WorldWideScience

Sample records for secure electronic payment

  1. Security of Electronic Payment Systems: A Comprehensive Survey

    OpenAIRE

    Solat , Siamak

    2017-01-01

    This comprehensive survey deliberated over the security of electronic payment systems. In our research, we focused on either dominant systems or new attempts and innovations to improve the level of security of the electronic payment systems. This survey consists of the Card-present (CP) transactions and a review of its dominant system i.e. EMV including several researches at Cambridge university to designate variant types of attacks against this standard which demonstrates lack of a secure "o...

  2. The Influence of Trust and Security in the Use of Electronic Payment System in Manado

    OpenAIRE

    Tani, Frangky

    2015-01-01

    Electronic payment is the way to make in the process of buying and selling customers in real estate market or online market easier. Electronic payments give innovation to consumer with transaction overseas like online shopping. This study aims to determine the influence of trust and security in the use of electronic payment system. Where the independent variables are trust and security influence in using electronic payment system as the dependent variable. This research used quantitative meth...

  3. Security Assessment of Payment Systems under PCI DSS Incompatibilities

    OpenAIRE

    Bahtiyar , Şerif; Gür , Gürkan; Altay , Levent

    2014-01-01

    Part 9: Malicious Behavior and Fraud; International audience; With the ubiquitous proliferation of electronic payment systems, data and application security has become more critical for financial operations. The Payment Card Industry Data Security Standard (PCI DSS) has been developed by the payment industry to provide a widely-applicable and definitive security compliance among all components in electronic payment infrastructure. However, the security impact of PCI DSS incompatibilities and ...

  4. Security Safeguards on E-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003

    OpenAIRE

    Zulhuda, Sonny; Azmi, Ida Madieha bt. Abdul Ghani

    2011-01-01

    Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine the Malaysian legal readiness in the aspect of electronic payment system, focusing on its Payment Systems Act 2003. The discussion is limited to the issue of electronic security measures embodied in the ...

  5. Data mining technique for a secure electronic payment transaction using MJk-RSA in mobile computing

    Science.gov (United States)

    G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.

    2012-04-01

    Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.

  6. Electronic payment systems

    OpenAIRE

    Mláka, Michal

    2010-01-01

    This bachelor thesis analysis issue of electronic payment systems. It discusses their use for payments on the internet and sending funds via e-mail. The first part is devoted to the theoretical definition and legislation of the issuance of electronic money and activities of electronic money institutions. The main part of the work clearly focuses on the use of e-wallets, which is an integral part of electronic payment systems. E-wallet of electronic payment system Moneybookers is considered as...

  7. QuickCash: Secure Transfer Payment Systems

    Directory of Open Access Journals (Sweden)

    Abdulrahman Alhothaily

    2017-06-01

    Full Text Available Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN. In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.

  8. QuickCash: Secure Transfer Payment Systems

    Science.gov (United States)

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-01-01

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties. PMID:28608846

  9. QuickCash: Secure Transfer Payment Systems.

    Science.gov (United States)

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-06-13

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users' needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.

  10. A Secure Operational Model for Mobile Payments

    Directory of Open Access Journals (Sweden)

    Tao-Ku Chang

    2014-01-01

    Full Text Available Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers’ security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

  11. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  12. 31 CFR 203.10 - Electronic payment methods.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Electronic payment methods. 203.10... TAX AND LOAN PROGRAM Electronic Federal Tax Payments § 203.10 Electronic payment methods. (a) General. Electronic payment methods for Federal tax payments available under this subpart include ACH debit entries...

  13. The Future of the Mobile Payment as Electronic Payment System

    OpenAIRE

    Bezovski, Zlatko

    2016-01-01

    The development of the Internet and the arrival of e-commerce fostered digitalization in the payment processes by providing a variety of electronic payment options including payment cards (credit and debit), digital and mobile wallets, electronic cash, contactless payment methods etc. Mobile payment services with their increasing popularity are presently under the phase of transition, heading towards a promising future of tentative possibilities along with the innovation in technology. In thi...

  14. A Trusted Smart Phone and Its Applications in Electronic Payment

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    With the growing intelligence and popularity of mobile phones, and the trend of cellular network's convergence to IP based network, more and more mobile applications emerge on the market. For mission critical applications, like the electronic payment which will be discussed in this paper, the lack of trust in the underlying mobile infrastructure and secure interface to legacy systems (for this case, the banking systems) poses obstacles to their widespread presence in mobile services. Recently, the exposure of hacking of iPhone and other smart phones further emphasizes the criticality of establishing a trust platform for mobile applications. This paper analyzes the building blocks of the trusted smart phone, and proposes a framework to provide a trusted platform for mobile electronic payment. Such a proposed system may allow direct interface to the banking systems due to the banking industry recognized strong security, and hence, may enable its widespread use.

  15. NFC Secure Payment and Verification Scheme with CS E-Ticket

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the most important techniques in IoT, NFC (Near Field Communication is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.

  16. 46 CFR 308.507 - Security for payment of premiums.

    Science.gov (United States)

    2010-10-01

    ....507 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo Insurance § 308.507 Security for payment of... collateral deposit fund or a surety bond, to secure the payment of the premiums, in an amount which shall at...

  17. Payment Procedures for Electronic Government Services

    OpenAIRE

    Pousttchi, Key; Wiedemann, Dietmar Georg

    2005-01-01

    In this paper, we analyse payment procedures for their suitability for electronic government. We provide an overview of the payment procedures currently available on the market, compare the situation in electronic government with the situation in electronic commerce and analyze what we can transfer. Based on functional requirements we propose a scheme that allows public agencies to examine the appropriateness of any given payment procedure for electronic government.

  18. Survey of electronic payment methods and systems

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Helme, A.; Verbraeck, A.

    1996-01-01

    In this paper an overview of electronic payment methods and systems is given. This survey is done as part of the Moby Dick project. Electronic payment systems can be grouped into three broad classes: traditional money transactions, digital currency and creditdebit payments. Such payment systems have

  19. 39 CFR 761.8 - Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Servicing book-entry Postal Service securities... POSTAL SERVICE POSTAL SERVICE DEBT OBLIGATIONS; DISBURSEMENT POSTAL MONEY ORDERS BOOK-ENTRY PROCEDURES § 761.8 Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

  20. The research on electronic commerce security payment system based on set protocol

    Science.gov (United States)

    Guo, Hongliang

    2012-04-01

    With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).

  1. ELECTRONIC PAYMENT SYSTEM AND ITS PROTECTION

    Directory of Open Access Journals (Sweden)

    Miroslav Milutinovic

    2015-01-01

    Full Text Available All developed countries are in transition from the IT economy to a web economy - the biggest technological innovation that will have a long-term positive effect on the formation of the economic growth rate, the major structural changes and on the differentiated effects on the economic areas that are, at a faster or a slower rate, being included in this technological change. The electronic commerce or e-commerce has a huge potential for development. The electronic commerce between the companies (B-2-B is significantly greater compared to retail electronic commerce (B-2-C. In both spheres of trade, the Internet is used as a platform for the transfer of information and for concluding business deals. Market economy requires Accelerated Payment Processing which is achieved by introducing and improving the electronic payment procedures. There is an emphasized dichotomy between the two spheres of the payment system: large-value and small-value payments. The large value payment systems can be described as the arteries of the payment system, and the small-value transfer systems as a complex network of veins that bind the entire economy.

  2. Security issues of new innovative payments and their regulatory challenges

    NARCIS (Netherlands)

    Kasiyanto, Safari; Gabriella, Gimigliano

    2016-01-01

    Kasiyanto discusses how the security issues of M-payments and Bitcoin as new forms of innovative payments challenge the existing EU regulatory frameworks, and whether the proposed regulatory frameworks suffice to address such challenges. The regulatory frameworks Kasiyanto discusses mainly focus on

  3. 14 CFR 1260.69 - Electronic funds transfer payment methods.

    Science.gov (United States)

    2010-01-01

    ... Government by electronic funds transfer through the Treasury Fedline Payment System (FEDLINE) or the... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Electronic funds transfer payment methods... COOPERATIVE AGREEMENTS General Special Conditions § 1260.69 Electronic funds transfer payment methods...

  4. Social Security Administration Retirement, Survivors, and Disability Insurance (RSDI) Improper Payments

    Data.gov (United States)

    Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...

  5. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  6. 20 CFR 725.606 - Security for the payment of benefits.

    Science.gov (United States)

    2010-04-01

    ... operator or other employer fails to provide proof of such security to the Director within 30 days of its...-compliance to the appropriate United States district court in accordance with § 725.351(c). (f) Security... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security for the payment of benefits. 725.606...

  7. INFLUENCE OF CUSTOMS PAYMENTS ON THE ECONOMIC SECURITY OF THE COUNTRY, PROBLEMS AND WAYS OF OVERCOMING

    Directory of Open Access Journals (Sweden)

    Inna Kiyanchuk

    2017-11-01

    Full Text Available The article considers the role of customs payments as one of the main revenue sources of the state budget of Ukraine. The volume of receipt of customs payments to the state budget is characterized. The structure of receipts from customs payments for 2016-2017 is considered. Problems that violate the stable level of economic security of the country are identified. The complex of measures proposed to resolve deficiencies in the system of collection of customs payments to the State Budget of Ukraine is considered. The purpose of this article is to reveal the content and role of revenues from customs payments to the state budget and their impact on the country’s economic security. The subject of research: the impact of customs payments on the country’s economic security. The methodological basis of the study is a set of general, scientific, specific scientific and special methods and approaches, which helped to realize the conceptual unity of the research. In particular: an integrated approach that is used to analyse the collection of customs payments methods of induction and deduction, formalization to study the mechanism of charging customs payments, the method of analysis – in the study of the main elements of the collection of customs payments in Ukraine. Positive and normative research methods are used to develop proposed budget revenues from receipt of customs payments and to ensure stable economic security. Results. Thus, according to the results of the analysis, in 2017, there is a clear tendency to increase revenues to the state budget, including from customs payments. Thus, in 2017, the total amount of customs payments amounted to 277.27 billion UAH, which is 57.24 billion UAH more than the previous year (220.03 billion UAH. That is, customs payments increased by 26%. Economic implications. However, there are some problems in collecting customs payments to the state budget, which in turn violate a stable level of economic security of

  8. Payment card industry data security standard : readiness project

    OpenAIRE

    Βεργέτης, Μιχαήλ

    2015-01-01

    This paper is my thesis as part of my studies at the Department of Informatics, at University of Piraeus for the Postgraduate Programme in “Techno-economic Management & Security of Digital Systems”. Scope of this paper is to introduce to the reader with the basics of PCI DSS and to guide and provide any sort of assistance to organizations willing to achieve compliance with the Payment Card Industry Data Security Standard (PCI DSS). As for its practical section, a PCI DSS readiness project has...

  9. Secure Architectures for Mobile Applications

    OpenAIRE

    Cristian TOMA

    2007-01-01

    The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet)

  10. Secure Architectures for Mobile Applications

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet

  11. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with

  12. Electronic Commerce--Would, Could and Should You Use Current Internet Payment Mechanisms?

    Science.gov (United States)

    Buck, S. Peter

    1996-01-01

    Discussion of use of the Internet for online payments focuses on payment mechanisms for conducting transactions. Highlights include commercial requirements; security requirements; various proposed and currently used mechanisms; and future possibilities. (LRW)

  13. M-Payments Issues and Concepts

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2012-01-01

    Full Text Available The paper has four sections. First section has an intro for the mobile payments requirements for a reliable service. Second section shows types and models of mobile payment service but not taking into account the service patterns and the electronic money systems. In section three as a case study is shown an author solution may be improved taking into account the security and ergonomic issues presented in the first two sections. The last section presents a summary of technologies available for improvement of the mobile payment services.

  14. Mutual Payments in Increase of the Level of Economic Security of Energy Generating Enterprises

    Directory of Open Access Journals (Sweden)

    Ruzhytskyi Andrіy V

    2013-12-01

    Full Text Available The article presents main approaches to the essence of the economic security of an enterprise notion, namely, approach of counter-action to threats, approach of successful market activity and approach of achievement of certain development goals; it identifies the role of economic security of energy generating enterprises in economic security of other subjects and the country in general; it offers definition of the economic security of an enterprise notion as a complex characteristic of the state of the enterprise that reflects the level of the enterprise possibility to ensure functioning and development; it marks out functional components of economic security, which are connected with mutual payments, namely, financial, personnel, technical and technological, political and legal, informational and interface ones; it presents connection of mutual payments with the level of financial component of economic security of enterprises, which envisages financial flow from or to the enterprise for changing the obligation status or its quantitative characteristics.

  15. ELECTRONIC PAYMENT SYSTEMS AND THEIR POSSIBLE WAY OF DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    K. V. Karvai

    2013-01-01

    Full Text Available With development of a century of technologies, the economy has had access also for development in Internet industry sphere too. Thanks to this development have appeared: e-money, electronic payment systems, Internet-banking. In the given work the general scheme of works of electronic payment systems, their conditions and function, examples of possible ways of development are presented. In the conclusion the recommendations how it is possible to optimize the market for development of electronic commerce are given and resulted

  16. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  17. Exploring the Key Challenges: Adaptability, Sustainability, Interoperability and Security to M-payment

    Directory of Open Access Journals (Sweden)

    Rashmi Mantri

    2011-04-01

    Full Text Available Abstract: Any payment which uses mobile device as payment method is called M-payment whether it is proximity or remote and online or point of sale. Since it has been identified that mobile phone is everywhere and ever-present essential consumer device, and could be used for payment offline or online, Mobile payment has been hyped significantly. However early market adoption is facing some challenges and in need of the unanimous effort of all key players (manufacturers, mobile operators, merchants and customers of value chain in order to accept mobile payment method and achieve standard and sustainable business model. Achieving one business model is important for user convenience and reachability, resulting in increased market opportunities. The main focus of this research proposal is that why cohesive technologies are needed and how it could be achieved? Some M-payment ventures are successfully working in Japan, US and Asian countries such as NTTDoCoMo and PayPal M-payments. The main reason of M-payment adoption among consumers in those countries is that their security issues are dealt carefully and solved to acceptable level. This paper is presented in the form of research proposal and overview looking into various challenging issues which are preventing the higher success in UK.

  18. Identifying Effectiveness Criteria for Internet Payment Systems.

    Science.gov (United States)

    Shon, Tae-Hwan; Swatman, Paula M. C.

    1998-01-01

    Examines Internet payment systems (IPS): third-party, card, secure Web server, electronic token, financial electronic data interchange (EDI), and micropayment based. Reports the results of a Delphi survey of experts identifying and classifying IPS effectiveness criteria and classifying types of IPS providers. Includes the survey invitation letter…

  19. Attitudes towards mobile payment : An empirical study of the consumers’ perception of security, privacy and convenience

    OpenAIRE

    Lindbäck, Karin; Blommé, Carl

    2011-01-01

    Mobile payment is a new payment method that is being introduced on the Swedish market, but has not yet come to its breakthrough. This thesis investigates the attitude the Swedish consumer has towards mobile payment. Based on previous surveys and theory, three main attributes, security, privacy and convenience, were chosen to represent the attitude of the consumer towards mobile payment. In order to analyze the data obtained from the surveys conducted, the multi-attribute attitude model was us...

  20. Information Security of Apple Pay

    OpenAIRE

    Chen, Xinru

    2016-01-01

    In the era of high-tech, the mode of payment is no longer just use cash or credit card. There are various payments come to our daily life. Online payment and other kinds of electronic payments are wildly in use by people. Apple Pay is a tool that provides easier and safer payment service for consumer. The main objective of this thesis is to understand deeply and analyze how easy and convenient Apple Pay is to use and why it is known as most secure form of payment. Besides that, there is a ...

  1. Medicare and Medicaid programs: Hospital Outpatient Prospective Payment and Ambulatory Surgical Center Payment Systems and Quality Reporting Programs; electronic reporting pilot; Inpatient Rehabilitation Facilities Quality Reporting Program; revision to Quality Improvement Organization regulations. Final rule with comment period.

    Science.gov (United States)

    2012-11-15

    This final rule with comment period revises the Medicare hospital outpatient prospective payment system (OPPS) and the Medicare ambulatory surgical center (ASC) payment system for CY 2013 to implement applicable statutory requirements and changes arising from our continuing experience with these systems. In this final rule with comment period, we describe the changes to the amounts and factors used to determine the payment rates for Medicare services paid under the OPPS and those paid under the ASC payment system. In addition, this final rule with comment period updates and refines the requirements for the Hospital Outpatient Quality Reporting (OQR) Program, the ASC Quality Reporting (ASCQR) Program, and the Inpatient Rehabilitation Facility (IRF) Quality Reporting Program. We are continuing the electronic reporting pilot for the Electronic Health Record (EHR) Incentive Program, and revising the various regulations governing Quality Improvement Organizations (QIOs), including the secure transmittal of electronic medical information, beneficiary complaint resolution and notification processes, and technical changes. The technical changes to the QIO regulations reflect CMS' commitment to the general principles of the President's Executive Order on Regulatory Reform, Executive Order 13563 (January 18, 2011).

  2. THE BILL OF EXCHANGE AS A MEANS OF PAYMENT AND SECURITY

    Directory of Open Access Journals (Sweden)

    Vojo Belovski

    2016-07-01

    Full Text Available The bill of exchange is a kind of paper in order that its holder shall entitle the debtor named in the document to pay a certain amount of payments. The bill of exchange represents a means of payment and an instrument of providing the payment. It is an unconditional order given by the drawer to the drawee to pay a certain amount to the payee listed on the bill of exchange. The bill of exchange is generally a paper on the orders but it can be issued as value paper to a name. It is such promissory notes where the issuer becomes a clause not by order. The bill of exchange though it appears as a means of payment and an instrument for securing the payment it also appears as a means of international payment, because the bill of exchange can become a modern instrument of crediting and payment. With the development of the credit market and the bill of exchange becomes a means for the drawer and the drawee. This means that instead of the bill of exchange to be paid after the expiry of a certain deadline for submission of the bill of exchange the holder may sell or discount, or to pay before the deadline for submission. With this the bill of exchange becomes a toll for discount. Based on this we can conclude that the bill of exchange has the following roles: -bill of exchange serves as a means of credit; -bill of exchange serves as means of payment; -bill of exchange serves as a means for discount by.

  3. 48 CFR 52.232-33 - Payment by Electronic Funds Transfer-Central Contractor Registration.

    Science.gov (United States)

    2010-10-01

    ... Government under this contract shall be made by electronic funds transfer (EFT), except as provided in... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Payment by Electronic... CONTRACT CLAUSES Text of Provisions and Clauses 52.232-33 Payment by Electronic Funds Transfer—Central...

  4. 14 CFR 1274.931 - Electronic funds transfer payment methods.

    Science.gov (United States)

    2010-01-01

    ... cooperative agreement will be made by the Government by electronic funds transfer through the Treasury Fedline... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Electronic funds transfer payment methods... COOPERATIVE AGREEMENTS WITH COMMERCIAL FIRMS Other Provisions and Special Conditions § 1274.931 Electronic...

  5. Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

    OpenAIRE

    Saidu Muhammad

    2015-01-01

    With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET...

  6. TARGET - NEW PAYMENT SYSTEM FOR THE EURO AREA

    Directory of Open Access Journals (Sweden)

    ELENA VIOLETA DRĂGOI

    2015-04-01

    Full Text Available At EU level, the funds transfer systems have undergone significant changes starting with the introduction of euro. The launch of the euro, the emergence of new technologies, introduction of financial innovations and the globalization have led to reorganization of funds transfer systems` infrastructure. The paper aims to offer an analysis of actual payment system for Euro area, a trans-European funds transfer system with gross settlement in real-time for payments in euro TARGET- to increase economical and operational efficiency of payments and also to reduce the risks in the electronic funds transfer system by creating efficient and secure payment systems.

  7. The Impact of the Electronic Payment System on the Development of Nowadays Society: an Economic and a Managerial Perspective

    Directory of Open Access Journals (Sweden)

    Cristina Raluca Popescu

    2015-12-01

    Full Text Available The paper “The Impact of the Electronic Payment System on the Development of Nowadays Society: an Economic and a Managerial Perspective” presents the aspects concerning the impact of the electronic payment system on the development of nowadays society as an economic and a managerial perspective. Our research focuses on issues related to the payments sector, the Smartcard, the Electronic Banking,payment systems based on bank cards, the Cyber cash, and the electronic payment systems (1 Net Cash and (2 E-Cash, Micro-payment systems with (1 Millicent and (2 Cyber Coin, as well as the electronic check payments.

  8. E-COMMERCE WITH ONLINE PAYMENT THROUGH BANK CARD

    Directory of Open Access Journals (Sweden)

    OANA ŞEITAN

    2010-01-01

    Full Text Available The e-commerce has become a routine part of human life because it offers major advantages: convenience (it’s no longer necessary to visit a store to be able to shop, efficiency (the buyer can visit several virtual shops in a very short time, the crowd of shops and the frustration caused by the lack of parking spaces available can be avoided, the customer can choose and compare the desired products taking in consideration a set of characteristics such as price, grammage, color, delivery dat, etc. and the development of secure solutions for online payment (through: bank cards, ePay, cybercash, SmartCard, electronic funds transfer, Ecash. In the last decade, the electronic payment systems have been improved, reaching high levels of security and speed, acquiring a private, confidential, decentralization and internationalization character.

  9. Electronic Payment System in Nigeria: Its Economic Benefits and Challenges

    Science.gov (United States)

    Okifo, Joseph; Igbunu, Richard

    2015-01-01

    The crux of this study is on the adoption of E-payment system in Nigeria: Its economic benefits and challenges. The arrival of the internet has taken electronic payments and transactions to an exponential growth level. Consumers could purchase goods and services from the internet and send unencrypted credit card numbers across the network, which…

  10. THE MARKET POTENTIAL FOR ELECTRONIC PAYMENT APPLICATIONS IN GHANA AND UGANDA. CASE COMPANY– MAVIANCE GMBH

    OpenAIRE

    Terekhova, Mariia

    2016-01-01

    Nowadays, electronic payment solutions are widespread all around the world. Besides, their popularity is rapidly growing in emerging markets bringing numerous business opportunities to the international companies specializing in electronic payment systems. The aim of this thesis is to create a marketing strategy for the penetration of Ghana and Uganda with Smobilpay, which is an electronic payment application of Maviance GmbH. The research is done with the help of an analysis of the busin...

  11. Review Of E-Commerce Issues: Consumers Perception On Security And Privacy

    OpenAIRE

    Saravanan Muthaiyah; Joseph Antony Jude Ernest; Chew Kok Wai

    2011-01-01

    Web security has been a major issue of debate in the recent years. The lack of security is perceived as a major stumbling block for doing business online. Electronic cash payment systems are becoming more important than ever to facilitate online transactions and thus replacing traditional payment methods such as checks The prime objective of this paper is to determine the perception of consumers towards the security aspects of e-commerce technology. Specifically this paper examines the percep...

  12. 41 CFR 102-118.65 - Can my agency receive electronic billing for payment of transportation services?

    Science.gov (United States)

    2010-07-01

    ... electronic billing for payment of transportation services? 102-118.65 Section 102-118.65 Public Contracts and... Transportation Services § 102-118.65 Can my agency receive electronic billing for payment of transportation... to use electronic billing for the procurement and billing of transportation services. ...

  13. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    Directory of Open Access Journals (Sweden)

    Stanislav A. Shikov

    2017-03-01

    Full Text Available Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT, and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of Things. The author considers security challenges for the “smart home” system. Next section reviews the experiments of the author involved in testing of the Internet of Things devices. Materials and Methods: The subjects of study are the Apple Pay, the ZigBee wireless standard, Tesla Model S electric cars. The main methods for identification of security threats are analysis and comparison. Results: The companies of electronic devices simplify and reduce the price of manufacturing process. The customers and users are rarely interested in levels of electronic devices security policies. This is the weakest link of electronic products in terms of security and safety. The tests demonstrated that modern electronic-based technologies do not reach the 100-percentage security level. Apple Pay mobile payment system demonstrated the highest security rating. Discussion and Conclusions: Modern electronic devices for Internet of Things does not meet all safety requirements, from the point of view of the author. The article recommends analyzing the potential threats and developing new security standards. In addition, the logistics of electronic devices for Internet of Things need to be under control from the manufacturer to equipment installation time.

  14. 20 CFR 411.525 - What payments are available under each of the EN payment systems?

    Science.gov (United States)

    2010-04-01

    ... EN payment systems? 411.525 Section 411.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.525 What payments are available under each of the EN payment systems? (a) For payments for outcome payment months, both...

  15. Equal Access to Justice Act Payments

    Data.gov (United States)

    Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year 2010...

  16. Security of payment in Malaysian construction industry: issues on sub-contract's direct payment

    OpenAIRE

    Supardi, Azizan; Adnan, Hamimah

    2011-01-01

    In Malaysia, sub-contractors have to bear with the current structure of payment mechanisms in the standard forms of contract, which are payment upon certification, direct payment from the employer, and contingent or conditional payment. However, „direct payment‟ provision is applied for in most of the nominated sub-contracts and not to the domestic sub-contractors; thus the Construction Industry Payment and Adjudication (CIPA) Act is proposed. This paper, though, is to disclose the findings o...

  17. 77 FR 23204 - VA Acquisition Regulation: Electronic Submission of Payment Requests

    Science.gov (United States)

    2012-04-18

    ... choose to use electronic invoicing have three options to submit payment requests in electronic form: (1... (``Act''), Public Law 97-177, to require Federal agencies to pay their bills on a timely basis, to pay... reflect the increased use of electronic commerce in the Federal Government and in the private sector...

  18. Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance by Confluence of COBIT 5 Framework

    OpenAIRE

    Ashish Ukidve; Ds S SMantha; Milind Tadvalkar

    2017-01-01

    The Payment Card Industry Data Security Standard (PCI DSS) aims to enhance the security of cardholder data and is required when cardholder data or authentication data are stored, processed or transmitted. The implementation of enabling processes from COBIT 5 can complement compliance to PCI DSS. COBIT 5 assists enterprises in governance and management of enterprise IT and, at the same time, supports the need to meet security requirements with supporting processes and management activities. Th...

  19. PCI DSS: Security Standard and Security in Fact

    OpenAIRE

    M. V. Kuzin

    2011-01-01

    The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  20. Security Techniques for the Electronic Health Records.

    Science.gov (United States)

    Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra

    2017-08-01

    The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.

  1. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  2. PCI DSS: Security Standard and Security in Fact

    Directory of Open Access Journals (Sweden)

    M. V. Kuzin

    2011-12-01

    Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  3. Dynamic Rule Encryption for Mobile Payment

    Directory of Open Access Journals (Sweden)

    Emir Husni

    2017-01-01

    Full Text Available The trend of financial transactions by using a mobile phone or mobile payment increases. By using the mobile payment service, users can save money on mobile phone (handset and separate from the pulse. For protecting users, mobile payment service providers must complete the mobile payment service with the transaction security. One way to provide transaction security is to utilize a secure mobile payment application. This research provides a safety feature used for an Android-based mobile payment application. This security feature is making encryption rules dynamically named Dynamic Rule Encryption (DRE. DRE has the ability to protect data by means of encrypting data with dynamic rules, and DRE also has a token function for an authentication. DRE token raised with dynamic time-based rules. Here, the time is used as a reference with the order of the day in the year (day of the year. The processes of the DRE’s encryption, decryption, and the DRE’s functionality as the token are discussed in this paper. Here, the Hamming distance metric is employed for having maximum differences between plaintext and ciphertext.

  4. 20 CFR 411.550 - How are the outcome payments calculated under the outcome payment system?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How are the outcome payments calculated under the outcome payment system? 411.550 Section 411.550 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... the outcome payments calculated under the outcome payment system? The amount of each monthly outcome...

  5. 31 CFR 208.3 - Payment by electronic funds transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Payment by electronic funds transfer. 208.3 Section 208.3 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE MANAGEMENT OF FEDERAL AGENCY...

  6. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    OpenAIRE

    Barskar, Raju; Deen, Anjana Jayant; Bharti, Jyoti; Ahmed, Gulfishan Firdose

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appro...

  7. 6 CFR 11.3 - Demand for payment.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Demand for payment. 11.3 Section 11.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.3 Demand for payment. (a) Notice requirements. Generally, before DHS starts the collection actions described in this subpart, DHS...

  8. 20 CFR 411.545 - How are the outcome payments calculated under the outcome-milestone payment system?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How are the outcome payments calculated under the outcome-milestone payment system? 411.545 Section 411.545 Employees' Benefits SOCIAL SECURITY... are the outcome payments calculated under the outcome-milestone payment system? The amount of each...

  9. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  10. Card - Electronic Money. Comparative Study

    Directory of Open Access Journals (Sweden)

    Mariana Rodica TIRLEA

    2012-11-01

    Full Text Available This type of coin and appeared as a result of the needs for a proper management of the financial resources available in the market, but also to improve the payments system in our country. The card is an alternative to the conventional instruments of payment is a payment instrument with and without cash by means of which the holder disposes of the current account. It is a standardized, secure information and individualized, through which you can perform operations of cash withdrawal, payment for the goods or services purchased, payment obligations by the public administration authorities and funds transfers between accounts, other than those ordered and executed by financial institutions, carried out through the electronic payment instrument.

  11. Financial Denartments Should Quicken Steps of Electronization

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

      At 2004 China Electronic Finance Forum held in Beijing recently,Pan Xinping, Dean of Software Institute of Graduate Institute of Chinese Academy of Science appealled that China's financial departments should further quicken electronization and establish complete network electronic payment system to offer comprehensive financial service such as checking card, transference and clearance between banks, electronic securities, accounting management,transaction disposal, payment commission and service of report, and establish financial management information system. And it should finish communications between computer systems of all different professional banks, providing strong backing for the development of electronic finance in China.……

  12. Financial Denartments Should Quicken Steps of Electronization

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ At 2004 China Electronic Finance Forum held in Beijing recently,Pan Xinping, Dean of Software Institute of Graduate Institute of Chinese Academy of Science appealled that China's financial departments should further quicken electronization and establish complete network electronic payment system to offer comprehensive financial service such as checking card, transference and clearance between banks, electronic securities, accounting management,transaction disposal, payment commission and service of report, and establish financial management information system. And it should finish communications between computer systems of all different professional banks, providing strong backing for the development of electronic finance in China.

  13. Electronic Payments Profitability Extent Model

    Directory of Open Access Journals (Sweden)

    Rudolf Vohnout

    2016-12-01

    Full Text Available Cashless payments are recent phenomena, which even increased with the introduction of contactless means like NFC, PayPass or payWave. Such new methods speed-up the entire payment process and in comparison to cash transactions are much simpler and faster. But on the other hand the key question for merchant is if it is worth to have such device, which accept these new payment means or not to have the terminal at all. What is the amount of cash flow, which delimits the cash holdings to be still profitable? This paper tries to give answers to such question by presenting general profitability model, which will address defining the cash threshold amount. The aim is to show that cash holdings could be profitable up to certain amount, but after the threshold is met, cashless payment methods are fairly superior despite their additional costs.

  14. A Framework for Global Electronic Commerce: An Executive Summary.

    Science.gov (United States)

    Office of the Press Secretary of the White House

    1997-01-01

    An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…

  15. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  16. Study on payments through mobile phones

    Directory of Open Access Journals (Sweden)

    Anca Ioana ANDREESCU

    2006-01-01

    Full Text Available The evolution of information and communications technology, together with the increasing use of electronic commerce, phones and mobile applications, have facilitated mobile payments to become an alternative payment method for buyers and vendors. Mobile payments offer various opportunities to business environment and became a starting point in the transition from electronic to mobile. This paper aims to analyze the present situation of the mobile payment methods and to identify the effects that mobile payment systems have on electronic commerce.

  17. Implementing the Payment Card Industry (PCI Data Security Standard (DSS

    Directory of Open Access Journals (Sweden)

    John O' Raw

    2011-08-01

    Full Text Available Underpinned by the rise in online criminality, the payment card industry (PCI data security standards (DSS were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP can be applied to meet the requirement of masking the primary account number (PAN. Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.

  18. 20 CFR 410.501 - Payment periods.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payment periods. 410.501 Section 410.501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK LUNG BENEFITS (1969- ) Payment of Benefits § 410.501 Payment periods. Benefits are paid to...

  19. Secure electronic commerce communication system based on CA

    Science.gov (United States)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  20. Electronic security device

    Science.gov (United States)

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  1. Electronic security device

    International Nuclear Information System (INIS)

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-01-01

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs

  2. 20 CFR 416.501 - Payment of benefits: General.

    Science.gov (United States)

    2010-04-01

    ...: General. Payment of SSI benefits will be made for the month after the month of initial eligibility and for... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payment of benefits: General. 416.501 Section 416.501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...

  3. 20 CFR 416.2209 - Responsibility for making payment decisions.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibility for making payment decisions. 416.2209 Section 416.2209 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... Provisions § 416.2209 Responsibility for making payment decisions. The Commissioner will decide: (a) Whether...

  4. Effects of implementing electronic medical records on primary care billings and payments: a before-after study.

    Science.gov (United States)

    Jaakkimainen, R Liisa; Shultz, Susan E; Tu, Karen

    2013-09-01

    Several barriers to the adoption of electronic medical records (EMRs) by family physicians have been discussed, including the costs of implementation, impact on work flow and loss of productivity. We examined billings and payments received before and after implementation of EMRs among primary care physicians in the province of Ontario. We also examined billings and payments before and after switching from a fee-for-service to a capitation payment model, because EMR implementation coincided with primary care reform in the province. We used information from the Electronic Medical Record Administrative Data Linked Database (EMRALD) to conduct a retrospective before-after study. The EMRALD database includes EMR data extracted from 183 community-based family physicians in Ontario. We included EMRALD physicians who were eligible to bill the Ontario Health Insurance Plan at least 18 months before and after the date they started using EMRs and had completed a full 18-month period before Mar. 31, 2011, when the study stopped. The main outcome measures were physicians' monthly billings and payments for office visits and total annual payments received from all government sources. Two index dates were examined: the date physicians started using EMRs and were in a stable payment model (n = 64) and the date physicians switched from a fee-for-service to a capitation payment model (n = 42). Monthly billings and payments for office visits did not decrease after the implementation of EMRs. The overall weighted mean annual payment from all government sources increased by 27.7% after the start of EMRs among EMRALD physicians; an increase was also observed among all other primary care physicians in Ontario, but it was not as great (14.4%). There was a decline in monthly billings and payments for office visits after physicians changed payment models, but an increase in their overall annual government payments. Implementation of EMRs by primary care physicians did not result in decreased

  5. Effects of implementing electronic medical records on primary care billings and payments: a before–after study

    Science.gov (United States)

    Shultz, Susan E.; Tu, Karen

    2013-01-01

    Background Several barriers to the adoption of electronic medical records (EMRs) by family physicians have been discussed, including the costs of implementation, impact on work flow and loss of productivity. We examined billings and payments received before and after implementation of EMRs among primary care physicians in the province of Ontario. We also examined billings and payments before and after switching from a fee-for-service to a capitation payment model, because EMR implementation coincided with primary care reform in the province. Methods We used information from the Electronic Medical Record Administrative Data Linked Database (EMRALD) to conduct a retrospective before–after study. The EMRALD database includes EMR data extracted from 183 community-based family physicians in Ontario. We included EMRALD physicians who were eligible to bill the Ontario Health Insurance Plan at least 18 months before and after the date they started using EMRs and had completed a full 18-month period before Mar. 31, 2011, when the study stopped. The main outcome measures were physicians’ monthly billings and payments for office visits and total annual payments received from all government sources. Two index dates were examined: the date physicians started using EMRs and were in a stable payment model (n = 64) and the date physicians switched from a fee-for-service to a capitation payment model (n = 42). Results Monthly billings and payments for office visits did not decrease after the implementation of EMRs. The overall weighted mean annual payment from all government sources increased by 27.7% after the start of EMRs among EMRALD physicians; an increase was also observed among all other primary care physicians in Ontario, but it was not as great (14.4%). There was a decline in monthly billings and payments for office visits after physicians changed payment models, but an increase in their overall annual government payments. Interpretation Implementation of EMRs by

  6. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  7. Federal Coal Mine Health and Safety Act of 1969, Title IV, as amended (The Black Lung Benefits Act); payment of benefits--withholding Part B benefits where Part C payments are made for the same period. Social Security Administration. Final rule.

    Science.gov (United States)

    1982-05-04

    This regulation confirms the interim rule authorizing the Social Security Administration to withhold payment of Part B Black Lung benefits where Part C Black Lung benefits administered by the Dept. of Labor are paid for the same period. We are doing this by expanding the definition of "overpayment" in 20 CFR 410.560(a) to include these duplicate payments under Part C. This regulation provides a quick and efficient means of avoiding unjustified duplicate payments.

  8. Electronic security systems better ways to crime prevention

    CERN Document Server

    Walker, Philip

    2013-01-01

    Electronic Security Systems: Better Ways to Crime Prevention teaches the reader about the application of electronics for security purposes through the use of case histories, analogies, anecdotes, and other related materials. The book is divided into three parts. Part 1 covers the concepts behind security systems - its objectives, limitations, and components; the fundamentals of space detection; detection of intruder movement indoors and outdoors; surveillance; and alarm communication and control. Part 2 discusses equipments involved in security systems such as the different types of sensors,

  9. Secure E-payment Protocol

    OpenAIRE

    Sattar J Aboud

    2009-01-01

    The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now ...

  10. An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology

    Directory of Open Access Journals (Sweden)

    Alexander Yohan

    2018-03-01

    Full Text Available The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.

  11. An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.

    Science.gov (United States)

    Yohan, Alexander; Lo, Nai-Wei; Winata, Doni

    2018-03-25

    The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.

  12. Security electronics circuits manual

    CERN Document Server

    MARSTON, R M

    1998-01-01

    Security Electronics Circuits Manual is an invaluable guide for engineers and technicians in the security industry. It will also prove to be a useful guide for students and experimenters, as well as providing experienced amateurs and DIY enthusiasts with numerous ideas to protect their homes, businesses and properties.As with all Ray Marston's Circuits Manuals, the style is easy-to-read and non-mathematical, with the emphasis firmly on practical applications, circuits and design ideas. The ICs and other devices used in the practical circuits are modestly priced and readily available ty

  13. Employ a Mobile Agent for Making a Payment

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2008-01-01

    Full Text Available The mobile agent paradigm offers flexibility and autonomy to e-commerce applications. But it is challenging to employ a mobile agent to make a payment due to the security consideration. In this paper, we propose a new agent-assisted secure payment protocol, which is based on SET payment protocol and aims at enabling the dispatched consumer-agent to autonomously sign contracts and make the payment on behalf of the cardholder after having found the best merchant, without the possibility of disclosing any secret to any participant. This is realized by adopting the Signature-Share scheme, and employing a Trusted Third Party (TTP. In the proposed protocol, the principle that each participant knows what is strictly necessary for his/her role is followed as in SET. In addition, mechanisms have been devised for preventing and detecting double payment, overspending and overpayment attacks. Finally the security properties of the proposed protocol are studied analytically. In comparison with other existing models, the proposed protocol is more efficient and can detect more attacks.

  14. The electronic security partnership of safety/security and information systems departments.

    Science.gov (United States)

    Yow, J Art

    2012-01-01

    The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.

  15. Characteristics of Mobile Payment Procedures

    OpenAIRE

    Kreyer, Nina; Pousttchi, Key; Turowski, Klaus

    2002-01-01

    Companies are not going to invest into the development of innovative applications or services unless these can be charged for appropriately. Thus, the existence of standardized and widely accepted mobile payment procedures is crucial for successful business-to-customer mobile commerce. The acceptance of mobile payment procedures depends on costs, security and convenience issues. For the latter, it is important that a procedure can be used over the different payment scenarios mobile commerce, ...

  16. The obstacles of NFC mobile payment development in Finland : security issues of NFC mobile payment

    OpenAIRE

    Yang, Ning

    2016-01-01

    In the recent years, with the rapid development of science and technology in the consumer markets, payment terms are being promoted much faster than ever. It is considered that NFC Mobile payment will enjoy a great prospect. NFC Mobile payment technique, which is based on the RFID technology, has been growing popularity. Near Field Communication (NFC) is the proximity standard for the proximity cards that can be modified to allow integration of the technology into a cellular phone. NFC tec...

  17. Actualization the risks local payment systems on the present stage of the national payment system

    Directory of Open Access Journals (Sweden)

    Korobeinikova Olga Mikhailovna

    2014-09-01

    Full Text Available In the article presented and estimated systematically possibilities of minimization the general and specific risks local payment systems and their participants, which actualized due to the activation of formation of national payment system in Russia amid increasing global political and financial risks and the need for economic security.

  18. The capitation payment unit: 17 years in the General Social Security System in Health

    Directory of Open Access Journals (Sweden)

    Diego A. Restrepo

    2012-02-01

    Full Text Available Objective: to analyze the evolution of the Capitation Payment (UPC for its Spanish name “unidad de pago por capitación” as well as the methodologies and variables for defining it that have existed in the Colombian Social Security System in Health since its implementation between 1995 and 2011. Methodology: An observational, longitudinal descriptive study. The reference population was made up of all the papers reviewed, including books, journal articles, databases, and official presentations containing the key concepts. Results: It was found that the Capitation Payment (UPC is valued as an essential element to maintain the financial balance of the health system. From 1995 to 2011 there were a number of methodologies for defining this payment. They ranged from a definition based only on the financial balance and the availability of resources, to a technical study using statistical tools to annually adjust the value of the UPC. Conclusions: The origin of the UPC can be attributed to the system’s orientation toward a market scheme and to the convergence of three basic theories. The variations in the value of the UPC have always resulted in a similar value year after year; this is why even if the methodology for defining it changed, the proportions will be the same when compared to previous years

  19. Secure Protocol for “Host — NFC Reader” Communication

    Directory of Open Access Journals (Sweden)

    A. O. Menshenin

    2012-06-01

    Full Text Available The paper presents a secure protocol for communication between host and NFC reader. The protocol protection scheme uses symmetric cipher with cyclic session key generation and provides confidentiality, integrity, end parties authentication and resistance to replay attacks. Deployment scenario in a typical electronic payment system is also presented.

  20. 7 CFR 1962.29 - Payment of fees and insurance premiums.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Payment of fees and insurance premiums. 1962.29... Security § 1962.29 Payment of fees and insurance premiums. (a) Fees. (1) Security instruments. Borrowers... the service cannot be obtained without cost. (b) Insurance premiums. County Supervisors are authorized...

  1. Retail payments in the Netherlands : Facts and theory

    NARCIS (Netherlands)

    Bolt, Wilko

    Over the last decade, the Netherlands observed a rapid shift from cash and paper-based payment instruments toward electronic payment instruments. Banks are well aware that transaction pricing can speed up the shift to low-cost electronic payments. But payment pricing is a complex matter, due to

  2. 77 FR 40302 - Department of the Treasury Acquisition Regulation; Internet Payment Platform

    Science.gov (United States)

    2012-07-09

    ... payment, creating a standard set of electronic data to submit payment requests to the federal government... electronic invoicing and payment information system, and to change the definition of bureau to reflect the...-based electronic invoicing and payment system that processes vendor payment data electronically, either...

  3. CRADA Payment Options | NCI Technology Transfer Center | TTC

    Science.gov (United States)

    NCI TTC CRADA PAYMENT OPTIONS: Electronic Payments by Wire Transfer via Fedwire, Mail a check to the Institute or Center, or Automated Clearing House (ACH)/Electronic Funds Transfer (ETF) payments via Pay.gov (NCI ONLY).

  4. Retail payments and economic growth

    OpenAIRE

    Hasan, Iftekhar; De Renzis, Tania; Schmiedel , Heiko

    2012-01-01

    This paper examines the fundamental relationship between retail payments and overall economic growth. Using data from across 27 European markets over the period 1995–2009, the results confirm that migration to efficient electronic retail payments stimulates overall economic growth, consumption and trade. Among different payment instruments, this relationship is strongest for card payments, followed by credit transfers and direct debits. Cheque payments are found to have a relatively low macro...

  5. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  6. Electronic Payments and Consumer Protection : Should Recommendation 97/489/EC Be Replaced with a Directive?

    NARCIS (Netherlands)

    Schudelaro, A.A.P.

    2001-01-01

    This article examines the question whether the EC Regulation concerning transactions carried out by electronic payment instruments should be replaced by a Directive that is binding on all member states of the EU.

  7. Comparison of Current On-line Payment Technologies

    OpenAIRE

    Mandadi, Ravi

    2006-01-01

    The purpose of this thesis work was to make a survey of current on-line payment technologies and find out which are they and how do they work? Compare and analyze them from a security point of view, as well as a usability point of view. What is good? What is bad? What is lacking? To achieve this purpose, an overview of the current on-line payment technologies was acquired through academic books and papers, Internet sites, magazines. Basic cryptographic and security related techniques were stu...

  8. Exploring the Key Challenges: Adaptability, Sustainability, Interoperability and Security to M-payment

    OpenAIRE

    Rashmi Mantri; Junkang Feng

    2011-01-01

    Abstract: Any payment which uses mobile device as payment method is called M-payment whether it is proximity or remote and online or point of sale. Since it has been identified that mobile phone is everywhere and ever-present essential consumer device, and could be used for payment offline or online, Mobile payment has been hyped significantly. However early market adoption is facing some challenges and in need of the unanimous effort of all key players (manufacturers, mobile operators, merch...

  9. A security scheme of SMS system

    Science.gov (United States)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  10. Retail payments and the real economy

    OpenAIRE

    Hasan, Iftekhar; De Renzis, Tania; Schmiedel, Heiko

    2013-01-01

    This paper examines the fundamental relationship between retail payments and the real economy. Using data from across 27 European markets over the period 1995-2009, the results confirm that migration to efficient electronic retail payments stimulates the overall economy, consumption and trade. Among different payment instruments, this relationship is strongest for card payments, followed by credit transfers. Cheque payments are found to have a relatively low macroeconomic impact. Retail payme...

  11. 20 CFR 408.1220 - How do we pay Federally administered State recognition payments?

    Science.gov (United States)

    2010-04-01

    ... recognition payments? 408.1220 Section 408.1220 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1220 How do we pay Federally administered State recognition payments? (a) Payment procedures. We make...

  12. End-to-end encryption in on-line payment systems : The industry reluctance and the role of laws

    NARCIS (Netherlands)

    Kasiyanto, Safari

    2016-01-01

    Various security breaches at third-party payment processors show that online payment systems are the primary target for cyber-criminals. In general, the security of online payment systems relies on a number of factors, namely technical factors, processing factors, and legal factors. The industry

  13. Off-line electronic cash based on secret-key certificates

    NARCIS (Netherlands)

    S.A. Brands (Stefan)

    1995-01-01

    textabstractAn off-line electronic coin system is presented that offers multi-party security and unconditional privacy of payments. The system improves significantly on the efficiency of the previously most efficient such system known in the literature, due to application of a recently proposed

  14. What Should Be Considered for Acceptance Mobile Payment: An Investigation of the Factors Affecting of the Intention to Use System Services T-Cash

    Directory of Open Access Journals (Sweden)

    Riyan Rizkyandy

    2018-04-01

    Full Text Available E-Money mobile payments, also called digital money, are electronic payments, payment transactions using an Internet network integrated with NFC-enabled smartphones and prepaid cards. In Indonesia not only banks that issue e-money products, telecom operators from Telkomsel also issued an e-money product called T-cash. T-cash is a new innovation of electronic money presented by Telkomsel. The purpose of this study was to check the effect of responsiveness, smartness, perceived ease of use, perceived usefulness, social influence, and security against the intention to use T-cash. The data used in this study include primary and secondary data. Respondents in this study are users of T-cash products in Yogyakarta as many as 115 respondents. While the data were collected by using the questionnaire to then be analyzed using the amos analysis technique 22.0. The results of the analysis prove that two characteristics of technology, responsiveness and smartness have a significant effect on perceived usefulness. Ease of use has a significant effect on perceived usefulness. Ease of use, usefulness and security have a significant effect on intention to use. The higher the level of responsiveness, smartness, ease of use, perceived usefulness and security will also increase the use of T-cash social influence factors have no effect on intention to use.

  15. 75 FR 7551 - Transfer of Accumulated Benefit Payments

    Science.gov (United States)

    2010-02-22

    ...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2009-0067] RIN 0960-AH08 Transfer of Accumulated Benefit Payments AGENCY: Social Security Administration (SSA). ACTION: Final rule...

  16. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  17. 20 CFR 404.384 - Reductions, suspensions, and nonpayments of special age 72 payments.

    Science.gov (United States)

    2010-04-01

    ... 72 payments when you are not residing in the United States. No special payment is due you for any... special age 72 payments. 404.384 Section 404.384 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... Survivors' Insurance Benefits; Period of Disability Special Payments at Age 72 § 404.384 Reductions...

  18. Introduction of card payment system in a merchant company

    OpenAIRE

    Štrukelj, Anja

    2015-01-01

    The thesis is about PCI DSS, which stands for Payment Card Industry Data Security Standard. PCI DSS represents a uniőed approach to the protection of sensitive card data and to prevention of abuses in the payment card industry. Implementation of the standard in the company provides a higher level of security, it maintains conődence, protection against abuse and consequently protection against őnancial losses and loss of reputation. When paying with credit cards, the őrst lin...

  19. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    Science.gov (United States)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  20. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    Science.gov (United States)

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  1. 20 CFR 404.2109 - Responsibility for making payment decisions.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibility for making payment decisions. 404.2109 Section 404.2109 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... Provisions § 404.2109 Responsibility for making payment decisions. The Commissioner will decide— (a) Whether...

  2. 20 CFR 408.1201 - What are State recognition payments?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What are State recognition payments? 408.1201 Section 408.1201 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1201 What are State...

  3. The (emerging) needs for ADR in retail payment systems : Mediation

    NARCIS (Netherlands)

    Kasiyanto, Safari; Duchateau, Michiel; Lane, Lottie

    2016-01-01

    A number of empirical studies have demonstrated that rapid development of technology and innovation in payment systems (i.e. the use of cards and electronic networks, electronic money, mobile payments and the Internet) has triggered the significant increase in retail payment transactions around the

  4. 19 CFR 142.26 - Delinquent payment of Customs bills.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Delinquent payment of Customs bills. 142.26 Section 142.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... Delinquent payment of Customs bills. The following procedures shall be followed if an importer is...

  5. LEGAL SECURITY ON CELLPHONE TRADING THROUGH ELECTRONIC MEDIA IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Aan Aswari

    2017-05-01

    Full Text Available The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in performing its obligation reflect the concrete aspect. Warranty provides protection security for related parties with some governing regulations during transaction. However, some other supporting components have not been effectively contribute to balance the utilization of technology in trading. Keywords: legal security, trading, cellphone, electronic media

  6. Identification of Factors of Influence upon the Cost of Fixed Coupon Securities

    Directory of Open Access Journals (Sweden)

    Hlotov Yevhen O.

    2014-01-01

    Full Text Available The article studies fixed coupon securities (bonds. It provides a calculation of the cash flow, generated by fixed coupon securities, with enclosed discounted face value of securities. It analyses time indicator – average weighted duration of payments, which characterises sensitivity of the price of securities to changes of interest rates in the market. It proves availability of two groups of interconnections between the cost of a bond, coupon rate, market rate (rate of return and term of its payment. The first group of interconnections reflects interconnections between the cost of a bond, coupon rate and market rate (rate of return. The second group characterises connection between the bond cost and term of its payment. The authors study the average weighted duration of payments. It plays an important role in analysis of long-term securities with fixed income. To simplify calculations it was accepted that the coupon payment is done once a year. The article offers a formula for identifying inaccuracy of the bond price depending on the expected change of profitability on payment. Analysing duration properties the article identifies shortcomings inherent in this indicator. Taking into account the average weighted duration of payments the article recommends a formula, as more efficient, for identification of the future bond price depending on change of profitability. The conducted studies are a theoretical ground for development of models of management of fixed income securities portfolios. The obtained scientific results could be used in the educational process both in colleges and specialised trainings of securities specialists. The scientific results could be used for developing information technologies when identifying cost of securities (fixed coupon bonds.

  7. Study of Mobile Payment Services in India : Distribution of the roles, responsibilities and attitudes amongst actors of the payment systems

    OpenAIRE

    Singh Sambhy, Gurpreet

    2014-01-01

    Information technology and payment systems have witnessed the introduction, acceptance and wide scale deployment of electronic payment systems. The payment system ecosystem has now witnessed the introduction of mobile payment systems and their associated services. Major actors involved in mobile payment systems include telecom operators, banks, merchants and consumers. They need to aggregate their resources and develop a coherent ecosystem which would help the individual actors while also ben...

  8. 10 CFR 609.15 - Default, demand, payment, and collateral liquidation.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Default, demand, payment, and collateral liquidation. 609... PROJECTS THAT EMPLOY INNOVATIVE TECHNOLOGIES § 609.15 Default, demand, payment, and collateral liquidation... Guaranteed Obligation. Such assignment shall include all related liens, security, and collateral rights to...

  9. 7 CFR 3430.51 - Payment.

    Science.gov (United States)

    2010-01-01

    ... Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE RESEARCH, EDUCATION, AND EXTENSION... payments will be made in advance unless a deviation is accepted (see § 3430.3) or as specified in paragraph... Standard Application for Payments (ASAP) system, or another electronic funds transfer (EFT) method, except...

  10. Security of payment regime in construction industry: are Malaysian sub-contractors ready?

    OpenAIRE

    Supardi, Azizan; Adnan, Hamimah; Mohammad, Mohammad Fadhil

    2011-01-01

    In Malaysia, the particularly small sized sub-contractors are definitely benefited from payment provisions in the proposed Construction Industry Payment and Adjudication Act (CIPA Act), but need to enhance their knowledge in order to improve their awareness of the benefits of the Act. Accordingly, this on-going research attempts to introduce proper guidelines to the sub-contractors, in giving the knowledge, to claim for payment. Firstly, the research explored the problems and legal issues rel...

  11. An Integrated Mobile Phone Payment System Based on 3G Network

    OpenAIRE

    Weihui Dai; Xiang Cai; Haifeng Wu; Weidong Zhao; Xuan Li

    2011-01-01

    Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment c...

  12. Effectiveness Of Security Controls On Electronic Health Records

    Directory of Open Access Journals (Sweden)

    Everleen Wanyonyi

    2017-12-01

    Full Text Available Electronic Health Record EHR systems enhance efficiency and effectiveness in handling patients information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting the system and reviewing the implemented security safeguards. The study was done at a referral hospital level 6 government facility in Kenya. Purposive sampling was used to select a sample of 196 out of 385 staff and a questionnaire designed for qualitative data collection. Data was analyzed using SPSS software. Correlations and binary logistic regression were obtained. Binary Logistic Regression BLR was used to establish the effect of the safeguards predictors on EHR security. It was established that physical security contributes more to the security of an information system than administrative controls and technical controls in that order. BLR helped in predicting effective safeguards to control EHR security threats in limited resourced public health facilities.

  13. 20 CFR 408.1230 - Can you waive State recognition payments?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Can you waive State recognition payments? 408.1230 Section 408.1230 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1230 Can you waive...

  14. Design of the XML Security System for Electronic Commerce Application

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.

  15. Design of Prototype Payment Application System With Near Field Communication (NFC Technology based on Android

    Directory of Open Access Journals (Sweden)

    Huda Ubaya

    2012-06-01

    Full Text Available Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. People can get information, order tickets, download songs and perform commercial transactions, called mobile commerce. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced by non-physical payments are often called electronic money (e-money. An important technology behind mobile payments is called Near Field Communication (NFC. As an indication that the NFC has tremendous business potential, leading companies like Nokia, Microsoft, Visa Inc., and MasterCard Worldwide and NXP Semiconductors, is actively engaged on them. Payment processing integrated with NFC technology based mobile operating system that is a trend today is Android that support NFC technology is version 2.3.3 Gingerbread. The prototype application is designed to pay for 2 on the user side of the user as consumer and the merchant side as a trader or seller by using the handset that already have NFC technology is Google Samsung Nexus S. Pay an application prototype also implements the concept of security in e-commerce transactions by using the protocol-to-Tag Tag so that the user needs for security and comfort during the financial transaction are met.

  16. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  17. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  18. Designing internet-based payment system: guidelines and empirical basis

    NARCIS (Netherlands)

    Abrazhevich, D.; Markopoulos, P.; Rauterberg, G.W.M.

    2009-01-01

    This article describes research into online electronic payment systems, focusing on the aspects of payment systems that are critical for their acceptance by end users. Based on our earlier research and a diary study of payments with an online payment system and with online banking systems of a

  19. Application Security in the ISO27001 Environment

    CERN Document Server

    Vinod, Vasudevan; Firosh, Ummer

    2008-01-01

    Application Security in the ISO27001 Environment demonstrates how to secure software applications within a best practice ISO/IEC 27001 environment and supports implementation of the PCI DSS Payment Application Security Standard.

  20. Managing the security of nursing data in the electronic health record.

    Science.gov (United States)

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-02-01

    The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing

  1. 20 CFR 411.595 - What oversight procedures are planned for the EN payment systems?

    Science.gov (United States)

    2010-04-01

    ... EN payment systems? 411.595 Section 411.595 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.595 What oversight procedures are planned for the EN payment systems? We use audits, reviews, studies and observation of daily...

  2. 76 FR 65741 - Customs Brokers User Fee Payment for 2012

    Science.gov (United States)

    2011-10-24

    ... DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection Customs Brokers User Fee Payment for.... SUMMARY: This document provides notice to customs brokers that the annual fee of $138 that is assessed for... 2012 in accordance with the Tax Reform Act of 1986. DATES: Payment of the 2012 Customs Broker User Fee...

  3. 31 CFR 370.14 - Can substitute payment procedures be used?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Can substitute payment procedures be used? 370.14 Section 370.14 Money and Finance: Treasury Regulations Relating to Money and Finance... FUNDS TRANSFERS RELATING TO UNITED STATES SECURITIES Credit ACH Entries § 370.14 Can substitute payment...

  4. Towards Payment Systems for all: accessible POS

    Directory of Open Access Journals (Sweden)

    Begoña Pino

    2014-10-01

    Full Text Available The project presented here is a first step towards building a more accessible world through Payment Systems and a successful implementation of a User Centred Design. By means of a beep-system, a Point of Sale (POS payment device informs the user of those transaction steps that require his/her attention at the moment of payment, such as when: the card has been successfully read, the Personal Identification Number (PIN must be entered, the transaction has been successfully processed and the transaction has not been completed due to an error. The proposed solution increases the personal autonomy and security of blind people when paying at a merchant.

  5. The Nature of Payment Problems in the New Zealand Construction Industry

    Directory of Open Access Journals (Sweden)

    Thanuja Ramachandra

    2011-06-01

    Full Text Available Delay and loss of payment is a serious problem in the construction industry of many countries. These affect the cash flow of contractors which is critical to meeting their financial obligations. Payment defaults by the principal leads to insolvency of contractors and in turn other parts of the project chain. In recognition of some of these problems, most countries have established payment-specific construction industry legislation and other contractual measures to mitigate the problems, but nevertheless the problem persists. In this context, the paper examines the nature of payment problems in the construction industry in New Zealand. It is part of a larger study, that seeks solutions to payment losses in the construction industry.The study uses two approaches; an analysis of liquidators’ reports, and an analysis of court cases involving payment disputes to determine the magnitude of payment problems on construction parties. The findings are presented using simple descriptive and interpretive analyses. The study finds that trade creditors are impacted negatively (payment delays and losses by the liquidation of property developers, general construction and construction trade companies. 75% of trade creditors are unable to be paid fully by these categories of construction companies after liquidation proceedings. Liquidation proceedings take an average 18 months before they are finalised. The analysis of court cases found that 80% of payment disputes are between principals and contractors; with considerably significant percentage of disputes resulting in outright loss of payments. Only 40% of the cases are successful, in which case claimants are able to fully recover the amount in dispute. Payment losses are more prevalent in liquidation than delays and unlike in legal disputes, there is no security for those losses. The study finds that construction parties use remedies contained in the security of payment provisions within standard conditions

  6. The Nature of Payment Problems in the New Zealand Construction Industry

    Directory of Open Access Journals (Sweden)

    Thanuja Ramachandra

    2011-06-01

    Full Text Available Delay and loss of payment is a serious problem in the construction industry of many countries. These affect the cash flow of contractors which is critical to meeting their financial obligations. Payment defaults by the principal leads to insolvency of contractors and in turn other parts of the project chain. In recognition of some of these problems, most countries have established payment-specific construction industry legislation and other contractual measures to mitigate the problems, but nevertheless the problem persists. In this context, the paper examines the nature of payment problems in the construction industry in New Zealand. It is part of a larger study, that seeks solutions to payment losses in the construction industry.The study uses two approaches; an analysis of liquidators’ reports, and an analysis of court cases involving payment disputes to determine the magnitude of payment problems on construction parties. The findings are presented using simple descriptive and interpretive analyses. The study finds that trade creditors are impacted negatively (payment delays and losses by the liquidation of property developers, general construction and construction trade companies. 75% of trade creditors are unable to be paid fully by these categories of construction companies after liquidation proceedings. Liquidation proceedings take an average 18 months before they could be finalised. The analysis of court cases found that 80% of payment disputes are between principals and contractors; with considerably significant percentage of disputes resulting in outright loss of payments. Only 40% of the cases are successful, in which case claimants are able to fully recover the amount in dispute. Payment losses are more prevalent in liquidation than delays and unlike in legal disputes, there is no security for those losses. The study finds that construction parties use remedies contained in the security of payment provisions within standard

  7. Is Late or Non-Payment a Significant Problem to Malaysian Contractors?

    OpenAIRE

    M.E. Che Munaaim; M.S. Mohd Danuri; H. Abdul-Rahman

    2007-01-01

    Some developed countries have drawn lip construction-specific statutory security of payment acts/legislations typically known as Construction Contracts Act to eliminate poor payment practices and to assist continuous uninterrupted construction works. Malaysia too cannot pretend not to have these problems. This paper presents findings of a study conducted amongst Malaysian contractors with the aims to determine the seriousness of late and non- payment problems; to identify the main causes and ...

  8. 20 CFR 408.515 - When do we make SVB payments?

    Science.gov (United States)

    2010-04-01

    ... 408.515 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II... the first day of each month and represent payment for that month. If the first day of the month falls on a Saturday, Sunday, or Federal legal holiday, payment will be made on the first day preceding such...

  9. From Disparity to Harmonisation of Construction Industry Payment Legislation in Australia: A Proposal for a Dual Process of Adjudication based upon Size of Progress Payment Claim

    OpenAIRE

    Coggins, Jeremy

    2011-01-01

    Since the introduction of the Building and Construction Industry Security of Payment Act into New South Wales in 1999, construction industry payment legislation has progressively been enacted on a jurisdiction-by-jurisdiction basis throughout Australia. Of the eight Australian Acts, two distinct legislative models can be discerned – what have been termed the ‘East Coast’ and ‘West Coast’ models. This article compares the two models with respect to their payment s...

  10. The Relationship Between Magnet Designation, Electronic Health Record Adoption, and Medicare Meaningful Use Payments.

    Science.gov (United States)

    Lippincott, Christine; Foronda, Cynthia; Zdanowicz, Martin; McCabe, Brian E; Ambrosia, Todd

    2017-08-01

    The objective of this study was to examine the relationship between nursing excellence and electronic health record adoption. Of 6582 US hospitals, 4939 were eligible for the Medicare Electronic Health Record Incentive Program, and 6419 were eligible for evaluation on the HIMSS Analytics Electronic Medical Record Adoption Model. Of 399 Magnet hospitals, 330 were eligible for the Medicare Electronic Health Record Incentive Program, and 393 were eligible for evaluation in the HIMSS Analytics Electronic Medical Record Adoption Model. Meaningful use attestation was defined as receipt of a Medicare Electronic Health Record Incentive Program payment. The adoption electronic health record was defined as Level 6 and/or 7 on the HIMSS Analytics Electronic Medical Record Adoption Model. Logistic regression showed that Magnet-designated hospitals were more likely attest to Meaningful Use than non-Magnet hospitals (odds ratio = 3.58, P electronic health records than non-Magnet hospitals (Level 6 only: odds ratio = 3.68, P electronic health record use, which involves earning financial incentives for successful adoption. Continued investigation is needed to examine the relationships between the quality of nursing care, electronic health record usage, financial implications, and patient outcomes.

  11. 32 CFR 22.810 - Payments.

    Science.gov (United States)

    2010-07-01

    ..., whenever electronic commerce is used (i.e., EDI to request and authorize payments and electronic funds...) Expanding on these Governmentwide policies, DoD policy is for DoD Components to use electronic commerce, to... request by the administrative grants officer, when it is not possible to use electronic commerce and paper...

  12. Electronic Payments using Mobile Communication Devices

    NARCIS (Netherlands)

    Waaij, B.D. van der; Siljee, B.I.J.; Broekhuijsen, B.J.; Ponsioen, C.; Maas, A.; Aten, R.M.; Hoepman, J.H.; Loon, J.H. van; Smit, M.

    2009-01-01

    A method of making a payment uses a first mobile communication device (1) and a second mobile communication device (2), each mobile communication device being provided with a respective near field communication unit (11, 21) and at least one of the mobile communication devices being provided with an

  13. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  14. 49 CFR 1018.29 - Payments.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION GENERAL RULES AND REGULATIONS DEBT COLLECTION Administrative Collection of Claims § 1018.29... debt payment in the event the debtor defaults. If the debtor's financial statement discloses the ownership of assets which are free and clear of liens or security interests, or assets in which the debtor...

  15. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  16. Consumer’s and merchant’s confidence in internet payments

    Directory of Open Access Journals (Sweden)

    Franc Bračun

    2003-01-01

    Full Text Available Performing payment transactions over the Internet is becoming increasingly important. Whenever one interacts with others, he or she faces the problem of uncertainty because in interacting with others, one makes him or herself vulnerable, i.e. one can be betrayed. Thus, perceived risk and confidence are of fundamental importance in electronic payment transactions. A higher risk leads to greater hesitance about entering into a business relationship with a high degree of uncertainty; and therefore, to an increased need for confidence. This paper has two objectives. First, it aims to introduce and test a theoretical model that predicts consumer and merchant acceptance of the Internet payment solution by explaining the complex set of relationships among the key factors influencing confidence in electronic payment transactions. Second, the paper attempts to shed light on the complex interrelationship among confidence, control and perceived risk. An empirical study was conducted to test the proposed model using data from consumers and merchants in Slovenia. The results show how perceived risk dimensions and post-transaction control influence consumer’s and merchant’s confidence in electronic payment transactions, and the impact of confidence on the adoption of mass-market on-line payment solutions.

  17. SMEs, electronically-mediated working and data security: cause for concern?

    Directory of Open Access Journals (Sweden)

    Clear, F.

    2007-01-01

    Full Text Available Security of data is critical to the operations of firms. Without the ability to store, process and transmit data securely, operations may be compromised, with the potential for serious consequences to trading integrity. Thus the role that electronically-mediated working plays in business today and its dependency on data security is of critical interest, especially in light of the fact that much of this communication is based on the use of open networks (i.e. the Internet. This paper discusses findings from a ‘WestFocus’ survey on electronically-mediated working and telework amongst a sample of SMEs located in West London and adjacent counties in South-Eastern England in order to highlight the problems that such practice raises in terms of data security. Data collection involved a telephone survey undertaken in early 2006 of 378 firms classified into four industrial sectors (‘Media’, ‘Logistics’, ‘Internet Services’ and ‘Food Processing’. After establishing how ICTs and the Internet are being exploited as business applications for small firms, data security practice is explored on the basis of sector and size with a focus on telework. The paper goes on to highlight areas of concern in terms of data security policy and training practice. Findings show some sector and size influences.

  18. The mutual encouragement of the fear of crime and the security industry: The example of film narratives and electronic home security systems

    Directory of Open Access Journals (Sweden)

    Vladimira Ilić

    2016-02-01

    Full Text Available In a culture of fear, everyday life is experienced through the feeling of safety, part of which can be secured through certain electronic home security systems. Three films – Unlawful Entry (1992, Panic Room (2002 and When a Stranger Calls (2006 – will be used as examples in the attempt to consider the relationship between the fear of criminal activity – in this case break ins – and electronic home security systems. The basic premise of the research is that the culturally manufactured fear encourages the electronic home security system industry, the presence of which can, in turn, exasperate one’s fear of the risk of falling victim to violent crime.

  19. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  20. Adjusting health expenditure for military spending and interest payment: Israel and the OECD countries.

    Science.gov (United States)

    Shmueli, Amir; Israeli, Avi

    2013-02-20

    Compared to OECD countries, Israel has a remarkably low percentage of GDP and of government expenditure spent on health, which are not reflected in worse national outcomes. Israel is also characterized by a relatively high share of GDP spent on security expenses and payment of public debt. To determine to what extent differences between Israel and the OECD countries in security expenses and payment of the public debt might account for the gaps in the percentage of GDP and of government expenditures spent on health. We compare the percentages of GDP and of government expenditures spent on health in the OECD countries with the respective percentages when using primary civilian GDP and government expenditures (i.e., when security expenses and interest payment are deducted). We compared Israel with the OECD average and examined the ranking of the OECD countries under the two measures over time. While as a percentage of GDP, the national expenditure on health in Israel was well below the average of the OECD countries, as a percentage of primary civilian GDP it was above the average until 2003 and below the average thereafter. When the OECD countries were ranked according to decreasing percent of GDP and of government expenditure spent on health, adjusting for security and debt payment expenditures changed the Israeli rank from 23rd to 17th and from 27th to 25th, respectively. Adjusting for security expenditures and interest payment, Israel's low spending on health as a percentage of GDP and as a percentage of government's spending increases and is closer to the OECD average. Further analysis should explore the effect of additional population and macroeconomic differences on the remaining gaps.

  1. 20 CFR 408.1205 - How can a State have SSA administer its State recognition payment program?

    Science.gov (United States)

    2010-04-01

    ... recognition payment program? 408.1205 Section 408.1205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1205 How can a State have SSA administer its State recognition payment program? A State (or...

  2. 31 CFR 357.30 - Cases of delay or suspension of payment.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Cases of delay or suspension of payment. 357.30 Section 357.30 Money and Finance: Treasury Regulations Relating to Money and Finance... Securities System (Legacy Treasury Direct) § 357.30 Cases of delay or suspension of payment. If evidence...

  3. Bank Access Control of Electronic Payment Based on SPKI%基于SPKI电子支付中的银行端访问控制

    Institute of Scientific and Technical Information of China (English)

    王茜; 王富强; 傅鹤岗; 朱庆生

    2003-01-01

    In the system of electronic payment based on SPKI, access control of bank acts as the important function of identification, protecting customer's privacy and ensuring payment. The paper proposes the model of bank access control, and describes the frame and the steps of the access control. Finally, the paper analyzes the characteristics of the model.

  4. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.

    Science.gov (United States)

    Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun

    2015-01-01

    With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment.

  5. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism

    Directory of Open Access Journals (Sweden)

    Dongmei Han

    2015-01-01

    Full Text Available With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people’s awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people’s awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people’s cognition of potential risks in online financial payment.

  6. BRIEF CONSIDERATIONS ON THE NEW EUROPEAN REGULATION IN TERMS OF PAYMENT SERVICES

    Directory of Open Access Journals (Sweden)

    Alexandru Bulearcă

    2014-11-01

    Full Text Available Given that each Member State of the European Union had its own regulation in the matter of payments, the European Commission considered it necessary to adopt an uniform legislation in this regard. Consequently was adopted Directive 2007/64/EC of the European Parliament and of the Council which regulated payment services in the EU and the EEA (European Economic Area. In virtue of the obligation to transpose into the national law the provisions of this Directive, with effect from November 1, 2009 Romania adopted the Emergency Ordinance no. 113/2009 which regulated its own legislation on the provisions of Directive 2007/64/EC. Given the experience gained so far, considering the technological opportunities in the matter of payments and the change in habits of payment of the EU citizens and not only, in conjunction with the development of electronic commerce and increasing facilities offered by the payment service providers in the field of payments via mobile terminals, it has been concluded that provisions of Directive 2007/64/EC are largely overcome by the technological evolution. Wishing to maintain the regulations in the matter of payment services at the current technological level to guarantee the security of payment operations at the same time with the adaptation of the market of EU payments to the opportunities offered by the single market and simultaneously with supporting the EU economy growth, the European Commission has adopted a package of measures which include both a new directive relating to services of payment as well as a proposal for a regulation on inter-bank fees for card payments. The purpose of the regulation is the transparency of bank information on payment services; creating a single legal framework at the EU and EEA level in the matter of payment services and the protection of payment service consumers. The new regulation applies not only to payment transactions in the EU or EEA but also to payments made or received to

  7. 5 CFR 9901.344 - Other performance payments.

    Science.gov (United States)

    2010-01-01

    ... RELATIONS SYSTEMS (DEPARTMENT OF DEFENSE-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF DEFENSE NATIONAL SECURITY PERSONNEL SYSTEM (NSPS) Pay and Pay Administration Performance-Based Pay § 9901.344 Other... officials may make other performance payments to— (1) Reward extraordinary individual performance, as...

  8. 5 CFR 9701.363 - Special staffing payments.

    Science.gov (United States)

    2010-01-01

    ... Section 9701.363 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT... HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Special Payments § 9701.363 Special... serving in positions for which DHS is experiencing or anticipates significant recruitment and/or retention...

  9. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  10. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  11. Medicare incentive payments for meaningful use of electronic health records: accounting and reporting developments.

    Science.gov (United States)

    2012-02-01

    The Healthcare Financial Management Association through its Principles and Practices (P&P) Board publishes issue analyses to provide short-term practical assistance on emerging issues in healthcare financial management. In a new issue analysis excerpted in this article, HFMA's P&P Board provides some clarity to the healthcare industry on certain accounting and reporting issues resulting from incentive payments under the Medicare program for the meaningful use of electronic health record (EHR) technology. Consultation on these matters with independent auditors is highly recommended.

  12. 20 CFR 606.33 - No payment of interest from unemployment fund. [Reserved

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false No payment of interest from unemployment fund... LABOR TAX CREDITS UNDER THE FEDERAL UNEMPLOYMENT TAX ACT; ADVANCES UNDER TITLE XII OF THE SOCIAL SECURITY ACT Interest on Advances § 606.33 No payment of interest from unemployment fund. [Reserved] ...

  13. The Subject Analysis of Payment Systems Characteristics

    Directory of Open Access Journals (Sweden)

    Korobeynikova Olga Mikhaylovna

    2015-09-01

    Full Text Available The article deals with the analysis of payment systems aimed at identifying the categorical terminological apparatus, proving their specific features and revealing the impact of payment systems on the state of money turnover. On the basis of the subject analysis, the author formulates the definitions of a payment system (characterized by increasing speed of effecting payments, by the reduction of costs, by high degree of payments convenience for subjects of transactions, by security of payments, by acceptable level of risks and by social efficiency, a national payment system, and a local payment system (characterized by the growth of economic and social efficiency of systems participants, by the process of money turnover optimization on the basis of saving transaction costs and increasing speed of money flows within the local payment systems. According to the economic levels, the payment systems are divided to macrosystems (national payment systems, mezosystems (payment systems localized on the operational and territorial basis, microsystems (payments by individual economic subjects. The establishment of qualitative features of payment systems, which is a basis of the author’s terminological interpretation, gave a possibility to reveal the cause-effect relations of payment systems influence on the state of money turnover in the involved subjects, and on the economy as a whole. The result of the present research consists in revealing the payment systems influence on the state of money turnover which is significant: at the state and regional level – in the optimization of budget and inter-budgetary relations, in acceleration of the money turnover, in deceleration of the money supply and inflation rate, in reduced need in money emission; at the level of economic entities – in accelerating the money turnover and accounts receivable, in the reduction of debit and credit loans, in the growth of profit (turnover; at the household level – in

  14. Using Instant Messaging Systems as a Platform for Electronic Voting

    Science.gov (United States)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  15. Adjusting health expenditure for military spending and interest payment: Israel and the OECD countries

    Directory of Open Access Journals (Sweden)

    Shmueli Amir

    2013-02-01

    Full Text Available Abstract Background Compared to OECD countries, Israel has a remarkably low percentage of GDP and of government expenditure spent on health, which are not reflected in worse national outcomes. Israel is also characterized by a relatively high share of GDP spent on security expenses and payment of public debt. Objectives To determine to what extent differences between Israel and the OECD countries in security expenses and payment of the public debt might account for the gaps in the percentage of GDP and of government expenditures spent on health. Methods We compare the percentages of GDP and of government expenditures spent on health in the OECD countries with the respective percentages when using primary civilian GDP and government expenditures (i.e., when security expenses and interest payment are deducted. We compared Israel with the OECD average and examined the ranking of the OECD countries under the two measures over time. Results While as a percentage of GDP, the national expenditure on health in Israel was well below the average of the OECD countries, as a percentage of primary civilian GDP it was above the average until 2003 and below the average thereafter. When the OECD countries were ranked according to decreasing percent of GDP and of government expenditure spent on health, adjusting for security and debt payment expenditures changed the Israeli rank from 23rd to 17th and from 27th to 25th, respectively. Conclusions Adjusting for security expenditures and interest payment, Israel's low spending on health as a percentage of GDP and as a percentage of government's spending increases and is closer to the OECD average. Further analysis should explore the effect of additional population and macroeconomic differences on the remaining gaps.

  16. Security in the Dutch electronic patient record system

    NARCIS (Netherlands)

    van 't Noordende, G.

    2010-01-01

    In this article, we analyze the security architecture of the Dutch Electronic Patient Dossier (EPD) system. Intended as a mandatory infrastructure for exchanging medical records of most if not all patients in the Netherlands among authorized parties (particularly, physicians), the EPD has to address

  17. 48 CFR 3032.006 - Reduction or suspension of contract payments upon finding of fraud.

    Science.gov (United States)

    2010-10-01

    ... contract payments upon finding of fraud. 3032.006 Section 3032.006 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL CONTRACTING... finding of fraud. ...

  18. Security of Electronic Banking

    OpenAIRE

    Pařil, Jan

    2015-01-01

    Hlavním zaměřením diplomové práce je elektronické bankovnictví a jeho bezpečnost. Práce obsahuje zhodnocení současného stavu zabezpečení elektronického bankovnictví, možné hrozby napadení elektronického bankovnictví a rizika prolomení zabezpečení. Další část vyhodnocuje dotazník, který zjišťoval spokojenost uživatelů s bezpečností elektronického bankovnictví. Jsou doporučeny nové formy zabezpečení. The main focus of the thesis is an electronic banking and security. The work includes evalua...

  19. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  20. Healthcare information privacy and security regulatory compliance and data security in the age of electronic health records

    CERN Document Server

    Robichau, Bernard Peter

    2014-01-01

    Healthcare is a huge market--20% of yearly GDP in the U.S. It employs tens of thousands of computer programmers and IT administrators Regulations mandate electronic health records by 2015 (for anyone dealing with Medicare/Medicaid), which means new concerns for privacy and security Many medical organizations lagging, putting them at risk for government fines and private lawsuits when a breach in security occurs. Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge.

  1. Security analysis of electronic voting and online banking systems

    OpenAIRE

    Tjøstheim, Thomas

    2007-01-01

    The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, a case study where we apply the proposed model, a new scheme for remote electronic voting, and three case studies of commercial online banking solutions in Norway.

  2. 76 FR 52862 - Time for Payment of Certain Excise Taxes, and Quarterly Excise Tax Payments for Small Alcohol...

    Science.gov (United States)

    2011-08-24

    ... 40 Cigars and cigarettes, Claims, Electronic fund transfers, Excise taxes, Labeling, Packaging and... that are not required to pay taxes through electronic funds transfer (EFT), this first payment period..., Electronic funds transfers, Excise taxes, Exports, Food additives, Fruit juices, Labeling, Liquors, Packaging...

  3. Positive Prerequisites for the Use of Reliefs in the Payment of Dues on Social Insurance Contributions

    Directory of Open Access Journals (Sweden)

    Zbigniew Ofiarski

    2014-06-01

    Full Text Available It is permissible to use reliefs in the payment of social security contributions, based either on a definitive waiver by the creditor of the whole or relevant part of the amount due (partial or complete remission or only a temporary waiver of such amounts (payment deferral or payment in installments. The use of such reliefs is possible upon the occurrence of conditions laid down in the Act, for example, in the case of total non-recovery of contributions, for economic or other reasons worth considering, if justified by important interests of the person concerned. The prerequisites mentioned above have a nature of general clauses, allowing for their flexible adjustment to specific situations. Entities authorized to grant reliefs in the payment of social security contributions act within the limits of administrative discretion. But it is not a fully free operation, because the economic impact resulting from the use of such reliefs has a direct impact on the financial balance of earmarked funds which finance social security benefits, in particular pensions, disability allowances and other benefits.

  4. Develop security architecture for both in-house healthcare information systems and electronic patient record

    Science.gov (United States)

    Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.

    2003-05-01

    In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

  5. Conditions for acceptance and usage of mobile payment procedures

    OpenAIRE

    Pousttchi, Key

    2003-01-01

    Mobile payment (MP) is crucial for, but not limited to mobile commerce. The key to mobile payment acceptance is in the hands of customers. In this paper we examine the conditions for acceptance and actual usage of MP procedures by the customer. We identify essential conditions which belong to the categories costs, security and convenience. Different preferences lead to an individual set of essential conditions for any single user. We propose a scheme for their representation and comparison an...

  6. 76 FR 3502 - Time for Payment of Certain Excise Taxes, and Quarterly Excise Tax Payments for Small Alcohol...

    Science.gov (United States)

    2011-01-20

    ..., Surety bonds, Virgin Islands, Warehouses. 27 CFR Part 40 Cigars and cigarettes, Claims, Electronic fund... required to pay taxes through electronic funds transfer (EFT), this first payment period ends on September... Part 19 Caribbean Basin Initiative, Claims, Electronic funds transfers, Excise taxes, Exports, Gasohol...

  7. 20 CFR 408.1235 - How does the State transfer funds to SSA to administer its recognition payment program?

    Science.gov (United States)

    2010-04-01

    ... administer its recognition payment program? 408.1235 Section 408.1235 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1235 How does the State transfer funds to SSA to administer its recognition payment program...

  8. Federally Administered SSI Payments, Recipients by State and Other Area, Eligibility Category, and Age, Table 10, December 2008

    Data.gov (United States)

    Social Security Administration — A statistical table of the number of recipients entitled to receive payments under Title 16 of the Social Security Act (Supplemental Security Income) by eligibility...

  9. Method for secure electronic voting system: face recognition based approach

    Science.gov (United States)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  10. 7 CFR 1421.404 - Financial security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial security. 1421.404 Section 1421.404...-MARKETING ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 Designated Marketing Associations for Peanuts § 1421.404 Financial security. In order to be approved to handle loans and loan...

  11. 76 FR 81019 - Electronic Fund Transfers (Regulation E)

    Science.gov (United States)

    2011-12-27

    ... Requirements for gift cards and gift certificates. Appendix A to Part 1005--Model Disclosure Clauses and Forms... financial institution to a consumer to defer payment of debt, incur debt and defer its payment, or purchase... purchase or sale of a security or commodity, if the security or commodity is: (i) Regulated by the...

  12. Legal Risk Associated with Electronic Funds Transfer

    OpenAIRE

    Abdulah, Samahir

    2014-01-01

    The past thirty years have seen rapid advances in the technological component of banking services and as a consequence new legal issues have come to the fore, especially with regard to Electronic Fund Transfers (EFTs) which are now used to transfer money around the world, and have made fund transactions between payers and payees easier, faster and more secure. The method involves risks for both banks and customers, due to the possibility of unauthorized payments risks, credit and insolvency p...

  13. 75 FR 71799 - Medicare Program: Hospital Outpatient Prospective Payment System and CY 2011 Payment Rates...

    Science.gov (United States)

    2010-11-24

    ...The final rule with comment period in this document revises the Medicare hospital outpatient prospective payment system (OPPS) to implement applicable statutory requirements and changes arising from our continuing experience with this system and to implement certain provisions of the Patient Protection and Affordable Care Act, as amended by the Health Care and Education Reconciliation Act of 2010 (Affordable Care Act). In this final rule with comment period, we describe the changes to the amounts and factors used to determine the payment rates for Medicare hospital outpatient services paid under the prospective payment system. These changes are applicable to services furnished on or after January 1, 2011. In addition, this final rule with comment period updates the revised Medicare ambulatory surgical center (ASC) payment system to implement applicable statutory requirements and changes arising from our continuing experience with this system and to implement certain provisions of the Affordable Care Act. In this final rule with comment period, we set forth the applicable relative payment weights and amounts for services furnished in ASCs, specific HCPCS codes to which these changes apply, and other pertinent ratesetting information for the CY 2011 ASC payment system. These changes are applicable to services furnished on or after January 1, 2011. In this document, we also are including two final rules that implement provisions of the Affordable Care Act relating to payments to hospitals for direct graduate medical education (GME) and indirect medical education (IME) costs; and new limitations on certain physician referrals to hospitals in which they have an ownership or investment interest. In the interim final rule with comment period that is included in this document, we are changing the effective date for otherwise eligible hospitals and critical access hospitals that have been reclassified from urban to rural under section 1886(d)(8)(E) of the Social Security

  14. Security Implications of Electronic Commerce: A Survey of Consumers and Businesses.

    Science.gov (United States)

    Furnell, S. M.; Karweni, T.

    1999-01-01

    Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…

  15. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  16. Security of electronic mental health communication and record-keeping in the digital age.

    Science.gov (United States)

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.

  17. Image-based electronic patient records for secured collaborative medical applications.

    Science.gov (United States)

    Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

  18. LEGAL SECURITY ON CELLPHONE TRADING THROUGH ELECTRONIC MEDIA IN INDONESIA

    OpenAIRE

    Aan Aswari

    2017-01-01

    The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

  19. Legal Security on Cellphone Trading Through Electronic Media in Indonesia

    OpenAIRE

    Aswari, Aan; Pasamai, Syamsudin; Qomar, Nurul; Abbas, Ilham

    2017-01-01

    The rapid growth of technology development brings impact on human life related to its utilization. This article analyzes legal security through several components in a cellphone trading through electronic media. This study is a conceptual idea and shows that the implementation of legal security in several components should provide solution to any potential conflicts. A good intention component should be applied to form an ideal legal relation from the beginning to the end and realization in p...

  20. Patients' willingness to pay for electronic communication with their general practitioner.

    Science.gov (United States)

    Bergmo, Trine Strand; Wangberg, Silje Camilla

    2007-06-01

    Despite the common use of electronic communication in other aspects of everyday life, its use between patients and health care providers has been slow to diffuse. Possible explanations are security issues and lack of payment mechanisms. This study investigated how patients value secure electronic access to their general practitioner (GP). One hundred and ninety-nine patients were asked an open-ended willingness-to-pay (WTP) question as part of a randomised controlled trial. We compared the WTP values between two groups of respondents; one group had had the opportunity to communicate electronically with their GP for a year and the other group had not. Fifty-two percent of the total sample was willing to pay for electronic GP contact. The group of patients with access revealed a significantly lower WTP than the group without such access. Possible explanations are that the system had fewer benefits than expected, a presence of hypothetical bias or simply a preference for face-to-face encounters.

  1. 75 FR 33099 - Amendment to Municipal Securities Disclosure

    Science.gov (United States)

    2010-06-10

    ... delinquencies; (2) non-payment related defaults; (3) unscheduled draws on debt service reserves reflecting... to statistics assembled by the Securities Industry and Financial Markets Association (``SIFMA''), the....org/uploadedFiles/Research/Statistics/SIFMA_USMunicipalSecuritiesHolders.pdf ) (``SIFMA Report''). As...

  2. 75 FR 49821 - Information Reporting for Payments Made in Settlement of Payment Card and Third Party Network...

    Science.gov (United States)

    2010-08-16

    ...-value cards (including gift cards). All of these provisions are retained in the final regulations... statutory definition are met. Electronic benefit transactions for the purchase of goods or services, made on... goods or services to (1) send a purchase invoice electronically to customers; and (2) accept payment...

  3. 31 CFR 321.7 - Authorized cash payments.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Authorized cash payments. 321.7 Section 321.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... registration on the front of the security, or by a person authorized or empowered to act for a corporate legal...

  4. Security, privacy and ethics in electronic records management in the ...

    African Journals Online (AJOL)

    Security, privacy and ethics in electronic records management in the South African public sector. ... Computers have become such valuable tools for conducting business ... One great advantage of the computers is the ease with which a large

  5. 12 CFR 344.7 - Settlement of securities transactions.

    Science.gov (United States)

    2010-01-01

    ... of securities transactions. (a) A bank shall not effect or enter into a contract for the purchase or... for payment of funds and delivery of securities later than the third business day after the date of... offering. A bank shall not effect or enter into a contract for the purchase or sale of the securities that...

  6. Current Mobile Payment Procedures on the German Market from the View of Customer Requirements

    OpenAIRE

    Pousttchi, Key; Zenker, M.

    2003-01-01

    The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the most relevant acceptance criteria. The outcome of the paper is an evaluation scheme containing the covered payment scenarios, important main criteria (security, costs and convenience) and additional functionality requirements for each MP procedure. The scheme is based on empirical results and can assess a given MP proce...

  7. Gifts, bribes and solicitions: print media and the social construction of informal payments to doctors in Taiwan.

    Science.gov (United States)

    Chiu, Yu-Chan; Smith, Katherine Clegg; Morlock, Laura; Wissow, Lawrence

    2007-02-01

    The Taiwanese practice of patients giving informal payments to physicians to secure services is deeply rooted in social and cultural factors. This study examines the portrayal of informal payments by Taiwanese print news media over a period of 12 years-from prior to until after the implementation of national health insurance (NHI) in Taiwan in 1995. The goal of the study was to examine how the advent of NHI changed the rationale for and use of informal payments. Both before and after the introduction of NHI, Taiwanese newspapers portrayed informal payments as appropriate means to secure access to better health care. Newspaper accounts established that, although NHI reduced patients' financial barriers to care, it did not change deeply held cultural beliefs that good care depended on the development of a reciprocal sense of obligation between patients and physicians. Physicians may have also encouraged the ongoing use of informal payments to make up revenue lost when NHI standardized fees and limited income from dispensing medications. In 2002, seven years after the implementation of NHI, the use of informal payments, though illegal, was still being justified in the print media through allusions to its role in traditional Taiwanese culture.

  8. Mastering Mobile Security

    Science.gov (United States)

    Panettieri, Joseph C.

    2007-01-01

    Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…

  9. 31 CFR 353.40 - Special provisions for payment.

    Science.gov (United States)

    2010-07-01

    ... Federal Reserve Bank without the owner's signature to the request for payment, if the bond bears the... attorney-in-fact to sell or redeem the grantor's securities, sell his or her personal property, or... be affected by the subsequent incompetence or incapacity of the grantor. Medical evidence or other...

  10. 15 CFR 785.19 - Payment of final assessment.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Payment of final assessment. 785.19 Section 785.19 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS ENFORCEMENT § 785...

  11. Causes of Payment Problems in the New Zealand Construction Industry

    Directory of Open Access Journals (Sweden)

    Thanuja Ramachandra

    2015-03-01

    Full Text Available Payment delays and losses persist in the construction industry and continue to be a key concern to industry practitioners. Therefore an exploration of the key causes of payment delays and losses is undertaken in this study with the ultimate objective of seeking mitigating solutions. The study adopted a survey approach using an online questionnaire, administered to practitioners from the New Zealand construction industry, comprising consultants, head contractors and subcontractors. The data obtained was analysed using inferential statistical techniques, including comparing means and factor analysis. Factor analysis enabled clustering of the inter-related causes of payment delays and losses in order to find reduced number of causes. Accordingly, the study found that payment problems mainly relate to contractual issues, financial strength of industry players, disputes, short-comings of payment processes and ‘domino effects’. Among them, the financial strength of critical industry players was considered central to payment problems. The study concludes that any solution to these problems must address these primary causes, as a rational starting point. Thus procuring a feasible form of financial security at the outset of a project, and the pre-qualification of the financial status of critical project participants, were found to be significant in the mitigation of construction payment risks. Paper Type: Research article

  12. 48 CFR 1332.1108 - Payment by Governmentwide commercial purchase card.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Payment by Governmentwide commercial purchase card. 1332.1108 Section 1332.1108 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Electronic Funds Transfer 1332.1108 Payment by...

  13. From Disparity to Harmonisation of Construction Industry Payment Legislation in Australia: A Proposal for a Dual Process of Adjudication based upon Size of Progress Payment Claim

    Directory of Open Access Journals (Sweden)

    Jeremy Coggins

    2011-06-01

    Full Text Available Since the introduction of the Building and Construction Industry Security of Payment Act into New South Wales in 1999, construction industry payment legislation has progressively been enacted on a jurisdiction-by-jurisdiction basis throughout Australia. Of the eight Australian Acts, two distinct legislative models can be discerned – what have been termed the ‘East Coast’ and ‘West Coast’ models. This article compares the two models with respect to their payment systems and adjudication schemes, procedural justice afforded, incursion upon freedom of contract, uptake rates and efficiency. From this comparison, the strengths and weaknesses of the two models are identified. Finally, a dual process of adjudication based on progress payment claim size is proposed for a harmonised model, developed from previous proposals put forward by other authors, which aims to combine the strengths of the two existing models.

  14. Medicare Program; Hospital Inpatient Prospective Payment Systems for Acute Care Hospitals and the Long-Term Care Hospital Prospective Payment System and Policy Changes and Fiscal Year 2018 Rates; Quality Reporting Requirements for Specific Providers; Medicare and Medicaid Electronic Health Record (EHR)

    Science.gov (United States)

    2017-08-14

    We are revising the Medicare hospital inpatient prospective payment systems (IPPS) for operating and capital-related costs of acute care hospitals to implement changes arising from our continuing experience with these systems for FY 2018. Some of these changes implement certain statutory provisions contained in the Pathway for Sustainable Growth Rate (SGR) Reform Act of 2013, the Improving Medicare Post-Acute Care Transformation Act of 2014, the Medicare Access and CHIP Reauthorization Act of 2015, the 21st Century Cures Act, and other legislation. We also are making changes relating to the provider-based status of Indian Health Service (IHS) and Tribal facilities and organizations and to the low-volume hospital payment adjustment for hospitals operated by the IHS or a Tribe. In addition, we are providing the market basket update that will apply to the rate-of-increase limits for certain hospitals excluded from the IPPS that are paid on a reasonable cost basis subject to these limits for FY 2018. We are updating the payment policies and the annual payment rates for the Medicare prospective payment system (PPS) for inpatient hospital services provided by long-term care hospitals (LTCHs) for FY 2018. In addition, we are establishing new requirements or revising existing requirements for quality reporting by specific Medicare providers (acute care hospitals, PPS-exempt cancer hospitals, LTCHs, and inpatient psychiatric facilities). We also are establishing new requirements or revising existing requirements for eligible professionals (EPs), eligible hospitals, and critical access hospitals (CAHs) participating in the Medicare and Medicaid Electronic Health Record (EHR) Incentive Programs. We are updating policies relating to the Hospital Value-Based Purchasing (VBP) Program, the Hospital Readmissions Reduction Program, and the Hospital-Acquired Condition (HAC) Reduction Program. We also are making changes relating to transparency of accrediting organization survey

  15. A security analysis of the Dutch electronic patient record system

    NARCIS (Netherlands)

    van 't Noordende, G.

    2010-01-01

    In this article, we analyze the security architecture of the Dutch Electronic Patient Dossier (EPD) system. Intended as a national infrastructure for exchanging medical patient records among authorized parties (particularly, physicians), the EPD has to address a number of requirements, ranging from

  16. An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving

    Directory of Open Access Journals (Sweden)

    Hong Zhong

    2016-01-01

    Full Text Available With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.

  17. Is Late or Non-Payment a Significant Problem to Malaysian Contractors?

    Directory of Open Access Journals (Sweden)

    M.E. Che Munaaim

    2007-12-01

    Full Text Available Some developed countries have drawn lip construction-specific statutory security of payment acts/legislations typically known as Construction Contracts Act to eliminate poor payment practices and to assist continuous uninterrupted construction works. Malaysia too cannot pretend not to have these problems. This paper presents findings of a study conducted amongst Malaysian contractors with the aims to determine the seriousness of late and non- payment problems; to identify the main causes and effects of late and non-payment; and to identify ways to sustain the payment flows in the Malaysian construction industry. The study focused on contractual payments from the paymaster (government or private to the contractors. The main factors for late and nonpayment in the construction industry identified from the study include: delay in certification, paymaster's poor financial management, local culture/attitude, pay master's failure to implement good governance in business, underpayment of certified amounts by the pay master and the use of 'pay when paid' clauses in contracts. The research findings show that late and non-payment can create cash flow problems, stress and financial hardship on the contractors. Amongst the most appropriate solutions to overcome the problem of late and non-payment faced by local contractors include: a right to regular periodic payment, a right to a defined time frame (or payment and a right to a speedy dispute resolution mechanism. Promptness of submitting, processing, issuing interim payment certificates and honouring the certificates are extremely important issues in relation to progress payment claims. Perhaps, an increased sense of professionalism in construction industry could overcome some of the problems related to late and non- payment issues.

  18. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.

    Science.gov (United States)

    Yang, Che-Ming; Lin, Herng-Ching; Chang, Polun; Jian, Wen-Shan

    2006-06-01

    The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world including Health Insurance Portability and Accountability Act (HIPAA) of the U.S. The trend of a centralized bill that focuses on managing computerized health information is the part that needs our further attention. Under the sponsor of Taiwan's Department of Health (DOH), our expert panel drafted the "Medical Information Security and Privacy Protection Guidelines", which identifies nine principles and entails 12 articles, in the hope that medical organizations will have an effective reference in how to manage their medical information in a confidential and secured fashion especially in electronic transactions.

  19. From Paper-based to Electronic Securities Posttrading

    DEFF Research Database (Denmark)

    Rapp, Hermann; Parisi, Cristiana

    centuries old business practices in the investment industry. This study focuses on CREST, a leading settlement infrastructure that facilitated the leap from paper-based to electronic post-trading in London. In 1993 it started as a project of the Bank of England, and today, CREST is operated by Euroclear......Over recent decades, securities post-trading has seen a radical change from paper-based to electronic procedures. Technological advances have facilitated digitisation as a global trend. While in the investment industry technology has also been a key driver for financial automation since the late...... United Kingdom & Ireland (EUI). Research objectives of this study are to investigate the industry context, how the CREST project was managed and introduced at a time of crisis, how the technology was designed, and its impact on financial markets and today’s UK and European infrastructure. Twenty...

  20. Security of electronic medical information and patient privacy: what you need to know.

    Science.gov (United States)

    Andriole, Katherine P

    2014-12-01

    The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients' private information confidential while allowing providers access to and maintaining the integrity of relevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today's electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  1. Identifikasi Pembayaran Bergerak (Mobile Payment) yang Mengganggu (Disruptive) di Indonesia

    OpenAIRE

    Mawarrini, Robertta Indira

    2017-01-01

    This research aims to identify disruptive mobile payment in Indonesia. Mobile payment as a sector of financial technology is enabling the lifestyle transformation of electronic banking. The future of retail banking is a smartphone experience that gladden and customers also aspire for a “bank in my pocket”. Mobile payment as the second sector most likely to be disrupted in the intersection of finance and technology industry. The promising approach of disruptive innovations is proposed by Profe...

  2. 49 CFR 107.616 - Payment procedures.

    Science.gov (United States)

    2010-10-01

    ... Department's e-Commerce Internet site. Access to this service is provided at http://hazmat.dot.gov/regs... Registration Fee,” or by completing an authorization for payment by credit card or other electronic means of...

  3. 19 CFR 142.14 - Delinquent payment of Customs bills.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Delinquent payment of Customs bills. 142.14 Section 142.14 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... of Customs bills. The following procedure shall be followed if an importer is substantially or...

  4. Information Security - A Growing Challenge for Online Business

    OpenAIRE

    Gabriela GHEORGHE; Ioana LUPASC

    2017-01-01

    In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.

  5. The Development Model Electronic Commerce of Regional Agriculture

    Science.gov (United States)

    Kang, Jun; Cai, Lecai; Li, Hongchan

    With the developing of the agricultural information, it is inevitable trend of the development of agricultural electronic commercial affairs. On the basis of existing study on the development application model of e-commerce, combined with the character of the agricultural information, compared with the developing model from the theory and reality, a new development model electronic commerce of regional agriculture base on the government is put up, and such key issues as problems of the security applications, payment mode, sharing mechanisms, and legal protection are analyzed, etc. The among coordination mechanism of the region is discussed on, it is significance for regulating the development of agricultural e-commerce and promoting the regional economical development.

  6. 33 CFR 116.45 - Submission of bids, approval of award, guaranty of cost, and partial payments for bridges...

    Science.gov (United States)

    2010-07-01

    ... award, guaranty of cost, and partial payments for bridges eligible for funding under the Truman-Hobbs... SECURITY BRIDGES ALTERATION OF UNREASONABLY OBSTRUCTIVE BRIDGES § 116.45 Submission of bids, approval of award, guaranty of cost, and partial payments for bridges eligible for funding under the Truman-Hobbs...

  7. 20 CFR 408.820 - Will we send you a notice of intended action affecting your SVB payment status?

    Science.gov (United States)

    2010-04-01

    ... affecting your SVB payment status? 408.820 Section 408.820 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Suspensions and Terminations Termination § 408... (subject to the effects of intervening events on the payment which are not appealed within 10 days of...

  8. 13 CFR 107.1500 - General description of Participating Securities.

    Science.gov (United States)

    2010-01-01

    ... (see § 107.570). (4) Equity investing, as set forth in this paragraph (b)(4). If you issue Participating Securities, you must invest an amount equal to the Original Issue Price of such securities solely... Securities—Prioritized Payments, Adjustments, and Profit Participation. When you issue Participating...

  9. Medicare Program; Merit-Based Incentive Payment System (MIPS) and Alternative Payment Model (APM) Incentive Under the Physician Fee Schedule, and Criteria for Physician-Focused Payment Models. Final rule with comment period.

    Science.gov (United States)

    2016-11-04

    The Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) repeals the Medicare sustainable growth rate (SGR) methodology for updates to the physician fee schedule (PFS) and replaces it with a new approach to payment called the Quality Payment Program that rewards the delivery of high-quality patient care through two avenues: Advanced Alternative Payment Models (Advanced APMs) and the Merit-based Incentive Payment System (MIPS) for eligible clinicians or groups under the PFS. This final rule with comment period establishes incentives for participation in certain alternative payment models (APMs) and includes the criteria for use by the Physician-Focused Payment Model Technical Advisory Committee (PTAC) in making comments and recommendations on physician-focused payment models (PFPMs). Alternative Payment Models are payment approaches, developed in partnership with the clinician community, that provide added incentives to deliver high-quality and cost-efficient care. APMs can apply to a specific clinical condition, a care episode, or a population. This final rule with comment period also establishes the MIPS, a new program for certain Medicare-enrolled practitioners. MIPS will consolidate components of three existing programs, the Physician Quality Reporting System (PQRS), the Physician Value-based Payment Modifier (VM), and the Medicare Electronic Health Record (EHR) Incentive Program for Eligible Professionals (EPs), and will continue the focus on quality, cost, and use of certified EHR technology (CEHRT) in a cohesive program that avoids redundancies. In this final rule with comment period we have rebranded key terminology based on feedback from stakeholders, with the goal of selecting terms that will be more easily identified and understood by our stakeholders.

  10. Information Security - A Growing Challenge for Online Business

    Directory of Open Access Journals (Sweden)

    Gabriela GHEORGHE

    2017-06-01

    Full Text Available In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.

  11. A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

    Directory of Open Access Journals (Sweden)

    V. Conti

    2009-01-01

    Full Text Available The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management and personal ubiquitous authentication. The multimodal technique uses both fingerprint micro features (minutiae and fingerprint macro features (singularity points for robust user authentication. To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on the same device, so that all critical information (e.g. biometric data, account transactions and cryptographic keys, are managed and stored inside the sensor, without any data transmission. The sensor has been prototyped using the Celoxica RC203E board, achieving fast execution time, low working frequency, and good recognition performance.

  12. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  13. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  14. Uganda; Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on the following topics: Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, and Payment Systems

    OpenAIRE

    International Monetary Fund

    2003-01-01

    This paper presents findings of Uganda’s Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, Insurance Regulation, Corporate Governance, and Payment Systems. The banking system in Uganda, which dominates the financial system, is fundamentally sound, more resilient than in the past, and currently poses no threat to macroeconomic stability. A major disruption ...

  15. 20 CFR 416.2090 - State funds transferred for supplementary payments.

    Science.gov (United States)

    2010-04-01

    ... payments. 416.2090 Section 416.2090 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL... by SSA on behalf of the State, and administration fees owed to SSA, respectively. (b) Accounting of... balance of the State's cash on deposit with SSA. (2) SSA shall provide an accounting of State funds...

  16. A Study of Various Electronic Security Sensors Devices and Technology at Various Application Field Accompanied With Real Time Project Implementation of Sensor

    OpenAIRE

    Vijay Laxmi Kalyani; Parmeet Kour; Peram Navya

    2016-01-01

    Abstract: Nowadays electronics is everywhere and we are surrounded with electronic gazettes many of them are helping us in maintaining security at various places, there are many security problems faced by banks, homes etc. Without proper and strong security a vault can be penetrated. A security system is used in residential, commercial, industrial, Medical and Militaries as well as personal protection. In this paper we are discussing about the various electronic security sensor devices and te...

  17. Payment Schemes in Conditional Cash Transfer Programs: The Case of 4Ps in the Davao Region, Philippines

    Directory of Open Access Journals (Sweden)

    Ma Cecilia Catubig

    2015-11-01

    Full Text Available This paper evaluates current payment schemes employed by the Pantawid Pamilyang Pilipino Program (4Ps in the Philippines using six assessment criteria: transaction cost, security/risks, speed and timeliness, acceptability, resilience and flexibility. Employing data collected at the regional level, we establish four main findings: (1 all 4Ps payment conduits present trade-offs; (2 a payment approach that uses mainstream financial infrastructure is beneficial if cost, speed and simplicity of the payment system are critical; (3 competition for 4Ps contracts for Payment Service Providers (PSPs has improved the quality of payment services and minimized costs; and (4 the efficiency of the program is greatly influenced by the commitment of the PSP to deliver the cash benefits to the recipients in a timely manner rather than by maximizing conduit branches.

  18. Preparing for budget-based payment methodologies: global payment and episode-based payment.

    Science.gov (United States)

    Hudson, Mark E

    2015-10-01

    Use of budget-based payment methodologies (capitation and episode-based bundled payment) has been demonstrated to drive value in healthcare delivery. With a focus on high-volume, high-cost surgical procedures, inclusion of anaesthesiology services in these methodologies is likely. This review provides a summary of budget-based payment methodologies and practical information necessary for anaesthesiologists to prepare for participation in these programmes. Although few examples of anaesthesiologists' participation in these models exist, an understanding of the structure of these programmes and opportunities for participation are available. Prospective preparation in developing anaesthesiology-specific bundled payment profiles and early participation in pathway development associated with selected episodes of care are essential for successful participation as a gainsharing partner. With significant opportunity to contribute to care coordination and cost management, anaesthesiology can play an important role in budget-based payment programmes and should expect to participate as full gainsharing partners. Precise costing methodologies and accurate economic modelling, along with identification of quality management and cost control opportunities, will help identify participation opportunities and appropriate payment and gainsharing agreements. Anaesthesiology-specific examples with budget-based payment models are needed to help guide increased participation in these programmes.

  19. 电子商务安全体系结构%Security Architecture for Electronic Commerce

    Institute of Scientific and Technical Information of China (English)

    张峰; 秦志光; 刘锦德; 张险峰

    2002-01-01

    Electronic commerce operates relying on the open Internet. Security architecture for e-commerce becomes the key point to its use prosperously. A finite automation of typical e-commerce model is presented in this paper. The finite automation simulates typical trade system, describes its states transition and supplies a theory basis for designing security architecture for e-commerce. Then security threats and corresponding solutions to the model are discussed. Finally, the security architecture for e-commerce is given. All of them are used as basis for further e-commerce security research.

  20. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    OpenAIRE

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  1. Medicare Program; Advancing Care Coordination Through Episode Payment Models (EPMs); Cardiac Rehabilitation Incentive Payment Model; and Changes to the Comprehensive Care for Joint Replacement Model (CJR). Final rule.

    Science.gov (United States)

    2017-01-03

    This final rule implements three new Medicare Parts A and B episode payment models, a Cardiac Rehabilitation (CR) Incentive Payment model and modifications to the existing Comprehensive Care for Joint Replacement model under section 1115A of the Social Security Act. Acute care hospitals in certain selected geographic areas will participate in retrospective episode payment models targeting care for Medicare fee-forservice beneficiaries receiving services during acute myocardial infarction, coronary artery bypass graft, and surgical hip/femur fracture treatment episodes. All related care within 90 days of hospital discharge will be included in the episode of care. We believe these models will further our goals of improving the efficiency and quality of care for Medicare beneficiaries receiving care for these common clinical conditions and procedures.

  2. 27 CFR 46.233 - Payment of floor stocks tax.

    Science.gov (United States)

    2010-04-01

    ... tax. 46.233 Section 46.233 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...) Electronic funds transfer. If the dealer pays any other excise taxes collected by TTB by electronic funds transfer, then the dealer must also send the payment for the floor stocks tax by an electronic funds...

  3. Secure and Trustable Electronic Medical Records Sharing using Blockchain

    OpenAIRE

    Dubovitskaya, Alevtina; Xu, Zhigang; Ryu, Samuel; Schumacher, Michael; Wang, Fusheng

    2017-01-01

    Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthc...

  4. 33 CFR 153.407 - Payments or reimbursements from the pollution fund.

    Science.gov (United States)

    2010-07-01

    ... the pollution fund. 153.407 Section 153.407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION CONTROL OF POLLUTION BY OIL AND HAZARDOUS SUBSTANCES, DISCHARGE REMOVAL Administration of the Pollution Fund § 153.407 Payments or reimbursements from the pollution fund...

  5. 20 CFR 404.1267 - Failure to make timely payments-for wages paid prior to 1987.

    Science.gov (United States)

    2010-04-01

    ... Governments If A State Fails to Make Timely Payments-for Wages Paid Prior to 1987 § 404.1267 Failure to make... to the State under the other provision of the Social Security Act. [53 FR 32976, Aug. 29, 1988, as... paid prior to 1987. 404.1267 Section 404.1267 Employees' Benefits SOCIAL SECURITY ADMINISTRATION...

  6. Beyond RFID : the NFC Security Landscape

    NARCIS (Netherlands)

    Hoepman, J.H.; Siljee, B.I.J.

    2007-01-01

    For applications like mobile payments for which the use of NFC technology is considered, security is of paramount importance. This whitepaper discusses the main risks associated with using NFC technology, and the possible countermeasures that can be used to mitigate those risks.

  7. Prompt payment depends on revenue-cycle diligence.

    Science.gov (United States)

    Barber, Robert L

    2002-12-01

    How effectively you manage the revenue cycle is reflected in the cycle's outcome-whether you receive full and timely payment for all services billed to payers. To ensure prompt and full payment, you should: Educate your patient financial services (PFS) staff on all relevant laws and regulations regarding payment for healthcare services. Make sure your staff is well versed in all of the provisions of your payer contracts. Implement a state-of-the-art patient accounting system that is capable of producing drill-down reports of all aspects of contract performance by payer. Enforce payer compliance by maintaining complete records of dates of service, final billing dates, dates claims were mailed or electronically submitted to the payer, all actions performed by your staff regarding claims, and all communications with the payer.

  8. 31 CFR 363.143 - What happens if an ACH payment used to purchase a certificate of indebtedness is later reversed?

    Science.gov (United States)

    2010-07-01

    ... processed security transactions, including securities that were purchased as gifts and securities that have... to purchase a certificate of indebtedness is later reversed? 363.143 Section 363.143 Money and... Indebtedness § 363.143 What happens if an ACH payment used to purchase a certificate of indebtedness is later...

  9. SISTEMAS DE PAGO SEGURO. SEGURIDAD EN EL COMERCIO ELECTRÓNICO

    Directory of Open Access Journals (Sweden)

    Luis Martínez López

    2009-06-01

    Full Text Available The electronic commerce (e-commerce in Internet arose at the end of the 90s as a transforming element of the society in the 21st century. Even though the evolution of the electronic commerce has been important, it has not reached the initial expectations. The lack of tools to support the users' confidence about the new model of commerce through computer networks has been an important problem for its growth. Fortunately, the appearance of technologies and electronic payment systems offer users security and integrity guarantees to carry out electronic transactions. Nevertheless, the lack of confidence keeps being the main barrier (not technical but psychological to achieve the success of the e-commerce. In this paper, we review the three main secure payment protocols in e-commerce, SSL (Secure Sockets Layer, SET (Secure Electronic Transaction and 3D Secure, with the aim of removing any doubt about the lack of security in the electronic commercial transactions.

  10. World Health Organization's Innovative Direct Disbursement Mechanism for Payment of Grassroots Immunization Personnel and Operations in Nigeria: 2004-2015.

    Science.gov (United States)

    Yehualashet, Yared G; Wadda, Alieu; Agblewonu, Koffi B; Zhema, Theophilus; Ibrahim, Al-Asi A; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G; Nsubuga, Peter; Ashogbon, Daniel

    2016-05-01

    Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM partners introduced mobile payment to

  11. Hacking point of sale payment application secrets, threats, and solutions

    CERN Document Server

    Gomzin, Slava

    2014-01-01

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendati

  12. 17 CFR 275.206(4)-3 - Cash payments for client solicitations.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Cash payments for client... for client solicitations. (a) It shall be unlawful for any investment adviser required to be... client at the time of the solicitation or referral; or (iii) Other than a solicitor specified in...

  13. Payment Instrument Characteristics

    DEFF Research Database (Denmark)

    Holst, Jacques; Kjeldsen, Martin; Hedman, Jonas

    2015-01-01

    Over the last decade, we have witnessed payment innovations that fundamentally have changed the ways we pay. Payment innovations, such as mobile payments and on-line banking, include characteristics or features that are essential to understand if we want to know how and why payers choose among...... payment innovations. Using the Repertory Grid technique to explore 15 payers’ perception of six payment instruments, including coins, banknotes, debit cards, credit cards, mobile payments, and on-line banking, we identify 16 payment characteristics. The characteristics aggregate seventy-six unique...

  14. Payment card rewards programs and consumer payment choice

    OpenAIRE

    Andrew Ching; Fumiko Hayashi

    2006-01-01

    Card payments have been growing very rapidly. To continue the growth, payment card networks keep adding new merchants and card issuers try to stimulate their existing customers’ card usage by providing rewards. This paper seeks to analyze the effects of payment card rewards programs on consumer payment choice, by using consumer survey data. Specifically, we examine whether credit/debit reward receivers use credit/debit cards relatively more often than other consumers, if so how much more ofte...

  15. Derivatives Market's Payment Priorities as Financial Crisis Accelerator

    OpenAIRE

    Roe, Mark J.

    2011-01-01

    Chapter 11 bars bankrupt debtors from immediately repaying their creditors, so that the bankrupt firm can reorganize without creditors shredding the bankrupt’s business. Not so for the bankrupt’s derivatives counterparties, who unlike most creditors, even most other secured creditors, can seize and immediately liquidate collateral, net out gains and losses, terminate their contracts with the bankrupt, and keep both preferential eve-of-bankruptcy payments and fraudulent conveyances they obtain...

  16. Secure and Trustable Electronic Medical Records Sharing using Blockchain.

    Science.gov (United States)

    Dubovitskaya, Alevtina; Xu, Zhigang; Ryu, Samuel; Schumacher, Michael; Wang, Fusheng

    2017-01-01

    Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthcare data management, in particular, for EMR data sharing between healthcare providers and for research studies. We propose a framework on managing and sharing EMR data for cancer patient care. In collaboration with Stony Brook University Hospital, we implemented our framework in a prototype that ensures privacy, security, availability, and fine-grained access control over EMR data. The proposed work can significantly reduce the turnaround time for EMR sharing, improve decision making for medical care, and reduce the overall cost.

  17. Electronic Communication of Protected Health Information: Privacy, Security, and HIPAA Compliance.

    Science.gov (United States)

    Drolet, Brian C; Marwaha, Jayson S; Hyatt, Brad; Blazar, Phillip E; Lifchez, Scott D

    2017-06-01

    Technology has enhanced modern health care delivery, particularly through accessibility to health information and ease of communication with tools like mobile device messaging (texting). However, text messaging has created new risks for breach of protected health information (PHI). In the current study, we sought to evaluate hand surgeons' knowledge and compliance with privacy and security standards for electronic communication by text message. A cross-sectional survey of the American Society for Surgery of the Hand membership was conducted in March and April 2016. Descriptive and inferential statistical analyses were performed of composite results as well as relevant subgroup analyses. A total of 409 responses were obtained (11% response rate). Although 63% of surgeons reported that they believe that text messaging does not meet Health Insurance Portability and Accountability Act of 1996 security standards, only 37% reported they do not use text messages to communicate PHI. Younger surgeons and respondents who believed that their texting was compliant were statistically significantly more like to report messaging of PHI (odds ratio, 1.59 and 1.22, respectively). A majority of hand surgeons in this study reported the use of text messaging to communicate PHI. Of note, neither the Health Insurance Portability and Accountability Act of 1996 statute nor US Department of Health and Human Services specifically prohibits this form of electronic communication. To be compliant, surgeons, practices, and institutions need to take reasonable security precautions to prevent breach of privacy with electronic communication. Communication of clinical information by text message is not prohibited under Health Insurance Portability and Accountability Act of 1996, but surgeons should use appropriate safeguards to prevent breach when using this form of communication. Copyright © 2017 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  18. World Health Organization's Innovative Direct Disbursement Mechanism for Payment of Grassroots Immunization Personnel and Operations in Nigeria: 2004–2015

    Science.gov (United States)

    Yehualashet, Yared G.; Wadda, Alieu; Agblewonu, Koffi B.; Zhema, Theophilus; Ibrahim, Al-asi A.; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G.; Nsubuga, Peter; Ashogbon, Daniel

    2016-01-01

    Background. Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. Methods. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Results. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM

  19. Perceptions of the risk of child abduction or loss and the utility of child electronic security devices.

    Science.gov (United States)

    Dixon, R M; Pasnak, R

    1997-09-01

    Perceptions of the susceptibility of young children to becoming lost or being abducted, and of the potential usefulness of child electronic security devices, were examined via a questionnaire. Data were provided by 41 volunteers, most of them from a local government office centre. The questionnaire asked for demographic data, and then for the risk of a child being abducted or lost when under the supervision of different caregivers and in different situations. The probable effectiveness of three common abductor ploys was also addressed. The questionnaire concluded with 10 questions about child electronic security devices. Respondents viewed mothers, fathers, and grandparents as equally responsible caregivers and young adults/babysitters as the least responsible. These effects diminished as the age of the children increased. The garden at home was judged to be the most secure environment for children of all ages, while an amusement park was judged the least secure environment. Children were perceived to be more at risk of an abduction when a stranger asked for physical assistance or to take them to the hospital because their parents were hurt, than when asked for directions. Furthermore, the respondents expressed a moderately strong need for child electronic security devices, and viewed parents who use them as more responsible than those who do not.

  20. Costs, advantages and drawbacks of the various means of payment

    OpenAIRE

    National Bank of Belgium

    2006-01-01

    The total macroeconomic costs of the payment instruments used in the points of sale can be estimated to be 2.034 million euros, or 0.74 p.c. of Belgian GDP in 2003. The payment costs arising from cash were 0.58 p.c. of GDP, compared to 0.11 p.c. for debit cards, 0.04 p.c. for credit cards and 0.02 p.c. for the electronic purse Proton. About 50.5 p.c. of the payment costs originate in points of sale, whilst 47.1 p.c. come from the financial sector and 2.3 p.c. from currency-issuing institution...

  1. 48 CFR 552.232-25 - Prompt Payment.

    Science.gov (United States)

    2010-10-01

    ... electronic data interchange (EDI) purchase orders (transaction set 850). (ii) The Contractor must generate and submit to the Government valid EDI invoices (transaction set 810) or submit invoices through the... of the Contractor, EFT payments through the Automated Clearing House (ACH) system. (iv) The EDI...

  2. Convertible security design and contract innovation

    NARCIS (Netherlands)

    Lewis, C.M.; Verwijmeren, P.

    2011-01-01

    This paper studies convertible security design for a sample of 814 issuers over the years 2000 through 2007. Using a nested logit model, we examine how firms choose fixed income claims and the method of payment. We find that fixed income claims are chosen to reduce corporate income taxes, minimize

  3. Privacy preservation and information security protection for patients' portable electronic health records.

    Science.gov (United States)

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2009-09-01

    As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

  4. Variation in Payment Rates under Medicare's Inpatient Prospective Payment System.

    Science.gov (United States)

    Krinsky, Sam; Ryan, Andrew M; Mijanovich, Tod; Blustein, Jan

    2017-04-01

    To measure variation in payment rates under Medicare's Inpatient Prospective Payment System (IPPS) and identify the main payment adjustments that drive variation. Medicare cost reports for all Medicare-certified hospitals, 1987-2013, and Dartmouth Atlas geographic files. We measure the Medicare payment rate as a hospital's total acute inpatient Medicare Part A payment, divided by the standard IPPS payment for its geographic area. We assess variation using several measures, both within local markets and nationally. We perform a factor decomposition to identify the share of variation attributable to specific adjustments. We also describe the characteristics of hospitals receiving different payment rates and evaluate changes in the magnitude of the main adjustments over time. Data downloaded from the Centers for Medicare and Medicaid Services, the National Bureau of Economic Research, and the Dartmouth Atlas. In 2013, Medicare paid for acute inpatient discharges at a rate 31 percent above the IPPS base. For the top 10 percent of discharges, the mean rate was double the IPPS base. Variations were driven by adjustments for medical education and care to low-income populations. The magnitude of variation has increased over time. Adjustments are a large and growing share of Medicare hospital payments, and they create significant variation in payment rates. © Health Research and Educational Trust.

  5. Payment Platform

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Damsgaard, Jan

    2012-01-01

    thoroughly and substitute current payment standards in the decades to come. This paper portrays how digital payment platforms evolve in socio-technical niches and how various technological platforms aim for institutional attention in their attempt to challenge earlier platforms and standards. The paper...... applies a co-evolutionary multilevel perspective to model the interplay and processes between technology and society wherein digital payment platforms potentially will substitute other payment platforms just like the credit card negated the check. On this basis this paper formulate a multilevel conceptual...

  6. Selected Methods For Increases Reliability The Of Electronic Systems Security

    Directory of Open Access Journals (Sweden)

    Paś Jacek

    2015-11-01

    Full Text Available The article presents the issues related to the different methods to increase the reliability of electronic security systems (ESS for example, a fire alarm system (SSP. Reliability of the SSP in the descriptive sense is a property preservation capacity to implement the preset function (e.g. protection: fire airport, the port, logistics base, etc., at a certain time and under certain conditions, e.g. Environmental, despite the possible non-compliance by a specific subset of elements this system. Analyzing the available literature on the ESS-SSP is not available studies on methods to increase the reliability (several works similar topics but moving with respect to the burglary and robbery (Intrusion. Based on the analysis of the set of all paths in the system suitability of the SSP for the scenario mentioned elements fire events (device critical because of security.

  7. Taxonomy of Payments

    DEFF Research Database (Denmark)

    Hedman, Jonas; Tan, Felix B.; Holst, Jacques

    2017-01-01

    that impact payers’ choice of payment instruments. Design/methodology/approach: Through in-depth interviews using the repertory grid technique, the authors explored 15 payers’ perceptions of six payment instruments, including coins, banknotes, debit cards, credit cards, mobile payments, and online banking....... The approach draws heavily on organizational systematics to better understand payers’ choice of payment instruments. Findings: A four-category taxonomy of payments was developed. The authors refer to the taxonomy as the 4Ps: the purchase, the payer, the payment instrument, and the physical technology...... or checks. Research limitations/implications: The findings suggest that payers view payment instruments in a much broader sense, including context, control, or cultural beliefs. Consequently, the authors suggest that researchers try to understand the essence of an innovation before assuming any economic...

  8. An Approach to the Optimization of Mobile Payments for the Transport System using (NFC through Cloud Computing

    Directory of Open Access Journals (Sweden)

    Estevan Gómez Torres

    2017-02-01

    Full Text Available The use of mobile devices has gradually increased. Every day, the number of organizations adopting systems which include some type of mobile payments is becoming bigger. Because of this reason, it is mandatory to have agile and quick systems to guarantee security and reliability, not only for the user but also for the operator. In that way, users will get a high-quality service based on mobile technologies. An analysis of NFC Technology has been made in this paper taking into consideration a proposal of a system development including mobile payments, which could be used in the transportation system of Metro of Quito. To assure the response time and transactional security, the use of cloud computing is recommended.

  9. 77 FR 54912 - Proposed Agency Information Collection Activities; Comment Request

    Science.gov (United States)

    2012-09-06

    ...-party fraud. The other surveys request similar types of confidential ``number and value'' information... checks; process electronic payments; and issue, transfer, and redeem U.S. government securities. The.... Selected Payment Initiation Channels: Respondents would report the number and value of online payments and...

  10. Pixelgram: an application of electron-beam lithography for the security printing industry

    Science.gov (United States)

    Lee, Robert A.

    1991-10-01

    Following the development of the Catpix I diffraction gratings structure first used on the 1988 Australian plastic DLR10 banknote and more recently on the Singapore plastic DLR50 banknote, the CSIRO Australia, Division of Materials Science & Technology has developed a new optical security and anti-counterfeiting technology known as Pixelgram (or Catpix 2). The Pixelgram, which is subject to patent, is an optically variable device based on a computerized procedure for producing an optically variable version of any given input picture, e.g., a photograph. When a Pixelgram is observed under a given source, such as a fluorescent tube, the image of the original input picture appears at particular angles of view. At other angles, the image varies in both contrast and brightness and can even appear as the photographic negative of the original input picture at some angles of view. As well as its ability to generate optically variable text and graphical images, Pixelgram has the unique capability of being able to display easily recognizable small scale optically variable images of the human face of near photographic clarity. Pixelgram optical security device master plates are produced by a technique borrowed from the microelectronics industry and known as electron beam lithography. In this technique, millions of microscopic grooves are written individually by a finely focused electron beam scanning across a glass plate coated with an electron sensitive material. On a typical Pixelgram there are approximately 2,000 million individual polygons etched into the plate by the electron beam. This corresponds to more than 10,000 megabytes of binary data. The only known electron beam lithography systems that have been able to write such large data files with the required precision are the Cambridge Instruments EBMF 10.5 and EBML 300 electron beam systems.

  11. Stochastic reactive power market with volatility of wind power considering voltage security

    International Nuclear Information System (INIS)

    Kargarian, A.; Raoofat, M.

    2011-01-01

    While wind power generation is growing rapidly around the globe; its stochastic nature affects the system operation in many different aspects. In this paper, the impact of wind power volatility on the reactive power market is taken into account. The paper presents a novel stochastic method for optimal reactive power market clearing considering voltage security and volatile nature of the wind. The proposed optimization algorithm uses a multiobjective nonlinear programming technique to minimize market payment and simultaneously maximize voltage security margin. Considering a set of probable wind speeds, in the first stage, the proposed algorithm seeks to minimize expected system payment which is summation of reactive power payment and transmission loss cost. The object of the second stage is maximization of expected voltage security margin to increase the system loadability and security. Finally, in the last stage, a multiobjective function is presented to schedule the stochastic reactive power market using results of two previous stages. The proposed algorithm is applied to IEEE 14-bus test system. As a benchmark, Monte Carlo Simulation method is utilized to simulate the actual market of given period of time to evaluate results of the proposed algorithm, and satisfactory results are achieved. -- Highlights: →The paper proposes a new algorithm for stochastic reactive power market clearing. →The stochastic nature of the wind which impacts the system operation and market clearing process, is taken into account. →The paper suggests an expected voltage stability margin and optimizes it in conjunction with expected total market payment. →To clear the market with two mentioned objective functions, a three-stage multiobjective nonlinear programming is implemented. →Also, a simple method is suggested to determine a suitable priority coefficient between two individual objective functions.

  12. The Peruvian Citizen Perception and Expectation toward the e-Government. The Electronic Tax Payment as a Successful e-Gov Project

    Directory of Open Access Journals (Sweden)

    Diego Cardona

    2010-05-01

    Full Text Available In this chapter, the authors try to stand out how the Latin American governments, specifically the Peruvian government, can evaluate its efforts implementing electronic administration initiatives, identifying what the citizen expects from the electronic administration and how he or she perceives it, applying an evaluation model to the electronic tax payment service implemented, as a successful initiative at Latin-America. The proposed model to achieve this, was developed by one of the authors during his doctoral dissertation (Cardona, 2004 and evaluated by the other one as dissertation judge. It includes five different independent and latent constructs, Attitude, Aptitude, Trust, Relevance and Satisfaction that affect two dependent and latent constructs, the Citizen Perception and the Citizen Expectative towards its relationship with the Public Administration through the use of Information and Communication Technologies - ICT, under the effect of illustrative variables related with citizen, institutions and context.

  13. The Regulation of the Security of Electronic Information in Lithuania and Russia: the Comparative Aspects

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-02-01

    Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references. The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania. The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation. The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security. Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official

  14. The Regulation of the Security of Electronic Information in Lithuania and Russia: the Comparative Aspects

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2012-12-01

    Full Text Available Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with such offences as terrorism and drug trafficking due to its risks and profitability. Therefore, the legal regulation of cybercrime is one of the most relevant problems in the world, including Lithuania and our neighbouring country, Russia. So far cybercrime analysis in scientific literature has been rather limited. We have not succeeded in finding a comparison between the regulatory practices of cybercrime in the Russian Federation and the Republic of Lithuania in any of the references.The main goal of the thesis paper is to analyse and to compare the electronic information security legal framework of the Russian Federation and the Republic of Lithuania.The article consists of two parts. The first part deals with the comparative aspect of strategic documents—the program governing electronic information protection in Lithuania and the Russian Federation.The second part of the article examines the comparative aspect of electronic information protection legislative, legal framework Republic of Lithuania and the Russian Federation. It was found that at the moment in both countries there is a strategic document which defines the planned state policy in this area, but the lack of a Lithuanian Law which can fully and consistently regulate social relations in relation to electronic information security.Several different approaches have been used in the research. The authors have used a comparative method to investigate the Lithuanian and Russian legal framework for the security of electronic information. Empirical analysis of legal documents was used to determine the legal regulation of the security of electronic information in Lithuania and Russia. Legal acts of the Republic of Lithuania and the Russian Federation have been analysed. Having analysed the official

  15. Patient Centeredness in Electronic Communication: Evaluation of Patient-to-Health Care Team Secure Messaging

    Science.gov (United States)

    Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G

    2018-01-01

    Background As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Objective Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. Methods We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Results Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70

  16. Methods of Payment to Banks: e-Banking. Comparative Study on Three Banks

    Directory of Open Access Journals (Sweden)

    Miranda Petronella VLAD

    2012-11-01

    Full Text Available E-banking website, majority offers the banks. At first it was electronic-banking, Internet-banking followed, followed by mobile-banking service. These services offer the same facilities, Customer Bank just that varies the channel used for communication with the Bank. The services offered by banks through E-banking, approves: compilation of orders; scheduled payments; orders for payment of wages; internal transfers; pay rates on internal or external; currency exchanges; view balances of accounts at any time; information about foreign exchange rates; view and print account statements; the definition of beneficiaries of direct payments by the client.

  17. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    Science.gov (United States)

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  18. Modelling a Java Ring based implementation of an N-Count payment system

    NARCIS (Netherlands)

    Revill, J.D.; Hartel, Pieter H.

    N-Count is a system for offline value transfer. A prototype of an N-Count payment system has been designed, and it has been implemented in Java. We have used the Java Ring with the Java Card API as a secure device. The system has also been modelled using the Spin model checker. The combined

  19. Presentation of various types of electronic business available on the Internet, Advantages, Disadvantages, Key Requirements and Security, Implementation Model of an Electronic Business

    OpenAIRE

    Andreea A.S. Ionescu; Raul Serban

    2012-01-01

    This paper speaks about the advantages, disadvantages, key requirements necessary of an electronic business, the infrastructure of the Internet, the existing main networks on the Internet, standards used to develop electronic business and the security of an e-business environment. As we know in an organization the information is an asset that has value and should be protected and diversified. We also propose an implementation model of an electronic business that interconnects two concepts: ER...

  20. [ELGA--the electronic health record in the light of data protection and data security].

    Science.gov (United States)

    Ströher, Alexander; Honekamp, Wilfried

    2011-07-01

    The introduction of an electronic health record (ELGA) is a subject discussed for a long time in Austria. Another big step toward ELGA is made at the end of 2010 on the pilot project e-medication in three model regions; other projects should follow. In addition, projects of the ELGA structure are sped up on the part of the ELGA GmbH to install the base of a functioning electronic health record. Unfortunately, many of these initiatives take place, so to speak, secretly, so that in the consciousness of the general public - and that includes not only patients but also physicians and other healthcare providers - always concerns about protection and security of such a storage of health data arouse. In this article the bases of the planned act are discussed taking into account the data protection and data security.

  1. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    OpenAIRE

    Stanislav A. Shikov

    2017-01-01

    Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT), and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of T...

  2. M&E-NetPay: A Micropayment System for Mobile and Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Xiaodi Huang

    2016-08-01

    Full Text Available As an increasing number of people purchase goods and services online, micropayment systems are becoming particularly important for mobile and electronic commerce. We have designed and developed such a system called M&E-NetPay (Mobile and Electronic NetPay. With open interoperability and mobility, M&E-NetPay uses web services to connect brokers and vendors, providing secure, flexible and reliable credit services over the Internet. In particular, M&E-NetPay makes use of a secure, inexpensive and debit-based off-line protocol that allows vendors to interact only with customers, after validating coins. The design of the architecture and protocol of M&E-NetPay are presented, together with the implementation of its prototype in ringtone and wallpaper sites. To validate our system, we have conducted its evaluations on performance, usability and heuristics. Furthermore, we compare our system to the CORBA-based (Common Object Request Broker Architecture off-line micro-payment systems. The results have demonstrated that M&E-NetPay outperforms the .NET-based M&E-NetPay system in terms of performance and user satisfaction.

  3. Patient Centeredness in Electronic Communication: Evaluation of Patient-to-Health Care Team Secure Messaging.

    Science.gov (United States)

    Hogan, Timothy P; Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G

    2018-03-08

    As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70.2%, 262/373 vs 82.0%, 277/338), and

  4. 33 CFR 135.103 - Levy and payment of barrel fee on OCS oil.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Levy of Fees § 135.103 Levy and payment of barrel fee on OCS oil. (a) A fee of $.03 per... paragraph (a) of this section applies whenever the unobligated Fund balance is less than $200,000,000. (d...

  5. Modeling the Process of Purchase Payment as a Constituent of Information Security in E-commerce

    Directory of Open Access Journals (Sweden)

    Volodymyr Skitsko

    2016-01-01

    Full Text Available A mathematical model of the process of payment for purchases in an online store has been presented. The model belongs to the class of semi-open queueing networks with four phases of exponential servers and Poisson arrivals. The authors describe in detail the derivation of the equations describing the system. Analytic expressions are derived on the basis of the proposed model for the average number of online store customers who have already paid for goods. Practical implementation of the model allows us to determine the number of clients who have added goods to their cart, but have not yet passed through the payment verification system, and thus determine the stream of real customers of the online store. (original abstract

  6. Security Analysis of the Electronic Management System for a Total Site Utility System

    DEFF Research Database (Denmark)

    Manso Cortes, Oscar

    2016-01-01

    This paper presents the Security Analysis of the Electronic Management System (EMS) of a Total Site Utility System as proposed under the scope of the Efenis project. The Efenis project has been funded by the European Commission via the seventh framework programme (EC FP7) with the aim to improve ...

  7. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    Science.gov (United States)

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  8. 42 CFR 413.350 - Periodic interim payments for skilled nursing facilities receiving payment under the skilled...

    Science.gov (United States)

    2010-10-01

    ... facilities receiving payment under the skilled nursing facility prospective payment system for Part A... nursing facilities receiving payment under the skilled nursing facility prospective payment system for... SNF receiving payment under the prospective payment system may receive periodic interim payments (PIP...

  9. A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography

    Science.gov (United States)

    Anitha Devi, M. D.; ShivaKumar, K. B.

    2017-08-01

    Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

  10. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.

    Science.gov (United States)

    Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy

    Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

  11. Auctioning payment entitlements

    DEFF Research Database (Denmark)

    Nielsen, Kurt

    2005-01-01

    Payment entitlements is a new commodity that arises from the new European common agricultural policy. The agricultural subsidies are decoupled from the actual production and replaced by the so-called payment entitlements. A payment entitlement has a farm specific value and may be freely traded. T...

  12. Use of Payment Technology

    DEFF Research Database (Denmark)

    Xiao, Xiao; Hedman, Jonas; Runnemark, Emma

    2015-01-01

    Drawing on the theory of consumption value, this research-in-progress strives to provide a theoretical explanation of payment technology use by investigating the relationship between consumers’ perceptions of different consumption values associated with a certain payment technology and their choice...... to use the technology. We conducted the study in the context of Denmark, a Northern European country, with three well established payment technologies: cash, payment cards, and Internet banking. Following a focus group of identifying and defining four types of consumption values associated with each...... payment technology, a survey was then conducted by a national statistics agency in the country. Preliminary results have shown that different consumption values matter for the use of different payment technologies. The findings will potentially contribute to a better understanding of consumer payment...

  13. 26 CFR 1.6050S-4 - Information reporting for payments of interest on qualified education loans.

    Science.gov (United States)

    2010-04-01

    ... on qualified education loans. 1.6050S-4 Section 1.6050S-4 Internal Revenue INTERNAL REVENUE SERVICE... Information reporting for payments of interest on qualified education loans. (a) Electronic furnishing of... payments of interest on qualified education loans (furnisher) to the individual to whom it is required to...

  14. 29 CFR 2509.78-1 - Interpretive bulletin relating to payments by certain employee welfare benefit plans.

    Science.gov (United States)

    2010-07-01

    ... employee welfare benefit plans. 2509.78-1 Section 2509.78-1 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO... payments by certain employee welfare benefit plans. The Department of Labor today announced its...

  15. Fundamental Reform of Payment for Adult Primary Care: Comprehensive Payment for Comprehensive Care

    Science.gov (United States)

    Berenson, Robert A.; Schoenbaum, Stephen C.; Gardner, Laurence B.

    2007-01-01

    Primary care is essential to the effective and efficient functioning of health care delivery systems, yet there is an impending crisis in the field due in part to a dysfunctional payment system. We present a fundamentally new model of payment for primary care, replacing encounter-based imbursement with comprehensive payment for comprehensive care. Unlike former iterations of primary care capitation (which simply bundled inadequate fee-for-service payments), our comprehensive payment model represents new investment in adult primary care, with substantial increases in payment over current levels. The comprehensive payment is directed to practices to include support for the modern systems and teams essential to the delivery of comprehensive, coordinated care. Income to primary physicians is increased commensurate with the high level of responsibility expected. To ensure optimal allocation of resources and the rewarding of desired outcomes, the comprehensive payment is needs/risk-adjusted and performance-based. Our model establishes a new social contract with the primary care community, substantially increasing payment in return for achieving important societal health system goals, including improved accessibility, quality, safety, and efficiency. Attainment of these goals should help offset and justify the costs of the investment. Field tests of this and other new models of payment for primary care are urgently needed. PMID:17356977

  16. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    Science.gov (United States)

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  17. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  18. 27 CFR 24.272 - Payment of tax by electronic fund transfer.

    Science.gov (United States)

    2010-04-01

    ... States Customs Service for payment of excise tax on imported wine. (Sec. 201, Pub. L. 85-859, 72 Stat... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS WINE Removal, Return and Receipt of Wine... year any proprietor who is liable for a gross amount of wine excise tax equal to or exceeding $5...

  19. Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment measures – national data. This data set includes national-level data for the payment measures associated with an episode of care for heart attack, heart...

  20. Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment measures – state data. This data set includes state-level data for the payment measures associated with an episode of care for heart attack, heart failure,...

  1. Social security financing.

    Science.gov (United States)

    1980-05-01

    After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited.

  2. Reliability payments to generation capacity in electricity markets

    International Nuclear Information System (INIS)

    Olsina, Fernando; Pringles, Rolando; Larisson, Carlos; Garcés, Francisco

    2014-01-01

    Electric power is a critical input to modern economies. Generation adequacy and security of supply in power systems running under competition are currently topics of high concern for consumers, regulators and governments. In a market setting, generation investments and adequacy can only be achieved by an appropriate regulatory framework that sets efficient remuneration to power capacity. Theoretically, energy-only electricity markets are efficient and no additional mechanism is needed. Nonetheless, the energy-only market design suffers from serious drawbacks. Therefore, jointly with the evolution of electricity markets, many remunerating mechanisms for generation capacity have been proposed. Explicit capacity payment was the first remunerating approach implemented and perhaps still the most applied. However, this price-based regulation has been applied no without severe difficulties and criticism. In this paper, a new reliability payment mechanism is envisioned. Capacity of each generating unit is paid according to its effective contribution to overall system reliability. The proposed scheme has many attractive features and preserves the theoretical efficiency properties of energy-only markets. Fairness, incentive compatibility, market power mitigation and settlement rules are investigated in this work. The article also examines the requirements for system data and models in order to implement the proposed capacity mechanism. A numerical example on a real hydrothermal system serves for illustrating the practicability of the proposed approach and the resulting reliability payments to the generation units. - Highlights: • A new approach for remunerating supply reliability provided by generation units is proposed. • The contribution of each generating unit to lessen power shortfalls is determined by simulations. • Efficiency, fairness and incentive compatibility of the proposed reliability payment are assessed

  3. Construction Strategies of Social Security System for Wan-jiang Urban Belt’s Migrant Workers

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Theoretical debate and practice exploration on social security of migrant workers were introduced.The political direction and security layer on social security for migrant workers in Wan-jiang urban belt were analyzed:the first layer is to implement wage payment guarantee and employment injury insurance;the second layer is to emphasize serious disease insurance and endowment insurance;the third layer is unemployed insurance and social assistance.The primary strategy of building a social security system for migrant workers in Wan-jiang urban belt was put up:wage payment guarantee system that is united in certain regions should be promoted;employment injury insurance system that is undertaken by enterprises should be built;a social health care system for serious diseases should be set up;multi-layers endowment insurance system for migrant workers should be created;vocational training and training in how to start a business should be built as well as the unemployment insurance system;social assistant system based on the basic cost of living allowances should be set up.

  4. Fingerprint start the next generation of payment method : Fingerprint payment: a new mode of mobile payment

    OpenAIRE

    Wu, Chong

    2016-01-01

    In the generation of mobile internet, fingerprint payment is one of the most popular topics at the moment. China has a big market and many users are using the mobile payment methods. There are a large number of mobile phones equipped with fingerprint recognition technology. As we know, fingerprint payment brings us more convenience and safety. We do not need to use many bankcards, and fingerprint also eliminates the users from the trouble of queuing to pay. However, users send traditional dig...

  5. A bitcoin framework: an alternative payment system for rural areas of South Africa using low-end mobile phones

    CSIR Research Space (South Africa)

    Dlamini, NP

    2016-09-01

    Full Text Available Bitcoin is a peer-to-peer, decentralized payment system; that can be used as electronic money and as a payment method. Research done on Bitcoin has escalated due to the properties it possesses which are similar to fiat currency. Some...

  6. Informal cash payments for birth in Hungary: Are women paying to secure a known provider, respect, or quality of care?

    Science.gov (United States)

    Baji, Petra; Rubashkin, Nicholas; Szebik, Imre; Stoll, Kathrin; Vedam, Saraswathi

    2017-09-01

    In Central and Eastern Europe, many women make informal cash payments to ensure continuity of provider, i.e., to have a "chosen" doctor who provided their prenatal care, be present for birth. High rates of obstetric interventions and disrespectful maternity care are also common to the region. No previous study has examined the associations among informal payments, intervention rates, and quality of maternity care. We distributed an online cross-sectional survey in 2014 to a nationally representative sample of Hungarian internet-using women (N = 600) who had given birth in the last 5 years. The survey included items related to socio-demographics, type of provider, obstetric interventions, and experiences of care. Women reported if they paid informally, and how much. We built a two-part model, where a bivariate probit model was used to estimate conditional probabilities of women paying informally, and a GLM model to explore the amount of payments. We calculated marginal effects of the covariates (provider choice, interventions, respectful care). Many more women (79%) with a chosen doctor paid informally (191 euros on average) compared to 17% of women without a chosen doctor (86 euros). Based on regression analysis, the chosen doctor's presence at birth was the principal determinant of payment. Intervention and procedure rates were significantly higher for women with a chosen doctor versus without (cesareans 45% vs. 33%; inductions 32% vs. 19%; episiotomy 75% vs. 62%; epidural 13% vs. 5%), but had no direct effect on payments. Half of the sample (42% with a chosen doctor, 62% without) reported some form of disrespectful care, but this did not reduce payments. Despite reporting disrespect and higher rates of interventions, women rewarded the presence of a chosen doctor with informal payments. They may be unaware of evidence-based standards, and trust that their chosen doctor provided high quality maternity care. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Payment Cards

    Directory of Open Access Journals (Sweden)

    Kantnerová Liběna

    2016-09-01

    Full Text Available The aim of this paper is to analyze the use of payment cards in retail in the Czech Republic from the side of clients (buyers and the side of sellers. Questionnaires for clients examine satisfaction with cards and the service connected with them. Sellers’ satisfaction with the profit and function of cards is analyzed. The data indicated that 92% of the 352 respondents in South Bohemia had a payment card and more than 35% had more than one card. In retail, 70% of sellers had a payment terminal.

  8. 36 CFR 51.79 - May the Director waive payment of a franchise fee or other payments?

    Science.gov (United States)

    2010-07-01

    ... payment of a franchise fee or other payments? 51.79 Section 51.79 Parks, Forests, and Public Property....79 May the Director waive payment of a franchise fee or other payments? The Director may not waive the concessioner's payment of a franchise fee or other payments or consideration required by a...

  9. Security and privacy in electronic health records: a systematic literature review.

    Science.gov (United States)

    Fernández-Alemán, José Luis; Señor, Inmaculada Carrión; Lozoya, Pedro Ángel Oliver; Toval, Ambrosio

    2013-06-01

    To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems. Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database. Only those articles dealing with the security and privacy of EHR systems. The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth. A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems' roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy. Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems. Copyright

  10. 12 CFR 220.113 - Necessity for prompt payment and delivery in special cash accounts.

    Science.gov (United States)

    2010-01-01

    ...). (b) It appears that in a typical case the supervisors of the retirement system meet only once or... accept delivery and pay for the securities before some date more than seven business days after the date... creditor (broker-dealer) in good faith” that the customer will “promptly make full cash payment for the...

  11. 78 FR 16471 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Science.gov (United States)

    2013-03-15

    ...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...

  12. Medicare Program; Inpatient Rehabilitation Facility Prospective Payment System for Federal Fiscal Year 2018. Final rule.

    Science.gov (United States)

    2017-08-03

    This final rule updates the prospective payment rates for inpatient rehabilitation facilities (IRFs) for federal fiscal year (FY) 2018 as required by the statute. As required by section 1886(j)(5) of the Social Security Act (the Act), this rule includes the classification and weighting factors for the IRF prospective payment system's (IRF PPS) case-mix groups and a description of the methodologies and data used in computing the prospective payment rates for FY 2018. This final rule also revises the International Classification of Diseases, 10th Revision, Clinical Modification (ICD-10-CM) diagnosis codes that are used to determine presumptive compliance under the "60 percent rule," removes the 25 percent payment penalty for inpatient rehabilitation facility patient assessment instrument (IRF-PAI) late transmissions, removes the voluntary swallowing status item (Item 27) from the IRF-PAI, summarizes comments regarding the criteria used to classify facilities for payment under the IRF PPS, provides for a subregulatory process for certain annual updates to the presumptive methodology diagnosis code lists, adopts the use of height/weight items on the IRF-PAI to determine patient body mass index (BMI) greater than 50 for cases of single-joint replacement under the presumptive methodology, and revises and updates measures and reporting requirements under the IRF quality reporting program (QRP).

  13. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  14. The old age health security in rural China: where to go?

    Science.gov (United States)

    Dai, Baozhen

    2015-11-04

    The huge number of rural elders and the deepening health problems (e.g. growing threats of infectious diseases and chronic diseases etc.) place enormous pressure on old age health security in rural China. This study aims to provide information for policy-makers to develop effective measures for promoting rural elders' health care service access by examining the current developments and challenges confronted by the old age health security in rural China. Search resources are electronic databases, web pages of the National Bureau of Statistics of China and the National Health and Family Planning Commission of China on the internet, China Population and Employment Statistics Yearbook, China Civil Affairs' Statistical Yearbook and China Health Statistics Yearbooks etc. Articles were identified from Elsevier, Wiley, EBSCO, EMBASE, PubMed, SCI Expanded, ProQuest, and National Knowledge Infrastructure of China (CNKI) which is the most informative database in Chinese. Search terms were "rural", "China", "health security", "cooperative medical scheme", "social medical assistance", "medical insurance" or "community based medical insurance", "old", or "elder", "elderly", or "aged", "aging". Google scholar was searched with the same combination of keywords. The results showed that old age health security in rural China had expanded to all rural elders and substantially improved health care service utilization among rural elders. Increasing chronic disease prevalence rates, pressing public health issues, inefficient rural health care service provision system and lack of sufficient financing challenged the old age health security in rural China. Increasing funds from the central and regional governments for old age health security in rural China will contribute to reducing urban-rural disparities in provision of old age health security and increasing health equity among rural elders between different regions. Meanwhile, initiating provider payment reform may contribute to

  15. Potential savings from redetermining disability among children receiving supplemental security income benefits.

    Science.gov (United States)

    Pulcini, Christian D; Kotelchuck, Milton; Kuhlthau, Karen A; Nozzolillo, Alixandra A; Perrin, James M

    2012-01-01

    To compare the costs of redetermining disability to potential savings in Supplemental Security Income payments associated with different strategies for implementing Continuing Disability Reviews (CDRs) among children potentially enrolled in SSI from 2012 to 2021. We reviewed publicly available reports from the Social Security Administration and Government Accountability Office to estimate costs and savings. We considered CDRs for children ages 1-17 years, excluding mandated low-birth weight and age 18 redeterminations that SSA routinely has performed. If in 2012 the Social Security Administration performs the same number of CDRs for children as in 2010 (16,677, 1% of eligibles) at a cessation rate of 15%, the agency would experience net savings of approximately $145 million in benefit payments. If CDR numbers increased to the greatest level ever (183,211, 22% of eligibles, in 1999) at the same cessation rate, the agency would save approximately $1.6 billion in benefit payments. Increasing the numbers of CDRs for children represents a considerable opportunity for savings. Recognizing the dynamic nature of disability, the agency could reassess the persistence of disability systematically; doing so could free up resources from children who are no longer eligible and help the agency better direct its benefits to recipients with ongoing disability and whose families need support to meet the extra costs associated with raising a child with a major disability. Copyright © 2012 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  16. AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps

    OpenAIRE

    Chen, Sen; Meng, Guozhu; Su, Ting; Fan, Lingling; Xue, Yinxing; Liu, Yang; Xu, Lihua; Xue, Minhui; Li, Bo; Hao, Shuang

    2018-01-01

    Contemporary financial technology (FinTech) that enables cashless mobile payment has been widely adopted by financial institutions, such as banks, due to its convenience and efficiency. However, FinTech has also made massive and dynamic transactions susceptible to security risks. Given large financial losses caused by such vulnerabilities, regulatory technology (RegTech) has been developed, but more comprehensive security risk assessment is specifically desired to develop robust, scalable, an...

  17. Effects of Medicare payment reform: evidence from the home health interim and prospective payment systems.

    Science.gov (United States)

    Huckfeldt, Peter J; Sood, Neeraj; Escarce, José J; Grabowski, David C; Newhouse, Joseph P

    2014-03-01

    Medicare continues to implement payment reforms that shift reimbursement from fee-for-service toward episode-based payment, affecting average and marginal payment. We contrast the effects of two reforms for home health agencies. The home health interim payment system in 1997 lowered both types of payment; our conceptual model predicts a decline in the likelihood of use and costs, both of which we find. The home health prospective payment system in 2000 raised average but lowered marginal payment with theoretically ambiguous effects; we find a modest increase in use and costs. We find little substantive effect of either policy on readmissions or mortality. Copyright © 2014 Elsevier B.V. All rights reserved.

  18. 42 CFR 419.31 - Ambulatory payment classification (APC) system and payment weights.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Ambulatory payment classification (APC) system and... Outpatient Services § 419.31 Ambulatory payment classification (APC) system and payment weights. (a) APC... of resource use into APC groups. Except as specified in paragraph (a)(2) of this section, items and...

  19. Accelerating the Payment of PACE Assessments By Mark Zimring and Merrian Fulle

    Energy Technology Data Exchange (ETDEWEB)

    Zimring, Mark; Fuller, Merrian

    2010-05-04

    The 'acceleration' of land-secured assessments allows municipalities to declare the entire value (not just the late payments) of a property owner's outstanding balance payable if a default occurs. State laws vary on whether acceleration is required, permitted, or prohibited. Acceleration can be attractive to bond investors because it strips out non-performing assessments, and may avoid delays in debt service payments to investors. The risk that non-acceleration will negatively impact bond investors is a particular issue in states without a process for rapidly resolving defaults. However, acceleration may also increase the risk to mortgage holders, as the full amount of the outstanding assessment becomes due and traditionally has priority over other lien holders. Acceleration also places a greater burden on the property owner.

  20. Security and trust: taking care of the human factor

    NARCIS (Netherlands)

    Egger, F.N.; Abrazhevich, D.

    2001-01-01

    In the e-business chain, the last link that needs to be convinced of the security of an online transaction is the end-user. That is why this article puts forward a user-centred perspective of the problem of trust in online payments, derived from the discipline of Human-Computer Interaction (HCI). We

  1. Equity in out-of-pocket payments for hospital care: evidence from India.

    Science.gov (United States)

    Roy, Kakoli; Howard, David Hill

    2007-02-01

    The lack of formal health insurance and inadequate social safety nets cause families in most low-income countries to finance health spending through out-of-pocket (OOP) payments, leaving poor families unable to insure their consumption during periods of major illnesses. To examine how well the Indian healthcare system protects households of differing living standards against the financial consequences of unanticipated health shocks. The data are drawn from the 52nd round of National Sample Survey, a nationally representative socioeconomic and health survey conducted in 1995-1996. The sample comprises 24,379 (3.84%) households where a member was hospitalized during the 1-year reference period. We estimate, using ordinary least squares, the relationship between household consumption (proxy for ability to pay) and OOP payments for hospitalization. We also estimate the relationship between consumption and OOP share in consumption. Our results indicate that both utilization (payments) and the consequent financial burden (payment share) increases with increasing ability to pay (ATP). While this relationship is retained across the different subgroups (e.g., gender, social code, region, etc.), comparisons across groups indicate horizontal inequities including differences in both degrees of progressivity and the redistributive effect. The finding that OOP payments do not decline with ATP could be an indication of: (1) the lack of insurance which implies that the better-off must pay from OOP to secure quality health care and (2) the absence of risk-pooling or prepayments mechanisms which poses financial impediments to the consumption of health care by the poor.

  2. Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry

    Science.gov (United States)

    Willey, Lorrie; White, Barbara Jo

    2013-01-01

    Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…

  3. 17 CFR 270.19a-1 - Written statement to accompany dividend payments by management companies.

    Science.gov (United States)

    2010-04-01

    ... that an open-end company may treat as a separate source its net profits from such sales during its... specify the sources from which the remainder was paid. Every company which in any fiscal year elects to... dividend payments by management companies. 270.19a-1 Section 270.19a-1 Commodity and Securities Exchanges...

  4. Secure Plug-in Electric Vehicle PEV Charging in a Smart Grid Network

    Directory of Open Access Journals (Sweden)

    Khaled Shuaib

    2017-07-01

    Full Text Available Charging of plug-in electric vehicles (PEVs exposes smart grid systems and their users to different kinds of security and privacy attacks. Hence, a secure charging protocol is required for PEV charging. Existing PEV charging protocols are usually based on insufficiently represented and simplified charging models that do not consider the user’s charging modes (charging at a private location, charging as a guest user, roaming within one’s own supplier network or roaming within other suppliers’ networks. However, the requirement for charging protocols depends greatly on the user’s charging mode. Consequently, available solutions do not provide complete protocol specifications. Moreover, existing protocols do not support anonymous user authentication and payment simultaneously. In this paper, we propose a comprehensive end-to-end charging protocol that addresses the security and privacy issues in PEV charging. The proposed protocol uses nested signatures to protect users’ privacy from external suppliers, their own suppliers and third parties. Our approach supports anonymous user authentication, anonymous payment, as well as anonymous message exchange between suppliers within a hierarchical smart grid architecture. We have verified our protocol using the AVISPA software verification tool and the results showed that our protocol is secure and works as desired.

  5. 75 FR 78707 - Medicare Program; First Semi-Annual Meeting of the Advisory Panel on Ambulatory Payment...

    Science.gov (United States)

    2010-12-16

    ...-mail address; there is a SPACE between CMS and APCPanel.) News media representatives must contact our... Secretary is required by section 1833(t)(9)(A) of the Social Security Act (the Act) to consult with an..., correct code usage, and provider payment adjustments. Therefore, these issues will not be considered for...

  6. Open Payments Data

    Data.gov (United States)

    U.S. Department of Health & Human Services — Open Payments (otherwise known as the Sunshine Act) - Open Payments is a Congressionally-mandated transparency program that increases awareness of financial...

  7. Economic and Legal Aspects of Electronic Money

    OpenAIRE

    Otakar Schlossberger

    2016-01-01

    The term “electronic money” first appeared in Czech legislation in 2002 as the result of the transposition of legislation into the Czech Republic’s legal system in anticipation of the country’s accession to the European Union. This term subsequently reappeared in 2009 during the recodification of the legal regulation of payment services, payment systems and electronic money. At this time, the definition was subjected to certain changes which continue to exert a significant infl...

  8. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  9. Understanding informal payments in health care: motivation of health workers in Tanzania.

    Science.gov (United States)

    Stringhini, Silvia; Thomas, Steve; Bidwell, Posy; Mtui, Tina; Mwisongo, Aziza

    2009-06-30

    There is growing evidence that informal payments for health care are fairly common in many low- and middle-income countries. Informal payments are reported to have a negative consequence on equity and quality of care; it has been suggested, however, that they may contribute to health worker motivation and retention. Given the significance of motivation and retention issues in human resources for health, a better understanding of the relationships between the two phenomena is needed. This study attempts to assess whether and in what ways informal payments occur in Kibaha, Tanzania. Moreover, it aims to assess how informal earnings might help boost health worker motivation and retention. Nine focus groups were conducted in three health facilities of different levels in the health system. In total, 64 health workers participated in the focus group discussions (81% female, 19% male) and where possible, focus groups were divided by cadre. All data were processed and analysed by means of the NVivo software package. The use of informal payments in the study area was confirmed by this study. Furthermore, a negative relationship between informal payments and job satisfaction and better motivation is suggested. Participants mentioned that they felt enslaved by patients as a result of being bribed and this resulted in loss of self-esteem. Furthermore, fear of detection was a main demotivating factor. These factors seem to counterbalance the positive effect of financial incentives. Moreover, informal payments were not found to be related to retention of health workers in the public health system. Other factors such as job security seemed to be more relevant for retention. This study suggests that the practice of informal payments contributes to the general demotivation of health workers and negatively affects access to health care services and quality of the health system. Policy action is needed that not only provides better financial incentives for individuals but also

  10. Understanding informal payments in health care: motivation of health workers in Tanzania

    Directory of Open Access Journals (Sweden)

    Bidwell Posy

    2009-06-01

    Full Text Available Abstract Background There is growing evidence that informal payments for health care are fairly common in many low- and middle-income countries. Informal payments are reported to have a negative consequence on equity and quality of care; it has been suggested, however, that they may contribute to health worker motivation and retention. Given the significance of motivation and retention issues in human resources for health, a better understanding of the relationships between the two phenomena is needed. This study attempts to assess whether and in what ways informal payments occur in Kibaha, Tanzania. Moreover, it aims to assess how informal earnings might help boost health worker motivation and retention. Methods Nine focus groups were conducted in three health facilities of different levels in the health system. In total, 64 health workers participated in the focus group discussions (81% female, 19% male and where possible, focus groups were divided by cadre. All data were processed and analysed by means of the NVivo software package. Results The use of informal payments in the study area was confirmed by this study. Furthermore, a negative relationship between informal payments and job satisfaction and better motivation is suggested. Participants mentioned that they felt enslaved by patients as a result of being bribed and this resulted in loss of self-esteem. Furthermore, fear of detection was a main demotivating factor. These factors seem to counterbalance the positive effect of financial incentives. Moreover, informal payments were not found to be related to retention of health workers in the public health system. Other factors such as job security seemed to be more relevant for retention. Conclusion This study suggests that the practice of informal payments contributes to the general demotivation of health workers and negatively affects access to health care services and quality of the health system. Policy action is needed that not only

  11. Implantable electronics: emerging design issues and an ultra light-weight security solution.

    Science.gov (United States)

    Narasimhan, Seetharam; Wang, Xinmu; Bhunia, Swarup

    2010-01-01

    Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.

  12. 42 CFR 412.540 - Method of payment for preadmission services under the long-term care hospital prospective payment...

    Science.gov (United States)

    2010-10-01

    ... the long-term care hospital prospective payment system. 412.540 Section 412.540 Public Health CENTERS... PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Long-Term Care Hospitals... payment system. The prospective payment system includes payment for inpatient operating costs of...

  13. 42 CFR 412.404 - Conditions for payment under the prospective payment system for inpatient hospital services of...

    Science.gov (United States)

    2010-10-01

    ... payment system for inpatient hospital services of psychiatric facilities. 412.404 Section 412.404 Public... PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Inpatient Hospital... must meet the conditions of this section to receive payment under the prospective payment system...

  14. DISTRIBUTION ASPECTS OF THE DIRECT PAYMENTS BETWEEN EU MEMBER STATES

    Directory of Open Access Journals (Sweden)

    Gina FINTINERU

    2012-01-01

    Full Text Available EC proposals concerning CAP reform for 2014-2020 try to cope both with the wide variety of agricultural systems and economic structures of the 27 EU MS but also with current global challenges that agriculture has to face: food security and poverty reduction, climate changes or biodiversity loss. This article aims to analyse the proposed measures consistency with the current situation of Romanian agriculture. Distribution aspects of the direct payments between Member States are concerned. The data are originated in FADN and Eurostat statistics, and a non parametric approach is used in order to better understand the correlation between the direct payments proposed for 2014 -2020 and some socio economic criteria.The paper provides a brief analysis of the existing research concerning the distributional aspects (studies and statistics and contributes to the debate by examining if the proposed redistribution is a consistent and coherent answer to the future challenges the agriculture has to meet in the future and to the targeted equity criteria.

  15. 42 CFR 412.521 - Basis of payment.

    Science.gov (United States)

    2010-10-01

    ... PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Long-Term Care Hospitals § 412.521 Basis of payment. (a) Method of payment. (1) Under the prospective payment system, long... furnished to Medicare beneficiaries. (2) The amount of payment under the prospective payment system is based...

  16. 20 CFR 408.665 - How does your representative payee account for the use of your SVB payments?

    Science.gov (United States)

    2010-04-01

    ... for the use of your SVB payments? 408.665 Section 408.665 Employees' Benefits SOCIAL SECURITY... records of how benefits were used in order to provide accounting reports and must make those records available upon our request. If your representative payee fails to provide an annual accounting of benefits...

  17. A simple simulation model as a tool to assess alternative health care provider payment reform options in Vietnam.

    Science.gov (United States)

    Cashin, Cheryl; Phuong, Nguyen Khanh; Shain, Ryan; Oanh, Tran Thi Mai; Thuy, Nguyen Thi

    2015-01-01

    Vietnam is currently considering a revision of its 2008 Health Insurance Law, including the regulation of provider payment methods. This study uses a simple spreadsheet-based, micro-simulation model to analyse the potential impacts of different provider payment reform scenarios on resource allocation across health care providers in three provinces in Vietnam, as well as on the total expenditure of the provincial branches of the public health insurance agency (Provincial Social Security [PSS]). The results show that currently more than 50% of PSS spending is concentrated at the provincial level with less than half at the district level. There is also a high degree of financial risk on district hospitals with the current fund-holding arrangement. Results of the simulation model show that several alternative scenarios for provider payment reform could improve the current payment system by reducing the high financial risk currently borne by district hospitals without dramatically shifting the current level and distribution of PSS expenditure. The results of the simulation analysis provided an empirical basis for health policy-makers in Vietnam to assess different provider payment reform options and make decisions about new models to support health system objectives.

  18. 24 CFR 206.19 - Payment options.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Payment options. 206.19 Section 206... CONVERSION MORTGAGE INSURANCE Eligibility; Endorsement Eligible Mortgages § 206.19 Payment options. (a) Term payment option. Under the term payment option, equal monthly payments are made by the mortgagee to the...

  19. VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2015-02-01

    Full Text Available Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation System (ITS such as traffic accident prevention and providing traffic volume information have been combined with cloud computing. ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC environment through efficient traffic management, traffic accident prevention, and convenience services. However, existing vehicle services focus on providing services using sensing information inside the vehicle and the system to provide the service through an interface with the external infrastructure is insufficient. In addition, because wireless networks are used in VCC environments, there is a risk of important information leakage from sensors inside the vehicle, such as driver personal identification and payment information at the time of goods purchase. We propose the VCC Service-oriented Security Framework (VCC-SSF to address the limitations and security threats of VCC-based services. The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. Furthermore, it provides authentication, encryption, access control, confidentiality, integrity, and privacy protection for user personal information and information inside the vehicle.

  20. Integrated secure solution for electronic healthcare records sharing

    Science.gov (United States)

    Yao, Yehong; Zhang, Chenghao; Sun, Jianyong; Jin, Jin; Zhang, Jianguo

    2007-03-01

    The EHR is a secure, real-time, point-of-care, patient-centric information resource for healthcare providers. Many countries and regional districts have set long-term goals to build EHRs, and most of EHRs are usually built based on the integration of different information systems with different information models and platforms. A number of hospitals in Shanghai are also piloting the development of an EHR solution based on IHE XDS/XDS-I profiles with a service-oriented architecture (SOA). The first phase of the project targets the Diagnostic Imaging domain and allows seamless sharing of images and reports across the multiple hospitals. To develop EHRs for regional coordinated healthcare, some factors should be considered in designing architecture, one of which is security issue. In this paper, we present some approaches and policies to improve and strengthen the security among the different hospitals' nodes, which are compliant with the security requirements defined by IHE IT Infrastructure (ITI) Technical Framework. Our security solution includes four components: Time Sync System (TSS), Digital Signature Manage System (DSMS), Data Exchange Control Component (DECC) and Single Sign-On (SSO) System. We give a design method and implementation strategy of these security components, and then evaluate the performance and overheads of the security services or features by integrating the security components into an image-based EHR system.

  1. Framework for Mobile Payments Integration

    DEFF Research Database (Denmark)

    Carton, Fergal; Hedman, Jonas; Damsgaard, Jan

    2012-01-01

    consumers and merchants. These instruments are centralised, costly and lack decision support functionality. The ubiquity of the mobile phone has provided a decentralised platform for managing payment processes in a new way, but the value proposition for customers has yet to be elaborated clearly....... This inertia has stalled the design of sustainable revenue models for a mobile payments ecosystem. Merchants and consumers in the meantime are being seduced by the convenience of on‑line and mobile payment solutions. Adopting the purchase and payment process as the unit of analysis, the current mobile payment...

  2. 24 CFR 983.352 - Vacancy payment.

    Science.gov (United States)

    2010-04-01

    ... PROJECT-BASED VOUCHER (PBV) PROGRAM Payment to Owner § 983.352 Vacancy payment. (a) Payment for move-out month. If an assisted family moves out of the unit, the owner may keep the housing assistance payment... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Vacancy payment. 983.352 Section...

  3. Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.

    Science.gov (United States)

    Eom, Jieun; Lee, Dong Hoon; Lee, Kwangsu

    2016-12-01

    In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.

  4. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  5. 42 CFR 412.604 - Conditions for payment under the prospective payment system for inpatient rehabilitation facilities.

    Science.gov (United States)

    2010-10-01

    ... payment system for inpatient rehabilitation facilities. 412.604 Section 412.604 Public Health CENTERS FOR... SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment for Inpatient Rehabilitation Hospitals and Rehabilitation Units § 412.604 Conditions for payment under the prospective payment system for inpatient...

  6. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  7. PAYMENT CAPACITY SENSITIVITY FACTORS

    Directory of Open Access Journals (Sweden)

    Daniel BRÎNDESCU – OLARIU

    2014-11-01

    The results of the study facilitate the determination and classification of the main sensitivity factors for the payment capacity at sample level, the establishment of general benchmarks for the payment capacity (as no such benchmarks currently exist in the Romanian literature and the identification of the mechanisms through which the variation of different factors impacts the payment capacity.

  8. 42 CFR 412.125 - Effect of change of ownership on payments under the prospective payment systems.

    Science.gov (United States)

    2010-10-01

    ... prospective payment systems. 412.125 Section 412.125 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Payments to Hospitals Under the Prospective Payment Systems § 412.125 Effect of change of...

  9. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures.

    Science.gov (United States)

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-11

    Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use

  10. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    Science.gov (United States)

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  11. Trends in US malpractice payments in dentistry compared to other health professions - dentistry payments increase, others fall.

    Science.gov (United States)

    Nalliah, R P

    2017-01-13

    Background Little is known about trends in the number of malpractice payments made against dentists and other health professionals. Knowledge of these trends will inform the work of our professional organisations.Methods The National Practitioner Data Bank (NPDB) in the United States was utilised. Data about malpractice payments against dentists, hygienists, nurses, optometrists, pharmacists, physicians (DO and MD), physicians' assistants, podiatrists, psychologists, therapists and counsellors during 2004-14 were studied. Variables include type of healthcare provider, year malpractice payment was made and range of payment amount.Results In 2004 there were 17,532 malpractice payments against the studied health professions. In 2014 there were 11,650. In 2004, the number of malpractice payments against dentists represented 10.3% of all payments and in 2014 it represented 13.4%. Number of malpractice payments against dentists in 2012-2014 increased from 1,388 to 1,555.Conclusions There is an upward pressure on the number of dental malpractice payments over the last 3 years. Concurrently, there is a downward pressure on the number of combined non-dentist healthcare professional malpractice payments.

  12. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  13. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  14. Payment Reform Pilot In Beijing Hospitals Reduced Expenditures And Out-Of-Pocket Payments Per Admission.

    Science.gov (United States)

    Jian, Weiyan; Lu, Ming; Chan, Kit Yee; Poon, Adrienne N; Han, Wei; Hu, Mu; Yip, Winnie

    2015-10-01

    In 2009 China announced plans to reform provider payment methods at public hospitals by moving from fee-for-service (FFS) to prospective and aggregated payment methods that included the use of diagnosis-related groups (DRGs) to control health expenditures. In October 2011 health policy makers selected six Beijing hospitals to pioneer the first DRG payment system in China. We used hospital discharge data from the six pilot hospitals and eight other hospitals, which continued to use FFS and served as controls, from the period 2010-12 to evaluate the pilot's impact on cost containment through a difference-in-differences methods design. Our study found that DRG payment led to reductions of 6.2 percent and 10.5 percent, respectively, in health expenditures and out-of-pocket payments by patients per hospital admission. We did not find evidence of any increase in hospital readmission rates or cost shifting from cases eligible for DRG payment to ineligible cases. However, hospitals continued to use FFS payments for patients who were older and had more complications than other patients, which reduced the effectiveness of payment reform. Continuous evidence-based monitoring and evaluation linked with adequate management systems are necessary to enable China and other low- and middle-income countries to broadly implement DRGs and refine payment systems. Project HOPE—The People-to-People Health Foundation, Inc.

  15. 20 CFR 411.536 - Under what circumstances can we make a reconciliation payment under the outcome-milestone payment...

    Science.gov (United States)

    2010-04-01

    ... reconciliation payment under the outcome-milestone payment system? 411.536 Section 411.536 Employees' Benefits... Systems § 411.536 Under what circumstances can we make a reconciliation payment under the outcome-milestone payment system? When the beneficiary's outcome payment period begins before the beneficiary has...

  16. 48 CFR 32.1007 - Administration and payment of performance-based payments.

    Science.gov (United States)

    2010-10-01

    ... contractor's experience, performance record, reliability, financial strength, and the adequacy of controls... of performance-based payments. 32.1007 Section 32.1007 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Performance-Based Payments 32.1007...

  17. Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record

    Directory of Open Access Journals (Sweden)

    Clémentine Gritti

    2016-11-01

    Full Text Available In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic Health Record (EHR, and this means that the clinician must acquire sufficient access right to access this document. As the EHR is within a collection of many other patients, the clinician would need to specify some requirements (such as a keyword which match the patient’s record, as well as having a valid access right. The complication begins when we do not want the server to learn anything from this query (as the server might be outsourced to other place. To encompass this situation, we define a new cryptographic primitive called Certificate-Based Encryption with Keyword Search (CBEKS, which will be suitable in this scenario. We also specify the corresponding security models, namely computational consistency, indistinguishability against chosen keyword and ciphertext attacks, indistinguishability against keyword-guessing attacks and collusion resistance. We provide a CBEKS construction that is proven secure in the standard model with respect to the aforementioned security models.

  18. Paying for Payments

    DEFF Research Database (Denmark)

    Korsgaard, Søren

    depends only on the relative costs of producing cash and card payments and can be used by regulators to assess privately set interchange fees. When calibrated to cost data, the model implies an optimal fee that is low and may even be negative. The findings are consistent with empirical evidence of high......Do consumers and merchants use the most efficient payment instruments? I examine how interchange fees, which are fees paid from merchants' banks to consumers' banks when card transactions take place, influence the choice between cash and payment cards. I show that when consumers do not pay...... transaction fees to banks - a common feature in bank contracts - card use is declining in interchange fees, and surcharging does not neutralize interchange fees. According to my model, banks set interchange fees at too high a level, resulting in too few card payments. I derive an optimal interchange fee which...

  19. Fee-for-service will remain a feature of major payment reforms, requiring more changes in Medicare physician payment.

    Science.gov (United States)

    Ginsburg, Paul B

    2012-09-01

    Many health policy analysts envision provider payment reforms currently under development as replacements for the traditional fee-for-service payment system. Reforms include per episode bundled payment and elements of capitation, such as global payments or accountable care organizations. But even if these approaches succeed and are widely adopted, the core method of payment to many physicians for the services they provide is likely to remain fee-for-service. It is therefore critical to address the current shortcomings in the Medicare physician fee schedule, because it will affect physician incentives and will continue to play an important role in determining the payment amounts under payment reform. This article reviews how the current payment system developed and is applied, and it highlights areas that require careful review and modification to ensure the success of broader payment reform.

  20. 76 FR 76035 - Amendment to the International Traffic in Arms Regulations: Additional Method of Electronic...

    Science.gov (United States)

    2011-12-06

    ... U.S.C. Chapter 35. List of Subjects in 22 CFR Parts 122 and 129 Arms and munitions, Exports... House (ACH) and Federal Reserve Wire Network (FedWire) are electronic networks used to process financial... electronic payment. Electronic payments must be in U.S. currency and must be payable through a U.S. financial...

  1. 20 CFR 404.1362 - Treatment of social security benefits or payments where Veterans Administration pension or...

    Science.gov (United States)

    2010-04-01

    ... payments where Veterans Administration pension or compensation payable. 404.1362 Section 404.1362 Employees... Administration pension or compensation payable. (a) Before we receive notice from the Veterans Administration. If... status provisions in § 404.1350 before we receive notice from the Veterans Administration that a pension...

  2. 32 CFR 750.9 - Claims: Payments.

    Science.gov (United States)

    2010-07-01

    ... requires submission of the payment voucher to the General Accounting Office. All other field authorized payment vouchers are submitted directly to the servicing disbursing office for payment. ... 32 National Defense 5 2010-07-01 2010-07-01 false Claims: Payments. 750.9 Section 750.9 National...

  3. 20 CFR 411.566 - May an EN use outcome or milestone payments to make payments to the beneficiary?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false May an EN use outcome or milestone payments... an EN use outcome or milestone payments to make payments to the beneficiary? Yes, an EN may use milestone or outcome payments to make payments to a beneficiary. [73 FR 29350, May 20, 2008] ...

  4. 48 CFR 32.207 - Administration and payment of commercial financing payments.

    Science.gov (United States)

    2010-10-01

    ... contractual information, and the account(s) (see 32.206(d)) to be charged for the payment. (c) Management of... of commercial financing payments. 32.207 Section 32.207 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Commercial Item...

  5. 24 CFR 251.6 - Method of payment of mortgage insurance premiums.

    Science.gov (United States)

    2010-04-01

    ... insurance premiums. 251.6 Section 251.6 Housing and Urban Development Regulations Relating to Housing and... HOUSING PROJECTS § 251.6 Method of payment of mortgage insurance premiums. In the cases that the... affected lenders, that mortgage insurance premiums be remitted electronically. [63 FR 1303, Jan. 8, 1998] ...

  6. Adoption of Mobile Payment Platforms

    DEFF Research Database (Denmark)

    Staykova, Kalina Stefanova; Damsgaard, Jan

    2016-01-01

    Numerous mobile payment solutions, which rely on new disruptive technologies, have been launched on the payment market in recent years. But despite the growing number of mobile payment apps, very few solutions have turned to be successful as the majority of them fail to gain a critical mass...... of users. In this paper, we investigate successful platform adoption strategies by using the Reach and Range Framework for Multi-Sided Platforms as a strategic tool to which mobile payment providers can adhere in order to tackle some of the main challenges they face throughout the evolution...... of their platforms. The analysis indicates that successful mobile payment solutions tend to be launched as one-sided platforms and then gradually be expanded into being two-sided. Our study showcases that the success of mobile payment platforms lies with the ability of the platform to balance the reach (number...

  7. Unbundling payments for radioisotopes from radiopharmaceuticals and from diagnostic procedures: A tool to support the implementation of full-cost recovery. NEA discussion document

    International Nuclear Information System (INIS)

    2012-01-01

    The objective of the NEA's HLG-MR policy approach is to ensure a long-term secure supply. The HLG-MR has determined that to attain that objective, a necessary (but not sufficient) requirement is that irradiation services in the 99 Mo/ 99m Tc supply chain must be provided on a full-cost recovery (FCR) basis (OECD-NEA, 2011). The HLG-MR policy approach also recommended that supply chain participants should implement payment reforms that promote full-cost recovery within their reimbursement systems. Reforms might include separate radioisotope pricing or auditing, separate radioisotope payment, differential radioisotope payment for FCR, or other approaches to promote a complete transition to full-cost recovery

  8. Kuveyt Türk payment systems technology roadmap

    OpenAIRE

    Turan, Ayşe

    2014-01-01

    ACKNOWLEDGEMENTS, iii -- ABSTRACT, iv -- ÖZET, v -- LIST OF FIGURES, x -- LIST OF TABLES, xi -- LIST OF ABBREVIATIONS, xii -- 1. INTRODUCTION, 1 -- 1.1 Participants in a Payment System, 2 -- 1.2 Types of Payment Systems, 2 -- 1.2.1 Large-value Payment Systems (LVPS), 2 -- 1.2.2 Retail Payments, 3 -- 1.2.3 Retail Payment Instruments, 3 -- 1.2.3.1.1 Cash payments, 3 -- 1.2.3.1.2 Non-cash payments, 4 -- 1.2.3.1.2.1 Payment Cards, 4 -- 1.2.3.1.2.1.1 Credit Cards, 5 -- 1.2.3.1.2.1.2 Prepaid Cards,...

  9. 42 CFR 412.432 - Method of payment under the inpatient psychiatric facility prospective payment system.

    Science.gov (United States)

    2010-10-01

    ... facility prospective payment system. 412.432 Section 412.432 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Inpatient Hospital Services of Inpatient...

  10. Analysis of the security and privacy requirements of cloud-based electronic health records systems.

    Science.gov (United States)

    Rodrigues, Joel J P C; de la Torre, Isabel; Fernández, Gonzalo; López-Coronado, Miguel

    2013-08-21

    The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access

  11. Consumers Are Ready to Accept the Transition to Online and Electronic Records If They Can Be Assured of the Security Measures

    Science.gov (United States)

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-01

    Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong

  12. 75 FR 78806 - Agency Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2010-12-16

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... 2900-0474.'' SUPPLEMENTARY INFORMATION: Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt, VA Form 26-8986. OMB Control Number: 2900...

  13. 78 FR 59771 - Proposed Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2013-09-27

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated... through the Federal Docket Management System (FDMS) at www.Regulations.gov or to Nancy J. Kessinger...

  14. 42 CFR 413.210 - Conditions for payment under the end-stage renal disease (ESRD) prospective payment system.

    Science.gov (United States)

    2010-10-01

    ... disease (ESRD) prospective payment system. 413.210 Section 413.210 Public Health CENTERS FOR MEDICARE... § 413.210 Conditions for payment under the end-stage renal disease (ESRD) prospective payment system... prospective payment system described in § 413.215 through § 413.235 of this part. (a) Qualifications for...

  15. 20 CFR 435.22 - Payment.

    Science.gov (United States)

    2010-04-01

    ...-Award Requirements Financial and Program Management § 435.22 Payment. (a) Introduction. Payment methods..., and (ii) Financial management systems that meet the standards for fund control and accountability as..., Payment Management System, Rockville, MD 20852. Interest amounts up to $250 per year may be retained by...

  16. 32 CFR 751.13 - Partial payments.

    Science.gov (United States)

    2010-07-01

    ... voucher and all other information related to the partial payment shall be placed in the claim file. Action... 32 National Defense 5 2010-07-01 2010-07-01 false Partial payments. 751.13 Section 751.13 National... Claims Against the United States § 751.13 Partial payments. (a) Partial payments when hardship exists...

  17. 10 CFR 603.805 - Payment methods.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Payment methods. 603.805 Section 603.805 Energy DEPARTMENT... Other Administrative Matters Payments § 603.805 Payment methods. A TIA may provide for: (a... progress. A fixed-support TIA must use this payment method (this does not preclude use of an initial...

  18. The ability of land owners and their cooperatives to leverage payments greater than opportunity costs from conservation contracts.

    Science.gov (United States)

    Lennox, Gareth D; Armsworth, Paul R

    2013-06-01

    In negotiations over land-right acquisitions, landowners have an informational advantage over conservation groups because they know more about the opportunity costs of conservation measures on their sites. This advantage creates the possibility that landowners will demand payments greater than the required minimum, where this minimum required payment is known as the landowner’s willingness to accept (WTA). However, in recent studies of conservation costs, researchers have assumed landowners will accept conservation with minimum payments. We investigated the ability of landowners to demand payments above their WTA when a conservation group has identified multiple sites for protection. First, we estimated the maximum payment landowners could potentially demand, which is set when groups of landowners act as a cooperative. Next, through the simulation of conservation auctions, we explored the amount of money above landowners’ WTA (i.e., surplus) that conservation groups could cede to secure conservation agreements, again investigating the influence of landowner cooperatives. The simulations showed the informational advantage landowners held could make conservation investments up to 42% more expensive than suggested by the site WTAs. Moreover, all auctions resulted in landowners obtaining payments greater than their WTA; thus, it may be unrealistic to assume landowners will accept conservation contracts with minimum payments. Of particular significance for species conservation, conservation objectives focused on overall species richness,which therefore recognize site complementarity, create an incentive for land owners to form cooperatives to capture surplus. To the contrary, objectives in which sites are substitutes, such as the maximization of species occurrences, create a disincentive for cooperative formation.

  19. 24 CFR Appendix A to Part 4001 - Calculation of Upfront Payment or Future Appreciation Payment

    Science.gov (United States)

    2010-04-01

    ... depend on actual appreciation of the property as determined in accordance with 24 CFR 4001.120. Payment... Future Appreciation Payment A Appendix A to Part 4001 Housing and Urban Development Regulations Relating... Future Appreciation Payment Subordinate mortgage lien holder's cumulative combined loan-to-value ratio...

  20. 42 CFR 412.632 - Method of payment under the inpatient rehabilitation facility prospective payment system.

    Science.gov (United States)

    2010-10-01

    ... rehabilitation facility receives payment under this subpart for inpatient operating costs and capital-related... & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR... and for costs of an approved education program and other costs paid outside the prospective payment...

  1. 75 FR 61252 - Proposed Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2010-10-04

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...

  2. 75 FR 61859 - Proposed Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2010-10-06

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...

  3. Innovative Secure Mobile Banking Services

    Directory of Open Access Journals (Sweden)

    Mousa T AL-Akhras

    2011-01-01

    Full Text Available Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following

  4. 5 CFR 9701.361 - Special skills payments.

    Science.gov (United States)

    2010-01-01

    ... RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Special Payments § 9701.361 Special skills payments... at the same time as basic pay or in periodic lump-sum payments. Special skills payments are not basic... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Special skills payments. 9701.361 Section...

  5. 12 CFR 412.11 - Payment guidelines.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Payment guidelines. 412.11 Section 412.11 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES ACCEPTANCE OF PAYMENT FROM A NON-FEDERAL SOURCE FOR TRAVEL EXPENSES § 412.11 Payment guidelines. (a) Payments from a non-Federal source, other than...

  6. Incentives and provider payment methods.

    Science.gov (United States)

    Barnum, H; Kutzin, J; Saxenian, H

    1995-01-01

    The mode of payment creates powerful incentives affecting provider behavior and the efficiency, equity and quality outcomes of health finance reforms. This article examines provider incentives as well as administrative costs, and institutional conditions for successful implementation associated with provider payment alternatives. The alternatives considered are budget reforms, capitation, fee-for-service, and case-based reimbursement. We conclude that competition, whether through a regulated private sector or within a public system, has the potential to improve the performance of any payment method. All methods generate both adverse and beneficial incentives. Systems with mixed forms of provider payment can provide tradeoffs to offset the disadvantages of individual modes. Low-income countries should avoid complex payment systems requiring higher levels of institutional development.

  7. 42 CFR 484.205 - Basis of payment.

    Science.gov (United States)

    2010-10-01

    ... episode payment is subject to the following adjustments and additional payments: (1) A low-utilization... 5, 1997 unless the national 60-day episode payment is subject to a low-utilization payment... payment for initial episodes is paid to an HHA at 60 percent of the case-mix and wage adjusted 60-day...

  8. Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Jianfeng Lu

    2017-01-01

    Full Text Available QR code (quick response code is used due to its beneficial properties, especially in the mobile payment field. However, there exists an inevitable risk in the transaction process. It is not easily perceived that the attacker tampers with or replaces the QR code that contains merchant’s beneficiary account. Thus, it is of great urgency to conduct authentication of QR code. In this study, we propose a novel mechanism based on visual cryptography scheme (VCS and aesthetic QR code, which contains three primary schemes for different concealment levels. The main steps of these schemes are as follows. Firstly, one original QR code is split into two shadows using VC multiple rules; secondly, the two shadows are embedded into the same background image, respectively, and the embedded results are fused with the same carrier QR code, respectively, using XOR mechanism of RS and QR code error correction mechanism. Finally, the two aesthetic QR codes can be stacked precisely and the original QR code is restored according to the defined VCS. Experiments corresponding to three proposed schemes are conducted and demonstrate the feasibility and security of the mobile payment authentication, the significant improvement of the concealment for the shadows in QR code, and the diversity of mobile payment authentication.

  9. The social security scheme in Thailand: what lessons can be drawn?

    Science.gov (United States)

    Tangcharoensathien, V; Supachutikul, A; Lertiendumrong, J

    1999-04-01

    The Social Security Scheme was launched in 1990, covering formal sector private employees for non-work related sickness, maternity and invalidity including cash benefits and funeral grants. The scheme is financed by tripartite contributions from government, employers and employees, each of 1.5% of payroll (total of 4.5%). The scheme decided to pay health care providers, whether public or private, on a flat rate capitation basis to cover both ambulatory and inpatient care. Registration of the insured with a contractor hospital was a necessary consequence of the chosen capitation payment system. The aim of this paper is to review the operation of the scheme, and to explore the implications of capitation payment and registration for utilisation levels and provider behaviour. A key weakness of the scheme's design is suggested to be the initial decision to give employers not employees the responsibility for choosing the registered hospitals. This was done for administrative reasons, but it contributed to low levels of use of the contractor hospitals. In addition, low levels of use were also probably the result of the potential for cream skimming, cost shifting from inpatient to ambulatory care and under-provision of patient care, though since monitoring mechanisms by the Social Security Office were weak, these effects are difficult to detect conclusively. Mechanisms to improve utilisation levels were gradually introduced, such as employee choice of registered hospitals and the formation of sub-contractor networks to improve access to care. A beneficial effect of the capitation payment system was that the Social Security Fund generated substantial reserves and expenditures on sickness benefits were well stabilised. The paper ends by recommending that future policy amendments should be guided by research and empirical findings and that tougher monitoring and enforcement of quality of care standards are required.

  10. [Security specifications for electronic medical records on the Internet].

    Science.gov (United States)

    Mocanu, Mihai; Mocanu, Carmen

    2007-01-01

    The extension for the Web applications of the Electronic Medical Record seems both interesting and promising. Correlated with the expansion of Internet in our country, it allows the interconnection of physicians of different specialties and their collaboration for better treatment of patients. In this respect, the ophthalmologic medical applications consider the increased possibilities for monitoring chronic ocular diseases and for the identification of some elements for early diagnosis and risk factors supervision. We emphasize in this survey some possible solutions to the problems of interconnecting medical information systems to the Internet: the achievement of interoperability within medical organizations through the use of open standards, the automated input and processing for ocular imaging, the use of data reduction techniques in order to increase the speed of image retrieval in large databases, and, last but not least, the resolution of security and confidentiality problems in medical databases.

  11. Handbook on electronic commerce

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, M. [Illinois Univ., Urbana, IL (United States). Beckman Inst. for Advanced Science and Technology; Blanning, R. [Vanderbilt Univ., Nashville, TN (United States). Owen Graduate School of Management; Strader, T. [Iowa State Univ., Ames, IA (United States). Management Information Systems; Whinston, A. [eds.] [Texas Univ., Austin, TX (United States). Dept. of Management Science and Information Systems

    2000-07-01

    The world is undergoing a revolution to a digital economy, with pronounced implications for corporate strategy, marketing, operations, information systems, customer services, global supply-chain management, and product distribution. This handbook examines the aspects of electronic commerce, including electronic storefront, on-line business, consumer interface, business-to-business networking, digital payment, legal issues, information product development, and electronic business models. Indispensable for academics, students and professionals who are interested in Electronic Commerce and Internet Business. (orig.)

  12. 7 CFR 1599.6 - Payments.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE McGOVERN-DOLE INTERNATIONAL FOOD FOR EDUCATION AND CHILD NUTRITION PROGRAM § 1599.6 Payments. (a... payment; the bank ABA number to which payment is to be made; the account number for the deposit at the bank; the participant's taxpayer identification number; and the type of the account into which the...

  13. 7 CFR 1499.6 - Payments.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS FOOD FOR PROGRESS PROGRAM § 1499.6 Payments. (a) If the... payment; the bank ABA number to which payment is to be made; the account number for the deposit at the bank; the participant's taxpayer identification number; and the type of the account into which the...

  14. Episodic payments (bundling): PART I.

    Science.gov (United States)

    Jacofsky, D J

    2017-10-01

    Episodic, or bundled payments, is a concept now familiar to most in the healthcare arena, but the models are often misunderstood. Under a traditional fee-for-service model, each provider bills separately for their services which creates financial incentives to maximise volumes. Under a bundled payment, a single entity, often referred to as a convener (maybe the hospital, the physician group, or a third party) assumes the risk through a payer contract for all services provided within a defined episode of care, and receives a single (bundled) payment for all services provided for that episode. The time frame around the intervention is variable, but defined in advance, as are included and excluded costs. Timing of the actual payment in a bundle may either be before the episode occurs (prospective payment model), or after the end of the episode through a reconciliation (retrospective payment model). In either case, the defined costs over the defined time frame are borne by the convener. Cite this article: Bone Joint J 2017;99-B:1280-5. ©2017 The British Editorial Society of Bone & Joint Surgery.

  15. Abrechnung mobiler Dienste im Mobile-Payment-Referenzmodell

    OpenAIRE

    Pousttchi, Key; Wiedemann, Dietmar Georg

    2005-01-01

    The purpose of the paper is to analyze mobile payments in the mobile commerce scenario. Therefore, we first classify the mobile payment in the mobile commerce scenario by explaining general offer models, charging concepts, and intermediaries. Second, we describe the mobile payment reference model, especially, the mobile payment reference organization model and different mobile payment standard types. Finally, we conclude our findings.

  16. Paying for payments: free payments and optimal interchange fees

    OpenAIRE

    Korsgaard, Søren

    2014-01-01

    Do consumers and merchants use the most efficient payment instruments? I examine how inter- change fees, which are fees paid from merchants' banks to consumers' banks when card transactions take place, influence the choice between cash and payment cards. I show that when consumers do not pay transaction fees to banks - a common feature in bank contracts - card use is declining in interchange fees, and surcharging does not neutralize interchange fees. According to my model, banks set interchan...

  17. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  18. 20 CFR 411.597 - Will SSA periodically review the outcome payment system and the outcome-milestone payment system...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Will SSA periodically review the outcome payment system and the outcome-milestone payment system for possible modifications? 411.597 Section 411... Employment Network Payment Systems § 411.597 Will SSA periodically review the outcome payment system and the...

  19. Institutional dimensions of Payments for Ecosystem Services. An analysis of Mexico's carbon forestry programme

    International Nuclear Information System (INIS)

    Corbera, Esteve; Brown, Katrina; Soberanis, Carmen Gonzalez

    2009-01-01

    This article proposes a multi-dimensional framework for understanding the development and effectiveness of Payments for Ecosystem Services (PES) schemes, framed around the notions of institutional design, performance and interplay. The framework is applied in the context of Mexico's Programme of Payments for Carbon, Biodiversity and Agro-forestry Services (PSA-CABSA), with an emphasis on its carbon component. The analysis shows that PSA-CABSA was promoted by civil society and its rules have been subject to continuous modifications over time. In the case of the carbon component, changes have been due to an original misunderstanding of how carbon projects should be designed, implemented, and carbon traded in actual markets. From a performance point of view, the paper shows that the programme has been well received by rural communities, and carbon payments have contributed to increase household income and to enhance forest management practices and organisational skills. The paper also highlights sources of institutional interplay with local institutions and international climate policy, and it reveals the importance of capacity and scale issues in securing an effective and fair implementation of PES. The conclusion provides some policy recommendations for the future development of PES initiatives in Mexico and elsewhere. (author)

  20. Bundled payment fails to gain a foothold In California: the experience of the IHA bundled payment demonstration.

    Science.gov (United States)

    Ridgely, M Susan; de Vries, David; Bozic, Kevin J; Hussey, Peter S

    2014-08-01

    To determine whether bundled payment could be an effective payment model for California, the Integrated Healthcare Association convened a group of stakeholders (health plans, hospitals, ambulatory surgery centers, physician organizations, and vendors) to develop, through a consensus process, the methods and means of implementing bundled payment. In spite of a high level of enthusiasm and effort, the pilot did not succeed in its goal to implement bundled payment for orthopedic procedures across multiple payers and hospital-physician partners. An evaluation of the pilot documented a number of barriers, such as administrative burden, state regulatory uncertainty, and disagreements about bundle definition and assumption of risk. Ultimately, few contracts were signed, which resulted in insufficient volume to test hypotheses about the impact of bundled payment on quality and costs. Although bundled payment failed to gain a foothold in California, the evaluation provides lessons for future bundled payment initiatives. Project HOPE—The People-to-People Health Foundation, Inc.

  1. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  2. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  3. 24 CFR 207.252e - Method of payment of mortgage insurance premiums.

    Science.gov (United States)

    2010-04-01

    ... insurance premiums. 207.252e Section 207.252e Housing and Urban Development Regulations Relating to Housing... Premiums § 207.252e Method of payment of mortgage insurance premiums. In the cases that the Commissioner... mortgagees, that mortgage insurance premiums be remitted electronically. [63 FR 1303, Jan. 8, 1998] ...

  4. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  5. Medicare payments to the neurology workforce in 2012.

    Science.gov (United States)

    Skolarus, Lesli E; Burke, James F; Callaghan, Brian C; Becker, Amanda; Kerber, Kevin A

    2015-04-28

    Little is known about how neurology payments vary by service type (i.e., evaluation and management [E/M] vs tests/treatments) and compare to other specialties, yet this information is necessary to help neurology define its position on proposed payment reform. Medicare Provider Utilization and Payment Data from 2012 were used. These data included all direct payments to providers who care for fee-for-service Medicare recipients. Total payment was determined by medical specialty and for various services (e.g., E/M, EEG, electromyography/nerve conduction studies, polysomnography) within neurology. Payment and proportion of services were then calculated across neurologists' payment categories. Neurologists comprised 1.5% (12,317) of individual providers who received Medicare payments and were paid $1.15 billion by Medicare in 2012. Sixty percent ($686 million) of the Medicare payment to neurologists was for E/M, which was a lower proportion than primary providers (approximately 85%) and higher than surgical subspecialties (range 9%-51%). The median neurologist received nearly 75% of their payments from E/M. Two-thirds of neurologists received 60% or more of their payment from E/M services and over 20% received all of their payment from E/M services. Neurologists in the highest payment category performed more services, of which a lower proportion were E/M, and performed at a facility, compared to neurologists in lower payment categories. E/M is the dominant source of payment to the majority of neurologists and should be prioritized by neurology in payment restructuring efforts. © 2015 American Academy of Neurology.

  6. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  7. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  8. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  9. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  10. Youth transitioning out of foster care: an evaluation of a Supplemental Security Income policy change.

    Science.gov (United States)

    King, Laura; Rukh-Kamaa, Aneer

    2013-01-01

    Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.

  11. 7 CFR 760.209 - Livestock payment calculations.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Livestock payment calculations. 760.209 Section 760..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS INDEMNITY PAYMENT PROGRAMS Emergency Assistance for Livestock, Honeybees, and Farm-Raised Fish Program § 760.209 Livestock payment calculations. (a) Payments for an...

  12. Merit-Based Incentive Payment System (MIPS): Harsh Choices For Interventional Pain Management Physicians.

    Science.gov (United States)

    Manchikanti, Laxmaiah; Helm Ii, Standiford; Benyamin, Ramsin M; Hirsch, Joshua A

    2016-01-01

    The Merit-based Incentive Payment System (MIPS) was created by the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) to improve the health of all Americans by providing incentives and policies to improve patient health outcomes. MIPS combines 3 existing programs, Meaningful Use (MU), now called Advancing Care Information (ACI), contributing 25% of the composite score; Physician Quality Reporting System (PQRS), changed to Quality, contributing 50% of the composite score; and Value-based Payment (VBP) system to Resource Use or cost, contributing 10% of the composite score. Additionally, Clinical Practice Improvement Activities (CPIA), contributing 15% of the composite score, create multiple strategic goals to design incentives that drive movement toward delivery system reform principles with inclusion of Advanced Alternative Payment Models (APMs). Under the present proposal, the Centers for Medicare and Medicaid Services (CMS) has estimated approximately 30,000 to 90,000 providers from a total of over 761,000 providers will be exempt from MIPS. About 87% of solo practitioners and 70% of practitioners in groups of less than 10 will be subjected to negative payments or penalties ranging from 4% to 9%. In addition, MIPS also will affect a provider's reputation by making performance measures accessible to consumers and third-party physician rating Web sites.The MIPS composite performance scoring method, at least in theory, utilizes weights for each performance category, exceptional performance factors to earn bonuses, and incorporates the special circumstances of small practices.In conclusion, MIPS has the potential to affect practitioners negatively. Interventional Pain Medicine practitioners must understand the various MIPS measures and how they might participate in order to secure a brighter future. Medicare Access and CHIP Reauthorization Act of 2015, merit-based incentive payment system, quality performance measures, resource use, clinical practice

  13. 20 CFR 411.552 - What effect will the subsequent entitlement to title II benefits have on EN payments for title...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What effect will the subsequent entitlement to title II benefits have on EN payments for title XVI beneficiaries after they assign their ticket? 411.552 Section 411.552 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...

  14. Towards an electronic dog nose: surface plasmon resonance immunosensor for security and safety.

    Science.gov (United States)

    Onodera, Takeshi; Toko, Kiyoshi

    2014-09-05

    This review describes an "electronic dog nose" based on a surface plasmon resonance (SPR) sensor and an antigen-antibody interaction for security and safety. We have concentrated on developing appropriate sensor surfaces for the SPR sensor for practical use. The review covers different surface fabrications, which all include variations of a self-assembled monolayer containing oligo(ethylene glycol), dendrimer, and hydrophilic polymer. We have carried out detection of explosives using the sensor surfaces. For the SPR sensor to detect explosives, the vapor or particles of the target substances have to be dissolved in a liquid. Therefore, we also review the development of sampling processes for explosives, and a protocol for the measurement of explosives on the SPR sensor in the field. Additionally, sensing elements, which have the potential to be applied for the electronic dog nose, are described.

  15. Towards an Electronic Dog Nose: Surface Plasmon Resonance Immunosensor for Security and Safety

    Directory of Open Access Journals (Sweden)

    Takeshi Onodera

    2014-09-01

    Full Text Available This review describes an “electronic dog nose” based on a surface plasmon resonance (SPR sensor and an antigen–antibody interaction for security and safety. We have concentrated on developing appropriate sensor surfaces for the SPR sensor for practical use. The review covers different surface fabrications, which all include variations of a self-assembled monolayer containing oligo(ethylene glycol, dendrimer, and hydrophilic polymer. We have carried out detection of explosives using the sensor surfaces. For the SPR sensor to detect explosives, the vapor or particles of the target substances have to be dissolved in a liquid. Therefore, we also review the development of sampling processes for explosives, and a protocol for the measurement of explosives on the SPR sensor in the field. Additionally, sensing elements, which have the potential to be applied for the electronic dog nose, are described.

  16. Current state in the research on electronic monitoring systems for the security and flow of objects and individuals

    Directory of Open Access Journals (Sweden)

    Man Dietrich Marcela

    2017-01-01

    Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

  17. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  18. Proof of payment for all reimbursement claims

    CERN Multimedia

    HR Department

    2006-01-01

    Members of the personnel are kindly requested to note that only documents proving that a payment has been made are accepted as proof of payment for any claims for reimbursement, including specifically the reimbursement of education fees. In particular, the following will be accepted as proof of payment: bank or post office bank statements indicating the name of the institution to which the payment was made; photocopies of cheques made out to the institution to which the payments were made together with bank statements showing the numbers of the relevant cheques; proof of payment in the form of discharged payment slips; invoices with acknowledgement of settlement, receipts, bank statements detailing operations crediting another account or similar documents. As a result, the following documents in particular will no longer be accepted as proof of payment: photocopies of cheques that are not submitted together with bank or post office bank statements showing the numbers of the relevant cheques; details of ...

  19. Hospital non-price competition under the Global Budget Payment and Prospective Payment Systems.

    Science.gov (United States)

    Chen, Wen-Yi; Lin, Yu-Hui

    2008-06-01

    This paper provides theoretical analyses of two alternative hospital payment systems for controlling medical cost: the Global Budget Payment System (GBPS) and the Prospective Payment System (PPS). The former method assigns a fixed total budget for all healthcare services over a given period with hospitals being paid on a fee-for-service basis. The latter method is usually connected with a fixed payment to hospitals within a Diagnosis-Related Group. Our results demonstrate that, given the same expenditure, the GBPS would approach optimal levels of quality and efficiency as well as the level of social welfare provided by the PPS, as long as market competition is sufficiently high; our results also demonstrate that the treadmill effect, modeling an inverse relationship between price and quantity under the GBPS, would be a quality-enhancing and efficiency-improving outcome due to market competition.

  20. Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

    Science.gov (United States)

    Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman

    The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).

  1. Monetary Policy Implications of Electronic Money

    OpenAIRE

    Berentsen, Aleksander

    1997-01-01

    The term digital money refers to various proposed electronic payment mechanisms designed for use by consumers to make retail payments. Digital money products have the potential to replace central bank currency, thereby affecting the money supply. This paper studies the effect of replacing central bank currency on the narrowly defined stock of money under various assumptions regarding regulatory policies and monetary operations of central banks and the reaction of the banking system.

  2. Third-party online payment solutions in China

    OpenAIRE

    Yang, Qian

    2017-01-01

    The topic of this paper is third-party online payment solutions in China and the main purpose of this paper is to figure out the research question: What are the impacts of third-party online payment solutions on China? Generally speaking, the third-party online payment solutions, including mobile payments, usually used by customer who purchase online and usually used in transaction platform. However, in China, people can use third-party payment solutions in different platfor...

  3. Specialty Payment Model Opportunities and Assessment

    Science.gov (United States)

    Mulcahy, Andrew W.; Chan, Chris; Hirshman, Samuel; Huckfeldt, Peter J.; Kofner, Aaron; Liu, Jodi L.; Lovejoy, Susan L.; Popescu, Ioana; Timbie, Justin W.; Hussey, Peter S.

    2015-01-01

    Abstract Gastroenterology and cardiology services are common and costly among Medicare beneficiaries. Episode-based payment, which aims to create incentives for high-quality, low-cost care, has been identified as a promising alternative payment model. This article describes research related to the design of episode-based payment models for ambulatory gastroenterology and cardiology services for possible testing by the Center for Medicare and Medicaid Innovation at the Centers for Medicare and Medicaid Services (CMS). The authors analyzed Medicare claims data to describe the frequency and characteristics of gastroenterology and cardiology index procedures, the practices that delivered index procedures, and the patients that received index procedures. The results of these analyses can help inform CMS decisions about the definition of episodes in an episode-based payment model; payment adjustments for service setting, multiple procedures, or other factors; and eligibility for the payment model. PMID:28083363

  4. 28 CFR 74.12 - Order of payment.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Order of payment. 74.12 Section 74.12 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CIVIL LIBERTIES ACT REDRESS PROVISION Notification and Payment § 74.12 Order of payment. Payment will be made in the order of date of birth pursuant...

  5. Model Checking a Client-Side Micro Payment Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar

    2016-01-01

    Virtual payment systems overcome the drawbacks such as processing and operational cost of the traditional payment system. The main aim of the virtual payment system is to provide efficient services in terms of cost. Online payment using credit card is one of the most expensive of all payment means.

  6. 7 CFR 1955.15 - Foreclosure by the Government of loans secured by real estate.

    Science.gov (United States)

    2010-01-01

    ... problem case report is prepared. This action should eliminate delays in selling the property after... of hazardous substances on the property. (2) Acceleration of account. Subject to paragraphs (d)(2)(i... chattel). (2) If the borrower is in the process of selling security or nonsecurity, payments may be...

  7. 46 CFR 282.30 - Payment of subsidy.

    Science.gov (United States)

    2010-10-01

    ... include for payment in such voucher the amount of ODS accrued for the voyages terminated during the period. ... 46 Shipping 8 2010-10-01 2010-10-01 false Payment of subsidy. 282.30 Section 282.30 Shipping... COMMERCE OF THE UNITED STATES Subsidy Payment and Billing Procedures § 282.30 Payment of subsidy...

  8. 46 CFR 252.40 - Payment of subsidy.

    Science.gov (United States)

    2010-10-01

    ... Payment and Billing Procedures § 252.40 Payment of subsidy. (a) Submission of voucher. At the close of each calendar month, the subsidized operator may submit a voucher, and include for payment in such... submit an initial voucher and include for payment in such voucher a percentage of the ODS payable for the...

  9. Bundled payment and enhanced recovery after surgery.

    Science.gov (United States)

    Huang, Jeffrey

    2015-01-01

    Medicare's fee-for-service (FFS) payment model may contribute to unsustainable spending growth. Payers are turning to alternative payment methods. The leading alternative payment model to the FFS problem is bundled payment. The Centers for Medicare & Medicaid Services (CMS) is taking another step to improve healthcare quality at lower cost. The CMS's Center for Medicare and Medicaid Innovation developed four models of bundled payments and 48 discrete clinical condition episodes. Many surgical care procedures are included in the 48 different clinical condition episodes.

  10. Payments to the Lab

    Science.gov (United States)

    Goals Recycling Green Purchasing Pollution Prevention Reusing Water Resources Environmental Management the Lab Make payments for event registrations, sponsorships, insurance, travel, other fees. Contact Treasury Team (505) 667-4090 Email If you need to make a payment to the Lab for an event registration

  11. Variation in payments for spine surgery episodes of care: implications for episode-based bundled payment.

    Science.gov (United States)

    Kahn, Elyne N; Ellimoottil, Chandy; Dupree, James M; Park, Paul; Ryan, Andrew M

    2018-05-25

    OBJECTIVE Spine surgery is expensive and marked by high variation across regions and providers. Bundled payments have potential to reduce unwarranted spending associated with spine surgery. This study is a cross-sectional analysis of commercial and Medicare claims data from January 2012 through March 2015 in the state of Michigan. The objective was to quantify variation in payments for spine surgery in adult patients, document sources of variation, and determine influence of patient-level, surgeon-level, and hospital-level factors. METHODS Hierarchical regression models were used to analyze contributions of patient-level covariates and influence of individual surgeons and hospitals. The primary outcome was price-standardized 90-day episode payments. Intraclass correlation coefficients-measures of variability accounted for by each level of a hierarchical model-were used to quantify sources of spending variation. RESULTS The authors analyzed 17,436 spine surgery episodes performed by 195 surgeons at 50 hospitals. Mean price-standardized 90-day episode payments in the highest spending quintile exceeded mean payments for episodes in the lowest cost quintile by $42,953 (p accounting for patient-level covariates, the remaining hospital-level and surgeon-level effects accounted for 2.0% (95% CI 1.1%-3.8%) and 4.0% (95% CI 2.9%-5.6%) of total variation, respectively. CONCLUSIONS Significant variation exists in total episode payments for spine surgery, driven mostly by variation in post-discharge and facility payments. Hospital and surgeon effects account for relatively little of the observed variation.

  12. 20 CFR 627.430 - Grant payments.

    Science.gov (United States)

    2010-04-01

    ... after receipt of a proper request for reimbursement. (e) Working capital advance payments. If a... working capital, the awarding agency may provide cash on a working capital advance payment basis. Under... reimburse the subrecipient for its actual cash disbursements. The working capital advance method of payment...

  13. 42 CFR 408.65 - Payment options.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Payment options. 408.65 Section 408.65 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PREMIUMS FOR SUPPLEMENTARY MEDICAL INSURANCE Direct Remittance: Individual Payment § 408.65 Payment options...

  14. 47 CFR 27.1186 - Payment issues.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Payment issues. 27.1186 Section 27.1186 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS... Broadband Radio Service Relocation from the 2150-2160/62 Mhz Band § 27.1186 Payment issues. Payment of cost...

  15. Healthcare Reimbursement and Quality Improvement: Integration Using the Electronic Medical Record Comment on "Fee-for-Service Payment--an Evil Practice That Must Be Stamped Out?".

    Science.gov (United States)

    Britton, John R

    2015-05-08

    Reimbursement for healthcare has utilized a variety of payment mechanisms with varying degrees of effectiveness. Whether these mechanisms are used singly or in combination, it is imperative that the resulting systems remunerate on the basis of the quantity, complexity, and quality of care provided. Expanding the role of the electronic medical record (EMR) to monitor provider practice, patient responsiveness, and functioning of the healthcare organization has the potential to not only enhance the accuracy and efficiency of reimbursement mechanisms but also to improve the quality of medical care. © 2015 by Kerman University of Medical Sciences.

  16. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  17. E-commerce settles for established payment systems: Limited market potential for innovative payment systems

    OpenAIRE

    Heng, Stefan

    2007-01-01

    Established payment systems play a dominant role also in B2C e-commerce. Innovative payment systems can only be a success here if they pay attention to the particular features of e-commerce, convey the worth of their value-adding unique selling proposition and enjoy the support of established e-shops or financial service providers. However, apart from rare cases the conventional payment systems leave little room for the innovative systems. This holds all the more since the conventional paymen...

  18. Combining DRGs and per diem payments in the private sector: the Equitable Payment Model.

    Science.gov (United States)

    Hanning, Brian W T

    2005-02-01

    The many types of payment models used in the Australian private sector are reviewed. Their features are compared and contrasted to those desirable in an optimal private sector payment model. The EPM(TM) (Equitable Payment Model) is discussed and its consistency with the desirable features of an optimal private sector payment model outlined. These include being based on a robust classification system, nationally benchmarked length of stay (LOS) results, nationally benchmarked relative cost and encouraging continual improvement in efficiency to the benefit of both health funds and private hospitals. The advantages in the context of the private sector of EPM(TM) being a per diem model, albeit very different to current per diem models, are discussed. The advantages of EPM(TM) for hospitals and health funds are outlined.

  19. 42 CFR 460.182 - Medicaid payment.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Medicaid payment. 460.182 Section 460.182 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED...) Payment § 460.182 Medicaid payment. (a) Under a PACE program agreement, the State administering agency...

  20. 5 CFR 1655.14 - Loan payments.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Loan payments. 1655.14 Section 1655.14 Administrative Personnel FEDERAL RETIREMENT THRIFT INVESTMENT BOARD LOAN PROGRAM § 1655.14 Loan payments. (a) Loan payments must be made through payroll deduction in accordance with the loan agreement. Once loan...

  1. Health and safety implications of recruitment payments in migrant construction workers

    Science.gov (United States)

    Hassan, H. A.

    2014-01-01

    Background The Middle East construction sector is heavily reliant on a migrant workforce that predominantly originates from South Asia. It is common practice for migrant construction workers to pay a local labour recruiter the equivalent of one or more years’ prospective overseas salary to secure employment, work and travel permits and transportation. The occupational health and safety implications of these financial arrangements remain unexplored. Aims To examine associations between payment to a labour recruiter, perceived general health and worksite accidents among migrant construction workers in the Middle East. Methods A questionnaire was completed by a convenience sample of predominantly Indian migrant construction workers drawn from a large construction project. The relationship between payment and risk of poor health and workplace accidents was assessed using multivariate logistic regression models (crude and adjusted for socio-demographic and occupational factors). Results There were 651 participants. The majority (58%) of migrant construction workers had paid a labour recruiter and ~40% had experienced a worksite accident. Between 3% (labourers) and 9% (foremen) perceived their health to be poor. Labourers and skilled workers who had paid a labour recruiter were significantly more likely to have experienced a worksite accident in the previous 12 months. Skilled workers, but not labourers and foremen, who had paid a labour recruiter were at increased risk of poor health. Conclusions The mechanisms linking labour recruiter payments to adverse safety and health outcomes warrant investigation with a view to developing interventions to erode these links. PMID:24668316

  2. 42 CFR 412.505 - Conditions for payment under the prospective payment system for long-term care hospitals.

    Science.gov (United States)

    2010-10-01

    ... payment system for long-term care hospitals. 412.505 Section 412.505 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM PROSPECTIVE PAYMENT SYSTEMS FOR INPATIENT HOSPITAL SERVICES Prospective Payment System for Long-Term Care Hospitals § 412.505 Conditions for...

  3. Cash and Payments Management Data

    Data.gov (United States)

    General Services Administration — The Prompt Payment Act, along with the Debt Collection Improvement Act of 1996, requires the timely payment of commercial obligations for supplies and services using...

  4. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    Science.gov (United States)

    2015-01-01

    very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering

  5. 41 CFR 51-5.7 - Payments.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Payments. 51-5.7 Section... Payments. Payments for products or services of persons who are blind or have other severe disabilities shall be made within 30 days after shipment or receipt of a proper invoice or voucher. ...

  6. 5 CFR 1620.35 - Loan payments.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Loan payments. 1620.35 Section 1620.35... Nonappropriated Fund Employees § 1620.35 Loan payments. NAF instrumentalities must deduct and transmit TSP loan... CFR part 1655 and Board procedures. Loan payments may not be deducted and transmitted for employees...

  7. Examination of Industry Payments to Radiation Oncologists in 2014 Using the Centers for Medicare and Medicaid Services Open Payments Database

    Energy Technology Data Exchange (ETDEWEB)

    Jairam, Vikram [Yale School of Medicine, New Haven, Connecticut (United States); Yu, James B., E-mail: james.b.yu@yale.edu [Department of Therapeutic Radiology, Yale School of Medicine, New Haven, Connecticut (United States)

    2016-01-01

    Purpose: To use the Centers for Medicare and Medicaid Services Open Payments database to characterize payments made to radiation oncologists and compare their payment profile with that of medical and surgical oncologists. Methods and Materials: The June 2015 release of the Open Payments database was accessed, containing all payments made to physicians in 2014. The general payments dataset was used for analysis. Data on payments made to medical, surgical, and radiation oncologists was obtained and compared. Within radiation oncology, data regarding payment category, sponsorship, and geographic distribution were identified. Basic statistics including mean, median, range, and sum were calculated by provider and by transaction. Results: Among the 3 oncologic specialties, radiation oncology had the smallest proportion (58%) of compensated physicians and the lowest mean ($1620) and median ($112) payment per provider. Surgical oncology had the highest proportion (84%) of compensated physicians, whereas medical oncology had the highest mean ($6371) and median ($448) payment per physician. Within radiation oncology, nonconsulting services accounted for the most money to physicians ($1,042,556), whereas the majority of the sponsors were medical device companies (52%). Radiation oncologists in the West accepted the most money ($2,041,603) of any US Census region. Conclusions: Radiation oncologists in 2014 received a large number of payments from industry, although less than their medical or surgical counterparts. As the Open Payments database continues to be improved, it remains to be seen whether this information will be used by patients to inform choice of providers or by lawmakers to enact policy regulating physician–industry relationships.

  8. Medicare Provider Payment Data - Home Health Agencies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Home Health Agency PUF contains information on utilization, payment (Medicare payment and standard payment), and submitted charges organized by CMS Certification...

  9. An Investigation of Digital Payment Platform Designs

    DEFF Research Database (Denmark)

    Kazan, Erol; Damsgaard, Jan

    2014-01-01

    This paper focuses on the triumph march of mobile phones that currently are annexing music players, navigation devices, and cameras as separate physical objects. The next target is set on payment. Through synthesizing available literature, we construct a framework for studying digital payment...... platforms that combines platform, technology and business design aspects. The framework is applied to conduct a comparative case study of digital payment platforms. Four types of market actors are considered: banks, mobile network operators, merchants, and startups, which are incumbents and disrupters....... By hosting third-party services, payment instruments are evolving from single-purpose to multi-functional ones. Our research extends existing payment literature from the MSP perspective to emphasize certain digital payment platform components, which impact strategies and complementary products....

  10. Regional impacts of abolishing direct payments

    DEFF Research Database (Denmark)

    Uthes, Sandra; Priorr, Annette; Zander, Peter

    2011-01-01

    The direct payment system of the Common Agricultural Policy (CAP) provides income transfers to European farmers. Recently, several countries including England and Sweden have advocated the elimination of direct payments after 2013. The extent to which an elimination of direct payments would affect...... with different production orientations and land management types was modeled under the presence and absence of direct payments using a combination of agent-based and bio-economic modeling. We found that the initial characteristics of the regions, such as the historical farm structure and regional site conditions...

  11. The use of stimulated electron emission (SEE) in homeland security applications

    Science.gov (United States)

    Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.

    2012-06-01

    Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

  12. 45 CFR 34.7 - Payment procedures.

    Science.gov (United States)

    2010-10-01

    ... whole or part, the claims officer shall prepare and mail a payment voucher to the claimant. (b) This... payment voucher, the claims officer shall sign and forward the signed voucher to the office where the claimant is or was employed for processing. (d) Upon receipt of the signed payment voucher, the office in...

  13. 7 CFR 920.112 - Late payments.

    Science.gov (United States)

    2010-01-01

    ... Miscellaneous Provisions § 920.112 Late payments. Pursuant to § 920.41(a), interest will be charged at a 1.5 percent monthly simple interest rate. Assessments for kiwifruit shall be deemed late if not received... late charge will be assessed when payment becomes 30 days late. Interest and late payment charges shall...

  14. Medicare Program; Comprehensive Care for Joint Replacement Payment Model for Acute Care Hospitals Furnishing Lower Extremity Joint Replacement Services. Final rule.

    Science.gov (United States)

    2015-11-24

    This final rule implements a new Medicare Part A and B payment model under section 1115A of the Social Security Act, called the Comprehensive Care for Joint Replacement (CJR) model, in which acute care hospitals in certain selected geographic areas will receive retrospective bundled payments for episodes of care for lower extremity joint replacement (LEJR) or reattachment of a lower extremity. All related care within 90 days of hospital discharge from the joint replacement procedure will be included in the episode of care. We believe this model will further our goals in improving the efficiency and quality of care for Medicare beneficiaries with these common medical procedures.

  15. Medicaid Disproportionate Share Hospital Payments

    Data.gov (United States)

    U.S. Department of Health & Human Services — Medicaid Disproportionate Share Hospital (DSH) Payments This link provides you with information about Medicaid DSH Payments. You can find information on DSH Audit...

  16. Usable Security and E-Banking

    DEFF Research Database (Denmark)

    Hertzum, Morten; Juul, Niels Christian; Jørgensen, Niels Henrik

    2004-01-01

    Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Analysis of the weaknesses suggests that security requirements are among their causes...... that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems....

  17. Usable security and e-banking

    DEFF Research Database (Denmark)

    Hertzum, Morten; Jørgensen, Niels; Nørgaard, Mie

    2004-01-01

    Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes...... that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems....

  18. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  19. Informal payments for health care in transition economies.

    Science.gov (United States)

    Ensor, Tim

    2004-01-01

    There is considerable evidence that unofficial payments are deeply embedded in the markets for health care in transition countries. Numerous surveys indicate that these payments provide a significant but possibly distorting contribution to health care financing. Unofficial payments can be characterised into three groups: cost contributions, including supplies and salaries, misuse of market position and payments for additional services. There is evidence from across the region on the presence of payment in each category although it is often difficult to distinguish between payment types. Regulatory policy must address a number of issues. Imposing penalties may help to reduce some payments but if the system is simply unable to provide services, such sanctions will drive workers into the private sector. There appears to be some support for formalising payments in order to reduce unofficial charges although the impact must be monitored and the danger is that formal fees add to the burden of payment. Regulation might also attempt to increase the amount of competition, provide information on good performing facilities and develop the legal basis of patient rights. Ultimately, unless governments address the endemic nature of payments across all sectors, policy interventions are unlikely to be fully effective.

  20. THE ADVANTAGES AND DISADVANTAGES OF BITCOIN PAYMENTS IN THE NEW ECONOMY

    Directory of Open Access Journals (Sweden)

    CARINA-ELENA STEGĂROIU

    2018-02-01

    Full Text Available In the Internet economy, with the help of cryptography, a branch of mathematics dealing with the security of information, as well as authentication and restriction of access to a computer system, a new digital coin as an alternative to national currencies appeared. In accomplishing this, using both mathematical methods (taking advantage of, for example, the difficulty of factorizing very large numbers, and quantum encryption methods. Throughout the world, information technology companies are focusing on information protection, inventing day-to-day methods with greater durability. In the horizon of Information Security, Quantum Cryptography has emerged, generating new possibilities in that field, hoping that data will be better protected and that the digital currency will resist over time and eventually evolve in the future, although Kurzweil, Bitcoin's pioneering technology is unlikely to be used in this respect. The idea of virtual alternatives to national currencies is not new, with advantages and disadvantages. The advantages of this coin are high payment freedom, transparency of information, high security, reduced risks for traders. Among the disadvantages we highlight the risk and volatility, the lack of notification and understanding, with incomplete functions, but which are developing, so Bitcoin is not perfect.

  1. CMS announces new payment model

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2018-01-01

    Full Text Available No abstract available. Article truncated after 150 words. On Tuesday, 1/9/18, the Centers for Medicare and Medicaid (CMS announced a new voluntary bundled-payment model that will be considered an advanced alternative payment model under Medicare Access and CHIP Reauthorization Act of 2015 (MACRA (1. The new model is the first advanced Alternative Payment Model (APM to be introduced by the Trump administration. The Trump administration has been a vocal advocate of reducing administrative burden for clinicians and has touted voluntary models as a solution (2. The new, voluntary model comes less than two months after the CMS officially decided to eliminate two mandatory bundled-payment models created during the Obama administration. Under the model, clinician payment will be based on quality measures during a 90-day episode of care. Participants must select at least one of the 32 clinical episodes to apply to the model. The inpatient clinical episodes are listed in Table 1 (3. Table 1. Clinical inpatient episodes under …

  2. Healthcare Reimbursement and Quality Improvement: Integration Using the Electronic Medical Record; Comment on “Fee-for-service Payment - an Evil Practice That Must Be Stamped Out?”

    Directory of Open Access Journals (Sweden)

    John R. Britton

    2015-08-01

    Full Text Available Reimbursement for healthcare has utilized a variety of payment mechanisms with varying degrees of effectiveness. Whether these mechanisms are used singly or in combination, it is imperative that the resulting systems remunerate on the basis of the quantity, complexity, and quality of care provided. Expanding the role of the electronic medical record (EMR to monitor provider practice, patient responsiveness, and functioning of the healthcare organization has the potential to not only enhance the accuracy and efficiency of reimbursement mechanisms but also to improve the quality of medical care.

  3. The Neutral State: A Genealogy of Ecosystem Service Payments in Costa Rica

    Directory of Open Access Journals (Sweden)

    David M Lansing

    2015-01-01

    Full Text Available Using the case of Costa Rica, this paper examines how ′carbon′ became an identifiable problem for that state. We trace how, during the 1980s, rationalities of financialisation and security arose in this country that allowed for Payments for Ecosystem Services (PES to emerge as an economic and political mechanism. Our central thesis is: this period initiated a government project of securing a viable future for the nation′s resources by linking them to global financial markets and international trade. This project of achieving resource security through economic circulation introduced new financial logics into forest management, as well as new modes of calculating the value and extent of the forest. These ways of framing resources found expression in the nation′s PES programme that is now central to the state′s goal of achieving carbon neutrality. Today, Costa Rica′s carbon flows are becoming territorialised as part of the nation′s atmosphere, biomass, people, and economy. This paper shows how carbon′s territorialisation did not begin with a concern for the climate, nor did it occur through diffusion of global climate policy to Costa Rica. Instead, carbon′s rise can be traced to locally specific ways of coping with the problem of resource security.

  4. Genesis and Evolution of Digital Payment Platforms

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Damsgaard, Jan

    2012-01-01

    Payment transactions through the use of physical coins, bank notes or credit cards have for centuries been the standard formats of exchanging money. Recently online and mobile digital payment platforms has entered the stage as contenders to this position and possibly could penetrate societies...... thoroughly and substitute current payment standards in the decades to come. This paper portrays how digital payment paltforms evolve in socio-technical niches and how various technological platforms aim for institutional attention in their attempt to challenge earlier platforms and standards. The paper...... applies a co-evolutionary multilevel perspective to model the interplay and processes between technology and society wherein digital payment platforms potentially will substitute other payment platforms just like the credit card negated the check. On this basis this paper formulate a multilevel conceptual...

  5. 24 CFR 2002.15 - Advance payments.

    Science.gov (United States)

    2010-04-01

    ... where the requester has a history of prompt payment of FOIA fees, or require an advance payment of an amount up to the full estimated charges in the case of requesters with no history of payment; or (2) Where a requester has previously failed to pay a fee charged in a timely fashion (i.e., within 30 days...

  6. 14 CFR 1206.704 - Advance payments.

    Science.gov (United States)

    2010-01-01

    ... where the requester has a history of prompt payment of FOIA fees, or require an advance payment of an amount up to the full estimated charges in the case of requesters with no history of payment; or (2) A requester has previously failed to pay a fee in a timely fashion (within 30 days of billing), then NASA may...

  7. 32 CFR 756.7 - Payment.

    Science.gov (United States)

    2010-07-01

    ... payment is possible under another statute. In some cases, neither the NAFI nor its insurer may be legally responsible. In those instances when there is no negligence, and payment is authorized under some other...

  8. 20 CFR 411.582 - Can a State VR agency receive payment under the cost reimbursement payment system if a continuous...

    Science.gov (United States)

    2010-04-01

    ... the cost reimbursement payment system if a continuous 9-month period of substantial gainful activity... Systems § 411.582 Can a State VR agency receive payment under the cost reimbursement payment system if a... under the cost reimbursement payment system under subpart V of part 404 (or subpart V of part 416) of...

  9. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication

    Science.gov (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.

    2002-04-01

    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  10. 20 CFR 408.234 - Can you continue to receive SVB payments if you stay in the United States for more than 1 full...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Can you continue to receive SVB payments if...' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS SVB... family, a transportation strike, etc.); or (2) Are exercising your option to be personally present in the...

  11. Rights management technologies: A good choice for securing electronic healthrecords?

    NARCIS (Netherlands)

    Petkovic, M.; Katzenbeisser, S.; Kursawe, K.; Pohlmann, N.; Reimer, H.; Schneider, W.

    2007-01-01

    Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading

  12. Financial Technologies: A Note on Mobile Payment

    Directory of Open Access Journals (Sweden)

    Song Yee Leng

    2018-02-01

    Full Text Available The financial market is currently disrupted by the rise of new technologies "FinTech” a short form for financial technology, which profoundly reshapes the financial intermediary structure and makes financial services more efficient. Mobile technology with Internet-enabled devices are the next logical phase of the World Wide Web campaign such as mobile phone taking over the mass market and will fundamentally change the way products are buy and sell as well as financial services especially the mobile payment system. This research examines changes payment method in financial services, particularly those involving mobile payments that can create new channels for consumers to purchase goods and services using mobile phone. Mobile payment application is ready to replace traditional cash, checks, credit and debit card throughout the country. In this stage of development, the current situation of mobile payment market, review the previous literature on mobile payment services, analysis use of mobile payment worldwide and various initiatives use mobile phones to offer financial services for those ‘unbanked’.

  13. Financial Technologies: A Note on Mobile Payment

    Directory of Open Access Journals (Sweden)

    Song Yee Leng

    2018-02-01

    Full Text Available The financial market is currently disrupted by the rise of new technologies “FinTech” a short form of financial technology, which profoundly reshapes the financial intermediary structure and makes financial services more efficient. Mobile technology with Internet-enabled devices are the next logical phase of the World Wide Web a campaign such as mobile phone taking over the mass market and will fundamentally change the way products are bought and sold as well as financial services especially the mobile payment system. This research examines changes payment method in financial services, particularly those involving mobile payments that can create new channels for consumers to purchase goods and services using a mobile phone. Mobile payment application is ready to replace traditional cash, checks, credit and debit card throughout the country. In this stage of development, the current situation of mobile payment market, review the previous literature on mobile payment services, analysis use of mobile payment worldwide and various initiatives use mobile phones to offer financial services for those ‘unbanked’.

  14. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2012-12-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  15. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2013-02-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  16. 76 FR 33780 - Assessments for Mismatched Payments or Inadequate Payment Information for Geothermal, Solid...

    Science.gov (United States)

    2011-06-09

    ...] Assessments for Mismatched Payments or Inadequate Payment Information for Geothermal, Solid Minerals, and...: Regulations for geothermal, solid minerals, and Indian oil and gas leases authorize the Office of Natural..., Office of Natural Resources Revenue, P.O. Box 25165, MS 61211B, Denver, Colorado 80225-0165...

  17. Congestion and cascades in payment systems

    Science.gov (United States)

    Beyeler, Walter E.; Glass, Robert J.; Bech, Morten L.; Soramäki, Kimmo

    2007-10-01

    We develop a parsimonious model of the interbank payment system. The model incorporates an endogenous instruction arrival process, a scale-free topology of payments between banks, a fixed total liquidity which limits banks’ capacity to process arriving instructions, and a global market that distributes liquidity. We find that at low liquidity the system becomes congested and payment settlement loses correlation with payment instruction arrival, becoming coupled across the network. The onset of congestion is evidently related to the relative values of three characteristic times: the time for banks’ net position to return to 0, the time for a bank to exhaust its liquidity endowment, and the liquidity market relaxation time. In the congested regime settlement takes place in cascades having a characteristic length scale. A global liquidity market substantially attenuates congestion, requiring only a small fraction of the payment-induced liquidity flow to achieve strong beneficial effects.

  18. 38 CFR 10.51 - Payments to minor child.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Payments to minor child. 10.51 Section 10.51 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Payments § 10.51 Payments to minor child. Payments to minor child through legal guardian, natural...

  19. 45 CFR 35.7 - Payment of approved claims.

    Science.gov (United States)

    2010-10-01

    ... duly authorized agent shall sign the voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (SF 1145) shall... 45 Public Welfare 1 2010-10-01 2010-10-01 false Payment of approved claims. 35.7 Section 35.7...

  20. 40 CFR 10.7 - Payment of approved claim.

    Science.gov (United States)

    2010-07-01

    ..., claimant or his duly authorized agent shall sign the voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (SF 1145... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Payment of approved claim. 10.7 Section...

  1. 24 CFR 206.26 - Change in payment option.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Change in payment option. 206.26... in payment option. (a) General. The payment option may be changed as provided in this section. (b... credit payment option. Until the repairs are completed, the mortgagee shall make no line of credit...

  2. 42 CFR 102.83 - Payment of all benefits.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Payment of all benefits. 102.83 Section 102.83... COMPENSATION PROGRAM Calculation and Payment of Benefits § 102.83 Payment of all benefits. (a) The Secretary may pay any benefits under this Program through lump-sum payments. If the Secretary determines that...

  3. Tenure Security Reformand Electronic Registration: Exploring ...

    African Journals Online (AJOL)

    This paper examines the potential significance of updating registration practices in resolving some of the issues about tenure security in a transformative context. It deals with the importance of good governance in the context of land administration and considers its impact on intended reforms. Land registration practice as an ...

  4. 34 CFR 35.7 - Payment of approved claims.

    Science.gov (United States)

    2010-07-01

    ... sign the voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (SF 1145) shall designate both the claimant and his... 34 Education 1 2010-07-01 2010-07-01 false Payment of approved claims. 35.7 Section 35.7 Education...

  5. 12 CFR 793.7 - Payment of approved claims.

    Science.gov (United States)

    2010-01-01

    ... voucher for payment, Standard Form 1145, before payment is made. (b) When the claimant is represented by an attorney, the voucher for payment (S.F. 1145) shall designate both the claimant and his attorney... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Payment of approved claims. 793.7 Section 793.7...

  6. 34 CFR 5.62 - Advance payment of fees.

    Science.gov (United States)

    2010-07-01

    ... anticipated cost and obtains satisfactory assurance of full payment if the requester has a history of prompt payment of FOIA fees; or (2) Requires an advance payment if the requester has no history of payment. (b) If a requester has previously failed to pay a fee in a timely fashion, the FOI Officer does not...

  7. 20 CFR 404.1055 - Payments for agricultural labor.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payments for agricultural labor. 404.1055... Payments for agricultural labor. (a) When cash payments are not wages. We do not include as wages your cash payments in a calendar year after 1987 from an employer for agricultural labor (see § 404.1056) if your...

  8. Analysis of mobile pre-payment (pay in advance) and post-payment (pay later) services

    NARCIS (Netherlands)

    Molina-Castillo, Francisco Jose; Rodriguez-Guirao, Alicia; Lopez-Nicolas, Carolina; Bouwman, W.A.G.A.

    2016-01-01

    The diffusion of mobile payments (M-payments) is still in its early stages and further research is needed to understand what motivates or restricts people's behaviour when using mobile services. Based on a sample of Dutch mobile service users, this study analyses the antecedents of two types of

  9. Security of M-Commerce transactions

    OpenAIRE

    Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU

    2013-01-01

    In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

  10. MACRA, Alternative Payment Models, and the Physician-Focused Payment Model: Implications for Radiology.

    Science.gov (United States)

    Rosenkrantz, Andrew B; Nicola, Gregory N; Allen, Bibb; Hughes, Danny R; Hirsch, Joshua A

    2017-06-01

    The Medicare Access and CHIP Reauthorization Act (MACRA) of 2015 describes alternative payment models (APMs) as new approaches to health care payment that incentivize higher quality and value. MACRA incentivizes increasing APM participation by all physician specialties over the coming years. Some APMs will be deemed Advanced APMs; clinicians who are a Qualifying Participant in an Advanced APM will receive substantial benefits under MACRA including an automatic 5% payment bonus, regardless of their performance and savings within the APM, and a larger payment rate increase beginning in 2026. Existing APMs are most relevant to primary care physicians, and opportunities for radiologists to participate in Advanced APMs fulfilling Qualified Participant requirements are limited. Physician-Focused Payment Models (PFPMs), as described in MACRA, are APMs that target physicians' Medicare payments based on quality and cost of physician services. PFPMs must address a new issue or specialty compared with existing APMs and will thus foster a more diverse range of APMs encompassing a wider range of specialties. The PFPM Technical Advisory Committee is a new independent agency that will review proposals for new PFPMs and provide recommendations to CMS regarding their approval. The PFPM Technical Advisory Committee comprises largely primary care physicians and health policy experts and is not required to consult clinical experts when reviewing new specialist-proposed PFPMs. As PFPMs provide a compelling opportunity for radiologists to demonstrate and be rewarded for their unique contributions toward patient care, radiologists should embrace this new model and actively partner with other stakeholders in developing radiology-relevant PFPMs. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  11. Build Your Own Payment Model.

    Science.gov (United States)

    Berlin, Joey

    2017-07-01

    Physicians participating in MACRA have a unique opportunity to create and submit their own alternative payment models to the government and take command of their own future payments. At least one Texas physician is taking a crack at developing his own model.

  12. 28 CFR 70.22 - Payment.

    Science.gov (United States)

    2010-07-01

    ... (INCLUDING SUBAWARDS) WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS AND OTHER NON-PROFIT ORGANIZATIONS Post-Award Requirements Financial and Program Management § 70.22 Payment. (a) Payment methods must... transfer of funds and disbursement by the recipient, and financial management systems that meet the...

  13. 15 CFR 14.22 - Payment.

    Science.gov (United States)

    2010-01-01

    ... AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT, AND COMMERCIAL ORGANIZATIONS Post-Award Requirements Financial and Program Management § 14.22 Payment. (a) Payment methods... transfer of funds and disbursement by the recipient, and financial management systems that meet the...

  14. 48 CFR 32.007 - Contract financing payments.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contract financing... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING 32.007 Contract financing payments. (a)(1) Unless... section, the due date for making contract financing payments by the designated payment office is the 30th...

  15. 7 CFR 760.3 - Indemnity payments on milk.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Indemnity payments on milk. 760.3 Section 760.3... Farmers for Milk § 760.3 Indemnity payments on milk. An indemnity payment for milk may be made to an... whole milk marketed during the applications period, and (b) any payment not subject to refund which he...

  16. Permissible Delay in Payments

    Directory of Open Access Journals (Sweden)

    Yung-Fu Huang

    2007-01-01

    Full Text Available The main purpose of this paper wants to investigate the optimal retailer's lot-sizing policy with two warehouses under partially permissible delay in payments within the economic order quantity (EOQ framework. In this paper, we want to extend that fully permissible delay in payments to the supplier would offer the retailer partially permissible delay in payments. That is, the retailer must make a partial payment to the supplier when the order is received. Then the retailer must pay off the remaining balance at the end of the permissible delay period. In addition, we want to add the assumption that the retailer's storage space is limited. That is, the retailer will rent the warehouse to store these exceeding items when the order quantity is larger than retailer's storage space. Under these conditions, we model the retailer's inventory system as a cost minimization problem to determine the retailer's optimal cycle time and optimal order quantity. Three theorems are developed to efficiently determine the optimal replenishment policy for the retailer. Finally, numerical examples are given to illustrate these theorems and obtained a lot of managerial insights.

  17. 7 CFR 714.46 - Certification for payment.

    Science.gov (United States)

    2010-01-01

    ... ERRONEOUSLY, ILLEGALLY, OR WRONGFULLY COLLECTED § 714.46 Certification for payment. An officer or employee of the Department of Agriculture authorized to certify public vouchers for payment shall, for and on... 7 Agriculture 7 2010-01-01 2010-01-01 false Certification for payment. 714.46 Section 714.46...

  18. 48 CFR 49.112-2 - Final payment.

    Science.gov (United States)

    2010-10-01

    ... voucher or invoice and forward the documents to the disbursing officer for payment. (b) Settlement by...) Construction contracts. In the case of construction contracts, before forwarding the final payment voucher, the... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Final payment. 49.112-2...

  19. The Race to Dominate the Mobile Payments Platform

    DEFF Research Database (Denmark)

    Staykova, Kalina Stefanova; Damsgaard, Jan

    2015-01-01

    The payment market has been stable for a number of decades with well-defined roles (acquirers and issuers), profitable business models (the card schemes) and a dominant design in which the merchants absorb the costs associated with payments. However, numerous digital payment solutions, which rely...... on new disruptive technologies, are emerging on the payment market, transforming the payment area from being established into a state of flux. In this article, we investigate the various factors that determine the success of a given solution. To this end, we build a framework to analyze the entry...

  20. 45 CFR 2543.22 - Payment.

    Science.gov (United States)

    2010-10-01

    ... AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, AND OTHER NON-PROFIT ORGANIZATIONS Post-Award Requirements Financial and Program Management § 2543.22 Payment. (a) Payment methods shall minimize the time... and disbursement by the recipient, and (2) Financial management systems that meet the standards for...