7,246 research outputs found
Encryptionâs Importance to Economic and Infrastructure Security
Det övergripande syftet med den hĂ€r avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka vĂ€rdeskapandet inom hĂ€lso- och sjukvĂ„rden. Inom hĂ€lso- och sjukvĂ„rden Ă€r network coopetition ett Ă€mne som fĂ„tt liten uppmĂ€rksamhet i tidigare studier. För att besvara syftet utvecklades en modell för network coopetition inom hĂ€lso- och sjukvĂ„rden. Modellen applicerades sedan pĂ„ en del av vĂ„rdkedjan för patienter i behov av neurokirurgisk vĂ„rd. Resultaten frĂ„n avhandlingen visar att: (1) FörutsĂ€ttningarna för network coopetition i vĂ„rdkedjan för patienter i behov av neurokirurgisk vĂ„rd Ă€r uppfyllda. (2) Det finns exempel pĂ„ horisontell network coopetition i den studerade vĂ„rdkedjan. (3) Det existerar en diskrepans mellan hur aktörerna ser pĂ„Â sitt eget och de andra aktörernas vĂ€rdeskapande. (4) VĂ€rdeskapandet bör utvĂ€rderas som ett gemensamt system dĂ€r hĂ€nsyn tas till alla aktörer och utvĂ€rderas pĂ„ process- nivĂ„ dĂ€r hĂ€nsyn tas till alla intressenter. Dessa resultat leder fram till den övergripande slutsatsen Ă€r att network coopetition bör kunna öka vĂ€rdeskapandet för högspecialiserade vĂ„rdkedjor med en stor andel inomlĂ€nspatienter.The overall purpose of this thesis was to investigate whether network coopetition, cooperation between competitive actors, can increase the value creation within the health care system. Within health care, network coopetition is a subject granted little attention in previous research. To fulfil the purpose a model for network coopetition within the health care system was developed. The model was the applied to one part of the chain of care for patients in need of neurosurgery. The results from this thesis show: (1) The conditions for network coopetition in the chain of care for patients in need of neurosurgery are fulfilled. (2) Examples of horizontal network coopetition have been found in the studied chain of care. (3) There is an existing discrepancy between how each actor recognizes its own and the other actorsâ value creation. (4) The value creation ought to be evaluated as a common system where all actors are taken into account and at a process level where all stakeholders are considered. These results supports the final conclusion that network coopetition ought to be able to increase the value creation for highly specialized chain of cares with a large share of within-county patients
Why Confronting the Internetâs Dark Side?
Raphael Cohen-Almagor, the author of Confronting the Internetâs Dark Side, explains his motivation for exploring the dangerous side of the world wide web. This new book is the first comprehensive book on social responsibility on the Internet
Inventing the Future: Barlow and Beyond
Syfte: Syftet med studien var att kartlÀgga preventiva omvÄrdnadsÄtgÀrder för att förhindra ventilator-associerad pneumoni pÄ en thoraxintensivvÄrdsavdelning. Bakgrund: De vanligaste vÄrdrelaterade infektionerna pÄ intensivvÄrdsavdelningar Àr pneumonier och bland dessa Àr 80 % ventilatorassocierade. VÄrdrelaterade infektioner innebÀr stora kostnader för samhÀllet och ökat vÄrdlidande för den drabbade patienten. För att förhindra uppkomsten av ventilator-associerad pneumoni (VAP) finns ett antal omvÄrdnadsÄtgÀrder som har visat sig vara effektiva vad gÀller att motverka VAP. Design: Studien Àr en journalgranskning med retrospektiv deskriptiv design. Metod: Ett klusterurval gjordes dÀr patienter som vÄrdats minst tvÄ pÄbörjade dygn i respirator valdes ut. Totalt togs 126 journaler fram varav 17 journaler exkluderades och slutligen ingick totalt 109 journaler i studien. Journalerna granskades med hjÀlp av ett protokoll dÀr följande omvÄrdnadsÄtgÀrder kontrollerades: tandborstning, munvÄrd med klorhexidinlösning, antal utförda kufftrycksmÀtningar, registrerat kufftryck, höjd huvudÀnda, subglottisaspiration, sederingsgrad enligt Richmond Agitation Sedation Scale (RASS) samt gurgling med klorhexidinlösning. Datan analyserades i statistikprogrammet SPSS. Resultat: Deltagarna delades in i tvÄ grupper utifrÄn Älder (grupp 1 †69 Är, grupp 2 ℠70 Är). MunvÄrd med klorhexidin var den ÄtgÀrd som utfördes flest gÄnger per dygn med medianvÀrde fyra i bÄda Äldersgrupperna. DÀrefter följde kufftrycksmÀtning med en median pÄ tvÄ kontroller per dygn. MedianvÀrdet för höjd huvudÀnda var ett i bÄda grupperna. Tandborstning var den ÄtgÀrd som utfördes minst antal gÄnger. Det var inga signifikanta skillnader mellan de olika Äldersgrupperna vad gÀller utförda omvÄrdnadsÄtgÀrder. Konklusion och kliniska implikationer: En rimlig bedömning Àr att kontinuerlig uppdatering betrÀffande den senaste forskningen hos vÄrdpersonal samt revidering av PM kommer att ge bÀttre vÄrdresultat, kortare vÄrdtider, mindre kostnader för samhÀllet och mindre vÄrdlidande. Resultatet pekar pÄ behov av antingen bÀttre följsamhet till befintliga rekommendationer, eller noggrannare och tydligare dokumentation av utförda ÄtgÀrder
Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sonyâs production of The Interview and considers the hackâs chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americansâ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure
FISA Reform
Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effectâi.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the President\u27s Surveillance Program. It then examines how technology has altered the types of information available, as well as methods of transmission and storage. The article builds on this to develop a taxonomy for how a statutory approach to foreign intelligence gathering could be given force. It divides foreign intelligence gathering into two categories: front-end collection and back-end analysis and use. Each category contains a counterpoise structured to ensure the appropriate exercise of Congressionally-mandated authorities. For the front-end, this means balancing the manner of collection with requirements for approval. For the back-end, this means offsetting implementation with transparency and oversight. The article then considers the constituent parts of each category
Unlocking the Fifth Amendment: Passwords and Encrypted Devices
Each year, law enforcement seizes thousands of electronic devicesâsmartphones, laptops, and notebooksâthat it cannot open without the suspectâs password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password? This Article considers the Fifth Amendment protection against compelled disclosures of passwordsâa question that has split and confused courts. It measures this right against the legal right of law enforcement, armed with a warrant, to search the device that it has validly seized. Encryption cases present the unique hybrid scenario that link and entangle the Fourth and Fifth Amendments. In a sense, this Article explores whose rights should prevail. This Article proposes a novel settlement that draws upon the best aspects of Fourth and Fifth Amendment law: the government can compel a suspect to decrypt only those files it already knows she possesses. This rule follows from existing Fifth Amendment case law and, as a corollary to the fundamental nature of strong encryption, also represents the best accommodation of law enforcement needs against individual privacy
Queer cryptograms, anarchist cyphers: decoding Dennis Cooper's The marbled swarm: a novel
Concentrating on Dennis Cooperâs latest work, The Marbled Swarm: A Novel, a fiendishly complex, experimental tale of murder and cannibalism in Cooperâs adopted home city of Paris, I show that both the subject of the text and its formal architecture are suspended between twin principles of secrecy and concealment. I argue that a consideration of these secret strategies allows us to perceive the implicit connections between Cooperâs writing and communities of queer dissidents and anarchist dissenters who used similar covert techniques in earlier centuries in order to persist in the face of public prosecution. Following an in-depth historical appraisal of these modes of communication, and their provenance in the back-streets of Paris, London and New York, I conclude by considering the contemporary significance of Cooperâs most recent nove
Risks and remedies in e-learning system
One of the most effective applications of Information and Communication
Technology (ICT) is the emergence of E-Learning. Considering the importance and
need of E-Learning, recent years have seen a drastic change of learning
methodologies in Higher Education. Undoubtedly, the three main entities of
E-Learning system can be considered as Student, Teacher & Controlling Authority
and there will be different level, but a good E-Learning system needs total
integrity among all entities in every level. Apart from integrity enforcement,
security enforcement in the whole system is the other crucial way to organize
the it. As internet is the backbone of the entire system which is inherently
insecure, during transaction of message in E-Learning system, hackers attack by
utilising different loopholes of technology. So different security measures are
required to be imposed on the system. In this paper, emphasis is given on
different risks called e-risks and their remedies called e-remedies to build
trust in the minds of all participants of E-Learning system
- âŠ