Artículos de revistas sobre el tema "Confidentiality of sources"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Confidentiality of sources.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Confidentiality of sources".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Emslie, J. A. y P. Christie. "Confidentiality for doctors with AIDS. Official sources maintained confidentiality." BMJ 307, n.º 6903 (28 de agosto de 1993): 566. http://dx.doi.org/10.1136/bmj.307.6903.566-a.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Harala, Riitta y Anna-Leena Reinikainen. "Confidentiality in the use of administrative data sources". Statistical Journal of the United Nations Economic Commission for Europe 13, n.º 4 (1 de diciembre de 1996): 361–68. http://dx.doi.org/10.3233/sju-1996-13404.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Alexander, Laurence B. "Civil Liability for Journalists Who Violate Agreements of Confidentiality with Sources". Newspaper Research Journal 14, n.º 3-4 (junio de 1993): 45–59. http://dx.doi.org/10.1177/073953299301400306.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

WOLANIUK, Leszek. "SELECTED PROBLEMS OF SECURITY OF INFORMATION CONFIDENTIALITY IN CYBERSPACE". Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, n.º 4 (2 de octubre de 2017): 194–207. http://dx.doi.org/10.5604/01.3001.0010.7228.

Texto completo
Resumen
Information confidentiality is the one of the cornerstones of IT security, which is defined and described in ISO/IEC 27000 standard. Contemporary practices of disclosing information to unauthorized persons and systems are the reason for difficulties in this concept implementation. At every step we encounter situations where information is extracted or obtained illegally from different sources. The main purpose of this paper is to present the issue of information confidentiality protection in cyberspace, as a complex, full of contradictions problem of techno-social character. The role of information confidentiality in functioning of a society, organization and individual has been described. The most important information confidentiality threats have been characterized and the description of a number of incidents illustrating those threats has been quoted. Contemporary security threats have been presented as well as selected methods of information confidentiality protection transmitted in ICT networks. The characteristics of protection systems of information confidentiality have been analyzed, with special attention paid to their functionality and vulnerability to existing threats. The concept of protecting the confidentiality of information transmitted on the Internet based on the use of cryptography and steganography has been presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Gassaway, Bob M. "Are Secret Sources in the News Media Really Necessary?" Newspaper Research Journal 9, n.º 3 (marzo de 1988): 69–77. http://dx.doi.org/10.1177/073953298800900307.

Texto completo
Resumen
Fifteen people who said they had acted as confidential news sources for journalists were interviewed Most said they had been providing confidential information for years as a way of letting the public know things. A majority of the sources said journalists faced with pressure to identify their sources should “ask me to reconsider an agreement” of confidentiality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

McHone-Chase, Sarah. "Sources: Privacy and Confidentiality Issues: A Guide for Libraries and Their Lawyers". Reference & User Services Quarterly 49, n.º 1 (1 de septiembre de 2009): 104. http://dx.doi.org/10.5860/rusq.49n1.104.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Fernandez, Joseph M. "Pass the Source—Journalism’s Confidentiality Bane in the Face of Legislative Onslaughts". Asia Pacific Media Educator 27, n.º 2 (25 de octubre de 2017): 202–18. http://dx.doi.org/10.1177/1326365x17728822.

Texto completo
Resumen
‘Journalism under siege’ proclaimed the cover of The Walkley Magazine, an Australian publication dedicated to promoting journalism excellence in its March 2017 issue. This headline reflects the severe disruption journalism is experiencing globally. Facts used to be facts and news was news but now we have ‘alternative facts’ and ‘fake news’ (Media Watch, 2017). Against this backdrop, a persistent dilemma for journalism has been the impact of the law on journalists relying on confidential sources who play a critical part in providing access to information. The journalism profession’s apparent source protection gains have been undermined by legislative and other assaults, and it has had a chilling effect on journalists’ contacts with confidential sources. The Australian journalists’ union, the Media Alliance, has warned that ‘it is only a matter of time’ before a journalist is convicted for refusing to disclose a confidential source (Murphy, 2017, p. 3). This article builds on earlier work examining how Australian journalists are coping in their dealings with confidential sources. This article (a) reports on the findings from an Australian study into journalists’ confidential sources and (b) identifies lessons and reform potentials arising from these findings.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ainsworth, Frank y Patricia Hansen. "Confidentiality in child protection cases Who benefits?" Children Australia 35, n.º 3 (2010): 11–17. http://dx.doi.org/10.1017/s1035077200001127.

Texto completo
Resumen
Child protection legislation in every Australian state and territory prohibits the disclosure of the identity of a person who acts as a mandatory reporter. There is also provision in most child protection legislation that prevents the naming of children and families in protection cases. It is argued that disclosure is not in the interests of the child, the family or the general public. Children's Court proceedings in most states and territories in Australia are closed to the public so that, unlike in most other jurisdictions, interested parties are not able to observe the proceedings. Child protection authorities also have considerable power to collect information about children and families from many sources. This power to obtain information is compounded by legislation which removes confidentiality provisions from professional codes of ethics. Furthermore, the rules of evidence do not ordinarily apply in the Children's Court. This article uses New South Wales as the exemplar state and raises questions about all of these issues.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

SHAHBAZYAN, K. "Contractual and legal regulation of preservation of results of scientific research in confidentiality and use of such information in case of research and development: practices of EU and countries of the world". INFORMATION AND LAW, n.º 4(39) (9 de diciembre de 2021): 202–13. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249362.

Texto completo
Resumen
The article analyzes the category of agreements in the field of research and development – non-disclosure agreements (confidentiality agreements), provides examples of such agreements with different sources of funding; as well as there are being considered the wordings of confidentiality provisions in general agreements for research and development – the article compares the practice of application of these provisions in the EU and countries of the world. The requirements are considered for settling the issues of protection of intellectual property rights in the aspect of confidentiality and distribution of rights to use the information, obtained during the research in the project, use of such info during the further researches and granting access rights to such information to third parties. Aspects that should be included in similar types of agreements in Ukraine are proposed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Białkowska, Paula Maria. "Legal and Ethical Grounds of Professional Secrecy of a Lawyer in Selected European Union Countries and in the United States of America". Review of European and Comparative Law 45, n.º 2 (16 de junio de 2021): 77–103. http://dx.doi.org/10.31743/recl.11456.

Texto completo
Resumen
The subject of the article is professional secrecy in practicing the legal profession in American law, with the indication of some differences resulting from separate laws of different states, and in the European Union – taking into account a few exemplary countries. Its sources were described – both legal and ethical, as well as the definition and construction. Confidentiality has been included in the objective and subjective aspect, taking into account different views in the doctrine as to its scope. Bearing in mind the basic right from which professional secrets derive – the right to privacy – the article also includes some of its aspects related to confidentiality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Zaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns". Sciential - McMaster Undergraduate Science Journal, n.º 1 (25 de noviembre de 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.

Texto completo
Resumen
Obtaining information about your genes can be as easy as swabbing your cheek for DNA testing. Companies that offer direct-to-consumer genetic testing with saliva have the authority to collect and share personal data as well as test results from their clients. However, patients want their personal information to be protected and although these companies ask for consent before sharing information with third-party sources, companies have the right to use client data to initiate research or improve their business. Genetic testing companies need to respect their clients and understand that they are paying for a service which deals with sensitive information that individuals may not want collected and stored.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Sufriadi, Sufriadi, Neneng Patri Yuni, Jamaluddin Jamaluddin y Maya Kasmita. "The Effectiveness of Communication Ethics in Achieving Learning Objectives at State Vocational High School 4 Makassar". Jurnal Office 5, n.º 1 (30 de julio de 2019): 63. http://dx.doi.org/10.26858/jo.v4i2.9804.

Texto completo
Resumen
This study aims to determine the effectiveness of communication ethics in achieving learning goals at SMK Negeri 4 Makassar. This research is descriptive qualitative with a description of the focus on honesty, mutual understanding, obligation to care (well-being), confidentiality, and consequences. The number of informants in this study were five people consisting of principals, deputy principals, subject teachers, and two female students at Makassar State Vocational High School 4. The sample technique used was purposive sampling by sampling data sources based on certain considerations. Data collection was carried out by observation, interview, and documentation techniques. The results of the study showed that the ethics of communication in achieving learning objectives at SMK Negeri 4 Makassar were effective. This can be seen from the five aspects of behavioral guidance in building communication ethics, namely honesty, mutual understanding, obligation to care (well-being), confidentiality and consequences.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Ramafi, Pelonomi, Ignitia Motjolopane y Koga Gorejena. "Ethical Framework for Multi-Source Big Data Analytics Disease Surveillance in Public Healthcare". International Conference on Artificial Intelligence and its Applications 2023 (9 de noviembre de 2023): 65–73. http://dx.doi.org/10.59200/icarti.2023.009.

Texto completo
Resumen
Big data analytics can revolutionize disease surveillance by integrating multiple data sources and analyzing those diverse data sources, allowing for early monitoring, detection, and response to disease outbreaks. Since the growth in technology, together with the advent of big data, there is growing interest in exploring the potential of multiple data sources for disease surveillance. However, there are still ethical concerns when it comes to big data usage for disease surveillance. Hence, this study uses of scoping review with the assistance of socio-technical systems theory, together with social contact theory to examine the ethical dimensions of employing big data analytics from diverse sources for disease surveillance, while emphasizing the importance of maintaining ethical standards in public healthcare practices. The study discovered that informed consent, privacy, and confidentiality are still major challenges when it comes to the integration of big data sources in disease surveillance. The study then recommends a unified ethical framework for enhanced disease surveillance in public healthcare through Multi-Data Source big data Analytics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Madkour, Aubrey Spriggs, Alison Swiatlo, Allison Talan, Kendra LeSar, Marsha Broussard, Carl Kendall y David Seal. "Sources of Help for Dating Violence Victims: A Qualitative Inquiry Into the Perceptions of African American Teens". Journal of Interpersonal Violence 34, n.º 21-22 (24 de octubre de 2016): 4404–20. http://dx.doi.org/10.1177/0886260516675467.

Texto completo
Resumen
Although teen dating violence victims’ reticence in seeking help from adults is well documented, little is known about youths’ comparative perceptions of the types of help offered by and effectiveness of various sources. This qualitative study solicited teens’ perceptions of sources of help for victims using in-depth interviews with African American youth (ages 13-18) in two public high schools in New Orleans ( N = 38). Participants were recruited purposively by researchers during lunchtime and via referral by school personnel. Interviews were transcribed verbatim and coded independently by two study team members. Thematic content analyses were conducted. Teens reported that victims were most likely to seek help from friends, who were largely expected to provide advice and comfort. Nearly half reported that teens would be likely to seek help from family, who would provide more active responses to dating violence (i.e., reporting to authorities, confronting the abuser). Fewer respondents believed teens would seek help from other adults, such as school personnel, who were also perceived as likely to enlist outside authorities. Fears about lack of confidentiality and over-reaction were the main perceived barriers to accessing help from adults. Furthermore, although respondents believed teens would be less likely to seek help from adults, adults were perceived as more effective at stopping abuse compared with peers. Interventions that train peer helpers, explain confidentiality to teens, increase school personnel’s ability to provide confidential counseling, and promote use of health services may improve access to help for teen dating violence victims.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Slattery, P. D. y K. Stammer. "MANAGING CONFIDENTIALITY AND CONFLICTS OF INTEREST IN A COMPETITIVE ENERGY MARKET". APPEA Journal 36, n.º 1 (1996): 594. http://dx.doi.org/10.1071/aj95038.

Texto completo
Resumen
Producers and other participants in the petroleum industry are in the midst of an increasingly competitive energy market. It is now the case that throughout Australia producers of natural gas are competing not just with substitute sources of energy but with one another. No longer do producers only compete for prospective tenements, rather their competitive activity extends from acreage acquisition through to the burner tip. The emergence of deregulation in the gas industry and the opportunities for competitive activity have been discussed at recent APEA conferences.1The aim of this paper is to examine where conflicts between interest and duty may arise between joint venturers who are now directly, or through affiliated companies, competing for marketing opportunities. We examine how and why such conflicts may arise and whether it is possible to manage them while still participating in traditional forms of joint venture exploration, production and in some cases marketing.For example, are producers able to satisfy their obligations of good faith and preserve confidentiality in joint venture exploration and production activities without compromising their ability to independently pursue the marketing of their share of production?
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Kumar, Rajeev, Renu Popli, Vikas Khullar, Isha Kansal y Ashutosh Sharma. "Confidentiality Preserved Federated Learning for Indoor Localization Using Wi-Fi Fingerprinting". Buildings 13, n.º 8 (10 de agosto de 2023): 2048. http://dx.doi.org/10.3390/buildings13082048.

Texto completo
Resumen
For the establishment of future ubiquitous location-aware applications, a scalable indoor localization technique is essential technology. Numerous classification techniques for indoor localization exist, but none have proven to be as quick, secure, and dependable as what is now needed. This research proposes an effective and privacy-protective federated architecture-based framework for location classification via Wi-Fi fingerprinting. The federated indoor localization classification (f-ILC) system that was suggested had distributed client–server architecture with data privacy for any and all related edge devices or clients. To try and evaluate the proposed f-ILC framework, different data from different sources on the Internet were collected and given in a format that had already been processed. Experiments were conducted with standard learning, federated learning with a single client, and federated learning with several clients to make sure that federated deep learning models worked correctly. The success of the f-ILC framework was computed using a number of factors, such as validation of accuracy and loss. The results showed that the suggested f-ILC framework performed better than traditional distributed deep learning-based classifiers in terms of accuracy and loss while keeping data secure. Due to its innovative design and superior performance over existing classifier tools, edge devices’ data privacy makes this proposed architecture the ideal solution.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Birky, Ian, Bruce S. Sharkin, Joe Marin y Andrew Scappaticci. "Confidentiality after referral: A study of how restrictions on disclosure affect relationships between therapists and referral sources." Professional Psychology: Research and Practice 29, n.º 2 (abril de 1998): 179–82. http://dx.doi.org/10.1037/0735-7028.29.2.179.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Salman Alhidamkara, Ivana Lucia Kharisma y Kamdan. "Optimize Website Security Implementation of a Comprehensive Website Security Assessment on the Surade 1 Public High School Site". Jurnal CoSciTech (Computer Science and Information Technology) 4, n.º 3 (1 de enero de 2024): 743–53. http://dx.doi.org/10.37859/coscitech.v4i3.6399.

Texto completo
Resumen
In the era of rapid development in media information, the utilization of websites as sources of information has gained widespread significance across various sectors. However, with the increasing use of websites, attention to security aspects has become crucial. The urgency to analyze its vulnerabilities has proven essential in efforts to detect potential threats in the future and ensure the continuity of confidentiality, consistency, accuracy, data validity, and information availability—known as the CIA Principles (Confidentiality, Integrity, Availability)—forming the fundamental basis for safeguarding information security. The website of Public High School 1 Surade presents both general and sensitive data related to school and student information. The findings of this research are expected to make a significant contribution in raising awareness about website security, offering valuable guidance to educational institutions and the government. The aim is to strengthen the security of their websites, with the hope of reducing potential cyber threats in Indonesia. This research is anticipated to serve as a foundation for more effective preventive measures and stricter information security policies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Litzenberg, Kerry K. "Agribusiness And The Agricultural Economics Profession: Research Agendas In Agribusiness". Journal of Agricultural and Applied Economics 24, n.º 1 (julio de 1992): 31–35. http://dx.doi.org/10.1017/s0081305200025905.

Texto completo
Resumen
AbstractThis paper presents a summary of work by various groups on the potential for agribusiness research by agricultural economists over the past decade. Methodology to establish research priorities in agribusiness are reviewed. This review leads to a consideration of the agribusiness research issues including: funding sources, identifying users of agribusiness research, data needs, and limitations of agribusiness research programs.The final part of the paper presents a potpourri of suggested research initiatives in agribusiness research for agricultural economists. Research in these areas may be difficult for a number of reasons including: decreased reliance on economic theory as the sole paradigm, providing competitive advantage to a single agribusiness firm while balancing public and private needs and funding sources, and data confidentiality. Suggestions for outlets for academic research are presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Zaini, Zulfi Diane, Yulia Hesti y Rivo Raihanza Passa. "Legal Aspects of Implementing Confidentiality Protection of Customer Fund Deposits at BUMD Bank Lampung". AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia 2, n.º 1 (24 de enero de 2023): 195–200. http://dx.doi.org/10.57235/aurelia.v2i1.273.

Texto completo
Resumen
Bank secrecy is important because banks as trusted institutions are required to keep everything related to depositors and their deposits confidential. As for the legal protection process for the secrecy of customer funds depositing funds at BUMD Bank Lampung, namely the prevalence of bank operations involving the collection of public funds such as through current accounts, savings, deposits, and so on. Meanwhile, after collecting these funds, the bank needs to distribute these funds to the public, namely through the provision of credit. Other efforts, namely adequate recording of bank operations or transactions conducted by banks is a must. Suggestions for bank management, it is best to be careful in applying the principle of bank prudence, especially in receiving funds to be deposited by customers by asking customers for sources of funds, especially for large deposits, so that the bank can avoid attempts at banking crime. such as money laundering.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Yu, Jinhu, Yue Han, Kai Zhang, Siyuan Chen y Jinguo Li. "Blockchain-Based Privacy-Preserving Sensor Data Sharing with Fine-Grained Authorization in Microgrid". Security and Communication Networks 2023 (11 de mayo de 2023): 1–11. http://dx.doi.org/10.1155/2023/9621839.

Texto completo
Resumen
Microgrid is a power system that includes various energy sources (e.g., solar panels and wind turbines), where a number of device status and sensing data are collected and transmitted by smart sensors. Based on sensing-as-a-service in microgrid, sensor owners and sensor data consumers can effectively perform data sharing operations. However, the state-of-the-art sensor data sharing works in microgrid have the following two limitations: (i) cannot support fine-grained authorization for sensor owners and sensor data consumers and (ii) fail to simultaneously consider confidentiality and authenticity for sensor data sharing. To address the problems, in this article, we propose a lightweight privacy-preserving sensing data sharing system with fine-grained authorization in microgrid. Technically, we employed attribute-based signature methodology to design a fined-grained authorization mechanism for sensor data users. Moreover, a lightweight hyper elliptic curve-based signcryption scheme is employed to provide confidentiality and authenticity for sensor data sharing. To clarify the feasibility of our proposed system, we implement the system and evaluate the performance. The experimental results show that the system achieves small communication and time overhead, as well as highly acceptable gas consumption of smart contract.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Holmes, J. H., J. Sun y N. Peek. "Technical Challenges for Big Data in Biomedicine and Health: Data Sources, Infrastructure, and Analytics". Yearbook of Medical Informatics 23, n.º 01 (agosto de 2014): 42–47. http://dx.doi.org/10.15265/iy-2014-0018.

Texto completo
Resumen
Summary Objectives: To review technical and methodological challenges for big data research in biomedicine and health. Methods: We discuss sources of big datasets, survey infrastructures for big data storage and big data processing, and describe the main challenges that arise when analyzing big data. Results: The life and biomedical sciences are massively contributing to the big data revolution through secondary use of data that were collected during routine care and through new data sources such as social media. Efficient processing of big datasets is typically achieved by distributing computation over a cluster of computers. Data analysts should be aware of pitfalls related to big data such as bias in routine care data and the risk of false-positive findings in high-dimensional datasets. Conclusions: The major challenge for the near future is to transform analytical methods that are used in the biomedical and health domain, to fit the distributed storage and processing model that is required to handle big data, while ensuring confidentiality of the data being analyzed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Albaar, Abdullah, M. Yusuf y Ragwan Albaar. "The Principle of Confidentiality in Islamic Guidance and Counseling: A Review of Hadith". Jurnal Bimbingan dan Konseling Islam 12, n.º 2 (31 de diciembre de 2022): 184–207. http://dx.doi.org/10.29080/jbki.2022.12.2.184-207.

Texto completo
Resumen
This paper discusses the principle of secrecy in Islamic guidance and counseling in terms of a hadith of the Prophet. The purpose of this paper is to get an explanation regarding the importance of the principle of confidentiality in Islamic guidance and counseling when viewed from the hadith of the Prophet. The method used is library research, by analyzing or reviewing writings from various sources and the most important data is the hadith of the Prophet Muhammad. From the results of the studies that have been collected and studied by researchers, it can be concluded that in carrying out general and Islamic guidance and counseling services, it is necessary to apply the principle of confidentiality so that the service can run smoothly as desired. If, in terms of the hadith of the Prophet Muhammad, the principle of secrecy is important because it is in accordance with Islamic religious teachings in which it requires a person's obligation to keep information secret from other people so that it is not known to the general public. When someone else has told us the secret, that person already believes and thinks he can protect it. As well as in the rules of the Islamic religion it has been explained that Allah has given threats to be entered into the Hellfire of Jahannam for those who violate or can be said to be unable to keep other people's secrets or disgrace.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Ernawati, Endang. "Manajemen Literatur Kelabu sebagai Pendukung Penelitian dan Penulisan Karya Ilmiah". Winners 7, n.º 2 (30 de septiembre de 2006): 150. http://dx.doi.org/10.21512/tw.v7i2.619.

Texto completo
Resumen
Article explores the role of grey literature in supporting research and the writing of scientific articles in Indonesia. The discussion covers introduction of grey literature terminology, forms, causes, sources, level of confidentiality, users’ view, and ts development. It is concluded that the grey literature have not been well managed by its institutions; The Indonesia government has paid much attention to the collection, management, and documentation of grey literature; Internet development help the dissemination of grey litearature information in which users can easily access through the website; And the publication of local e-Content in some universities are still in the process of development due to the copy right and facilities problems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Manmeet, Singh, Ahmed Suhaib y Sharma Sparsh. "Blockchain-Based Smart Electricity Measurement and Monitoring System: A Survey". i-manager’s Journal on Embedded Systems 11, n.º 1 (2022): 12. http://dx.doi.org/10.26634/jes.11.1.19084.

Texto completo
Resumen
Humans' dependence on electricity is rising with each passing day. The challenge of global warming can be mitigated by using clean energy sources like electricity instead of burning fossil fuels. In order to meet this increased demand, there is a strong need for an effective electricity management system. The use of smart meters for recording electricity consumption data is vital to the idea of a "smart city." Some of the challenges faced in detailing electricity consumption data include saving large amounts of data, deletion, manipulation, and adjustment of data. Blockchain is a promising technology which can address these issues of data integrity and confidentiality using cryptographic algorithms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Vozár, Ondřej y Luboš Marek. "Multicriteria Evaluation of Randomized Response Techniques for Population Mean". Statistika: Statistics and Economy Journal 103, n.º 4 (15 de diciembre de 2023): 492–503. http://dx.doi.org/10.54694/stat.2023.32.

Texto completo
Resumen
Increasing demand in surveys focused on quantitative characteristics (population mean among others) of controversial issues like corruption, tax evasion, drugs consumption of sensitive variables like spending on drugs or illegal sources of income which lead to lively research, are of randomized response techniques for quantitative variables. Therefore, we propose complex multicriteria evaluation methodology for randomized response techniques for population mean. Based on extensive review in the literature, following ranges of criteria were proposed: statistical properties of estimator, implementation and parameter choice, respondent burden and credibility and confidentiality protection of respondents’ data. Finally, we evaluate in this setting standard techniques using scramble variables and recently proposed techniques of dichotomous question.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Simanjuntak, Dwi Amanda y Irwan Padli Nasution. "Perlindungan Platform Halodoc Dalam Menjaga Kerahasiaan Data Pengguna". Jurnal Sains dan Teknologi (JSIT) 3, n.º 2 (23 de junio de 2023): 211–15. http://dx.doi.org/10.47233/jsit.v3i2.884.

Texto completo
Resumen
The purpose of this article is to investigate the methods used by the Halodoc platform in protecting user data during doctor consultations. To collect information, the author uses a literature review approach, collecting and examining various literature, books, scientific papers, as well as data from the media and other related sources. The findings show that Halodoc implements an oath-taking process for medical and non-medical staff to ensure the confidentiality of user data. even non-medical staff also take the oath as they are part of the Halodoc integrated health care unit which is responsible for the personal information and health status of patients in the hospital
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Vázquez, Adrián. "Protection of Confidential Information in the Mexican Trade Remedy System". Global Trade and Customs Journal 9, Issue 7/8 (1 de julio de 2014): 298–306. http://dx.doi.org/10.54648/gtcj2014036.

Texto completo
Resumen
Ordinarily, a host of information is employed during unfair international trade practices investigations, such as dumping and subsidies. A vast majority of the information submitted by parties to these investigations comes from public sources, but they also offer confidential information. Therefore, interested parties in an investigation of this nature have the right to have their confidential information protected from misuse, as well as a right to timely access the information contained in the administrative record that is necessary for the adequate protection of their interests. This essay shall examine the legal regime applicable to the protection of confidentiality and access to this sort of information in Mexico by interested parties in matters related to unfair international trade practices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Arif Hernawan, Muhammad, Cecep Pahrudin, Muhammad Rifa Affiat y Siti Nurhayati. "OVERVIEW OF FINANCIAL TECHNOLOGY (FINTECH) IN LOGISTICS: LITERATURE STUDY". Journal of Economics, Management, Entrepreneurship, and Business (JEMEB) 1, n.º 1 (4 de mayo de 2021): 72–78. http://dx.doi.org/10.52909/jemeb.v1i1.20.

Texto completo
Resumen
The purpose of this study is to provide ideas in the existing literature from various sources that can be combined with the reality of existing scientific articles. The ideas and results of the research into this scientific article also provide an overview of the variables that can be used in further research such as data confidentiality, financial technology, logistics and government policy regulations. Of the three descriptions in the results and discussion above, there are three variables that can make future research materials or references, namely Financial technology that has been used with consumer confidentiality that is still not maximally maintained, secondly there is a government policy that clearly covers this financial technology so that it can be used. supervised by the government. Third, there are not many logistics companies that use financial technology as a means of payment to consumers, there are many obstacles, especially from management decisions and assistance that may be facilitated by the government with the existence of existing Financial Technology Institutions with cooperation. This qualitative research is still far from perfect, and only as a review material from researchers and as a contribution to the development of science, especially in the field of digital finance, and logistics in general. The research results of this article can provide thought benefits for science for those in need.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Przybysz, Artur, Krystian Grzesiak y Ireneusz Kubiak. "Electromagnetic Safety of Remote Communication Devices—Videoconference". Symmetry 13, n.º 2 (16 de febrero de 2021): 323. http://dx.doi.org/10.3390/sym13020323.

Texto completo
Resumen
Devices powered by electricity become sources of electromagnetic emissions in the course of their operation. In the case of devices oriented to process information, these emissions can have a character of revealing emissions, i.e., those whose reception and analysis allow for remote reconstruction of related data. The best known example of this phenomenon is the formation of revealing emissions during the operation of imaging devices: monitors, projectors or printers. Increasingly more often, these components are used for communication in the form of videoconferences with other network users. The article presents the result of tests and analyses of threats related to the use of such solutions (monitors, personal computers, VoIP terminals) for the confidentiality of conversations and the data presented during them. The focus is on video signals; however, the potential possibilities of revealing speech signals were also indicated. Such phenomenon causes a huge threat to data confidentiality because the combination of graphics and sound can undoubtedly contain much more information about the protected data than just graphics or sound separately. The presented results of analyses apply to graphic data, possibilities of non-invasive acquisition of such data, similarity of images and of patterns and reconstructed image and image recognition. The results indicate that there is still a risk of loss of data confidentiality due to a phenomenon of an electromagnetic leakage, and specialized instrumentation is not required for its interception under favorable circumstances. This may particularly apply to audio data that may be accidentally received by home radio receivers. In particular, the presented results of analyses apply to a Special Issue of Symmetry which is characterized by security and privacy in communication systems and networks, signal processing, video and image processing, multimedia communications and electromagnetic compatibility. All these scientific and technical areas have either symmetrical or asymmetrical approaches, and they have to be taken into consideration as a whole in order to choose the best combinations to protect processed information.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Jeon, Hyunsik, Seongmin Lee y U. Kang. "Unsupervised multi-source domain adaptation with no observable source data". PLOS ONE 16, n.º 7 (9 de julio de 2021): e0253415. http://dx.doi.org/10.1371/journal.pone.0253415.

Texto completo
Resumen
Given trained models from multiple source domains, how can we predict the labels of unlabeled data in a target domain? Unsupervised multi-source domain adaptation (UMDA) aims for predicting the labels of unlabeled target data by transferring the knowledge of multiple source domains. UMDA is a crucial problem in many real-world scenarios where no labeled target data are available. Previous approaches in UMDA assume that data are observable over all domains. However, source data are not easily accessible due to privacy or confidentiality issues in a lot of practical scenarios, although classifiers learned in source domains are readily available. In this work, we target data-free UMDA where source data are not observable at all, a novel problem that has not been studied before despite being very realistic and crucial. To solve data-free UMDA, we propose DEMS (Data-free Exploitation of Multiple Sources), a novel architecture that adapts target data to source domains without exploiting any source data, and estimates the target labels by exploiting pre-trained source classifiers. Extensive experiments for data-free UMDA on real-world datasets show that DEMS provides the state-of-the-art accuracy which is up to 27.5% point higher than that of the best baseline.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Galinec, Davor, Jadranka Vuglar y Dario Cvrtila. "Residential property price index in Croatia: from experimental to official statistics". Croatian Review of Economic, Business and Social Statistics 5, n.º 1 (1 de mayo de 2019): 33–42. http://dx.doi.org/10.2478/crebss-2019-0004.

Texto completo
Resumen
AbstractThe official statistics framework is based on internationally agreed standards, taking into account the core principles of impartiality, objectivity, professional independence, cost effectiveness, statistical confidentiality, minimisation of the reporting burden and high output quality. Since the latest 2007 global economic crisis, a growing demand for more, better and timelier data under limited resources for compilers and reporting agents has been observed. The concept of experimental statistics becomes more relevant, despite the lower quality in terms of coverage, data sources and harmonised definitions. The main aim of this paper is to present the methodological development of the residential property price index in Croatia from experimental to official statistics, as well as to show corresponding changes in time, which occurred due to the changes in methodological framework, institutional responsibility for compilation, coverage and data sources. A general conclusion of the paper is that publication of non-harmonized experimental statistics results, together with explanatory metadata, is better from the point of view of users than having nothing produced by official statistics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Campbell, Ellsworth M., Anthony Boyles, Anupama Shankar, Jay Kim, Sergey Knyazev, Roxana Cintron y William M. Switzer. "MicrobeTrace: Retooling molecular epidemiology for rapid public health response". PLOS Computational Biology 17, n.º 9 (7 de septiembre de 2021): e1009300. http://dx.doi.org/10.1371/journal.pcbi.1009300.

Texto completo
Resumen
Outbreak investigations use data from interviews, healthcare providers, laboratories and surveillance systems. However, integrated use of data from multiple sources requires a patchwork of software that present challenges in usability, interoperability, confidentiality, and cost. Rapid integration, visualization and analysis of data from multiple sources can guide effective public health interventions. We developed MicrobeTrace to facilitate rapid public health responses by overcoming barriers to data integration and exploration in molecular epidemiology. MicrobeTrace is a web-based, client-side, JavaScript application (https://microbetrace.cdc.gov) that runs in Chromium-based browsers and remains fully operational without an internet connection. Using publicly available data, we demonstrate the analysis of viral genetic distance networks and introduce a novel approach to minimum spanning trees that simplifies results. We also illustrate the potential utility of MicrobeTrace in support of contact tracing by analyzing and displaying data from an outbreak of SARS-CoV-2 in South Korea in early 2020. MicrobeTrace is developed and actively maintained by the Centers for Disease Control and Prevention. Users can email microbetrace@cdc.gov for support. The source code is available at https://github.com/cdcgov/microbetrace.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Geraldi, Aldo Rico. "PENYELESAIAN SENGKETA INVESTASI MELALUI INTERNATIONAL CENTRE FOR SETTLEMENT OF INVESTMENT DISPUTE (Studi Kasus Pemerintah Indonesia vs Churchill Mining)". TANJUNGPURA LAW JOURNAL 1, n.º 2 (28 de julio de 2017): 89. http://dx.doi.org/10.26418/tlj.v1i2.24252.

Texto completo
Resumen
This research aims to determine International Centre For Settlement of Investment Dispute (ICSID), benefits and losses for Indonesia related with Choice of Option on Indonesian investment dispute settlement with Churchill Mining Plc in ICSID. This research uses normative legal research by gathering secondary data. Data collected is using the methods of literary study by collecting legal material and information in the form of legal materials of primary sources, secondary sources, and tertiary sources. In order to get a clear explanation, the data will arrange systematically and analyzed with descriptive methods. These results indicate that the disputes settlement between Indonesian Government against Churchill Mining through ICSID has several benefits, such as the confidentiality of the proceedings, the freedom to choose the arbitrator, the decision of the ICSID which are final and binding, and if the arbitration decision can be implemented in Indonesia it is necessary to obtain Exequatur of the Supreme Court. Although it has some benefits, however there are also some of the losses suffered by Indonesian Government, such as substantial costs to finance the proceedings at ICSID and if Indonesia was lost, it can cause financial loss with very large impact to country around trillions to pay compensation or indemnity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Ruiz de la Fuente, Consuelo. "El acceso a las fuentes de prueba en los procesos de daños por actos anticoncurrenciales". Anales de Derecho 41, n.º 1 (31 de enero de 2024): 1–39. http://dx.doi.org/10.6018/analesderecho.558711.

Texto completo
Resumen
Royal Decree Law 9/2017 regulates the compensation of damages caused by practices restricting competition. To facilitate proof in those procedures, it introduces and regulates the access to evidence sources in damage proceedings, modifying the Code of Civil Procedure (LEC 1/2000). This mechanism coexists with other pre-existing procedural mechanisms in civil proceedings to access sources of evidence: the exhibition of documents and preliminary investigations. This study analyzes the mechanism of access to sources of evidence in antitrust tort law and the advisability of extending the application to other areas of civil proceedings, even when there are confidentiality issues deserving of protection. El Real Decreto Ley 9/2017 regula la compensación de los daños causados por prácticas restrictivas de la competencia. Para facilitar la prueba en aquellos procedimientos, introduce y regula el acceso a las fuentes de prueba en los procesos de daños, modificando la LEC 1/2000. Este mecanismo coexiste con otros mecanismos procesales prexistentes en el proceso civil para acceder a fuentes de pruebas: la exhibición de documentos y las diligencias preliminares. El presente trabajo analizará el acceso a fuentes de prueba en el derecho de daños y la conveniencia de extender la aplicación a otros ámbitos del proceso civil, incluso cuando existan cuestiones de confidencialidad merecedoras de protección.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Rangan, Febigrace, Aaron Simanjuntak y Yohanes Seralurin. "Pengaruh Persepsi Kegunaan, Persepsi Kemudahan, Kesiapan Teknologi Informasi, Keamanan Dan Kerahasiaan Terhadap Minat Perilaku Penggunaan E-Filing (Studi Empiris Pada Kantor Pelayanan Pajak Pratama Jayapura)". JURNAL AKUNTANSI DAN KEUANGAN DAERAH 15, n.º 2 (30 de noviembre de 2020): 111–25. http://dx.doi.org/10.52062/jakd.v15i2.1629.

Texto completo
Resumen
Abstract This research aims to examine and analyze the effect of perceived usefulness, perceived convenience, readiness of information technology, security and confidentiality on the behavioral interest in using e-filing. This research uses quantitative data and data sources, namely primary data. The population in this study were individual taxpayers who were registered at the Jayapura Primary Tax Office. The sample used in this study were 100 individual taxpayers. The sampling technique used snowball sampling technique. The method of data collection is using primary data obtained by distributing online questionnaires via google form. The test instruments were analyzed using validity and reliability tests. The data analysis tool used in this research is descriptive statistical analysis, multiple linear regression analysis, classical assumption test, and hypothesis testing. The results of this research indicate that (1) perceived usefulness affects the behavioral interest in using e-filing; (2) perceived ease of use affects the behavior interest in using e-filing; (3) information technology readiness does not affect the behavior interest in using e-filing; (4) security and confidentiality do not affect the behavior interest in using e-filing; (5) perceptions of usefulness, perceived ease of use, readiness of information technology, security and confidentiality together have an effect on the behavioral interest in using e-filing. Keywords: Perceived Usability; Perceived Ease; Information Technology Readiness; Security and Confidentiality; Interest in E-filing Use Behavior. Abstrak Penelitian ini bertujuan untuk menguji dan menganalisis pengaruh persepsi kegunaan, persepsi kemudahan, kesiapan teknologi informasi, keamanan dan kerahasiaan terhadap minat perilaku penggunaan e-filing. Penelitian ini menggunakan data kuantitatif dan sumber data yaitu data primer. Populasi dalam penelitian ini adalah Wajib Pajak Orang Pribadi yang terdaftar di Kantor Pelayanan Pajak Pratama Jayapura. Sampel yang digunakan dalam penelitian ini adalah sebanyak 100 Wajib Pajak Orang Pribadi. Teknik pengambilan sampel dengan teknik snowball sampling. Metode pengumpulan data yaitu menggunakan data primer yang diperoleh dengan menyebarkan kuesioner online melalui google form. Uji coba instrumen dianalisis dengan menggunakan uji validitas dan uji reliabilitas. Alat analisis data yang digunakan dalam penelitian adalah menggunakan analisis statistic deskriptif, analisis regresi linear berganda, uji asumsi klasik, dan pengujian hipotesis. Hasil penelitian ini menunjukkan bahwa (1) persepsi kegunaan berpengaruh terhadap minat perilaku penggunaan e-filing; (2) persepsi kemudahan berpengaruh terhadap minat perilaku penggunaan e-filing; (3) kesiapan teknologi informasi tidak berpengaruh terhadap minat perilaku penggunaan e-filing; (4) keamanan dan kerahasiaan tidak berpengaruh terhadap minat perilaku penggunaan e-filing; (5) persepsi kegunaan, persepsi kemudahan, kesiapan teknologi informasi, keamanan dan kerahasiaan secara bersama-sama berpengaruh terhadap minat perilaku penggunaan e-filing. Kata Kunci: Persepsi Kegunaan; Persepsi Kemudahan; Kesiapan Teknologi Informasi; Keamanan dan Kerahasiaan; Minat Perilaku Penggunaan E-filing
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Conte, Raffaele, Francesco Sansone, Alessandro Tonacci y Anna Paola Pala. "Privacy-by-Design and Minimization within a Small Electronic Health Record: The Health360 Case Study". Applied Sciences 12, n.º 17 (24 de agosto de 2022): 8441. http://dx.doi.org/10.3390/app12178441.

Texto completo
Resumen
Electronic health records are playing an important role in todays’ clinical research, with the possibility to collect a wide amount of data from different sources, not only within a structured clinical setting, but also making best use of new portable technologies, such as smartphones, sensors and Internet-of-Things, as an unprecedented spring of data. In this way, even in small clinical centers, often featuring limited financial availabilities, not only clinicians can have a complete, timely outlook on patients’ health, but also data scientists could use such information to build and train tailored models in the broader perspective of “p4 medicine”. However, all this should align with the strict regulations and needs concerning data privacy and security, safeguarding the rights of the individual and the confidentiality of information related to their healthcare status. Here, we present a case study dealing with Health360, a platform designed to fill in this gap, representing the ideal solution for small clinical centers, where usability and cost-affordability are key characteristics for such a system, to collect multimodal data from various sources actually employed in the framework of neuromuscular conditions. The platform, designed under the Software-as-a-Service paradigm, actually collects data from different clinical centers active in the field of neuromuscular diseases, and therefore was designed to grant access to the data to specific professionals depending on their roles. At the same time, to the benefit of data scientists, Health360 enables joint data processing, with the management of authorization principles for various health professionals from different clinical centers, which is regulated by the data minimization principle, based on the accessing profile. Under such premises, we present here the approach followed for the implementation of the platform, managing the trade-off between the need from various professionals for accessing the complete dataset and the privacy requirements, as well as confidentiality maintenance for sensitive data of patients enrolled on the project.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Wali, Kaka, Bnar Karim Darwish y Shadan Jabbar Abdulfattah. "Security and confidentiality of information under the application of cloud accounting compared to traditional accounting". Journal of Economics and Administrative Sciences 28, n.º 134 (31 de diciembre de 2022): 186–204. http://dx.doi.org/10.33095/jeas.v28i134.2430.

Texto completo
Resumen
Due to the continuous development and transition from manual to electronic accounting methods, users are now finding that accounting is simpler and more convenient. The recent shift in accounting to a faster technology has greatly improved its ability to serve users. The research aims at a number of objectives, including getting to know cloud accounting and software-based accounting, comparing the services of the top ten cloud accounting service providers around the world in terms of security and confidentiality to understand how they differ from traditional accounting, and understanding the current impact of cloud accounting using insights from accounting experts. Primary data were collected from accounting experts from various academics and professionals. A questionnaire form has been prepared for this purpose. Secondary data were collected from annual reports, books, international journals, the Internet, and other sources. The information collected was helpful in understanding the concepts and their effectiveness. According to the results, cloud accounting is a much-preferred option over traditional accounting for any organization looking to compete due to its many benefits, including accessibility, affordability, high security, and ease of use. Further study is needed, recent advances in accounting not only help small and medium-sized businesses (SMEs) improve their efficiency but also provide significant cost savings. In such circumstances, it is necessary to ascertain whether companies and financial institutions such as banks that promote these trends in their operations bring clear benefits, as well as how this may affect the business future of newly established companies and institutions. This paper provides insight into cloud accounting in small and medium-sized businesses from a managerial accounting perspective. Paper type: Research paper
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Fernandez, Joseph y Mark Pearson. "Shield laws in Australia: Legal and ethical implications for journalists and their confidential sources". Pacific Journalism Review 21, n.º 1 (1 de mayo de 2015): 61. http://dx.doi.org/10.24135/pjr.v21i1.148.

Texto completo
Resumen
This article examines whether Australia’s current shield law regime meets journalists’ expectations and whistleblower needs in an era of unprecedented official surveillance capabilities. According to the peak journalists’ organisation, the Media, Entertainment and Arts Alliance (MEAA), two recent Australian court cases ‘despite their welcome outcome for our members, clearly demonstrate Australia’s patchy and disparate journalist shields fail to do their job’ (MEAA, 2014a). Journalists’ recent court experiences exposed particular shield law inadequacies, including curious omissions or ambiguities in legislative drafting (Fernandez, 2014c, p. 131); the ‘unusual difficulty’ that a case may present (Hancock Prospecting No 2, 2014, para 7); the absence of definitive statutory protection in three jurisdictions—Queensland, South Australia and the Northern Territory (Fernandez, 2014b, p. 26); and the absence of uniform shield laws where such law is available (Fernandez, 2014b, pp. 26-28). This article examines the following key findings of a national survey of practising journalists: (a) participants’ general profile; (b) familiarity with shield laws; (c) perceptions of shield law effectiveness and coverage; (d) perceptions of story outcomes when relying on confidential sources; and (e) concerns about official surveillance and enforcement. The conclusion briefly considers the significance and limitations of this research; future research directions; some reform and training directions; and notes that the considerable efforts to secure shield laws in Australia might be jeopardised without better training of journalists about the laws themselves and how surveillance technologies and powers might compromise source confidentiality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Putra, Tegar Islami, Akbar Jihadul Islam y Abdullah Mufti Abdul Rahman. "Integrating Islamic Laws into Indonesian Data Protection Laws: An Analysis of Regulatory Landscape and Ethical Considerations". Contemporary Issues on Interfaith Law and Society 3, n.º 1 (31 de enero de 2024): 85–118. http://dx.doi.org/10.15294/ciils.v3i1.78690.

Texto completo
Resumen
This study explores the intersection of personal data protection laws in Indonesia with Islamic principles, focusing on the regulatory landscape and ethical considerations surrounding data privacy. With the proliferation of digital technologies and data-driven processes, safeguarding personal information has become paramount. Drawing from legal frameworks, Islamic jurisprudence, and contemporary discussions on data privacy, this research investigates how Islamic principles inform and complement existing data protection measures in Indonesia. The analysis begins by examining the legal foundation of personal data protection in Indonesia, emphasizing key provisions of relevant legislation and constitutional mandates. It then delves into Islamic principles related to privacy, confidentiality, and ethical conduct, as derived from primary Islamic sources such as the Quran, Hadiths, and scholarly interpretations. The study evaluates the alignment between personal data protection laws and Islamic ethics, identifying areas of convergence and potential divergence. It explores the implications of Islamic principles for data handling practices, consent requirements, and accountability mechanisms within the Indonesian context. Furthermore, the research discusses the practical implications of integrating Islamic principles into data protection frameworks, considering challenges, opportunities, and best practices for ensuring compliance and ethical data governance. By bridging legal and ethical perspectives, this study contributes to a deeper understanding of personal data protection in Indonesia and offers insights into the role of Islamic principles in shaping contemporary approaches to privacy and confidentiality in the digital age. It underscores the importance of holistic and culturally approaches to data governance that respect both legal requirements and ethical norms derived from Islamic teachings.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Nikitkov, Alexei N., Dan N. Stone y Timothy C. Miller. "Internal Controls, Routine Activity Theory (RAT), and Sustained Online Auction Deception: A Longitudinal Analysis". Journal of Information Systems 28, n.º 1 (1 de enero de 2014): 311–37. http://dx.doi.org/10.2308/isys-50708.

Texto completo
Resumen
ABSTRACT This paper adapts and extends routine activity theory (RAT) to investigate the co-evolution of eBay's controls with mundane crime in the rapidly growing auction market of 1997–2005. A suspected deceptive seller's eight-year account history indicates the presence of the three market characteristics that RAT identifies as essential for deception: (1) a motivated offender, (2) suitable targets, and (3) an absence of capable guardians (i.e., regulation and eBay controls). The results document the co-evolution of a deceptive seller's tactics with eBay's controls. The investigation introduces (1) a new market, i.e., the early online auctions, (2) a new theory, i.e., RAT, and (3) new data, i.e., of a long-term deceptive seller, to the accounting controls literature. Contributions include tracing the evolving eBay control system, considering eBay's feedback system as an emergent form of continuous monitoring, and investigating the potential of RAT as an alternative theory for understanding control violations and informing accounting control analysis and design. Data Availability: The archival data are available from public sources. The primary data are available to scholars willing to sign agreements that protect the confidentiality of the sources.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Weinberg, Daniel H., John M. Abowd, Robert F. Belli, Noel Cressie, David C. Folch, Scott H. Holan, Margaret C. Levenstein et al. "Effects of a Government-Academic Partnership: Has the NSF-CENSUS Bureau Research Network Helped Improve the US Statistical System?" Journal of Survey Statistics and Methodology 7, n.º 4 (20 de diciembre de 2018): 589–619. http://dx.doi.org/10.1093/jssam/smy023.

Texto completo
Resumen
Abstract The National Science Foundation-Census Bureau Research Network (NCRN) was established in 2011 to create interdisciplinary research nodes on methodological questions of interest and significance to the broader research community and to the Federal Statistical System (FSS), particularly to the Census Bureau. The activities to date have covered both fundamental and applied statistical research and have focused at least in part on the training of current and future generations of researchers in skills of relevance to surveys and alternative measurement of economic units, households, and persons. This article focuses on some of the key research findings of the eight nodes, organized into six topics: (1) improving census and survey data-quality and data collection methods; (2) using alternative sources of data; (3) protecting privacy and confidentiality by improving disclosure avoidance; (4) using spatial and spatio-temporal statistical modeling to improve estimates; (5) assessing data cost and data-quality tradeoffs; and (6) combining information from multiple sources. The article concludes with an evaluation of the ability of the FSS to apply the NCRN’s research outcomes, suggests some next steps, and discusses the implications of this research-network model for future federal government research initiatives.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Ing-udomnoogoon, Kitcha. "Essays on Pharmaceutical Marketing with A Case Study Company". ABC Research Alert 6, n.º 3 (31 de diciembre de 2018): Thailand. http://dx.doi.org/10.18034/ra.v6i3.336.

Texto completo
Resumen
The objective of this thesis was to design a marketing strategy plan for a case company in Thailand. Due to confidentiality, the case company is blinded as Company X, who has also sponsored primary research surveys included in the study. The ideal outcome of this thesis was to design a marketing strategy plan to help the case company become a successful pharmaceutical company and strengthen topline business performance over the near future period in 2019-2021. Quantitative research methods were mainly used in this dissertation research. A single case study with two marketing hypotheses were utilized as research techniques. Primary survey pen-andpaper based questionnaires and the interviews were the major information sources of the empirical data for the research, complemented with secondary data sources. The theoretical framework aims to find knowledge for compiling the main elements of the marketing strategy plan in this thesis. A situation analysis and SWOT analysis of the case company were also presented in this thesis. The results of the thesis were tactical marketing plans and marketing strategies for Company X Thailand. Proposed marketing strategy plans were based on the internal and external analyses of the case company.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Ahmed, Omar Saad, Fay Fadhil, Laith H. Jasim Alzubaidi y Riyadh Al Al-Obaidi. "Fusion Processing Techniques and Bio-inspired Algorithm for E-Communication and Knowledge Transfer". Fusion: Practice and Applications 10, n.º 1 (2023): 143–55. http://dx.doi.org/10.54216/fpa.100109.

Texto completo
Resumen
This study suggests employing a dynamic natural and bio-inspired algorithm (DNBIA) to strengthen the confidentiality, integrity, and availability of digital information exchanges. You may think of the suggested method as a clever approach to Fusion Processing. Fusion Processing is the practice of combining and analyzing information from many databases. The efficiency and reaction time of e-communication systems may be increased by the use of the suggested DNBIA algorithm, which processes and integrates data from different sources. It is also possible to see the multi-objective optimization study presented in this work as a type of Fusion Processing. Cyberattacks and other types of computer security risks are the focus of this study, which seeks to optimize numerous objectives concurrently in order to eliminate them. The study can give a complete solution to improve the security of e-communication systems by combining different goals. The suggested method of enhancing e-communication and information transmission using DNBIA and multi-objective optimization analysis can be seen as a type of Fusion Processing. Efficient e-communication systems may be achieved by collecting data from a variety of sources and analyzing the results.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Wardana, I. Wayan Dody Putra, Ni Ketut Supasti Dharmawan y Ni Luh Gede Astariyani. "Legality for Electronic Signatures in Implementing Electronic Medical Records". JMMR (Jurnal Medicoeticolegal dan Manajemen Rumah Sakit) 12, n.º 3 (7 de diciembre de 2023): 366–78. http://dx.doi.org/10.18196/jmmr.v12i3.96.

Texto completo
Resumen
An electronic signature is an authentic marker to show a person's responsibility. Electronic signatures also ensure confidentiality, integrity, authorization, access control, and non-repudiation of information in electronic medical records. Therefore, this research was conducted to determine the legal aspects of electronic signatures in administering electronic medical records. This research used a qualitative method with a normative juridical approach. The research sources were based on laws, government regulations, journals, and other tertiary sources related to electronic signatures and electronic medical records in health facilities. Research findings illustrated that Minister of Health Regulation Number 24 of 2022 concerning medical records only defined electronic signatures as an authentication and verification of the security and privacy of medical record information. Electronic signatures are specifically regulated by Constitution Number 11 of 2008 concerning Information and Electronic Transactions and Government Regulation Number 71 of 2019 concerning Electronic Systems and Transaction Operators. Both certified and uncertified electronic signatures have legal legitimacy in their application in electronic medical records. However, how they are supported by evidence is what makes them different. Certified electronic signatures are more trustworthy than uncertified electronic signatures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Galea, Patrick. "Legal professional privilege—what do we make of it in jurisdiction Malta? Part 1". Trusts & Trustees 28, n.º 2 (23 de diciembre de 2021): 104–24. http://dx.doi.org/10.1093/tandt/ttab104.

Texto completo
Resumen
Abstract Malta is a European Union and Commonwealth Member, and among the family of the “mixed” jurisdictions, being a Civil Law jurisdiction with extensive Common Law experience. This article will assess Legal Professional Privilege in the small island state. The historical, domestic and contemporary ECHR/EU sources, along with other areas such as the sometimes-blurred distinction or overlapping between professional secrecy, confidentiality and Privilege and the jurisprudential contribution of the Maltese Courts, are reviewed. The review addresses ethical standards including the recommendations of the Council of European Bars, joint and common-interest Privilege, whether Privilege on legal advice in a foreign jurisdiction can be upheld, the situation of internal counsel and the “Iniquity Exception.” The conclusion is that Malta does not distinguish between legal advice and litigation Privilege but acknowledges and applies one-unitary privilege to encompass both.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Jannah, Raudatul y H. K. Marjo. "Etika Profesi Konselor dalam Layanan Bimbingan Konseling Virtual". Jurnal Paedagogy 9, n.º 1 (7 de enero de 2022): 55. http://dx.doi.org/10.33394/jp.v9i1.4556.

Texto completo
Resumen
The purpose of this study was to describe the professional ethics of counselors in virtual counseling guidance services. The method used in this research is a literature study with a qualitative descriptive approach. The data sources come from document studies in the form of books and previous research from various references. Furthermore, the data analysis technique used is descriptive analysis. The results of this study indicate that online counseling takes the form of virtual counseling technology, namely, websites, telephone or cell phones, email, video conferencing, chat, instant messaging, computers, and other social networks. The ethical aspects that must be obeyed by online counselors are building good relationships on the Internet, confidentiality when conducting consultations, legal aspects of telecommunications via the Internet, and licensing. Therefore, online counselors need to be professional in conducting virtual counseling by considering ethics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Sternberg, Kevan M., Stacy L. Loeb, David Canes, Laura Donnelly y Mitchell H. Tsai. "The use of Twitter to facilitate sharing of clinical expertise in urology". Journal of the American Medical Informatics Association 25, n.º 2 (7 de junio de 2017): 183–86. http://dx.doi.org/10.1093/jamia/ocx055.

Texto completo
Resumen
Abstract The use of social media in the urologic community is common and increasing. Although the potential benefits of platforms like Twitter have been described in the literature, the use of social media in the clinical context of Urology has not been explored. In this case report, we describe how we used Twitter to share ideas about the clinical management of a complex urologic patient. By posting a clinical scenario, a timely discussion was generated with global participation and expert suggestions. This knowledge was applied to the surgical management of a patient with positive clinical outcomes. The ability of Twitter to facilitate rapid communication with a wide network of contributors makes it a potentially useful tool for clinical decision making. Care must be taken to ensure patient confidentiality and caution used appropriately when evaluating the sources and content of the clinical information shared.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Axelrod, Robert Michael. "Criminality and suspicious activity reports". Journal of Financial Crime 24, n.º 3 (3 de julio de 2017): 461–71. http://dx.doi.org/10.1108/jfc-03-2017-0019.

Texto completo
Resumen
Purpose This paper aims to suggest alternative suspicious activity analyses to improve the focus of financial institution reporting to law enforcement and to identify some limitations in the current practice. Design/methodology/approach This paper employs the consideration of US and Financial Action Task Force policies and text sources of suspicious activity reporting in the anti-money laundering context in light of how the reports are used. Furthermore, there is consideration of confidentiality and privacy constraints on public and private sector in assessing strategies to make the reporting process more effective and aiding the discovery and investigation of crime. Findings The current suspicious activity reporting process takes advantage of the business acumen of financial institutions to identify unusual or unexplained behavior that may assist law enforcement in criminal investigations and prosecutions. It is successful in that regard. However, the process has not been tuned to identifying criminal behavior through systematic feedback. As an alternative to feedback, analysis of criminal organizations vis-à-vis the transactions that flow through a reporting institution is suggested as a means to creating better tuning. The analysis could be accomplished either by law enforcement or by select institutions; but in either case, hurdles of confidentiality and/or privacy would have to be overcome. Originality/value Creating a process for law enforcement and/or reporting institutions to map known criminal activity on a transaction set would allow a new assessment of the role of financial institutions in this regard, and may allow policymakers to reassess whether the financial institutions’ efforts currently required would be more productive if redirected to focus more on criminal as opposed to merely suspicious activity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Benrhouma, Oussama, Ahmad B. Alkhodre, Ali AlZahrani, Abdallah Namoun y Wasim A. Bhat. "Using Singular Value Decomposition and Chaotic Maps for Selective Encryption of Video Feeds in Smart Traffic Management". Applied Sciences 12, n.º 8 (13 de abril de 2022): 3917. http://dx.doi.org/10.3390/app12083917.

Texto completo
Resumen
Traffic management in a smart city mainly relies on video feeds from various sources such as street cameras, car dash cams, traffic signal cameras, and so on. Ensuring the confidentiality of these video feeds during transmission is necessary. However, due to these devices’ poor processing power and memory capacity, the applicability of traditional encryption algorithms is not feasible. Therefore, a selective encryption system based on singular value decomposition (SVD) and chaotic maps is presented in this study. The proposed cryptosystem can be used in smart traffic management. We apply SVD to identify the most significant parts of each frame of the video feed for encryption. Chaotic systems were deployed to achieve high diffusion and confusion properties in the resulted cipher. Our results suggest that the computational overhead is significantly less than that of the traditional approaches with no compromise on the strength of the encryption.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía