2 research outputs found

    South-South Irregular Migration: The Impacts of China’s Informal Gold Rush in Ghana

    Get PDF
    This article examines irregular South‐South migration from China to Ghana, and the role it played in transforming livelihoods and broader developmental landscapes. It looks at the entry of approximately 50,000 Chinese migrants into the informal small‐scale gold mining sector from 2008‐2013. These migrants mainly hailed from Shanglin County in Guangxi Province. In Ghana, they formed mutually beneficial relationships with local miners, both legal and illegal, introducing machinery that substantially increased gold production. However, the legal status of Chinese miners was particularly problematic as, by law, small‐scale mining is restricted to Ghanaian citizens. In mid‐2013, President Mahama established a military task force against illegal mining, resulting in the deportation of many Chinese miners. The article examines the experiences of both Chinese migrants and Ghanaian miners. Findings are that irregular migration into an informal sector had long‐lasting impacts and played a significant role in the transformation of economic, political, and physical landscapes in Ghana

    A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud

    Get PDF
    In emergency care, fast and efficient treatment is vital. The availability of Electronic Medical Records (EMR) allows healthcare professionals to access a patient’s data promptly, which facilitates the decision-making process and saves time by not repeating medical procedures. Unfortunately, the complete EMR of a patient is often not available during an emergency situation to all treatment teams. Cloud services emerge as a promising solution to this problem by allowing ubiquitous access to information. However, EMR storage and sharing through clouds raise several concerns about security and privacy. To this end, we propose a protocol through which all treatment teams involved in the emergency care can securely decrypt relevant data from the patient’s EMR and add new information about the patient’s status. Furthermore, our protocol ensures that treatment teams will only access the patient’s EMR for the period during which the patient is under their care. Finally, we present a formal security analysis of our protocol and some initial experimental results.publishedVersionPeer reviewe
    corecore