Solat , Siamak
This comprehensive survey deliberated over the security of electronic payment systems. In our research, we focused on either dominant systems or new attempts and innovations to improve the level of security of the electronic payment systems. This survey consists of the Card-present (CP) transactions and a review of its dominant system i.e. EMV including several researches at Cambridge university to designate variant types of attacks against this standard which demonstrates lack of a secure "o...
Electronic payment is the way to make in the process of buying and selling customers in real estate market or online market easier. Electronic payments give innovation to consumer with transaction overseas like online shopping. This study aims to determine the influence of trust and security in the use of electronic payment system. Where the independent variables are trust and security influence in using electronic payment system as the dependent variable. This research used quantitative meth...
Bahtiyar , Şerif; Gür , Gürkan; Altay , Levent
Part 9: Malicious Behavior and Fraud; International audience; With the ubiquitous proliferation of electronic payment systems, data and application security has become more critical for financial operations. The Payment Card Industry Data Security Standard (PCI DSS) has been developed by the payment industry to provide a widely-applicable and definitive security compliance among all components in electronic payment infrastructure. However, the security impact of PCI DSS incompatibilities and ...
Zulhuda, Sonny; Azmi, Ida Madieha bt. Abdul Ghani
Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine the Malaysian legal readiness in the aspect of electronic payment system, focusing on its Payment Systems Act 2003. The discussion is limited to the issue of electronic security measures embodied in the ...
G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.
Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.
This bachelor thesis analysis issue of electronic payment systems. It discusses their use for payments on the internet and sending funds via e-mail. The first part is devoted to the theoretical definition and legislation of the issuance of electronic money and activities of electronic money institutions. The main part of the work clearly focuses on the use of e-wallets, which is an integral part of electronic payment systems. E-wallet of electronic payment system Moneybookers is considered as...
Full Text Available Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN. In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.
Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen
Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties. PMID:28608846
Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen
Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users' needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.
Full Text Available Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers’ security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.
Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patientÃ¢Â€Â™s medical history and payment for private medical services. The security issue is a very important one as the patientÃ¢Â€Â™s history is confidential and the payment has to be safe.
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Electronic payment methods. 203.10... TAX AND LOAN PROGRAM Electronic Federal Tax Payments § 203.10 Electronic payment methods. (a) General. Electronic payment methods for Federal tax payments available under this subpart include ACH debit entries...
The development of the Internet and the arrival of e-commerce fostered digitalization in the payment processes by providing a variety of electronic payment options including payment cards (credit and debit), digital and mobile wallets, electronic cash, contactless payment methods etc. Mobile payment services with their increasing popularity are presently under the phase of transition, heading towards a promising future of tentative possibilities along with the innovation in technology. In thi...
With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applications, like the electronic payment which will be discussed in this paper, the lack of trust in the underlying mobile infrastructure and secure interface to legacy systems (for this case, the banking systems) poses obstacles to their widespread presence in mobile services. Recently, the exposure of hacking of iPhone and other smart phones further emphasizes the criticality of establishing a trust platform for mobile applications. This paper analyzes the building blocks of the trusted smart phone, and proposes a framework to provide a trusted platform for mobile electronic payment. Such a proposed system may allow direct interface to the banking systems due to the banking industry recognized strong security, and hence, may enable its widespread use.
Full Text Available As one of the most important techniques in IoT, NFC (Near Field Communication is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.
....507 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo Insurance § 308.507 Security for payment of... collateral deposit fund or a surety bond, to secure the payment of the premiums, in an amount which shall at...
Pousttchi, Key; Wiedemann, Dietmar Georg
In this paper, we analyse payment procedures for their suitability for electronic government. We provide an overview of the payment procedures currently available on the market, compare the situation in electronic government with the situation in electronic commerce and analyze what we can transfer. Based on functional requirements we propose a scheme that allows public agencies to examine the appropriateness of any given payment procedure for electronic government.
Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Helme, A.; Verbraeck, A.
In this paper an overview of electronic payment methods and systems is given. This survey is done as part of the Moby Dick project. Electronic payment systems can be grouped into three broad classes: traditional money transactions, digital currency and creditdebit payments. Such payment systems have
... 39 Postal Service 1 2010-07-01 2010-07-01 false Servicing book-entry Postal Service securities... POSTAL SERVICE POSTAL SERVICE DEBT OBLIGATIONS; DISBURSEMENT POSTAL MONEY ORDERS BOOK-ENTRY PROCEDURES § 761.8 Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...
With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).
Full Text Available All developed countries are in transition from the IT economy to a web economy - the biggest technological innovation that will have a long-term positive effect on the formation of the economic growth rate, the major structural changes and on the differentiated effects on the economic areas that are, at a faster or a slower rate, being included in this technological change. The electronic commerce or e-commerce has a huge potential for development. The electronic commerce between the companies (B-2-B is significantly greater compared to retail electronic commerce (B-2-C. In both spheres of trade, the Internet is used as a platform for the transfer of information and for concluding business deals. Market economy requires Accelerated Payment Processing which is achieved by introducing and improving the electronic payment procedures. There is an emphasized dichotomy between the two spheres of the payment system: large-value and small-value payments. The large value payment systems can be described as the arteries of the payment system, and the small-value transfer systems as a complex network of veins that bind the entire economy.
Kasiyanto, Safari; Gabriella, Gimigliano
Kasiyanto discusses how the security issues of M-payments and Bitcoin as new forms of innovative payments challenge the existing EU regulatory frameworks, and whether the proposed regulatory frameworks suffice to address such challenges. The regulatory frameworks Kasiyanto discusses mainly focus on
... Government by electronic funds transfer through the Treasury Fedline Payment System (FEDLINE) or the... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Electronic funds transfer payment methods... COOPERATIVE AGREEMENTS General Special Conditions § 1260.69 Electronic funds transfer payment methods...
Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
... operator or other employer fails to provide proof of such security to the Director within 30 days of its...-compliance to the appropriate United States district court in accordance with § 725.351(c). (f) Security... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security for the payment of benefits. 725.606...
Full Text Available The article considers the role of customs payments as one of the main revenue sources of the state budget of Ukraine. The volume of receipt of customs payments to the state budget is characterized. The structure of receipts from customs payments for 2016-2017 is considered. Problems that violate the stable level of economic security of the country are identified. The complex of measures proposed to resolve deficiencies in the system of collection of customs payments to the State Budget of Ukraine is considered. The purpose of this article is to reveal the content and role of revenues from customs payments to the state budget and their impact on the country’s economic security. The subject of research: the impact of customs payments on the country’s economic security. The methodological basis of the study is a set of general, scientific, specific scientific and special methods and approaches, which helped to realize the conceptual unity of the research. In particular: an integrated approach that is used to analyse the collection of customs payments methods of induction and deduction, formalization to study the mechanism of charging customs payments, the method of analysis – in the study of the main elements of the collection of customs payments in Ukraine. Positive and normative research methods are used to develop proposed budget revenues from receipt of customs payments and to ensure stable economic security. Results. Thus, according to the results of the analysis, in 2017, there is a clear tendency to increase revenues to the state budget, including from customs payments. Thus, in 2017, the total amount of customs payments amounted to 277.27 billion UAH, which is 57.24 billion UAH more than the previous year (220.03 billion UAH. That is, customs payments increased by 26%. Economic implications. However, there are some problems in collecting customs payments to the state budget, which in turn violate a stable level of economic security of
This paper is my thesis as part of my studies at the Department of Informatics, at University of Piraeus for the Postgraduate Programme in “Techno-economic Management & Security of Digital Systems”. Scope of this paper is to introduce to the reader with the basics of PCI DSS and to guide and provide any sort of assistance to organizations willing to achieve compliance with the Payment Card Industry Data Security Standard (PCI DSS). As for its practical section, a PCI DSS readiness project has...
The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet)
Full Text Available The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet
Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.
CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with
Buck, S. Peter
Discussion of use of the Internet for online payments focuses on payment mechanisms for conducting transactions. Highlights include commercial requirements; security requirements; various proposed and currently used mechanisms; and future possibilities. (LRW)
Full Text Available The paper has four sections. First section has an intro for the mobile payments requirements for a reliable service. Second section shows types and models of mobile payment service but not taking into account the service patterns and the electronic money systems. In section three as a case study is shown an author solution may be improved taking into account the security and ergonomic issues presented in the first two sections. The last section presents a summary of technologies available for improvement of the mobile payment services.
Ruzhytskyi Andrіy V
Full Text Available The article presents main approaches to the essence of the economic security of an enterprise notion, namely, approach of counter-action to threats, approach of successful market activity and approach of achievement of certain development goals; it identifies the role of economic security of energy generating enterprises in economic security of other subjects and the country in general; it offers definition of the economic security of an enterprise notion as a complex characteristic of the state of the enterprise that reflects the level of the enterprise possibility to ensure functioning and development; it marks out functional components of economic security, which are connected with mutual payments, namely, financial, personnel, technical and technological, political and legal, informational and interface ones; it presents connection of mutual payments with the level of financial component of economic security of enterprises, which envisages financial flow from or to the enterprise for changing the obligation status or its quantitative characteristics.
K. V. Karvai
Full Text Available With development of a century of technologies, the economy has had access also for development in Internet industry sphere too. Thanks to this development have appeared: e-money, electronic payment systems, Internet-banking. In the given work the general scheme of works of electronic payment systems, their conditions and function, examples of possible ways of development are presented. In the conclusion the recommendations how it is possible to optimize the market for development of electronic commerce are given and resulted
Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.
Full Text Available Abstract: Any payment which uses mobile device as payment method is called M-payment whether it is proximity or remote and online or point of sale. Since it has been identified that mobile phone is everywhere and ever-present essential consumer device, and could be used for payment offline or online, Mobile payment has been hyped significantly. However early market adoption is facing some challenges and in need of the unanimous effort of all key players (manufacturers, mobile operators, merchants and customers of value chain in order to accept mobile payment method and achieve standard and sustainable business model. Achieving one business model is important for user convenience and reachability, resulting in increased market opportunities. The main focus of this research proposal is that why cohesive technologies are needed and how it could be achieved? Some M-payment ventures are successfully working in Japan, US and Asian countries such as NTTDoCoMo and PayPal M-payments. The main reason of M-payment adoption among consumers in those countries is that their security issues are dealt carefully and solved to acceptable level. This paper is presented in the form of research proposal and overview looking into various challenging issues which are preventing the higher success in UK.
Shon, Tae-Hwan; Swatman, Paula M. C.
Examines Internet payment systems (IPS): third-party, card, secure Web server, electronic token, financial electronic data interchange (EDI), and micropayment based. Reports the results of a Delphi survey of experts identifying and classifying IPS effectiveness criteria and classifying types of IPS providers. Includes the survey invitation letter…
Lindbäck, Karin; Blommé, Carl
Mobile payment is a new payment method that is being introduced on the Swedish market, but has not yet come to its breakthrough. This thesis investigates the attitude the Swedish consumer has towards mobile payment. Based on previous surveys and theory, three main attributes, security, privacy and convenience, were chosen to represent the attitude of the consumer towards mobile payment. In order to analyze the data obtained from the surveys conducted, the multi-attribute attitude model was us...
In the era of high-tech, the mode of payment is no longer just use cash or credit card. There are various payments come to our daily life. Online payment and other kinds of electronic payments are wildly in use by people. Apple Pay is a tool that provides easier and safer payment service for consumer. The main objective of this thesis is to understand deeply and analyze how easy and convenient Apple Pay is to use and why it is known as most secure form of payment. Besides that, there is a ...
Medicare and Medicaid programs: Hospital Outpatient Prospective Payment and Ambulatory Surgical Center Payment Systems and Quality Reporting Programs; electronic reporting pilot; Inpatient Rehabilitation Facilities Quality Reporting Program; revision to Quality Improvement Organization regulations. Final rule with comment period.
This final rule with comment period revises the Medicare hospital outpatient prospective payment system (OPPS) and the Medicare ambulatory surgical center (ASC) payment system for CY 2013 to implement applicable statutory requirements and changes arising from our continuing experience with these systems. In this final rule with comment period, we describe the changes to the amounts and factors used to determine the payment rates for Medicare services paid under the OPPS and those paid under the ASC payment system. In addition, this final rule with comment period updates and refines the requirements for the Hospital Outpatient Quality Reporting (OQR) Program, the ASC Quality Reporting (ASCQR) Program, and the Inpatient Rehabilitation Facility (IRF) Quality Reporting Program. We are continuing the electronic reporting pilot for the Electronic Health Record (EHR) Incentive Program, and revising the various regulations governing Quality Improvement Organizations (QIOs), including the secure transmittal of electronic medical information, beneficiary complaint resolution and notification processes, and technical changes. The technical changes to the QIO regulations reflect CMS' commitment to the general principles of the President's Executive Order on Regulatory Reform, Executive Order 13563 (January 18, 2011).
Full Text Available The bill of exchange is a kind of paper in order that its holder shall entitle the debtor named in the document to pay a certain amount of payments. The bill of exchange represents a means of payment and an instrument of providing the payment. It is an unconditional order given by the drawer to the drawee to pay a certain amount to the payee listed on the bill of exchange. The bill of exchange is generally a paper on the orders but it can be issued as value paper to a name. It is such promissory notes where the issuer becomes a clause not by order. The bill of exchange though it appears as a means of payment and an instrument for securing the payment it also appears as a means of international payment, because the bill of exchange can become a modern instrument of crediting and payment. With the development of the credit market and the bill of exchange becomes a means for the drawer and the drawee. This means that instead of the bill of exchange to be paid after the expiry of a certain deadline for submission of the bill of exchange the holder may sell or discount, or to pay before the deadline for submission. With this the bill of exchange becomes a toll for discount. Based on this we can conclude that the bill of exchange has the following roles: -bill of exchange serves as a means of credit; -bill of exchange serves as means of payment; -bill of exchange serves as a means for discount by.
... Government under this contract shall be made by electronic funds transfer (EFT), except as provided in... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Payment by Electronic... CONTRACT CLAUSES Text of Provisions and Clauses 52.232-33 Payment by Electronic Funds Transfer—Central...
... cooperative agreement will be made by the Government by electronic funds transfer through the Treasury Fedline... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Electronic funds transfer payment methods... COOPERATIVE AGREEMENTS WITH COMMERCIAL FIRMS Other Provisions and Special Conditions § 1274.931 Electronic...
With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET...
ELENA VIOLETA DRĂGOI
Full Text Available At EU level, the funds transfer systems have undergone significant changes starting with the introduction of euro. The launch of the euro, the emergence of new technologies, introduction of financial innovations and the globalization have led to reorganization of funds transfer systems` infrastructure. The paper aims to offer an analysis of actual payment system for Euro area, a trans-European funds transfer system with gross settlement in real-time for payments in euro TARGET- to increase economical and operational efficiency of payments and also to reduce the risks in the electronic funds transfer system by creating efficient and secure payment systems.
Cristina Raluca Popescu
Full Text Available The paper “The Impact of the Electronic Payment System on the Development of Nowadays Society: an Economic and a Managerial Perspective” presents the aspects concerning the impact of the electronic payment system on the development of nowadays society as an economic and a managerial perspective. Our research focuses on issues related to the payments sector, the Smartcard, the Electronic Banking,payment systems based on bank cards, the Cyber cash, and the electronic payment systems (1 Net Cash and (2 E-Cash, Micro-payment systems with (1 Millicent and (2 Cyber Coin, as well as the electronic check payments.
Full Text Available The e-commerce has become a routine part of human life because it offers major advantages: convenience (it’s no longer necessary to visit a store to be able to shop, efficiency (the buyer can visit several virtual shops in a very short time, the crowd of shops and the frustration caused by the lack of parking spaces available can be avoided, the customer can choose and compare the desired products taking in consideration a set of characteristics such as price, grammage, color, delivery dat, etc. and the development of secure solutions for online payment (through: bank cards, ePay, cybercash, SmartCard, electronic funds transfer, Ecash. In the last decade, the electronic payment systems have been improved, reaching high levels of security and speed, acquiring a private, confidential, decentralization and internationalization character.
Okifo, Joseph; Igbunu, Richard
The crux of this study is on the adoption of E-payment system in Nigeria: Its economic benefits and challenges. The arrival of the internet has taken electronic payments and transactions to an exponential growth level. Consumers could purchase goods and services from the internet and send unencrypted credit card numbers across the network, which…
Nowadays, electronic payment solutions are widespread all around the world. Besides, their popularity is rapidly growing in emerging markets bringing numerous business opportunities to the international companies specializing in electronic payment systems. The aim of this thesis is to create a marketing strategy for the penetration of Ghana and Uganda with Smobilpay, which is an electronic payment application of Maviance GmbH. The research is done with the help of an analysis of the busin...
Saravanan Muthaiyah; Joseph Antony Jude Ernest; Chew Kok Wai
Web security has been a major issue of debate in the recent years. The lack of security is perceived as a major stumbling block for doing business online. Electronic cash payment systems are becoming more important than ever to facilitate online transactions and thus replacing traditional payment methods such as checks The prime objective of this paper is to determine the perception of consumers towards the security aspects of e-commerce technology. Specifically this paper examines the percep...
... electronic billing for payment of transportation services? 102-118.65 Section 102-118.65 Public Contracts and... Transportation Services § 102-118.65 Can my agency receive electronic billing for payment of transportation... to use electronic billing for the procurement and billing of transportation services. ...
Stanislav A. Shikov
Full Text Available Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT, and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of Things. The author considers security challenges for the “smart home” system. Next section reviews the experiments of the author involved in testing of the Internet of Things devices. Materials and Methods: The subjects of study are the Apple Pay, the ZigBee wireless standard, Tesla Model S electric cars. The main methods for identification of security threats are analysis and comparison. Results: The companies of electronic devices simplify and reduce the price of manufacturing process. The customers and users are rarely interested in levels of electronic devices security policies. This is the weakest link of electronic products in terms of security and safety. The tests demonstrated that modern electronic-based technologies do not reach the 100-percentage security level. Apple Pay mobile payment system demonstrated the highest security rating. Discussion and Conclusions: Modern electronic devices for Internet of Things does not meet all safety requirements, from the point of view of the author. The article recommends analyzing the potential threats and developing new security standards. In addition, the logistics of electronic devices for Internet of Things need to be under control from the manufacturer to equipment installation time.
... EN payment systems? 411.525 Section 411.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.525 What payments are available under each of the EN payment systems? (a) For payments for outcome payment months, both...
Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year 2010...
Supardi, Azizan; Adnan, Hamimah
In Malaysia, sub-contractors have to bear with the current structure of payment mechanisms in the standard forms of contract, which are payment upon certification, direct payment from the employer, and contingent or conditional payment. However, „direct payment‟ provision is applied for in most of the nominated sub-contracts and not to the domestic sub-contractors; thus the Construction Industry Payment and Adjudication (CIPA) Act is proposed. This paper, though, is to disclose the findings o...
... choose to use electronic invoicing have three options to submit payment requests in electronic form: (1... (``Act''), Public Law 97-177, to require Federal agencies to pay their bills on a timely basis, to pay... reflect the increased use of electronic commerce in the Federal Government and in the private sector...
Ashish Ukidve; Ds S SMantha; Milind Tadvalkar
The Payment Card Industry Data Security Standard (PCI DSS) aims to enhance the security of cardholder data and is required when cardholder data or authentication data are stored, processed or transmitted. The implementation of enabling processes from COBIT 5 can complement compliance to PCI DSS. COBIT 5 assists enterprises in governance and management of enterprise IT and, at the same time, supports the need to meet security requirements with supporting processes and management activities. Th...
M. V. Kuzin
The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.
Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra
The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.
Dube, Kudakwashe; Shoniregun, Charles A
The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu
M. V. Kuzin
Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.
Full Text Available The trend of financial transactions by using a mobile phone or mobile payment increases. By using the mobile payment service, users can save money on mobile phone (handset and separate from the pulse. For protecting users, mobile payment service providers must complete the mobile payment service with the transaction security. One way to provide transaction security is to utilize a secure mobile payment application. This research provides a safety feature used for an Android-based mobile payment application. This security feature is making encryption rules dynamically named Dynamic Rule Encryption (DRE. DRE has the ability to protect data by means of encrypting data with dynamic rules, and DRE also has a token function for an authentication. DRE token raised with dynamic time-based rules. Here, the time is used as a reference with the order of the day in the year (day of the year. The processes of the DRE’s encryption, decryption, and the DRE’s functionality as the token are discussed in this paper. Here, the Hamming distance metric is employed for having maximum differences between plaintext and ciphertext.
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How are the outcome payments calculated under the outcome payment system? 411.550 Section 411.550 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... the outcome payments calculated under the outcome payment system? The amount of each monthly outcome...
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Payment by electronic funds transfer. 208.3 Section 208.3 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE MANAGEMENT OF FEDERAL AGENCY...
Barskar, Raju; Deen, Anjana Jayant; Bharti, Jyoti; Ahmed, Gulfishan Firdose
E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appro...
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Demand for payment. 11.3 Section 11.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.3 Demand for payment. (a) Notice requirements. Generally, before DHS starts the collection actions described in this subpart, DHS...
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How are the outcome payments calculated under the outcome-milestone payment system? 411.545 Section 411.545 Employees' Benefits SOCIAL SECURITY... are the outcome payments calculated under the outcome-milestone payment system? The amount of each...
Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.
Mariana Rodica TIRLEA
Full Text Available This type of coin and appeared as a result of the needs for a proper management of the financial resources available in the market, but also to improve the payments system in our country. The card is an alternative to the conventional instruments of payment is a payment instrument with and without cash by means of which the holder disposes of the current account. It is a standardized, secure information and individualized, through which you can perform operations of cash withdrawal, payment for the goods or services purchased, payment obligations by the public administration authorities and funds transfers between accounts, other than those ordered and executed by financial institutions, carried out through the electronic payment instrument.
At 2004 China Electronic Finance Forum held in Beijing recently,Pan Xinping, Dean of Software Institute of Graduate Institute of Chinese Academy of Science appealled that China's financial departments should further quicken electronization and establish complete network electronic payment system to offer comprehensive financial service such as checking card, transference and clearance between banks, electronic securities, accounting management,transaction disposal, payment commission and service of report, and establish financial management information system. And it should finish communications between computer systems of all different professional banks, providing strong backing for the development of electronic finance in China.……
@@ At 2004 China Electronic Finance Forum held in Beijing recently,Pan Xinping, Dean of Software Institute of Graduate Institute of Chinese Academy of Science appealled that China's financial departments should further quicken electronization and establish complete network electronic payment system to offer comprehensive financial service such as checking card, transference and clearance between banks, electronic securities, accounting management,transaction disposal, payment commission and service of report, and establish financial management information system. And it should finish communications between computer systems of all different professional banks, providing strong backing for the development of electronic finance in China.
Full Text Available Cashless payments are recent phenomena, which even increased with the introduction of contactless means like NFC, PayPass or payWave. Such new methods speed-up the entire payment process and in comparison to cash transactions are much simpler and faster. But on the other hand the key question for merchant is if it is worth to have such device, which accept these new payment means or not to have the terminal at all. What is the amount of cash flow, which delimits the cash holdings to be still profitable? This paper tries to give answers to such question by presenting general profitability model, which will address defining the cash threshold amount. The aim is to show that cash holdings could be profitable up to certain amount, but after the threshold is met, cashless payment methods are fairly superior despite their additional costs.
Office of the Press Secretary of the White House
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Li, Yanyan; Xie, Mengjun; Bian, Jiang
Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.
Anca Ioana ANDREESCU
Full Text Available The evolution of information and communications technology, together with the increasing use of electronic commerce, phones and mobile applications, have facilitated mobile payments to become an alternative payment method for buyers and vendors. Mobile payments offer various opportunities to business environment and became a starting point in the transition from electronic to mobile. This paper aims to analyze the present situation of the mobile payment methods and to identify the effects that mobile payment systems have on electronic commerce.
John O' Raw
Full Text Available Underpinned by the rise in online criminality, the payment card industry (PCI data security standards (DSS were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP can be applied to meet the requirement of masking the primary account number (PAN. Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payment periods. 410.501 Section 410.501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK LUNG BENEFITS (1969- ) Payment of Benefits § 410.501 Payment periods. Benefits are paid to...
Chen, Deyun; Zhang, Junfeng; Pei, Shujun
In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.
Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.
The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.
Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.
The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs
...: General. Payment of SSI benefits will be made for the month after the month of initial eligibility and for... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payment of benefits: General. 416.501 Section 416.501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibility for making payment decisions. 416.2209 Section 416.2209 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... Provisions § 416.2209 Responsibility for making payment decisions. The Commissioner will decide: (a) Whether...
Jaakkimainen, R Liisa; Shultz, Susan E; Tu, Karen
Several barriers to the adoption of electronic medical records (EMRs) by family physicians have been discussed, including the costs of implementation, impact on work flow and loss of productivity. We examined billings and payments received before and after implementation of EMRs among primary care physicians in the province of Ontario. We also examined billings and payments before and after switching from a fee-for-service to a capitation payment model, because EMR implementation coincided with primary care reform in the province. We used information from the Electronic Medical Record Administrative Data Linked Database (EMRALD) to conduct a retrospective before-after study. The EMRALD database includes EMR data extracted from 183 community-based family physicians in Ontario. We included EMRALD physicians who were eligible to bill the Ontario Health Insurance Plan at least 18 months before and after the date they started using EMRs and had completed a full 18-month period before Mar. 31, 2011, when the study stopped. The main outcome measures were physicians' monthly billings and payments for office visits and total annual payments received from all government sources. Two index dates were examined: the date physicians started using EMRs and were in a stable payment model (n = 64) and the date physicians switched from a fee-for-service to a capitation payment model (n = 42). Monthly billings and payments for office visits did not decrease after the implementation of EMRs. The overall weighted mean annual payment from all government sources increased by 27.7% after the start of EMRs among EMRALD physicians; an increase was also observed among all other primary care physicians in Ontario, but it was not as great (14.4%). There was a decline in monthly billings and payments for office visits after physicians changed payment models, but an increase in their overall annual government payments. Implementation of EMRs by primary care physicians did not result in decreased
Shultz, Susan E.; Tu, Karen
Background Several barriers to the adoption of electronic medical records (EMRs) by family physicians have been discussed, including the costs of implementation, impact on work flow and loss of productivity. We examined billings and payments received before and after implementation of EMRs among primary care physicians in the province of Ontario. We also examined billings and payments before and after switching from a fee-for-service to a capitation payment model, because EMR implementation coincided with primary care reform in the province. Methods We used information from the Electronic Medical Record Administrative Data Linked Database (EMRALD) to conduct a retrospective before–after study. The EMRALD database includes EMR data extracted from 183 community-based family physicians in Ontario. We included EMRALD physicians who were eligible to bill the Ontario Health Insurance Plan at least 18 months before and after the date they started using EMRs and had completed a full 18-month period before Mar. 31, 2011, when the study stopped. The main outcome measures were physicians’ monthly billings and payments for office visits and total annual payments received from all government sources. Two index dates were examined: the date physicians started using EMRs and were in a stable payment model (n = 64) and the date physicians switched from a fee-for-service to a capitation payment model (n = 42). Results Monthly billings and payments for office visits did not decrease after the implementation of EMRs. The overall weighted mean annual payment from all government sources increased by 27.7% after the start of EMRs among EMRALD physicians; an increase was also observed among all other primary care physicians in Ontario, but it was not as great (14.4%). There was a decline in monthly billings and payments for office visits after physicians changed payment models, but an increase in their overall annual government payments. Interpretation Implementation of EMRs by
Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.
Federal Coal Mine Health and Safety Act of 1969, Title IV, as amended (The Black Lung Benefits Act); payment of benefits--withholding Part B benefits where Part C payments are made for the same period. Social Security Administration. Final rule.
This regulation confirms the interim rule authorizing the Social Security Administration to withhold payment of Part B Black Lung benefits where Part C Black Lung benefits administered by the Dept. of Labor are paid for the same period. We are doing this by expanding the definition of "overpayment" in 20 CFR 410.560(a) to include these duplicate payments under Part C. This regulation provides a quick and efficient means of avoiding unjustified duplicate payments.
Electronic Security Systems: Better Ways to Crime Prevention teaches the reader about the application of electronics for security purposes through the use of case histories, analogies, anecdotes, and other related materials. The book is divided into three parts. Part 1 covers the concepts behind security systems - its objectives, limitations, and components; the fundamentals of space detection; detection of intruder movement indoors and outdoors; surveillance; and alarm communication and control. Part 2 discusses equipments involved in security systems such as the different types of sensors,
Sattar J Aboud
The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now ...
Full Text Available The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
Yohan, Alexander; Lo, Nai-Wei; Winata, Doni
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
MARSTON, R M
Security Electronics Circuits Manual is an invaluable guide for engineers and technicians in the security industry. It will also prove to be a useful guide for students and experimenters, as well as providing experienced amateurs and DIY enthusiasts with numerous ideas to protect their homes, businesses and properties.As with all Ray Marston's Circuits Manuals, the style is easy-to-read and non-mathematical, with the emphasis firmly on practical applications, circuits and design ideas. The ICs and other devices used in the practical circuits are modestly priced and readily available ty
Full Text Available The mobile agent paradigm offers flexibility and autonomy to e-commerce applications. But it is challenging to employ a mobile agent to make a payment due to the security consideration. In this paper, we propose a new agent-assisted secure payment protocol, which is based on SET payment protocol and aims at enabling the dispatched consumer-agent to autonomously sign contracts and make the payment on behalf of the cardholder after having found the best merchant, without the possibility of disclosing any secret to any participant. This is realized by adopting the Signature-Share scheme, and employing a Trusted Third Party (TTP. In the proposed protocol, the principle that each participant knows what is strictly necessary for his/her role is followed as in SET. In addition, mechanisms have been devised for preventing and detecting double payment, overspending and overpayment attacks. Finally the security properties of the proposed protocol are studied analytically. In comparison with other existing models, the proposed protocol is more efficient and can detect more attacks.
Yow, J Art
The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.
Kreyer, Nina; Pousttchi, Key; Turowski, Klaus
Companies are not going to invest into the development of innovative applications or services unless these can be charged for appropriately. Thus, the existence of standardized and widely accepted mobile payment procedures is crucial for successful business-to-customer mobile commerce. The acceptance of mobile payment procedures depends on costs, security and convenience issues. For the latter, it is important that a procedure can be used over the different payment scenarios mobile commerce, ...
In the recent years, with the rapid development of science and technology in the consumer markets, payment terms are being promoted much faster than ever. It is considered that NFC Mobile payment will enjoy a great prospect. NFC Mobile payment technique, which is based on the RFID technology, has been growing popularity. Near Field Communication (NFC) is the proximity standard for the proximity cards that can be modified to allow integration of the technology into a cellular phone. NFC tec...
Korobeinikova Olga Mikhailovna
Full Text Available In the article presented and estimated systematically possibilities of minimization the general and specific risks local payment systems and their participants, which actualized due to the activation of formation of national payment system in Russia amid increasing global political and financial risks and the need for economic security.
Diego A. Restrepo
Full Text Available Objective: to analyze the evolution of the Capitation Payment (UPC for its Spanish name “unidad de pago por capitación” as well as the methodologies and variables for defining it that have existed in the Colombian Social Security System in Health since its implementation between 1995 and 2011. Methodology: An observational, longitudinal descriptive study. The reference population was made up of all the papers reviewed, including books, journal articles, databases, and official presentations containing the key concepts. Results: It was found that the Capitation Payment (UPC is valued as an essential element to maintain the financial balance of the health system. From 1995 to 2011 there were a number of methodologies for defining this payment. They ranged from a definition based only on the financial balance and the availability of resources, to a technical study using statistical tools to annually adjust the value of the UPC. Conclusions: The origin of the UPC can be attributed to the system’s orientation toward a market scheme and to the convergence of three basic theories. The variations in the value of the UPC have always resulted in a similar value year after year; this is why even if the methodology for defining it changed, the proportions will be the same when compared to previous years
A. O. Menshenin
Full Text Available The paper presents a secure protocol for communication between host and NFC reader. The protocol protection scheme uses symmetric cipher with cyclic session key generation and provides confidentiality, integrity, end parties authentication and resistance to replay attacks. Deployment scenario in a typical electronic payment system is also presented.
... 7 Agriculture 14 2010-01-01 2009-01-01 true Payment of fees and insurance premiums. 1962.29... Security § 1962.29 Payment of fees and insurance premiums. (a) Fees. (1) Security instruments. Borrowers... the service cannot be obtained without cost. (b) Insurance premiums. County Supervisors are authorized...
Over the last decade, the Netherlands observed a rapid shift from cash and paper-based payment instruments toward electronic payment instruments. Banks are well aware that transaction pricing can speed up the shift to low-cost electronic payments. But payment pricing is a complex matter, due to
... payment, creating a standard set of electronic data to submit payment requests to the federal government... electronic invoicing and payment information system, and to change the definition of bureau to reflect the...-based electronic invoicing and payment system that processes vendor payment data electronically, either...
NCI TTC CRADA PAYMENT OPTIONS: Electronic Payments by Wire Transfer via Fedwire, Mail a check to the Institute or Center, or Automated Clearing House (ACH)/Electronic Funds Transfer (ETF) payments via Pay.gov (NCI ONLY).
Hasan, Iftekhar; De Renzis, Tania; Schmiedel , Heiko
This paper examines the fundamental relationship between retail payments and overall economic growth. Using data from across 27 European markets over the period 1995–2009, the results confirm that migration to efficient electronic retail payments stimulates overall economic growth, consumption and trade. Among different payment instruments, this relationship is strongest for card payments, followed by credit transfers and direct debits. Cheque payments are found to have a relatively low macro...
Jonathan A. ENOKELA
Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.
This article examines the question whether the EC Regulation concerning transactions carried out by electronic payment instruments should be replaced by a Directive that is binding on all member states of the EU.
The purpose of this thesis work was to make a survey of current on-line payment technologies and find out which are they and how do they work? Compare and analyze them from a security point of view, as well as a usability point of view. What is good? What is bad? What is lacking? To achieve this purpose, an overview of the current on-line payment technologies was acquired through academic books and papers, Internet sites, magazines. Basic cryptographic and security related techniques were stu...
Rashmi Mantri; Junkang Feng
Abstract: Any payment which uses mobile device as payment method is called M-payment whether it is proximity or remote and online or point of sale. Since it has been identified that mobile phone is everywhere and ever-present essential consumer device, and could be used for payment offline or online, Mobile payment has been hyped significantly. However early market adoption is facing some challenges and in need of the unanimous effort of all key players (manufacturers, mobile operators, merch...
Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck
With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.
Hasan, Iftekhar; De Renzis, Tania; Schmiedel, Heiko
This paper examines the fundamental relationship between retail payments and the real economy. Using data from across 27 European markets over the period 1995-2009, the results confirm that migration to efficient electronic retail payments stimulates the overall economy, consumption and trade. Among different payment instruments, this relationship is strongest for card payments, followed by credit transfers. Cheque payments are found to have a relatively low macroeconomic impact. Retail payme...
... recognition payments? 408.1220 Section 408.1220 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1220 How do we pay Federally administered State recognition payments? (a) Payment procedures. We make...
Various security breaches at third-party payment processors show that online payment systems are the primary target for cyber-criminals. In general, the security of online payment systems relies on a number of factors, namely technical factors, processing factors, and legal factors. The industry
S.A. Brands (Stefan)
textabstractAn off-line electronic coin system is presented that offers multi-party security and unconditional privacy of payments. The system improves significantly on the efficiency of the previously most efficient such system known in the literature, due to application of a recently proposed
Full Text Available E-Money mobile payments, also called digital money, are electronic payments, payment transactions using an Internet network integrated with NFC-enabled smartphones and prepaid cards. In Indonesia not only banks that issue e-money products, telecom operators from Telkomsel also issued an e-money product called T-cash. T-cash is a new innovation of electronic money presented by Telkomsel. The purpose of this study was to check the effect of responsiveness, smartness, perceived ease of use, perceived usefulness, social influence, and security against the intention to use T-cash. The data used in this study include primary and secondary data. Respondents in this study are users of T-cash products in Yogyakarta as many as 115 respondents. While the data were collected by using the questionnaire to then be analyzed using the amos analysis technique 22.0. The results of the analysis prove that two characteristics of technology, responsiveness and smartness have a significant effect on perceived usefulness. Ease of use has a significant effect on perceived usefulness. Ease of use, usefulness and security have a significant effect on intention to use. The higher the level of responsiveness, smartness, ease of use, perceived usefulness and security will also increase the use of T-cash social influence factors have no effect on intention to use.
...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2009-0067] RIN 0960-AH08 Transfer of Accumulated Benefit Payments AGENCY: Social Security Administration (SSA). ACTION: Final rule...
Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...
... 72 payments when you are not residing in the United States. No special payment is due you for any... special age 72 payments. 404.384 Section 404.384 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... Survivors' Insurance Benefits; Period of Disability Special Payments at Age 72 § 404.384 Reductions...
The thesis is about PCI DSS, which stands for Payment Card Industry Data Security Standard. PCI DSS represents a uniőed approach to the protection of sensitive card data and to prevention of abuses in the payment card industry. Implementation of the standard in the company provides a higher level of security, it maintains conődence, protection against abuse and consequently protection against őnancial losses and loss of reputation. When paying with credit cards, the őrst lin...
Fukaya, Kiyoyuki; Komoda, Norihisa
Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.
Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M
Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibility for making payment decisions. 404.2109 Section 404.2109 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... Provisions § 404.2109 Responsibility for making payment decisions. The Commissioner will decide— (a) Whether...
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What are State recognition payments? 408.1201 Section 408.1201 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1201 What are State...
Kasiyanto, Safari; Duchateau, Michiel; Lane, Lottie
A number of empirical studies have demonstrated that rapid development of technology and innovation in payment systems (i.e. the use of cards and electronic networks, electronic money, mobile payments and the Internet) has triggered the significant increase in retail payment transactions around the
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Delinquent payment of Customs bills. 142.26 Section 142.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... Delinquent payment of Customs bills. The following procedures shall be followed if an importer is...
Full Text Available The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in performing its obligation reflect the concrete aspect. Warranty provides protection security for related parties with some governing regulations during transaction. However, some other supporting components have not been effectively contribute to balance the utilization of technology in trading. Keywords: legal security, trading, cellphone, electronic media
Hlotov Yevhen O.
Full Text Available The article studies fixed coupon securities (bonds. It provides a calculation of the cash flow, generated by fixed coupon securities, with enclosed discounted face value of securities. It analyses time indicator – average weighted duration of payments, which characterises sensitivity of the price of securities to changes of interest rates in the market. It proves availability of two groups of interconnections between the cost of a bond, coupon rate, market rate (rate of return and term of its payment. The first group of interconnections reflects interconnections between the cost of a bond, coupon rate and market rate (rate of return. The second group characterises connection between the bond cost and term of its payment. The authors study the average weighted duration of payments. It plays an important role in analysis of long-term securities with fixed income. To simplify calculations it was accepted that the coupon payment is done once a year. The article offers a formula for identifying inaccuracy of the bond price depending on the expected change of profitability on payment. Analysing duration properties the article identifies shortcomings inherent in this indicator. Taking into account the average weighted duration of payments the article recommends a formula, as more efficient, for identification of the future bond price depending on change of profitability. The conducted studies are a theoretical ground for development of models of management of fixed income securities portfolios. The obtained scientific results could be used in the educational process both in colleges and specialised trainings of securities specialists. The scientific results could be used for developing information technologies when identifying cost of securities (fixed coupon bonds.
Singh Sambhy, Gurpreet
Information technology and payment systems have witnessed the introduction, acceptance and wide scale deployment of electronic payment systems. The payment system ecosystem has now witnessed the introduction of mobile payment systems and their associated services. Major actors involved in mobile payment systems include telecom operators, banks, merchants and consumers. They need to aggregate their resources and develop a coherent ecosystem which would help the individual actors while also ben...
... 10 Energy 4 2010-01-01 2010-01-01 false Default, demand, payment, and collateral liquidation. 609... PROJECTS THAT EMPLOY INNOVATIVE TECHNOLOGIES § 609.15 Default, demand, payment, and collateral liquidation... Guaranteed Obligation. Such assignment shall include all related liens, security, and collateral rights to...
... Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE RESEARCH, EDUCATION, AND EXTENSION... payments will be made in advance unless a deviation is accepted (see § 3430.3) or as specified in paragraph... Standard Application for Payments (ASAP) system, or another electronic funds transfer (EFT) method, except...
Supardi, Azizan; Adnan, Hamimah; Mohammad, Mohammad Fadhil
In Malaysia, the particularly small sized sub-contractors are definitely benefited from payment provisions in the proposed Construction Industry Payment and Adjudication Act (CIPA Act), but need to enhance their knowledge in order to improve their awareness of the benefits of the Act. Accordingly, this on-going research attempts to introduce proper guidelines to the sub-contractors, in giving the knowledge, to claim for payment. Firstly, the research explored the problems and legal issues rel...
Weihui Dai; Xiang Cai; Haifeng Wu; Weidong Zhao; Xuan Li
Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment c...
Full Text Available Electronic Health Record EHR systems enhance efficiency and effectiveness in handling patients information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting the system and reviewing the implemented security safeguards. The study was done at a referral hospital level 6 government facility in Kenya. Purposive sampling was used to select a sample of 196 out of 385 staff and a questionnaire designed for qualitative data collection. Data was analyzed using SPSS software. Correlations and binary logistic regression were obtained. Binary Logistic Regression BLR was used to establish the effect of the safeguards predictors on EHR security. It was established that physical security contributes more to the security of an information system than administrative controls and technical controls in that order. BLR helped in predicting effective safeguards to control EHR security threats in limited resourced public health facilities.
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Can you waive State recognition payments? 408.1230 Section 408.1230 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1230 Can you waive...
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.
Full Text Available Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. People can get information, order tickets, download songs and perform commercial transactions, called mobile commerce. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced by non-physical payments are often called electronic money (e-money. An important technology behind mobile payments is called Near Field Communication (NFC. As an indication that the NFC has tremendous business potential, leading companies like Nokia, Microsoft, Visa Inc., and MasterCard Worldwide and NXP Semiconductors, is actively engaged on them. Payment processing integrated with NFC technology based mobile operating system that is a trend today is Android that support NFC technology is version 2.3.3 Gingerbread. The prototype application is designed to pay for 2 on the user side of the user as consumer and the merchant side as a trader or seller by using the handset that already have NFC technology is Google Samsung Nexus S. Pay an application prototype also implements the concept of security in e-commerce transactions by using the protocol-to-Tag Tag so that the user needs for security and comfort during the financial transaction are met.
... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...
... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...
Abrazhevich, D.; Markopoulos, P.; Rauterberg, G.W.M.
This article describes research into online electronic payment systems, focusing on the aspects of payment systems that are critical for their acceptance by end users. Based on our earlier research and a diary study of payments with an online payment system and with online banking systems of a
Vinod, Vasudevan; Firosh, Ummer
Application Security in the ISO27001 Environment demonstrates how to secure software applications within a best practice ISO/IEC 27001 environment and supports implementation of the PCI DSS Payment Application Security Standard.
Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud
The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing
... EN payment systems? 411.595 Section 411.595 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.595 What oversight procedures are planned for the EN payment systems? We use audits, reviews, studies and observation of daily...
... DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection Customs Brokers User Fee Payment for.... SUMMARY: This document provides notice to customs brokers that the annual fee of $138 that is assessed for... 2012 in accordance with the Tax Reform Act of 1986. DATES: Payment of the 2012 Customs Broker User Fee...
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Can substitute payment procedures be used? 370.14 Section 370.14 Money and Finance: Treasury Regulations Relating to Money and Finance... FUNDS TRANSFERS RELATING TO UNITED STATES SECURITIES Credit ACH Entries § 370.14 Can substitute payment...
Full Text Available The project presented here is a first step towards building a more accessible world through Payment Systems and a successful implementation of a User Centred Design. By means of a beep-system, a Point of Sale (POS payment device informs the user of those transaction steps that require his/her attention at the moment of payment, such as when: the card has been successfully read, the Personal Identification Number (PIN must be entered, the transaction has been successfully processed and the transaction has not been completed due to an error. The proposed solution increases the personal autonomy and security of blind people when paying at a merchant.
Full Text Available Delay and loss of payment is a serious problem in the construction industry of many countries. These affect the cash flow of contractors which is critical to meeting their financial obligations. Payment defaults by the principal leads to insolvency of contractors and in turn other parts of the project chain. In recognition of some of these problems, most countries have established payment-specific construction industry legislation and other contractual measures to mitigate the problems, but nevertheless the problem persists. In this context, the paper examines the nature of payment problems in the construction industry in New Zealand. It is part of a larger study, that seeks solutions to payment losses in the construction industry.The study uses two approaches; an analysis of liquidators’ reports, and an analysis of court cases involving payment disputes to determine the magnitude of payment problems on construction parties. The findings are presented using simple descriptive and interpretive analyses. The study finds that trade creditors are impacted negatively (payment delays and losses by the liquidation of property developers, general construction and construction trade companies. 75% of trade creditors are unable to be paid fully by these categories of construction companies after liquidation proceedings. Liquidation proceedings take an average 18 months before they are finalised. The analysis of court cases found that 80% of payment disputes are between principals and contractors; with considerably significant percentage of disputes resulting in outright loss of payments. Only 40% of the cases are successful, in which case claimants are able to fully recover the amount in dispute. Payment losses are more prevalent in liquidation than delays and unlike in legal disputes, there is no security for those losses. The study finds that construction parties use remedies contained in the security of payment provisions within standard conditions
Full Text Available Delay and loss of payment is a serious problem in the construction industry of many countries. These affect the cash flow of contractors which is critical to meeting their financial obligations. Payment defaults by the principal leads to insolvency of contractors and in turn other parts of the project chain. In recognition of some of these problems, most countries have established payment-specific construction industry legislation and other contractual measures to mitigate the problems, but nevertheless the problem persists. In this context, the paper examines the nature of payment problems in the construction industry in New Zealand. It is part of a larger study, that seeks solutions to payment losses in the construction industry.The study uses two approaches; an analysis of liquidators’ reports, and an analysis of court cases involving payment disputes to determine the magnitude of payment problems on construction parties. The findings are presented using simple descriptive and interpretive analyses. The study finds that trade creditors are impacted negatively (payment delays and losses by the liquidation of property developers, general construction and construction trade companies. 75% of trade creditors are unable to be paid fully by these categories of construction companies after liquidation proceedings. Liquidation proceedings take an average 18 months before they could be finalised. The analysis of court cases found that 80% of payment disputes are between principals and contractors; with considerably significant percentage of disputes resulting in outright loss of payments. Only 40% of the cases are successful, in which case claimants are able to fully recover the amount in dispute. Payment losses are more prevalent in liquidation than delays and unlike in legal disputes, there is no security for those losses. The study finds that construction parties use remedies contained in the security of payment provisions within standard
M.E. Che Munaaim; M.S. Mohd Danuri; H. Abdul-Rahman
Some developed countries have drawn lip construction-specific statutory security of payment acts/legislations typically known as Construction Contracts Act to eliminate poor payment practices and to assist continuous uninterrupted construction works. Malaysia too cannot pretend not to have these problems. This paper presents findings of a study conducted amongst Malaysian contractors with the aims to determine the seriousness of late and non- payment problems; to identify the main causes and ...
... 408.515 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II... the first day of each month and represent payment for that month. If the first day of the month falls on a Saturday, Sunday, or Federal legal holiday, payment will be made on the first day preceding such...
Since the introduction of the Building and Construction Industry Security of Payment Act into New South Wales in 1999, construction industry payment legislation has progressively been enacted on a jurisdiction-by-jurisdiction basis throughout Australia. Of the eight Australian Acts, two distinct legislative models can be discerned – what have been termed the ‘East Coast’ and ‘West Coast’ models. This article compares the two models with respect to their payment s...
Lippincott, Christine; Foronda, Cynthia; Zdanowicz, Martin; McCabe, Brian E; Ambrosia, Todd
The objective of this study was to examine the relationship between nursing excellence and electronic health record adoption. Of 6582 US hospitals, 4939 were eligible for the Medicare Electronic Health Record Incentive Program, and 6419 were eligible for evaluation on the HIMSS Analytics Electronic Medical Record Adoption Model. Of 399 Magnet hospitals, 330 were eligible for the Medicare Electronic Health Record Incentive Program, and 393 were eligible for evaluation in the HIMSS Analytics Electronic Medical Record Adoption Model. Meaningful use attestation was defined as receipt of a Medicare Electronic Health Record Incentive Program payment. The adoption electronic health record was defined as Level 6 and/or 7 on the HIMSS Analytics Electronic Medical Record Adoption Model. Logistic regression showed that Magnet-designated hospitals were more likely attest to Meaningful Use than non-Magnet hospitals (odds ratio = 3.58, P electronic health records than non-Magnet hospitals (Level 6 only: odds ratio = 3.68, P electronic health record use, which involves earning financial incentives for successful adoption. Continued investigation is needed to examine the relationships between the quality of nursing care, electronic health record usage, financial implications, and patient outcomes.
..., whenever electronic commerce is used (i.e., EDI to request and authorize payments and electronic funds...) Expanding on these Governmentwide policies, DoD policy is for DoD Components to use electronic commerce, to... request by the administrative grants officer, when it is not possible to use electronic commerce and paper...
Waaij, B.D. van der; Siljee, B.I.J.; Broekhuijsen, B.J.; Ponsioen, C.; Maas, A.; Aten, R.M.; Hoepman, J.H.; Loon, J.H. van; Smit, M.
A method of making a payment uses a first mobile communication device (1) and a second mobile communication device (2), each mobile communication device being provided with a respective near field communication unit (11, 21) and at least one of the mobile communication devices being provided with an
Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui
A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.
... TRANSPORTATION GENERAL RULES AND REGULATIONS DEBT COLLECTION Administrative Collection of Claims § 1018.29... debt payment in the event the debtor defaults. If the debtor's financial statement discloses the ownership of assets which are free and clear of liens or security interests, or assets in which the debtor...
Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...
Full Text Available Performing payment transactions over the Internet is becoming increasingly important. Whenever one interacts with others, he or she faces the problem of uncertainty because in interacting with others, one makes him or herself vulnerable, i.e. one can be betrayed. Thus, perceived risk and confidence are of fundamental importance in electronic payment transactions. A higher risk leads to greater hesitance about entering into a business relationship with a high degree of uncertainty; and therefore, to an increased need for confidence. This paper has two objectives. First, it aims to introduce and test a theoretical model that predicts consumer and merchant acceptance of the Internet payment solution by explaining the complex set of relationships among the key factors influencing confidence in electronic payment transactions. Second, the paper attempts to shed light on the complex interrelationship among confidence, control and perceived risk. An empirical study was conducted to test the proposed model using data from consumers and merchants in Slovenia. The results show how perceived risk dimensions and post-transaction control influence consumer’s and merchant’s confidence in electronic payment transactions, and the impact of confidence on the adoption of mass-market on-line payment solutions.
Full Text Available Security of data is critical to the operations of firms. Without the ability to store, process and transmit data securely, operations may be compromised, with the potential for serious consequences to trading integrity. Thus the role that electronically-mediated working plays in business today and its dependency on data security is of critical interest, especially in light of the fact that much of this communication is based on the use of open networks (i.e. the Internet. This paper discusses findings from a ‘WestFocus’ survey on electronically-mediated working and telework amongst a sample of SMEs located in West London and adjacent counties in South-Eastern England in order to highlight the problems that such practice raises in terms of data security. Data collection involved a telephone survey undertaken in early 2006 of 378 firms classified into four industrial sectors (‘Media’, ‘Logistics’, ‘Internet Services’ and ‘Food Processing’. After establishing how ICTs and the Internet are being exploited as business applications for small firms, data security practice is explored on the basis of sector and size with a focus on telework. The paper goes on to highlight areas of concern in terms of data security policy and training practice. Findings show some sector and size influences.
Full Text Available In a culture of fear, everyday life is experienced through the feeling of safety, part of which can be secured through certain electronic home security systems. Three films – Unlawful Entry (1992, Panic Room (2002 and When a Stranger Calls (2006 – will be used as examples in the attempt to consider the relationship between the fear of criminal activity – in this case break ins – and electronic home security systems. The basic premise of the research is that the culturally manufactured fear encourages the electronic home security system industry, the presence of which can, in turn, exasperate one’s fear of the risk of falling victim to violent crime.
Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...
Shmueli, Amir; Israeli, Avi
Compared to OECD countries, Israel has a remarkably low percentage of GDP and of government expenditure spent on health, which are not reflected in worse national outcomes. Israel is also characterized by a relatively high share of GDP spent on security expenses and payment of public debt. To determine to what extent differences between Israel and the OECD countries in security expenses and payment of the public debt might account for the gaps in the percentage of GDP and of government expenditures spent on health. We compare the percentages of GDP and of government expenditures spent on health in the OECD countries with the respective percentages when using primary civilian GDP and government expenditures (i.e., when security expenses and interest payment are deducted). We compared Israel with the OECD average and examined the ranking of the OECD countries under the two measures over time. While as a percentage of GDP, the national expenditure on health in Israel was well below the average of the OECD countries, as a percentage of primary civilian GDP it was above the average until 2003 and below the average thereafter. When the OECD countries were ranked according to decreasing percent of GDP and of government expenditure spent on health, adjusting for security and debt payment expenditures changed the Israeli rank from 23rd to 17th and from 27th to 25th, respectively. Adjusting for security expenditures and interest payment, Israel's low spending on health as a percentage of GDP and as a percentage of government's spending increases and is closer to the OECD average. Further analysis should explore the effect of additional population and macroeconomic differences on the remaining gaps.
... recognition payment program? 408.1205 Section 408.1205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1205 How can a State have SSA administer its State recognition payment program? A State (or...
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Cases of delay or suspension of payment. 357.30 Section 357.30 Money and Finance: Treasury Regulations Relating to Money and Finance... Securities System (Legacy Treasury Direct) § 357.30 Cases of delay or suspension of payment. If evidence...
王茜; 王富强; 傅鹤岗; 朱庆生
In the system of electronic payment based on SPKI, access control of bank acts as the important function of identification, protecting customer's privacy and ensuring payment. The paper proposes the model of bank access control, and describes the frame and the steps of the access control. Finally, the paper analyzes the characteristics of the model.
Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun
With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment.
Full Text Available With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people’s awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people’s awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people’s cognition of potential risks in online financial payment.
Full Text Available Given that each Member State of the European Union had its own regulation in the matter of payments, the European Commission considered it necessary to adopt an uniform legislation in this regard. Consequently was adopted Directive 2007/64/EC of the European Parliament and of the Council which regulated payment services in the EU and the EEA (European Economic Area. In virtue of the obligation to transpose into the national law the provisions of this Directive, with effect from November 1, 2009 Romania adopted the Emergency Ordinance no. 113/2009 which regulated its own legislation on the provisions of Directive 2007/64/EC. Given the experience gained so far, considering the technological opportunities in the matter of payments and the change in habits of payment of the EU citizens and not only, in conjunction with the development of electronic commerce and increasing facilities offered by the payment service providers in the field of payments via mobile terminals, it has been concluded that provisions of Directive 2007/64/EC are largely overcome by the technological evolution. Wishing to maintain the regulations in the matter of payment services at the current technological level to guarantee the security of payment operations at the same time with the adaptation of the market of EU payments to the opportunities offered by the single market and simultaneously with supporting the EU economy growth, the European Commission has adopted a package of measures which include both a new directive relating to services of payment as well as a proposal for a regulation on inter-bank fees for card payments. The purpose of the regulation is the transparency of bank information on payment services; creating a single legal framework at the EU and EEA level in the matter of payment services and the protection of payment service consumers. The new regulation applies not only to payment transactions in the EU or EEA but also to payments made or received to
... RELATIONS SYSTEMS (DEPARTMENT OF DEFENSE-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF DEFENSE NATIONAL SECURITY PERSONNEL SYSTEM (NSPS) Pay and Pay Administration Performance-Based Pay § 9901.344 Other... officials may make other performance payments to— (1) Reward extraordinary individual performance, as...
... Section 9701.363 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT... HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Special Payments § 9701.363 Special... serving in positions for which DHS is experiencing or anticipates significant recruitment and/or retention...
Sammicheli, Michele; Scaglione, Marcella
We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.
... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...
The Healthcare Financial Management Association through its Principles and Practices (P&P) Board publishes issue analyses to provide short-term practical assistance on emerging issues in healthcare financial management. In a new issue analysis excerpted in this article, HFMA's P&P Board provides some clarity to the healthcare industry on certain accounting and reporting issues resulting from incentive payments under the Medicare program for the meaningful use of electronic health record (EHR) technology. Consultation on these matters with independent auditors is highly recommended.
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false No payment of interest from unemployment fund... LABOR TAX CREDITS UNDER THE FEDERAL UNEMPLOYMENT TAX ACT; ADVANCES UNDER TITLE XII OF THE SOCIAL SECURITY ACT Interest on Advances § 606.33 No payment of interest from unemployment fund. [Reserved] ...
Korobeynikova Olga Mikhaylovna
Full Text Available The article deals with the analysis of payment systems aimed at identifying the categorical terminological apparatus, proving their specific features and revealing the impact of payment systems on the state of money turnover. On the basis of the subject analysis, the author formulates the definitions of a payment system (characterized by increasing speed of effecting payments, by the reduction of costs, by high degree of payments convenience for subjects of transactions, by security of payments, by acceptable level of risks and by social efficiency, a national payment system, and a local payment system (characterized by the growth of economic and social efficiency of systems participants, by the process of money turnover optimization on the basis of saving transaction costs and increasing speed of money flows within the local payment systems. According to the economic levels, the payment systems are divided to macrosystems (national payment systems, mezosystems (payment systems localized on the operational and territorial basis, microsystems (payments by individual economic subjects. The establishment of qualitative features of payment systems, which is a basis of the author’s terminological interpretation, gave a possibility to reveal the cause-effect relations of payment systems influence on the state of money turnover in the involved subjects, and on the economy as a whole. The result of the present research consists in revealing the payment systems influence on the state of money turnover which is significant: at the state and regional level – in the optimization of budget and inter-budgetary relations, in acceleration of the money turnover, in deceleration of the money supply and inflation rate, in reduced need in money emission; at the level of economic entities – in accelerating the money turnover and accounts receivable, in the reduction of debit and credit loans, in the growth of profit (turnover; at the household level – in
Meletiadou, Anastasia; Grimm, Rüdiger
Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.
Full Text Available Abstract Background Compared to OECD countries, Israel has a remarkably low percentage of GDP and of government expenditure spent on health, which are not reflected in worse national outcomes. Israel is also characterized by a relatively high share of GDP spent on security expenses and payment of public debt. Objectives To determine to what extent differences between Israel and the OECD countries in security expenses and payment of the public debt might account for the gaps in the percentage of GDP and of government expenditures spent on health. Methods We compare the percentages of GDP and of government expenditures spent on health in the OECD countries with the respective percentages when using primary civilian GDP and government expenditures (i.e., when security expenses and interest payment are deducted. We compared Israel with the OECD average and examined the ranking of the OECD countries under the two measures over time. Results While as a percentage of GDP, the national expenditure on health in Israel was well below the average of the OECD countries, as a percentage of primary civilian GDP it was above the average until 2003 and below the average thereafter. When the OECD countries were ranked according to decreasing percent of GDP and of government expenditure spent on health, adjusting for security and debt payment expenditures changed the Israeli rank from 23rd to 17th and from 27th to 25th, respectively. Conclusions Adjusting for security expenditures and interest payment, Israel's low spending on health as a percentage of GDP and as a percentage of government's spending increases and is closer to the OECD average. Further analysis should explore the effect of additional population and macroeconomic differences on the remaining gaps.
van 't Noordende, G.
In this article, we analyze the security architecture of the Dutch Electronic Patient Dossier (EPD) system. Intended as a mandatory infrastructure for exchanging medical records of most if not all patients in the Netherlands among authorized parties (particularly, physicians), the EPD has to address
... contract payments upon finding of fraud. 3032.006 Section 3032.006 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL CONTRACTING... finding of fraud. ...
Hlavním zaměřením diplomové práce je elektronické bankovnictví a jeho bezpečnost. Práce obsahuje zhodnocení současného stavu zabezpečení elektronického bankovnictví, možné hrozby napadení elektronického bankovnictví a rizika prolomení zabezpečení. Další část vyhodnocuje dotazník, který zjišťoval spokojenost uživatelů s bezpečností elektronického bankovnictví. Jsou doporučeny nové formy zabezpečení. The main focus of the thesis is an electronic banking and security. The work includes evalua...
Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.
Robichau, Bernard Peter
Healthcare is a huge market--20% of yearly GDP in the U.S. It employs tens of thousands of computer programmers and IT administrators Regulations mandate electronic health records by 2015 (for anyone dealing with Medicare/Medicaid), which means new concerns for privacy and security Many medical organizations lagging, putting them at risk for government fines and private lawsuits when a breach in security occurs. Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge.
The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, a case study where we apply the proposed model, a new scheme for remote electronic voting, and three case studies of commercial online banking solutions in Norway.
... 40 Cigars and cigarettes, Claims, Electronic fund transfers, Excise taxes, Labeling, Packaging and... that are not required to pay taxes through electronic funds transfer (EFT), this first payment period..., Electronic funds transfers, Excise taxes, Exports, Food additives, Fruit juices, Labeling, Liquors, Packaging...
Full Text Available It is permissible to use reliefs in the payment of social security contributions, based either on a definitive waiver by the creditor of the whole or relevant part of the amount due (partial or complete remission or only a temporary waiver of such amounts (payment deferral or payment in installments. The use of such reliefs is possible upon the occurrence of conditions laid down in the Act, for example, in the case of total non-recovery of contributions, for economic or other reasons worth considering, if justified by important interests of the person concerned. The prerequisites mentioned above have a nature of general clauses, allowing for their flexible adjustment to specific situations. Entities authorized to grant reliefs in the payment of social security contributions act within the limits of administrative discretion. But it is not a fully free operation, because the economic impact resulting from the use of such reliefs has a direct impact on the financial balance of earmarked funds which finance social security benefits, in particular pensions, disability allowances and other benefits.
Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.
In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.
Mobile payment (MP) is crucial for, but not limited to mobile commerce. The key to mobile payment acceptance is in the hands of customers. In this paper we examine the conditions for acceptance and actual usage of MP procedures by the customer. We identify essential conditions which belong to the categories costs, security and convenience. Different preferences lead to an individual set of essential conditions for any single user. We propose a scheme for their representation and comparison an...
..., Surety bonds, Virgin Islands, Warehouses. 27 CFR Part 40 Cigars and cigarettes, Claims, Electronic fund... required to pay taxes through electronic funds transfer (EFT), this first payment period ends on September... Part 19 Caribbean Basin Initiative, Claims, Electronic funds transfers, Excise taxes, Exports, Gasohol...
... administer its recognition payment program? 408.1235 Section 408.1235 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1235 How does the State transfer funds to SSA to administer its recognition payment program...
Social Security Administration — A statistical table of the number of recipients entitled to receive payments under Title 16 of the Social Security Act (Supplemental Security Income) by eligibility...
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial security. 1421.404 Section 1421.404...-MARKETING ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 Designated Marketing Associations for Peanuts § 1421.404 Financial security. In order to be approved to handle loans and loan...
... Requirements for gift cards and gift certificates. Appendix A to Part 1005--Model Disclosure Clauses and Forms... financial institution to a consumer to defer payment of debt, incur debt and defer its payment, or purchase... purchase or sale of a security or commodity, if the security or commodity is: (i) Regulated by the...
The past thirty years have seen rapid advances in the technological component of banking services and as a consequence new legal issues have come to the fore, especially with regard to Electronic Fund Transfers (EFTs) which are now used to transfer money around the world, and have made fund transactions between payers and payees easier, faster and more secure. The method involves risks for both banks and customers, due to the possibility of unauthorized payments risks, credit and insolvency p...
...The final rule with comment period in this document revises the Medicare hospital outpatient prospective payment system (OPPS) to implement applicable statutory requirements and changes arising from our continuing experience with this system and to implement certain provisions of the Patient Protection and Affordable Care Act, as amended by the Health Care and Education Reconciliation Act of 2010 (Affordable Care Act). In this final rule with comment period, we describe the changes to the amounts and factors used to determine the payment rates for Medicare hospital outpatient services paid under the prospective payment system. These changes are applicable to services furnished on or after January 1, 2011. In addition, this final rule with comment period updates the revised Medicare ambulatory surgical center (ASC) payment system to implement applicable statutory requirements and changes arising from our continuing experience with this system and to implement certain provisions of the Affordable Care Act. In this final rule with comment period, we set forth the applicable relative payment weights and amounts for services furnished in ASCs, specific HCPCS codes to which these changes apply, and other pertinent ratesetting information for the CY 2011 ASC payment system. These changes are applicable to services furnished on or after January 1, 2011. In this document, we also are including two final rules that implement provisions of the Affordable Care Act relating to payments to hospitals for direct graduate medical education (GME) and indirect medical education (IME) costs; and new limitations on certain physician referrals to hospitals in which they have an ownership or investment interest. In the interim final rule with comment period that is included in this document, we are changing the effective date for otherwise eligible hospitals and critical access hospitals that have been reclassified from urban to rural under section 1886(d)(8)(E) of the Social Security
Furnell, S. M.; Karweni, T.
Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…
Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...
Elhai, Jon D; Frueh, B Christopher
The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.
Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun
We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.
The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...
Aswari, Aan; Pasamai, Syamsudin; Qomar, Nurul; Abbas, Ilham
The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...
Bergmo, Trine Strand; Wangberg, Silje Camilla
Despite the common use of electronic communication in other aspects of everyday life, its use between patients and health care providers has been slow to diffuse. Possible explanations are security issues and lack of payment mechanisms. This study investigated how patients value secure electronic access to their general practitioner (GP). One hundred and ninety-nine patients were asked an open-ended willingness-to-pay (WTP) question as part of a randomised controlled trial. We compared the WTP values between two groups of respondents; one group had had the opportunity to communicate electronically with their GP for a year and the other group had not. Fifty-two percent of the total sample was willing to pay for electronic GP contact. The group of patients with access revealed a significantly lower WTP than the group without such access. Possible explanations are that the system had fewer benefits than expected, a presence of hypothetical bias or simply a preference for face-to-face encounters.
... delinquencies; (2) non-payment related defaults; (3) unscheduled draws on debt service reserves reflecting... to statistics assembled by the Securities Industry and Financial Markets Association (``SIFMA''), the....org/uploadedFiles/Research/Statistics/SIFMA_USMunicipalSecuritiesHolders.pdf ) (``SIFMA Report''). As...
...-value cards (including gift cards). All of these provisions are retained in the final regulations... statutory definition are met. Electronic benefit transactions for the purchase of goods or services, made on... goods or services to (1) send a purchase invoice electronically to customers; and (2) accept payment...
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Authorized cash payments. 321.7 Section 321.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... registration on the front of the security, or by a person authorized or empowered to act for a corporate legal...
Security, privacy and ethics in electronic records management in the South African public sector. ... Computers have become such valuable tools for conducting business ... One great advantage of the computers is the ease with which a large
... of securities transactions. (a) A bank shall not effect or enter into a contract for the purchase or... for payment of funds and delivery of securities later than the third business day after the date of... offering. A bank shall not effect or enter into a contract for the purchase or sale of the securities that...
Pousttchi, Key; Zenker, M.
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the most relevant acceptance criteria. The outcome of the paper is an evaluation scheme containing the covered payment scenarios, important main criteria (security, costs and convenience) and additional functionality requirements for each MP procedure. The scheme is based on empirical results and can assess a given MP proce...
Chiu, Yu-Chan; Smith, Katherine Clegg; Morlock, Laura; Wissow, Lawrence
The Taiwanese practice of patients giving informal payments to physicians to secure services is deeply rooted in social and cultural factors. This study examines the portrayal of informal payments by Taiwanese print news media over a period of 12 years-from prior to until after the implementation of national health insurance (NHI) in Taiwan in 1995. The goal of the study was to examine how the advent of NHI changed the rationale for and use of informal payments. Both before and after the introduction of NHI, Taiwanese newspapers portrayed informal payments as appropriate means to secure access to better health care. Newspaper accounts established that, although NHI reduced patients' financial barriers to care, it did not change deeply held cultural beliefs that good care depended on the development of a reciprocal sense of obligation between patients and physicians. Physicians may have also encouraged the ongoing use of informal payments to make up revenue lost when NHI standardized fees and limited income from dispensing medications. In 2002, seven years after the implementation of NHI, the use of informal payments, though illegal, was still being justified in the print media through allusions to its role in traditional Taiwanese culture.
Panettieri, Joseph C.
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
... Federal Reserve Bank without the owner's signature to the request for payment, if the bond bears the... attorney-in-fact to sell or redeem the grantor's securities, sell his or her personal property, or... be affected by the subsequent incompetence or incapacity of the grantor. Medical evidence or other...
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Payment of final assessment. 785.19 Section 785.19 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS ENFORCEMENT § 785...
Full Text Available Payment delays and losses persist in the construction industry and continue to be a key concern to industry practitioners. Therefore an exploration of the key causes of payment delays and losses is undertaken in this study with the ultimate objective of seeking mitigating solutions. The study adopted a survey approach using an online questionnaire, administered to practitioners from the New Zealand construction industry, comprising consultants, head contractors and subcontractors. The data obtained was analysed using inferential statistical techniques, including comparing means and factor analysis. Factor analysis enabled clustering of the inter-related causes of payment delays and losses in order to find reduced number of causes. Accordingly, the study found that payment problems mainly relate to contractual issues, financial strength of industry players, disputes, short-comings of payment processes and ‘domino effects’. Among them, the financial strength of critical industry players was considered central to payment problems. The study concludes that any solution to these problems must address these primary causes, as a rational starting point. Thus procuring a feasible form of financial security at the outset of a project, and the pre-qualification of the financial status of critical project participants, were found to be significant in the mitigation of construction payment risks. Paper Type: Research article
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Payment by Governmentwide commercial purchase card. 1332.1108 Section 1332.1108 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 1332.1108 Payment by...
Full Text Available Since the introduction of the Building and Construction Industry Security of Payment Act into New South Wales in 1999, construction industry payment legislation has progressively been enacted on a jurisdiction-by-jurisdiction basis throughout Australia. Of the eight Australian Acts, two distinct legislative models can be discerned – what have been termed the ‘East Coast’ and ‘West Coast’ models. This article compares the two models with respect to their payment systems and adjudication schemes, procedural justice afforded, incursion upon freedom of contract, uptake rates and efficiency. From this comparison, the strengths and weaknesses of the two models are identified. Finally, a dual process of adjudication based on progress payment claim size is proposed for a harmonised model, developed from previous proposals put forward by other authors, which aims to combine the strengths of the two existing models.
Medicare Program; Hospital Inpatient Prospective Payment Systems for Acute Care Hospitals and the Long-Term Care Hospital Prospective Payment System and Policy Changes and Fiscal Year 2018 Rates; Quality Reporting Requirements for Specific Providers; Medicare and Medicaid Electronic Health Record (EHR)
We are revising the Medicare hospital inpatient prospective payment systems (IPPS) for operating and capital-related costs of acute care hospitals to implement changes arising from our continuing experience with these systems for FY 2018. Some of these changes implement certain statutory provisions contained in the Pathway for Sustainable Growth Rate (SGR) Reform Act of 2013, the Improving Medicare Post-Acute Care Transformation Act of 2014, the Medicare Access and CHIP Reauthorization Act of 2015, the 21st Century Cures Act, and other legislation. We also are making changes relating to the provider-based status of Indian Health Service (IHS) and Tribal facilities and organizations and to the low-volume hospital payment adjustment for hospitals operated by the IHS or a Tribe. In addition, we are providing the market basket update that will apply to the rate-of-increase limits for certain hospitals excluded from the IPPS that are paid on a reasonable cost basis subject to these limits for FY 2018. We are updating the payment policies and the annual payment rates for the Medicare prospective payment system (PPS) for inpatient hospital services provided by long-term care hospitals (LTCHs) for FY 2018. In addition, we are establishing new requirements or revising existing requirements for quality reporting by specific Medicare providers (acute care hospitals, PPS-exempt cancer hospitals, LTCHs, and inpatient psychiatric facilities). We also are establishing new requirements or revising existing requirements for eligible professionals (EPs), eligible hospitals, and critical access hospitals (CAHs) participating in the Medicare and Medicaid Electronic Health Record (EHR) Incentive Programs. We are updating policies relating to the Hospital Value-Based Purchasing (VBP) Program, the Hospital Readmissions Reduction Program, and the Hospital-Acquired Condition (HAC) Reduction Program. We also are making changes relating to transparency of accrediting organization survey
van 't Noordende, G.
In this article, we analyze the security architecture of the Dutch Electronic Patient Dossier (EPD) system. Intended as a national infrastructure for exchanging medical patient records among authorized parties (particularly, physicians), the EPD has to address a number of requirements, ranging from
Full Text Available With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.
M.E. Che Munaaim
Full Text Available Some developed countries have drawn lip construction-specific statutory security of payment acts/legislations typically known as Construction Contracts Act to eliminate poor payment practices and to assist continuous uninterrupted construction works. Malaysia too cannot pretend not to have these problems. This paper presents findings of a study conducted amongst Malaysian contractors with the aims to determine the seriousness of late and non- payment problems; to identify the main causes and effects of late and non-payment; and to identify ways to sustain the payment flows in the Malaysian construction industry. The study focused on contractual payments from the paymaster (government or private to the contractors. The main factors for late and nonpayment in the construction industry identified from the study include: delay in certification, paymaster's poor financial management, local culture/attitude, pay master's failure to implement good governance in business, underpayment of certified amounts by the pay master and the use of 'pay when paid' clauses in contracts. The research findings show that late and non-payment can create cash flow problems, stress and financial hardship on the contractors. Amongst the most appropriate solutions to overcome the problem of late and non-payment faced by local contractors include: a right to regular periodic payment, a right to a defined time frame (or payment and a right to a speedy dispute resolution mechanism. Promptness of submitting, processing, issuing interim payment certificates and honouring the certificates are extremely important issues in relation to progress payment claims. Perhaps, an increased sense of professionalism in construction industry could overcome some of the problems related to late and non- payment issues.
Yang, Che-Ming; Lin, Herng-Ching; Chang, Polun; Jian, Wen-Shan
The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world including Health Insurance Portability and Accountability Act (HIPAA) of the U.S. The trend of a centralized bill that focuses on managing computerized health information is the part that needs our further attention. Under the sponsor of Taiwan's Department of Health (DOH), our expert panel drafted the "Medical Information Security and Privacy Protection Guidelines", which identifies nine principles and entails 12 articles, in the hope that medical organizations will have an effective reference in how to manage their medical information in a confidential and secured fashion especially in electronic transactions.
Rapp, Hermann; Parisi, Cristiana
centuries old business practices in the investment industry. This study focuses on CREST, a leading settlement infrastructure that facilitated the leap from paper-based to electronic post-trading in London. In 1993 it started as a project of the Bank of England, and today, CREST is operated by Euroclear......Over recent decades, securities post-trading has seen a radical change from paper-based to electronic procedures. Technological advances have facilitated digitisation as a global trend. While in the investment industry technology has also been a key driver for financial automation since the late...... United Kingdom & Ireland (EUI). Research objectives of this study are to investigate the industry context, how the CREST project was managed and introduced at a time of crisis, how the technology was designed, and its impact on financial markets and today’s UK and European infrastructure. Twenty...
Andriole, Katherine P
The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients' private information confidential while allowing providers access to and maintaining the integrity of relevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today's electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.
Mawarrini, Robertta Indira
This research aims to identify disruptive mobile payment in Indonesia. Mobile payment as a sector of financial technology is enabling the lifestyle transformation of electronic banking. The future of retail banking is a smartphone experience that gladden and customers also aspire for a “bank in my pocket”. Mobile payment as the second sector most likely to be disrupted in the intersection of finance and technology industry. The promising approach of disruptive innovations is proposed by Profe...
... Department's e-Commerce Internet site. Access to this service is provided at http://hazmat.dot.gov/regs... Registration Fee,” or by completing an authorization for payment by credit card or other electronic means of...
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Delinquent payment of Customs bills. 142.14 Section 142.14 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... of Customs bills. The following procedure shall be followed if an importer is substantially or...
Gabriela GHEORGHE; Ioana LUPASC
In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.
Kang, Jun; Cai, Lecai; Li, Hongchan
With the developing of the agricultural information, it is inevitable trend of the development of agricultural electronic commercial affairs. On the basis of existing study on the development application model of e-commerce, combined with the character of the agricultural information, compared with the developing model from the theory and reality, a new development model electronic commerce of regional agriculture base on the government is put up, and such key issues as problems of the security applications, payment mode, sharing mechanisms, and legal protection are analyzed, etc. The among coordination mechanism of the region is discussed on, it is significance for regulating the development of agricultural e-commerce and promoting the regional economical development.
... award, guaranty of cost, and partial payments for bridges eligible for funding under the Truman-Hobbs... SECURITY BRIDGES ALTERATION OF UNREASONABLY OBSTRUCTIVE BRIDGES § 116.45 Submission of bids, approval of award, guaranty of cost, and partial payments for bridges eligible for funding under the Truman-Hobbs...
... affecting your SVB payment status? 408.820 Section 408.820 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Suspensions and Terminations Termination § 408... (subject to the effects of intervening events on the payment which are not appealed within 10 days of...
... (see § 107.570). (4) Equity investing, as set forth in this paragraph (b)(4). If you issue Participating Securities, you must invest an amount equal to the Original Issue Price of such securities solely... Securities—Prioritized Payments, Adjustments, and Profit Participation. When you issue Participating...
Medicare Program; Merit-Based Incentive Payment System (MIPS) and Alternative Payment Model (APM) Incentive Under the Physician Fee Schedule, and Criteria for Physician-Focused Payment Models. Final rule with comment period.
The Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) repeals the Medicare sustainable growth rate (SGR) methodology for updates to the physician fee schedule (PFS) and replaces it with a new approach to payment called the Quality Payment Program that rewards the delivery of high-quality patient care through two avenues: Advanced Alternative Payment Models (Advanced APMs) and the Merit-based Incentive Payment System (MIPS) for eligible clinicians or groups under the PFS. This final rule with comment period establishes incentives for participation in certain alternative payment models (APMs) and includes the criteria for use by the Physician-Focused Payment Model Technical Advisory Committee (PTAC) in making comments and recommendations on physician-focused payment models (PFPMs). Alternative Payment Models are payment approaches, developed in partnership with the clinician community, that provide added incentives to deliver high-quality and cost-efficient care. APMs can apply to a specific clinical condition, a care episode, or a population. This final rule with comment period also establishes the MIPS, a new program for certain Medicare-enrolled practitioners. MIPS will consolidate components of three existing programs, the Physician Quality Reporting System (PQRS), the Physician Value-based Payment Modifier (VM), and the Medicare Electronic Health Record (EHR) Incentive Program for Eligible Professionals (EPs), and will continue the focus on quality, cost, and use of certified EHR technology (CEHRT) in a cohesive program that avoids redundancies. In this final rule with comment period we have rebranded key terminology based on feedback from stakeholders, with the goal of selecting terms that will be more easily identified and understood by our stakeholders.
Full Text Available In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.
Full Text Available The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management and personal ubiquitous authentication. The multimodal technique uses both fingerprint micro features (minutiae and fingerprint macro features (singularity points for robust user authentication. To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on the same device, so that all critical information (e.g. biometric data, account transactions and cryptographic keys, are managed and stored inside the sensor, without any data transmission. The sensor has been prototyped using the Celoxica RC203E board, achieving fast execution time, low working frequency, and good recognition performance.
It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search
It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)
Uganda; Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on the following topics: Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, and Payment Systems
International Monetary Fund
This paper presents findings of Uganda’s Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, Insurance Regulation, Corporate Governance, and Payment Systems. The banking system in Uganda, which dominates the financial system, is fundamentally sound, more resilient than in the past, and currently poses no threat to macroeconomic stability. A major disruption ...
... payments. 416.2090 Section 416.2090 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL... by SSA on behalf of the State, and administration fees owed to SSA, respectively. (b) Accounting of... balance of the State's cash on deposit with SSA. (2) SSA shall provide an accounting of State funds...
Vijay Laxmi Kalyani; Parmeet Kour; Peram Navya
Abstract: Nowadays electronics is everywhere and we are surrounded with electronic gazettes many of them are helping us in maintaining security at various places, there are many security problems faced by banks, homes etc. Without proper and strong security a vault can be penetrated. A security system is used in residential, commercial, industrial, Medical and Militaries as well as personal protection. In this paper we are discussing about the various electronic security sensor devices and te...
Ma Cecilia Catubig
Full Text Available This paper evaluates current payment schemes employed by the Pantawid Pamilyang Pilipino Program (4Ps in the Philippines using six assessment criteria: transaction cost, security/risks, speed and timeliness, acceptability, resilience and flexibility. Employing data collected at the regional level, we establish four main findings: (1 all 4Ps payment conduits present trade-offs; (2 a payment approach that uses mainstream financial infrastructure is beneficial if cost, speed and simplicity of the payment system are critical; (3 competition for 4Ps contracts for Payment Service Providers (PSPs has improved the quality of payment services and minimized costs; and (4 the efficiency of the program is greatly influenced by the commitment of the PSP to deliver the cash benefits to the recipients in a timely manner rather than by maximizing conduit branches.
Hudson, Mark E
Use of budget-based payment methodologies (capitation and episode-based bundled payment) has been demonstrated to drive value in healthcare delivery. With a focus on high-volume, high-cost surgical procedures, inclusion of anaesthesiology services in these methodologies is likely. This review provides a summary of budget-based payment methodologies and practical information necessary for anaesthesiologists to prepare for participation in these programmes. Although few examples of anaesthesiologists' participation in these models exist, an understanding of the structure of these programmes and opportunities for participation are available. Prospective preparation in developing anaesthesiology-specific bundled payment profiles and early participation in pathway development associated with selected episodes of care are essential for successful participation as a gainsharing partner. With significant opportunity to contribute to care coordination and cost management, anaesthesiology can play an important role in budget-based payment programmes and should expect to participate as full gainsharing partners. Precise costing methodologies and accurate economic modelling, along with identification of quality management and cost control opportunities, will help identify participation opportunities and appropriate payment and gainsharing agreements. Anaesthesiology-specific examples with budget-based payment models are needed to help guide increased participation in these programmes.
张峰; 秦志光; 刘锦德; 张险峰
Electronic commerce operates relying on the open Internet. Security architecture for e-commerce becomes the key point to its use prosperously. A finite automation of typical e-commerce model is presented in this paper. The finite automation simulates typical trade system, describes its states transition and supplies a theory basis for designing security architecture for e-commerce. Then security threats and corresponding solutions to the model are discussed. Finally, the security architecture for e-commerce is given. All of them are used as basis for further e-commerce security research.
Saha, Amal; Sanyal, Sugata
After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...
Medicare Program; Advancing Care Coordination Through Episode Payment Models (EPMs); Cardiac Rehabilitation Incentive Payment Model; and Changes to the Comprehensive Care for Joint Replacement Model (CJR). Final rule.
This final rule implements three new Medicare Parts A and B episode payment models, a Cardiac Rehabilitation (CR) Incentive Payment model and modifications to the existing Comprehensive Care for Joint Replacement model under section 1115A of the Social Security Act. Acute care hospitals in certain selected geographic areas will participate in retrospective episode payment models targeting care for Medicare fee-forservice beneficiaries receiving services during acute myocardial infarction, coronary artery bypass graft, and surgical hip/femur fracture treatment episodes. All related care within 90 days of hospital discharge will be included in the episode of care. We believe these models will further our goals of improving the efficiency and quality of care for Medicare beneficiaries receiving care for these common clinical conditions and procedures.
... tax. 46.233 Section 46.233 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...) Electronic funds transfer. If the dealer pays any other excise taxes collected by TTB by electronic funds transfer, then the dealer must also send the payment for the floor stocks tax by an electronic funds...
Dubovitskaya, Alevtina; Xu, Zhigang; Ryu, Samuel; Schumacher, Michael; Wang, Fusheng
Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthc...
... the pollution fund. 153.407 Section 153.407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION CONTROL OF POLLUTION BY OIL AND HAZARDOUS SUBSTANCES, DISCHARGE REMOVAL Administration of the Pollution Fund § 153.407 Payments or reimbursements from the pollution fund...
... Governments If A State Fails to Make Timely Payments-for Wages Paid Prior to 1987 § 404.1267 Failure to make... to the State under the other provision of the Social Security Act. [53 FR 32976, Aug. 29, 1988, as... paid prior to 1987. 404.1267 Section 404.1267 Employees' Benefits SOCIAL SECURITY ADMINISTRATION...
Hoepman, J.H.; Siljee, B.I.J.
For applications like mobile payments for which the use of NFC technology is considered, security is of paramount importance. This whitepaper discusses the main risks associated with using NFC technology, and the possible countermeasures that can be used to mitigate those risks.
Barber, Robert L
How effectively you manage the revenue cycle is reflected in the cycle's outcome-whether you receive full and timely payment for all services billed to payers. To ensure prompt and full payment, you should: Educate your patient financial services (PFS) staff on all relevant laws and regulations regarding payment for healthcare services. Make sure your staff is well versed in all of the provisions of your payer contracts. Implement a state-of-the-art patient accounting system that is capable of producing drill-down reports of all aspects of contract performance by payer. Enforce payer compliance by maintaining complete records of dates of service, final billing dates, dates claims were mailed or electronically submitted to the payer, all actions performed by your staff regarding claims, and all communications with the payer.
... processed security transactions, including securities that were purchased as gifts and securities that have... to purchase a certificate of indebtedness is later reversed? 363.143 Section 363.143 Money and... Indebtedness § 363.143 What happens if an ACH payment used to purchase a certificate of indebtedness is later...
Luis Martínez López
Full Text Available The electronic commerce (e-commerce in Internet arose at the end of the 90s as a transforming element of the society in the 21st century. Even though the evolution of the electronic commerce has been important, it has not reached the initial expectations. The lack of tools to support the users' confidence about the new model of commerce through computer networks has been an important problem for its growth. Fortunately, the appearance of technologies and electronic payment systems offer users security and integrity guarantees to carry out electronic transactions. Nevertheless, the lack of confidence keeps being the main barrier (not technical but psychological to achieve the success of the e-commerce. In this paper, we review the three main secure payment protocols in e-commerce, SSL (Secure Sockets Layer, SET (Secure Electronic Transaction and 3D Secure, with the aim of removing any doubt about the lack of security in the electronic commercial transactions.
Yehualashet, Yared G; Wadda, Alieu; Agblewonu, Koffi B; Zhema, Theophilus; Ibrahim, Al-Asi A; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G; Nsubuga, Peter; Ashogbon, Daniel
Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM partners introduced mobile payment to
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendati
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Cash payments for client... for client solicitations. (a) It shall be unlawful for any investment adviser required to be... client at the time of the solicitation or referral; or (iii) Other than a solicitor specified in...
Holst, Jacques; Kjeldsen, Martin; Hedman, Jonas
Over the last decade, we have witnessed payment innovations that fundamentally have changed the ways we pay. Payment innovations, such as mobile payments and on-line banking, include characteristics or features that are essential to understand if we want to know how and why payers choose among...... payment innovations. Using the Repertory Grid technique to explore 15 payers’ perception of six payment instruments, including coins, banknotes, debit cards, credit cards, mobile payments, and on-line banking, we identify 16 payment characteristics. The characteristics aggregate seventy-six unique...
Andrew Ching; Fumiko Hayashi
Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...
Roe, Mark J.
Chapter 11 bars bankrupt debtors from immediately repaying their creditors, so that the bankrupt firm can reorganize without creditors shredding the bankrupt’s business. Not so for the bankrupt’s derivatives counterparties, who unlike most creditors, even most other secured creditors, can seize and immediately liquidate collateral, net out gains and losses, terminate their contracts with the bankrupt, and keep both preferential eve-of-bankruptcy payments and fraudulent conveyances they obtain...
Dubovitskaya, Alevtina; Xu, Zhigang; Ryu, Samuel; Schumacher, Michael; Wang, Fusheng
Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthcare data management, in particular, for EMR data sharing between healthcare providers and for research studies. We propose a framework on managing and sharing EMR data for cancer patient care. In collaboration with Stony Brook University Hospital, we implemented our framework in a prototype that ensures privacy, security, availability, and fine-grained access control over EMR data. The proposed work can significantly reduce the turnaround time for EMR sharing, improve decision making for medical care, and reduce the overall cost.
Drolet, Brian C; Marwaha, Jayson S; Hyatt, Brad; Blazar, Phillip E; Lifchez, Scott D
Technology has enhanced modern health care delivery, particularly through accessibility to health information and ease of communication with tools like mobile device messaging (texting). However, text messaging has created new risks for breach of protected health information (PHI). In the current study, we sought to evaluate hand surgeons' knowledge and compliance with privacy and security standards for electronic communication by text message. A cross-sectional survey of the American Society for Surgery of the Hand membership was conducted in March and April 2016. Descriptive and inferential statistical analyses were performed of composite results as well as relevant subgroup analyses. A total of 409 responses were obtained (11% response rate). Although 63% of surgeons reported that they believe that text messaging does not meet Health Insurance Portability and Accountability Act of 1996 security standards, only 37% reported they do not use text messages to communicate PHI. Younger surgeons and respondents who believed that their texting was compliant were statistically significantly more like to report messaging of PHI (odds ratio, 1.59 and 1.22, respectively). A majority of hand surgeons in this study reported the use of text messaging to communicate PHI. Of note, neither the Health Insurance Portability and Accountability Act of 1996 statute nor US Department of Health and Human Services specifically prohibits this form of electronic communication. To be compliant, surgeons, practices, and institutions need to take reasonable security precautions to prevent breach of privacy with electronic communication. Communication of clinical information by text message is not prohibited under Health Insurance Portability and Accountability Act of 1996, but surgeons should use appropriate safeguards to prevent breach when using this form of communication. Copyright © 2017 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.
Yehualashet, Yared G.; Wadda, Alieu; Agblewonu, Koffi B.; Zhema, Theophilus; Ibrahim, Al-asi A.; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G.; Nsubuga, Peter; Ashogbon, Daniel
Background. Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. Methods. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Results. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM
Dixon, R M; Pasnak, R
Perceptions of the susceptibility of young children to becoming lost or being abducted, and of the potential usefulness of child electronic security devices, were examined via a questionnaire. Data were provided by 41 volunteers, most of them from a local government office centre. The questionnaire asked for demographic data, and then for the risk of a child being abducted or lost when under the supervision of different caregivers and in different situations. The probable effectiveness of three common abductor ploys was also addressed. The questionnaire concluded with 10 questions about child electronic security devices. Respondents viewed mothers, fathers, and grandparents as equally responsible caregivers and young adults/babysitters as the least responsible. These effects diminished as the age of the children increased. The garden at home was judged to be the most secure environment for children of all ages, while an amusement park was judged the least secure environment. Children were perceived to be more at risk of an abduction when a stranger asked for physical assistance or to take them to the hospital because their parents were hurt, than when asked for directions. Furthermore, the respondents expressed a moderately strong need for child electronic security devices, and viewed parents who use them as more responsible than those who do not.
National Bank of Belgium
The total macroeconomic costs of the payment instruments used in the points of sale can be estimated to be 2.034 million euros, or 0.74 p.c. of Belgian GDP in 2003. The payment costs arising from cash were 0.58 p.c. of GDP, compared to 0.11 p.c. for debit cards, 0.04 p.c. for credit cards and 0.02 p.c. for the electronic purse Proton. About 50.5 p.c. of the payment costs originate in points of sale, whilst 47.1 p.c. come from the financial sector and 2.3 p.c. from currency-issuing institution...
... electronic data interchange (EDI) purchase orders (transaction set 850). (ii) The Contractor must generate and submit to the Government valid EDI invoices (transaction set 810) or submit invoices through the... of the Contractor, EFT payments through the Automated Clearing House (ACH) system. (iv) The EDI...
Lewis, C.M.; Verwijmeren, P.
This paper studies convertible security design for a sample of 814 issuers over the years 2000 through 2007. Using a nested logit model, we examine how firms choose fixed income claims and the method of payment. We find that fixed income claims are chosen to reduce corporate income taxes, minimize
Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair
As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.
Krinsky, Sam; Ryan, Andrew M; Mijanovich, Tod; Blustein, Jan
To measure variation in payment rates under Medicare's Inpatient Prospective Payment System (IPPS) and identify the main payment adjustments that drive variation. Medicare cost reports for all Medicare-certified hospitals, 1987-2013, and Dartmouth Atlas geographic files. We measure the Medicare payment rate as a hospital's total acute inpatient Medicare Part A payment, divided by the standard IPPS payment for its geographic area. We assess variation using several measures, both within local markets and nationally. We perform a factor decomposition to identify the share of variation attributable to specific adjustments. We also describe the characteristics of hospitals receiving different payment rates and evaluate changes in the magnitude of the main adjustments over time. Data downloaded from the Centers for Medicare and Medicaid Services, the National Bureau of Economic Research, and the Dartmouth Atlas. In 2013, Medicare paid for acute inpatient discharges at a rate 31 percent above the IPPS base. For the top 10 percent of discharges, the mean rate was double the IPPS base. Variations were driven by adjustments for medical education and care to low-income populations. The magnitude of variation has increased over time. Adjustments are a large and growing share of Medicare hospital payments, and they create significant variation in payment rates. © Health Research and Educational Trust.
Hjelholt, Morten; Damsgaard, Jan
thoroughly and substitute current payment standards in the decades to come. This paper portrays how digital payment platforms evolve in socio-technical niches and how various technological platforms aim for institutional attention in their attempt to challenge earlier platforms and standards. The paper...... applies a co-evolutionary multilevel perspective to model the interplay and processes between technology and society wherein digital payment platforms potentially will substitute other payment platforms just like the credit card negated the check. On this basis this paper formulate a multilevel conceptual...
Full Text Available The article presents the issues related to the different methods to increase the reliability of electronic security systems (ESS for example, a fire alarm system (SSP. Reliability of the SSP in the descriptive sense is a property preservation capacity to implement the preset function (e.g. protection: fire airport, the port, logistics base, etc., at a certain time and under certain conditions, e.g. Environmental, despite the possible non-compliance by a specific subset of elements this system. Analyzing the available literature on the ESS-SSP is not available studies on methods to increase the reliability (several works similar topics but moving with respect to the burglary and robbery (Intrusion. Based on the analysis of the set of all paths in the system suitability of the SSP for the scenario mentioned elements fire events (device critical because of security.
Hedman, Jonas; Tan, Felix B.; Holst, Jacques
that impact payers’ choice of payment instruments. Design/methodology/approach: Through in-depth interviews using the repertory grid technique, the authors explored 15 payers’ perceptions of six payment instruments, including coins, banknotes, debit cards, credit cards, mobile payments, and online banking....... The approach draws heavily on organizational systematics to better understand payers’ choice of payment instruments. Findings: A four-category taxonomy of payments was developed. The authors refer to the taxonomy as the 4Ps: the purchase, the payer, the payment instrument, and the physical technology...... or checks. Research limitations/implications: The findings suggest that payers view payment instruments in a much broader sense, including context, control, or cultural beliefs. Consequently, the authors suggest that researchers try to understand the essence of an innovation before assuming any economic...
Estevan Gómez Torres
Full Text Available The use of mobile devices has gradually increased. Every day, the number of organizations adopting systems which include some type of mobile payments is becoming bigger. Because of this reason, it is mandatory to have agile and quick systems to guarantee security and reliability, not only for the user but also for the operator. In that way, users will get a high-quality service based on mobile technologies. An analysis of NFC Technology has been made in this paper taking into consideration a proposal of a system development including mobile payments, which could be used in the transportation system of Metro of Quito. To assure the response time and transactional security, the use of cloud computing is recommended.
...-party fraud. The other surveys request similar types of confidential ``number and value'' information... checks; process electronic payments; and issue, transfer, and redeem U.S. government securities. The.... Selected Payment Initiation Channels: Respondents would report the number and value of online payments and...
Lee, Robert A.
Following the development of the Catpix I diffraction gratings structure first used on the 1988 Australian plastic DLR10 banknote and more recently on the Singapore plastic DLR50 banknote, the CSIRO Australia, Division of Materials Science & Technology has developed a new optical security and anti-counterfeiting technology known as Pixelgram (or Catpix 2). The Pixelgram, which is subject to patent, is an optically variable device based on a computerized procedure for producing an optically variable version of any given input picture, e.g., a photograph. When a Pixelgram is observed under a given source, such as a fluorescent tube, the image of the original input picture appears at particular angles of view. At other angles, the image varies in both contrast and brightness and can even appear as the photographic negative of the original input picture at some angles of view. As well as its ability to generate optically variable text and graphical images, Pixelgram has the unique capability of being able to display easily recognizable small scale optically variable images of the human face of near photographic clarity. Pixelgram optical security device master plates are produced by a technique borrowed from the microelectronics industry and known as electron beam lithography. In this technique, millions of microscopic grooves are written individually by a finely focused electron beam scanning across a glass plate coated with an electron sensitive material. On a typical Pixelgram there are approximately 2,000 million individual polygons etched into the plate by the electron beam. This corresponds to more than 10,000 megabytes of binary data. The only known electron beam lithography systems that have been able to write such large data files with the required precision are the Cambridge Instruments EBMF 10.5 and EBML 300 electron beam systems.
Kargarian, A.; Raoofat, M.
While wind power generation is growing rapidly around the globe; its stochastic nature affects the system operation in many different aspects. In this paper, the impact of wind power volatility on the reactive power market is taken into account. The paper presents a novel stochastic method for optimal reactive power market clearing considering voltage security and volatile nature of the wind. The proposed optimization algorithm uses a multiobjective nonlinear programming technique to minimize market payment and simultaneously maximize voltage security margin. Considering a set of probable wind speeds, in the first stage, the proposed algorithm seeks to minimize expected system payment which is summation of reactive power payment and transmission loss cost. The object of the second stage is maximization of expected voltage security margin to increase the system loadability and security. Finally, in the last stage, a multiobjective function is presented to schedule the stochastic reactive power market using results of two previous stages. The proposed algorithm is applied to IEEE 14-bus test system. As a benchmark, Monte Carlo Simulation method is utilized to simulate the actual market of given period of time to evaluate results of the proposed algorithm, and satisfactory results are achieved. -- Highlights: →The paper proposes a new algorithm for stochastic reactive power market clearing. →The stochastic nature of the wind which impacts the system operation and market clearing process, is taken into account. →The paper suggests an expected voltage stability margin and optimizes it in conjunction with expected total market payment. →To clear the market with two mentioned objective functions, a three-stage multiobjective nonlinear programming is implemented. →Also, a simple method is suggested to determine a suitable priority coefficient between two individual objective functions.
Full Text Available In this chapter, the authors try to stand out how the Latin American governments, specifically the Peruvian government, can evaluate its efforts implementing electronic administration initiatives, identifying what the citizen expects from the electronic administration and how he or she perceives it, applying an evaluation model to the electronic tax payment service implemented, as a successful initiative at Latin-America. The proposed model to achieve this, was developed by one of the authors during his doctoral dissertation (Cardona, 2004 and evaluated by the other one as dissertation judge. It includes five different independent and latent constructs, Attitude, Aptitude, Trust, Relevance and Satisfaction that affect two dependent and latent constructs, the Citizen Perception and the Citizen Expectative towards its relationship with the Public Administration through the use of Information and Communication Technologies - ICT, under the effect of illustrative variables related with citizen, institutions and context.
Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references. The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania. The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation. The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security. Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official
Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references.The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania.The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation.The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security.Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official
Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G
Background As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Objective Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. Methods We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Results Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70
Miranda Petronella VLAD
Full Text Available E-banking website, majority offers the banks. At first it was electronic-banking, Internet-banking followed, followed by mobile-banking service. These services offer the same facilities, Customer Bank just that varies the channel used for communication with the Bank. The services offered by banks through E-banking, approves: compilation of orders; scheduled payments; orders for payment of wages; internal transfers; pay rates on internal or external; currency exchanges; view balances of accounts at any time; information about foreign exchange rates; view and print account statements; the definition of beneficiaries of direct payments by the client.
Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair
For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.
Revill, J.D.; Hartel, Pieter H.
N-Count is a system for offline value transfer. A prototype of an N-Count payment system has been designed, and it has been implemented in Java. We have used the Java Ring with the Java Card API as a secure device. The system has also been modelled using the Spin model checker. The combined
Andreea A.S. Ionescu; Raul Serban
This paper speaks about the advantages, disadvantages, key requirements necessary of an electronic business, the infrastructure of the Internet, the existing main networks on the Internet, standards used to develop electronic business and the security of an e-business environment. As we know in an organization the information is an asset that has value and should be protected and diversified. We also propose an implementation model of an electronic business that interconnects two concepts: ER...
Ströher, Alexander; Honekamp, Wilfried
The introduction of an electronic health record (ELGA) is a subject discussed for a long time in Austria. Another big step toward ELGA is made at the end of 2010 on the pilot project e-medication in three model regions; other projects should follow. In addition, projects of the ELGA structure are sped up on the part of the ELGA GmbH to install the base of a functioning electronic health record. Unfortunately, many of these initiatives take place, so to speak, secretly, so that in the consciousness of the general public - and that includes not only patients but also physicians and other healthcare providers - always concerns about protection and security of such a storage of health data arouse. In this article the bases of the planned act are discussed taking into account the data protection and data security.
Stanislav A. Shikov
Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT), and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of T...
Full Text Available As an increasing number of people purchase goods and services online, micropayment systems are becoming particularly important for mobile and electronic commerce. We have designed and developed such a system called M&E-NetPay (Mobile and Electronic NetPay. With open interoperability and mobility, M&E-NetPay uses web services to connect brokers and vendors, providing secure, flexible and reliable credit services over the Internet. In particular, M&E-NetPay makes use of a secure, inexpensive and debit-based off-line protocol that allows vendors to interact only with customers, after validating coins. The design of the architecture and protocol of M&E-NetPay are presented, together with the implementation of its prototype in ringtone and wallpaper sites. To validate our system, we have conducted its evaluations on performance, usability and heuristics. Furthermore, we compare our system to the CORBA-based (Common Object Request Broker Architecture off-line micro-payment systems. The results have demonstrated that M&E-NetPay outperforms the .NET-based M&E-NetPay system in terms of performance and user satisfaction.
Hogan, Timothy P; Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G
As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70.2%, 262/373 vs 82.0%, 277/338), and
... SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Levy of Fees § 135.103 Levy and payment of barrel fee on OCS oil. (a) A fee of $.03 per... paragraph (a) of this section applies whenever the unobligated Fund balance is less than $200,000,000. (d...
Full Text Available A mathematical model of the process of payment for purchases in an online store has been presented. The model belongs to the class of semi-open queueing networks with four phases of exponential servers and Poisson arrivals. The authors describe in detail the derivation of the equations describing the system. Analytic expressions are derived on the basis of the proposed model for the average number of online store customers who have already paid for goods. Practical implementation of the model allows us to determine the number of clients who have added goods to their cart, but have not yet passed through the payment verification system, and thus determine the stream of real customers of the online store. (original abstract
Manso Cortes, Oscar
This paper presents the Security Analysis of the Electronic Management System (EMS) of a Total Site Utility System as proposed under the scope of the Efenis project. The Efenis project has been funded by the European Commission via the seventh framework programme (EC FP7) with the aim to improve ...
Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas
This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…
... facilities receiving payment under the skilled nursing facility prospective payment system for Part A... nursing facilities receiving payment under the skilled nursing facility prospective payment system for... SNF receiving payment under the prospective payment system may receive periodic interim payments (PIP...
Anitha Devi, M. D.; ShivaKumar, K. B.
Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters
Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy
Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.
Payment entitlements is a new commodity that arises from the new European common agricultural policy. The agricultural subsidies are decoupled from the actual production and replaced by the so-called payment entitlements. A payment entitlement has a farm specific value and may be freely traded. T...
Xiao, Xiao; Hedman, Jonas; Runnemark, Emma
Drawing on the theory of consumption value, this research-in-progress strives to provide a theoretical explanation of payment technology use by investigating the relationship between consumers’ perceptions of different consumption values associated with a certain payment technology and their choice...... to use the technology. We conducted the study in the context of Denmark, a Northern European country, with three well established payment technologies: cash, payment cards, and Internet banking. Following a focus group of identifying and defining four types of consumption values associated with each...... payment technology, a survey was then conducted by a national statistics agency in the country. Preliminary results have shown that different consumption values matter for the use of different payment technologies. The findings will potentially contribute to a better understanding of consumer payment...
... on qualified education loans. 1.6050S-4 Section 1.6050S-4 Internal Revenue INTERNAL REVENUE SERVICE... Information reporting for payments of interest on qualified education loans. (a) Electronic furnishing of... payments of interest on qualified education loans (furnisher) to the individual to whom it is required to...
... employee welfare benefit plans. 2509.78-1 Section 2509.78-1 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO... payments by certain employee welfare benefit plans. The Department of Labor today announced its...
Berenson, Robert A.; Schoenbaum, Stephen C.; Gardner, Laurence B.
Primary care is essential to the effective and efficient functioning of health care delivery systems, yet there is an impending crisis in the field due in part to a dysfunctional payment system. We present a fundamentally new model of payment for primary care, replacing encounter-based imbursement with comprehensive payment for comprehensive care. Unlike former iterations of primary care capitation (which simply bundled inadequate fee-for-service payments), our comprehensive payment model represents new investment in adult primary care, with substantial increases in payment over current levels. The comprehensive payment is directed to practices to include support for the modern systems and teams essential to the delivery of comprehensive, coordinated care. Income to primary physicians is increased commensurate with the high level of responsibility expected. To ensure optimal allocation of resources and the rewarding of desired outcomes, the comprehensive payment is needs/risk-adjusted and performance-based. Our model establishes a new social contract with the primary care community, substantially increasing payment in return for achieving important societal health system goals, including improved accessibility, quality, safety, and efficiency. Attainment of these goals should help offset and justify the costs of the investment. Field tests of this and other new models of payment for primary care are urgently needed. PMID:17356977
Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H
This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.
Temple, L Parker
Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu
... States Customs Service for payment of excise tax on imported wine. (Sec. 201, Pub. L. 85-859, 72 Stat... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS WINE Removal, Return and Receipt of Wine... year any proprietor who is liable for a gross amount of wine excise tax equal to or exceeding $5...
U.S. Department of Health & Human Services — Payment measures – national data. This data set includes national-level data for the payment measures associated with an episode of care for heart attack, heart...
U.S. Department of Health & Human Services — Payment measures – state data. This data set includes state-level data for the payment measures associated with an episode of care for heart attack, heart failure,...
After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited.
Olsina, Fernando; Pringles, Rolando; Larisson, Carlos; Garcés, Francisco
Electric power is a critical input to modern economies. Generation adequacy and security of supply in power systems running under competition are currently topics of high concern for consumers, regulators and governments. In a market setting, generation investments and adequacy can only be achieved by an appropriate regulatory framework that sets efficient remuneration to power capacity. Theoretically, energy-only electricity markets are efficient and no additional mechanism is needed. Nonetheless, the energy-only market design suffers from serious drawbacks. Therefore, jointly with the evolution of electricity markets, many remunerating mechanisms for generation capacity have been proposed. Explicit capacity payment was the first remunerating approach implemented and perhaps still the most applied. However, this price-based regulation has been applied no without severe difficulties and criticism. In this paper, a new reliability payment mechanism is envisioned. Capacity of each generating unit is paid according to its effective contribution to overall system reliability. The proposed scheme has many attractive features and preserves the theoretical efficiency properties of energy-only markets. Fairness, incentive compatibility, market power mitigation and settlement rules are investigated in this work. The article also examines the requirements for system data and models in order to implement the proposed capacity mechanism. A numerical example on a real hydrothermal system serves for illustrating the practicability of the proposed approach and the resulting reliability payments to the generation units. - Highlights: • A new approach for remunerating supply reliability provided by generation units is proposed. • The contribution of each generating unit to lessen power shortfalls is determined by simulations. • Efficiency, fairness and incentive compatibility of the proposed reliability payment are assessed
Theoretical debate and practice exploration on social security of migrant workers were introduced.The political direction and security layer on social security for migrant workers in Wan-jiang urban belt were analyzed:the first layer is to implement wage payment guarantee and employment injury insurance;the second layer is to emphasize serious disease insurance and endowment insurance;the third layer is unemployed insurance and social assistance.The primary strategy of building a social security system for migrant workers in Wan-jiang urban belt was put up:wage payment guarantee system that is united in certain regions should be promoted;employment injury insurance system that is undertaken by enterprises should be built;a social health care system for serious diseases should be set up;multi-layers endowment insurance system for migrant workers should be created;vocational training and training in how to start a business should be built as well as the unemployment insurance system;social assistant system based on the basic cost of living allowances should be set up.
In the generation of mobile internet, fingerprint payment is one of the most popular topics at the moment. China has a big market and many users are using the mobile payment methods. There are a large number of mobile phones equipped with fingerprint recognition technology. As we know, fingerprint payment brings us more convenience and safety. We do not need to use many bankcards, and fingerprint also eliminates the users from the trouble of queuing to pay. However, users send traditional dig...
Full Text Available Bitcoin is a peer-to-peer, decentralized payment system; that can be used as electronic money and as a payment method. Research done on Bitcoin has escalated due to the properties it possesses which are similar to fiat currency. Some...
Baji, Petra; Rubashkin, Nicholas; Szebik, Imre; Stoll, Kathrin; Vedam, Saraswathi
In Central and Eastern Europe, many women make informal cash payments to ensure continuity of provider, i.e., to have a "chosen" doctor who provided their prenatal care, be present for birth. High rates of obstetric interventions and disrespectful maternity care are also common to the region. No previous study has examined the associations among informal payments, intervention rates, and quality of maternity care. We distributed an online cross-sectional survey in 2014 to a nationally representative sample of Hungarian internet-using women (N = 600) who had given birth in the last 5 years. The survey included items related to socio-demographics, type of provider, obstetric interventions, and experiences of care. Women reported if they paid informally, and how much. We built a two-part model, where a bivariate probit model was used to estimate conditional probabilities of women paying informally, and a GLM model to explore the amount of payments. We calculated marginal effects of the covariates (provider choice, interventions, respectful care). Many more women (79%) with a chosen doctor paid informally (191 euros on average) compared to 17% of women without a chosen doctor (86 euros). Based on regression analysis, the chosen doctor's presence at birth was the principal determinant of payment. Intervention and procedure rates were significantly higher for women with a chosen doctor versus without (cesareans 45% vs. 33%; inductions 32% vs. 19%; episiotomy 75% vs. 62%; epidural 13% vs. 5%), but had no direct effect on payments. Half of the sample (42% with a chosen doctor, 62% without) reported some form of disrespectful care, but this did not reduce payments. Despite reporting disrespect and higher rates of interventions, women rewarded the presence of a chosen doctor with informal payments. They may be unaware of evidence-based standards, and trust that their chosen doctor provided high quality maternity care. Copyright © 2017 Elsevier Ltd. All rights reserved.
Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.
... payment of a franchise fee or other payments? 51.79 Section 51.79 Parks, Forests, and Public Property....79 May the Director waive payment of a franchise fee or other payments? The Director may not waive the concessioner's payment of a franchise fee or other payments or consideration required by a...
Fernández-Alemán, José Luis; Señor, Inmaculada Carrión; Lozoya, Pedro Ángel Oliver; Toval, Ambrosio
To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems. Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database. Only those articles dealing with the security and privacy of EHR systems. The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth. A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems' roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy. Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems. Copyright
...). (b) It appears that in a typical case the supervisors of the retirement system meet only once or... accept delivery and pay for the securities before some date more than seven business days after the date... creditor (broker-dealer) in good faith” that the customer will “promptly make full cash payment for the...
...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...
This final rule updates the prospective payment rates for inpatient rehabilitation facilities (IRFs) for federal fiscal year (FY) 2018 as required by the statute. As required by section 1886(j)(5) of the Social Security Act (the Act), this rule includes the classification and weighting factors for the IRF prospective payment system's (IRF PPS) case-mix groups and a description of the methodologies and data used in computing the prospective payment rates for FY 2018. This final rule also revises the International Classification of Diseases, 10th Revision, Clinical Modification (ICD-10-CM) diagnosis codes that are used to determine presumptive compliance under the "60 percent rule," removes the 25 percent payment penalty for inpatient rehabilitation facility patient assessment instrument (IRF-PAI) late transmissions, removes the voluntary swallowing status item (Item 27) from the IRF-PAI, summarizes comments regarding the criteria used to classify facilities for payment under the IRF PPS, provides for a subregulatory process for certain annual updates to the presumptive methodology diagnosis code lists, adopts the use of height/weight items on the IRF-PAI to determine patient body mass index (BMI) greater than 50 for cases of single-joint replacement under the presumptive methodology, and revises and updates measures and reporting requirements under the IRF quality reporting program (QRP).
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.
The huge number of rural elders and the deepening health problems (e.g. growing threats of infectious diseases and chronic diseases etc.) place enormous pressure on old age health security in rural China. This study aims to provide information for policy-makers to develop effective measures for promoting rural elders' health care service access by examining the current developments and challenges confronted by the old age health security in rural China. Search resources are electronic databases, web pages of the National Bureau of Statistics of China and the National Health and Family Planning Commission of China on the internet, China Population and Employment Statistics Yearbook, China Civil Affairs' Statistical Yearbook and China Health Statistics Yearbooks etc. Articles were identified from Elsevier, Wiley, EBSCO, EMBASE, PubMed, SCI Expanded, ProQuest, and National Knowledge Infrastructure of China (CNKI) which is the most informative database in Chinese. Search terms were "rural", "China", "health security", "cooperative medical scheme", "social medical assistance", "medical insurance" or "community based medical insurance", "old", or "elder", "elderly", or "aged", "aging". Google scholar was searched with the same combination of keywords. The results showed that old age health security in rural China had expanded to all rural elders and substantially improved health care service utilization among rural elders. Increasing chronic disease prevalence rates, pressing public health issues, inefficient rural health care service provision system and lack of sufficient financing challenged the old age health security in rural China. Increasing funds from the central and regional governments for old age health security in rural China will contribute to reducing urban-rural disparities in provision of old age health security and increasing health equity among rural elders between different regions. Meanwhile, initiating provider payment reform may contribute to
Pulcini, Christian D; Kotelchuck, Milton; Kuhlthau, Karen A; Nozzolillo, Alixandra A; Perrin, James M
To compare the costs of redetermining disability to potential savings in Supplemental Security Income payments associated with different strategies for implementing Continuing Disability Reviews (CDRs) among children potentially enrolled in SSI from 2012 to 2021. We reviewed publicly available reports from the Social Security Administration and Government Accountability Office to estimate costs and savings. We considered CDRs for children ages 1-17 years, excluding mandated low-birth weight and age 18 redeterminations that SSA routinely has performed. If in 2012 the Social Security Administration performs the same number of CDRs for children as in 2010 (16,677, 1% of eligibles) at a cessation rate of 15%, the agency would experience net savings of approximately $145 million in benefit payments. If CDR numbers increased to the greatest level ever (183,211, 22% of eligibles, in 1999) at the same cessation rate, the agency would save approximately $1.6 billion in benefit payments. Increasing the numbers of CDRs for children represents a considerable opportunity for savings. Recognizing the dynamic nature of disability, the agency could reassess the persistence of disability systematically; doing so could free up resources from children who are no longer eligible and help the agency better direct its benefits to recipients with ongoing disability and whose families need support to meet the extra costs associated with raising a child with a major disability. Copyright © 2012 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.
Chen, Sen; Meng, Guozhu; Su, Ting; Fan, Lingling; Xue, Yinxing; Liu, Yang; Xu, Lihua; Xue, Minhui; Li, Bo; Hao, Shuang
Contemporary financial technology (FinTech) that enables cashless mobile payment has been widely adopted by financial institutions, such as banks, due to its convenience and efficiency. However, FinTech has also made massive and dynamic transactions susceptible to security risks. Given large financial losses caused by such vulnerabilities, regulatory technology (RegTech) has been developed, but more comprehensive security risk assessment is specifically desired to develop robust, scalable, an...
Huckfeldt, Peter J; Sood, Neeraj; Escarce, José J; Grabowski, David C; Newhouse, Joseph P
Medicare continues to implement payment reforms that shift reimbursement from fee-for-service toward episode-based payment, affecting average and marginal payment. We contrast the effects of two reforms for home health agencies. The home health interim payment system in 1997 lowered both types of payment; our conceptual model predicts a decline in the likelihood of use and costs, both of which we find. The home health prospective payment system in 2000 raised average but lowered marginal payment with theoretically ambiguous effects; we find a modest increase in use and costs. We find little substantive effect of either policy on readmissions or mortality. Copyright © 2014 Elsevier B.V. All rights reserved.
... 42 Public Health 3 2010-10-01 2010-10-01 false Ambulatory payment classification (APC) system and... Outpatient Services § 419.31 Ambulatory payment classification (APC) system and payment weights. (a) APC... of resource use into APC groups. Except as specified in paragraph (a)(2) of this section, items and...
Zimring, Mark; Fuller, Merrian
The 'acceleration' of land-secured assessments allows municipalities to declare the entire value (not just the late payments) of a property owner's outstanding balance payable if a default occurs. State laws vary on whether acceleration is required, permitted, or prohibited. Acceleration can be attractive to bond investors because it strips out non-performing assessments, and may avoid delays in debt service payments to investors. The risk that non-acceleration will negatively impact bond investors is a particular issue in states without a process for rapidly resolving defaults. However, acceleration may also increase the risk to mortgage holders, as the full amount of the outstanding assessment becomes due and traditionally has priority over other lien holders. Acceleration also places a greater burden on the property owner.
Egger, F.N.; Abrazhevich, D.
In the e-business chain, the last link that needs to be convinced of the security of an online transaction is the end-user. That is why this article puts forward a user-centred perspective of the problem of trust in online payments, derived from the discipline of Human-Computer Interaction (HCI). We
Roy, Kakoli; Howard, David Hill
The lack of formal health insurance and inadequate social safety nets cause families in most low-income countries to finance health spending through out-of-pocket (OOP) payments, leaving poor families unable to insure their consumption during periods of major illnesses. To examine how well the Indian healthcare system protects households of differing living standards against the financial consequences of unanticipated health shocks. The data are drawn from the 52nd round of National Sample Survey, a nationally representative socioeconomic and health survey conducted in 1995-1996. The sample comprises 24,379 (3.84%) households where a member was hospitalized during the 1-year reference period. We estimate, using ordinary least squares, the relationship between household consumption (proxy for ability to pay) and OOP payments for hospitalization. We also estimate the relationship between consumption and OOP share in consumption. Our results indicate that both utilization (payments) and the consequent financial burden (payment share) increases with increasing ability to pay (ATP). While this relationship is retained across the different subgroups (e.g., gender, social code, region, etc.), comparisons across groups indicate horizontal inequities including differences in both degrees of progressivity and the redistributive effect. The finding that OOP payments do not decline with ATP could be an indication of: (1) the lack of insurance which implies that the better-off must pay from OOP to secure quality health care and (2) the absence of risk-pooling or prepayments mechanisms which poses financial impediments to the consumption of health care by the poor.
Willey, Lorrie; White, Barbara Jo
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
... that an open-end company may treat as a separate source its net profits from such sales during its... specify the sources from which the remainder was paid. Every company which in any fiscal year elects to... dividend payments by management companies. 270.19a-1 Section 270.19a-1 Commodity and Securities Exchanges...
Full Text Available Charging of plug-in electric vehicles (PEVs exposes smart grid systems and their users to different kinds of security and privacy attacks. Hence, a secure charging protocol is required for PEV charging. Existing PEV charging protocols are usually based on insufficiently represented and simplified charging models that do not consider the user’s charging modes (charging at a private location, charging as a guest user, roaming within one’s own supplier network or roaming within other suppliers’ networks. However, the requirement for charging protocols depends greatly on the user’s charging mode. Consequently, available solutions do not provide complete protocol specifications. Moreover, existing protocols do not support anonymous user authentication and payment simultaneously. In this paper, we propose a comprehensive end-to-end charging protocol that addresses the security and privacy issues in PEV charging. The proposed protocol uses nested signatures to protect users’ privacy from external suppliers, their own suppliers and third parties. Our approach supports anonymous user authentication, anonymous payment, as well as anonymous message exchange between suppliers within a hierarchical smart grid architecture. We have verified our protocol using the AVISPA software verification tool and the results showed that our protocol is secure and works as desired.
...-mail address; there is a SPACE between CMS and APCPanel.) News media representatives must contact our... Secretary is required by section 1833(t)(9)(A) of the Social Security Act (the Act) to consult with an..., correct code usage, and provider payment adjustments. Therefore, these issues will not be considered for...
U.S. Department of Health & Human Services — Open Payments (otherwise known as the Sunshine Act) - Open Payments is a Congressionally-mandated transparency program that increases awareness of financial...
The term “electronic money” first appeared in Czech legislation in 2002 as the result of the transposition of legislation into the Czech Republic’s legal system in anticipation of the country’s accession to the European Union. This term subsequently reappeared in 2009 during the recodification of the legal regulation of payment services, payment systems and electronic money. At this time, the definition was subjected to certain changes which continue to exert a significant infl...
Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei
In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)
Stringhini, Silvia; Thomas, Steve; Bidwell, Posy; Mtui, Tina; Mwisongo, Aziza
There is growing evidence that informal payments for health care are fairly common in many low- and middle-income countries. Informal payments are reported to have a negative consequence on equity and quality of care; it has been suggested, however, that they may contribute to health worker motivation and retention. Given the significance of motivation and retention issues in human resources for health, a better understanding of the relationships between the two phenomena is needed. This study attempts to assess whether and in what ways informal payments occur in Kibaha, Tanzania. Moreover, it aims to assess how informal earnings might help boost health worker motivation and retention. Nine focus groups were conducted in three health facilities of different levels in the health system. In total, 64 health workers participated in the focus group discussions (81% female, 19% male) and where possible, focus groups were divided by cadre. All data were processed and analysed by means of the NVivo software package. The use of informal payments in the study area was confirmed by this study. Furthermore, a negative relationship between informal payments and job satisfaction and better motivation is suggested. Participants mentioned that they felt enslaved by patients as a result of being bribed and this resulted in loss of self-esteem. Furthermore, fear of detection was a main demotivating factor. These factors seem to counterbalance the positive effect of financial incentives. Moreover, informal payments were not found to be related to retention of health workers in the public health system. Other factors such as job security seemed to be more relevant for retention. This study suggests that the practice of informal payments contributes to the general demotivation of health workers and negatively affects access to health care services and quality of the health system. Policy action is needed that not only provides better financial incentives for individuals but also
Full Text Available Abstract Background There is growing evidence that informal payments for health care are fairly common in many low- and middle-income countries. Informal payments are reported to have a negative consequence on equity and quality of care; it has been suggested, however, that they may contribute to health worker motivation and retention. Given the significance of motivation and retention issues in human resources for health, a better understanding of the relationships between the two phenomena is needed. This study attempts to assess whether and in what ways informal payments occur in Kibaha, Tanzania. Moreover, it aims to assess how informal earnings might help boost health worker motivation and retention. Methods Nine focus groups were conducted in three health facilities of different levels in the health system. In total, 64 health workers participated in the focus group discussions (81% female, 19% male and where possible, focus groups were divided by cadre. All data were processed and analysed by means of the NVivo software package. Results The use of informal payments in the study area was confirmed by this study. Furthermore, a negative relationship between informal payments and job satisfaction and better motivation is suggested. Participants mentioned that they felt enslaved by patients as a result of being bribed and this resulted in loss of self-esteem. Furthermore, fear of detection was a main demotivating factor. These factors seem to counterbalance the positive effect of financial incentives. Moreover, informal payments were not found to be related to retention of health workers in the public health system. Other factors such as job security seemed to be more relevant for retention. Conclusion This study suggests that the practice of informal payments contributes to the general demotivation of health workers and negatively affects access to health care services and quality of the health system. Policy action is needed that not only
Narasimhan, Seetharam; Wang, Xinmu; Bhunia, Swarup
Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.
... the long-term care hospital prospective payment system. 412.540 Section 412.540 Public Health CENTERS... PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Long-Term Care Hospitals... payment system. The prospective payment system includes payment for inpatient operating costs of...
... payment system for inpatient hospital services of psychiatric facilities. 412.404 Section 412.404 Public... PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Inpatient Hospital... must meet the conditions of this section to receive payment under the prospective payment system...
Full Text Available EC proposals concerning CAP reform for 2014-2020 try to cope both with the wide variety of agricultural systems and economic structures of the 27 EU MS but also with current global challenges that agriculture has to face: food security and poverty reduction, climate changes or biodiversity loss. This article aims to analyse the proposed measures consistency with the current situation of Romanian agriculture. Distribution aspects of the direct payments between Member States are concerned. The data are originated in FADN and Eurostat statistics, and a non parametric approach is used in order to better understand the correlation between the direct payments proposed for 2014 -2020 and some socio economic criteria.The paper provides a brief analysis of the existing research concerning the distributional aspects (studies and statistics and contributes to the debate by examining if the proposed redistribution is a consistent and coherent answer to the future challenges the agriculture has to meet in the future and to the targeted equity criteria.
... PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Long-Term Care Hospitals § 412.521 Basis of payment. (a) Method of payment. (1) Under the prospective payment system, long... furnished to Medicare beneficiaries. (2) The amount of payment under the prospective payment system is based...
... for the use of your SVB payments? 408.665 Section 408.665 Employees' Benefits SOCIAL SECURITY... records of how benefits were used in order to provide accounting reports and must make those records available upon our request. If your representative payee fails to provide an annual accounting of benefits...
Cashin, Cheryl; Phuong, Nguyen Khanh; Shain, Ryan; Oanh, Tran Thi Mai; Thuy, Nguyen Thi
Vietnam is currently considering a revision of its 2008 Health Insurance Law, including the regulation of provider payment methods. This study uses a simple spreadsheet-based, micro-simulation model to analyse the potential impacts of different provider payment reform scenarios on resource allocation across health care providers in three provinces in Vietnam, as well as on the total expenditure of the provincial branches of the public health insurance agency (Provincial Social Security [PSS]). The results show that currently more than 50% of PSS spending is concentrated at the provincial level with less than half at the district level. There is also a high degree of financial risk on district hospitals with the current fund-holding arrangement. Results of the simulation model show that several alternative scenarios for provider payment reform could improve the current payment system by reducing the high financial risk currently borne by district hospitals without dramatically shifting the current level and distribution of PSS expenditure. The results of the simulation analysis provided an empirical basis for health policy-makers in Vietnam to assess different provider payment reform options and make decisions about new models to support health system objectives.
... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Payment options. 206.19 Section 206... CONVERSION MORTGAGE INSURANCE Eligibility; Endorsement Eligible Mortgages § 206.19 Payment options. (a) Term payment option. Under the term payment option, equal monthly payments are made by the mortgagee to the...
Won Min Kang
Full Text Available Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation System (ITS such as traffic accident prevention and providing traffic volume information have been combined with cloud computing. ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC environment through efficient traffic management, traffic accident prevention, and convenience services. However, existing vehicle services focus on providing services using sensing information inside the vehicle and the system to provide the service through an interface with the external infrastructure is insufficient. In addition, because wireless networks are used in VCC environments, there is a risk of important information leakage from sensors inside the vehicle, such as driver personal identification and payment information at the time of goods purchase. We propose the VCC Service-oriented Security Framework (VCC-SSF to address the limitations and security threats of VCC-based services. The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. Furthermore, it provides authentication, encryption, access control, confidentiality, integrity, and privacy protection for user personal information and information inside the vehicle.
Yao, Yehong; Zhang, Chenghao; Sun, Jianyong; Jin, Jin; Zhang, Jianguo
The EHR is a secure, real-time, point-of-care, patient-centric information resource for healthcare providers. Many countries and regional districts have set long-term goals to build EHRs, and most of EHRs are usually built based on the integration of different information systems with different information models and platforms. A number of hospitals in Shanghai are also piloting the development of an EHR solution based on IHE XDS/XDS-I profiles with a service-oriented architecture (SOA). The first phase of the project targets the Diagnostic Imaging domain and allows seamless sharing of images and reports across the multiple hospitals. To develop EHRs for regional coordinated healthcare, some factors should be considered in designing architecture, one of which is security issue. In this paper, we present some approaches and policies to improve and strengthen the security among the different hospitals' nodes, which are compliant with the security requirements defined by IHE IT Infrastructure (ITI) Technical Framework. Our security solution includes four components: Time Sync System (TSS), Digital Signature Manage System (DSMS), Data Exchange Control Component (DECC) and Single Sign-On (SSO) System. We give a design method and implementation strategy of these security components, and then evaluate the performance and overheads of the security services or features by integrating the security components into an image-based EHR system.
Carton, Fergal; Hedman, Jonas; Damsgaard, Jan
consumers and merchants. These instruments are centralised, costly and lack decision support functionality. The ubiquity of the mobile phone has provided a decentralised platform for managing payment processes in a new way, but the value proposition for customers has yet to be elaborated clearly....... This inertia has stalled the design of sustainable revenue models for a mobile payments ecosystem. Merchants and consumers in the meantime are being seduced by the convenience of on‑line and mobile payment solutions. Adopting the purchase and payment process as the unit of analysis, the current mobile payment...
... PROJECT-BASED VOUCHER (PBV) PROGRAM Payment to Owner § 983.352 Vacancy payment. (a) Payment for move-out month. If an assisted family moves out of the unit, the owner may keep the housing assistance payment... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Vacancy payment. 983.352 Section...
Eom, Jieun; Lee, Dong Hoon; Lee, Kwangsu
In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.
L. Malina; J. Hajny; P. Dzurenda; V. Zeman
We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...
... payment system for inpatient rehabilitation facilities. 412.604 Section 412.604 Public Health CENTERS FOR... SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment for Inpatient Rehabilitation Hospitals and Rehabilitation Units § 412.604 Conditions for payment under the prospective payment system for inpatient...
Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.
Daniel BRÎNDESCU – OLARIU
The results of the study facilitate the determination and classification of the main sensitivity factors for the payment capacity at sample level, the establishment of general benchmarks for the payment capacity (as no such benchmarks currently exist in the Romanian literature and the identification of the mechanisms through which the variation of different factors impacts the payment capacity.
... prospective payment systems. 412.125 Section 412.125 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Payments to Hospitals Under the Prospective Payment Systems § 412.125 Effect of change of...
Chhanabhai, Prajesh; Holt, Alec
Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use
Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
Nalliah, R P
Background Little is known about trends in the number of malpractice payments made against dentists and other health professionals. Knowledge of these trends will inform the work of our professional organisations.Methods The National Practitioner Data Bank (NPDB) in the United States was utilised. Data about malpractice payments against dentists, hygienists, nurses, optometrists, pharmacists, physicians (DO and MD), physicians' assistants, podiatrists, psychologists, therapists and counsellors during 2004-14 were studied. Variables include type of healthcare provider, year malpractice payment was made and range of payment amount.Results In 2004 there were 17,532 malpractice payments against the studied health professions. In 2014 there were 11,650. In 2004, the number of malpractice payments against dentists represented 10.3% of all payments and in 2014 it represented 13.4%. Number of malpractice payments against dentists in 2012-2014 increased from 1,388 to 1,555.Conclusions There is an upward pressure on the number of dental malpractice payments over the last 3 years. Concurrently, there is a downward pressure on the number of combined non-dentist healthcare professional malpractice payments.
Goldstein, Neal D; Sarwate, Anand D
Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.
There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.
Jian, Weiyan; Lu, Ming; Chan, Kit Yee; Poon, Adrienne N; Han, Wei; Hu, Mu; Yip, Winnie
In 2009 China announced plans to reform provider payment methods at public hospitals by moving from fee-for-service (FFS) to prospective and aggregated payment methods that included the use of diagnosis-related groups (DRGs) to control health expenditures. In October 2011 health policy makers selected six Beijing hospitals to pioneer the first DRG payment system in China. We used hospital discharge data from the six pilot hospitals and eight other hospitals, which continued to use FFS and served as controls, from the period 2010-12 to evaluate the pilot's impact on cost containment through a difference-in-differences methods design. Our study found that DRG payment led to reductions of 6.2 percent and 10.5 percent, respectively, in health expenditures and out-of-pocket payments by patients per hospital admission. We did not find evidence of any increase in hospital readmission rates or cost shifting from cases eligible for DRG payment to ineligible cases. However, hospitals continued to use FFS payments for patients who were older and had more complications than other patients, which reduced the effectiveness of payment reform. Continuous evidence-based monitoring and evaluation linked with adequate management systems are necessary to enable China and other low- and middle-income countries to broadly implement DRGs and refine payment systems. Project HOPE—The People-to-People Health Foundation, Inc.
... reconciliation payment under the outcome-milestone payment system? 411.536 Section 411.536 Employees' Benefits... Systems § 411.536 Under what circumstances can we make a reconciliation payment under the outcome-milestone payment system? When the beneficiary's outcome payment period begins before the beneficiary has...
... contractor's experience, performance record, reliability, financial strength, and the adequacy of controls... of performance-based payments. 32.1007 Section 32.1007 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Performance-Based Payments 32.1007...
Full Text Available In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic Health Record (EHR, and this means that the clinician must acquire sufficient access right to access this document. As the EHR is within a collection of many other patients, the clinician would need to specify some requirements (such as a keyword which match the patient’s record, as well as having a valid access right. The complication begins when we do not want the server to learn anything from this query (as the server might be outsourced to other place. To encompass this situation, we define a new cryptographic primitive called Certificate-Based Encryption with Keyword Search (CBEKS, which will be suitable in this scenario. We also specify the corresponding security models, namely computational consistency, indistinguishability against chosen keyword and ciphertext attacks, indistinguishability against keyword-guessing attacks and collusion resistance. We provide a CBEKS construction that is proven secure in the standard model with respect to the aforementioned security models.
depends only on the relative costs of producing cash and card payments and can be used by regulators to assess privately set interchange fees. When calibrated to cost data, the model implies an optimal fee that is low and may even be negative. The findings are consistent with empirical evidence of high......Do consumers and merchants use the most efficient payment instruments? I examine how interchange fees, which are fees paid from merchants' banks to consumers' banks when card transactions take place, influence the choice between cash and payment cards. I show that when consumers do not pay...... transaction fees to banks - a common feature in bank contracts - card use is declining in interchange fees, and surcharging does not neutralize interchange fees. According to my model, banks set interchange fees at too high a level, resulting in too few card payments. I derive an optimal interchange fee which...
Ginsburg, Paul B
Many health policy analysts envision provider payment reforms currently under development as replacements for the traditional fee-for-service payment system. Reforms include per episode bundled payment and elements of capitation, such as global payments or accountable care organizations. But even if these approaches succeed and are widely adopted, the core method of payment to many physicians for the services they provide is likely to remain fee-for-service. It is therefore critical to address the current shortcomings in the Medicare physician fee schedule, because it will affect physician incentives and will continue to play an important role in determining the payment amounts under payment reform. This article reviews how the current payment system developed and is applied, and it highlights areas that require careful review and modification to ensure the success of broader payment reform.
... U.S.C. Chapter 35. List of Subjects in 22 CFR Parts 122 and 129 Arms and munitions, Exports... House (ACH) and Federal Reserve Wire Network (FedWire) are electronic networks used to process financial... electronic payment. Electronic payments must be in U.S. currency and must be payable through a U.S. financial...
... payments where Veterans Administration pension or compensation payable. 404.1362 Section 404.1362 Employees... Administration pension or compensation payable. (a) Before we receive notice from the Veterans Administration. If... status provisions in § 404.1350 before we receive notice from the Veterans Administration that a pension...
... requires submission of the payment voucher to the General Accounting Office. All other field authorized payment vouchers are submitted directly to the servicing disbursing office for payment. ... 32 National Defense 5 2010-07-01 2010-07-01 false Claims: Payments. 750.9 Section 750.9 National...
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false May an EN use outcome or milestone payments... an EN use outcome or milestone payments to make payments to the beneficiary? Yes, an EN may use milestone or outcome payments to make payments to a beneficiary. [73 FR 29350, May 20, 2008] ...
... contractual information, and the account(s) (see 32.206(d)) to be charged for the payment. (c) Management of... of commercial financing payments. 32.207 Section 32.207 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Commercial Item...
... insurance premiums. 251.6 Section 251.6 Housing and Urban Development Regulations Relating to Housing and... HOUSING PROJECTS § 251.6 Method of payment of mortgage insurance premiums. In the cases that the... affected lenders, that mortgage insurance premiums be remitted electronically. [63 FR 1303, Jan. 8, 1998] ...
Staykova, Kalina Stefanova; Damsgaard, Jan
Numerous mobile payment solutions, which rely on new disruptive technologies, have been launched on the payment market in recent years. But despite the growing number of mobile payment apps, very few solutions have turned to be successful as the majority of them fail to gain a critical mass...... of users. In this paper, we investigate successful platform adoption strategies by using the Reach and Range Framework for Multi-Sided Platforms as a strategic tool to which mobile payment providers can adhere in order to tackle some of the main challenges they face throughout the evolution...... of their platforms. The analysis indicates that successful mobile payment solutions tend to be launched as one-sided platforms and then gradually be expanded into being two-sided. Our study showcases that the success of mobile payment platforms lies with the ability of the platform to balance the reach (number...
The objective of the NEA's HLG-MR policy approach is to ensure a long-term secure supply. The HLG-MR has determined that to attain that objective, a necessary (but not sufficient) requirement is that irradiation services in the 99 Mo/ 99m Tc supply chain must be provided on a full-cost recovery (FCR) basis (OECD-NEA, 2011). The HLG-MR policy approach also recommended that supply chain participants should implement payment reforms that promote full-cost recovery within their reimbursement systems. Reforms might include separate radioisotope pricing or auditing, separate radioisotope payment, differential radioisotope payment for FCR, or other approaches to promote a complete transition to full-cost recovery
ACKNOWLEDGEMENTS, iii -- ABSTRACT, iv -- ÖZET, v -- LIST OF FIGURES, x -- LIST OF TABLES, xi -- LIST OF ABBREVIATIONS, xii -- 1. INTRODUCTION, 1 -- 1.1 Participants in a Payment System, 2 -- 1.2 Types of Payment Systems, 2 -- 1.2.1 Large-value Payment Systems (LVPS), 2 -- 1.2.2 Retail Payments, 3 -- 1.2.3 Retail Payment Instruments, 3 -- 126.96.36.199.1 Cash payments, 3 -- 188.8.131.52.2 Non-cash payments, 4 -- 184.108.40.206.2.1 Payment Cards, 4 -- 220.127.116.11.2.1.1 Credit Cards, 5 -- 18.104.22.168.2.1.2 Prepaid Cards,...
... facility prospective payment system. 412.432 Section 412.432 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Inpatient Hospital Services of Inpatient...
Rodrigues, Joel J P C; de la Torre, Isabel; Fernández, Gonzalo; López-Coronado, Miguel
The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access
Chhanabhai, Prajesh; Holt, Alec
Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong
... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... 2900-0474.'' SUPPLEMENTARY INFORMATION: Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt, VA Form 26-8986. OMB Control Number: 2900...
... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated... through the Federal Docket Management System (FDMS) at www.Regulations.gov or to Nancy J. Kessinger...
... disease (ESRD) prospective payment system. 413.210 Section 413.210 Public Health CENTERS FOR MEDICARE... § 413.210 Conditions for payment under the end-stage renal disease (ESRD) prospective payment system... prospective payment system described in § 413.215 through § 413.235 of this part. (a) Qualifications for...
...-Award Requirements Financial and Program Management § 435.22 Payment. (a) Introduction. Payment methods..., and (ii) Financial management systems that meet the standards for fund control and accountability as..., Payment Management System, Rockville, MD 20852. Interest amounts up to $250 per year may be retained by...
... voucher and all other information related to the partial payment shall be placed in the claim file. Action... 32 National Defense 5 2010-07-01 2010-07-01 false Partial payments. 751.13 Section 751.13 National... Claims Against the United States § 751.13 Partial payments. (a) Partial payments when hardship exists...
... 10 Energy 4 2010-01-01 2010-01-01 false Payment methods. 603.805 Section 603.805 Energy DEPARTMENT... Other Administrative Matters Payments § 603.805 Payment methods. A TIA may provide for: (a... progress. A fixed-support TIA must use this payment method (this does not preclude use of an initial...
Lennox, Gareth D; Armsworth, Paul R
In negotiations over land-right acquisitions, landowners have an informational advantage over conservation groups because they know more about the opportunity costs of conservation measures on their sites. This advantage creates the possibility that landowners will demand payments greater than the required minimum, where this minimum required payment is known as the landowner’s willingness to accept (WTA). However, in recent studies of conservation costs, researchers have assumed landowners will accept conservation with minimum payments. We investigated the ability of landowners to demand payments above their WTA when a conservation group has identified multiple sites for protection. First, we estimated the maximum payment landowners could potentially demand, which is set when groups of landowners act as a cooperative. Next, through the simulation of conservation auctions, we explored the amount of money above landowners’ WTA (i.e., surplus) that conservation groups could cede to secure conservation agreements, again investigating the influence of landowner cooperatives. The simulations showed the informational advantage landowners held could make conservation investments up to 42% more expensive than suggested by the site WTAs. Moreover, all auctions resulted in landowners obtaining payments greater than their WTA; thus, it may be unrealistic to assume landowners will accept conservation contracts with minimum payments. Of particular significance for species conservation, conservation objectives focused on overall species richness,which therefore recognize site complementarity, create an incentive for land owners to form cooperatives to capture surplus. To the contrary, objectives in which sites are substitutes, such as the maximization of species occurrences, create a disincentive for cooperative formation.
... depend on actual appreciation of the property as determined in accordance with 24 CFR 4001.120. Payment... Future Appreciation Payment A Appendix A to Part 4001 Housing and Urban Development Regulations Relating... Future Appreciation Payment Subordinate mortgage lien holder's cumulative combined loan-to-value ratio...
... rehabilitation facility receives payment under this subpart for inpatient operating costs and capital-related... & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR... and for costs of an approved education program and other costs paid outside the prospective payment...
... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...
... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...
Mousa T AL-Akhras
Full Text Available Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following
... RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Special Payments § 9701.361 Special skills payments... at the same time as basic pay or in periodic lump-sum payments. Special skills payments are not basic... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Special skills payments. 9701.361 Section...
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Payment guidelines. 412.11 Section 412.11 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES ACCEPTANCE OF PAYMENT FROM A NON-FEDERAL SOURCE FOR TRAVEL EXPENSES § 412.11 Payment guidelines. (a) Payments from a non-Federal source, other than...
Barnum, H; Kutzin, J; Saxenian, H
The mode of payment creates powerful incentives affecting provider behavior and the efficiency, equity and quality outcomes of health finance reforms. This article examines provider incentives as well as administrative costs, and institutional conditions for successful implementation associated with provider payment alternatives. The alternatives considered are budget reforms, capitation, fee-for-service, and case-based reimbursement. We conclude that competition, whether through a regulated private sector or within a public system, has the potential to improve the performance of any payment method. All methods generate both adverse and beneficial incentives. Systems with mixed forms of provider payment can provide tradeoffs to offset the disadvantages of individual modes. Low-income countries should avoid complex payment systems requiring higher levels of institutional development.
... episode payment is subject to the following adjustments and additional payments: (1) A low-utilization... 5, 1997 unless the national 60-day episode payment is subject to a low-utilization payment... payment for initial episodes is paid to an HHA at 60 percent of the case-mix and wage adjusted 60-day...
Full Text Available QR code (quick response code is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.
Tangcharoensathien, V; Supachutikul, A; Lertiendumrong, J
The Social Security Scheme was launched in 1990, covering formal sector private employees for non-work related sickness, maternity and invalidity including cash benefits and funeral grants. The scheme is financed by tripartite contributions from government, employers and employees, each of 1.5% of payroll (total of 4.5%). The scheme decided to pay health care providers, whether public or private, on a flat rate capitation basis to cover both ambulatory and inpatient care. Registration of the insured with a contractor hospital was a necessary consequence of the chosen capitation payment system. The aim of this paper is to review the operation of the scheme, and to explore the implications of capitation payment and registration for utilisation levels and provider behaviour. A key weakness of the scheme's design is suggested to be the initial decision to give employers not employees the responsibility for choosing the registered hospitals. This was done for administrative reasons, but it contributed to low levels of use of the contractor hospitals. In addition, low levels of use were also probably the result of the potential for cream skimming, cost shifting from inpatient to ambulatory care and under-provision of patient care, though since monitoring mechanisms by the Social Security Office were weak, these effects are difficult to detect conclusively. Mechanisms to improve utilisation levels were gradually introduced, such as employee choice of registered hospitals and the formation of sub-contractor networks to improve access to care. A beneficial effect of the capitation payment system was that the Social Security Fund generated substantial reserves and expenditures on sickness benefits were well stabilised. The paper ends by recommending that future policy amendments should be guided by research and empirical findings and that tougher monitoring and enforcement of quality of care standards are required.
Mocanu, Mihai; Mocanu, Carmen
The extension for the Web applications of the Electronic Medical Record seems both interesting and promising. Correlated with the expansion of Internet in our country, it allows the interconnection of physicians of different specialties and their collaboration for better treatment of patients. In this respect, the ophthalmologic medical applications consider the increased possibilities for monitoring chronic ocular diseases and for the identification of some elements for early diagnosis and risk factors supervision. We emphasize in this survey some possible solutions to the problems of interconnecting medical information systems to the Internet: the achievement of interoperability within medical organizations through the use of open standards, the automated input and processing for ocular imaging, the use of data reduction techniques in order to increase the speed of image retrieval in large databases, and, last but not least, the resolution of security and confidentiality problems in medical databases.
Shaw, M. [Illinois Univ., Urbana, IL (United States). Beckman Inst. for Advanced Science and Technology; Blanning, R. [Vanderbilt Univ., Nashville, TN (United States). Owen Graduate School of Management; Strader, T. [Iowa State Univ., Ames, IA (United States). Management Information Systems; Whinston, A. [eds.] [Texas Univ., Austin, TX (United States). Dept. of Management Science and Information Systems
The world is undergoing a revolution to a digital economy, with pronounced implications for corporate strategy, marketing, operations, information systems, customer services, global supply-chain management, and product distribution. This handbook examines the aspects of electronic commerce, including electronic storefront, on-line business, consumer interface, business-to-business networking, digital payment, legal issues, information product development, and electronic business models. Indispensable for academics, students and professionals who are interested in Electronic Commerce and Internet Business. (orig.)
... AGRICULTURE McGOVERN-DOLE INTERNATIONAL FOOD FOR EDUCATION AND CHILD NUTRITION PROGRAM § 1599.6 Payments. (a... payment; the bank ABA number to which payment is to be made; the account number for the deposit at the bank; the participant's taxpayer identification number; and the type of the account into which the...
... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS FOOD FOR PROGRESS PROGRAM § 1499.6 Payments. (a) If the... payment; the bank ABA number to which payment is to be made; the account number for the deposit at the bank; the participant's taxpayer identification number; and the type of the account into which the...
Jacofsky, D J
Episodic, or bundled payments, is a concept now familiar to most in the healthcare arena, but the models are often misunderstood. Under a traditional fee-for-service model, each provider bills separately for their services which creates financial incentives to maximise volumes. Under a bundled payment, a single entity, often referred to as a convener (maybe the hospital, the physician group, or a third party) assumes the risk through a payer contract for all services provided within a defined episode of care, and receives a single (bundled) payment for all services provided for that episode. The time frame around the intervention is variable, but defined in advance, as are included and excluded costs. Timing of the actual payment in a bundle may either be before the episode occurs (prospective payment model), or after the end of the episode through a reconciliation (retrospective payment model). In either case, the defined costs over the defined time frame are borne by the convener. Cite this article: Bone Joint J 2017;99-B:1280-5. ©2017 The British Editorial Society of Bone & Joint Surgery.
Pousttchi, Key; Wiedemann, Dietmar Georg
The purpose of the paper is to analyze mobile payments in the mobile commerce scenario. Therefore, we first classify the mobile payment in the mobile commerce scenario by explaining general offer models, charging concepts, and intermediaries. Second, we describe the mobile payment reference model, especially, the mobile payment reference organization model and different mobile payment standard types. Finally, we conclude our findings.
Do consumers and merchants use the most efficient payment instruments? I examine how inter- change fees, which are fees paid from merchants' banks to consumers' banks when card transactions take place, influence the choice between cash and payment cards. I show that when consumers do not pay transaction fees to banks - a common feature in bank contracts - card use is declining in interchange fees, and surcharging does not neutralize interchange fees. According to my model, banks set interchan...
U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Will SSA periodically review the outcome payment system and the outcome-milestone payment system for possible modifications? 411.597 Section 411... Employment Network Payment Systems § 411.597 Will SSA periodically review the outcome payment system and the...
Corbera, Esteve; Brown, Katrina; Soberanis, Carmen Gonzalez
This article proposes a multi-dimensional framework for understanding the development and effectiveness of Payments for Ecosystem Services (PES) schemes, framed around the notions of institutional design, performance and interplay. The framework is applied in the context of Mexico's Programme of Payments for Carbon, Biodiversity and Agro-forestry Services (PSA-CABSA), with an emphasis on its carbon component. The analysis shows that PSA-CABSA was promoted by civil society and its rules have been subject to continuous modifications over time. In the case of the carbon component, changes have been due to an original misunderstanding of how carbon projects should be designed, implemented, and carbon traded in actual markets. From a performance point of view, the paper shows that the programme has been well received by rural communities, and carbon payments have contributed to increase household income and to enhance forest management practices and organisational skills. The paper also highlights sources of institutional interplay with local institutions and international climate policy, and it reveals the importance of capacity and scale issues in securing an effective and fair implementation of PES. The conclusion provides some policy recommendations for the future development of PES initiatives in Mexico and elsewhere. (author)
Ridgely, M Susan; de Vries, David; Bozic, Kevin J; Hussey, Peter S
To determine whether bundled payment could be an effective payment model for California, the Integrated Healthcare Association convened a group of stakeholders (health plans, hospitals, ambulatory surgery centers, physician organizations, and vendors) to develop, through a consensus process, the methods and means of implementing bundled payment. In spite of a high level of enthusiasm and effort, the pilot did not succeed in its goal to implement bundled payment for orthopedic procedures across multiple payers and hospital-physician partners. An evaluation of the pilot documented a number of barriers, such as administrative burden, state regulatory uncertainty, and disagreements about bundle definition and assumption of risk. Ultimately, few contracts were signed, which resulted in insufficient volume to test hypotheses about the impact of bundled payment on quality and costs. Although bundled payment failed to gain a foothold in California, the evaluation provides lessons for future bundled payment initiatives. Project HOPE—The People-to-People Health Foundation, Inc.
U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...
U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...
... insurance premiums. 207.252e Section 207.252e Housing and Urban Development Regulations Relating to Housing... Premiums § 207.252e Method of payment of mortgage insurance premiums. In the cases that the Commissioner... mortgagees, that mortgage insurance premiums be remitted electronically. [63 FR 1303, Jan. 8, 1998] ...
Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.
Skolarus, Lesli E; Burke, James F; Callaghan, Brian C; Becker, Amanda; Kerber, Kevin A
Little is known about how neurology payments vary by service type (i.e., evaluation and management [E/M] vs tests/treatments) and compare to other specialties, yet this information is necessary to help neurology define its position on proposed payment reform. Medicare Provider Utilization and Payment Data from 2012 were used. These data included all direct payments to providers who care for fee-for-service Medicare recipients. Total payment was determined by medical specialty and for various services (e.g., E/M, EEG, electromyography/nerve conduction studies, polysomnography) within neurology. Payment and proportion of services were then calculated across neurologists' payment categories. Neurologists comprised 1.5% (12,317) of individual providers who received Medicare payments and were paid $1.15 billion by Medicare in 2012. Sixty percent ($686 million) of the Medicare payment to neurologists was for E/M, which was a lower proportion than primary providers (approximately 85%) and higher than surgical subspecialties (range 9%-51%). The median neurologist received nearly 75% of their payments from E/M. Two-thirds of neurologists received 60% or more of their payment from E/M services and over 20% received all of their payment from E/M services. Neurologists in the highest payment category performed more services, of which a lower proportion were E/M, and performed at a facility, compared to neurologists in lower payment categories. E/M is the dominant source of payment to the majority of neurologists and should be prioritized by neurology in payment restructuring efforts. © 2015 American Academy of Neurology.
Campbell, G.A.; Benham, B.J.
This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses
Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.
Tiago M. Fernández-Caramés
Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.
Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119
King, Laura; Rukh-Kamaa, Aneer
Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.
... 7 Agriculture 7 2010-01-01 2010-01-01 false Livestock payment calculations. 760.209 Section 760..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS INDEMNITY PAYMENT PROGRAMS Emergency Assistance for Livestock, Honeybees, and Farm-Raised Fish Program § 760.209 Livestock payment calculations. (a) Payments for an...
Manchikanti, Laxmaiah; Helm Ii, Standiford; Benyamin, Ramsin M; Hirsch, Joshua A
The Merit-based Incentive Payment System (MIPS) was created by the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) to improve the health of all Americans by providing incentives and policies to improve patient health outcomes. MIPS combines 3 existing programs, Meaningful Use (MU), now called Advancing Care Information (ACI), contributing 25% of the composite score; Physician Quality Reporting System (PQRS), changed to Quality, contributing 50% of the composite score; and Value-based Payment (VBP) system to Resource Use or cost, contributing 10% of the composite score. Additionally, Clinical Practice Improvement Activities (CPIA), contributing 15% of the composite score, create multiple strategic goals to design incentives that drive movement toward delivery system reform principles with inclusion of Advanced Alternative Payment Models (APMs). Under the present proposal, the Centers for Medicare and Medicaid Services (CMS) has estimated approximately 30,000 to 90,000 providers from a total of over 761,000 providers will be exempt from MIPS. About 87% of solo practitioners and 70% of practitioners in groups of less than 10 will be subjected to negative payments or penalties ranging from 4% to 9%. In addition, MIPS also will affect a provider's reputation by making performance measures accessible to consumers and third-party physician rating Web sites.The MIPS composite performance scoring method, at least in theory, utilizes weights for each performance category, exceptional performance factors to earn bonuses, and incorporates the special circumstances of small practices.In conclusion, MIPS has the potential to affect practitioners negatively. Interventional Pain Medicine practitioners must understand the various MIPS measures and how they might participate in order to secure a brighter future. Medicare Access and CHIP Reauthorization Act of 2015, merit-based incentive payment system, quality performance measures, resource use, clinical practice
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What effect will the subsequent entitlement to title II benefits have on EN payments for title XVI beneficiaries after they assign their ticket? 411.552 Section 411.552 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...
Onodera, Takeshi; Toko, Kiyoshi
This review describes an "electronic dog nose" based on a surface plasmon resonance (SPR) sensor and an antigen-antibody interaction for security and safety. We have concentrated on developing appropriate sensor surfaces for the SPR sensor for practical use. The review covers different surface fabrications, which all include variations of a self-assembled monolayer containing oligo(ethylene glycol), dendrimer, and hydrophilic polymer. We have carried out detection of explosives using the sensor surfaces. For the SPR sensor to detect explosives, the vapor or particles of the target substances have to be dissolved in a liquid. Therefore, we also review the development of sampling processes for explosives, and a protocol for the measurement of explosives on the SPR sensor in the field. Additionally, sensing elements, which have the potential to be applied for the electronic dog nose, are described.
Full Text Available This review describes an “electronic dog nose” based on a surface plasmon resonance (SPR sensor and an antigen–antibody interaction for security and safety. We have concentrated on developing appropriate sensor surfaces for the SPR sensor for practical use. The review covers different surface fabrications, which all include variations of a self-assembled monolayer containing oligo(ethylene glycol, dendrimer, and hydrophilic polymer. We have carried out detection of explosives using the sensor surfaces. For the SPR sensor to detect explosives, the vapor or particles of the target substances have to be dissolved in a liquid. Therefore, we also review the development of sampling processes for explosives, and a protocol for the measurement of explosives on the SPR sensor in the field. Additionally, sensing elements, which have the potential to be applied for the electronic dog nose, are described.
Man Dietrich Marcela
Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Members of the personnel are kindly requested to note that only documents proving that a payment has been made are accepted as proof of payment for any claims for reimbursement, including specifically the reimbursement of education fees. In particular, the following will be accepted as proof of payment: bank or post office bank statements indicating the name of the institution to which the payment was made; photocopies of cheques made out to the institution to which the payments were made together with bank statements showing the numbers of the relevant cheques; proof of payment in the form of discharged payment slips; invoices with acknowledgement of settlement, receipts, bank statements detailing operations crediting another account or similar documents. As a result, the following documents in particular will no longer be accepted as proof of payment: photocopies of cheques that are not submitted together with bank or post office bank statements showing the numbers of the relevant cheques; details of ...
Chen, Wen-Yi; Lin, Yu-Hui
This paper provides theoretical analyses of two alternative hospital payment systems for controlling medical cost: the Global Budget Payment System (GBPS) and the Prospective Payment System (PPS). The former method assigns a fixed total budget for all healthcare services over a given period with hospitals being paid on a fee-for-service basis. The latter method is usually connected with a fixed payment to hospitals within a Diagnosis-Related Group. Our results demonstrate that, given the same expenditure, the GBPS would approach optimal levels of quality and efficiency as well as the level of social welfare provided by the PPS, as long as market competition is sufficiently high; our results also demonstrate that the treadmill effect, modeling an inverse relationship between price and quantity under the GBPS, would be a quality-enhancing and efficiency-improving outcome due to market competition.
Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).
The term digital money refers to various proposed electronic payment mechanisms designed for use by consumers to make retail payments. Digital money products have the potential to replace central bank currency, thereby affecting the money supply. This paper studies the effect of replacing central bank currency on the narrowly defined stock of money under various assumptions regarding regulatory policies and monetary operations of central banks and the reaction of the banking system.
The topic of this paper is third-party online payment solutions in China and the main purpose of this paper is to figure out the research question: What are the impacts of third-party online payment solutions on China? Generally speaking, the third-party online payment solutions, including mobile payments, usually used by customer who purchase online and usually used in transaction platform. However, in China, people can use third-party payment solutions in different platfor...
Mulcahy, Andrew W.; Chan, Chris; Hirshman, Samuel; Huckfeldt, Peter J.; Kofner, Aaron; Liu, Jodi L.; Lovejoy, Susan L.; Popescu, Ioana; Timbie, Justin W.; Hussey, Peter S.
Abstract Gastroenterology and cardiology services are common and costly among Medicare beneficiaries. Episode-based payment, which aims to create incentives for high-quality, low-cost care, has been identified as a promising alternative payment model. This article describes research related to the design of episode-based payment models for ambulatory gastroenterology and cardiology services for possible testing by the Center for Medicare and Medicaid Innovation at the Centers for Medicare and Medicaid Services (CMS). The authors analyzed Medicare claims data to describe the frequency and characteristics of gastroenterology and cardiology index procedures, the practices that delivered index procedures, and the patients that received index procedures. The results of these analyses can help inform CMS decisions about the definition of episodes in an episode-based payment model; payment adjustments for service setting, multiple procedures, or other factors; and eligibility for the payment model. PMID:28083363
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Order of payment. 74.12 Section 74.12 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CIVIL LIBERTIES ACT REDRESS PROVISION Notification and Payment § 74.12 Order of payment. Payment will be made in the order of date of birth pursuant...
Chaudhary, Kaylash; Fehnker, Ansgar
Virtual payment systems overcome the drawbacks such as processing and operational cost of the traditional payment system. The main aim of the virtual payment system is to provide efficient services in terms of cost. Online payment using credit card is one of the most expensive of all payment means.
... problem case report is prepared. This action should eliminate delays in selling the property after... of hazardous substances on the property. (2) Acceleration of account. Subject to paragraphs (d)(2)(i... chattel). (2) If the borrower is in the process of selling security or nonsecurity, payments may be...
... include for payment in such voucher the amount of ODS accrued for the voyages terminated during the period. ... 46 Shipping 8 2010-10-01 2010-10-01 false Payment of subsidy. 282.30 Section 282.30 Shipping... COMMERCE OF THE UNITED STATES Subsidy Payment and Billing Procedures § 282.30 Payment of subsidy...
... Payment and Billing Procedures § 252.40 Payment of subsidy. (a) Submission of voucher. At the close of each calendar month, the subsidized operator may submit a voucher, and include for payment in such... submit an initial voucher and include for payment in such voucher a percentage of the ODS payable for the...
Medicare's fee-for-service (FFS) payment model may contribute to unsustainable spending growth. Payers are turning to alternative payment methods. The leading alternative payment model to the FFS problem is bundled payment. The Centers for Medicare & Medicaid Services (CMS) is taking another step to improve healthcare quality at lower cost. The CMS's Center for Medicare and Medicaid Innovation developed four models of bundled payments and 48 discrete clinical condition episodes. Many surgical care procedures are included in the 48 different clinical condition episodes.
Goals Recycling Green Purchasing Pollution Prevention Reusing Water Resources Environmental Management the Lab Make payments for event registrations, sponsorships, insurance, travel, other fees. Contact Treasury Team (505) 667-4090 Email If you need to make a payment to the Lab for an event registration
Kahn, Elyne N; Ellimoottil, Chandy; Dupree, James M; Park, Paul; Ryan, Andrew M
OBJECTIVE Spine surgery is expensive and marked by high variation across regions and providers. Bundled payments have potential to reduce unwarranted spending associated with spine surgery. This study is a cross-sectional analysis of commercial and Medicare claims data from January 2012 through March 2015 in the state of Michigan. The objective was to quantify variation in payments for spine surgery in adult patients, document sources of variation, and determine influence of patient-level, surgeon-level, and hospital-level factors. METHODS Hierarchical regression models were used to analyze contributions of patient-level covariates and influence of individual surgeons and hospitals. The primary outcome was price-standardized 90-day episode payments. Intraclass correlation coefficients-measures of variability accounted for by each level of a hierarchical model-were used to quantify sources of spending variation. RESULTS The authors analyzed 17,436 spine surgery episodes performed by 195 surgeons at 50 hospitals. Mean price-standardized 90-day episode payments in the highest spending quintile exceeded mean payments for episodes in the lowest cost quintile by $42,953 (p accounting for patient-level covariates, the remaining hospital-level and surgeon-level effects accounted for 2.0% (95% CI 1.1%-3.8%) and 4.0% (95% CI 2.9%-5.6%) of total variation, respectively. CONCLUSIONS Significant variation exists in total episode payments for spine surgery, driven mostly by variation in post-discharge and facility payments. Hospital and surgeon effects account for relatively little of the observed variation.
... after receipt of a proper request for reimbursement. (e) Working capital advance payments. If a... working capital, the awarding agency may provide cash on a working capital advance payment basis. Under... reimburse the subrecipient for its actual cash disbursements. The working capital advance method of payment...
... 42 Public Health 2 2010-10-01 2010-10-01 false Payment options. 408.65 Section 408.65 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PREMIUMS FOR SUPPLEMENTARY MEDICAL INSURANCE Direct Remittance: Individual Payment § 408.65 Payment options...
... 47 Telecommunication 2 2010-10-01 2010-10-01 false Payment issues. 27.1186 Section 27.1186 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS... Broadband Radio Service Relocation from the 2150-2160/62 Mhz Band § 27.1186 Payment issues. Payment of cost...
Britton, John R
Reimbursement for healthcare has utilized a variety of payment mechanisms with varying degrees of effectiveness. Whether these mechanisms are used singly or in combination, it is imperative that the resulting systems remunerate on the basis of the quantity, complexity, and quality of care provided. Expanding the role of the electronic medical record (EMR) to monitor provider practice, patient responsiveness, and functioning of the healthcare organization has the potential to not only enhance the accuracy and efficiency of reimbursement mechanisms but also to improve the quality of medical care. © 2015 by Kerman University of Medical Sciences.
Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.
Established payment systems play a dominant role also in B2C e-commerce. Innovative payment systems can only be a success here if they pay attention to the particular features of e-commerce, convey the worth of their value-adding unique selling proposition and enjoy the support of established e-shops or financial service providers. However, apart from rare cases the conventional payment systems leave little room for the innovative systems. This holds all the more since the conventional paymen...
Hanning, Brian W T
The many types of payment models used in the Australian private sector are reviewed. Their features are compared and contrasted to those desirable in an optimal private sector payment model. The EPM(TM) (Equitable Payment Model) is discussed and its consistency with the desirable features of an optimal private sector payment model outlined. These include being based on a robust classification system, nationally benchmarked length of stay (LOS) results, nationally benchmarked relative cost and encouraging continual improvement in efficiency to the benefit of both health funds and private hospitals. The advantages in the context of the private sector of EPM(TM) being a per diem model, albeit very different to current per diem models, are discussed. The advantages of EPM(TM) for hospitals and health funds are outlined.
... 42 Public Health 4 2010-10-01 2010-10-01 false Medicaid payment. 460.182 Section 460.182 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED...) Payment § 460.182 Medicaid payment. (a) Under a PACE program agreement, the State administering agency...
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Loan payments. 1655.14 Section 1655.14 Administrative Personnel FEDERAL RETIREMENT THRIFT INVESTMENT BOARD LOAN PROGRAM § 1655.14 Loan payments. (a) Loan payments must be made through payroll deduction in accordance with the loan agreement. Once loan...
Hassan, H. A.
Background The Middle East construction sector is heavily reliant on a migrant workforce that predominantly originates from South Asia. It is common practice for migrant construction workers to pay a local labour recruiter the equivalent of one or more years’ prospective overseas salary to secure employment, work and travel permits and transportation. The occupational health and safety implications of these financial arrangements remain unexplored. Aims To examine associations between payment to a labour recruiter, perceived general health and worksite accidents among migrant construction workers in the Middle East. Methods A questionnaire was completed by a convenience sample of predominantly Indian migrant construction workers drawn from a large construction project. The relationship between payment and risk of poor health and workplace accidents was assessed using multivariate logistic regression models (crude and adjusted for socio-demographic and occupational factors). Results There were 651 participants. The majority (58%) of migrant construction workers had paid a labour recruiter and ~40% had experienced a worksite accident. Between 3% (labourers) and 9% (foremen) perceived their health to be poor. Labourers and skilled workers who had paid a labour recruiter were significantly more likely to have experienced a worksite accident in the previous 12 months. Skilled workers, but not labourers and foremen, who had paid a labour recruiter were at increased risk of poor health. Conclusions The mechanisms linking labour recruiter payments to adverse safety and health outcomes warrant investigation with a view to developing interventions to erode these links. PMID:24668316
... payment system for long-term care hospitals. 412.505 Section 412.505 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Long-Term Care Hospitals § 412.505 Conditions for...
General Services Administration — The Prompt Payment Act, along with the Debt Collection Improvement Act of 1996, requires the timely payment of commercial obligations for supplies and services using...
very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Payments. 51-5.7 Section... Payments. Payments for products or services of persons who are blind or have other severe disabilities shall be made within 30 days after shipment or receipt of a proper invoice or voucher. ...
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Loan payments. 1620.35 Section 1620.35... Nonappropriated Fund Employees § 1620.35 Loan payments. NAF instrumentalities must deduct and transmit TSP loan... CFR part 1655 and Board procedures. Loan payments may not be deducted and transmitted for employees...
Jairam, Vikram [Yale School of Medicine, New Haven, Connecticut (United States); Yu, James B., E-mail: firstname.lastname@example.org [Department of Therapeutic Radiology, Yale School of Medicine, New Haven, Connecticut (United States)
Purpose: To use the Centers for Medicare and Medicaid Services Open Payments database to characterize payments made to radiation oncologists and compare their payment profile with that of medical and surgical oncologists. Methods and Materials: The June 2015 release of the Open Payments database was accessed, containing all payments made to physicians in 2014. The general payments dataset was used for analysis. Data on payments made to medical, surgical, and radiation oncologists was obtained and compared. Within radiation oncology, data regarding payment category, sponsorship, and geographic distribution were identified. Basic statistics including mean, median, range, and sum were calculated by provider and by transaction. Results: Among the 3 oncologic specialties, radiation oncology had the smallest proportion (58%) of compensated physicians and the lowest mean ($1620) and median ($112) payment per provider. Surgical oncology had the highest proportion (84%) of compensated physicians, whereas medical oncology had the highest mean ($6371) and median ($448) payment per physician. Within radiation oncology, nonconsulting services accounted for the most money to physicians ($1,042,556), whereas the majority of the sponsors were medical device companies (52%). Radiation oncologists in the West accepted the most money ($2,041,603) of any US Census region. Conclusions: Radiation oncologists in 2014 received a large number of payments from industry, although less than their medical or surgical counterparts. As the Open Payments database continues to be improved, it remains to be seen whether this information will be used by patients to inform choice of providers or by lawmakers to enact policy regulating physician–industry relationships.
U.S. Department of Health & Human Services — The Home Health Agency PUF contains information on utilization, payment (Medicare payment and standard payment), and submitted charges organized by CMS Certification...
Kazan, Erol; Damsgaard, Jan
This paper focuses on the triumph march of mobile phones that currently are annexing music players, navigation devices, and cameras as separate physical objects. The next target is set on payment. Through synthesizing available literature, we construct a framework for studying digital payment...... platforms that combines platform, technology and business design aspects. The framework is applied to conduct a comparative case study of digital payment platforms. Four types of market actors are considered: banks, mobile network operators, merchants, and startups, which are incumbents and disrupters....... By hosting third-party services, payment instruments are evolving from single-purpose to multi-functional ones. Our research extends existing payment literature from the MSP perspective to emphasize certain digital payment platform components, which impact strategies and complementary products....
Uthes, Sandra; Priorr, Annette; Zander, Peter
The direct payment system of the Common Agricultural Policy (CAP) provides income transfers to European farmers. Recently, several countries including England and Sweden have advocated the elimination of direct payments after 2013. The extent to which an elimination of direct payments would affect...... with different production orientations and land management types was modeled under the presence and absence of direct payments using a combination of agent-based and bio-economic modeling. We found that the initial characteristics of the regions, such as the historical farm structure and regional site conditions...
Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.
Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.
... whole or part, the claims officer shall prepare and mail a payment voucher to the claimant. (b) This... payment voucher, the claims officer shall sign and forward the signed voucher to the office where the claimant is or was employed for processing. (d) Upon receipt of the signed payment voucher, the office in...
... Miscellaneous Provisions § 920.112 Late payments. Pursuant to § 920.41(a), interest will be charged at a 1.5 percent monthly simple interest rate. Assessments for kiwifruit shall be deemed late if not received... late charge will be assessed when payment becomes 30 days late. Interest and late payment charges shall...
This final rule implements a new Medicare Part A and B payment model under section 1115A of the Social Security Act, called the Comprehensive Care for Joint Replacement (CJR) model, in which acute care hospitals in certain selected geographic areas will receive retrospective bundled payments for episodes of care for lower extremity joint replacement (LEJR) or reattachment of a lower extremity. All related care within 90 days of hospital discharge from the joint replacement procedure will be included in the episode of care. We believe this model will further our goals in improving the efficiency and quality of care for Medicare beneficiaries with these common medical procedures.
U.S. Department of Health & Human Services — Medicaid Disproportionate Share Hospital (DSH) Payments This link provides you with information about Medicaid DSH Payments. You can find information on DSH Audit...
Hertzum, Morten; Juul, Niels Christian; Jørgensen, Niels Henrik
Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Analysis of the weaknesses suggests that security requirements are among their causes...... that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems....
Hertzum, Morten; Jørgensen, Niels; Nørgaard, Mie
Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes...... that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems....
Voiculescu Madalina Irena
Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data
There is considerable evidence that unofficial payments are deeply embedded in the markets for health care in transition countries. Numerous surveys indicate that these payments provide a significant but possibly distorting contribution to health care financing. Unofficial payments can be characterised into three groups: cost contributions, including supplies and salaries, misuse of market position and payments for additional services. There is evidence from across the region on the presence of payment in each category although it is often difficult to distinguish between payment types. Regulatory policy must address a number of issues. Imposing penalties may help to reduce some payments but if the system is simply unable to provide services, such sanctions will drive workers into the private sector. There appears to be some support for formalising payments in order to reduce unofficial charges although the impact must be monitored and the danger is that formal fees add to the burden of payment. Regulation might also attempt to increase the amount of competition, provide information on good performing facilities and develop the legal basis of patient rights. Ultimately, unless governments address the endemic nature of payments across all sectors, policy interventions are unlikely to be fully effective.
Full Text Available In the Internet economy, with the help of cryptography, a branch of mathematics dealing with the security of information, as well as authentication and restriction of access to a computer system, a new digital coin as an alternative to national currencies appeared. In accomplishing this, using both mathematical methods (taking advantage of, for example, the difficulty of factorizing very large numbers, and quantum encryption methods. Throughout the world, information technology companies are focusing on information protection, inventing day-to-day methods with greater durability. In the horizon of Information Security, Quantum Cryptography has emerged, generating new possibilities in that field, hoping that data will be better protected and that the digital currency will resist over time and eventually evolve in the future, although Kurzweil, Bitcoin's pioneering technology is unlikely to be used in this respect. The idea of virtual alternatives to national currencies is not new, with advantages and disadvantages. The advantages of this coin are high payment freedom, transparency of information, high security, reduced risks for traders. Among the disadvantages we highlight the risk and volatility, the lack of notification and understanding, with incomplete functions, but which are developing, so Bitcoin is not perfect.
Full Text Available No abstract available. Article truncated after 150 words. On Tuesday, 1/9/18, the Centers for Medicare and Medicaid (CMS announced a new voluntary bundled-payment model that will be considered an advanced alternative payment model under Medicare Access and CHIP Reauthorization Act of 2015 (MACRA (1. The new model is the first advanced Alternative Payment Model (APM to be introduced by the Trump administration. The Trump administration has been a vocal advocate of reducing administrative burden for clinicians and has touted voluntary models as a solution (2. The new, voluntary model comes less than two months after the CMS officially decided to eliminate two mandatory bundled-payment models created during the Obama administration. Under the model, clinician payment will be based on quality measures during a 90-day episode of care. Participants must select at least one of the 32 clinical episodes to apply to the model. The inpatient clinical episodes are listed in Table 1 (3. Table 1. Clinical inpatient episodes under …
John R. Britton
Full Text Available Reimbursement for healthcare has utilized a variety of payment mechanisms with varying degrees of effectiveness. Whether these mechanisms are used singly or in combination, it is imperative that the resulting systems remunerate on the basis of the quantity, complexity, and quality of care provided. Expanding the role of the electronic medical record (EMR to monitor provider practice, patient responsiveness, and functioning of the healthcare organization has the potential to not only enhance the accuracy and efficiency of reimbursement mechanisms but also to improve the quality of medical care.
David M Lansing
Full Text Available Using the case of Costa Rica, this paper examines how ′carbon′ became an identifiable problem for that state. We trace how, during the 1980s, rationalities of financialisation and security arose in this country that allowed for Payments for Ecosystem Services (PES to emerge as an economic and political mechanism. Our central thesis is: this period initiated a government project of securing a viable future for the nation′s resources by linking them to global financial markets and international trade. This project of achieving resource security through economic circulation introduced new financial logics into forest management, as well as new modes of calculating the value and extent of the forest. These ways of framing resources found expression in the nation′s PES programme that is now central to the state′s goal of achieving carbon neutrality. Today, Costa Rica′s carbon flows are becoming territorialised as part of the nation′s atmosphere, biomass, people, and economy. This paper shows how carbon′s territorialisation did not begin with a concern for the climate, nor did it occur through diffusion of global climate policy to Costa Rica. Instead, carbon′s rise can be traced to locally specific ways of coping with the problem of resource security.
Hjelholt, Morten; Damsgaard, Jan
Payment transactions through the use of physical coins, bank notes or credit cards have for centuries been the standard formats of exchanging money. Recently online and mobile digital payment platforms has entered the stage as contenders to this position and possibly could penetrate societies...... thoroughly and substitute current payment standards in the decades to come. This paper portrays how digital payment paltforms evolve in socio-technical niches and how various technological platforms aim for institutional attention in their attempt to challenge earlier platforms and standards. The paper...... applies a co-evolutionary multilevel perspective to model the interplay and processes between technology and society wherein digital payment platforms potentially will substitute other payment platforms just like the credit card negated the check. On this basis this paper formulate a multilevel conceptual...
... where the requester has a history of prompt payment of FOIA fees, or require an advance payment of an amount up to the full estimated charges in the case of requesters with no history of payment; or (2) Where a requester has previously failed to pay a fee charged in a timely fashion (i.e., within 30 days...
... where the requester has a history of prompt payment of FOIA fees, or require an advance payment of an amount up to the full estimated charges in the case of requesters with no history of payment; or (2) A requester has previously failed to pay a fee in a timely fashion (within 30 days of billing), then NASA may...
... payment is possible under another statute. In some cases, neither the NAFI nor its insurer may be legally responsible. In those instances when there is no negligence, and payment is authorized under some other...
... the cost reimbursement payment system if a continuous 9-month period of substantial gainful activity... Systems § 411.582 Can a State VR agency receive payment under the cost reimbursement payment system if a... under the cost reimbursement payment system under subpart V of part 404 (or subpart V of part 416) of...
Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.
Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Can you continue to receive SVB payments if...' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS SVB... family, a transportation strike, etc.); or (2) Are exercising your option to be personally present in the...
Petkovic, M.; Katzenbeisser, S.; Kursawe, K.; Pohlmann, N.; Reimer, H.; Schneider, W.
Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading
Song Yee Leng
Full Text Available The financial market is currently disrupted by the rise of new technologies "FinTech” a short form for financial technology, which profoundly reshapes the financial intermediary structure and makes financial services more efficient. Mobile technology with Internet-enabled devices are the next logical phase of the World Wide Web campaign such as mobile phone taking over the mass market and will fundamentally change the way products are buy and sell as well as financial services especially the mobile payment system. This research examines changes payment method in financial services, particularly those involving mobile payments that can create new channels for consumers to purchase goods and services using mobile phone. Mobile payment application is ready to replace traditional cash, checks, credit and debit card throughout the country. In this stage of development, the current situation of mobile payment market, review the previous literature on mobile payment services, analysis use of mobile payment worldwide and various initiatives use mobile phones to offer financial services for those ‘unbanked’.
Song Yee Leng
Full Text Available The financial market is currently disrupted by the rise of new technologies “FinTech” a short form of financial technology, which profoundly reshapes the financial intermediary structure and makes financial services more efficient. Mobile technology with Internet-enabled devices are the next logical phase of the World Wide Web a campaign such as mobile phone taking over the mass market and will fundamentally change the way products are bought and sold as well as financial services especially the mobile payment system. This research examines changes payment method in financial services, particularly those involving mobile payments that can create new channels for consumers to purchase goods and services using a mobile phone. Mobile payment application is ready to replace traditional cash, checks, credit and debit card throughout the country. In this stage of development, the current situation of mobile payment market, review the previous literature on mobile payment services, analysis use of mobile payment worldwide and various initiatives use mobile phones to offer financial services for those ‘unbanked’.
Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.
Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.
...] Assessments for Mismatched Payments or Inadequate Payment Information for Geothermal, Solid Minerals, and...: Regulations for geothermal, solid minerals, and Indian oil and gas leases authorize the Office of Natural..., Office of Natural Resources Revenue, P.O. Box 25165, MS 61211B, Denver, Colorado 80225-0165...
Beyeler, Walter E.; Glass, Robert J.; Bech, Morten L.; Soramäki, Kimmo
We develop a parsimonious model of the interbank payment system. The model incorporates an endogenous instruction arrival process, a scale-free topology of payments between banks, a fixed total liquidity which limits banks’ capacity to process arriving instructions, and a global market that distributes liquidity. We find that at low liquidity the system becomes congested and payment settlement loses correlation with payment instruction arrival, becoming coupled across the network. The onset of congestion is evidently related to the relative values of three characteristic times: the time for banks’ net position to return to 0, the time for a bank to exhaust its liquidity endowment, and the liquidity market relaxation time. In the congested regime settlement takes place in cascades having a characteristic length scale. A global liquidity market substantially attenuates congestion, requiring only a small fraction of the payment-induced liquidity flow to achieve strong beneficial effects.
... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Payments to minor child. 10.51 Section 10.51 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Payments § 10.51 Payments to minor child. Payments to minor child through legal guardian, natural...
... duly authorized agent shall sign the voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (SF 1145) shall... 45 Public Welfare 1 2010-10-01 2010-10-01 false Payment of approved claims. 35.7 Section 35.7...
..., claimant or his duly authorized agent shall sign the voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (SF 1145... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Payment of approved claim. 10.7 Section...
... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Change in payment option. 206.26... in payment option. (a) General. The payment option may be changed as provided in this section. (b... credit payment option. Until the repairs are completed, the mortgagee shall make no line of credit...
... 42 Public Health 1 2010-10-01 2010-10-01 false Payment of all benefits. 102.83 Section 102.83... COMPENSATION PROGRAM Calculation and Payment of Benefits § 102.83 Payment of all benefits. (a) The Secretary may pay any benefits under this Program through lump-sum payments. If the Secretary determines that...
This paper examines the potential significance of updating registration practices in resolving some of the issues about tenure security in a transformative context. It deals with the importance of good governance in the context of land administration and considers its impact on intended reforms. Land registration practice as an ...
... sign the voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (SF 1145) shall designate both the claimant and his... 34 Education 1 2010-07-01 2010-07-01 false Payment of approved claims. 35.7 Section 35.7 Education...
... voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (S.F. 1145) shall designate both the claimant and his attorney... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Payment of approved claims. 793.7 Section 793.7...
... anticipated cost and obtains satisfactory assurance of full payment if the requester has a history of prompt payment of FOIA fees; or (2) Requires an advance payment if the requester has no history of payment. (b) If a requester has previously failed to pay a fee in a timely fashion, the FOI Officer does not...
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payments for agricultural labor. 404.1055... Payments for agricultural labor. (a) When cash payments are not wages. We do not include as wages your cash payments in a calendar year after 1987 from an employer for agricultural labor (see § 404.1056) if your...
Molina-Castillo, Francisco Jose; Rodriguez-Guirao, Alicia; Lopez-Nicolas, Carolina; Bouwman, W.A.G.A.
The diffusion of mobile payments (M-payments) is still in its early stages and further research is needed to understand what motivates or restricts people's behaviour when using mobile services. Based on a sample of Dutch mobile service users, this study analyses the antecedents of two types of
Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU
In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...
Rosenkrantz, Andrew B; Nicola, Gregory N; Allen, Bibb; Hughes, Danny R; Hirsch, Joshua A
The Medicare Access and CHIP Reauthorization Act (MACRA) of 2015 describes alternative payment models (APMs) as new approaches to health care payment that incentivize higher quality and value. MACRA incentivizes increasing APM participation by all physician specialties over the coming years. Some APMs will be deemed Advanced APMs; clinicians who are a Qualifying Participant in an Advanced APM will receive substantial benefits under MACRA including an automatic 5% payment bonus, regardless of their performance and savings within the APM, and a larger payment rate increase beginning in 2026. Existing APMs are most relevant to primary care physicians, and opportunities for radiologists to participate in Advanced APMs fulfilling Qualified Participant requirements are limited. Physician-Focused Payment Models (PFPMs), as described in MACRA, are APMs that target physicians' Medicare payments based on quality and cost of physician services. PFPMs must address a new issue or specialty compared with existing APMs and will thus foster a more diverse range of APMs encompassing a wider range of specialties. The PFPM Technical Advisory Committee is a new independent agency that will review proposals for new PFPMs and provide recommendations to CMS regarding their approval. The PFPM Technical Advisory Committee comprises largely primary care physicians and health policy experts and is not required to consult clinical experts when reviewing new specialist-proposed PFPMs. As PFPMs provide a compelling opportunity for radiologists to demonstrate and be rewarded for their unique contributions toward patient care, radiologists should embrace this new model and actively partner with other stakeholders in developing radiology-relevant PFPMs. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.
Physicians participating in MACRA have a unique opportunity to create and submit their own alternative payment models to the government and take command of their own future payments. At least one Texas physician is taking a crack at developing his own model.
... (INCLUDING SUBAWARDS) WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS AND OTHER NON-PROFIT ORGANIZATIONS Post-Award Requirements Financial and Program Management § 70.22 Payment. (a) Payment methods must... transfer of funds and disbursement by the recipient, and financial management systems that meet the...
... AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT, AND COMMERCIAL ORGANIZATIONS Post-Award Requirements Financial and Program Management § 14.22 Payment. (a) Payment methods... transfer of funds and disbursement by the recipient, and financial management systems that meet the...
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contract financing... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING 32.007 Contract financing payments. (a)(1) Unless... section, the due date for making contract financing payments by the designated payment office is the 30th...
... 7 Agriculture 7 2010-01-01 2010-01-01 false Indemnity payments on milk. 760.3 Section 760.3... Farmers for Milk § 760.3 Indemnity payments on milk. An indemnity payment for milk may be made to an... whole milk marketed during the applications period, and (b) any payment not subject to refund which he...
Full Text Available The main purpose of this paper wants to investigate the optimal retailer's lot-sizing policy with two warehouses under partially permissible delay in payments within the economic order quantity (EOQ framework. In this paper, we want to extend that fully permissible delay in payments to the supplier would offer the retailer partially permissible delay in payments. That is, the retailer must make a partial payment to the supplier when the order is received. Then the retailer must pay off the remaining balance at the end of the permissible delay period. In addition, we want to add the assumption that the retailer's storage space is limited. That is, the retailer will rent the warehouse to store these exceeding items when the order quantity is larger than retailer's storage space. Under these conditions, we model the retailer's inventory system as a cost minimization problem to determine the retailer's optimal cycle time and optimal order quantity. Three theorems are developed to efficiently determine the optimal replenishment policy for the retailer. Finally, numerical examples are given to illustrate these theorems and obtained a lot of managerial insights.
... ERRONEOUSLY, ILLEGALLY, OR WRONGFULLY COLLECTED § 714.46 Certification for payment. An officer or employee of the Department of Agriculture authorized to certify public vouchers for payment shall, for and on... 7 Agriculture 7 2010-01-01 2010-01-01 false Certification for payment. 714.46 Section 714.46...
... voucher or invoice and forward the documents to the disbursing officer for payment. (b) Settlement by...) Construction contracts. In the case of construction contracts, before forwarding the final payment voucher, the... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Final payment. 49.112-2...
Staykova, Kalina Stefanova; Damsgaard, Jan
The payment market has been stable for a number of decades with well-defined roles (acquirers and issuers), profitable business models (the card schemes) and a dominant design in which the merchants absorb the costs associated with payments. However, numerous digital payment solutions, which rely...... on new disruptive technologies, are emerging on the payment market, transforming the payment area from being established into a state of flux. In this article, we investigate the various factors that determine the success of a given solution. To this end, we build a framework to analyze the entry...
... AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, AND OTHER NON-PROFIT ORGANIZATIONS Post-Award Requirements Financial and Program Management § 2543.22 Payment. (a) Payment methods shall minimize the time... and disbursement by the recipient, and (2) Financial management systems that meet the standards for...