7,246 research outputs found

    Encryption’s Importance to Economic and Infrastructure Security

    Get PDF
    Det övergripande syftet med den hĂ€r avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka vĂ€rdeskapandet inom hĂ€lso- och sjukvĂ„rden. Inom hĂ€lso- och sjukvĂ„rden Ă€r network coopetition ett Ă€mne som fĂ„tt liten uppmĂ€rksamhet i tidigare studier. För att besvara syftet utvecklades en modell för network coopetition inom hĂ€lso- och sjukvĂ„rden. Modellen applicerades sedan pĂ„ en del av vĂ„rdkedjan för patienter i behov av neurokirurgisk vĂ„rd. Resultaten frĂ„n avhandlingen visar att: (1) FörutsĂ€ttningarna för network coopetition i vĂ„rdkedjan för patienter i behov av neurokirurgisk vĂ„rd Ă€r uppfyllda. (2) Det finns exempel pĂ„ horisontell network coopetition i den studerade vĂ„rdkedjan. (3) Det existerar en diskrepans mellan hur aktörerna  ser  pÄ  sitt  eget  och  de  andra  aktörernas  vĂ€rdeskapande. (4)  VĂ€rdeskapandet bör utvĂ€rderas som ett gemensamt system dĂ€r hĂ€nsyn tas till alla aktörer och utvĂ€rderas pĂ„ process- nivĂ„ dĂ€r hĂ€nsyn tas till alla intressenter. Dessa resultat leder fram till den övergripande slutsatsen Ă€r att network coopetition bör kunna öka vĂ€rdeskapandet för högspecialiserade vĂ„rdkedjor med en stor andel inomlĂ€nspatienter.The overall purpose of this thesis was to investigate whether network coopetition, cooperation between competitive actors, can increase the value creation within the health care system. Within health care, network coopetition is a subject granted little attention in previous research. To fulfil the purpose a model for network coopetition within the health care system was developed. The model was the applied to one part of the chain of care for patients in need of neurosurgery. The results from this thesis show: (1) The conditions for network coopetition in the chain of care for patients in need of neurosurgery are fulfilled. (2) Examples of horizontal network coopetition have been found in the studied chain of care. (3) There is an existing discrepancy between how each actor recognizes its own and the other actors’ value creation. (4) The value creation ought to be evaluated as a common system where all actors are taken into account and at a process level where all stakeholders are considered. These results supports the final conclusion that network coopetition ought to be able to increase the value creation for highly specialized chain of cares with a large share of within-county patients

    Why Confronting the Internet’s Dark Side?

    Get PDF
    Raphael Cohen-Almagor, the author of Confronting the Internet’s Dark Side, explains his motivation for exploring the dangerous side of the world wide web. This new book is the first comprehensive book on social responsibility on the Internet

    Inventing the Future: Barlow and Beyond

    Get PDF
    Syfte: Syftet med studien var att kartlĂ€gga preventiva omvĂ„rdnadsĂ„tgĂ€rder för att förhindra ventilator-associerad pneumoni pĂ„ en thoraxintensivvĂ„rdsavdelning. Bakgrund: De vanligaste vĂ„rdrelaterade infektionerna pĂ„ intensivvĂ„rdsavdelningar Ă€r pneumonier och bland dessa Ă€r 80 % ventilatorassocierade. VĂ„rdrelaterade infektioner innebĂ€r stora kostnader för samhĂ€llet och ökat vĂ„rdlidande för den drabbade patienten. För att förhindra uppkomsten av ventilator-associerad pneumoni (VAP) finns ett antal omvĂ„rdnadsĂ„tgĂ€rder som har visat sig vara effektiva vad gĂ€ller att motverka VAP. Design: Studien Ă€r en journalgranskning med retrospektiv deskriptiv design. Metod: Ett klusterurval gjordes dĂ€r patienter som vĂ„rdats minst tvĂ„ pĂ„började dygn i respirator valdes ut. Totalt togs 126 journaler fram varav 17 journaler exkluderades och slutligen ingick totalt 109 journaler i studien. Journalerna granskades med hjĂ€lp av ett protokoll dĂ€r följande omvĂ„rdnadsĂ„tgĂ€rder kontrollerades: tandborstning, munvĂ„rd med klorhexidinlösning, antal utförda kufftrycksmĂ€tningar, registrerat kufftryck, höjd huvudĂ€nda, subglottisaspiration, sederingsgrad enligt Richmond Agitation Sedation Scale (RASS) samt gurgling med klorhexidinlösning. Datan analyserades i statistikprogrammet SPSS. Resultat: Deltagarna delades in i tvĂ„ grupper utifrĂ„n Ă„lder (grupp 1 ≀ 69 Ă„r, grupp 2 ≄ 70 Ă„r). MunvĂ„rd med klorhexidin var den Ă„tgĂ€rd som utfördes flest gĂ„nger per dygn med medianvĂ€rde fyra i bĂ„da Ă„ldersgrupperna. DĂ€refter följde kufftrycksmĂ€tning med en median pĂ„ tvĂ„ kontroller per dygn. MedianvĂ€rdet för höjd huvudĂ€nda var ett i bĂ„da grupperna. Tandborstning var den Ă„tgĂ€rd som utfördes minst antal gĂ„nger. Det var inga signifikanta skillnader mellan de olika Ă„ldersgrupperna vad gĂ€ller utförda omvĂ„rdnadsĂ„tgĂ€rder. Konklusion och kliniska implikationer: En rimlig bedömning Ă€r att kontinuerlig uppdatering betrĂ€ffande den senaste forskningen hos vĂ„rdpersonal samt revidering av PM kommer att ge bĂ€ttre vĂ„rdresultat, kortare vĂ„rdtider, mindre kostnader för samhĂ€llet och mindre vĂ„rdlidande. Resultatet pekar pĂ„ behov av antingen bĂ€ttre följsamhet till befintliga rekommendationer, eller noggrannare och tydligare dokumentation av utförda Ă„tgĂ€rder

    Inventing the Future: Barlow and Beyond

    Get PDF

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure

    FISA Reform

    Get PDF
    Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effect—i.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the President\u27s Surveillance Program. It then examines how technology has altered the types of information available, as well as methods of transmission and storage. The article builds on this to develop a taxonomy for how a statutory approach to foreign intelligence gathering could be given force. It divides foreign intelligence gathering into two categories: front-end collection and back-end analysis and use. Each category contains a counterpoise structured to ensure the appropriate exercise of Congressionally-mandated authorities. For the front-end, this means balancing the manner of collection with requirements for approval. For the back-end, this means offsetting implementation with transparency and oversight. The article then considers the constituent parts of each category

    Unlocking the Fifth Amendment: Passwords and Encrypted Devices

    Get PDF
    Each year, law enforcement seizes thousands of electronic devices—smartphones, laptops, and notebooks—that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password? This Article considers the Fifth Amendment protection against compelled disclosures of passwords—a question that has split and confused courts. It measures this right against the legal right of law enforcement, armed with a warrant, to search the device that it has validly seized. Encryption cases present the unique hybrid scenario that link and entangle the Fourth and Fifth Amendments. In a sense, this Article explores whose rights should prevail. This Article proposes a novel settlement that draws upon the best aspects of Fourth and Fifth Amendment law: the government can compel a suspect to decrypt only those files it already knows she possesses. This rule follows from existing Fifth Amendment case law and, as a corollary to the fundamental nature of strong encryption, also represents the best accommodation of law enforcement needs against individual privacy

    Queer cryptograms, anarchist cyphers: decoding Dennis Cooper's The marbled swarm: a novel

    Get PDF
    Concentrating on Dennis Cooper’s latest work, The Marbled Swarm: A Novel, a fiendishly complex, experimental tale of murder and cannibalism in Cooper’s adopted home city of Paris, I show that both the subject of the text and its formal architecture are suspended between twin principles of secrecy and concealment. I argue that a consideration of these secret strategies allows us to perceive the implicit connections between Cooper’s writing and communities of queer dissidents and anarchist dissenters who used similar covert techniques in earlier centuries in order to persist in the face of public prosecution. Following an in-depth historical appraisal of these modes of communication, and their provenance in the back-streets of Paris, London and New York, I conclude by considering the contemporary significance of Cooper’s most recent nove

    Risks and remedies in e-learning system

    Full text link
    One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher Education. Undoubtedly, the three main entities of E-Learning system can be considered as Student, Teacher & Controlling Authority and there will be different level, but a good E-Learning system needs total integrity among all entities in every level. Apart from integrity enforcement, security enforcement in the whole system is the other crucial way to organize the it. As internet is the backbone of the entire system which is inherently insecure, during transaction of message in E-Learning system, hackers attack by utilising different loopholes of technology. So different security measures are required to be imposed on the system. In this paper, emphasis is given on different risks called e-risks and their remedies called e-remedies to build trust in the minds of all participants of E-Learning system
    • 

    corecore