Auswahl der wissenschaftlichen Literatur zum Thema „Heath security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Heath security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Heath security"
Alam, Uzma, Juliet Nabyonga-Orem, Abdulaziz Mohammed, Deborah R. Malac, John N. Nkengasong und Matshidiso R. Moeti. „Redesigning health systems for global heath security“. Lancet Global Health 9, Nr. 4 (April 2021): e393-e394. http://dx.doi.org/10.1016/s2214-109x(20)30545-3.
Der volle Inhalt der QuelleRamji-Nogales, Jaya. „Race in Security“. AJIL Unbound 116 (2022): 242–47. http://dx.doi.org/10.1017/aju.2022.38.
Der volle Inhalt der QuelleChandrakar, Preeti. „A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks“. International Journal of Ambient Computing and Intelligence 10, Nr. 1 (Januar 2019): 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.
Der volle Inhalt der QuelleRodiles, Alejandro. „Making Sense of Violent Extremism“. AJIL Unbound 116 (2022): 230–35. http://dx.doi.org/10.1017/aju.2022.41.
Der volle Inhalt der QuelleMartin, Craig. „Climate Change and Global Security: Framing an Existential Threat“. AJIL Unbound 116 (2022): 248–53. http://dx.doi.org/10.1017/aju.2022.39.
Der volle Inhalt der QuelleMuka, Romina, Sule Yildrim-Yayilgan und Kozeta Sevrani. „Security Analysis of Wireless BAN in e-Health“. Spring 2017 5, Nr. 2 (01.05.2017): 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.
Der volle Inhalt der QuelleGautam, Pratiksha, Mohd Dilshad Ansari und Surender Kumar Sharma. „Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing“. International Journal of Information Security and Privacy 13, Nr. 1 (Januar 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Der volle Inhalt der QuelleNandan Sharma. „Indian Healthcare Segment: A Challenge to Human Security in 21st Century“. Legal Research Development: An International Refereed e-Journal 2, Nr. I (30.09.2017): 63–70. http://dx.doi.org/10.53724/lrd/v2n1.06.
Der volle Inhalt der QuelleSrivastava, Mahendra P. „Plant Clinic Towards Plant Health and Food Security“. International Journal of Phytopathology 2, Nr. 3 (30.12.2013): 193–203. http://dx.doi.org/10.33687/phytopath.002.03.0327.
Der volle Inhalt der QuelleHeath, J. Benton, Ina Popova, Justin Jacinto, Samaa Haridi, Tafadzwa Pasipanodya und Sabina Sacco. „Litigating Health and Security Exceptions in Investment Treaties: A Simulation“. Proceedings of the ASIL Annual Meeting 115 (2021): 151–54. http://dx.doi.org/10.1017/amp.2021.138.
Der volle Inhalt der QuelleDissertationen zum Thema "Heath security"
Daza, Aramayo Lourdes Gabriela. „Sociální zabezpečení v některých státech Latinské ameriky“. Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4472.
Der volle Inhalt der QuelleMinarcine, Scott. „Health Security Intelligence : Assessing the Nascent Public Health Capability“. Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6836.
Der volle Inhalt der QuelleThis thesis explores the current state of public healths (HS) intelligence capability across State, Local, Tribal and Territorial (SLTT) jurisdictions through qualitative analysis of current public health jurisdiction plans for the collection, analysis, product creation, dissemination and programmatic oversight related to public health inputs into the homeland security intelligence apparatus. An assessment was conducted using an online Plan Assessment Tool, or PLAT, that allowed jurisdictional public health leadership to provide de-identified responses. This assessment of 25 of the 62 federally funded SLTT public health preparedness programs indicates one impediment to the continued maturation of this new intelligence capability is the lack of codified plans. The results also suggest that while public health programs at the SLTT level do indeed have much room for improvement, there is a burgeoning intelligence capability within public health. However, to sustain and improve this emergent capability will require a national effort to create mission focus and centralized guidance.
Singh, Kalvinder. „Security for Mobile Health Care Systems“. Thesis, Griffith University, 2013. http://hdl.handle.net/10072/367683.
Der volle Inhalt der QuelleThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Fryer, Huw. „The public health analogy in Web security“. Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/412399/.
Der volle Inhalt der QuelleIwaya, Leonardo Horn. „A security framework for mobile health data collection“. Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-23122014-143956/.
Der volle Inhalt der QuelleSaúde Móvel (mHealth) pode ser definida como a prática médica e a saúde pública suportadas por tecnologias de computação móvel, como: telefones celulares, PDAs, tablets, sensores e outros dispositivos sem fio. Particularmente no caso dos celulares, há um aumento expressivo no número de linhas, aparelhos, e na infraestrutura de rede em países de média e baixa renda (Low- Middle- Income Countries, LMIC), permitindo a adoção de sistemas mHealth de maneira eficiente. Existem, hoje, vários casos de sistemas de coleta de dados voltadas à atenção primária, vigilância (em saúde) e pesquisas epidemiológicas adotados nesses países. Tais sistemas fornecem aos gestores de saúde uma informação de melhor qualidade em menor tempo, que por sua vez melhoram a capacidade de planejamento e resposta a emergências. Contudo, nota-se um relaxamento no cumprimento de requisitos de segurança nestes sistemas. Com base nisso, foi feito um levantamento de aplicações e iniciativas de pesquisa em mHealth no Brasil, no qual se constatou que um número razoável de trabalhos mencionam fracamente (13%) ou não menciona (40%) os requisitos de segurança. Este levantamento também discute sobre o estado atual das pesquisas de mHealth no Brasil, os principais tipos de aplicações, os grupos de usuários, os dispositivos utilizados e as barreiras de pesquisa identificadas. Em seguida, este trabalho apresenta o SecourHealth, um framework de segurança voltado ao desenvolvimento de aplicações de mhealth para coleta de dados. O SecourHealth foi projetado com base em seis requisitos principais de segurança: suportar o registro e a autenticação do usuário; tratar a desconexão e os atrasos na rede; prover o armazenamento seguro de dados prevendo possibilidades de furto ou perda dos aparelhos; fazer transmissão segura de dados entre o aparelho e o servidor; permitir o compartilhamento de dispositivos entre os usuários (e.g., agentes de saúde); e considerar opções de compromisso entre segurança, desempenho e usabilidade. O trabalho também descreve com detalhes as etapas de modelagem e desenvolvimento do framework - que foi integrado a uma aplicação para a plataforma Android. Finalmente, é feita uma análise do desempenho dos algoritmos criptográficos implementados, considerando o overhead pelo simples uso do protocolo HTTPS.
Toms, Anders. „Information Security when Integrating Actors in Health Care Processes“. Thesis, University of Skövde, Department of Computer Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-825.
Der volle Inhalt der QuelleThere is a growing interest within organisations today to focus on the core processes, i.e. the processes that create value for the intended customer, in order to stay compatible within the ever-fiercer competition. To have full control of the key processes may be a great step forward towards a more lean and effective organisation, not only for profit seeking companies but also for public welfare institutions like health care. Software aimed at supporting a process focus is continuously being developed and one such family of programs is commonly referred to as process managers.
A process manager lets the people in an organisation who have complete knowledge of the processes model these without requiring them to have expert knowledge of computers and programming. Once a process has been defined graphically according to a predefined modelling language, it can be deployed and monitored. The process manager software takes care of the routing of messages between actors, both human as well as non-human (e.g. other applications), and it drives the individual errand forward according to how the process flow has been defined in the model. However, applying a process manager approach in health care processes requires a certain amount of caution. Messages sent between actors in health care organisations are often of a delicate nature since they may contain sensitive information, such as illness, mental state, family situation and similar, that is related to an identifiable individual. There are also other aspects of security that need to be addressed besides the confidentiality aspect. For example, it must be guaranteed that the information is correct and not altered during transfer, the information must be available when needed and it should be possible to trace a message to its sender, among other things.
This work identifies a set of security requirements from the literature that need to be fulfilled in health care organisations when applying a process manager approach. With these requirements as a basis, a process manager system is evaluated with regards to security and the conclusion is that future versions need improvement on some points. Future work is also suggested that could help to explore the area further.
Thomson, Steven Michael. „A standards-based security model for health information systems“. Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.
Der volle Inhalt der QuelleRaedeke, Maurine A. „Food security, nutrition and health of food pantry participants“. Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4839.
Der volle Inhalt der QuelleThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on October 9, 2007) Vita. Includes bibliographical references.
Coghlan, Christopher. „Towards food security with nutritional health : multi-scale approaches“. Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:faec7323-edbd-440b-9a60-01cc84532b68.
Der volle Inhalt der QuelleAlawaji, Ahmed S. „Privacy and security risks for national health records systems“. Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118558.
Der volle Inhalt der QuellePage 104 blank. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 101-103).
A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security considerations. The aims of this study were to explore how governments can design secure national health records systems. To do that systematically, we developed a framework to analyze NEHR systems. We then applied the framework to investigate the privacy and security risks in these systems. The studied systems demonstrate that getting privacy and security right have a considerable impact on the success of NEHR projects. Also, our study reveals that the healthcare system structure has a substantial impact on the adoption and usage rates of the system. The studied cases uncover many opportunities for improving privacy and security measures in future projects. The framework demonstrates the utility of applying it to the three cases.
by Ahmed S. Alawaji.
S.M. in Engineering and Management
Bücher zum Thema "Heath security"
United States. Government Accountablity Office. Mail security: Incidents at DOD mail facilities exposed problems that require further actions : report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2006.
Den vollen Inhalt der Quelle findenFund, United Nations Population, Hrsg. Reproductive health essentials: Securing the supply : global strategy for reproductive health commodity security. New York: United Nations Population Fund, 2002.
Den vollen Inhalt der Quelle findenGoodman, Michael S., James M. Wilson und Filippa Lentzos. Health Security Intelligence. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003245483.
Der volle Inhalt der QuelleMasys, Anthony J., Ricardo Izurieta und Miguel Reina Ortiz, Hrsg. Global Health Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-23491-1.
Der volle Inhalt der QuelleKamradt-Scott, Adam. Managing Global Health Security. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137520166.
Der volle Inhalt der QuelleCanada. Citizenship and Immigration Canada., Hrsg. Health and income security. [Ottawa]: Citizenship and Immigration Canada, 1998.
Den vollen Inhalt der Quelle findenMyriam, Dunn Cavelty, und Kristensen Kristian Søby, Hrsg. Securing 'the homeland': Critical infrastructure, risk and (in)security. London: Routledge, 2008.
Den vollen Inhalt der Quelle findenUnited States. Executive Office of the President., Hrsg. Health security: The President's health care plan. [Washington, D.C.?: Executive Office of the President, 1993.
Den vollen Inhalt der Quelle findenKalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi: International Planned Parenthood Federation, 2008.
Den vollen Inhalt der Quelle findenKalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi: International Planned Parenthood Federation, 2008.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Heath security"
Riad, A. B. M. Kamrul Islam, Hossain Shahriar, Chi Zhang und Farhat Lamia Barsha. „Heath Device Security and Privacy“. In Data Protection and Privacy in Healthcare, 91–108. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848-6.
Der volle Inhalt der QuelleDavidson, Ruth. „Social Security Policy“. In Policies and Politics Under Prime Minister Edward Heath, 141–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53673-2_7.
Der volle Inhalt der QuelleLevine, Marissa J. „Health Security“. In Handbook of Security Science, 1–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-51761-2_25-1.
Der volle Inhalt der QuelleMarton, Péter. „Health Security“. In The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_539-1.
Der volle Inhalt der QuelleMarton, Péter. „Health Security“. In The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-74336-3_539-2.
Der volle Inhalt der QuelleRushton, Simon. „Health Security“. In An Introduction to Non-Traditional Security Studies: A Transnational Approach, 174–92. 1 Oliver’s Yard, 55 City Road London EC1Y 1SP: SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n10.
Der volle Inhalt der QuelleLevine, Marissa J. „Health Security“. In Handbook of Security Science, 635–59. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_25.
Der volle Inhalt der QuelleReveron, Derek S., und Kathleen A. Mahoney-Norris. „Health Security“. In Human and National Security, 163–80. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-8.
Der volle Inhalt der QuellePorcelain, Sherri L. „Health Security“. In Public Health and Beyond in Latin America and the Caribbean, 153–85. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003007401-7.
Der volle Inhalt der QuelleMarton, Péter. „Health Security“. In The Palgrave Encyclopedia of Global Security Studies, 697–704. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_539.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Heath security"
Nagy, Robertbela, und Florin Popentiu vladicescu. „EXPLORING THE POTENTIAL OF INTERNET OF THINGS SYSTEMS IN HEATH CARE CONTEXT“. In eLSE 2018. Carol I National Defence University Publishing House, 2018. http://dx.doi.org/10.12753/2066-026x-18-210.
Der volle Inhalt der QuelleBashar, Md Khayrul. „Event-Driven Time Series Analysis and the Comparison of Public Reactions on Covid-19“. In 9th International Conference of Security, Privacy and Trust Management (SPTM 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110507.
Der volle Inhalt der QuelleKUSTRON, KAMILA. „A NEW METHOD IN CONCEPTUAL DESIGN OF THE SHM AIRFRAME USING ROUGH SETS“. In Structural Health Monitoring 2021. Destech Publications, Inc., 2022. http://dx.doi.org/10.12783/shm2021/36354.
Der volle Inhalt der QuelleMancini, F., K. A. Mughal, S. H. Gejibo und J. Klungsoyr. „Adding security to mobile data collection“. In 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services (Healthcom 2011). IEEE, 2011. http://dx.doi.org/10.1109/health.2011.6026793.
Der volle Inhalt der QuelleYu, Weider D., und Vijayalakshmi Jothiram. „Security in Wireless Mobile Technology for Healthcare Systems“. In 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381659.
Der volle Inhalt der QuelleVieira, Marcos Alves, Gislainy Crisostomo Velasco und Sergio T. Carvalho. „A Decentralized Health Data Repository for Remote Patient Monitoring Using Blockchain and FHIR“. In Workshop em Blockchain: Teoria, Tecnologias e Aplicações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/wblockchain.2023.723.
Der volle Inhalt der QuelleShen, Tsu-Wang. „A u-Health Security Structure by Using 2D Barcodes“. In 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381661.
Der volle Inhalt der QuelleFragopoulos, A. G., J. Gialelis und D. Serpanos. „Imposing holistic privacy and data security on person centric ehealth monitoring infrastructures“. In 2010 12th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom 2010). IEEE, 2010. http://dx.doi.org/10.1109/health.2010.5556580.
Der volle Inhalt der QuelleDharsni, Thanga, Hanifa Zakir, Pradeep Naik, Mallikarjuna und Raghu. „Soldier Security and Health Monitoring“. In 2018 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C). IEEE, 2018. http://dx.doi.org/10.1109/icdi3c.2018.00016.
Der volle Inhalt der QuelleSamy, Ganthan Narayana, Rabiah Ahmad und Zuraini Ismail. „Threats to Health Information Security“. In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.312.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Heath security"
Vu, Jonathan, Benjamin Kaplan, Shomesh Chaudhuri, Monique Mansoura und Andrew Lo. Financing Vaccines for Global Health Security. Cambridge, MA: National Bureau of Economic Research, Mai 2020. http://dx.doi.org/10.3386/w27212.
Der volle Inhalt der QuelleUecker, Norma J., und Michael J. Schwartz. Office of Health, Safety and Security, Office of Security Policy FY 2013 Accomplishments. Office of Scientific and Technical Information (OSTI), Oktober 2013. http://dx.doi.org/10.2172/1105101.
Der volle Inhalt der QuelleWolmuth-Gordon, Hannah, und Natasha Mutebi. Public health and climate change: a One Health approach. Parliamentary Office of Science and Technology, UK Parliament, Juli 2023. http://dx.doi.org/10.58248/pn701.
Der volle Inhalt der QuelleFalzarano, A. Annotated Bibliography - Economic Sanctions: Implications for Health Security. Office of Scientific and Technical Information (OSTI), Dezember 2019. http://dx.doi.org/10.2172/1635787.
Der volle Inhalt der QuelleSung, Jane, und Olivia Dean. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, Dezember 2020. http://dx.doi.org/10.26419/ppi.00114.001.
Der volle Inhalt der QuelleSung, Jane, Olivia Dean, Robert C. Saunders, Asha Saavoss und Lane Koenig. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, Dezember 2020. http://dx.doi.org/10.26419/ppi.00099.003.
Der volle Inhalt der QuelleBohorquez, Camilo. Subsidized Health Care and Food Security: Evidence from Colombia. Banco de la República de Colombia, Februar 2020. http://dx.doi.org/10.32468/be.1103.
Der volle Inhalt der QuelleScholl, Matthew, Kevin Stine, Kenneth Lin und Daniel Steinberg. Security architecture design process for health information exchanges (HIEs). Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7497.
Der volle Inhalt der QuelleOsewe, Patrick L. Health Security Interventions for COVID-19 Response: Guidance Note. Asian Development Bank, September 2022. http://dx.doi.org/10.22617/spr220224.
Der volle Inhalt der QuelleLamas, Jorge, Laura Bocalandro, Tara Lisa Persaud, Alejandro Cruz Fano und Rafael Villa. South-South Cooperation and Capacity Development in Action: Regional Public Entrepreneurship in Latin America and the Caribbean. Inter-American Development Bank, März 2010. http://dx.doi.org/10.18235/0008843.
Der volle Inhalt der Quelle