Дисертації з теми "Heath security"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Heath security.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Heath security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Daza, Aramayo Lourdes Gabriela. "Sociální zabezpečení v některých státech Latinské ameriky." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4472.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis has aims to acquaint the reader with Latin American Social Security systems. For this end, 7 Latin American countries have been chosen. Henceforth, the different Social Security systems operating in these countries are described. It is a comparative analysis, describing the similarities and differences among them. Is necessary to emphasize that this paper does not only provide current information of the different Social Security systems, but also statistical information, which is considered as essential to the context of the economic, demographic and social environments in which are these Social Security systems function. The systems described are: the Pension System, Heath Insurance, Sickness Benefits, Unemployment Insurance, Family Entitlements and last Maternity Benefits. The countries that have been chosen are the following: Argentina, Bolivia, Chile, Colombia, Ecuador, Peru, and Uruguay. In addition to the comparative analysis in this paper, the level of development in the chosen Latin American countries as well as the latest trends concerning the Social Security systems are determined and explained.
2

Minarcine, Scott. "Health Security Intelligence : Assessing the Nascent Public Health Capability." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6836.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Approved for public release; distribution is unlimited
This thesis explores the current state of public healths (HS) intelligence capability across State, Local, Tribal and Territorial (SLTT) jurisdictions through qualitative analysis of current public health jurisdiction plans for the collection, analysis, product creation, dissemination and programmatic oversight related to public health inputs into the homeland security intelligence apparatus. An assessment was conducted using an online Plan Assessment Tool, or PLAT, that allowed jurisdictional public health leadership to provide de-identified responses. This assessment of 25 of the 62 federally funded SLTT public health preparedness programs indicates one impediment to the continued maturation of this new intelligence capability is the lack of codified plans. The results also suggest that while public health programs at the SLTT level do indeed have much room for improvement, there is a burgeoning intelligence capability within public health. However, to sustain and improve this emergent capability will require a national effort to create mission focus and centralized guidance.
3

Singh, Kalvinder. "Security for Mobile Health Care Systems." Thesis, Griffith University, 2013. http://hdl.handle.net/10072/367683.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The ageing population and the increase in chronic diseases have placed a considerable financial burden on health care services. Mobile health care systems can play an important role in reducing the costs. The pervasiveness of smart phones and the evolution of Internetof- Things are increasing the potential for mobile health care systems to remotely manage the health of a patient or the elderly. Smart phones and small devices, such as body sensors, are used to remotely monitor patients suffering from chronic diseases and allow them to have relatively independent lives. A mobile health care system may require a degree of real-time monitoring or data collection. For instance, a medical emergency will require data sent to medical staff as quickly as possible, rather than the data sent after a few hours or days. The problem will be more complex if there is a requirement that commands sent to body sensors need to be in real-time. If the system recognises a possible medical emergency, it may need to notify other devices immediately to start recording data or to actuate (for example, an insulin pump and a defibrillator).
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
4

Fryer, Huw. "The public health analogy in Web security." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/412399/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Traditional law enforcement methods have proven inadequate against the current levels of cybercrime we are experiencing. This is due to the ease of automating attacks, and also that even a single jurisdiction prepared to ignore or unable to prosecute cybercriminals mean that they are usually beyond the reach of local law enforcement. This has led to different analogies to attempt to describe the phenomenon, and one of these is that of public health. In the past, this was used to describe the propagation methods of computer 'viruses', which exhibited similar characteristics to biological viruses. Whilst other malware also had a similar propagation pattern, these no longer apply given the popularity of drive-by downloads, where Web pages attack users who visit them. A consequence of this new method of propagation is that 'infected' machines do not have any contagion, so one infected machine on a network does not mean that another machine on the network will become infected as well. This thesis proposes a novel interpretation of the public health analogy, which focuses on the notions of efficacy and rights, so that these guidelines can continue to be used. This is considered in the context of the major stakeholders who could intervene in the drive-by download process, where it is concluded that hosting providers are best placed to intervene to make a difference. It is proposed that they should proactively search for vulnerable websites they host, and warn the operator, implementing blocking procedures if the operator does not respond. An agent based model is then used to assess the efficacy of such an intervention.
5

Iwaya, Leonardo Horn. "A security framework for mobile health data collection." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-23122014-143956/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Mobile health (mHealth) can be defined as the practice of medicine and public health supported by mobile computing technologies, such as mobile phones, PDAs, tablets, sensors and other wireless devices. Particularly in the case of mobile phones, there has been a significant increase in the number of lines, equipment, and network infrastructure in Low- and Middle-Income Countries (LMIC), allowing the adoption of mHealth systems efficiently. There are now several cases of systems for data collection focused on primary care, health surveillance and epidemiological research, which were adopted in these countries. Such systems provide health care managers information with higher quality and in a shorter time, which in turn improves their ability to plan actions and respond to emergencies. However, security is not included among the main requirements of such systems. Aiming to address this issue, we developed a survey about mHealth applications and research initiatives in Brazil, which shows that a reasonable number of papers only briefly (13%) or simply do not mention (40%) their security requirements. This survey also provides a discussion about the current state-of-art of Brazilian mHealth researches, including the main types of applications, target users, devices employed and the research barriers identified. After that, we present the SecourHealth, a security framework for mHealth data collection applications. SecourHealth was designed to cope with six main security requirements: support user registration and authentication mechanisms; treat network disconnections and delays; provide a secure data storage - even in case of possible theft or loss of equipment; allow secure data exchange between the device and server; enabling device sharing between users (i.e., health workers); and allow trade-offs between security, performance and usability. This thesis also describes in detail the framework modeling and development steps showing how it was integrated into an application for the Android platform. Finally, we benchmarked the cryptographic algorithms implemented, when compared to the overhead of using HTTPS protocol.
Saúde Móvel (mHealth) pode ser definida como a prática médica e a saúde pública suportadas por tecnologias de computação móvel, como: telefones celulares, PDAs, tablets, sensores e outros dispositivos sem fio. Particularmente no caso dos celulares, há um aumento expressivo no número de linhas, aparelhos, e na infraestrutura de rede em países de média e baixa renda (Low- Middle- Income Countries, LMIC), permitindo a adoção de sistemas mHealth de maneira eficiente. Existem, hoje, vários casos de sistemas de coleta de dados voltadas à atenção primária, vigilância (em saúde) e pesquisas epidemiológicas adotados nesses países. Tais sistemas fornecem aos gestores de saúde uma informação de melhor qualidade em menor tempo, que por sua vez melhoram a capacidade de planejamento e resposta a emergências. Contudo, nota-se um relaxamento no cumprimento de requisitos de segurança nestes sistemas. Com base nisso, foi feito um levantamento de aplicações e iniciativas de pesquisa em mHealth no Brasil, no qual se constatou que um número razoável de trabalhos mencionam fracamente (13%) ou não menciona (40%) os requisitos de segurança. Este levantamento também discute sobre o estado atual das pesquisas de mHealth no Brasil, os principais tipos de aplicações, os grupos de usuários, os dispositivos utilizados e as barreiras de pesquisa identificadas. Em seguida, este trabalho apresenta o SecourHealth, um framework de segurança voltado ao desenvolvimento de aplicações de mhealth para coleta de dados. O SecourHealth foi projetado com base em seis requisitos principais de segurança: suportar o registro e a autenticação do usuário; tratar a desconexão e os atrasos na rede; prover o armazenamento seguro de dados prevendo possibilidades de furto ou perda dos aparelhos; fazer transmissão segura de dados entre o aparelho e o servidor; permitir o compartilhamento de dispositivos entre os usuários (e.g., agentes de saúde); e considerar opções de compromisso entre segurança, desempenho e usabilidade. O trabalho também descreve com detalhes as etapas de modelagem e desenvolvimento do framework - que foi integrado a uma aplicação para a plataforma Android. Finalmente, é feita uma análise do desempenho dos algoritmos criptográficos implementados, considerando o overhead pelo simples uso do protocolo HTTPS.
6

Toms, Anders. "Information Security when Integrating Actors in Health Care Processes." Thesis, University of Skövde, Department of Computer Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-825.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

There is a growing interest within organisations today to focus on the core processes, i.e. the processes that create value for the intended customer, in order to stay compatible within the ever-fiercer competition. To have full control of the key processes may be a great step forward towards a more lean and effective organisation, not only for profit seeking companies but also for public welfare institutions like health care. Software aimed at supporting a process focus is continuously being developed and one such family of programs is commonly referred to as process managers.

A process manager lets the people in an organisation who have complete knowledge of the processes model these without requiring them to have expert knowledge of computers and programming. Once a process has been defined graphically according to a predefined modelling language, it can be deployed and monitored. The process manager software takes care of the routing of messages between actors, both human as well as non-human (e.g. other applications), and it drives the individual errand forward according to how the process flow has been defined in the model. However, applying a process manager approach in health care processes requires a certain amount of caution. Messages sent between actors in health care organisations are often of a delicate nature since they may contain sensitive information, such as illness, mental state, family situation and similar, that is related to an identifiable individual. There are also other aspects of security that need to be addressed besides the confidentiality aspect. For example, it must be guaranteed that the information is correct and not altered during transfer, the information must be available when needed and it should be possible to trace a message to its sender, among other things.

This work identifies a set of security requirements from the literature that need to be fulfilled in health care organisations when applying a process manager approach. With these requirements as a basis, a process manager system is evaluated with regards to security and the conclusion is that future versions need improvement on some points. Future work is also suggested that could help to explore the area further.

7

Thomson, Steven Michael. "A standards-based security model for health information systems." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
8

Raedeke, Maurine A. "Food security, nutrition and health of food pantry participants." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4839.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (Ph. D.)--University of Missouri-Columbia, 2007.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on October 9, 2007) Vita. Includes bibliographical references.
9

Coghlan, Christopher. "Towards food security with nutritional health : multi-scale approaches." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:faec7323-edbd-440b-9a60-01cc84532b68.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis addresses multi-scale approaches for improving food security with nutritional health. It argues that four key themes: scale, nutrition, trade, and governance are not given adequate attention in food security and nutrition studies. A multi-scale framework links the overriding thematic structure, bridges gaps, and enriches analysis. It facilitates a blended approach of analysis for food security and nutrition studies, public policy, and critical geography. Nutrition is at the centre of the inquiry and addresses the triple burden of malnutrition: hunger, micronutrient malnutrition, and obesity. Nutrition is hampered by an incomplete understanding of dietary diversity. Trade and governance are complimentary and cover dynamic commodity exchanges which might develop along with improved programme delivery. At the structural core of the work are four research papers which interact with established and emergent food security indicators and data for: the international system, nations, Indian states, and districts within Karnataka. Each paper uses specific methodological tools which are most compatible with the unique characteristics of the relevant scale. The first paper applies benchmarking and compares international FAO food security indictors with the EIU and other best practice sources to argue for improved data. In order to inform malnutrition beyond hunger, the second paper inputs FAOSTAT national food balance sheet data into a dietary food supply model of key nutritional food groups for medium activity individuals. The third paper employs Indiastat data to construct a food potential model representative of major components of the Indian food system, and compares it with production information for pulse varieties for inclusion in the NFSA. The fourth paper creates a nutritional HDI, compares it against the production of cereals and pulses, and considers weather conditions. Results illustrate that the FAO does not give proper attention to including governance indicators or capturing dietary diversity beyond hunger. Food balance sheet data shows that the majority of the world lacks the proper supply of key food groups to sustain a medium activity lifestyle, with fruit & vegetable deficits equally present in developed and developing nations. In India, states with the lowest food potential are located in the north and east of the country while some neighbouring states contain pulse production advantages. Further opportunities exist to use digital technologies to improve the administration of the programme. Similarly, northern districts of Karnataka require more direct NFSA intervention while the southern and coastal districts have the potential for increased production and trade of pulses. Implications for this study are centred on the development of future food security and nutritional health studies, policy, and administration. When possible, food security and nutrition studies can broaden their conclusions by expanding their base of indicators and data to take into account multi-disciplinary information. Possibilities for richer studies are evident through the development of more robust governance and dietary diversity indicators. These could focus on measurable programme results and take into account the impact of food groups and nutritional supply on various types of malnutrition. Multi-scale analysis might inspire cross-boundary policy formulation and assist in the development and trade of food system resources. The administration of food security programmes might improve with further study and the use of technology as a tool for delivery. This thesis clarifies how multi-scale approaches to food security and nutrition can be advanced through conceptual, methodological, and empirical work combining critical engagement, data analysis, and public policy.
10

Alawaji, Ahmed S. "Privacy and security risks for national health records systems." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118558.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2018.
Page 104 blank. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 101-103).
A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security considerations. The aims of this study were to explore how governments can design secure national health records systems. To do that systematically, we developed a framework to analyze NEHR systems. We then applied the framework to investigate the privacy and security risks in these systems. The studied systems demonstrate that getting privacy and security right have a considerable impact on the success of NEHR projects. Also, our study reveals that the healthcare system structure has a substantial impact on the adoption and usage rates of the system. The studied cases uncover many opportunities for improving privacy and security measures in future projects. The framework demonstrates the utility of applying it to the three cases.
by Ahmed S. Alawaji.
S.M. in Engineering and Management
11

Ramirez, Christina M. "Water security and its importance in protecting public health." Scholarly Commons, 2012. https://scholarlycommons.pacific.edu/uop_etds/820.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Gopalakrishnan, Shweta. "Mapping the elements of governance in international health security." Thesis, Kansas State University, 2011. http://hdl.handle.net/2097/9963.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Master of Public Health
Department of Diagnostic Medicine/Pathobiology
Justin J. Kastner
Globalization has resulted in closer integration of economies and societies. It has contributed to the emergence of a new world order which involves a vast nexus of global and regional institutions, surrounded by transnational corporations, and non-governmental agencies seeking to influence the agenda and direction of international public policy. Health is a center point of geopolitics, security, trade, and foreign policy. Expansion in the territory of health and an increase in the number of health actors have profound implications for global health governance. Accordingly, the focus of the thesis is on endorsing the three core elements of governance proposed by Ackleson and Lapid, which comprises a system of (formal and informal) political coordination—across multiple levels from the local to the global—among public agencies and private corporations seeking to accomplish common goals and resolve problems through collective action. This shift in global governance has been prominent in the health sector with the formation of numerous public-private partnerships, coalitions, networks, and informal collaborations. In an effort to cope with the proliferation of players in the health sector, the World Health Organization has undergone gradual transformation in its governance framework. It is important to examine the evolution of the governance architecture of the WHO, as well as its effective application in the current global environment maintaining the organization’s legitimacy. This study tries to offer a comprehensive account of the WHO’s history, its successes and failures, as well as challenges and opportunities confronting the organization. Embracing public-private partnerships and formal-informal interactions does not simply fill governance gaps opened by globalization, but helps cluster in narrower areas of cooperation, where the strategic interests of multilateral organizations (e.g., the WHO), states, and transnational actors intersect. Global health problems require global solutions, and neither public nor private organizations can solve these issues on their own. The forms of governance based on the Acklesonian-Lapidian definition assist in accomplishing public health goals through shared decision-making and risk taking.
13

Liu, Yin-Miao (Vicky). "An architecture for enhanced assurance in e-health systems." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/47051/1/Vicky_Liu_Thesis.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.
14

Landguth, David C. "Public health specializations and education needs to support homeland security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FLandguth.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Anke Richter. "March 2006." Includes bibliographical references (p.175-178). Also available online.
15

Reed, Patricia Diane. "Integrating local public health agencies into the Homeland Security community." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FReed.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2007.
Thesis Advisor(s): Chris Bellavita. "March 2007." Includes bibliographical references (p. 45-47). Also available in print.
16

García, Núñez Luis. "Health Reform in the Social Security System: The Peruvian Case." Economía, 2012. http://repositorio.pucp.edu.pe/index/handle/123456789/117049.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Desde mediados de 1997 se ha implementado una reforma en la seguridad social en salud conel objetivo de mejorar la eficiencia en el sector, elevar la calidad de los servicios y extender lacobertura de la seguridad social a aquellos sectores poblacionales no cubiertos, todo dentro de unesquema de solidaridad y equidad. Sin embargo, después de más de tres años de su implementación,el sistema está aún lejos de cumplir sus objetivos. Las actuales estadísticas muestran que muchosperuanos no cuentan con un seguro de salud y que el actual esquema Público-Privado no es losuficientemente amplio como para cubrir las necesidades de la población, especialmente los máspobres. Las compañías de seguros privadas (EPSs) aparentemente están orientadas a asegurar atrabajadores de empresas grandes, mientras que el seguro social de salud se estaría orientando atrabajadores de bajos ingresos. Otra característica de la reforma peruana es la escasa participación delas EPS en las provincias y su mínima participación en los seguros voluntarios. Estos hechossignificarían que la reforma está aún muy lejos de alcanzar sus objetivos.
17

Kim, Seonghoon. "Essays in Economics of Social Security Disability Insurance and Health." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365696633.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Pokhrel, Nawa Raj. "Statistical Analysis and Modeling of Cyber Security and Health Sciences." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7703.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Being in the era of information technology, importance and applicability of analytical statistical model an interdisciplinary setting in the modern statistics have increased significantly. Conceptually understanding the vulnerabilities in statistical perspective helps to develop the set of modern statistical models and bridges the gap between cybersecurity and abstract statistical /mathematical knowledge. In this dissertation, our primary goal is to develop series of the strong statistical model in software vulnerability in conjunction with Common Vulnerability Scoring System (CVSS) framework. In nutshell, the overall research lies at the intersection of statistical modeling, cybersecurity, and data mining. Furthermore, we generalize the model of software vulnerability to health science particularly in the stomach cancer data. In the context of cybersecurity, we have applied the well-known Markovian process in the combination of CVSS framework to determine the overall network security risk. The developed model can be used to identify critical nodes in the host access graph where attackers may be most likely to focus. Based on that information, a network administrator can make appropriate, prioritized decisions for system patching. Further, a flexible risk ranking technique is described, where the decisions made by an attacker can be adjusted using a bias factor. The model can be generalized for use with complicated network environments. We have further proposed a vulnerability analytic prediction model based on linear and non-linear approaches via time series analysis. Using currently available data from National Vulnerability Database (NVD) this study develops and present sets of predictive model by utilizing Auto Regressive Moving Average (ARIMA), Artificial Neural Network (ANN), and Support Vector Machine (SVM) settings. The best model which provides the minimum error rate is selected for prediction of future vulnerabilities. In addition, we purpose a new philosophy of software vulnerability life cycle. It says that vulnerability saturation is a local phenomenon, and it possesses an increasing cyclic behavior within the software vulnerability life cycle. Based on the new philosophy of software vulnerability life cycle, we purpose new effective differential equation model to predict future software vulnerabilities by utilizing the vulnerability dataset of three major OS: Windows 7, Linux Kernel, and Mac OS X. The proposed analytical model is compared with existing models in terms of fitting and prediction accuracy. Finally, the predictive model not only applicable to predict future vulnerability but it can be used in the various domain such as engineering, finance, business, health science, and among others. For instance, we extended the idea on health science; to predict the malignant tumor size of stomach cancer as a function of age based on the given historical data from Surveillance Epidemiology and End Results (SEER).
19

Puvaneswaran, A. (Amirthan). "Network security for augmented reality application in health care sector." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201908152766.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract. The recent advances in mobile devices and wireless communication sector transformed Mobile Augmented Reality (MAR) from science fiction to a reality. Incorporating this MAR technology in health care sector elevates the quality of diagnosis and treatment for the patients. However, due to the highly sensitive nature of the data being circulated in this process, it is also highly vulnerable to the security threats. In the thesis, an architecture is proposed for a MAR health care application based on Multi-access Edge Computing (MEC). This includes key features such as displaying augmented view of patient information on the mobile device, augmenting the X-ray or scan image on top of the patient’s actual body parts to assist the doctor, and enabling the doctor to interact with an expert and get real time consultancy. Based on the proposed architecture, all the possible network security threats are analyzed. Furthermore, a secure key management scheme is proposed for registration and authentication phases to establish a secure end-to-end communication between the participating entities in the system. The security features of the proposed scheme are formally verified by using Automated Validation of Internet Security Protocols and Applications (AIVSPA) tool, Moreover, an informal verification is provided to discuss the protection against other possible attacks. It has justified that the proposed scheme is able to provide the required level of security for the system.
20

Kovindha, Orasa. "The social security health insurance model in Pattani, Thailand, health status and patterns of utilization." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq20747.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Mxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
22

Jones, Mary J. "A 21st century national public health system." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FJones.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2008.
Thesis Advisor(s): Bellavita, Christopher. "September 2008." Description based on title screen as viewed on November 5, 2008. Includes bibliographical references (p. 121-126). Also available in print.
23

Meghea, Cristian Dickert-Conlin Stacy. "Social security, living arrangements, health, and the economics of the family." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2004. http://wwwlib.umi.com/cr/syr/main.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Almström, Malin, and Christina Olsson. "Requirement Specification for Information Security to Health Systems, Case Study : IMIS." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3790.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
During 2001-2002 a prototype, IMIS (Integrated Mobile Information System) was developed at BTH (Blekinge University of Technology) to demonstrate how mobile IT-systems can be used in healthcare. The prototype was based on the activity theory of Engeström. An ongoing project started in spring 2003. The purpose of the project is further development of IMIS with special focus in the diabetes healthcare. Participants in the project are scientists and students at BTH, ALMI Företagspartner, Blekinge FoU-enhet, Barndiabetesförbundet Blekinge, Blekinge Diabetesförening, Vårdcentralen Ronneby and Vårdcentralen Sölvesborg. The goal of IMIS is to develop a secure communication platform, which follows requirements from caretaker and caregiver as well as the Swedish laws regulating digital information and healthcare. The output of this master thesis is a requirement specification of information security for healthcare where IMIS has been used as a case study. The requirements specification follows the international standard SS-ISO/IEC 17799.
25

Addy, Naa Adoley. "Aviation : the new order (deregulation, the environment, health, safety and security." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32791.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Various aspects of the airline industry will have to be considered. In determining what the way forward should be, the very essence of airline transport must be laid bare. The industry will have to be classified, does it qualify as a global public good, or is it a mixed public/private commodity? What are the ill effects that this good has yielded as its by products? The aviation industry as a branch of global transportation will be examined in order to classify it. Methods of managing public goods effectively will be briefly considered. Following this will be an analysis of aviation development, the events preceding and following deregulation, the most significant player in the aviation world. Various perspectives and forms of regulation will be considered. References will be made to strict government regulation, deregulation and self regulation. This will lead to a consideration of other matters pertinent to the aviation industry e.g. health, safety, security, environmental aspects and how these should be managed. (Abstract shortened by UMI.)
26

Roberts, Stephen L. "Catching the flu : syndromic surveillance, algorithmic governmentality and global health security." Thesis, University of Sussex, 2018. http://sro.sussex.ac.uk/id/eprint/73582/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The thesis traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This thesis demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This thesis argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the thesis also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this thesis demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.
27

Aldajani, Mouhamad. "Electronic patient record security policy in Saudi Arabia National Health Service." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/6016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Saudi Arabia is in the process of implementing Electronic Patient Records (EPR) throughout its National Health services. One of the key challenges during the adoption process is the security of EPR. This thesis investigates the current state of EPR security in Saudi Arabia’s National Health Services (SA NHS) both from a policy perspective and with regard to its implementation in SA NHS’s information systems. To facilitate the analysis of EPR security, an EPR model has been developed that captures the information that is stored as part of the electronic record system in conjunction with stated security requirements. This model is used in the analysis of policy consistency and to validate operational reality against stated policies at various levels within the SA NHS. The model is based on a comprehensive literature survey and structured interviews which established the current state of practice with respect to EPRs in a representative Saudi Arabian hospital. The key contribution of this research is the development and evaluation of a structured and model-based analysis approach to EPR security at the early adoption stage in SA, based on types of information present in EPRs and the needs of the users of EPRs. The key findings show that the SA EPR adoption process is currently proceeding without serious consideration for security policy to protect EPR and a lack of awareness amongst hospital staff.
28

Santiago, Denise L. "Assessment of public health infrastructure to determine public health preparedness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FSantiago.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Anke Richter. "March 2006." Includes bibliographical references (p. 75-81). Also available online.
29

Ayo, Carmen I. "Florida security of communications act: friend or foe?" Honors in the Major Thesis, University of Central Florida, 1997. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/165.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Health and Public Affairs
Criminal Justice and Legal Studies
30

Fällman, Peter, and Henrik Dehring. "Utvärdering kring brandsäkerhet : Evaluation on fire security." Thesis, Karlstad University, Division for Social Sciences, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-533.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

Ända sen lagstiftarna i 1944, 1962 och 1974 års brandlagsstiftning samt 1986 års räddningstjänstlag har det funnits en strävan att öka kommunernas ansvar för brandsläckning, räddningstjänst och förebyggande brandskydd. I Lagen om skydd mot olyckor (2003:778) ska de olika aktörernas ansvar gällande brandsäkerhet tydliggöras, vilket kan ses som en naturlig utveckling av samhällets strävan mot en bättre brandsäkerhet. För att tillgodose kraven som Lagen om skydd mot olyckor ställer på ägare och nyttjanderättshavare så bör ett s.k. Systematiskt Brandskyddsarbete (SBA) bedrivas under hela byggnadens/anläggningens tid för användning och skall omfatta såväl verksamhet som organisation.

Landstinget är en aktör som berörs av Lagen om skydd mot olyckor eftersom en brand i ett sjukhus eller vårdinrättning kan, av lätt förståeliga skäl, få katastrofala följder. Landstinget i Värmland har de senaste åren genomfört en koncernövergripande översyn av sitt totala säkerhetsarbete. Landstinget i Värmland har en handlingsplan för att förebygga brand. Både utbildning och övning är viktiga delar i brandskyddet och all personal skall vara delaktiga.

Eftersom både utbildning och övning är viktiga delar i brandskyddet vid sjukhus så är det värdefullt med någon form av uppföljning/utvärdering. Uppföljningen bör vara relaterad till målen för utbildningen. Under och efter lärprocessen går det att fastställa i vilken grad utbildningsmålen har uppnåtts, dvs. har den studerande lärt sig det som avsågs? Syftet med uppsatsen är att utvärdera hur väl personalen på två avdelningar vid Centralsjukhuset i Karlstad anser sig ha tillräckliga kunskaper angående brandsäkerhet. Uppsatsen har genomförts som en pilotstudie på uppdrag av säkerhetsansvarig vid Landstinget i Värmland.

Första delen av utvärderingen är allmän och tar upp frågor som berör individens upplevda kompetens samt individens syn på organisationen vid brand. Nästa del i utvärderingen består av frågor kring landstingets mål med brandutbildning och omfattar de olika moment som utbildningsplanen tar upp. Den sista delen i undersökningen handlar om frågor som endast besvaras av personal som genomgått samverkansövning med Räddningstjänsten. Svarsalternativen är utformade för att ge respondenterna en möjlighet att uttrycka ett kvalitativt ställningstagande till frågorna i utvärderingen.

Positiva slutsatser är att stora delar av respondenterna anser sig ha tillräckliga kunskaper i brandsäkerhet. Respondenterna anser sig även ha tillräckliga kunskaper utifrån Landstinget i Värmlands mål med brandutbildningen för personal. De respondenter som genomgått samverkansövning med Räddningstjänsten verkar överlag anse sin egen och avdelningens kompetens tillräcklig för att fungera i samarbete med Räddningstjänsten. Respondenterna anser att både brandutbildning och brandövning har ökat deras handlingsförmåga vid brand i positiv utsträckning. En negativ slutsats är att det finns en tendens att respondenterna förlitar sig mer på avdelningen än sin egen förmåga att fungera i samarbete med Räddningstjänsten.

Slutligen ett förslag på fortsatt arbete inom området brandsäkerhet. Genom att använda sig av en följdfråga till varje enkätfråga kan man identifiera både styrkor och svagheter, vilket kan användas för att öka personalens upplevelse av en tryggare arbetsmiljö utifrån brandsäkerhetsperspektiv.


Since 1944, 1962 and 1974 years' fire legislation and 1986 years' rescue service law there has been an ongoing ambition to increase the municipalities' responsibilities for fireextinction, rescue service and preventive fire protection. In the Law about protections against accidents (2003:778) will the different operators' responsibilities current fire security be clarified, which can be seen as a natural development of the society's endeavor against a better fire security. In order to meet the requirements as the Laws about protections against accidents sets on owners and users there should be a Systematic Fire Prevention be carried out during the whole building's/plant's time for use and will cover as well activity as organisation.

Landstinget is an operator that is affected by the Law about protections against accidents, since a fire in a hospital or care institution can cause catastrophical consequences. Landstinget in the county of Värmland has over the last years implemented a concern overall review of its total security work. Landstinget in the county of Värmland has an action plan in order to prevent fire. Both education and exercise are important parts in the fire protection and all personnel will be participating.

Since both education and exercise are important parts in the fire protection at hospitals it is valuable with some kind of follow-up/evaluation. The evaluation should be related to the objectives for the education. During and after the education process it is possible to establish in which degree the education objectives have been achieved, which means, has the student learnt what was intended? The purpose of this essay is to evaluate how well the personnel on two departments at the Central hospital in Karlstad considers itself to have sufficient knowledge concerning fire security. This essay has been carried out as a pilot study on commission of the Manager of Security at Landstinget in the county of Värmland.

The first part of the evaluation is general and the questions concerns the individual's experienced competence and the individual's sights on how the organisation handle a fire. The second part of the evaluation discusses Landstinget in the county of Värmland’s objectives with fire education and covers those different aspects as the education plan covers. The last part of the survey deals with questions that only concerns the personnel that have undergone the collaboration exercise with Rescue Service. The reply alternatives are formulated in order to give the Respondents a possibility to give a qualitative stand-point to the questions in the evaluation.

A positive conclusion are that many of the Respondents considers’ themselves to have sufficient knowledge in fire security. Furthermore, the Respondents consider themselves to have sufficient knowledge about Landstinget in county of Värmland objectives with the fire education for personnel. The Respondents, who have undergone collaboration exercise with Rescue Service seems in a great extent to consider themselves and the department's competence sufficient in order to function in collaboration with the Rescue Service. The Respondents consider that both fire education and fire exercise has increased their ability to act during fire situation in a positive extent. A negative conclusion is that it seems to exist a tendency that the Respondents trust in a bigger extent more in the co-workers ability than their own ability to function in collaboration with the Rescue Service.

A suggestion on continued work is to use consequence questions to the respondents in order to identify both strength and weakness within the fire security as an aid in order to increase the personnel's experience of a safer work environment.

31

Andersson, Oscar. "Securing Electronic Health Records : A Blockchain Solution." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-107330.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Blockchain is an interesting technology, with different projects developing every day since it first gained its light back in 2008. More and more research finds blockchain useful in several different sectors. One of the sectors being healthcare, specifically for electronic health records (EHR). EHR contains highly sensitive data which is critical to protect and, just in the year 2019, 41,232,527 records were deemed stolen. Blockchain can provide several benefits when it comes to EHR, such as increased security, availability, and privacy, however, it needs to be done correctly. Due to blockchain being a rather novel technology, there is room for improvement when it comes to integrating blockchain with EHR. In this thesis a framework for EHR in the healthcare sector is proposed, using Ethereum based smart contracts together with decentralized off-chain storage using InterPlanetary File System (IPFS) and strong symmetric encryption. The framework secures the records and provides a scalable solution. Furthermore, a discussion and evaluation regarding several security aspects that the framework excels on as well as what the framework could improve on.
32

Dickmann, Petra [Verfasser], Michael [Gutachter] Bauer, André [Gutachter] Scherag, and Manfred [Gutachter] Wildner. "Risk communication in public health and health security / Petra Dickmann ; Gutachter: Michael Bauer, André Scherag, Manfred Wildner." Jena : Friedrich-Schiller-Universität Jena, 2018. http://d-nb.info/1170587321/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Al-umaran, Saleh. "Culture dimensions of information systems security in Saudi Arabia national health services." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11393.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified a set of cultural and sub-cultural dimensions in SA health information security and services.
34

Tyler, Lamonte Bryant. "Exploring the Implementation of Cloud Security to Minimize Electronic Health Records Cyberattacks." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5281.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Health care leaders lack the strategies to implement cloud security for electronic medical records to prevent a breach of patient data. The purpose of this qualitative case study was to explore strategies senior information technology leaders in the healthcare industry use to implement cloud security to minimize electronic health record cyberattacks. The theory supporting this study was routine activities theory. Routine activities theory is a theory of criminal events that can be applied to technology. The study's population consisted of senior information technology leaders from a medical facility in a large northeastern city. Data collection included semistructured interviews, phone interviews, and analysis of organizational documents. The use of member checking and methodological triangulation increased the validity of this study's findings among all participants. There were 5 major themes that emerged from the study (a) requirement of coordination with the electronic health record vendor and the private cloud vendor, (b) protection of the organization, (c) requirements based on government and organizational regulations, (d) access management, (e) a focus on continuous improvement. The results of this study may create awareness of the necessity to secure electronic health records in the cloud to minimize cyberattacks. Cloud security is essential because of its social impact on the ability to protect confidential data and information. The results of this study will further serve as a foundation for positive social change by increasing awareness in support of the implementation of electronic health record cloud security.
35

Mahncke, Rachel J. "Measuring and applying information security governance within general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Australia is in the process of adopting a national approach towards the secure electronic exchange of health information. The health information contributions of general practices as the primary point of patient medical care, will be critical to the success of an interoperable national healthcare system. Sharing information creates vulnerabilities by increasing exposure to information security threats. Consequently, improvement in information security practice within general practice may positively contribute towards improved patient care by providing access to timely and accurate information. There is renewed focus within general practice on information security, inter alia the introduction of: the Royal Australian College of General Practitioners (RACGP, 2014) Computer and Information Security Standards (CISS, 2013); privacy law reform in 2014; an evolving national electronic heath record system; litigation relating to information breaches; and continuing Australian public support for mandatory data breach notification legislation.The implementation of reliable information security procedures within general practices will be critical to secure the exchange of confidential patient information. Protecting patient health information requires appropriate security measures in regards to technologies, policies, and procedures as well as ensuring that staff are well trained and aware of these security activities. Adherence to industry standard security activities will enable general practices to take responsibility for their information security thereby minimising the threat of lost or stolen information. To meet the rising number of information security threats, general practices need to adopt a framework of accountability and control to address and demonstrate effective information security management and governance. The governance component of information security remains insufficiently addressed within Australian general practice at present.This thesis demonstrates an application of international standards at a strategic level, and proposes a functional process improvement framework against which general practices can assess and implement effective information security governance. This interpretation and operationalisation of international governance of information security standard ISO/IEC 27014:2013 (ISO, 2013), had not previously been undertaken. Further, application of information security governance within the Australian general practice environment had not previously been undertaken, and formed the basis for establishing a positive information security culture.A qualitative action research methodology was utilised for the collection of national data. Further, iterative action research cycles were applied to develop the practical information security governance framework for use within general practice. Following a review of the literature, a preliminary framework was developed to include industry best practice standards and information security compliance criteria applicable to general practice. This initial governance framework extends the industry security standards developed by the RACGP CISS (2013), ISACA’s COBIT 5 (2012), NEHTA’s NESAF (2012) governance framework and Williams’ TIGS-CMM model (2007c). Information security experts validated the information security governance framework during focus groups and interview data collections, which included representatives from key Australian healthcare organisations.Following development, the governance framework was applied and tested within general practices during iterative cycles of interviews. General practice participants conducted a self-assessment against the framework, responded to semi-structured interview questions, and policy documentation was analysed. The governance framework was revised following these iterations and cycles of action research. The objective of this research method was to achieve a ‘theoretical saturation’ of the theory whereby the patterns in the general practice interviews indicated when no new information was being yielded (Mason 2010). A final cycle of a general practice interview was conducted to verify the appropriateness of the information security governance framework within Australian general practice.The contribution of this research was both theoretical and practical. A holistic governance framework and process was synthesised and formulated, which aimed to assist general practices to meet their legal and industry related compliance security responsibilities, by securing information assets in an escalating threat environment. The governance approach was designed to be achievable and sustainable for general practices over time, whilst encouraging incremental improvement in security performance. To address the people aspect of security, the governance process incorporated a risk-based structure for the review of security breaches and performance measures, to assist in making the necessary governance decisions by amending policies and processes, and accessing the required training. This strategic approach extends international and industry best practice of information security governance for use in Australian general practice, with the aim of improving the protection of confidential health information
36

Hiscock, Rosemary Esther. "The relationship between housing tenure and health : does ontological security play a role?" Thesis, University of Glasgow, 2001. http://theses.gla.ac.uk/6146/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Previous research in the UK and elsewhere has found that housing tenure (i.e. whether the dwelling is owned or rented) predicts mortality and morbidity. This thesis aims to explain whether ontological security (a long term tendency to believe things are reliable and secure as opposed to threatening) is more likely to be associated with owner occupation, and therefore whether it helps to explain the observed association with tenure and health. For the purposes of this study ontological security was operationalised as being formed of three components: protection, autonomy and prestige. A scale was devised to measure ontological security arising from the home through these three components. This scale was included in a postal survey that also included questions on health, housing area, psychological and sociodemographic characteristics. The postal survey was sent to a random sample of adults in the West of Scotland and nearly 300 completed questionnaires were returned. I found that ontological security was associated with owner occupation but not independently of features of housing. Ontological security was not independently related to housing tenure itself. Owner occupiers reported more ontological security from their homes because their homes were in better condition, situated in better areas and of higher value than social renters. Ontological security appeared to be related to health particularly through psychological characteristics. Other reasons for the associations between tenure and health were that owners were on average younger and richer than social renters. This study suggests that social meaning per se may not be health damaging, but that social rented homes might put their occupants at greater health risk because they are in poorer condition, located in more poorly resourced and problem ridden areas and of lower status. These features of social renting may also be observed in other countries (e.g. USA).
37

Thomas, Maurice A. "Evaluating Electronic Health Records Interoperability Symbiotic Relationship to Information Management Governance Security Risks." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13808526.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

A major initiative in the U.S. healthcare care industry is to establish a nationwide health information network securing the sharing of information between all involved U.S. healthcare stakeholders. However, implementing an interoperability solution is a massive, complex, and enduring effort with significant challenges such as inconsistent technology and data standards, as well as complex privacy and security issues. The purpose of this qualitative, case study is to examine the impacts of interoperability initiatives involving the U.S. government and to provide an understanding of the information governance and security risk as standards that are vendor-neutral and trustworthy. This qualitative case study was conducted using federal participants who are health information management (HIM) and health information technology (HIT) professionals working in the Washington DC metropolitan area. The participants' interview data revealed nine major themes; patient identification matching, payment claims and auditing, information sharing, data stewardship, regulatory compliance, technology enhancements, training and certification, standards optimization, and value-based care. The implication of the study's themes showed interoperability is beneficial to the healthcare industry, but there is a greater need for technology and data standardization, information governance, data stewardship, and a greater understanding of federal and state data privacy and security laws. Future recommendation for practices discussed; policy and regulatory adjustments to enhance auditing and compliance, establish a healthcare data ecosystem to improve data and information governance, and technology alternatives such as master data management and white space data. Recommendation for further research included expanding the sample population to compare other federal organizations or the United Kingdom's HIT interoperability project initiative.

38

Huff, Patrick D. "China Study| Emerging Challenges in Social Security, Health Care, and Leadership| Volume I." Thesis, Pepperdine University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13807532.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

China is poised to introduce sweeping innovation and disruptive social change onto their national stage. As China’s leadership, economic power, and authority increase the country will be subject to increasing internal and external challenges. This study seeks to identify the significant internal social challenges China is most likely to confront along its path to global leadership. The purpose is to explore and discover the social challenges that are likely to face China and to predict the direction the country’s leadership will take over the next decade. The study approaches the problem by undertaking an initial 9-step process of investigating 6 environmental categories as influencers or drivers of change. This approach utilizes Schmieder and Mallette’s SPELIT Matrix Model; Saldana’s Themeing and Coding technique; and, Turoff’s Real-time Policy Delphi Method to identify these influential environmental categories and factors. The study then focuses on examining cultural ideologies, leadership, and organizational behavior as they converge to influence China’s social priorities. This study’s design and approach places emphasis on developing an extensive background and investigation into China’s historic, present, and future leadership ideologies as they are likely to drive the country’s social security and health care reforms. As a means of identifying critical themes and determining a valid focus, the study combines complex algorithmic analysis with a relevant Policy Delphi study to discover and confirm a set of valid policy reform predictions. This study assumes that China’s future challenges will be shaped by the country’s global growth, internal social environmental, transitioning ethnological, and intercultural ideologies as it shifts to a position of global superiority. This study’s findings and recommendations are significant in the context of assisting leaders, scholars, and analysts frame a subsequent narrative toward shaping policy decisions by addressing China’s present and future internal tensions due to a social security and health care crisis.

39

Huff, Patrick D. "China Study| Emerging Challenges in Social Security, Health Care, and Leadership| Volume II." Thesis, Pepperdine University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13812642.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

China is poised to introduce sweeping innovation and disruptive social change onto their national stage. As China’s leadership, economic power, and authority increase the country will be subject to increasing internal and external challenges. This study seeks to identify the significant internal social challenges China is most likely to confront along its path to global leadership. The purpose is to explore and discover the social challenges that are likely to face China and to predict the direction the country’s leadership will take over the next decade. The study approaches the problem by undertaking an initial 9-step process of investigating 6 environmental categories as influencers or drivers of change. This approach utilizes Schmieder and Mallette’s SPELIT Matrix Model; Saldana’s Themeing and Coding technique; and, Turoff’s Real-time Policy Delphi Method to identify these influential environmental categories and factors. The study then focuses on examining cultural ideologies, leadership, and organizational behavior as they converge to influence China’s social priorities. This study’s design and approach places emphasis on developing an extensive background and investigation into China’s historic, present, and future leadership ideologies as they are likely to drive the country’s social security and health care reforms. As a means of identifying critical themes and determining a valid focus, the study combines complex algorithmic analysis with a relevant Policy Delphi study to discover and confirm a set of valid policy reform predictions. This study assumes that China’s future challenges will be shaped by the country’s global growth, internal social environmental, transitioning ethnological, and intercultural ideologies as it shifts to a position of global superiority. This study’s findings and recommendations are significant in the context of assisting leaders, scholars, and analysts frame a subsequent narrative toward shaping policy decisions by addressing China’s present and future internal tensions due to a social security and health care crisis.

40

Hewage, Sumali S. "The Relationship of Food Security, Cervical Health, and Produce Intake in Rural Appalachia." Ohio University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1397295968.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Papakonstantinou, Maria. "e-Prescriptions : Privacy concerns and security risks in Greece’s e-Health care system." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-67143.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The present thesis presents an informed by ethnography research that seeks to explore the privacy concerns and security risks that individuals perceive with regards to the electronic system of handling digital prescriptions. The research takes place in Athens, Greece and the participants are professionals who use daily the e-prescription platform and citizens whose data is being gathered and accessed. The paradiagm within which the research is unfolded is the interpretive one and a methodology of flexible design is followed. Thematic analysis of concepts produced by the data gathered is followed in order to offer an understanding of the concerns that the participants perceive. The methods that were used were interviews with professionals, focus groups with groups of citizens, individual interviews with citizens, observations and thinking aloud in pharmacies. The aim of the thesis is to illuminate those concerns with the aspiration that it be used as a basis for further research on the important issue of privacy of sensitive, medical data and suggest ways that could help ameliorate the identified concerns.
42

Wang, Yu. "The Association between Household Food Security and Metabolic Syndrome Among U.S. Children." Ohio University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1289589496.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Ruiz, Daniel Alfonso. "FHIR| Cell-Level Security and Real Time Access with Accumulo." Thesis, University of Colorado at Colorado Springs, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108817.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

The American Recovery and Reinvestment Act (ARRA) requires the adoption of Electronic Medical Records (EMRs) for seventy percent of the primary care provider population by 2014. Furthermore, by 2015 providers are expected to be utilizing EHR in compliance with “meaningful use”[28] definition or they can face financial penalties under Medicare. In addition to this momentous task, EMR data has stringent security requirements. It is largely due to these security requirements that medical information is being digitized. However, sharing to entitled information is often slow or non-existent because of information silos. Fast Healthcare Interoperability Resources (FHIR) is an emerging information sharing standard that is designed to aid in the tearing down of these silos. The focus of this thesis is to show how FHIR can be further improved by allowing for cellular level security. Additionally, this thesis will introduce novel ways that vast amounts of FHIR resources can be stored and queried in real-time with Accumulo. It will do so by utilizing and improving on Dynamic Distributed Dimensional Data Model (D4M) [9] Schema to better allow for “real-time” REST queries of FHIR compliant data. Pagination is necessary for it to remain a real-time system since some queries can have millions or even billions of positive hits. To satisfy this requirement a new approach to Accumulo pagination is laid out that increases performance, flexibility and control. All tests are performed against a M4.2xlarge Amazon Machine Image.

44

Mohammad, Yara Mahmoud. "Information security strategy in telemedicine and e-health systems : a case study of England’s shared electronic health record system." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4669.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Shared electronic health record (EHR) systems constitute an important Telemedicine and e-Health application. Successful implementation of shared health records calls for a satisfactory level of security. This is invariably achieved through applying and enforcing strict, and often quite complicated, rules and procedures in the access process. For this reason, information security strategy for EHR systems is needed to be in place. This research reviewed the definition of different terms that related to electronically stored and shared health records and delineated related information security terms leading to a definition of an information security strategy. This research also made a contribution to understanding information security strategy as a significant need in EHR systems. A major case study of the National Programme for IT (NPfIT) in England is used to be the container of other two sub-case studies in two different Acute Trusts. Different research methods used: participant observation and networking, semi-structured interviews, and documentary analysis. This research aimed to provide a comprehensive understanding to the information security strategy of England’s EHR system by presenting its different information security issues such as consent mechanisms, access control, sharing level, and related legal and regulatory documents. Six factors that influence the building of an information security strategy in EHR systems, were identified in this research, political, social, financial, technical, clinical and legal. Those factors are considered to be driving the strategy directly or indirectly. EHR systems are technical-clinical systems, but having other factors (than technical and clinical) that drive this technical-clinical system is a big concern. This research makes a significant contribution by identifying these factors, and in addition, this research shows not only how these factors can influence building the information security strategy, but also how they can influence each other. The study of the mutual influence among the six factors led to the argument that the most powerful factor is the political factor, as it directly or indirectly influences the remaining five factors. Finally, this research proposes guidelines for building an information security strategy in EHR systems. These guidelines are presented and discussed in the form of a framework. This framework was designed after literature analysis and after completing the whole research journey. It provides a tool to help putting the strategy in line by minimising the influence of various factors that may steer the strategy to undesirable directions.
45

Mahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Information security has significant role in Healthcare organizations. The Electronic Health Record (EHR) with patient’s information is considered as very sensitive in Healthcare organization. Sensitive information of patients in healthcare has to be managed such that it is safe and secure from unauthorized access. The high-level quality care to patients is possible if healthcare management system is able to provide right information in right time to right place. Availability and accessibility are significant aspects of information security, where applicable information needs to be available and accessible for user within the healthcare organization as well as across organizational borders. At the same time, it is essentials to protect the patient security from unauthorized access and maintain the appropriate level in health care regarding information security. The aim of this thesis is to explore current management of information security in terms of Electronic Health Records (EHR) and how these are protected from possible security threats and risks in healthcare, when the sensitive information has to be communicated among different actors in healthcare as well as across borders. The Blekinge health care system was investigated through case study with conduction of several interviews to discover possible issues, concerning security threats to management of healthcare. The theoretical work was the framework and support for possible solutions of identified security risks and threats in Blekinge healthcare. At the end after mapping, the whole process possible guidelines and suggestions were recommended for healthcare in order to prevent the sensitive information from unauthorized access and maintain information security. The management of technical and administrative bodies was explored for security problems. It has main role to healthcare and in general, whole business is the responsibility of this management to manage the sensitive information of patients. Consequently, Blekinge healthcare was investigated for possible issues and some possible guidelines and suggestions in order to improve the current information security with prevention of necessary risks to healthcare sensitive information.
muqadas@gmail.com
46

Kvastad, Johan. "ICT Security of an Electronic Health Record System: an Empirical Investigation : An in depth investigation of ICT security in a modern healthcare system." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194121.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
An empirical investigation of the security flaws and features of an in-use modern electronic health record system is performed. The investigation was carried out using dynamic analysis, manual testing and interviews with developers. The results indicate that in-use electronic health record systems suffer from serious authentication flaws, arising from the interaction of many different proprietary systems. The authentication problems are so severe that gaining access to any user’s computer on the hospital intranet would compromise a large database of patient medical records, including radiological data regarding the patients. Common web vulnerabilities were also present, such as injections and incorrectly configured HTTP security headers. These vulnerabilities were heavily mitigated by the use of libraries for constructing web interfaces.
En empirisk undersökning av säkerheten inom ett modernt elektroniskt patientjournal-system har utförts. Undersökningen genomfördes med hjälp av dynamisk analys, manuell testning och intervjuer med utvecklarna. Resultatet indikerar att system för elektroniska patientjournaler har stora brister inom autentisering, vilka uppstår p.g.a. att flera olika kommersiella system måste samarbeta. Problemen är så allvarliga att med tillgång till en enda dator på intranätet kan en stor databas med patientdata äventyras, inklusive radiologisk data gällande patienterna. Vanliga websårbarheter fanns också, så som injektioner av skript och inkorrekt konfigurerade HTTP säkerhetsheaders. Dessa sårbarheter mitigerades starkt genom användandet av bibliotek för webinterface.
47

Petrera, Margarita. "Reflections for a Sectoral Health Policy for Peru Based for on the National Health Accounts." Economía, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/116848.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The objective of this article is to offer those responsible for the Peruvian health rectorship reflections on sectoral policy derived from the study of the country’s National Health Accounts (1995-2014). While it is true that the country has increased its spending on health from 4.4 to 5.2% of GDP, 33% of its total funding comes from household «out of pocket expense», which indicates that change is necessary. Problems in the responsiveness of the health system to greater funding and public expenditure, linked to issues of rectorship and service organization, are apparent.Although there has been an increase in numbers of people with insurance, the restrictions on what is covered prevent the great majority of these people accessing health services. The most important change in the public administration of expenditure has been decentralization, while in the private administration it has been the vertical integration of providers and insurers, which has given rise to a new agent: the health investor.The article concludes that the country is still far from being able to finance the aim of universal access to health care. Recommendations to improve the funding, joint administration, and expenditure point, almost simultaneously, towards generating greater public funding and social security within an active policy aimed at improving the global efficiency and institutionality ofthe system, which should work to the advantage of better health results as well to drastically decrease household pocket expense. Therefore, the success of the financial function is closely related to the adequate performance of the functions of rectorship and provision.
El artículo tiene como objetivo ofrecer a los responsables de la rectoría en salud las reflexiones de política sectorial que se derivan del estudio de las Cuentas Nacionales de Salud (1995-2014) del país. Si bien el país ha incrementado el gasto en salud del 4,4 al 5,2% del PIB, el «gasto de bolsillo de los hogares» constituye el 33% del total del financiamiento, lo que requiere modificar sucomposición. Se advierten problemas en la capacidad de respuesta del sistema de salud al mayor financiamiento y gasto público, que se vinculan a temas de rectoría y organización de la prestación.Si bien el aseguramiento se ha incrementado, las restricciones en la oferta impiden que las personas afiliadas a algún tipo de seguro puedan, en su gran mayoría, acceder a los servicios de salud. El cambio más importante en la gestión pública del gasto es la descentralización, mientras que en la gestión privada lo es la integración vertical de prestadores y aseguradoras, dando surgimiento a un agente nuevo: el inversionista en salud.Se concluye que el país se encuentra, todavía lejos de poder financiar la meta de universalización del acceso en salud. Las recomendaciones para mejorar el financiamiento, mancomunación y el gasto apuntan, casi simultáneamente, a generar un mayor financiamiento público y de la seguridad social dentro de una activa política de mejora de la eficiencia global e institucional del sistema, la que debe redundar tanto en mejores resultados sanitarios, como en la disminución drástica del gasto de bolsillo. Por tanto, el buen éxito de la función financiera está íntimamente relacionado con el buen desempeño de las funciones de rectoría y prestación.
48

Mollee, Eefke Maria. "The use of urban plant resources for health and food security in Kampala, Uganda." Thesis, Bangor University, 2017. https://research.bangor.ac.uk/portal/en/theses/the-use-of-urban-plant-resources-for-health-and-food-security-in-kampala-uganda(5b37f51c-3899-4d37-b4c2-c3eb34aa949c).html.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With some of the highest urbanisation rates in the world, Sub-Saharan Africa faces serious challenges in providing sufficient, healthy and affordable foods for its growing urban populations. Urban biodiversity, such as homegardens can provide people with healthy food products in addition to other ecosystem services. However urban plant systems are under threat, and even though they provide multiple uses they are still poorly understood. In this dissertation, I explored two urban landscape options: homegardens and wild collection. The overall aim of this study was to provide an understanding of the current and potential contribution of urban plant resources to human wellbeing (with a focus on food security) in Kampala, Uganda. To fulfil this aim, I created 4 objectives: 1) to assess plant species composition and use in Kampala’s homegardens, 2) to explore associations between homegardens and socio-economic determinants of dietary diversity and fruit consumption of children aged 2-5 years, 3) to explore the prevalence and determinants of wild plant collectors in Kampala, Uganda, and 4) to assess the extent and importance of alternative food sources of different food groups for low income people. Through a two-stage cluster sampling design in inner-, outer- and peri-urban parts of the city, 96 low-income households were purposively selected in nine parishes. These homegardens were inventoried, plant uses were documented and respondents interviewed on socio-economic data, the status of household food insecurity and food sources. In addition, respondents were asked about wild collection behaviour. Dietary data (for Dietary Diversity Score (DDS) and Food Variety Score (FVS)) were collected from an index child (aged 2-5 years) and the child’s female caretaker. In the final dataset (n=74) a total of 270 plant species were identified of which 248 different food plants were considered useful: 101 medicinal species, 70 food plants, 53 technical plants and 24 ornamental species. Even though this study provided no direct evidence that higher garden agrobiodiversity improves dietary diversity and nutritional status of children during the fieldwork season, comparisons with secondary data suggests that the children included in this study have better nutritional status then urban children in Uganda overall. This could indicate that children with access to homegardens have better nutritional status. Moreover 5% of the food items consumed during the recall was derived from the homegardens and 33% of the food items came from neighbours or friends. In addition, half of the respondents reported collecting wild plants during the six months preceding the interview. From the total of 48 different plant species declared, almost half (23 species) were collected for food purposes, while the other 25 species were collected for medicinal purposes and were also collected more frequently. The findings indicate that urban homegardens and wild space can play an important role in human wellbeing. It is important to incorporate biodiversity and green structures in urban landscape designs to create holistic sustainable cities. However, this requires transdisciplinary collaborations between city planners, ecologists, human nutritionists and ethnobotanists. Highly valuable (and nutritious) plant species should be selected and promoted. Innovative practices should be developed and tested to lift the current barriers and challenges that keep people from growing them. The overall value of gardens and green space should be acknowledged and local knowledge rewarded. These are necessary steps that need to be taken to keep urban gardens and urban green space worthy of being in the city without being thought of as rural or polluted. Most importantly it provides Kampala with an opportunity to remain a leading green Garden City.
49

Bajwa, Garima. "Sensing and Decoding Brain States for Predicting and Enhancing Human Behavior, Health, and Security." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc862723/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The human brain acts as an intelligent sensor by helping in effective signal communication and execution of logical functions and instructions, thus, coordinating all functions of the human body. More importantly, it shows the potential to combine prior knowledge with adaptive learning, thus ensuring constant improvement. These qualities help the brain to interact efficiently with both, the body (brain-body) as well as the environment (brain-environment). This dissertation attempts to apply the brain-body-environment interactions (BBEI) to elevate human existence and enhance our day-to-day experiences. For instance, when one stepped out of the house in the past, one had to carry keys (for unlocking), money (for purchasing), and a phone (for communication). With the advent of smartphones, this scenario changed completely and today, it is often enough to carry just one's smartphone because all the above activities can be performed with a single device. In the future, with advanced research and progress in BBEI interactions, one will be able to perform many activities by dictating it in one's mind without any physical involvement. This dissertation aims to shift the paradigm of existing brain-computer-interfaces from just ‘control' to ‘monitor, control, enhance, and restore' in three main areas - healthcare, transportation safety, and cryptography. In healthcare, measures were developed for understanding brain-body interactions by correlating cerebral autoregulation with brain signals. The variation in estimated blood flow of brain (obtained through EEG) was detected with evoked change in blood pressure, thus, enabling EEG metrics to be used as a first hand screening tool to check impaired cerebral autoregulation. To enhance road safety, distracted drivers' behavior in various multitasking scenarios while driving was identified by significant changes in the time-frequency spectrum of the EEG signals. A distraction metric was calculated to rank the severity of a distraction task that can be used as an intuitive measure for distraction in people - analogous to the Richter scale for earthquakes. In cryptography, brain-environment interactions (BBEI) were qualitatively and quantitatively modeled to obtain cancelable biometrics and cryptographic keys using brain signals. Two different datasets were used to analyze the key generation process and it was observed that neurokeys established for every subject-task combination were unique, consistent, and can be revoked and re-issued in case of a breach. This dissertation envisions a future where humans and technology are intuitively connected by a seamless flow of information through ‘the most intelligent sensor', the brain.
50

Swayne, Holly Lynne. "Star Power, Pandemics, and Politics: The Role of Cultural Elites in Global Health Security." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7581.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Celebrities have historically served a variety of roles in society ranging from the inspirational to the cautionary, utilizing their platforms of visibility to promote themselves, their work, as well as their social and political causes. This study focuses on celebrities as activists engaging with global health issues, with particular attention to the form this engagement takes, the publicity it receives in the mass media, and the types of global health issues that receive the most celebrity attention. An interdisciplinary approach drawing from theories of power, social movement theory, agenda-setting, and cultural studies is used to achieve greater understanding of underlying components of the framework within which this activism exists. Guiding this research is the primary question, “How do cultural elites prominent in U.S. media impact global health security?”, where the specific subset of cultural elites examined are the most influential Hollywood celebrity actors in film. A series of secondary research questions provide insight on the multiple dimensions of celebrity influence and impact in the context of global health security. Specifically, how does celebrity activism affect global health security discourses? What “truths” are created by celebrity activism in global health? Finally, are the issues these celebrities are advocating for, the most pressing global health concerns? Utilizing a mixed-methods approach (quantitative-qualitative-quantitative), I demonstrate the most frequent forms of celebrity engagement with their affiliated global health organizations, as well as the media attention devoted to this engagement in the most prominent U.S. newspapers. Furthermore, I offer empirical evidence of how global health engagement of the most influential celebrities compares to the most pressing global health concerns, as expressed through an analysis of the global health issues that claim the most lives globally. Results demonstrate the most effective application of celebrity resources, and determine whether celebrities can be differently situated for greater impact in global health security overall.

До бібліографії