healthcare interactions, depending on the country, the disease in question, and methods of measurement. IPs operate in a variety of health areas, although baseline information on quality is notably incomplete and poor quality of care is generally assumed. There was a wide variation in how quality of care is measured. The review found that IPs reported inadequate drug provision, poor adherence to clinical national guidelines, and that there were gaps in knowledge and provider practice; however, studies also found that the formal sector also reported poor provider practices. Reasons for using IPs included convenience, affordability, and social and cultural effects. Recommendations from the literature amount to a call for more engagement with the IP sector. IPs are a large component of nearly all developing country health systems. Research and policies of engagement are needed. PMID:23405101

  12. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  13. Use of information and communication technology to provide health information: what do older migrants know, and what do they need to know?

    Science.gov (United States)

    Goodall, Ken; Ward, Paul; Newman, Lareen

    2010-01-01

    print media from Australia and their home countries, family and acquaintances, government departments or service providers. Many expressed a preference for receiving information as printed material or directly from another person. Governments or primary healthcare organisations planning to make health information solely available via ICT should be aware that doing so may lead to an increase in 'information exclusion' and the formation of functional knowledge deficits for older migrants. At the moment at least, our participants do not perceive any functional knowledge deficits as they engage multiple sources to access the information they need for everyday life. We recommend that governments and healthcare organisations evaluate the appropriateness of using ICT to directly provide information to older migrants and consider non-digital means or the engagement of 'information brokers' when communicating with groups identified as low or non-users of ICT.

  14. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  15. Regional Longitudinal Myocardial Deformation Provides Incremental Prognostic Information in Patients with ST-Segment Elevation Myocardial Infarction

    DEFF Research Database (Denmark)

    Biering-Sorensen, Tor; Jensen, Jan Skov; Pedersen, Sune H

    2016-01-01

    deformation in comparison to GLS, conventional echocardiography and clinical information. Method In total 391 patients were admitted with ST-Segment elevation myocardial infarction (STEMI), treated with primary percutaneous coronary intervention and subsequently examined by echocardiography. All patients were...... information to clinical and conventional echocardiographic information (Harrell's c-statistics: 0.63 vs. 0.67, p = 0.032). In addition, impaired longitudinal deformation outside the culprit lesion perfusion region was significantly associated with an adverse outcome (p...). Conclusion Regional longitudinal myocardial deformation measures, regardless if determined by TDI or 2DSE, are superior prognosticators to GLS. In addition, impaired longitudinal deformation in the inferior myocardial segment provides prognostic information over and above clinical and conventional...

  16. Providing Feedback, Orientation and Opportunities for Reflection as Key Elements for Successful Mentoring Programs: Reviewing a Program for Future Business Education Teachers

    Directory of Open Access Journals (Sweden)

    Elisabeth Riebenbauer

    2017-12-01

    Full Text Available The introduction to teaching is critical for novice teachers. Near the end of their master’s program, students of Business Education and Development in Austria spend one semester at an assigned school. They are introduced to teaching, while being assisted by peer students, mentoring teachers, and a companion course. Mentors receive special training and preparation in advance, thus contributing to a high quality mentoring program. The program is organized threefold: (1 providing feedback, (2 opportunities for reflection and (3 career orientation. The purpose of this paper is to assess key elements of successful mentoring programs and to question which competences of mentors contribute most to the success of those programs. Between 2012 and 2015, 188 persons (student teachers and their mentors responded to an online survey at the end of their mentoring program. Additionally, data from a study (1,245 questionnaires regarding the student teachers’ perception of their own competence was utilized, allowing for a comparison of student teacher confidence in their abilities before and after the mentoring program. The present results provide insight into the key elements of successful mentoring programs; both from a student teacher’s and mentor’s perspective. During the semester, students showed an increase regarding their self-perception of their professional competences. It was found that students and mentoring teachers valued feedback after each lesson more than feedback in regular meetings. Opportunities for reflection (e.g. exchange with peer students, learning diaries were considered helpful. The mentoring program helped students to decide whether to become a teacher or not.

  17. Architecture of a Framework for Providing Information Services for Public Transport

    Directory of Open Access Journals (Sweden)

    Gabino Padrón

    2012-04-01

    Full Text Available This paper presents OnRoute, a framework for developing and running ubiquitous software that provides information services to passengers of public transportation, including payment systems and on-route guidance services. To achieve a high level of interoperability, accessibility and context awareness, OnRoute uses the ubiquitous computing paradigm. To guarantee the quality of the software produced, the reliable software principles used in critical contexts, such as automotive systems, are also considered by the framework. The main components of its architecture (run-time, system services, software components and development discipline and how they are deployed in the transportation network (stations and vehicles are described in this paper. Finally, to illustrate the use of OnRoute, the development of a guidance service for travellers is explained.

  18. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  19. Human factors information system

    International Nuclear Information System (INIS)

    Goodman, P.C.; DiPalo, C.A.

    1991-01-01

    Nuclear power plant safety is dependent upon human performance related to plant operations. To provide improvements in human performance, data collection and assessment play key roles. This paper reports on the Human factors Information System (HFIS) which is designed to meet the needs of the human factors specialists of the United States Nuclear Regulatory Commission. These specialists identify personnel errors and provide guidance designed to prevent such errors. HFIS is a simple and modular system designed for use on a personal computer. It is designed to contain four separate modules that provide information indicative of program or function effectiveness as well as safety-related human performance based on programmatic and performance data. These modules include the Human Factors Status module; the Regulatory Programs module; the Licensee Event Report module; and the Operator Requalification Performance module. Information form these modules can either be used separately or can be combined due to the integrated nature of the system. HFIS has the capability, therefore, to provide insights into those areas of human factors that can reduce the probability of events caused by personnel error at nuclear power plants and promote the health and safety of the public. This information system concept can be applied to other industries as well as the nuclear industry

  20. The Effect of Health Information Technology on Health Care Provider Communication: A Mixed-Method Protocol.

    Science.gov (United States)

    Manojlovich, Milisa; Adler-Milstein, Julia; Harrod, Molly; Sales, Anne; Hofer, Timothy P; Saint, Sanjay; Krein, Sarah L

    2015-06-11

    Communication failures between physicians and nurses are one of the most common causes of adverse events for hospitalized patients, as well as a major root cause of all sentinel events. Communication technology (ie, the electronic medical record, computerized provider order entry, email, and pagers), which is a component of health information technology (HIT), may help reduce some communication failures but increase others because of an inadequate understanding of how communication technology is used. Increasing use of health information and communication technologies is likely to affect communication between nurses and physicians. The purpose of this study is to describe, in detail, how health information and communication technologies facilitate or hinder communication between nurses and physicians with the ultimate goal of identifying how we can optimize the use of these technologies to support effective communication. Effective communication is the process of developing shared understanding between communicators by establishing, testing, and maintaining relationships. Our theoretical model, based in communication and sociology theories, describes how health information and communication technologies affect communication through communication practices (ie, use of rich media; the location and availability of computers) and work relationships (ie, hierarchies and team stability). Therefore we seek to (1) identify the range of health information and communication technologies used in a national sample of medical-surgical acute care units, (2) describe communication practices and work relationships that may be influenced by health information and communication technologies in these same settings, and (3) explore how differences in health information and communication technologies, communication practices, and work relationships between physicians and nurses influence communication. This 4-year study uses a sequential mixed-methods design, beginning with a

  1. Consumer Behavior Under Conflicting Information Provided by Interested Parties: Implications for Equilibrium in the Market for Credence Goods.

    Science.gov (United States)

    Russo, Carlo; Tufi, Eleonora

    2016-01-01

    Incomplete information in food consumption is a relevant topic in agricultural economics. This paper proposes a theoretical model describing consumer behavior, market equilibrium and public intervention in an industry where consumers must rely on the information of interested parties such as producers or associations. We provide simple game theory model showing the link between price competition and the strategic use of information. If information are unverifiable (as in the case of credence attributes) firms may have no incentive to advertise true claims and consumer decisions may be biased. Our model incorporates the opportunistic behavior of self-interested information providers. The result is a model of competition in prices and information finding a potential for market failure and public intervention. In the paper we discuss the efficiency of three possible regulations: banning false claims, subsidizing advertising campaigns, and public statement if favor of true claims. In that context, some recent patents related to both the regulatory compliance in communication and to the reduction of asymmetric information between producers and consumers have been considered. Finally, we found that the efficiency of these policy tools is affected by the reputation of trustworthiness of the firms.

  2. Information needs of patients with whiplash associated disorders: A Delphi study of patient beliefs.

    Science.gov (United States)

    Sterling, Joanna; Maujean, Annick; Sterling, Michele

    2018-02-01

    Whiplash associated disorders (WAD) result in significant personal and economic costs. Patient education and reassurance are recommended treatments for acute WAD but the information needs of patients have not been investigated. To determine what information whiplash-injured patients believe is important to help recovery in the acute stage of injury. A Delphi design survey series with three rounds. Thirty-three participants who had sustained a whiplash injury within the last three years were invited to participate. Participants were asked to provide five statements, in response to an open-ended question, regarding what they believed was the most important information to provide to patients following a whiplash injury. Nineteen patients responded and 85 statements were collected and reviewed independently by two of the authors to remove duplicates. The importance of the remaining items was rated by the participants in the second survey round. Items rated by >50% of participants as important were included in the third survey round. To be deemed key information, >80% of participants had to rate an item as important in this final round. Eighteen items met the criteria for key information. These points addressed four areas: assessment and treatment, recovery and symptoms, patient attitudes during treatment and relationships with health practitioners. The key information points endorsed by patients in this study may provide useful information to constitute a basis for reassurance and education provided to patients with WAD. The results also suggest that improved relationships between patients with whiplash and health practitioners is required. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Application of Activity-Based Costing Management System by Key Success Paths to Promote the Competitive Advantages and Operation Performance

    OpenAIRE

    Mei-Fang Wu; Shu-Li Wang; Feng-Tsung Cheng

    2015-01-01

    Highly developed technology and highly competitive global market highlight the important role of competitive advantages and operation performances in sustainable company operation. Activity-Based Costing (ABC) provides accurate operation cost and operation performance information. Rich literatures provide relevant research with cases study on Activity-Based Costing application, but the research on cause relationship between key success factors and its specific outcome, su...

  4. In-depth research of domestic nuclear patent information

    International Nuclear Information System (INIS)

    Mo Dan; Gao Anna; Li Dongbin; Lu Yanjia; Ren Chao

    2014-01-01

    Based on the domestic patent information, combined with examples, this article makes an in-depth discussion on the domestic nuclear patent information. The author puts forward for the patent information research, the appropriate retrieval of patent documents is the basis,and the correct quantitative statistical analysis of patent documents is the key, and in-depth qualitative analysis of patent documents is the core. It is expected to provide information support and guarantee for the technical innovation and scientific research personnel in the nuclear field through in-depth study of domestic nuclear information. (authors)

  5. Marketing for Special Libraries and Information Centers: The Positioning Process.

    Science.gov (United States)

    Sterngold, Arthur

    1982-01-01

    The positioning process of marketing used by special libraries and information centers involves two key decisions from which other decisions are derived: to which user groups marketing programs and services will be directed; and which information needs will be served. Two cases are discussed and a bibliography is provided. (EJS)

  6. Great Basin land managers provide detailed feedback about usefulness of two climate information web applications

    Directory of Open Access Journals (Sweden)

    Chad Zanocco

    Full Text Available Land managers in the Great Basin are working to maintain or restore sagebrush ecosystems as climate change exacerbates existing threats. Web applications delivering climate change and climate impacts information have the potential to assist their efforts. Although many web applications containing climate information currently exist, few have been co-produced with land managers or have incorporated information specifically focused on land managers’ needs. Through surveys and interviews, we gathered detailed feedback from federal, state, and tribal sagebrush land managers in the Great Basin on climate information web applications targeting land management. We found that a managers are searching for weather and climate information they can incorporate into their current management strategies and plans; b they are willing to be educated on how to find and understand climate related web applications; c both field and administrative-type managers want data for timescales ranging from seasonal to decadal; d managers want multiple levels of climate information, from simple summaries, to detailed descriptions accessible through the application; and e managers are interested in applications that evaluate uncertainty and provide projected climate impacts. Keywords: Great Basin, Sagebrush, Land management, Climate change, Web application, Co-production

  7. Developing geographic information infrastructure : The role of information policies

    NARCIS (Netherlands)

    Van Loenen, B.

    2006-01-01

    Within information societies, information availability is a key issue affecting societyâs well being. The infrastructure underlying the foundation of the information society may be referred to as the information infrastructure. A geographic information infrastructure (GII) supports the information

  8. Small stones sets Web site apart. Froedtert Hospital updates provide valuable healthcare information.

    Science.gov (United States)

    Rees, Tom

    2002-01-01

    Froedtert & Medical College, an academic medical center, has adopted a proactive approach to providing consumers with reliable sources of information. The Milwaukee institution has redesigned its Web site, which first opened in 1995. The new version has simplified the navigation process and added new content. Small Stones, a health resource center, also a brick-and-mortar shop, went online Feb. 1. Online bill paying was launched in May. Pharmacy refill functions are expected to be online this summer.

  9. Social support in the practices of informal providers: The case of patent and proprietary medicine vendors in Nigeria.

    Science.gov (United States)

    Sieverding, Maia; Liu, Jenny; Beyeler, Naomi

    2015-10-01

    The social and institutional environments in which informal healthcare providers operate shape their health and business practices, particularly in contexts where regulatory enforcement is weak. In this study, we adopt a social capital perspective to understanding the social networks on which proprietary and patent medicine vendors (PPMVs) in Nigeria rely for support in the operation of their shops. Data are drawn from 70 in-depth interviews with PPMVs in three states, including interviews with local leaders of the PPMV professional association. We find that PPMVs primarily relied on more senior colleagues and formal healthcare professionals for informational support, including information about new medicines and advice on how to treat specific cases of illness. For instrumental support, including finance, start-up assistance, and intervention with regulatory agencies, PPMVs relied on extended family, the PPMVs with whom they apprenticed, and the leaders of their professional association. PPMVs' networks also provided continual reinforcement of what constitutes good PPMV practice through admonishments to follow scope of practice limitations. These informal reminders, as well as monitoring activities conducted by the professional association, served to reinforce PPMVs' concern with avoiding negative customer health outcomes, which were perceived to be detrimental to their business reputations. That PPMVs' networks both encouraged practices to reduce the likelihood of poor health outcomes, and provided advice regarding customers' health conditions, highlights the potential impact of informal providers' access to different forms of social capital on their delivery of health services, as well as their success as microenterprises. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  11. Mapping a Research Agenda for Home Care Safety: Perspectives from Researchers, Providers, and Decision Makers

    Science.gov (United States)

    Macdonald, Marilyn; Lang, Ariella; MacDonald, Jo-Anne

    2011-01-01

    The purpose of this qualitative interpretive design was to explore the perspectives of researchers, health care providers, policy makers, and decision makers on key risks, concerns, and emerging issues related to home care safety that would inform a line of research inquiry. Defining safety specifically in this home care context has yet to be…

  12. Informing the educators: one of the keys to public acceptance

    International Nuclear Information System (INIS)

    Mattox, G.C.; Reynolds, A.B.; Brenizer, J.S.

    1986-01-01

    One of the most difficult barriers to overcome in the task of gaining greater public acceptance of nuclear power is the widespread lack of correct information about the true risks and benefits of nuclear energy. The news media are the most prevalent sources of information for the public but they are highly constrained by the limits of space, time, and reader/viewer interest span in being able to cover this complex subject with any degree of completeness, much less with any degree of accuracy. Another source of information for the general public is the educational system, and while it also has its limitations, they are somewhat different from those faced by the media, and the educational system is generally considered to be a more credible information source than the media. This paper report on three programs undertaken in 1985 and 1986 by the Virginia Section of the American Nuclear Society (ANS) in conjunction with the University of Virginia (UVA), the Virginia State Department of Education, and various nuclear industry participants. Each program had its unique features, successes, an failures. All-in-all, these programs have been reported as being quite successful in helping to reach the public through informing the educators

  13. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  14. Children admitted to hospital following unintentional injury: perspectives of health service providers in Aotearoa/New Zealand

    Science.gov (United States)

    2010-01-01

    Background Unintentional injuries are the leading cause of death and hospitalisation among New Zealand children, with indigenous Māori and ethnic minority Pacific children significantly over represented in these statistics. International research has shown that many children hospitalised for injury, as well as their families experience high levels of stress, and ethnic disparities in the quality of trauma care are not uncommon. The research on which this paper is based sought to identify key issues and concerns for New Zealand's multi-ethnic community following hospitalisation for childhood injury in order to inform efforts to improve the quality of trauma services. This paper reports on service providers' perspectives complementing previously published research on the experiences of families of injured children. Methods A qualitative research design involving eleven in-depth individual interviews and three focus groups was used to elicit the views of 21 purposefully selected service provider key informants from a range of professional backgrounds involved in the care and support of injured children and their families in Auckland, New Zealand. Interviews were transcribed and data were analysed using thematic analysis. Results Key issues identified by service providers included limited ability to meet the needs of children with mild injuries, particularly their emotional needs; lack of psychological support for families; some issues related to Māori and Pacific family support services; lack of accessible and comprehensive information for children and families; poor staff continuity and coordination; and poor coordination of hospital and community services, including inadequacies in follow-up plans. There was considerable agreement between these issues and those identified by the participant families. Conclusions The identified issues and barriers indicate the need for interventions for service improvement at systemic, provider and patient levels. Of particular

  15. Children admitted to hospital following unintentional injury: perspectives of health service providers in Aotearoa/New Zealand

    Directory of Open Access Journals (Sweden)

    Asiasiga Lanuola

    2010-12-01

    Full Text Available Abstract Background Unintentional injuries are the leading cause of death and hospitalisation among New Zealand children, with indigenous Māori and ethnic minority Pacific children significantly over represented in these statistics. International research has shown that many children hospitalised for injury, as well as their families experience high levels of stress, and ethnic disparities in the quality of trauma care are not uncommon. The research on which this paper is based sought to identify key issues and concerns for New Zealand's multi-ethnic community following hospitalisation for childhood injury in order to inform efforts to improve the quality of trauma services. This paper reports on service providers' perspectives complementing previously published research on the experiences of families of injured children. Methods A qualitative research design involving eleven in-depth individual interviews and three focus groups was used to elicit the views of 21 purposefully selected service provider key informants from a range of professional backgrounds involved in the care and support of injured children and their families in Auckland, New Zealand. Interviews were transcribed and data were analysed using thematic analysis. Results Key issues identified by service providers included limited ability to meet the needs of children with mild injuries, particularly their emotional needs; lack of psychological support for families; some issues related to Māori and Pacific family support services; lack of accessible and comprehensive information for children and families; poor staff continuity and coordination; and poor coordination of hospital and community services, including inadequacies in follow-up plans. There was considerable agreement between these issues and those identified by the participant families. Conclusions The identified issues and barriers indicate the need for interventions for service improvement at systemic, provider and

  16. Perspectives of self-direction: a systematic review of key areas contributing to service users' engagement and choice-making in self-directed disability services and supports.

    Science.gov (United States)

    Lakhani, Ali; McDonald, Donna; Zeeman, Heidi

    2018-05-01

    Self-directed disability support policies aim to encourage greater choice and control for service users in terms of the health and social care they receive. The proliferation of self-directed disability support policies throughout the developed world has resulted in a growing amount of research exploring the outcomes for service users, and their families and carers. Our understanding of the issues faced by people with disabilities, particularly how they make health and social care decisions and the key areas that determine their engagement with service providers within a self-directed environment is limited. A synthesis of research is timely and can provide knowledge for service users and health and social care support providers to ensure their successful participation. A systematic review guided by the PRISMA approach explored (i) the key areas determining service users' engagement with self-directed disability services and supports, and (ii) how service users make informed decisions about providers. In October 2014 and April 2016, three databases - MEDLINE, CINAHL and Web of Science - were searched for research and review articles. Eighteen sources met the search criteria. Findings were mapped into either: key areas determining service user engagement, or service users' informed decision-making. Findings concerning key areas determining engagement fell into three themes - personal responsibility for budgeting, personalised approaches, and a cultural shift in practice and delivery among service providers. Findings about decision-making yielded two themes - supporting informed decision-making and inhibiting informed decision-making. Literature suggests that self-directed models of care may provide service users with increased control over the services that they receive. Increased control for some service users and their families requires independent external decision-making support, particularly around the domains of budgeting, planning and hiring. Future research

  17. Usefulness of food chain information provided by Dutch finishing pig producers to control antibiotic residues in pork.

    Science.gov (United States)

    van Wagenberg, Coen P A; Backus, Gé B C; van der Vorst, Jack G A J; Urlings, Bert A P

    2012-11-01

    The EU prescribes that food business operators must use food chain information to assist in food safety control. This study analyses usefulness of food chain information about antibiotic usage covering the 60-day period prior to delivery of pigs to slaughter in the control of antibiotic residues in pork. A dataset with 479 test results for antibiotic residues in tissue samples of finishing pigs delivered to a Dutch slaughter company was linked to information provided by pig producers about antibiotic usage in these finishing pigs. Results show that twice as many producers reported using antibiotics in the group of 82 producers with antibiotic residues (11.0%) compared to the group without antibiotic residues (5.5%) (p=0.0686). For 89% of consignments with a finishing pig with antibiotic residues, the producer reported 'did not use antibiotics'. Food chain information about antibiotic usage provided by Dutch pig producers was no guarantee for absence of antibiotic residues in delivered finishing pigs. Copyright © 2012 Elsevier B.V. All rights reserved.

  18. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  19. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  20. Effectiveness of reference services in providing students' information ...

    African Journals Online (AJOL)

    Data collected was analysed using descriptive statistics. ... The study recommends among other things: Effort should be geared toward recruiting ... information technologies facilities such computers and internet facilities such that students can ...

  1. Novel secret key generation techniques using memristor devices

    Science.gov (United States)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  2. To the Question of Information Security and Providing State and Municipal Services by Means of the Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-09-01

    Full Text Available In the present article author investigates interconnected questions of information security and providing state and municipal services by means of the global information Internet. Author analyzes opinions of the number of leading Russian and foreign experts and scientists. In the summary author draws a conclusion that implementation of rules of law answering to modern realities and also fruitful work of law enforcement and supervisory authorities regarding law application practice improvement is necessary for information security and human rights protection.

  3. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    Directory of Open Access Journals (Sweden)

    BURJA CAMELIA

    2014-08-01

    Full Text Available The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it analyzed the interdependence between the key financial ratios, studying the impact of liquidity ratios, solvency and efficiency on profitability. The study provides empirical evidences to identify factors that have ensured the performance of companies and their ranking in the segment of the most traded companies in Romania. Results suggest the view that the source of company success on the capital market lies in the positive signals sent to investors regarding profitability and the low risk of solvency. This study gives additional information for managerial decision-making in order to create more value and a better positioning of the companies in the market

  4. Primary care providers' lived experiences of genetics in practice.

    Science.gov (United States)

    Harding, Brittany; Webber, Colleen; Ruhland, Lucia; Dalgarno, Nancy; Armour, Christine M; Birtwhistle, Richard; Brown, Glenn; Carroll, June C; Flavin, Michael; Phillips, Susan; MacKenzie, Jennifer J

    2018-04-26

    To effectively translate genetic advances into practice, engagement of primary care providers (PCPs) is essential. Using a qualitative, phenomenological methodology, we analyzed key informant interviews and focus groups designed to explore perspectives of urban and rural PCPs. PCPs endorsed a responsibility to integrate genetics into their practices and expected advances in genetic medicine to expand. However, PCPs reported limited knowledge and difficulties accessing resources, experts, and continuing education. Rural practitioners' additional concerns included cost, distance, and poor patient engagement. PCPs' perspectives are crucial to develop relevant educational and systems-based interventions to further expand genetic medicine in primary care.

  5. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  6. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  7. Child Welfare, Juvenile Justice, Mental Health, and Education Providers' Conceptualizations of Trauma-Informed Practice.

    Science.gov (United States)

    Donisch, Katelyn; Bray, Chris; Gewirtz, Abigail

    2016-05-01

    This study systematically examined child-service providers' conceptualizations of trauma-informed practice (TIP) across service systems, including child welfare, juvenile justice, mental health, and education. Eleven focus groups and nine individual interviews were conducted, totaling 126 child-service providers. Conventional content analysis was used to analyze the qualitative data with interrater reliability analyses indicating near perfect agreement between coders. Qualitative analysis revealed that child-service providers identified traumatic stress as an important common theme among children and families served as well as the interest in TIP in their service systems. At the same time, child-service providers generally felt knowledgeable about what they define TIP to be, although they articulated wide variations in the degree to which they are taught skills and strategies to respond to their traumatized clients. The results of this study suggest a need for a common lexicon and metric with which to advance TIP within and across child-service systems. © The Author(s) 2016.

  8. Ethnic differences in breast cancer prevention information-seeking among rural women: will provider mobile messages work?

    Science.gov (United States)

    Kratzke, Cynthia; Wilson, Susan

    2014-09-01

    Although growing research supports cancer survivor information-seeking, little is known about breast cancer prevention information-seeking among women. The purpose of the study was to examine differences in breast cancer risk factor knowledge, information sources, and desired mobile messages among Hispanic and non-Hispanic rural women. Women were recruited to complete a survey at an imaging center during a mammography screening visit. A total of 156 women (mean age = 61, SD = 12.07) completed the survey. Breast cancer risk factor knowledge was significantly higher for non-Hispanic women compared to Hispanic women (p = .035). Television, magazines, and Internet were the most frequent information sources. Providers were the most frequent interpersonal information source. Nearly 87 % used cell phones and 47 % used texting. Hispanic women were more likely to desire breast cancer prevention cell voice messages (p breast cancer prevention education, and best practices to manage screening appointments.

  9. Standardizing communication from acute care providers to primary care providers on critically ill adults.

    Science.gov (United States)

    Ellis, Kerri A; Connolly, Ann; Hosseinnezhad, Alireza; Lilly, Craig M

    2015-11-01

    To increase the frequency of communication of patient information between acute and primary care providers. A secondary objective was to determine whether higher rates of communication were associated with lower rates of hospital readmission 30 days after discharge. A validated instrument was used for telephone surveys before and after an intervention designed to increase the frequency of communication among acute care and primary care providers. The communication intervention was implemented in 3 adult intensive care units from 2 campuses of an academic medical center. The frequency of communication among acute care and primary care providers, the perceived usefulness of the intervention, and its association with 30-day readmission rates were assessed for 202 adult intensive care episodes before and 100 episodes after a communication intervention. The frequency of documented communication increased significantly (5/202 or 2% before to 72/100 or 72% after the intervention; P communication was considered useful by every participating primary care provider. Rates of rehospitalization at 30 days were lower for the intervention group than the preintervention group, but the difference was not statistically significant (41/202 or 23% vs 16/88 or 18% of discharged patients; P = .45; power 0.112 at P = .05). The frequency of communication episodes that provide value can be increased through standardized processes. The key aspects of this effective intervention were setting the expectation that communication should occur, documenting when communication has occurred, and reviewing that documentation during multiprofessional rounds. ©2015 American Association of Critical-Care Nurses.

  10. A Similarity-Ranking Method on Semantic Computing for Providing Information-Services in Station-Concierge System

    Directory of Open Access Journals (Sweden)

    Motoki Yokoyama

    2017-07-01

    Full Text Available The prevalence of smartphones and wireless broadband networks have been progressing as a new Railway infomration environment. According to the spread of such devices and information technology, various types of information can be obtained from databases connected to the Internet. One scenario of obtaining such a wide variety of information resources is in the phase of user’s transportation. This paper proposes an information provision system, named the Station Concierge System that matches the situation and intention of passengers. The purpose of this system is to estimate the needs of passengers like station staff or hotel concierge and to provide information resources that satisfy user’s expectations dynamically. The most important module of the system is constructed based on a new information ranking method for passenger intention prediction and service recommendation. This method has three main features, which are (1 projecting a user to semantic vector space by using her current context, (2 predicting the intention of a user based on selecting a semantic vector subspace, and (3 ranking the services by a descending order of relevant scores to the user’ intention. By comparing the predicted results of our method with those of two straightforward computation methods, the experimental studies show the effectiveness and efficiency of the proposed method. Using this system, users can obtain transit information and service map that dynamically matches their context.

  11. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  12. Information technology boosts contractor's economic success

    International Nuclear Information System (INIS)

    Penny, M.; Vasey, G.M.

    1995-01-01

    This article will discuss the advantages of Information Technology (IT) and how one drilling contractor, Global Marine, has applied this technology. The company has applied it in an efficient manner which has provided business benefits and cost reductions that have helped its operations be more successful. The following are the different aspects of information technology that led to the contractor's success: cost reduction measures; migration to a client/server IT infrastructure; IT business benefits; and keys to obtaining business benefits from IT

  13. Natural Resource Knowledge and Information Management via the Victorian Resources Online Website

    Directory of Open Access Journals (Sweden)

    Christopher Pettit

    2011-11-01

    Full Text Available Since 1997, the Victorian Resources Online (VRO website (http://www.dpi.vic.gov.au/vro has been a key means for the dissemination of landscape-based natural resources information via the internet in Victoria, Australia. The website currently consists of approximately 11,000 web pages, including 1900 maps and 1000 downloadable documents. Information is provided at a range of scales—from statewide and regional overviews to more detailed catchment and sub-catchment levels. At all these levels of generalisation, information is arranged in an organisationally agnostic way around key knowledge “domains” (e.g., soil, landform, water. VRO represents a useful model for the effective dissemination of a wide range of natural resources information; relying on partnerships with key subject matter experts and data custodians, including a “knowledge network” of retired land resource assessment specialists. In this paper, case studies are presented that illustrate various approaches to information and knowledge management with a focus on presentation of spatially contexted soil and landscape information at different levels of generalisation. Examples are provided of adapting site-based information into clickable maps that reveal site-specific details, as well as “spatialising” data from specialist internal databases to improve accessibility to a wider audience. Legacy information sources have also been consolidated and spatially referenced. More recent incorporation of interactive visualisation products (such as landscape panoramas, videos and animations is providing interactive rich media content. Currently the site attracts an average of 1190 user visits per day and user evaluation has indicated a wide range of users, including students, teachers, consultants, researchers and extension staff. The wide range of uses for information and, in particular, the benefits for natural resource education, research and extension has also been identified.

  14. Key Ingredients-Target Groups, Methods and Messages, and Evaluation-of Local-Level, Public Interventions to Counter Stigma and Discrimination: A Lived Experience Informed Selective Narrative Literature Review.

    Science.gov (United States)

    Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A

    2018-04-01

    A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.

  15. 20 CFR 402.175 - Fees for providing information and related services for non-program purposes.

    Science.gov (United States)

    2010-04-01

    ... rendered. (d) Fee for copies of printed materials. When extra copies of printed material are available, the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Fees for providing information and related services for non-program purposes. 402.175 Section 402.175 Employees' Benefits SOCIAL SECURITY...

  16. ORGANIZING OF MANAGERIAL ACCOUNTING IN THE FORMING OF INFORMATION BASE OF BUILDING ENTERPRISES PROVIDING DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Nadiia Pylypiv

    2017-03-01

    Full Text Available This article explores the impact of organization of managerial accounting on formation of informational base on the local (level of the individual enterprise, regional, disciplinary and national levels in the context of providing stable economic development for building enterprises. Based on our findings, we built a cognitive map of such an influence, which shows itself through different spheres, such as: economic, ecological and social, and will enjoy informational requests of management for improving of effectiveness of management system of such kind of  enterprises. Keywords: managerial accounting, organization, provision, stable economic development, building enterprises

  17. Providing patients with information about disease-modifying anti-rheumatic drugs: Individually or in groups? A pilot randomized controlled trial comparing adherence and satisfaction.

    Science.gov (United States)

    Homer, Dawn; Nightingale, Peter; Jobanputra, Paresh

    2009-06-01

    Communicating information about disease-modifying anti-rheumatic drugs (DMARDs) before patients start treatment is a key role for some rheumatology clinical nurse specialists. This is done in our unit to promote understanding of the risks and benefits of drug therapy and encourage timely and reliable use of DMARDs. Information is routinely provided individually but this can lead to delays in starting treatment because of limited nursing resources. In this randomized trial we tested the feasibility of giving patients, who were about to start on a DMARD, information about the drug in groups and compared this with information given individually. Adults with a clinical diagnosis of rheumatoid arthritis or psoriatic arthritis who were referred to the nursing team for counselling about starting on methotrexate, sulfasalazine or leflunomide were included. Patients who had previously taken a DMARD were not excluded and those consenting were randomized to receive drug information individually or in groups (of three to six patients). We provided all patients with written materials about the relevant drug and discussed the risks and benefits of drug use verbally. Patients allocated to group counselling received this intervention in a teaching room, with a slide presentation. The primary outcome was adherence with medication use, ascertained by pill counts, self-report diaries and prescription dispensation. Secondary outcomes included satisfaction with information about medicines (SIMS) by questionnaire; time taken to provide information; adherence to scheduled hospital appointments and blood monitoring schedules; and DMARD continuation rates at four and twelve months. Of 127 eligible patients referred for counselling about DMARDs, 62 consented to take part: 32 were randomized to receive drug information individually and 30 to receiving it in groups. Patients allocated to the two different interventions were comparable for age and diagnoses at baseline but more patients

  18. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  19. Health-care users, key community informants and primary health care workers' views on health, health promotion, health assets and deficits: qualitative study in seven Spanish regions.

    Science.gov (United States)

    Pons-Vigués, Mariona; Berenguera, Anna; Coma-Auli, Núria; Pombo-Ramos, Haizea; March, Sebastià; Asensio-Martínez, Angela; Moreno-Peral, Patricia; Mora-Simón, Sara; Martínez-Andrés, Maria; Pujol-Ribera, Enriqueta

    2017-06-13

    Although some articles have analysed the definitions of health and health promotion from the perspective of health-care users and health care professionals, no published studies include the simultaneous participation of health-care users, primary health care professionals and key community informants. Understanding the perception of health and health promotion amongst these different stakeholders is crucial for the design and implementation of successful, equitable and sustainable measures that improve the health and wellbeing of populations. Furthermore, the identification of different health assets and deficits by the different informants will generate new evidence to promote healthy behaviours, improve community health and wellbeing and reduce preventable inequalities. The objective of this study is to explore the concept of health and health promotion and to compare health assets and deficits as identified by health-care users, key community informants and primary health care workers with the ultimate purpose to collect the necessary data for the design and implementation of a successful health promotion intervention. A descriptive-interpretive qualitative research was conducted with 276 participants from 14 primary care centres of 7 Spanish regions. Theoretical sampling was used for selection. We organized 11 discussion groups and 2 triangular groups with health-care users; 30 semi-structured interviews with key community informants; and 14 discussion groups with primary health care workers. A thematic content analysis was carried out. Health-care users and key community informants agree that health is a complex, broad, multifactorial concept that encompasses several interrelated dimensions (physical, psychological-emotional, social, occupational, intellectual, spiritual and environmental). The three participants' profiles consider health promotion indispensable despite defining it as complex and vague. In fact, most health-care users admit to having

  20. Nine key principles to guide youth mental health: development of service models in New South Wales.

    Science.gov (United States)

    Howe, Deborah; Batchelor, Samantha; Coates, Dominiek; Cashman, Emma

    2014-05-01

    Historically, the Australian health system has failed to meet the needs of young people with mental health problems and mental illness. In 2006, New South Wales (NSW) Health allocated considerable funds to the reform agenda of mental health services in NSW to address this inadequacy. Children and Young People's Mental Health (CYPMH), a service that provides mental health care for young people aged 12-24 years, with moderate to severe mental health problems, was chosen to establish a prototype Youth Mental Health (YMH) Service Model for NSW. This paper describes nine key principles developed by CYPMH to guide the development of YMH Service Models in NSW. A literature review, numerous stakeholder consultations and consideration of clinical best practice were utilized to inform the development of the key principles. Subsequent to their development, the nine key principles were formally endorsed by the Mental Health Program Council to ensure consistency and monitor the progress of YMH services across NSW. As a result, between 2008 and 2012 YMH Services across NSW regularly reported on their activities against each of the nine key principles demonstrating how each principle was addressed within their service. The nine key principles provide mental health services a framework for how to reorient services to accommodate YMH and provide a high-quality model of care. [Corrections added on 29 November 2013, after first online publication: The last two sentences of the Results section have been replaced with "As a result, between 2008 and 2012 YMH Services across NSW regularly reported on their activities against each of the nine key principles demonstrating how each principle was addressed within their service."]. © 2013 Wiley Publishing Asia Pty Ltd.

  1. Incorporating Duration Information in Activity Recognition

    Science.gov (United States)

    Chaurasia, Priyanka; Scotney, Bryan; McClean, Sally; Zhang, Shuai; Nugent, Chris

    Activity recognition has become a key issue in smart home environments. The problem involves learning high level activities from low level sensor data. Activity recognition can depend on several variables; one such variable is duration of engagement with sensorised items or duration of intervals between sensor activations that can provide useful information about personal behaviour. In this paper a probabilistic learning algorithm is proposed that incorporates episode, time and duration information to determine inhabitant identity and the activity being undertaken from low level sensor data. Our results verify that incorporating duration information consistently improves the accuracy.

  2. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  3. Withholding differential risk information on legal consumer nicotine/tobacco products: The public health ethics of health information quarantines.

    Science.gov (United States)

    Kozlowski, Lynn T; Sweanor, David

    2016-06-01

    The United States provides an example of a country with (a) legal tobacco/nicotine products (e.g., snus, other smokeless tobacco, cigarettes) differing greatly in risks to health and (b) respected health information websites that continue to omit or provide incorrect differential risk information. Concern for the principles of individual rights, health literacy, and personal autonomy (making decisions for oneself), which are key principles of public health ethics, has been countered by utilitarian arguments for the use of misleading or limited information to protect public health overall. We argue that omitting key health relevant information for current or prospective consumers represents a kind of quarantine of health-relevant information. As with disease quarantines, the coercive effects of quarantining information on differential risks need to be justified, not merely by fears of net negative public health effects, but by convincing evidence that such measures are actually warranted, that public health overall is in imminent danger and that the danger is sufficient to override principles of individual autonomy. Omitting such health-relevant information for consumers of such products effectively blindfolds them and impairs their making informed personal choices. Moral psychological issues that treat all tobacco/nicotine products similarly may also be influencing the reluctance to inform on differential risks. In countries where tobacco/nicotine products are legally sold and also differ greatly in disease risks compared to cigarettes (e.g., smokeless tobacco and vape), science-based, comprehensible, and actionable health information (consistent with health literacy principles) on differential risks should be available and only reconsidered if it is established that this information is causing losses to population health overall. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.

  4. EMS providers and exception from informed consent research: benefits, ethics, and community consultation.

    Science.gov (United States)

    Ripley, Elizabeth; Ramsey, Cornelia; Prorock-Ernest, Amy; Foco, Rebecca; Luckett, Solomon; Ornato, Joseph P

    2012-01-01

    As attention to, and motivation for, emergency medical services (EMS)-related research continues to grow, particularly exception from informed consent (EFIC) research, it is important to understand the thoughts, beliefs, and experiences of EMS providers who are actively engaged in the research. We explored the attitudes, beliefs, and experiences of EMS providers regarding their involvement in prehospital emergency research, particularly EFIC research. Using a qualitative design, 24 participants were interviewed including nationally registered paramedics and Virginia-certified emergency medical technicians employed at Richmond Ambulance Authority, the participating EMS agency. At the time of our interviews, the EMS agency was involved in an EFIC trial. Transcribed interview data were coded and analyzed for themes. Findings were presented back to the EMS agency for validation. Overall, there appeared to be support for prehospital emergency research. Participants viewed research as necessary for the advancement of the field of EMS. Improvement in patient care was identified as one of the most important benefits. A number of ethical considerations were identified: individual risk versus public good and consent. The EMS providers in our study were open to working with EMS researchers throughout the community consultation and public disclosure process. The EMS providers in our study valued research and were willing to participate in studies. Support for research was balanced with concerns and challenges regarding the role of providers in the research process.

  5. 41 CFR 102-37.535 - What information must FAA provide to GSA on its administration of the public airport donation...

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What information must FAA provide to GSA on its administration of the public airport donation program? 102-37.535 Section... Donations to Public Airports § 102-37.535 What information must FAA provide to GSA on its administration of...

  6. [Italian physician's needs for medical information. Retrospective analysis of the medical information service provided by Novartis Pharma to clinicians].

    Science.gov (United States)

    Speroni, Elisabetta; Poggi, Susanna; Vinaccia, Vincenza

    2013-10-01

    The physician's need for medical information updates has been studied extensively in recent years but the point of view of the pharmaceutical industry on this need has rarely been considered. This paper reports the results of a retrospective analysis of the medical information service provided to Italian physicians by an important pharmaceutical company, Novartis Pharma, from 2004 to 2012. The results confirm clinicians' appreciation of a service that gives them access to tailored scientific documentation and the number of requests made to the network of medical representatives has been rising steadily, peaking whenever new drugs become available to physicians. The analysis confirms what -other international studies have ascertained, that most queries are about how to use the drugs and what their properties are. The results highlight some differences between different medical specialties: for example, proportionally, neurologists seem to be the most curious. This, as well as other interesting snippets, is worth further exploration. Despite its limits in terms of representativeness, what comes out of the study is the existence of an real unmet need for information by healthcare institutions and that the support offered by the pharmaceutical industry could be invaluable; its role could go well beyond that of a mere supplier to National Healthcare Systems, to that of being recognised as an active partner the process of ensuring balanced and evidence-based information. At the same time, closer appraisal of clinicians' needs could help the pharma industries to improve their communication and educational strategies in presenting their latest clinical research and their own products.

  7. Reflections on providing sport science support for athletes with learning difficulties.

    Science.gov (United States)

    Hills, Laura; Utley, Andrea

    2010-01-01

    To highlight the benefits and the need for sport science support for athletes with learning difficulties, and to reflect on our experience of working with the GB squad for athletes with learning difficulties. A review of key and relevant literature is presented, followed by a discussion of the sport science support provision and the issues that emerged in working with athletes with learning difficulties. Pre- and post- physiological tests along with evaluations of athletes' potential to benefit from sport psychology support were conducted. The aim of these tests was to provide information for the athletes and the coaches on fitness levels, to use this information to plan future training, and to identify how well the performance could be enhanced. A case study is presented for one athlete, who had competed in distance events. The focus is the psychological support that was provided. It is clear that athletes with learning difficulties require the same type of sports science support as their mainstream peers. However, sport scientists will need to consider ways to extend their practice in order to provide the appropriate level of support.

  8. DO FINANCIAL STATEMENTS PROVIDE ADEQUATE INFORMATION ABOUT THE CAPITALIZATION OF COSTS RELATED TO INTANGIBLE ASSETS?: AN EMPIRICAL RESEARCH ON ITALIAN LISTED COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefania Vignini

    2015-11-01

    Full Text Available The aim of our research is to verify if Italian listed companies financial statements provide adequate information about the capitalization of costs related to intangible assets and if the information provided are reliable. Moreover, we investigated if they merely comply with law or provide additional information on cost capitalization and reveal if internal control systems (especially managerial accounting systems or other information systems are applied to support the measurement process and the cost control, thus guaranteeing the verifiability and representational faithfulness of the information disclosed. This paper is an empirical analysis and is concerned to investigate the financial statements of 250 Italian listed companies.

  9. Workplace wellness programs in Canada: an exploration of key issues.

    Science.gov (United States)

    Morrison, Erin; MacKinnon, Neil J

    2008-01-01

    Faced with the reality of rising health costs, Canadian employers are thinking beyond traditional notions of responsibility for employee health and have begun to embrace Workplace Wellness Programs (WWPs). This article investigates the critical issues of WWPs in the Canadian context from the perspective of key stakeholders. Using a combination of literature and key informant interviews, seven key themes are presented along with recommendations for wider implementation of WWPs in Canada.

  10. The Practical Integration of Action Research into Building Climate Literacy and Partnership with Key Influentials

    Science.gov (United States)

    Estrada, M.

    2015-12-01

    Climate Education Partners (CEP) has been using an action research approach to build climate literacy and partnership with key influential (KI) leaders in the San Diego community. After identifying 6 key sectors that either (a) could reduce green house gas emissions and adapt to impacts, or (b) would be highly vulnerable to the impacts of climate change, we conducted 89 interviews with KIs from the San Diego region -- including elected officials, academics, laborers, and representatives from local businesses, non-profits, ethnic and cultural communities, faith-based groups, and special interest groups -- to assess their science knowledge and opinions about climate change and the impacts of climate change. Other questions asked were about KIs' personal efficacy, identity, values and engagement in pro-environmental behaviors related to climate change. The results of the interviews contributed to CEP's action research approach in two ways: 1) it provided critical data regarding which leaders wanted further engagement with CEP and what that engagement should entail (e.g., being a connector to other leaders, a spokesperson, or a participant in future educational activities), and 2) it provided key information about the extent to which "knowledge deficit" is related to use of climate change knowledge to inform engagement in mitigation and adaptive behaviors. Practically, the results were used to create a database that is being used to inform the contact and education of KIs. We were able to show, consistent with previous research and identity theory, that liberal leaders were more likely than conservatives to believe in, feel concern for, and be knowledgeable about climate change. However, engagement in mitigation behaviors- specifically making decisions that would reduce electricity, gas, or water use- were similar for both groups. These results are being used to create resources and direct climate education activities going forward.

  11. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  12. Climate Change Information Dashboards for Water Resource Managers

    Science.gov (United States)

    Buja, Lawrence

    2016-04-01

    It is in the context of its application that one needs to determine if climate information is of high quality and ultimately useful. Therefore, it is important that the intersection between data providers and data consumers is structured in form of an iterative and collaborative exchange where science and application viewpoints can be brought together. A traditional "loading dock"-style hand-off of data fails to optimally inform decisions. It is now broadly recognized that a collaborative, open exchange is better suited to generate credible and salient products and knowledge that can be more confidently used in decisions. But in order for this exchange to be successful in practice, it needs to be sufficiently efficient to actually facilitate an exploratory process that is inherently iterative to determine the most informative products. It also requires a transparent approach that is easily understood and communicated. We will present prototypes of Climate Information Dashboards that collect on a single page to integrate a suite of key climate information for resource managers. The content of dashboards is based on standardized products that can be assembled to meet specific needs. They were co-designed with the water resource managers and are tailored to selected management and decision topics. The visualizations are tuned to quickly provide the basic information, yet below individual diagnostics are more detailed analyses that can be consulted. These dashboards offer a flexible way to connect decision-makers to climate model output. Conversely, such dashboards can also be applied to inform model development by providing insight into a suite of key characteristics of model performance that have been identified as critical by a sector.

  13. QUALITY, EFFECTIVENESS AND MANAGEMENT INFORMATION SYSTEMS PERFORMANCE OF LOCAL TREASURIES BUDGET ACCOUNTING

    Directory of Open Access Journals (Sweden)

    Biljana Tešić

    2011-09-01

    Full Text Available The role of management information systems (MIS of local treasuries budget accounting is to provide qualitative information support to management in process of decision making and to provide effective managing of key processes of budget accounting, in accordance with requests of management on all levels of decision making. From the aspect of effectiveness and request for quality, in accordance with request of users and defined system goals, this research includes the analysis of characteristics and goals of identified key processes, critical success factors (CSF, key performance indicators (KPI, standards for realization of users requests, results of processes and indicators of goals realisation. The aim of this paper, based on the results of the analysis, is to develop models for evaluation of quality and effectiveness and to define key performance indicators of MIS of budget accounting, in order to perceive the level of achievement of the goals of the system, effectiveness of processes and level of fulfillment of requirements and needs of all users groups that are significant for budge t accounting of local treasuries.

  14. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    classification performance still has room for improvement, but the extraction results are applicable to more detailed analysis. Further analysis of the extracted information reveals that there are differences in the details of social media-based key quality factors for hospitals according to the regions in Korea, and the patterns of change seem to accurately reflect social events (eg, influenza epidemics). These findings could be used to provide timely information to caregivers, hospital officials, and medical officials for health care policies.

  15. Executive overview and introduction to the SMAP information system life-cycle and documentation standards

    Science.gov (United States)

    1989-01-01

    An overview of the five volume set of Information System Life-Cycle and Documentation Standards is provided with information on its use. The overview covers description, objectives, key definitions, structure and application of the standards, and document structure decisions. These standards were created to provide consistent NASA-wide structures for coordinating, controlling, and documenting the engineering of an information system (hardware, software, and operational procedures components) phase by phase.

  16. Exploring the Key Risk Factors for Application of Cloud Computing in Auditing

    Directory of Open Access Journals (Sweden)

    Kuang-Hua Hu

    2016-08-01

    Full Text Available In the cloud computing information technology environment, cloud computing has some advantages such as lower cost, immediate access to hardware resources, lower IT barriers to innovation, higher scalability, etc., but for the financial audit information flow and processing in the cloud system, CPA (Certified Public Accountant firms need special considerations, for example: system problems, information security and other related issues. Auditing cloud computing applications is the future trend in the CPA firms, given this issue is an important factor for them and very few studies have been conducted to investigate this issue; hence this study seeks to explore the key risk factors for the cloud computing and audit considerations. The dimensions/perspectives of the application of cloud computing audit considerations are huge and cover many criteria/factors. These risk factors are becoming increasingly complex, and interdependent. If the dimensions could be established, the mutually influential relations of the dimensions and criteria determined, and the current execution performance established; a prioritized improvement strategy designed could be constructed to use as a reference for CPA firm management decision making; as well as provide CPA firms with a reference for build auditing cloud computing systems. Empirical results show that key risk factors to consider when using cloud computing in auditing are, in order of priority for improvement: Operations (D, Automating user provisioning (C, Technology Risk (B and Protection system (A.

  17. What Patients and Providers Want to Know About Complementary and Integrative Health Therapies.

    Science.gov (United States)

    Taylor, Stephanie L; Giannitrapani, Karleen F; Yuan, Anita; Marshall, Nell

    2018-01-01

    We conducted a quality improvement project to determine (1) what information providers and patients most wanted to learn about complementary and integrative health (CIH) therapies and (2) in what format they wanted to receive this information. The overall aim was to develop educational materials to facilitate the CIH therapy decision-making processes. We used mixed methods to iteratively pilot test and revise provider and patient educational materials on yoga and meditation. We conducted semistructured interviews with 11 medical providers and held seven focus groups and used feedback forms with 52 outpatients. We iteratively developed and tested three versions of both provider and patient materials. Activities were conducted at four Veterans Administration medical facilities (two large medical centers and two outpatient clinics). Patients want educational materials with clearly stated basic information about: (1) what mindfulness and yoga are, (2) what a yoga/meditation class entails and how classes can be modified to suit different abilities, (3) key benefits to health and wellness, and (4) how to find classes at the hospital/clinic. Diverse media (videos, handouts, pocket guides) appealed to different Veterans. Videos should depict patients speaking to patients and demonstrating the CIH therapy. Written materials should be one to three pages with colors, and images and messages targeting a variety of patients. Providers wanted a concise (one-page) sheet in black and white font with no images listing the scientific evidence for CIH therapies from high-impact journals, organized by either type of CIH or health condition to use during patient encounters, and including practical information about how to refer patients. Providers and patients want to learn more about CIH therapies, but want the information in succinct, targeted formats. The information learned and materials developed in this study can be used by others to educate patients and providers on CIH

  18. Workplace Mental Health Training in Health Care: Key Ingredients of Implementation.

    Science.gov (United States)

    Moll, Sandra E; VandenBussche, Jessica; Brooks, Katelyn; Kirsh, Bonnie; Stuart, Heather; Patten, Scott; MacDermid, Joy C

    2018-01-01

    Despite growing awareness of the importance of workplace mental health training and an increasing number of educational resources, there is a gap in knowledge regarding what shapes training effectiveness. The purpose of this study was to compare and describe the active ingredients of 2 workplace mental health education programs for health care workers. Within the context of a randomized clinical trial, a multimethod process evaluation was conducted to explore key process elements shaping implementation outcomes: the innovation, service recipients, service providers, and the organizational context. Data collection included descriptive statistics regarding program participation, postprogram interviews with a purposive sample of 18 service recipients, 182 responses to open-ended questions on postgroup and follow-up surveys, and field journal reflections on the process of implementation. Data analysis was informed by an interpretive description approach, using a process evaluation framework to categorize responses from all data sources, followed by within and cross-case comparison of data from both programs. Five key forces shaped the implementation and perceived outcomes of both programs: a contact-based education approach, information tailored to the workplace context, varied stakeholder perspectives, sufficient time to integrate and apply learning, and organizational support. The Beyond Silence program provided more opportunity for contact-based education, health care-specific content, and in-depth discussion of diverse perspectives. To increase mental health literacy and reduce stigma, workplace training should be based on best practice principles of contact-based education, with contextually relevant examples and support from all levels of the organization.

  19. The invisible work of personal health information management among people with multiple chronic conditions: qualitative interview study among patients and providers.

    Science.gov (United States)

    Ancker, Jessica S; Witteman, Holly O; Hafeez, Baria; Provencher, Thierry; Van de Graaf, Mary; Wei, Esther

    2015-06-04

    A critical problem for patients with chronic conditions who see multiple health care providers is incomplete or inaccurate information, which can contribute to lack of care coordination, low quality of care, and medical errors. As part of a larger project on applications of consumer health information technology (HIT) and barriers to its use, we conducted a semistructured interview study with patients with multiple chronic conditions (MCC) with the objective of exploring their role in managing their personal health information. Semistructured interviews were conducted with patients and providers. Patients were eligible if they had multiple chronic conditions and were in regular care with one of two medical organizations in New York City; health care providers were eligible if they had experience caring for patients with multiple chronic conditions. Analysis was conducted from a grounded theory perspective, and recruitment was concluded when saturation was achieved. A total of 22 patients and 7 providers were interviewed; patients had an average of 3.5 (SD 1.5) chronic conditions and reported having regular relationships with an average of 5 providers. Four major themes arose: (1) Responsibility for managing medical information: some patients perceived information management and sharing as the responsibility of health care providers; others—particularly those who had had bad experiences in the past—took primary responsibility for information sharing; (2) What information should be shared: although privacy concerns did influence some patients' perceptions of sharing of medical data, decisions about what to share were also heavily influenced by their understanding of health and disease and by the degree to which they understood the health care system; (3) Methods and tools varied: those patients who did take an active role in managing their records used a variety of electronic tools, paper tools, and memory; and (4) Information management as invisible work

  20. Extending voluntary health insurance to the informal sector: experiences and expectations of the informal sector in Kenya [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Edwine W. Barasa

    2017-09-01

    Full Text Available Background: Kenya has made a policy decision to use contributory health insurance as one of its key pre-payment health financing mechanisms. The National Hospital Insurance Fund (NHIF is the main health insurer in Kenya. While the NHIF has hitherto focused its efforts on providing health insurance coverage to individuals in the formal sector, it has recently broadened its focus to include individuals in the informal sector. This paper provides an analysis of the perceptions, and experiences of informal sector individuals in Kenya with regard to enrolment with the NHIF.  Methods: We collected data through key informant interviews (39 in two purposefully selected counties. Study participants were drawn from healthcare facilities contracted by the NHIF, and current, former, and prospective informal sector members. We analyzed data using a grounded approach.  Results: Participants felt that the NHIF provided inadequate information about the registration and membership processes as well as benefit entitlements. There was variable and inconsistent communication by the NHIF. There was also variance between the official benefit package and the actual benefits received by members. The NHIF registration requirements and processes presented an administrative barrier to obtaining membership. The NHIF premium level and contribution mechanism presents a financial barrier to current and prospective members. Healthcare providers discriminated against NHIF members compared to cash-payers or private insurance holders.  Conclusions: The NHIF could improve enrolment and retention of informal sector individuals by; 1 using communication strategies that are effective at reaching the informal sector, 2 improving the affordability of the premium rates, 3 simplifying the enrolment requirements and process, and 4 strengthening accountability mechanisms between itself and healthcare facilities to ensure that enrolled members receive the benefits that they are