Academic literature on the topic 'Heath security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Heath security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Heath security":

1

Alam, Uzma, Juliet Nabyonga-Orem, Abdulaziz Mohammed, Deborah R. Malac, John N. Nkengasong, and Matshidiso R. Moeti. "Redesigning health systems for global heath security." Lancet Global Health 9, no. 4 (April 2021): e393-e394. http://dx.doi.org/10.1016/s2214-109x(20)30545-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramji-Nogales, Jaya. "Race in Security." AJIL Unbound 116 (2022): 242–47. http://dx.doi.org/10.1017/aju.2022.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In “Making Sense of Security,” J. Benton Heath pushes the reader to tangle with two unresolved foundational questions about the use of security in international law: who decides questions of security, and on what grounds.1 This essay examines the role of race in both of those questions, identifying structures and mechanisms of racial subordination that must be surfaced to fully make sense of security.2 In particular, it foregrounds the tension between reformist reforms and abolitionist reforms to which Heath makes reference. By rendering visible the historical and contemporary work performed by white supremacy in security, this essay seeks to elucidate and problematize that dilemma. Rather than retaining the exclusionary security frame, a turn to solidarity offers the possibility of a more inclusive approach to international law that creates connection based on our shared humanity.
3

Chandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." International Journal of Ambient Computing and Intelligence 10, no. 1 (January 2019): 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.
4

Rodiles, Alejandro. "Making Sense of Violent Extremism." AJIL Unbound 116 (2022): 230–35. http://dx.doi.org/10.1017/aju.2022.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In “Making Sense of Security,” J. Benton Heath convincingly argues that the concept of security should be understood as a struggle for epistemic authority. Heath develops a comprehensive typology that helps to understand the processes through which people make sense of the term security, while it also helps identifying the legal and political practices involved. However, as he rightly observes, these approaches to security are “not stable equilibria but rather more like quantum states, in which each type contains the potential for the others.”1 Global counterterrorism law powerfully illustrates this evolution. In particular, the growing field of preventing and countering violent extremism (P/CVE) reveals a flow of security conceptions, including realist, widened, and discursive security. Applying Heath's typology to this field shows that evolving rationales have set in motion normative practices, which are difficult to trace from within a traditional international security law framework. In their relational modes, such practices aim at turning risks into opportunities, thus denoting that one's security is the other's perpetuation of insecurities. The recourse to resilience as a technique of counterterrorism governance that instrumentalizes shared and emerging social identities and practices in order to prevent extremism, contributes to the entrenchment of an ever-expanding security apparatus. But it is precisely by resorting to social life—unpredictable as it is—that resilience becomes a quantum state itself, which bears potential for disruption.
5

Martin, Craig. "Climate Change and Global Security: Framing an Existential Threat." AJIL Unbound 116 (2022): 248–53. http://dx.doi.org/10.1017/aju.2022.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Should the climate change crisis be framed in security terms? Many argue that it is dangerous to treat non-military threats as security issues. Such “securitization” is associated with the expansion of executive power and the exercise of exceptional measures involving the suspension of individual rights, secrecy, state violence, and a weakening of the rule of law. Nonetheless, climate change has already been identified as a security issue by many government agencies and international institutions.1 But, as J. Benton Heath explores in “Making Sense of Security,” the very concept of security is both ambiguous and contested.2 There are different and competing ideas about what it means, when, and by whom it should be invoked, the kinds of law and policy responses it should trigger, and, crucially, who gets to decide these questions. Heath argues that differing approaches to security reflect deeper struggles over whose knowledge matters in identifying and responding to security threats. He develops a typology for assessing these different approaches, and the implications they have for international law and institutions. But, while he notes that climate change is precisely one of those issues around which there are competing security claims, he leaves to others the question of whether, or how, to frame climate change in security terms. This essay takes up that question, continuing the inquiry into how best to understand the concept of security, and how Heath's typology helps think about the question. It argues that it may indeed be important to frame climate change in security terms, but as a matter of global security rather than national security.
6

Muka, Romina, Sule Yildrim-Yayilgan, and Kozeta Sevrani. "Security Analysis of Wireless BAN in e-Health." Spring 2017 5, no. 2 (May 1, 2017): 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a WBAN to safeguard patients from different exploits or malicious attacks, since e-Health technologies are increasingly connected to the Internet via wireless communications. In this paper we outline the most important security requirements for WBANs. Furthermore, we discuss key security threats to avoid. Finally, we conclude with a summary of security mechanisms to follow that address security and privacy concerns of WBANs, and need to be explored in an increasingly connected healthcare world.
7

Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enforced on clouds storage.
8

Nandan Sharma. "Indian Healthcare Segment: A Challenge to Human Security in 21st Century." Legal Research Development: An International Refereed e-Journal 2, no. I (September 30, 2017): 63–70. http://dx.doi.org/10.53724/lrd/v2n1.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
During the last three decades, the pharmaceutical sector has shown an explosive growth all over the world. After eatables, cosmetics and textile, pharmaceutical are rapidly surging ahead to become the third largest industry in several developed countries, thanks to health awareness propagated by World Health Organization (WHO).1 India has not lagged behind. Indian Pharmaceutical Industry in spite of tough competition, have got entrenched in eastern, mid-eastern and in several western markets. Some of our pharmaceutical multinationals have already acquired an edge over several well established foreign multinationals. Our pharmaceutical export revenue is increasing year after year. The researcher has highlighted the issue concerning the heath issues of the people of developing nations like India as a challenge for 21st century.
9

Srivastava, Mahendra P. "Plant Clinic Towards Plant Health and Food Security." International Journal of Phytopathology 2, no. 3 (December 30, 2013): 193–203. http://dx.doi.org/10.33687/phytopath.002.03.0327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Ever-growing population, climatic changes and unprecedented losses due to pests and diseases pose serious threat to food security. Precisely food security implies availability of adequate food to everyone in all times to come. Food and Agriculture Organization of united Nations (FAO) defines “food security” as a state of affairs where all people at all times have access to safe and nutritious food to maintain healthy and active life. Food is one of the three basic needs of man, without which his survival is at stake. Plants constitute the basic source of food and as such, plant health management is crucial to food security, which is jeopardized due to unprecedented threat by large number of insect-pests, diseases, weeds and several edaphic and environmental stresses. Srivastava (2008, 2009) has very well highlighted the importance of plant heath security through phytomedicines/pesticides and plant health clinic in order to prevent 40 per cent losses occurring from field to fork globally. Due to unabated rise in population, reduction in arable land will be an ongoing process, hence we may have to strive hard to grow more food from limited land employing innovative strategies and more importantly adopting multipronged initiative and timely diagnostic and management strategies from plant health clinic to combat attack from pests and environmental stress, manage plant health mitigate losses.
10

Heath, J. Benton, Ina Popova, Justin Jacinto, Samaa Haridi, Tafadzwa Pasipanodya, and Sabina Sacco. "Litigating Health and Security Exceptions in Investment Treaties: A Simulation." Proceedings of the ASIL Annual Meeting 115 (2021): 151–54. http://dx.doi.org/10.1017/amp.2021.138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
J. Benton Heath introduced the topic. Essential security interests clauses have been invoked in a handful of cases, including several cases arising out of the Argentine debt crisis and the twin cases brought by Deutsche Bank and CC/Devas against India relating to satellite frequencies, with mixed outcomes and reasoning. In several treaties, these clauses also refer to public health measures, but there is little guidance on how such clauses should be interpreted or applied. Using a fictional but realistic scenario, the advocates and tribunal members—playing assigned roles—were asked to consider whether public health exceptions are self-judging, whether they deprive a tribunal of jurisdiction or go to the merits, and what showing is required for the clause to apply. The scenario also raised broader doctrinal questions about the nature of exceptions in investment treaties, their relationship with the treaty's primary obligations, and the interrelationship between security clauses and the customary international law defense of necessity.

Dissertations / Theses on the topic "Heath security":

1

Daza, Aramayo Lourdes Gabriela. "Sociální zabezpečení v některých státech Latinské ameriky." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis has aims to acquaint the reader with Latin American Social Security systems. For this end, 7 Latin American countries have been chosen. Henceforth, the different Social Security systems operating in these countries are described. It is a comparative analysis, describing the similarities and differences among them. Is necessary to emphasize that this paper does not only provide current information of the different Social Security systems, but also statistical information, which is considered as essential to the context of the economic, demographic and social environments in which are these Social Security systems function. The systems described are: the Pension System, Heath Insurance, Sickness Benefits, Unemployment Insurance, Family Entitlements and last Maternity Benefits. The countries that have been chosen are the following: Argentina, Bolivia, Chile, Colombia, Ecuador, Peru, and Uruguay. In addition to the comparative analysis in this paper, the level of development in the chosen Latin American countries as well as the latest trends concerning the Social Security systems are determined and explained.
2

Minarcine, Scott. "Health Security Intelligence : Assessing the Nascent Public Health Capability." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Approved for public release; distribution is unlimited
This thesis explores the current state of public healths (HS) intelligence capability across State, Local, Tribal and Territorial (SLTT) jurisdictions through qualitative analysis of current public health jurisdiction plans for the collection, analysis, product creation, dissemination and programmatic oversight related to public health inputs into the homeland security intelligence apparatus. An assessment was conducted using an online Plan Assessment Tool, or PLAT, that allowed jurisdictional public health leadership to provide de-identified responses. This assessment of 25 of the 62 federally funded SLTT public health preparedness programs indicates one impediment to the continued maturation of this new intelligence capability is the lack of codified plans. The results also suggest that while public health programs at the SLTT level do indeed have much room for improvement, there is a burgeoning intelligence capability within public health. However, to sustain and improve this emergent capability will require a national effort to create mission focus and centralized guidance.
3

Singh, Kalvinder. "Security for Mobile Health Care Systems." Thesis, Griffith University, 2013. http://hdl.handle.net/10072/367683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The ageing population and the increase in chronic diseases have placed a considerable financial burden on health care services. Mobile health care systems can play an important role in reducing the costs. The pervasiveness of smart phones and the evolution of Internetof- Things are increasing the potential for mobile health care systems to remotely manage the health of a patient or the elderly. Smart phones and small devices, such as body sensors, are used to remotely monitor patients suffering from chronic diseases and allow them to have relatively independent lives. A mobile health care system may require a degree of real-time monitoring or data collection. For instance, a medical emergency will require data sent to medical staff as quickly as possible, rather than the data sent after a few hours or days. The problem will be more complex if there is a requirement that commands sent to body sensors need to be in real-time. If the system recognises a possible medical emergency, it may need to notify other devices immediately to start recording data or to actuate (for example, an insulin pump and a defibrillator).
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
4

Fryer, Huw. "The public health analogy in Web security." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/412399/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Traditional law enforcement methods have proven inadequate against the current levels of cybercrime we are experiencing. This is due to the ease of automating attacks, and also that even a single jurisdiction prepared to ignore or unable to prosecute cybercriminals mean that they are usually beyond the reach of local law enforcement. This has led to different analogies to attempt to describe the phenomenon, and one of these is that of public health. In the past, this was used to describe the propagation methods of computer 'viruses', which exhibited similar characteristics to biological viruses. Whilst other malware also had a similar propagation pattern, these no longer apply given the popularity of drive-by downloads, where Web pages attack users who visit them. A consequence of this new method of propagation is that 'infected' machines do not have any contagion, so one infected machine on a network does not mean that another machine on the network will become infected as well. This thesis proposes a novel interpretation of the public health analogy, which focuses on the notions of efficacy and rights, so that these guidelines can continue to be used. This is considered in the context of the major stakeholders who could intervene in the drive-by download process, where it is concluded that hosting providers are best placed to intervene to make a difference. It is proposed that they should proactively search for vulnerable websites they host, and warn the operator, implementing blocking procedures if the operator does not respond. An agent based model is then used to assess the efficacy of such an intervention.
5

Iwaya, Leonardo Horn. "A security framework for mobile health data collection." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-23122014-143956/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Mobile health (mHealth) can be defined as the practice of medicine and public health supported by mobile computing technologies, such as mobile phones, PDAs, tablets, sensors and other wireless devices. Particularly in the case of mobile phones, there has been a significant increase in the number of lines, equipment, and network infrastructure in Low- and Middle-Income Countries (LMIC), allowing the adoption of mHealth systems efficiently. There are now several cases of systems for data collection focused on primary care, health surveillance and epidemiological research, which were adopted in these countries. Such systems provide health care managers information with higher quality and in a shorter time, which in turn improves their ability to plan actions and respond to emergencies. However, security is not included among the main requirements of such systems. Aiming to address this issue, we developed a survey about mHealth applications and research initiatives in Brazil, which shows that a reasonable number of papers only briefly (13%) or simply do not mention (40%) their security requirements. This survey also provides a discussion about the current state-of-art of Brazilian mHealth researches, including the main types of applications, target users, devices employed and the research barriers identified. After that, we present the SecourHealth, a security framework for mHealth data collection applications. SecourHealth was designed to cope with six main security requirements: support user registration and authentication mechanisms; treat network disconnections and delays; provide a secure data storage - even in case of possible theft or loss of equipment; allow secure data exchange between the device and server; enabling device sharing between users (i.e., health workers); and allow trade-offs between security, performance and usability. This thesis also describes in detail the framework modeling and development steps showing how it was integrated into an application for the Android platform. Finally, we benchmarked the cryptographic algorithms implemented, when compared to the overhead of using HTTPS protocol.
Saúde Móvel (mHealth) pode ser definida como a prática médica e a saúde pública suportadas por tecnologias de computação móvel, como: telefones celulares, PDAs, tablets, sensores e outros dispositivos sem fio. Particularmente no caso dos celulares, há um aumento expressivo no número de linhas, aparelhos, e na infraestrutura de rede em países de média e baixa renda (Low- Middle- Income Countries, LMIC), permitindo a adoção de sistemas mHealth de maneira eficiente. Existem, hoje, vários casos de sistemas de coleta de dados voltadas à atenção primária, vigilância (em saúde) e pesquisas epidemiológicas adotados nesses países. Tais sistemas fornecem aos gestores de saúde uma informação de melhor qualidade em menor tempo, que por sua vez melhoram a capacidade de planejamento e resposta a emergências. Contudo, nota-se um relaxamento no cumprimento de requisitos de segurança nestes sistemas. Com base nisso, foi feito um levantamento de aplicações e iniciativas de pesquisa em mHealth no Brasil, no qual se constatou que um número razoável de trabalhos mencionam fracamente (13%) ou não menciona (40%) os requisitos de segurança. Este levantamento também discute sobre o estado atual das pesquisas de mHealth no Brasil, os principais tipos de aplicações, os grupos de usuários, os dispositivos utilizados e as barreiras de pesquisa identificadas. Em seguida, este trabalho apresenta o SecourHealth, um framework de segurança voltado ao desenvolvimento de aplicações de mhealth para coleta de dados. O SecourHealth foi projetado com base em seis requisitos principais de segurança: suportar o registro e a autenticação do usuário; tratar a desconexão e os atrasos na rede; prover o armazenamento seguro de dados prevendo possibilidades de furto ou perda dos aparelhos; fazer transmissão segura de dados entre o aparelho e o servidor; permitir o compartilhamento de dispositivos entre os usuários (e.g., agentes de saúde); e considerar opções de compromisso entre segurança, desempenho e usabilidade. O trabalho também descreve com detalhes as etapas de modelagem e desenvolvimento do framework - que foi integrado a uma aplicação para a plataforma Android. Finalmente, é feita uma análise do desempenho dos algoritmos criptográficos implementados, considerando o overhead pelo simples uso do protocolo HTTPS.
6

Toms, Anders. "Information Security when Integrating Actors in Health Care Processes." Thesis, University of Skövde, Department of Computer Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

There is a growing interest within organisations today to focus on the core processes, i.e. the processes that create value for the intended customer, in order to stay compatible within the ever-fiercer competition. To have full control of the key processes may be a great step forward towards a more lean and effective organisation, not only for profit seeking companies but also for public welfare institutions like health care. Software aimed at supporting a process focus is continuously being developed and one such family of programs is commonly referred to as process managers.

A process manager lets the people in an organisation who have complete knowledge of the processes model these without requiring them to have expert knowledge of computers and programming. Once a process has been defined graphically according to a predefined modelling language, it can be deployed and monitored. The process manager software takes care of the routing of messages between actors, both human as well as non-human (e.g. other applications), and it drives the individual errand forward according to how the process flow has been defined in the model. However, applying a process manager approach in health care processes requires a certain amount of caution. Messages sent between actors in health care organisations are often of a delicate nature since they may contain sensitive information, such as illness, mental state, family situation and similar, that is related to an identifiable individual. There are also other aspects of security that need to be addressed besides the confidentiality aspect. For example, it must be guaranteed that the information is correct and not altered during transfer, the information must be available when needed and it should be possible to trace a message to its sender, among other things.

This work identifies a set of security requirements from the literature that need to be fulfilled in health care organisations when applying a process manager approach. With these requirements as a basis, a process manager system is evaluated with regards to security and the conclusion is that future versions need improvement on some points. Future work is also suggested that could help to explore the area further.

7

Thomson, Steven Michael. "A standards-based security model for health information systems." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
8

Raedeke, Maurine A. "Food security, nutrition and health of food pantry participants." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph. D.)--University of Missouri-Columbia, 2007.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on October 9, 2007) Vita. Includes bibliographical references.
9

Coghlan, Christopher. "Towards food security with nutritional health : multi-scale approaches." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:faec7323-edbd-440b-9a60-01cc84532b68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis addresses multi-scale approaches for improving food security with nutritional health. It argues that four key themes: scale, nutrition, trade, and governance are not given adequate attention in food security and nutrition studies. A multi-scale framework links the overriding thematic structure, bridges gaps, and enriches analysis. It facilitates a blended approach of analysis for food security and nutrition studies, public policy, and critical geography. Nutrition is at the centre of the inquiry and addresses the triple burden of malnutrition: hunger, micronutrient malnutrition, and obesity. Nutrition is hampered by an incomplete understanding of dietary diversity. Trade and governance are complimentary and cover dynamic commodity exchanges which might develop along with improved programme delivery. At the structural core of the work are four research papers which interact with established and emergent food security indicators and data for: the international system, nations, Indian states, and districts within Karnataka. Each paper uses specific methodological tools which are most compatible with the unique characteristics of the relevant scale. The first paper applies benchmarking and compares international FAO food security indictors with the EIU and other best practice sources to argue for improved data. In order to inform malnutrition beyond hunger, the second paper inputs FAOSTAT national food balance sheet data into a dietary food supply model of key nutritional food groups for medium activity individuals. The third paper employs Indiastat data to construct a food potential model representative of major components of the Indian food system, and compares it with production information for pulse varieties for inclusion in the NFSA. The fourth paper creates a nutritional HDI, compares it against the production of cereals and pulses, and considers weather conditions. Results illustrate that the FAO does not give proper attention to including governance indicators or capturing dietary diversity beyond hunger. Food balance sheet data shows that the majority of the world lacks the proper supply of key food groups to sustain a medium activity lifestyle, with fruit & vegetable deficits equally present in developed and developing nations. In India, states with the lowest food potential are located in the north and east of the country while some neighbouring states contain pulse production advantages. Further opportunities exist to use digital technologies to improve the administration of the programme. Similarly, northern districts of Karnataka require more direct NFSA intervention while the southern and coastal districts have the potential for increased production and trade of pulses. Implications for this study are centred on the development of future food security and nutritional health studies, policy, and administration. When possible, food security and nutrition studies can broaden their conclusions by expanding their base of indicators and data to take into account multi-disciplinary information. Possibilities for richer studies are evident through the development of more robust governance and dietary diversity indicators. These could focus on measurable programme results and take into account the impact of food groups and nutritional supply on various types of malnutrition. Multi-scale analysis might inspire cross-boundary policy formulation and assist in the development and trade of food system resources. The administration of food security programmes might improve with further study and the use of technology as a tool for delivery. This thesis clarifies how multi-scale approaches to food security and nutrition can be advanced through conceptual, methodological, and empirical work combining critical engagement, data analysis, and public policy.
10

Alawaji, Ahmed S. "Privacy and security risks for national health records systems." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2018.
Page 104 blank. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 101-103).
A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security considerations. The aims of this study were to explore how governments can design secure national health records systems. To do that systematically, we developed a framework to analyze NEHR systems. We then applied the framework to investigate the privacy and security risks in these systems. The studied systems demonstrate that getting privacy and security right have a considerable impact on the success of NEHR projects. Also, our study reveals that the healthcare system structure has a substantial impact on the adoption and usage rates of the system. The studied cases uncover many opportunities for improving privacy and security measures in future projects. The framework demonstrates the utility of applying it to the three cases.
by Ahmed S. Alawaji.
S.M. in Engineering and Management

Books on the topic "Heath security":

1

United States. Government Accountablity Office. Mail security: Incidents at DOD mail facilities exposed problems that require further actions : report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fund, United Nations Population, ed. Reproductive health essentials: Securing the supply : global strategy for reproductive health commodity security. New York: United Nations Population Fund, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goodman, Michael S., James M. Wilson, and Filippa Lentzos. Health Security Intelligence. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003245483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Masys, Anthony J., Ricardo Izurieta, and Miguel Reina Ortiz, eds. Global Health Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-23491-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kamradt-Scott, Adam. Managing Global Health Security. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137520166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Canada. Citizenship and Immigration Canada., ed. Health and income security. [Ottawa]: Citizenship and Immigration Canada, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Myriam, Dunn Cavelty, and Kristensen Kristian Søby, eds. Securing 'the homeland': Critical infrastructure, risk and (in)security. London: Routledge, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Executive Office of the President., ed. Health security: The President's health care plan. [Washington, D.C.?: Executive Office of the President, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi: International Planned Parenthood Federation, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi: International Planned Parenthood Federation, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Heath security":

1

Riad, A. B. M. Kamrul Islam, Hossain Shahriar, Chi Zhang, and Farhat Lamia Barsha. "Heath Device Security and Privacy." In Data Protection and Privacy in Healthcare, 91–108. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davidson, Ruth. "Social Security Policy." In Policies and Politics Under Prime Minister Edward Heath, 141–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53673-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Levine, Marissa J. "Health Security." In Handbook of Security Science, 1–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-51761-2_25-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marton, Péter. "Health Security." In The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_539-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marton, Péter. "Health Security." In The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-74336-3_539-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rushton, Simon. "Health Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach, 174–92. 1 Oliver’s Yard, 55 City Road London EC1Y 1SP: SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Levine, Marissa J. "Health Security." In Handbook of Security Science, 635–59. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reveron, Derek S., and Kathleen A. Mahoney-Norris. "Health Security." In Human and National Security, 163–80. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Porcelain, Sherri L. "Health Security." In Public Health and Beyond in Latin America and the Caribbean, 153–85. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003007401-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Marton, Péter. "Health Security." In The Palgrave Encyclopedia of Global Security Studies, 697–704. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_539.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Heath security":

1

Nagy, Robertbela, and Florin Popentiu vladicescu. "EXPLORING THE POTENTIAL OF INTERNET OF THINGS SYSTEMS IN HEATH CARE CONTEXT." In eLSE 2018. Carol I National Defence University Publishing House, 2018. http://dx.doi.org/10.12753/2066-026x-18-210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper is a survey about the uprising of the Internet of Things (IoT) technologies, their evolution, their variety of the application domains of the IoT systems, which includes, but not limits to healthcare domain, smart cities, smart objects, integration of smart sensors, smart home appliances control, etc. and all the technology revolution that this evolution implies and forces to happen. The IoT system's revolution and fast-phased evolution will create and/or cause positive effects in the whole society and technology, like in the case when the IoT domain is redesigning the applied modern healthcare systems, promising and later offering technological, economic, and social benefits. This paper also reviews the state-of-the-art network architectures/platforms employed in the IoT systems, presents different applications, and also the future trends. IoT security and privacy features, including security requirements will be also discussed and presented. Ambient intelligence, and wearables can be leveraged in the IoT healthcare context, sensors are also becoming ubiquitous and very important in everyday life and also generates data at an unprecedented, unseen rate and scale. This article focuses on the current/existing trends in the domain of IoT and on the current stage of development of research for hardware and software solutions, possible future communication capabilities between human beings and machines, and any new technologies that will employ IoT. Future researches on IoT-based systems are based on a set of open issues and challenges; also, there is the vital step from current "Big Data" to "Big Information" that can be improved and faster created with the help and implication of the current and future IoT systems/setups. With the proliferation of IoT, humans will be able to interact with machines/computers and also control a variety of networked electronic devices, including sensors and actuators. Also, the emergence and evolution of wearable Brain-Machine Interfaces (BMIs), employing directly Electroencephalographyc (EEG) signals, can be a key catalyser of this interaction and evolution of IoT. As smart home appliances, smart sensors, smart glasses and wearable EEG/EMG headsets and any other smart objects are appearing in our lives every day, all of them connected or being a member of the IoT systems, it is important to be able to foresee what is lying ahead of us, as a society in view of the fact that their number grows every day. As the gathered data is growing each day, the computation power from the available IoT devices and infrastructure are becoming more important and more utilized.
2

Bashar, Md Khayrul. "Event-Driven Time Series Analysis and the Comparison of Public Reactions on Covid-19." In 9th International Conference of Security, Privacy and Trust Management (SPTM 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapid spread of COVID-19 has already affected human lives throughout the globe. Governments of different countries have taken various measures, but how they affected people lives is not clear. In this study, a rule-based and a machine-learning based models are applied to answer the above question using public tweets from Japan, USA, UK, and Australia. Two polarity timeseries (meanPol and pnRatio) and two events, namely “lockdown or emergency (LED)” and “the economic support package (ESP)”, are considered in this study. Statistical testing on the sub-series around LED and ESP events showed their positive impacts to the people of (UK and Australia) and (USA and UK), respectively unlike Japanese people that showed opposite effects. Manual validation with the relevant tweets shows an agreement with the statistical results. A case study with Japanese tweets using supervised logistic regression classifies tweets into heath-worry, economy-worry and other classes with 83.11% accuracy. Predicted tweets around events re-confirm the statistical outcomes.
3

KUSTRON, KAMILA. "A NEW METHOD IN CONCEPTUAL DESIGN OF THE SHM AIRFRAME USING ROUGH SETS." In Structural Health Monitoring 2021. Destech Publications, Inc., 2022. http://dx.doi.org/10.12783/shm2021/36354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A very promising solution in airframe design is a new trend in application based on intelligent online condition monitoring known as Structural Condition/Health Monitoring/Management System, which has evolved towards Integrated System Health Management to cover the whole System-of-Systems architecture. This paper focuses on how to reduce Big Data with reference to a comprehensive model for designing future airframe heath monitoring system, including the problem of assessing the diversity of various sensors used in the assessment of the technical condition/health of an airframe, which generates big data sets with different records of measurement data that must be reduced for effective using. The paper summarizes the research on the assessment of sensors in terms of their suitability and effectiveness in monitoring the airframe condition, including metal and composite, and refers to the complexity of the problem by integrating the technical condition/health of the engine unit and the airframe. Integration issue of the reliability serial connection of the airframe and engine for airworthiness assessment were mentioned. A new method based on the rough set paradigm, including hybrid variants, for the reduction of big data of health monitoring into their effective management were postulated and advantages were demonstrated. The proposed method in the form of listed issues is complementary to the currently used method and is aimed at supporting the design of the airframe at the preliminary assessment stage. That method is strongly recommended to increase security and reduce computational cost and operational cost including maintenance cost in aircraft life-cycle costs.
4

Mancini, F., K. A. Mughal, S. H. Gejibo, and J. Klungsoyr. "Adding security to mobile data collection." In 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services (Healthcom 2011). IEEE, 2011. http://dx.doi.org/10.1109/health.2011.6026793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Weider D., and Vijayalakshmi Jothiram. "Security in Wireless Mobile Technology for Healthcare Systems." In 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vieira, Marcos Alves, Gislainy Crisostomo Velasco, and Sergio T. Carvalho. "A Decentralized Health Data Repository for Remote Patient Monitoring Using Blockchain and FHIR." In Workshop em Blockchain: Teoria, Tecnologias e Aplicações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/wblockchain.2023.723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The world’s aging population increasingly faces challenges in accessing healthcare due to a shortage of healthcare professionals. Telemedicine and remote patient monitoring solutions offer a promising avenue for improving access to care, allowing for the monitoring of physiological data, activities performed, and the conditions of the patient’s environment. However, such systems must address numerous challenges, such as interoperability, security, integrity, and confidentiality of medical data. In this paper, we propose a repository architecture for medical data obtained through remote patient monitoring. Our solution relies on the Fast Healthcare Interoperability Resources (FHIR) standard to address interoperability issues, while the inherent characteristics of blockchain technology provide security, integrity, and confidentiality of stored data. In addition to remote patient monitoring, the proposed repository has the potential to be used for scientific research, data mining and analysis applications among other health applications. Ongoing implementation and testing of the repository in a real-world setting will demonstrate its performance and scalability. Meanwhile, we present the architecture and constituent elements, including data flow and smart contracts, with their responsibilities described. Overall, our proposed solution offers a promising approach to addressing the challenges of remote patient monitoring and storing medical data securely and efficiently.
7

Shen, Tsu-Wang. "A u-Health Security Structure by Using 2D Barcodes." In 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fragopoulos, A. G., J. Gialelis, and D. Serpanos. "Imposing holistic privacy and data security on person centric ehealth monitoring infrastructures." In 2010 12th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom 2010). IEEE, 2010. http://dx.doi.org/10.1109/health.2010.5556580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dharsni, Thanga, Hanifa Zakir, Pradeep Naik, Mallikarjuna, and Raghu. "Soldier Security and Health Monitoring." In 2018 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C). IEEE, 2018. http://dx.doi.org/10.1109/icdi3c.2018.00016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Samy, Ganthan Narayana, Rabiah Ahmad, and Zuraini Ismail. "Threats to Health Information Security." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.312.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Heath security":

1

Vu, Jonathan, Benjamin Kaplan, Shomesh Chaudhuri, Monique Mansoura, and Andrew Lo. Financing Vaccines for Global Health Security. Cambridge, MA: National Bureau of Economic Research, May 2020. http://dx.doi.org/10.3386/w27212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Uecker, Norma J., and Michael J. Schwartz. Office of Health, Safety and Security, Office of Security Policy FY 2013 Accomplishments. Office of Scientific and Technical Information (OSTI), October 2013. http://dx.doi.org/10.2172/1105101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wolmuth-Gordon, Hannah, and Natasha Mutebi. Public health and climate change: a One Health approach. Parliamentary Office of Science and Technology, UK Parliament, July 2023. http://dx.doi.org/10.58248/pn701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This POSTnote summarises how the One Health approach can be used to tackle key public health impacts of climate change, such as antimicrobial resistance, zoonotic disease and food and water safety and security. It outlines the key features, challenges and opportunities of implementing the approach. This briefing takes a global perspective on implementing the approach, with areas of focus on UK policy.
4

Falzarano, A. Annotated Bibliography - Economic Sanctions: Implications for Health Security. Office of Scientific and Technical Information (OSTI), December 2019. http://dx.doi.org/10.2172/1635787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sung, Jane, and Olivia Dean. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, December 2020. http://dx.doi.org/10.26419/ppi.00114.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sung, Jane, Olivia Dean, Robert C. Saunders, Asha Saavoss, and Lane Koenig. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, December 2020. http://dx.doi.org/10.26419/ppi.00099.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bohorquez, Camilo. Subsidized Health Care and Food Security: Evidence from Colombia. Banco de la República de Colombia, February 2020. http://dx.doi.org/10.32468/be.1103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scholl, Matthew, Kevin Stine, Kenneth Lin, and Daniel Steinberg. Security architecture design process for health information exchanges (HIEs). Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Osewe, Patrick L. Health Security Interventions for COVID-19 Response: Guidance Note. Asian Development Bank, September 2022. http://dx.doi.org/10.22617/spr220224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This guidance note is designed to help developing member countries of the Asian Development Bank strengthen their health systems and security as they recover from the impact of COVID-19. Drawing on evidence-based and expert-validated interventions, it lays out a comprehensive series of measures policy makers could weave into national agendas. These range from steps to bolster health guidelines and ramp up testing and contact tracing to strategies that can improve community engagement and prevent misinformation. The guidance note discusses ways of addressing local gaps and priorities, responding to the destabilizing impact of the pandemic, and preparing for future outbreaks.
10

Lamas, Jorge, Laura Bocalandro, Tara Lisa Persaud, Alejandro Cruz Fano, and Rafael Villa. South-South Cooperation and Capacity Development in Action: Regional Public Entrepreneurship in Latin America and the Caribbean. Inter-American Development Bank, March 2010. http://dx.doi.org/10.18235/0008843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This collection of five case studies examines Latin American and the Caribbean experiences in regional cooperation and institutional capacity development across various sectors, including public debt management, watershed management, public health, citizen security and social security systems.

To the bibliography