226 research outputs found

    A New Model for Understanding Users’ IS Security Compliance

    Get PDF
    The literature agrees that the major threat to IS security is constituted by careless employees. Therefore, effective IS security requires that users are not only aware of, but also comply with organizations’ IS security policies and procedures. To address this important concern, different IS security awareness, education and enforcement approaches have been proposed. Prior research on IS security compliance has criticized these extant IS security awareness approaches as lacking theoretically and empirically grounded principles to ensure that employees comply with IS security policies. This research-in-progress study proposes a new model that contains the factors that explain employees’ IS security compliance

    Children's health and parental socioeconomic factors: a population-based survey in Finland

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Socioeconomic inequalities in health are a global problem, not only among the adult population but also among children. However, studies concerning young children especially are rare. The aim of this study was to describe the health of Finnish children under 12 years of age, and the socioeconomic factors associated with health. The socioeconomic factors were parental education level, household net income, and working status.</p> <p>Methods</p> <p>A population-based survey among Finnish children aged under 12 years (n = 6,000) was conducted in spring 2007. A questionnaire was sent to parents, and a response rate of 67% was achieved. Each child's health was explored by asking a parent to report the child's health status on a 5-point Likert scale, current symptoms from a symptoms list, and current disease(s) diagnosed by a physician. The final three outcome measures were poor health, the prevalences of psychosomatic symptoms, and long-term diseases. Data were analysed using Pearson's Chi-Square tests, and logistic regression analysis with 95% confidence intervals (CIs). P-values ≀0.05 were considered as statistically significant.</p> <p>Results</p> <p>In total, 3% of parents reported that their child's health status was poor. The prevalences of psychosomatic symptoms and long-term diseases were both 11%. The probability for poor health status was lowest among children aged 3-6 and 7-11 years, and for psychosomatic symptoms among 3-6-year-old children, whereas the odds ratios for long-term diseases was highest among children aged 7-11 years. Parental socioeconomic factors were not associated with the children's health.</p> <p>Conclusions</p> <p>Most of the children were reported by their parent to have good health status, and approximately one tenth had experienced some psychosomatic symptoms or long-term diseases. Our study suggests that parental socioeconomic factors are not associated with the health of children aged under 12 years in Finland.</p

    Toxoplasma gondii seroprevalence in veterinarians in Finland : Older age, living in the countryside, tasting beef during cooking and not doing small animal practice associated with seropositivity

    Get PDF
    Practising veterinary medicine has an inherent risk of exposure to zoonotic agents, including the protozoan parasite Toxoplasma gondii. We screened sera of veterinarians authorized to work in Finland for the presence of specific immunoglobulin G antibodies against T. gondii with an enzyme-linked fluorescent assay, and evaluated potential risk factors for T. gondii seropositivity from extensive questionnaire data with almost 1,300 quantitative variables. We used a causal diagram approach to address the complexity of the life cycle of the parasite and its numerous possible transmission routes, and built a multivariable binomial logistic regression model to identify risk factors that are particularly relevant for veterinarians. The samples and questionnaire data were collected in 2009. Altogether, 294 veterinarians, almost 15% of the Finnish veterinary profession, were included in the study. The median age was 39 years, and the majority, 86%, were women. Altogether, 43 (14.6%; 95% confidence interval: 10.9-19.0) of the 294 veterinarians tested seropositive for T. gondii. According to the final model, veterinarians who were at least 40 years old had 2.4 times higher odds to be seropositive than younger veterinarians; veterinarians who lived in the countryside had 4.0 times higher odds to be seropositive than veterinarians who lived in towns; female veterinarians who tasted beef during cooking had 2.6 times higher odds to be seropositive than male veterinarians who did not taste beef during cooking; and veterinarians who did not do small animal practice had 2.3 times higher odds to be seropositive than those who did. The results illustrate the numerous transmission routes of T. gondii.Peer reviewe

    Improving the Information Security Model by using TFI

    Get PDF
    In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.Monograph's chapter

    Towards a taxonomy of process quality characteristics for assessment

    Get PDF
    Previous assessment of process quality have focused on process capability (i.e. the ability of a process to meet its stated goals). This paper proposes a taxonomy of alternative process quality characteristics based on intrinsic and extrinsic quality attributes. The ultimate goal of this taxonomy is to provide a framework to conduct process assessments using different process quality aspects. Such a framework would considerably broaden process quality perspectives beyond the primary measure of process capability. It would also allow practitioners to identify and evaluate relevant quality characteristics for processes based on specific contexts and implications. For the process assessment model developers, it offers a list of process quality characteristics that could be used to develop relevant process measurement frameworks

    “<i>I do it because they do it</i>”:social-neutralisation in information security practices of Saudi medical interns

    Get PDF
    Successful implementation of information security policies (ISP) and IT controls play an important role in safeguarding patient privacy in healthcare organizations. Our study investigates the factors that lead to healthcare practitioners' neutralisation of ISPs, leading to non-compliance. The study adopted a qualitative approach and conducted a series of semi-structured interviews with medical interns and hospital IT department managers and staff in an academic hospital in Saudi Arabia. The study's findings revealed that the MIs imitate their peers' actions and employ similar justifications when violating ISP dictates. Moreover, MI team superiors' (seniors) ISP non-compliance influence MIs tendency to invoke neutralisation techniques. We found that the trust between the medical team members is an essential social facilitator that motivates MIs to invoke neutralisation techniques to justify violating ISP policies and controls. These findings add new insights that help us to understand the relationship between the social context and neutralisation theory in triggering ISP non-compliance

    Morphological Transformations in the Magnetite Biomineralizing Protein Mms6 in Iron Solutions: A Small-Angle X-ray Scattering Study

    Get PDF
    Magnetotactic bacteria that produce magnetic nanocrystals of uniform size and well-defined morphologies have inspired the use of biomineralization protein Mms6 to promote formation of uniform magnetic nanocrystals in vitro. Small angle X-ray scattering (SAXS) studies in physiological solutions reveal that Mms6 forms compact globular three-dimensional (3D) micelles (approximately 10 nm in diameter) that are, to a large extent, independent of concentration. In the presence of iron ions in the solutions, the general micellar morphology is preserved, however, with associations among micelles that are induced by iron ions. Compared with Mms6, the m2Mms6 mutant (with the sequence of hydroxyl/carboxyl containing residues in the C-terminal domain shuffled) exhibits subtle morphological changes in the presence of iron ions in solutions. The analysis of the SAXS data is consistent with a hierarchical core–corona micellar structure similar to that found in amphiphilic polymers. The addition of ferric and ferrous iron ions to the protein solution induces morphological changes in the micellar structure by transforming the 3D micelles into objects of reduced dimensionality of 2, with fractal-like characteristics (including Gaussian-chain-like) or, alternatively, platelet-like structures
    • 

    corecore