1,913 research outputs found

    TB STIGMA – MEASUREMENT GUIDANCE

    Get PDF
    TB is the most deadly infectious disease in the world, and stigma continues to play a significant role in worsening the epidemic. Stigma and discrimination not only stop people from seeking care but also make it more difficult for those on treatment to continue, both of which make the disease more difficult to treat in the long-term and mean those infected are more likely to transmit the disease to those around them. TB Stigma – Measurement Guidance is a manual to help generate enough information about stigma issues to design and monitor and evaluate efforts to reduce TB stigma. It can help in planning TB stigma baseline measurements and monitoring trends to capture the outcomes of TB stigma reduction efforts. This manual is designed for health workers, professional or management staff, people who advocate for those with TB, and all who need to understand and respond to TB stigma

    Information Outlook, September 2000

    Get PDF
    Volume 4, Issue 9https://scholarworks.sjsu.edu/sla_io_2000/1008/thumbnail.jp

    Beating Randomized Response on Incoherent Matrices

    Full text link
    Computing accurate low rank approximations of large matrices is a fundamental data mining task. In many applications however the matrix contains sensitive information about individuals. In such case we would like to release a low rank approximation that satisfies a strong privacy guarantee such as differential privacy. Unfortunately, to date the best known algorithm for this task that satisfies differential privacy is based on naive input perturbation or randomized response: Each entry of the matrix is perturbed independently by a sufficiently large random noise variable, a low rank approximation is then computed on the resulting matrix. We give (the first) significant improvements in accuracy over randomized response under the natural and necessary assumption that the matrix has low coherence. Our algorithm is also very efficient and finds a constant rank approximation of an m x n matrix in time O(mn). Note that even generating the noise matrix required for randomized response already requires time O(mn)

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    Privacy Versus the First Amendment: A Skeptical Approach

    Get PDF

    Revisiting network neutrality

    Get PDF
    The paper discusses the topical subject of network neutrality, from a US and European legal perspective. The article will begin by first defining network neutrality before addressing the underpinning technology and will then compare the legal approaches adopted by Europe and the US. In Europe, there is an existing electronic communications regulatory framework which can be used to address the network neutrality problem rendering any further legislation unnecessary and perhaps, detrimental to the current framework. In the US, however, the main concern arising is a potential for a 'fragmented' internet, which leads to our conclusion that network neutrality legislation is necessary on multiple levels. The article will conclude that the US' stance on network neutrality legislation will cause a seismic shift in the way we view technology and the way that networks are accessed and utilised

    Being a Young Carer in Rural England: summary report

    Get PDF

    Vulnerability: Too Vague and Too Broad?

    Get PDF
    © 2009 Cambridge University Press. Online edition of the journal is available at http://journals.cambridge.org/action/displayJournal?jid=CQHImagine you are walking down a city street. It is windy and raining. Amidst the bustle you see a young woman. She sits under a railway bridge, hardly protected from the rain and holds a woolen hat containing a small number of coins. You can see that she trembles from the cold. Or imagine seeing an old woman walking in the street at dusk, clutching her bag with one hand and a walking stick with the other. A group of male youths walk behind her without overtaking, drunk and in the mood for mischief. It doesn't need an academic to say what vulnerability is. We can all see it, much more often than we care to
    • 

    corecore