4,287 research outputs found
Smarter Programming of the Female Condom: Increasing Its Impact on HIV Prevention in the Developing World
The purpose of this study was to investigate the relative value of the female condom for HIV prevention within heterosexual relationships in the developing world. In the last ten years, the world has witnessed both historic financial commitments to HIV/AIDS and new prevention options, including biomedical prevention research, male circumcision, and a dramatic scale-up of voluntary counseling and testing. At the same time, where HIV remains at epidemic levels in many countries, there has been a growing commitment to treatment access alongside prevention programs. However, portions of populations, particularly youth and women, remain highly vulnerable to HIV infection. Accordingly, the global health community can benefit from a better understanding of how existing prevention options should be effectively and efficiently delivered to reduce HIV in the developing world. This report provides guidance for the global health community for considering how the female condom fits within the set of prevention interventions currently available
Choosing IT Platforms In The Age Of Stuxnet
This paper addresses the question of choosing/investing in IT (hardware/software) platforms that avoid quick obsolescence and the underlying dilemmas of choosing proprietary software versus open source software, and opting for managed services such as public cloud computing versus in-house hardware/communication infrastructures. These dilemmas in strategic information systems planning have become more significant in light of the recent revelations of security backdoors in commercial software, encryption backdoors in communication software, and governmental access to private data on managed services for national security reasons. This paper considers enterprise-wide challenges and strategies for adopting open source software/hardware in response to these security concerns
Contamination Control in Healthcare Systems
Contaminants have proven to be a major threat to the health and safety of both patients and professionals in the healthcare system. Emergency Triage Units have developed standards to control harmful contaminants, yet millions of people contract healthcare associated infections every year. The result of these infections generates multi-billion dollar costs for hospitals each year. The purpose of this project is to research and analyze current healthcare standards, common sources of contamination, and methods of cleaning and disease prevention in order to find any shortcomings or faults that increase the risk of infection. The results from this research could prove to be vital in reducing the risk of nosocomial infections
Risk management for universities in the age of cybercrime
Abstract. In a time where there is an increase in online traffic, and needing to have an online presence, education in the risks associated in going on the internet is more important than ever. This study aims to help educate potential companies and individuals to design and implement an effective risk management plan in order to minimize risks when dealing with the uncertainties of the internet. The research problem that this thesis hopes to solve, is how many industries, especially how universities can prepare themselves for potential cyberattacks, as they may have outdated security that does not offer enough protection. Now, most universities are unprepared, and this can potentially be a massive problem when it comes to possible data breaches. Security for universities is the focus of this study, to try and spread awareness and encourage universities to implement a successful plan by looking at both good and bad examples. This study utilizes a variety of research methods, surveys were conducted to gain a widespread insight into how secure people were online, as well as more in-depth interviews were held. The target groups were preferably students, and people around the ages of 18–30. The outcome of this study shows that not all universities are equally prepared when it comes to potential attacks, but with implementing security requirements, this would help provide guidelines and ensure that every industry is protected. When it comes to the university sector, students gave answers that proved they were aware of how to stay safe online, and not fall for scams
Top 10 technologies 2003 and their impact on the accounting profession
https://egrove.olemiss.edu/aicpa_guides/1609/thumbnail.jp
Assessment of users\u27 information security behavior in smartphone networks
With the exponential growth of smartphone usage, providing information security has become one of the main challenges that researchers and information-security specialists must consider. In contrast to traditional mobile phones that only enable people to talk and text, smartphone networks give users a variety of convenient functions such as connection to the Internet, online shopping, e-mail and social media, data storage, global positioning systems, and many other applications. Providing security in smartphone networks is critical for the overall information security of individuals and businesses. Smartphone networks could become vulnerable to security breaches if users do not practice safe behaviors such as selecting strong passwords, encrypting their stored data, downloading applications only from authorized websites, not opening emails from unknown sources, and updating authorized security patches. Users of smartphone devices play an important role in providing information security in smartphone networks, which affects the information security of private and public networks.
This study assessed the factors that affect users’ security behavior on smartphone networks. By reviewing the theoretical frameworks that evaluate human behavior, this study formed a research model. The research model identified attitude, intention, computing experience, breaching experience, and facilitation condition as the main and direct factors that influence information security behavior in smartphone networks. This study performed several analyses on the investigator-developed survey questionnaire to ensure validity and reliability. Examining all of the proposed direct constructs, this study found that users’ facilitation condition does not have significant impact on the information security behavior in smartphones. This research also showed that gender and employment status have moderating effects on several hypothesized paths. The findings of this research could help information security developers to design better systems that could provide stronger information security for individuals and businesses that share their networks with users’ smartphones
Campus Communications Systems: Converging Technologies
This book is a rewrite of Campus Telecommunications Systems: Managing Change, a book that was written by ACUTA in 1995. In the past decade, our industry has experienced a thousand-fold increase in data rates as we migrated from 10 megabit links (10 million bits per second) to 10 gigabit links (10 billion bits per second), we have seen the National Telecommunications Policy completely revamped; we have seen the combination of voice, data, and video onto one network; and we have seen many of our service providers merge into larger corporations able to offer more diverse services. When this book was last written, A CUT A meant telecommunications, convergence was a mathematical term, triple play was a baseball term, and terms such as iPod, DoS, and QoS did not exist. This book is designed to be a communications primer to be used by new entrants into the field of communications in higher education and by veteran communications professionals who want additional information in areas other than their field of expertise. There are reference books and text books available on every topic discussed in this book if a more in-depth explanation is desired. Individual chapters were authored by communications professionals from various member campuses. This allowed the authors to share their years of experience (more years than many of us would care to admit to) with the community at large.
Foreword Walt Magnussen, Ph.D.
Preface Ron Kovac, Ph.D.
1 The Technology Landscape: Historical Overview . Walt Magnussen, Ph.D.
2 Emerging Trends and Technologies . Joanne Kossuth
3 Network Security . Beth Chancellor
4 Security and Disaster Planning and Management Marjorie Windelberg, Ph.D.
5 Student Services in a University Setting . Walt Magnussen, Ph.D.
6 Administrative Services David E. O\u27Neill
7 The Business Side of Information Technology George Denbow
8 The Role of Consultants . David C. Metz
Glossary Michelle Narcavag
Recommended from our members
A Means to Alleviate the Bushmeat Crisis? The Feasibility of Establishing Sustainable Grasscutter Farms in Kenya
In Africa, the unsustainable, illegal hunting of wild animals for food, commonly referred to as the bushmeat crisis, causes multiple problems for ecosystems and human health. Given the lack of management of bushmeat hunting and rapidly expanding human population densities, the potential for overharvesting, driving populations of native species to local extinction, is of major concern unless effective and feasible alternatives can be developed. The farming of desirable native species offers one solution to reducing the demand for bushmeat, but farms must be economically viable, environmentally sustainable, and socially acceptable. This research uses Geographic Information Systems to examine the feasibility of establishing large native rodent (Thyronomys swinderianus) farms in Kenya. Given their high protein content, these rodents, commonly known as grasscutters, are a highly sought bushmeat species and have been successfully farmed in West and Central Africa. I performed an extensive literature review and consulted with grasscutter and sustainable livestock farm experts located in sub-Saharan Africa to determine physical and socio-political geographic factors most likely to constrain the development of sustainable grasscutter farms in Kenya, before using ArcGIS to map these criteria and a weighted overlay analysis to identify potentially favorable locations for establishing future farms. These maps identified three suitable geographic locations: the Western and Nyanza provinces; the Central province; and the southeastern tip of the Coastal province. The majority of Kenya reflects moderately suitable locations that are feasible for establishment as grasscutters are adaptive, low-intensity livestock, and previous studies have identified some of these moderately suitable locations as accepted livestock centers. These results are encouraging for the implementation of sustainable grasscutter farming in Kenya and the diversification of protein sources and economic development opportunities for rural dwellers. While the maps created are specific to Kenya, the methodology developed in this study is useful to global stakeholders attempting to alleviate the bushmeat crisis, combat food insecurity in a sustainable manner, and/or provide means of economic development to developing countries
- …