Littérature scientifique sur le sujet « Confidentiality of sources »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Confidentiality of sources ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Confidentiality of sources"

1

Emslie, J. A., et P. Christie. « Confidentiality for doctors with AIDS. Official sources maintained confidentiality. » BMJ 307, no 6903 (28 août 1993) : 566. http://dx.doi.org/10.1136/bmj.307.6903.566-a.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Harala, Riitta, et Anna-Leena Reinikainen. « Confidentiality in the use of administrative data sources ». Statistical Journal of the United Nations Economic Commission for Europe 13, no 4 (1 décembre 1996) : 361–68. http://dx.doi.org/10.3233/sju-1996-13404.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Alexander, Laurence B. « Civil Liability for Journalists Who Violate Agreements of Confidentiality with Sources ». Newspaper Research Journal 14, no 3-4 (juin 1993) : 45–59. http://dx.doi.org/10.1177/073953299301400306.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

WOLANIUK, Leszek. « SELECTED PROBLEMS OF SECURITY OF INFORMATION CONFIDENTIALITY IN CYBERSPACE ». Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no 4 (2 octobre 2017) : 194–207. http://dx.doi.org/10.5604/01.3001.0010.7228.

Texte intégral
Résumé :
Information confidentiality is the one of the cornerstones of IT security, which is defined and described in ISO/IEC 27000 standard. Contemporary practices of disclosing information to unauthorized persons and systems are the reason for difficulties in this concept implementation. At every step we encounter situations where information is extracted or obtained illegally from different sources. The main purpose of this paper is to present the issue of information confidentiality protection in cyberspace, as a complex, full of contradictions problem of techno-social character. The role of information confidentiality in functioning of a society, organization and individual has been described. The most important information confidentiality threats have been characterized and the description of a number of incidents illustrating those threats has been quoted. Contemporary security threats have been presented as well as selected methods of information confidentiality protection transmitted in ICT networks. The characteristics of protection systems of information confidentiality have been analyzed, with special attention paid to their functionality and vulnerability to existing threats. The concept of protecting the confidentiality of information transmitted on the Internet based on the use of cryptography and steganography has been presented.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gassaway, Bob M. « Are Secret Sources in the News Media Really Necessary ? » Newspaper Research Journal 9, no 3 (mars 1988) : 69–77. http://dx.doi.org/10.1177/073953298800900307.

Texte intégral
Résumé :
Fifteen people who said they had acted as confidential news sources for journalists were interviewed Most said they had been providing confidential information for years as a way of letting the public know things. A majority of the sources said journalists faced with pressure to identify their sources should “ask me to reconsider an agreement” of confidentiality.
Styles APA, Harvard, Vancouver, ISO, etc.
6

McHone-Chase, Sarah. « Sources : Privacy and Confidentiality Issues : A Guide for Libraries and Their Lawyers ». Reference & ; User Services Quarterly 49, no 1 (1 septembre 2009) : 104. http://dx.doi.org/10.5860/rusq.49n1.104.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Fernandez, Joseph M. « Pass the Source—Journalism’s Confidentiality Bane in the Face of Legislative Onslaughts ». Asia Pacific Media Educator 27, no 2 (25 octobre 2017) : 202–18. http://dx.doi.org/10.1177/1326365x17728822.

Texte intégral
Résumé :
‘Journalism under siege’ proclaimed the cover of The Walkley Magazine, an Australian publication dedicated to promoting journalism excellence in its March 2017 issue. This headline reflects the severe disruption journalism is experiencing globally. Facts used to be facts and news was news but now we have ‘alternative facts’ and ‘fake news’ (Media Watch, 2017). Against this backdrop, a persistent dilemma for journalism has been the impact of the law on journalists relying on confidential sources who play a critical part in providing access to information. The journalism profession’s apparent source protection gains have been undermined by legislative and other assaults, and it has had a chilling effect on journalists’ contacts with confidential sources. The Australian journalists’ union, the Media Alliance, has warned that ‘it is only a matter of time’ before a journalist is convicted for refusing to disclose a confidential source (Murphy, 2017, p. 3). This article builds on earlier work examining how Australian journalists are coping in their dealings with confidential sources. This article (a) reports on the findings from an Australian study into journalists’ confidential sources and (b) identifies lessons and reform potentials arising from these findings.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ainsworth, Frank, et Patricia Hansen. « Confidentiality in child protection cases Who benefits ? » Children Australia 35, no 3 (2010) : 11–17. http://dx.doi.org/10.1017/s1035077200001127.

Texte intégral
Résumé :
Child protection legislation in every Australian state and territory prohibits the disclosure of the identity of a person who acts as a mandatory reporter. There is also provision in most child protection legislation that prevents the naming of children and families in protection cases. It is argued that disclosure is not in the interests of the child, the family or the general public. Children's Court proceedings in most states and territories in Australia are closed to the public so that, unlike in most other jurisdictions, interested parties are not able to observe the proceedings. Child protection authorities also have considerable power to collect information about children and families from many sources. This power to obtain information is compounded by legislation which removes confidentiality provisions from professional codes of ethics. Furthermore, the rules of evidence do not ordinarily apply in the Children's Court. This article uses New South Wales as the exemplar state and raises questions about all of these issues.
Styles APA, Harvard, Vancouver, ISO, etc.
9

SHAHBAZYAN, K. « Contractual and legal regulation of preservation of results of scientific research in confidentiality and use of such information in case of research and development : practices of EU and countries of the world ». INFORMATION AND LAW, no 4(39) (9 décembre 2021) : 202–13. http://dx.doi.org/10.37750/2616-6798.2021.4(39).249362.

Texte intégral
Résumé :
The article analyzes the category of agreements in the field of research and development – non-disclosure agreements (confidentiality agreements), provides examples of such agreements with different sources of funding; as well as there are being considered the wordings of confidentiality provisions in general agreements for research and development – the article compares the practice of application of these provisions in the EU and countries of the world. The requirements are considered for settling the issues of protection of intellectual property rights in the aspect of confidentiality and distribution of rights to use the information, obtained during the research in the project, use of such info during the further researches and granting access rights to such information to third parties. Aspects that should be included in similar types of agreements in Ukraine are proposed.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Białkowska, Paula Maria. « Legal and Ethical Grounds of Professional Secrecy of a Lawyer in Selected European Union Countries and in the United States of America ». Review of European and Comparative Law 45, no 2 (16 juin 2021) : 77–103. http://dx.doi.org/10.31743/recl.11456.

Texte intégral
Résumé :
The subject of the article is professional secrecy in practicing the legal profession in American law, with the indication of some differences resulting from separate laws of different states, and in the European Union – taking into account a few exemplary countries. Its sources were described – both legal and ethical, as well as the definition and construction. Confidentiality has been included in the objective and subjective aspect, taking into account different views in the doctrine as to its scope. Bearing in mind the basic right from which professional secrets derive – the right to privacy – the article also includes some of its aspects related to confidentiality.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Confidentiality of sources"

1

Zemmouri, Catherine. « La protection du secret des sources du journaliste ». Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.

Texte intégral
Résumé :
La liberté d’expression et de communication est une liberté fondamentale est un des éléments clé de la démocratie. Elle est donc à ce titre depuis longtemps protégée, pourtant l’un de ses piliers, la protection du secret des sources du journaliste a longtemps été ignorée et n’est aujourd’hui encore qu’imparfaitement reconnue. Cet état de fait est principalement lié à des raisons politiques. Ce refus et cette reconnaissance partielle et tardive s’expliquent beaucoup par le fait que les enquêtes journalistiques d’intérêt public peuvent viser potentiellement des hommes politiques. Une reconnaissance imparfaite qui peut être aujourd’hui neutralisée par les moyens modernes de surveillance de plus en plus performants tel que le logiciel Pegasus. Cette bataille, qui oppose les journalistes aux pouvoirs publics, aux grandes entreprises privées voire aux organisations criminelles cherchant à connaître la source d’une enquête journalistique, est particulièrement déséquilibrée. Ce qui explique pourquoi malgré les décisions constamment favorables de la CEDH concernant la protection des sources le modèle français laisse toujours à désirer. Pourtant, une réelle protection serait possible, il n’est qu’à observer ce qui existe dans certains États comme la Belgique ou la protection des sources est effective et exemplaire. Cette évolution du modèle français est plus que nécessaire, car comme l’affirme la Cour européenne des droits de l’Homme, les journalistes sont « les chiens de garde » de la démocratie
Freedom of expression and communication is a fundamental right, and one of the key elements of a democracy. For this reason, it has been protected for a long time. However, one of its pillars, the protection of the confidentiality of a journalist's sources, has for a long time been ignored, and even today is not completely recognized in France. This state of affairs is mainly due to political factors. This refusal to acknowledge, and this partial and tardy recognition, can be largely explained by the fact that investigative reporting, in the public interest, can potentially target politicians. Furthermore, even a partial recognition of this right can be neutralised by increasingly sophisticated modern methods of surveillance, such as the Pegasus computer program. Journalists find themselves on an uneven playing field when they seek to take on public authorities, big business or indeed organised criminal groups who want to uncover the sources behind an investigative report. This is why the French system falls short, despite a ruling by the European Court of Human Rights (ECHR) in favour of protecting journalists' sources. However, a proper protection of these sources is well within the bounds of possibility. One has only to look as far as Belgium, where an effective and exemplary system is in place. An overhaul of the French system is well overdue, because, as the ECHR puts it, journalists are the vanguards of a democracy
Styles APA, Harvard, Vancouver, ISO, etc.
2

Van, Assche Gilles. « Information-Theoretic aspects of quantum key distribution ». Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211050.

Texte intégral
Résumé :

La distribution quantique de clés est une technique cryptographique permettant l'échange de clés secrètes dont la confidentialité est garantie par les lois de la mécanique quantique. Le comportement particulier des particules élémentaires est exploité. En effet, en mécanique quantique, toute mesure sur l'état d'une particule modifie irrémédiablement cet état. En jouant sur cette propriété, deux parties, souvent appelées Alice et Bob, peuvent encoder une clé secrète dans des porteurs quantiques tels que des photons uniques. Toute tentative d'espionnage demande à l'espion, Eve, une mesure de l'état du photon qui transmet un bit de clé et donc se traduit par une perturbation de l'état. Alice et Bob peuvent alors se rendre compte de la présence d'Eve par un nombre inhabituel d'erreurs de transmission.

L'information échangée par la distribution quantique n'est pas directement utilisable mais doit être d'abord traitée. Les erreurs de transmissions, qu'elles soient dues à un espion ou simplement à du bruit dans le canal de communication, doivent être corrigées grâce à une technique appelée réconciliation. Ensuite, la connaissance partielle d'un espion qui n'aurait perturbé qu'une partie des porteurs doit être supprimée de la clé finale grâce à une technique dite d'amplification de confidentialité.

Cette thèse s'inscrit dans le contexte de la distribution quantique de clé où les porteurs sont des états continus de la lumière. En particulier, une partie importante de ce travail est consacrée au traitement de l'information continue échangée par un protocole particulier de distribution quantique de clés, où les porteurs sont des états cohérents de la lumière. La nature continue de cette information implique des aménagements particuliers des techniques de réconciliation, qui ont surtout été développées pour traiter l'information binaire. Nous proposons une technique dite de réconciliation en tranches qui permet de traiter efficacement l'information continue. L'ensemble des techniques développées a été utilisé en collaboration avec l'Institut d'Optique à Orsay, France, pour produire la première expérience de distribution quantique de clés au moyen d'états cohérents de la lumière modulés continuement.

D'autres aspects importants sont également traités dans cette thèse, tels que la mise en perspective de la distribution quantique de clés dans un contexte cryptographique, la spécification d'un protocole complet, la création de nouvelles techniques d'amplification de confidentialité plus rapides à mettre en œuvre ou l'étude théorique et pratique d'algorithmes alternatifs de réconciliation.

Enfin, nous étudions la sécurité du protocole à états cohérents en établissant son équivalence à un protocole de purification d'intrication. Sans entrer dans les détails, cette équivalence, formelle, permet de valider la robustesse du protocole contre tout type d'espionnage, même le plus compliqué possible, permis par les lois de la mécanique quantique. En particulier, nous généralisons l'algorithme de réconciliation en tranches pour le transformer en un protocole de purification et nous établissons ainsi un protocole de distribution quantique sûr contre toute stratégie d'espionnage.

Quantum key distribution is a cryptographic technique, which allows to exchange secret keys whose confidentiality is guaranteed by the laws of quantum mechanics. The strange behavior of elementary particles is exploited. In quantum mechnics, any measurement of the state of a particle irreversibly modifies this state. By taking advantage of this property, two parties, often called Alice and bob, can encode a secret key into quatum information carriers such as single photons. Any attempt at eavesdropping requires the spy, Eve, to measure the state of the photon and thus to perturb this state. Alice and Bob can then be aware of Eve's presence by a unusually high number of transmission errors.

The information exchanged by quantum key distribution is not directly usable but must first be processed. Transmission errors, whether they are caused by an eavesdropper or simply by noise in the transmission channel, must be corrected with a technique called reconciliation. Then, the partial knowledge of an eavesdropper, who would perturb only a fraction of the carriers, must be wiped out from the final key thanks to a technique called privacy amplification.

The context of this thesis is the quantum key distribution with continuous states of light as carriers. An important part of this work deals with the processing of continuous information exchanged by a particular protocol, where the carriers are coherent states of light. The continuous nature of information in this case implies peculiar changes to the reconciliation techniques, which have mostly been developed to process binary information. We propose a technique called sliced error correction, which allows to efficiently process continuous information. The set of the developed techniques was used in collaboration with the Institut d'Optique, Orsay, France, to set up the first experiment of quantum key distribution with continuously-modulated coherent states of light.

Other important aspects are also treated in this thesis, such as placing quantum key distribution in the context of a cryptosystem, the specification of a complete protocol, the creation of new techniques for faster privacy amplification or the theoretical and practical study of alternate reconciliation algorithms.

Finally, we study the security of the coherent state protocol by analyzing its equivalence with an entanglement purification protocol. Without going into the details, this formal equivalence allows to validate the robustness of the protocol against any kind of eavesdropping, even the most intricate one allowed by the laws of quantum mechanics. In particular, we generalize the sliced error correction algorithm so as to transform it into a purification protocol and we thus establish a quantum key distribution protocol secure against any eavesdropping strategy.


Doctorat en sciences appliquées
info:eu-repo/semantics/nonPublished
Styles APA, Harvard, Vancouver, ISO, etc.
3

Fujdiak, Radek. « Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice ». Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.

Texte intégral
Résumé :
Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Medeiros, Damian J. A. « "According to my sources..." A proposed constitutional framework for adjudicating reporter-source confidentiality in Canada ». 2009. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=958046&T=F.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Confidentiality of sources"

1

Great Britain. Office of Population Censuses and Surveys. Library., dir. Privacy, confidentiality and data protection : Source works in OPCS library. London : OPCS, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

J, Schanz Stephen, Wilson Petra, Essential Drugs and Technology Program (Pan American Health Organization), Pan American Sanitary Bureau et World Health Organization, dir. The regulation of privacy and data protection in the use of electronic health information : An international perspective and reference source on regulatory and legal issues related to person-identifiable health databases. Washington, D.C : Essential Drugs and Technology Program, Division of Health Systems and Services Development, Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, 2001.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Carlson, Matt. “Journalism on Trial” : Confidentiality and the Plame Leak Case. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252035999.003.0006.

Texte intégral
Résumé :
This chapter examines the fallout caused by Robert Novak's July 2003 column revealing Valerie Plame, wife of Bush administration critic Joseph Wilson, to be a CIA operative. The potential illegality of the leak prompted an inquiry that escalated into a grand jury investigation by a special prosecutor to uncover Novak's two unnamed administration sources. When journalists were subpoenaed to testify before the grand jury, Matt Cooper of Time and Judith Miller of the Times resisted vocally and litigiously. Legendary Post reporter Bob Woodward also faced criticism for failing to reveal his knowledge of the Plame leak. The Plame leak case culminated in a parade of elite journalists testifying about their relationships with official sources in the trial of vice presidential aide Scooter Libby.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fried, Adam L., et Celia B. Fisher. Emerging Ethical and Legal Issues in Clinical Child and Adolescent Psychology. Sous la direction de Thomas H. Ollendick, Susan W. White et Bradley A. White. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190634841.013.9.

Texte intégral
Résumé :
Clinical practice and research with children and adolescents diagnosed with mental health conditions can raise complex ethical questions that touch on fundamental tensions between core ethical principles, such as autonomy, beneficence, and nonmaleficence. This chapter focuses on three dynamic ethics areas that often raise complex ethical questions in child and adolescent clinical psychology: (a) informed consent and assent policies and procedures; (b) confidentiality policies and disclosure decision-making; and (c) developing and maintaining competence. Traditional ethics sources, such as professional codes, laws and regulations, and professional guidelines, are discussed; evidence-based ethics approaches are examined that, in conjunction with traditional ethics sources, can provide contextual information to inform ethical decision-making and help psychologists tailor procedures to specific participant/client populations and/or settings.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Veatch, Robert M., Amy Haddad et E. J. Last. Experimentation on Human Subjects. Sous la direction de Robert M. Veatch, Amy Haddad et E. J. Last. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190277000.003.0016.

Texte intégral
Résumé :
This chapter examines ethical issues in research involving human subjects. The Nuremberg trials, which exposed to all humankind the outrageous things that could be done in the name of medical science, led to the Nuremberg Code, the first international document from public sources setting out an ethic for research on human subjects. Basic differences are outlined between the goals of therapy for the good of a patient and those of research that focus on attainment of knowledge and the good of society. To protect the interests of human subjects who take part in research, guidelines such as the Declaration of Helsinki have been established for assessing risks and benefits, voluntary consent, protection of privacy and confidentiality, and equity in subject selection. The chapter focuses on the difficulty in calculating harms and benefits to subjects and challenges of obtaining informed consent for participation in research.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Adams, Helen R. Protecting Intellectual Freedom and Privacy in Your School Library. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798216002253.

Texte intégral
Résumé :
Written by a well-known intellectual freedom advocate, this book is a one-stop source for school librarians on intellectual freedom and privacy issues that blends principles with best practices. In order to sort out fact from fiction and become effective, critically thinking adults in a global society, children need access to diverse points of view from authoritative sources in their school libraries. This book provides school librarians with easy-to-read guidance on specific aspects of intellectual freedom and privacy, explaining how the core values of the library profession translate into everyday practice. The readings supply current information and targeted, practical advice on a broad range of topics, including privacy and confidentiality in the context of a school library; working with homeless students, English language learners, and other special needs students; challenges to school library materials; filtering issues; and advocacy for intellectual freedom. Each of the nine chapters begins with an introductory essay examining the topic and concludes with a "key ideas" summary; a list of annotated resources to lead the reader to more information on the individual column topics; and discussion questions. The volume's appendices include the text of the ALA Library Bill of Rights and the Code of Ethics as well as an annotated list of pro-First Amendment and privacy protecting organizations with contact information.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Veatch, Robert M., Amy Haddad et E. J. Last. Case Studies in Pharmacy Ethics. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190277000.001.0001.

Texte intégral
Résumé :
The third edition of Case Studies in Pharmacy Ethics presents a comprehensive series of cases faced by pharmacists that raise ethical issues, with chapters arranged in a manner that simultaneously presents the topics that would be covered in a course on ethical theory. After an introduction, the book is divided into three parts. The introduction takes up four basic issues in ethical theory: the source, meaning, and justification of ethical claims; the two major ways of determining if acts are morally right; how moral rules apply to specific situations; and what ought to be done in specific cases. Part I deals with conceptual issues. Chapter 1 presents a five-step model the pharmacist can use for ethical problem solving. Chapter 2 addresses identification of value judgments in pharmacy and separation of ethical from nonethical value judgments. Chapter 3 looks at where the pharmacist should turn to find the source of ethical judgments. Part II presents cases organized around the major principles of ethics: beneficence and nonmaleficence, justice and the allocation of resources, autonomy, veracity (dealing honestly with patients), fidelity (including confidentiality), and avoidance of killing. Part III presents cases organized around topics that present ethical controversy: abortion, sterilization, and contraception; genetics and birth technologies; and mental health and behavior control. The remaining chapters cover drug formularies and drug distribution systems; health insurance, health system planning, and rationing; pharmaceutical research; consent to drug therapies; and terminally ill patients. The book includes links to professional codes of ethics and a glossary.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Powers, Michael, et Anthony Barton. Clinical Negligence. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781526521552.

Texte intégral
Résumé :
"I would highly recommend this book...It is high quality, clear and comprehensive and will no doubt prove an invaluable source of reference. Five stars on all counts." Tim Kevan, co-editor, PIBULJ.COM This book remains the only text of its kind to cover both the medical and legal aspects of medical negligence. Written by a team of more than 60 experts, it continues to provide the most comprehensive and authoritative guidance on all aspects of clinical negligence claims, from bringing an action for damages to presenting expert evidence in court. It also includes detailed consideration of funding and cost implications. Those needing clear guidance to make the best possible preparations for an action will find all they need here. The new 6th edition has been fully revised and restructured, including new chapters on the future of clinical negligence litigation, cardiology, gynaecology, obstetrics, haematology , and also includes coverage and analysis of recent key cases such as: - Williams v Bermuda Hospitals [2016] UKPC 4 (causation) - R (on the application of Maughan) v HM Senior Coroner for Oxfordshire [2020] UKSC 46 (suicide in inquests) - Darnleyv Croydon Health Authority [2018] UKSC 50 (duty of care owed by receptionist) - ABC v St George's Hosp [2020] EWHC 455 (Huntington's chorea confidentiality) - Swift v Carpenter [2020] EWCA Civ 1295 (future accommodation costs) - Whittington Hospital NHS Trust v XX [2020] UKSC 14 (damages for surrogacy) -Khan v Meadows [2021] UKSC 21 (scope of duty of care) -Nguyen v HM Assistant Coroner for Inner West London [2021] EWHC 3354 (sufficiency of inquiry) Easy-to-access structure The new edition maintains its easy-to-access, two-part structure. The first part, set out in 16 chapters, deals with legal aspects of medical malpractice, including complaints procedures, poor performance and medical professional governance, preparation of medical evidence, settlements and trial. There are also chapters on product liability, and coronial law. The final 27 chapters in the second part cover the risks associated with particular areas of specialist medical practice. This title is included in Bloomsbury Professional's Clinical Negligence online service.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Schanz, Stephen J., P. Wilson et R. J. Rodrigues. Regulation of Privacy and Data Protection in the Use of Electronic Health Information : An International Perspective and Reference Source on Regulatory and Legal Issues Related to Person-identifiable Health Databases. Pan American Health Organization (PAHO), 2001.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Confidentiality of sources"

1

Pearson, Mark. « Confidentiality, secrets, sources and disclosure ». Dans The Communicator's Guide to Media Law and Ethics, 142–74. London : Routledge, 2023. http://dx.doi.org/10.4324/9781003372752-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Reymond-Eniaeva, Elza. « Sources ». Dans Towards a Uniform Approach to Confidentiality of International Commercial Arbitration, 5–27. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19003-3_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Schulz, David A., et Valerie Belair-Gagnon. « 6. Rescuing A Reporter’S Right To Protect The Confidentiality Of Sources ». Dans Journalism After Snowden, sous la direction de Emily Bell et Taylor Owen, 97–113. New York Chichester, West Sussex : Columbia University Press, 2017. http://dx.doi.org/10.7312/bell17612-009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ghirelli, Corinna, Samuel Hurtado, Javier J. Pérez et Alberto Urtasun. « New Data Sources for Central Banks ». Dans Data Science for Economics and Finance, 169–94. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66891-4_8.

Texte intégral
Résumé :
AbstractCentral banks use structured data (micro and macro) to monitor and forecast economic activity. Recent technological developments have unveiled the potential of exploiting new sources of data to enhance the economic and statistical analyses of central banks (CBs). These sources are typically more granular and available at a higher frequency than traditional ones and cover structured (e.g., credit card transactions) and unstructured (e.g., newspaper articles, social media posts, or Google Trends) sources. They pose significant challenges from the data management and storage and security and confidentiality points of view. This chapter discusses the advantages and the challenges that CBs face in using new sources of data to carry out their functions. In addition, it describes a few successful case studies in which new data sources have been incorporated by CBs to improve their economic and forecasting analyses.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Stenbeck, Magnus, Sonja Eaker Fält et Jane Reichel. « Swedish Law on Personal Data in Biobank Research : Permissible But Complex ». Dans GDPR and Biobanking, 379–94. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_21.

Texte intégral
Résumé :
AbstractThis chapter describes the regulatory and organisational infrastructure of biobank research in Sweden, and how the introduction of the GDPR affects the possibilities to use biobank material in future research. The Swedish legislator has chosen a rather minimalistic approach in relation to the research exception in Article 89 GDPR and has only enacted limited general exceptions to the data protection rules. This may be partly explained by the comprehensive right to public access to official documents which gives researchers vast access to information held in registries, albeit conditioned on abiding by secrecy and confidentiality rules. The Swedish legislation implementing the GDPR includes a general exception from the data protection rules in relation to the right to access to official documents, which researchers also benefit from. However, confidentiality rules for different categories of information differ between sectors, which hinders an effective use of the registries in research. The regulatory regime for using biobank and registry data in Sweden thus involves both data protection and secrecy rules, which makes the legal landscape permissible but complex. The operationalisation of the research exception in Article 89 GDPR is analysed against this background. Special attention is given to the possibility to link personal information derived from biobanks with personal information from other data sources, including large national population based statistical registries as well as information from national clinical registers.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Boldrin, Luca, Giovanni Paolo Sellitto et Jaak Tepandi. « TOOP Trust Architecture ». Dans The Once-Only Principle, 126–40. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79851-2_7.

Texte intégral
Résumé :
AbstractWhile information security nowadays represents a core concern for any organization, Trust Management is usually less elaborated and is only important when two or more organizations cooperate towards a common objective. The overall Once-Only Principle Project (TOOP) architecture relies on the concept of trusted sources of information and on the existence of a secure exchange channel between the Data Providers and the Data Consumers in this interaction framework. Trust and information security are two cross-cutting concerns of paramount importance. These two concerns are overlapping, but not identical and they span all of the interoperability layers, from the legal down to the technical, passing through organizational and semantic layers. While information security aims at the preservation of confidentiality, integrity and availability of information, trust establishment guarantees that the origin and the destination of the data and documents are authentic (authenticity) and trustworthy (trustworthiness), and that data and documents are secured against any modification by untrusted parties (integrity). In this chapter, the TOOP Trust Architecture is presented, starting from a simple abstract model of interaction between two agents down to the detailed end-to-end trust establishment architecture, modeled onto the Toop Reference Architecture presented in the previous chapter.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Medhane, Darshan V., et Arun Kumar Sangaiah. « Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for Wireless Networks ». Dans Advances in Intelligent Systems and Computing, 347–55. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13731-5_38.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Lasorsa, Dominic L. « Sources, Confidentiality of ». Dans Encyclopedia of International Media and Communications, 193–203. Elsevier, 2003. http://dx.doi.org/10.1016/b0-12-387670-2/00267-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Fernandez, Joseph M. « Journalist-source confidentiality practice rules ». Dans Journalists and Confidential Sources, 87–109. Routledge, 2020. http://dx.doi.org/10.4324/9781003035411-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Pearson, Mark, et Mark Polden. « Keeping secrets : Confidentiality and sources ». Dans The Journalist’s Guide to Media Law, 311–52. Routledge, 2020. http://dx.doi.org/10.4324/9781003117995-13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Confidentiality of sources"

1

Tenorio, Viviane, Leonardo Souza, Maxwell Albuquerque, Rodolfo Marinho, Matteus Silva et Andrey Brito. « Low-Cost, Practical Data Confidentiality Support for IoT Data Sources ». Dans 2019 IX Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2019. http://dx.doi.org/10.1109/sbesc49506.2019.9046097.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Nashed, Nashaat, et Roman Fedorov. « Constitutional pronection of personal data – a case study of data confidentiality in Egyptian banks ». Dans Development of legal systems in Russia and foreign countries : problems of theory and practice. ru : Publishing Center RIOR, 2021. http://dx.doi.org/10.29039/02061-6-201-211.

Texte intégral
Résumé :
The research paper includes exposure to the constitutional protection of personal data, which is one of the most important peculiarities of legal personality. We will continue to clarify the uses of data in dealing with digital banks to avoid the risks of breaching them, in confirmation of the constitutional texts that protect them. Uses of personal data outside geographical boundaries require specific legislative texts to protect the rights of the customer, and this is what was recently stipulated in Egyptian legislation. Big data is important in decision-making, especially economic decisions. This is why I spoke about its definition, sources, classification and importance in promoting sustainable development goals. The research was divided into two sections as follows: «The first topic: Constitutional protection of data confidentiality in Egyptian law», «Banks compete in big data».
Styles APA, Harvard, Vancouver, ISO, etc.
3

Mikštienė, Ruta, et Violeta Keršulienė. « Legal decision support system application possibility in corporate governance ». Dans Business and Management 2016. VGTU Technika, 2016. http://dx.doi.org/10.3846/bm.2016.39.

Texte intégral
Résumé :
Decision-making that must be supported by specific information or reasoning extensively relies on decision support systems, capable of handling data from multiple sources. Most decision-makers seek to find cost-effective solutions, i.e. mainly focusing on most efficient solutions in economic terms, consequently, it is the economic information that is basically processed and offered for decision-making process by decision support systems, along with economic models. Though businesses focus on the most rational solutions to the management process, other criteria also play an important role, including time costs, confidentiality, and friendly relations with service users, customers, partners and government agencies, etc., thus management decision-making may successfully rely on legal decision support systems. The article presents an overview of legal decision support systems and their potential as regards their application in addressing a wide array of business management issues. The article also focuses on the selection and screening of indicators critical to decision-making, and offers a potential structure for management decision- making.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Absi-Halabi, Nour J., et Ali A. Yassine. « Optimal Release Planning Using Machine Learning and Linear Integer Programming for Ideas in a Crowdsourcing Platform ». Dans ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-68177.

Texte intégral
Résumé :
Abstract Obtaining and analyzing customer and product information from various sources has become a top priority for major competitive companies who are striving to keep up with the digital and technological progress. Therefore, the need for creating a crowdsourcing platform to collect ideas from different stakeholders has become a major component of a company’s digital transformation strategy. However, these platforms suffer from problems that are related to the voluminous and vast amount of data. Different large sets of data are being spurred in these platforms as time goes by that render them unbeneficial. The aim of this paper is to propose a solution on how to discover the most promising ideas to match them to the strategic decisions of a business regarding resource allocation and product development (PD) roadmap. The paper introduces a 2-stage filtering process that includes a prediction model using a Random Forest Classifier that predicts ideas most likely to be implemented and a resource allocation optimization model based on Integer Linear Programming that produces an optimal release plan for the predicted ideas. The model was tested using real data on an idea crowdsourcing platform that remains unnamed in the paper due to confidentiality. Our prediction model has proved to be 92% accurate in predicting promising ideas and our release planning optimization problem results were found out to be 85% accurate in producing an optimal release plan for ideas.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Weiland, Nathan T., Blake W. Lance et Sandeep R. Pidaparti. « sCO2 Power Cycle Component Cost Correlations From DOE Data Spanning Multiple Scales and Applications ». Dans ASME Turbo Expo 2019 : Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/gt2019-90493.

Texte intégral
Résumé :
Abstract Supercritical CO2 (sCO2) power cycles find potential application with a variety of heat sources including nuclear, concentrated solar (CSP), coal, natural gas, and waste heat sources, and consequently cover a wide range of scales. Most studies to date have focused on the performance of sCO2 power cycles, while economic analyses have been less prevalent, due in large part to the relative scarcity of reliable cost estimates for sCO2 power cycle components. Further, the accuracy of existing sCO2 techno-economic analyses suffer from a small sample set of vendor-based component costs for any given study. Improved accuracy of sCO2 component cost estimation is desired to enable a shift in focus from plant efficiency to economics as a driver for commercialization of sCO2 technology. This study reports on sCO2 component cost scaling relationships that have been developed collaboratively from an aggregate set of vendor quotes, cost estimates, and published literature. As one of the world’s largest supporters of sCO2 research and development, the Department of Energy (DOE) National Laboratories have access to a considerable pool of vendor component costs that span multiple applications specific to each National Laboratory’s mission, including fossil-fueled sCO2 applications at the National Energy Technology Laboratory (NETL), CSP at the National Renewable Energy Laboratory (NREL), and CSP, nuclear, and distributed energy sources at Sandia National Laboratories (SNL). The resulting cost correlations are relevant to sCO2 components in all these applications, and for scales ranging from 5–750 MWe. This work builds upon prior work at SNL, in which sCO2 component cost models were developed for CSP applications ranging from 1–100 MWe in size. Similar to the earlier SNL efforts, vendor confidentiality has been maintained throughout this collaboration and in the published results. Cost models for each component were correlated from 4–24 individual quotes from multiple vendors, although the individual cost data points are proprietary and not shown. Cost models are reported for radial and axial turbines, integrally-geared and barrel-style centrifugal compressors, high temperature and low temperature recuperators, dry sCO2 coolers, and primary heat exchangers for coal and natural gas fuel sources. These models are applicable to sCO2-specific components used in a variety of sCO2 cycle configurations, and include incremental cost factors for advanced, high temperature materials for relevant components. Non-sCO2-specific costs for motors, gearboxes, and generators have been included to allow cycle designers to explore the cost implications of various turbomachinery configurations. Finally, the uncertainty associated with these component cost models is quantified by using AACE International-style class ratings for vendor estimates, combined with component cost correlation statistics.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rodrigues, S. S., J. O. Braga, J. M. Xavier, G. Pauli, A. M. Mata, E. Margotti, M. B. Demay et G. D. Donatelli. « Digital Twin of Subsea Assets as a Tool for Integrity Management and Risk-Based Inspection : Challenges and Perspectives ». Dans Offshore Technology Conference Brasil. OTC, 2023. http://dx.doi.org/10.4043/32757-ms.

Texte intégral
Résumé :
Abstract Based on the current applications in the oil and gas industry, this paper approaches the main challenges in the development of a Digital Twin for subsea production system assets. Bibliographical research was carried out to select relevant digital twin solutions developed in the different sectors of the oil and gas industry, in order to identify the main challenges, risks and prospects for implementing this type of technology. Furthermore, this manuscript also provides solutions developed by the authors based on the experiences in research, development and innovation of national projects for digital transformation. These solutions contemplate data analysis, connections with databases, definitions of recurrent degradation models in the oil and gas industry. A digital twin can be defined as the digital representation of a system or asset, which calculates states and provides relevant information through integrated models and data, to support decisions throughout the life cycle. In the upstream, whose main activities involve the exploration and production of oil and gas, digital twin can be used as a tool for asset integrity management in the production system and associated with integrity management methodologies such as Risk Based Inspection (RBI). The implementation of a digital twin is a complex task and has several challenges, since it is composed of many models and data that need to be interconnected. However, it is common for data from different sources to be stored on different systems. Another relevant challenge concerns the models associated with digital twins, which are sources of uncertainties. The lack of consistent models and coordination between current physical and virtual models, complex data validation, collection and processing challenges are obstacles in implementing a digital twin. If well implemented, the digital twin can help in the decision-making process related to asset integrity management by following the asset throughout its life cycle. In an RBI approach, it can reduce the OPEX cost of subsea systems. This paper will approach the stages of the development of a digital twin for subsea production systems assets and the main challenges based on recent studies carried out in the oil and gas industry such as the requirement for transparency in data exchange while maintaining security and confidentiality, data-model assimilation, uncertainty and validation of models. In addition, it will be presented the experience acquired by the authors in the development of solutions for integrity management.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kazykhanov, A. A., D. R. Kazykhanova et D. V. Rednikov. « Printing devices, as a source of threats to the confidentiality of information ». Dans ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ. НИЦ «Л-Журнал», 2018. http://dx.doi.org/10.18411/lj-10-2018-191.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Koumpan, Elizabeth, et Anna Topol. « Value-driven architecture enabling new interaction models in Society 5.0 ». Dans 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003765.

Texte intégral
Résumé :
Industries are struggling to deliver the information and insights required for top performance. They also need to invest in developing new knowledge to create a foundation of trusted data necessary for the cognitive business. However more change is coming, as we envisioned Society 5.0, new interaction models will be generated, enabling a move to connected industry ecosystems supported by value-driven architecture akin to the next generation of society-centric internet. Society 5.0 trends will cause a shift from the output-based business model focused on buy/sell/own for-profit interaction to the impact-based model. The new model will be a personalized and purpose-led service involving ecosystem participants from multiple industries and drive higher incomes for participants and additional business while decreasing the cost of acquiring customers. Trust and human centricity of that model will lead to advancements in :· Ethics, Impact & Purpose - open, trusted, peer-endorsed services and products.· Decentralization of Power - more loosely coupled ecosystems where ecosystem leaders release more power to participants to fuel the “network” effect.· Data Democratization - bring your data, data used for social and sustainable innovation.· Connected Cyber/Physical Society -the instrumentation of the physical world with IoT and Edge Computing.· New data sources and standards will combine existing data sets with new ones to set the foundation for contextual computing and highly adaptive cyber-physical systems for many industries· Resiliency by design - a guiding design principle that is not only a technology requirement but also a business imperative that will create opportunities for new entities like “Group Formed Networks” based on shared interests. In this paper, we focus on a solution tackling Society 5.0 problems based on a globally scalable platform that is trusted to preserve individuals’ and businesses’ privacy and confidentiality while using the data to create value alongside social and individual good—simply providing value while maintaining values. We will describe innovative architecture at both a societal and a technical level, resting on a logical framework in which several technology components interact to provide value to society. We address the industry dynamics of Society 5.0, tracking new business trends and drivers influencing social infrastructure, societal engagement, cohesion, and new value creation. We define the building blocks required to support a Society 5 ecosystem solution in the future, in alignment with new business models to promote economic development and solve social issues.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Nematy, Hoda. « Secure Protocol for Four D2D Scenarios ». Dans 2nd International Conference on Machine Learning &Trends (MLT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.111102.

Texte intégral
Résumé :
In traditional cellular infrastructure, cellular devices communicate with each other directly even when they are close together. This strategy causes massive traffic to the cellular network therefore D2D communication has introduced to overcome this issue, bring more bandwidth and also higher rates to the cellular network. One of the major challenges for D2D Communication is to have one single secure protocol that can adapt in four D2D scenarios defined in references. These scenarios are Direct D2D and relaying D2D communication with and without cellular infrastructure. In this paper, we propose a Secure D2D protocol based on ARIADNE with TESLA. Also we use LTE-A AKA protocol for authentication and key agreement procedure between Source and Destination. Next, we adapt this scenario to be applicable in without cellular infrastructure ones. This protocol could be used in direct D2D also. Based on the results, our proposed protocol has a few computation overhead compare to recent works and have less communication overhead than SODE with preserve many security properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, Secure Routing Transmission…. We check Authentication, Confidentiality, Reachability and Secure Key Agreement of the proposed protocol with ProVerif verification tools.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Karahasanovic, Amela. « Is it Ethical to Log Users’ Actions in Software Engineering Experiments ? » Dans 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2700.

Texte intégral
Résumé :
In recent years, there has been a significant increase in the number of empirical studies in software engineering that involve human participants. Such studies have heightened the need for considering ethical issues. Researchers have not only moral, but also pragmatic, reasons for treating participants in their studies ethically. They want to maintain their access to the data source and to get funding for their research. Thus, the researchers need to be aware of both ethical issues in general, and those that are specific to a particular research practice. This paper briefly describes our experiences with a tool that logs all actions of the users/participants (commands, keystrokes and mouse movements), and collects their comments on a web-based screen. The tool was used in two usability studies and raised ethical issues concerning the assurance of confidentiality and minimization of inconvenience. The paper also discusses a conflict that appeared during these studies, between ethical standards and the ensuring of experimental validity.
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Confidentiality of sources"

1

Cantor, Amy, Heidi D. Nelson, Miranda Pappas, Chandler Atchison, Brigit Hatch, Nathalie Huguet, Brittny Flynn et Marian McDonagh. Effectiveness of Telehealth for Women’s Preventive Services. Agency for Healthcare Research and Quality (AHRQ), juin 2022. http://dx.doi.org/10.23970/ahrqepccer256.

Texte intégral
Résumé :
Objectives. To evaluate the effectiveness, use, and implementation of telehealth for women’s preventive services for reproductive healthcare and interpersonal violence (IPV), and to evaluate patient preferences and engagement for telehealth, particularly in the context of the coronavirus (COVID-19) pandemic. Data sources. Ovid MEDLINE®, CINAHL®, Embase®, and Cochrane CENTRAL databases (July 1, 2016, to March 4, 2022); manual review of reference lists; suggestions from stakeholders; and responses to a Federal Register Notice. Review methods. Eligible abstracts and full-text articles of telehealth interventions were independently dual reviewed for inclusion using predefined criteria. Dual review was used for data abstraction, study-level risk of bias assessment, and strength of evidence (SOE) rating using established methods. Meta-analysis was not conducted due to heterogeneity of studies and limited available data. Results. Searches identified 5,704 unique records. Eight randomized controlled trials, one nonrandomized trial, and seven observational studies, involving 10,731 participants, met inclusion criteria. Of these, nine evaluated IPV services and seven evaluated contraceptive care, the only reproductive health service studied. Risk of bias was low in one study, moderate in nine trials and five observational studies, and high in one study. Telehealth interventions were intended to replace usual care in 14 studies and supplement care in 2 studies. Delivery modes included telephone (5 studies), online modules (5 studies), and mobile applications (1 study), and was unclear or undefined in five studies. There were no differences between telehealth interventions to supplement contraceptive care and comparators for rates of contraceptive use, sexually transmitted infection, and pregnancy (low SOE); evidence was insufficient for abortion rates. There were no differences between telehealth IPV services versus comparators for outcomes measuring repeat IPV, depression, post-traumatic stress disorder, fear of partner, coercive control, self-efficacy, and safety behaviors (low SOE). The COVID-19 pandemic increased telehealth utilization. Barriers to telehealth interventions included limited internet access and digital literacy among English-speaking IPV survivors, and technical challenges and confidentiality concerns for contraceptive care. Telehealth use was facilitated by strategies to ensure safety of individuals who receive IPV services. Evidence was insufficient to evaluate access, health equity, or harms outcomes. Conclusions. Limited evidence suggests that telehealth interventions for contraceptive care and IPV services result in equivalent clinical and patient-reported outcomes as in-person care. Uncertainty remains regarding the most effective approaches for delivering these services, and how to best mobilize telehealth, particularly for women facing barriers to healthcare.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie