Littérature scientifique sur le sujet « Heath security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Heath security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Heath security"
Alam, Uzma, Juliet Nabyonga-Orem, Abdulaziz Mohammed, Deborah R. Malac, John N. Nkengasong et Matshidiso R. Moeti. « Redesigning health systems for global heath security ». Lancet Global Health 9, no 4 (avril 2021) : e393-e394. http://dx.doi.org/10.1016/s2214-109x(20)30545-3.
Texte intégralRamji-Nogales, Jaya. « Race in Security ». AJIL Unbound 116 (2022) : 242–47. http://dx.doi.org/10.1017/aju.2022.38.
Texte intégralChandrakar, Preeti. « A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks ». International Journal of Ambient Computing and Intelligence 10, no 1 (janvier 2019) : 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.
Texte intégralRodiles, Alejandro. « Making Sense of Violent Extremism ». AJIL Unbound 116 (2022) : 230–35. http://dx.doi.org/10.1017/aju.2022.41.
Texte intégralMartin, Craig. « Climate Change and Global Security : Framing an Existential Threat ». AJIL Unbound 116 (2022) : 248–53. http://dx.doi.org/10.1017/aju.2022.39.
Texte intégralMuka, Romina, Sule Yildrim-Yayilgan et Kozeta Sevrani. « Security Analysis of Wireless BAN in e-Health ». Spring 2017 5, no 2 (1 mai 2017) : 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.
Texte intégralGautam, Pratiksha, Mohd Dilshad Ansari et Surender Kumar Sharma. « Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing ». International Journal of Information Security and Privacy 13, no 1 (janvier 2019) : 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Texte intégralNandan Sharma. « Indian Healthcare Segment : A Challenge to Human Security in 21st Century ». Legal Research Development : An International Refereed e-Journal 2, no I (30 septembre 2017) : 63–70. http://dx.doi.org/10.53724/lrd/v2n1.06.
Texte intégralSrivastava, Mahendra P. « Plant Clinic Towards Plant Health and Food Security ». International Journal of Phytopathology 2, no 3 (30 décembre 2013) : 193–203. http://dx.doi.org/10.33687/phytopath.002.03.0327.
Texte intégralHeath, J. Benton, Ina Popova, Justin Jacinto, Samaa Haridi, Tafadzwa Pasipanodya et Sabina Sacco. « Litigating Health and Security Exceptions in Investment Treaties : A Simulation ». Proceedings of the ASIL Annual Meeting 115 (2021) : 151–54. http://dx.doi.org/10.1017/amp.2021.138.
Texte intégralThèses sur le sujet "Heath security"
Daza, Aramayo Lourdes Gabriela. « Sociální zabezpečení v některých státech Latinské ameriky ». Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4472.
Texte intégralMinarcine, Scott. « Health Security Intelligence : Assessing the Nascent Public Health Capability ». Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6836.
Texte intégralThis thesis explores the current state of public healths (HS) intelligence capability across State, Local, Tribal and Territorial (SLTT) jurisdictions through qualitative analysis of current public health jurisdiction plans for the collection, analysis, product creation, dissemination and programmatic oversight related to public health inputs into the homeland security intelligence apparatus. An assessment was conducted using an online Plan Assessment Tool, or PLAT, that allowed jurisdictional public health leadership to provide de-identified responses. This assessment of 25 of the 62 federally funded SLTT public health preparedness programs indicates one impediment to the continued maturation of this new intelligence capability is the lack of codified plans. The results also suggest that while public health programs at the SLTT level do indeed have much room for improvement, there is a burgeoning intelligence capability within public health. However, to sustain and improve this emergent capability will require a national effort to create mission focus and centralized guidance.
Singh, Kalvinder. « Security for Mobile Health Care Systems ». Thesis, Griffith University, 2013. http://hdl.handle.net/10072/367683.
Texte intégralThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Fryer, Huw. « The public health analogy in Web security ». Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/412399/.
Texte intégralIwaya, Leonardo Horn. « A security framework for mobile health data collection ». Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-23122014-143956/.
Texte intégralSaúde Móvel (mHealth) pode ser definida como a prática médica e a saúde pública suportadas por tecnologias de computação móvel, como: telefones celulares, PDAs, tablets, sensores e outros dispositivos sem fio. Particularmente no caso dos celulares, há um aumento expressivo no número de linhas, aparelhos, e na infraestrutura de rede em países de média e baixa renda (Low- Middle- Income Countries, LMIC), permitindo a adoção de sistemas mHealth de maneira eficiente. Existem, hoje, vários casos de sistemas de coleta de dados voltadas à atenção primária, vigilância (em saúde) e pesquisas epidemiológicas adotados nesses países. Tais sistemas fornecem aos gestores de saúde uma informação de melhor qualidade em menor tempo, que por sua vez melhoram a capacidade de planejamento e resposta a emergências. Contudo, nota-se um relaxamento no cumprimento de requisitos de segurança nestes sistemas. Com base nisso, foi feito um levantamento de aplicações e iniciativas de pesquisa em mHealth no Brasil, no qual se constatou que um número razoável de trabalhos mencionam fracamente (13%) ou não menciona (40%) os requisitos de segurança. Este levantamento também discute sobre o estado atual das pesquisas de mHealth no Brasil, os principais tipos de aplicações, os grupos de usuários, os dispositivos utilizados e as barreiras de pesquisa identificadas. Em seguida, este trabalho apresenta o SecourHealth, um framework de segurança voltado ao desenvolvimento de aplicações de mhealth para coleta de dados. O SecourHealth foi projetado com base em seis requisitos principais de segurança: suportar o registro e a autenticação do usuário; tratar a desconexão e os atrasos na rede; prover o armazenamento seguro de dados prevendo possibilidades de furto ou perda dos aparelhos; fazer transmissão segura de dados entre o aparelho e o servidor; permitir o compartilhamento de dispositivos entre os usuários (e.g., agentes de saúde); e considerar opções de compromisso entre segurança, desempenho e usabilidade. O trabalho também descreve com detalhes as etapas de modelagem e desenvolvimento do framework - que foi integrado a uma aplicação para a plataforma Android. Finalmente, é feita uma análise do desempenho dos algoritmos criptográficos implementados, considerando o overhead pelo simples uso do protocolo HTTPS.
Toms, Anders. « Information Security when Integrating Actors in Health Care Processes ». Thesis, University of Skövde, Department of Computer Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-825.
Texte intégralThere is a growing interest within organisations today to focus on the core processes, i.e. the processes that create value for the intended customer, in order to stay compatible within the ever-fiercer competition. To have full control of the key processes may be a great step forward towards a more lean and effective organisation, not only for profit seeking companies but also for public welfare institutions like health care. Software aimed at supporting a process focus is continuously being developed and one such family of programs is commonly referred to as process managers.
A process manager lets the people in an organisation who have complete knowledge of the processes model these without requiring them to have expert knowledge of computers and programming. Once a process has been defined graphically according to a predefined modelling language, it can be deployed and monitored. The process manager software takes care of the routing of messages between actors, both human as well as non-human (e.g. other applications), and it drives the individual errand forward according to how the process flow has been defined in the model. However, applying a process manager approach in health care processes requires a certain amount of caution. Messages sent between actors in health care organisations are often of a delicate nature since they may contain sensitive information, such as illness, mental state, family situation and similar, that is related to an identifiable individual. There are also other aspects of security that need to be addressed besides the confidentiality aspect. For example, it must be guaranteed that the information is correct and not altered during transfer, the information must be available when needed and it should be possible to trace a message to its sender, among other things.
This work identifies a set of security requirements from the literature that need to be fulfilled in health care organisations when applying a process manager approach. With these requirements as a basis, a process manager system is evaluated with regards to security and the conclusion is that future versions need improvement on some points. Future work is also suggested that could help to explore the area further.
Thomson, Steven Michael. « A standards-based security model for health information systems ». Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.
Texte intégralRaedeke, Maurine A. « Food security, nutrition and health of food pantry participants ». Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4839.
Texte intégralThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on October 9, 2007) Vita. Includes bibliographical references.
Coghlan, Christopher. « Towards food security with nutritional health : multi-scale approaches ». Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:faec7323-edbd-440b-9a60-01cc84532b68.
Texte intégralAlawaji, Ahmed S. « Privacy and security risks for national health records systems ». Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118558.
Texte intégralPage 104 blank. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 101-103).
A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security considerations. The aims of this study were to explore how governments can design secure national health records systems. To do that systematically, we developed a framework to analyze NEHR systems. We then applied the framework to investigate the privacy and security risks in these systems. The studied systems demonstrate that getting privacy and security right have a considerable impact on the success of NEHR projects. Also, our study reveals that the healthcare system structure has a substantial impact on the adoption and usage rates of the system. The studied cases uncover many opportunities for improving privacy and security measures in future projects. The framework demonstrates the utility of applying it to the three cases.
by Ahmed S. Alawaji.
S.M. in Engineering and Management
Livres sur le sujet "Heath security"
United States. Government Accountablity Office. Mail security : Incidents at DOD mail facilities exposed problems that require further actions : report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C : GAO, 2006.
Trouver le texte intégralFund, United Nations Population, dir. Reproductive health essentials : Securing the supply : global strategy for reproductive health commodity security. New York : United Nations Population Fund, 2002.
Trouver le texte intégralGoodman, Michael S., James M. Wilson et Filippa Lentzos. Health Security Intelligence. London : Routledge, 2021. http://dx.doi.org/10.4324/9781003245483.
Texte intégralMasys, Anthony J., Ricardo Izurieta et Miguel Reina Ortiz, dir. Global Health Security. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-23491-1.
Texte intégralKamradt-Scott, Adam. Managing Global Health Security. London : Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137520166.
Texte intégralCanada. Citizenship and Immigration Canada., dir. Health and income security. [Ottawa] : Citizenship and Immigration Canada, 1998.
Trouver le texte intégralMyriam, Dunn Cavelty, et Kristensen Kristian Søby, dir. Securing 'the homeland' : Critical infrastructure, risk and (in)security. London : Routledge, 2008.
Trouver le texte intégralUnited States. Executive Office of the President., dir. Health security : The President's health care plan. [Washington, D.C. ? : Executive Office of the President, 1993.
Trouver le texte intégralKalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi : International Planned Parenthood Federation, 2008.
Trouver le texte intégralKalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi : International Planned Parenthood Federation, 2008.
Trouver le texte intégralChapitres de livres sur le sujet "Heath security"
Riad, A. B. M. Kamrul Islam, Hossain Shahriar, Chi Zhang et Farhat Lamia Barsha. « Heath Device Security and Privacy ». Dans Data Protection and Privacy in Healthcare, 91–108. Boca Raton, FL : CRC Press, 2021. : CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848-6.
Texte intégralDavidson, Ruth. « Social Security Policy ». Dans Policies and Politics Under Prime Minister Edward Heath, 141–64. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53673-2_7.
Texte intégralLevine, Marissa J. « Health Security ». Dans Handbook of Security Science, 1–25. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-51761-2_25-1.
Texte intégralMarton, Péter. « Health Security ». Dans The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_539-1.
Texte intégralMarton, Péter. « Health Security ». Dans The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-74336-3_539-2.
Texte intégralRushton, Simon. « Health Security ». Dans An Introduction to Non-Traditional Security Studies : A Transnational Approach, 174–92. 1 Oliver’s Yard, 55 City Road London EC1Y 1SP : SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n10.
Texte intégralLevine, Marissa J. « Health Security ». Dans Handbook of Security Science, 635–59. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_25.
Texte intégralReveron, Derek S., et Kathleen A. Mahoney-Norris. « Health Security ». Dans Human and National Security, 163–80. Second edition. | New York : Routledge, 2018. | First edition published : Human security in a borderless world. Philadelphia, PA : Westview Press, c2011. : Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-8.
Texte intégralPorcelain, Sherri L. « Health Security ». Dans Public Health and Beyond in Latin America and the Caribbean, 153–85. New York : Routledge, 2021. http://dx.doi.org/10.4324/9781003007401-7.
Texte intégralMarton, Péter. « Health Security ». Dans The Palgrave Encyclopedia of Global Security Studies, 697–704. Cham : Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_539.
Texte intégralActes de conférences sur le sujet "Heath security"
Nagy, Robertbela, et Florin Popentiu vladicescu. « EXPLORING THE POTENTIAL OF INTERNET OF THINGS SYSTEMS IN HEATH CARE CONTEXT ». Dans eLSE 2018. Carol I National Defence University Publishing House, 2018. http://dx.doi.org/10.12753/2066-026x-18-210.
Texte intégralBashar, Md Khayrul. « Event-Driven Time Series Analysis and the Comparison of Public Reactions on Covid-19 ». Dans 9th International Conference of Security, Privacy and Trust Management (SPTM 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110507.
Texte intégralKUSTRON, KAMILA. « A NEW METHOD IN CONCEPTUAL DESIGN OF THE SHM AIRFRAME USING ROUGH SETS ». Dans Structural Health Monitoring 2021. Destech Publications, Inc., 2022. http://dx.doi.org/10.12783/shm2021/36354.
Texte intégralMancini, F., K. A. Mughal, S. H. Gejibo et J. Klungsoyr. « Adding security to mobile data collection ». Dans 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services (Healthcom 2011). IEEE, 2011. http://dx.doi.org/10.1109/health.2011.6026793.
Texte intégralYu, Weider D., et Vijayalakshmi Jothiram. « Security in Wireless Mobile Technology for Healthcare Systems ». Dans 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381659.
Texte intégralVieira, Marcos Alves, Gislainy Crisostomo Velasco et Sergio T. Carvalho. « A Decentralized Health Data Repository for Remote Patient Monitoring Using Blockchain and FHIR ». Dans Workshop em Blockchain : Teoria, Tecnologias e Aplicações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/wblockchain.2023.723.
Texte intégralShen, Tsu-Wang. « A u-Health Security Structure by Using 2D Barcodes ». Dans 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381661.
Texte intégralFragopoulos, A. G., J. Gialelis et D. Serpanos. « Imposing holistic privacy and data security on person centric ehealth monitoring infrastructures ». Dans 2010 12th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom 2010). IEEE, 2010. http://dx.doi.org/10.1109/health.2010.5556580.
Texte intégralDharsni, Thanga, Hanifa Zakir, Pradeep Naik, Mallikarjuna et Raghu. « Soldier Security and Health Monitoring ». Dans 2018 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C). IEEE, 2018. http://dx.doi.org/10.1109/icdi3c.2018.00016.
Texte intégralSamy, Ganthan Narayana, Rabiah Ahmad et Zuraini Ismail. « Threats to Health Information Security ». Dans 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.312.
Texte intégralRapports d'organisations sur le sujet "Heath security"
Vu, Jonathan, Benjamin Kaplan, Shomesh Chaudhuri, Monique Mansoura et Andrew Lo. Financing Vaccines for Global Health Security. Cambridge, MA : National Bureau of Economic Research, mai 2020. http://dx.doi.org/10.3386/w27212.
Texte intégralUecker, Norma J., et Michael J. Schwartz. Office of Health, Safety and Security, Office of Security Policy FY 2013 Accomplishments. Office of Scientific and Technical Information (OSTI), octobre 2013. http://dx.doi.org/10.2172/1105101.
Texte intégralWolmuth-Gordon, Hannah, et Natasha Mutebi. Public health and climate change : a One Health approach. Parliamentary Office of Science and Technology, UK Parliament, juillet 2023. http://dx.doi.org/10.58248/pn701.
Texte intégralFalzarano, A. Annotated Bibliography - Economic Sanctions : Implications for Health Security. Office of Scientific and Technical Information (OSTI), décembre 2019. http://dx.doi.org/10.2172/1635787.
Texte intégralSung, Jane, et Olivia Dean. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, décembre 2020. http://dx.doi.org/10.26419/ppi.00114.001.
Texte intégralSung, Jane, Olivia Dean, Robert C. Saunders, Asha Saavoss et Lane Koenig. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, décembre 2020. http://dx.doi.org/10.26419/ppi.00099.003.
Texte intégralBohorquez, Camilo. Subsidized Health Care and Food Security : Evidence from Colombia. Banco de la República de Colombia, février 2020. http://dx.doi.org/10.32468/be.1103.
Texte intégralScholl, Matthew, Kevin Stine, Kenneth Lin et Daniel Steinberg. Security architecture design process for health information exchanges (HIEs). Gaithersburg, MD : National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7497.
Texte intégralOsewe, Patrick L. Health Security Interventions for COVID-19 Response : Guidance Note. Asian Development Bank, septembre 2022. http://dx.doi.org/10.22617/spr220224.
Texte intégralLamas, Jorge, Laura Bocalandro, Tara Lisa Persaud, Alejandro Cruz Fano et Rafael Villa. South-South Cooperation and Capacity Development in Action : Regional Public Entrepreneurship in Latin America and the Caribbean. Inter-American Development Bank, mars 2010. http://dx.doi.org/10.18235/0008843.
Texte intégral