1,534 research outputs found

    Jefferson Digital Commons quarterly report: July-September 2017

    Get PDF
    This quarterly report includes: Assorted articles Confronting Racism, Bias, and Social Injustice in Healthcare Lecture CREATE DAY OT Capstone presentations Grand Rounds Assorted Newsletters Nexus Maximus Posters University Wide Posters House Staff Quality Improvement and Patient Safety Posters CSHLA Scholar Day posters Student publications and presentations What People are Saying about the Jefferson Digital Common

    Social Media in the Dental School Environment, Part A: Benefits, Challenges, and Recommendations for Use

    Get PDF
    Social media consist of powerful tools that impact not only communication but relationships among people, thus posing an inherent challenge to the traditional standards of who we are as dental educators and what we can expect of each other. This article examines how the world of social media has changed dental education. Its goal is to outline the complex issues that social media use presents for academic dental institutions and to examine these issues from personal, professional, and legal perspectives. After providing an update on social media, the article considers the advantages and risks associated with the use of social media at the interpersonal, professional, and institutional levels. Policies and legal issues of which academic dental institutions need to be aware from a compliance perspective are examined, along with considerations and resources needed to develop effective social media policies. The challenge facing dental educators is how to capitalize on the benefits that social media offer, while minimizing risks and complying with the various forms of legal constraint

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Re-Identification Attacks – A Systematic Literature Review

    Get PDF
    The publication of increasing amounts of anonymised open source data has resulted in a worryingly rising number of successful re-identification attacks. This has a number of privacy and security implications both on an individual and corporate level. This paper uses a Systematic Literature Review to investigate the depth and extent of this problem as reported in peer reviewed literature. Using a detailed protocol ,seven research portals were explored, 10,873 database entries were searched, from which a subset of 220 papers were selected for further review. From this total, 55 papers were selected as being within scope and to be included in the final review. The main review findings are that 72.7% of all successful re-identification attacks have taken place since 2009. Most attacks use multiple datasets. The majority of them have taken place on global datasets such as social networking data, and have been conducted by US based researchers. Furthermore, the number of datasets can be used as an attribute. Because privacy breaches have security, policy and legal implications (e.g. data protection, Safe Harbor etc.), the work highlights the need for new and improved anonymisation techniques or indeed, a fresh approach to open source publishing

    How healthy is South Africa's tnedical schemes industry?

    Get PDF
    An analysis of the membership demographics, the financial health and especially the sustainability of the South African medical schemes industry is presented. From the financial and in particular the actuarial analyses it is obvious that the current system is unsustainable, and if a private health care sector is to survive at all it will have to contain costs far more effectively than it has in the past. It is suggested that medical schemes (and other mechanisms of funding health care) review their funding policies and move towards advance funding of pensioner benefits, and also that the schemes be actuarially valued on a regular basis

    Cyberstalking: the role of sex in perpetrator behaviour and victim impact

    Get PDF
    A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirements for the degree of Master of Science by ResearchResearch has previously found a higher than expected percentage of male victims in cases of cyberstalking. Furthermore, it has been shown that female cyberstalking victims primarily fear physical harm and male victims primarily fear loss of reputation. This study considers why these differences exist with particular focus on the online behaviour of men and women. Using two questionnaires this study examines the behaviour of Internet users and the experiences of cyberstalking victims in order to consider whether there is a relationship between the way men and women use technology and the fears they experience if cyberstalked. It was found that men and women spend equal amounts of time online and that men do not place any more emphasis on their online professional presence than women. However, differences were found between the sexes in regards to some online anti-social behaviours and these findings did relate to the differing behaviours of male and female cyberstalking perpetrators. This study concludes that the differences between primary fears in cyberstalking victims are influenced by the online behaviour of the perpetrator and how individuals use the Internet. However these factors cannot be attributed as the sole reason for differences in cyberstalking fears in men and women

    Government Process Re-engineering for the Empowerment of the Women Victimized by Gender Biased Atrocities

    Get PDF
    Uttar Pradesh (UP) is the most populous state of India and 17% of the total population of the country resides in the state. As per Census India 2011, the female population is about 50% while the status of women empowerment is not up to the mark. The women empowerment is necessary for the transformational and affirmative impact on the society. There are various barriers to women empowerment- poverty, low education levels, unemployment, patriarchal attitude and gender based atrocity against women. Atrocity against the women is one of the major barriers for their physical, mental, social and economical growth. For empowering women against the atrocities, Government of Uttar Pradesh (GoUP) has implemented an innovative Government Process Re-engineering approach by integrating Department of Health, Women Welfare and Police through Rani Laxmi Bai Mahila Samman Kosh Portal which is a common online portal for all the stakeholders with end-to-end solutions. This paper draws the light on heinous crimes against the women in the society. We also focus to explore the immediate assistance provided by Government of Uttar Pradesh (GoUP) in the form of monetary and medical relief including reconstructive surgeries to women who are victims of heinous crimes, as well as educational assistance to the victims and their minor children using Government Process Re-engineering tool- Rani Laxmi Bai Mahila Samman Kosh Portal
    • …
    corecore