4,287 research outputs found

    Smarter Programming of the Female Condom: Increasing Its Impact on HIV Prevention in the Developing World

    Get PDF
    The purpose of this study was to investigate the relative value of the female condom for HIV prevention within heterosexual relationships in the developing world. In the last ten years, the world has witnessed both historic financial commitments to HIV/AIDS and new prevention options, including biomedical prevention research, male circumcision, and a dramatic scale-up of voluntary counseling and testing. At the same time, where HIV remains at epidemic levels in many countries, there has been a growing commitment to treatment access alongside prevention programs. However, portions of populations, particularly youth and women, remain highly vulnerable to HIV infection. Accordingly, the global health community can benefit from a better understanding of how existing prevention options should be effectively and efficiently delivered to reduce HIV in the developing world. This report provides guidance for the global health community for considering how the female condom fits within the set of prevention interventions currently available

    Choosing IT Platforms In The Age Of Stuxnet

    Get PDF
    This paper addresses the question of choosing/investing in IT (hardware/software) platforms that avoid quick obsolescence and the underlying dilemmas of choosing proprietary software versus open source software, and opting for managed services such as public cloud computing versus in-house hardware/communication infrastructures.  These dilemmas in strategic information systems planning have become more significant in light of the recent revelations of security backdoors in commercial software, encryption backdoors in communication software, and governmental access to private data on managed services for national security reasons.  This paper considers enterprise-wide challenges and strategies for adopting open source software/hardware in response to these security concerns

    Contamination Control in Healthcare Systems

    Get PDF
    Contaminants have proven to be a major threat to the health and safety of both patients and professionals in the healthcare system. Emergency Triage Units have developed standards to control harmful contaminants, yet millions of people contract healthcare associated infections every year. The result of these infections generates multi-billion dollar costs for hospitals each year. The purpose of this project is to research and analyze current healthcare standards, common sources of contamination, and methods of cleaning and disease prevention in order to find any shortcomings or faults that increase the risk of infection. The results from this research could prove to be vital in reducing the risk of nosocomial infections

    Risk management for universities in the age of cybercrime

    Get PDF
    Abstract. In a time where there is an increase in online traffic, and needing to have an online presence, education in the risks associated in going on the internet is more important than ever. This study aims to help educate potential companies and individuals to design and implement an effective risk management plan in order to minimize risks when dealing with the uncertainties of the internet. The research problem that this thesis hopes to solve, is how many industries, especially how universities can prepare themselves for potential cyberattacks, as they may have outdated security that does not offer enough protection. Now, most universities are unprepared, and this can potentially be a massive problem when it comes to possible data breaches. Security for universities is the focus of this study, to try and spread awareness and encourage universities to implement a successful plan by looking at both good and bad examples. This study utilizes a variety of research methods, surveys were conducted to gain a widespread insight into how secure people were online, as well as more in-depth interviews were held. The target groups were preferably students, and people around the ages of 18–30. The outcome of this study shows that not all universities are equally prepared when it comes to potential attacks, but with implementing security requirements, this would help provide guidelines and ensure that every industry is protected. When it comes to the university sector, students gave answers that proved they were aware of how to stay safe online, and not fall for scams

    Top 10 technologies 2003 and their impact on the accounting profession

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1609/thumbnail.jp

    Assessment of users\u27 information security behavior in smartphone networks

    Get PDF
    With the exponential growth of smartphone usage, providing information security has become one of the main challenges that researchers and information-security specialists must consider. In contrast to traditional mobile phones that only enable people to talk and text, smartphone networks give users a variety of convenient functions such as connection to the Internet, online shopping, e-mail and social media, data storage, global positioning systems, and many other applications. Providing security in smartphone networks is critical for the overall information security of individuals and businesses. Smartphone networks could become vulnerable to security breaches if users do not practice safe behaviors such as selecting strong passwords, encrypting their stored data, downloading applications only from authorized websites, not opening emails from unknown sources, and updating authorized security patches. Users of smartphone devices play an important role in providing information security in smartphone networks, which affects the information security of private and public networks. This study assessed the factors that affect users’ security behavior on smartphone networks. By reviewing the theoretical frameworks that evaluate human behavior, this study formed a research model. The research model identified attitude, intention, computing experience, breaching experience, and facilitation condition as the main and direct factors that influence information security behavior in smartphone networks. This study performed several analyses on the investigator-developed survey questionnaire to ensure validity and reliability. Examining all of the proposed direct constructs, this study found that users’ facilitation condition does not have significant impact on the information security behavior in smartphones. This research also showed that gender and employment status have moderating effects on several hypothesized paths. The findings of this research could help information security developers to design better systems that could provide stronger information security for individuals and businesses that share their networks with users’ smartphones

    Campus Communications Systems: Converging Technologies

    Get PDF
    This book is a rewrite of Campus Telecommunications Systems: Managing Change, a book that was written by ACUTA in 1995. In the past decade, our industry has experienced a thousand-fold increase in data rates as we migrated from 10 megabit links (10 million bits per second) to 10 gigabit links (10 billion bits per second), we have seen the National Telecommunications Policy completely revamped; we have seen the combination of voice, data, and video onto one network; and we have seen many of our service providers merge into larger corporations able to offer more diverse services. When this book was last written, A CUT A meant telecommunications, convergence was a mathematical term, triple play was a baseball term, and terms such as iPod, DoS, and QoS did not exist. This book is designed to be a communications primer to be used by new entrants into the field of communications in higher education and by veteran communications professionals who want additional information in areas other than their field of expertise. There are reference books and text books available on every topic discussed in this book if a more in-depth explanation is desired. Individual chapters were authored by communications professionals from various member campuses. This allowed the authors to share their years of experience (more years than many of us would care to admit to) with the community at large. Foreword Walt Magnussen, Ph.D. Preface Ron Kovac, Ph.D. 1 The Technology Landscape: Historical Overview . Walt Magnussen, Ph.D. 2 Emerging Trends and Technologies . Joanne Kossuth 3 Network Security . Beth Chancellor 4 Security and Disaster Planning and Management Marjorie Windelberg, Ph.D. 5 Student Services in a University Setting . Walt Magnussen, Ph.D. 6 Administrative Services David E. O\u27Neill 7 The Business Side of Information Technology George Denbow 8 The Role of Consultants . David C. Metz Glossary Michelle Narcavag
    • …
    corecore