14,968 results on '"CONFIDENTIAL communications"'
Search Results
2. The art of effective communication between family physicians and their adolescent patients: Challenges and solutions
- Author
-
Ayoub, Basel
- Published
- 2024
3. The Buddy Program: High school students inform the design of a school-based peer support program for concussion.
- Author
-
Shepherd, Heather A., van den Berg, Carla, Reed, Nick, Caron, Jeffrey G., Yeates, Keith O., and Emery, Carolyn A.
- Subjects
- *
PEER training programs (Education) , *HIGH school students , *BRAIN concussion , *CONFIDENTIAL communications , *SOCIAL support , *PEER teaching , *ACADEMIC accommodations - Abstract
Prior research provides little guidance on how to support return to school post-concussion. Peer support may be one strategy to enable adolescents to return to school post-concussion. The purpose of this study was to explore what high school students preferred in a school-based peer support program post-concussion. We conducted a qualitative instrumental case study in one high school in Calgary, Canada. Seven semi-structured focus groups were conducted with 53 high school students (16 boys, 36 girls, 1 preferring not to disclose gender; median age = 16 years, range = 15-18 years). All adolescents were enrolled in a sport medicine course and had either a history of concussion (
n = 20) or were interested in supporting peers who had sustained a concussion (n = 33). Focus group questions aimed to solicit which factors the adolescents believed should be considered in the development of a post-concussion peer support program. We analyzed the focus group transcriptions using content analysis. Adolescents preferred a one-on-one Buddy Program. A one-on-one environment would provide a trusting and confidential relationship between the student with a concussion and their buddy. Peer support could include social support, advocacy support for academic accommodations, tutoring support, and concussion education. In future, the Buddy Program should be piloted in high schools. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
4. Wie Mikrocontroller sich selbst und ganze System sichern.
- Author
-
Dinsmore, Kimberly
- Subjects
INTERNET access ,MICROCONTROLLERS ,ELECTRONIC systems ,CONFIDENTIAL communications ,FACTORIES - Abstract
Copyright of Elektronik Industrie is the property of Hüthig GmbH and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
5. Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network.
- Author
-
Rai, Ashok Kumar and Daniel, A. K.
- Subjects
- *
SMART cities , *MULTISENSOR data fusion , *ENERGY consumption , *DETECTORS , *CONFIDENTIAL communications - Abstract
A wireless sensor network (WSN) can be used for various purposes, including area monitoring, health care, smart cities, and defence. Numerous complex issues arise in these applications, including energy efficiency, coverage, and intruder detection. Intruder detection is a significant obstacle in various wireless sensor network applications. It causes data fusion that jeopardizes the network's confidentiality, lifespan, and coverage. Various algorithm has been proposed for intruder detection where each node act as an agent, or some monitoring nodes are deployed for intruder detection. The proposed protocol detects intruders by transmitting a known bit from the Cluster Head (CH) to all nodes. The legal nodes must acknowledge their identification to the CH in order to be valid; otherwise, if the CH receives an incorrect acknowledgement from a node or receives no acknowledgement at all, it is an intruder. The proposed protocol assists in protecting sensor data from unauthorized access and detecting the intruder with its location through the identity of other legal nodes. The simulation results show that the proposed protocol delivers better results for identifying intruders for various parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Gandy & 'Books under threat: A response.
- Author
-
Houghton, Frank
- Subjects
- *
PUBLISHING , *POSTAL service , *SCHOLARLY communication , *CONFIDENTIAL communications , *SCHOLARLY publishing - Abstract
The article "Gandy & 'Books under threat: A response" discusses the impact of Open Access requirements on academic publishing, particularly in the UK. It highlights the inequitable opportunities in knowledge dissemination and production, focusing on factors like time, gender, race, language, and disciplinary background. The article also critiques the traditional academic publishing industry's dominance by a profitable oligopoly and advocates for Open Access publishing to address inequalities and improve access to academic materials globally. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
7. Efficient and secure message authentication algorithm at the physical layer.
- Author
-
Noura, Hassan N., Melki, Reem, Chehab, Ali, and Hernandez Fernandez, Javier
- Subjects
- *
PHYSICAL layer security , *DATA integrity , *CONFIDENTIAL communications - Abstract
Message authentication, which refers to source authentication and message integrity, is an essential security service, especially in emerging networks such as peer-to-peer, Device-to-Device, LPWAN (such as NB-IoT, LTE-M or SigFox) and vehicle to vehicle. Traditionally, message authentication schemes handled at upper layers of the protocol stack. Such schemes require multiple rounds and multiple operations per round, which results in a considerable overhead in terms of latency and required resources. Recently, many research works have shifted towards investigating the design of new security solutions at the physical layer (PLS). Although data confidentiality and device authentication schemes have been introduced at the physical layer, yet, no PLS message authentication scheme has been presented. In this paper, we propose a dynamic message authentication algorithm (keyed hash function) that makes use of a secret session key in addition to the random characteristics of the physical channel. Moreover, the cryptographic primitives are dynamic and get updated in a lightweight manner for every input frame symbol. Security and performance analysis were conducted to validate the efficiency and robustness of the proposed scheme. The results confirmed that the proposed authentication scheme exhibits a high level of security with minimum overhead in terms of delay. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Administrative guidance for the preparation of novel food applications in the context of Article 10 of Regulation (EU) 2015/2283.
- Subjects
- *
FOOD laws , *DISCLOSURE , *FOOD safety , *COOKING , *CONFIDENTIAL communications - Abstract
This document provides guidance to applicants submitting applications on novel foods in the European Union, which are to be evaluated by EFSA. It describes the administrative requirements for the preparation and online submission of the dossier to support an application pursuant to Article 10 of Regulation (EU) 2015/2283 for a new authorisation or for the modification of an existing authorisation of a novel food for applications submitted to the European Commission as of 1 February 2025. The Transparency Regulation amended the General Food Law by introducing provisions in the pre‐submission phase and in the application procedure: general pre‐submission advice, notification of information related to studies commissioned or carried out to support an application, public disclosure of non‐confidential version of all information submitted in support of the application and related confidentiality decision‐making process, public consultation on submitted applications. These requirements, as implemented by the Practical Arrangements laid down by EFSA, are reflected in this guidance. The guidance describes the procedure and the associated timelines for handling applications on novel foods, the different possibilities to interact with EFSA and the support initiatives available from the preparation of the application (pre‐submission phase) to the adoption and publication of EFSA's scientific opinion. It also takes into account the updated Guidance on the scientific requirements for an application for authorisation of a novel food in the context of Regulation (EU) 2015/2283, which provides advice on the scientific information needed to be submitted by the applicant towards demonstrating the safety of the novel food. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. The ‘soft’ sides of ISO17025.
- Author
-
Neuteboom, Wim and Ross, Alastair
- Subjects
- *
CRIME laboratories , *CODES of ethics , *FAIRNESS , *TOTAL quality management , *CONFIDENTIAL communications - Abstract
Where accredited, the vast majority of forensic science laboratories, globally, are accredited to the ISO Standard ISO/IEC17025:2017 (ISO17025). The standard consists of diverse sections including Resource requirements and Process requirements which are afforded much attention. In our view, given significantly less attention are General and Structural requirements which address important issues that are critical, although often neglected, in the quality landscape, such as Impartiality, Confidentiality, Integrity, Culture and Improper influence. We highlight their importance in this article under the heading ‘soft’ clauses and suggest some preventive measures to be taken, as neglecting these aspects could be disastrous in many respects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Keylogger ve Gizlilik: Makine Öğrenimi Modellerinin Karşılaştırması.
- Author
-
KIZILTEPE, Seher and GÜLBANDILAR, Eyyüp
- Subjects
RANDOM forest algorithms ,DECISION trees ,MACHINE learning ,SPYWARE (Computer software) ,CONFIDENTIAL communications - Abstract
Copyright of Afyon Kocatepe University Journal of Science & Engineering / Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi is the property of Afyon Kocatepe University, Faculty of Science & Literature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
11. EU: Provider of TikTok As Gatekeeper Under Digital Markets Act.
- Subjects
BUSINESS planning ,DISCLOSURE ,ONLINE social networks ,GENERAL Data Protection Regulation, 2016 ,CONFIDENTIAL communications - Abstract
This article examines a case involving TikTok and its designation as a gatekeeper under the Digital Markets Act. The provider of TikTok has failed to prove the urgency of suspending this designation to protect against harm. The article discusses the alleged breach of confidentiality and concludes that being designated as a gatekeeper does not result in an irreparable breach of confidentiality. It also discusses the requirements for granting interim measures in a legal case, emphasizing the need for specific and detailed information to justify such measures. The article addresses the alleged harm caused by Regulation 2022/1925, particularly regarding the use of personal data by TikTok. The Commission disputes these arguments, stating that the harm is hypothetical and can be resolved through compensation. Ultimately, the article concludes that the application for interim measures should be dismissed. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
12. Satellite image encryption using 2D standard map and advanced encryption standard with scrambling.
- Author
-
Benchikh, Omar, Bentoutou, Youcef, and Taleb, Nasreddine
- Subjects
ADVANCED Encryption Standard ,REMOTE-sensing images ,LEAKS (Disclosure of information) ,IMAGING systems ,IMAGE encryption ,CONFIDENTIAL communications - Abstract
In today's world, the need for higher levels of security in storing and transferring data has become a key concern. It is essential to safeguard data from any potential information leaks to prevent threats that may compromise data confidentiality. Therefore, to protect critical and confidential satellite imagery, this paper proposes a novel encryption method based on the combination of image bands scrambling with chaos and the advanced encryption standard (AES). The proposed approach aims to enhance the security of satellite imagery while maintaining efficiency and robustness against various attacks. It possesses several appealing technical characteristics, notably a high level of security, a large key space, and resilience to single event upsets (SEUs) and transmission errors. To evaluate the performance of the proposed encryption technique, extensive experiments have been conducted by considering factors such as security level, resistance to SEUs, and computational efficiency. Our results demonstrate that the proposed method achieves a high level of security and a large key space, ensuring the confidentiality and integrity of satellite imagery data. Furthermore, the method exhibits resilience against SEUs and transmission errors, and offers efficient processing, making it suitable for real-world applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Physical Layer Security of Ground-to-UAV Communication in the Presence of an Aerial Eavesdropper Outside the Guard Zone.
- Author
-
Anastasov, Jelena, Cvetković, Aleksandra, Panajotović, Aleksandra, Milović, Daniela, Milić, Dejan, and Milošević, Nenad
- Subjects
PHYSICAL layer security ,MATHEMATICAL forms ,CONFIDENTIAL communications ,INTERNET of things ,COMPUTER simulation - Abstract
In this work, we determine the physical layer security (PLS) metrics for ground-to-unmanned aerial vehicle (UAV) link in the presence of a suspicious UAV, which intends to overhear confidential transmission. The ground node sends data up to the UAV, which is positioned exactly above the transmitter and is able to spot an aerial eavesdropper according to the predefined horizontal and/or vertical guard distance. However, the attacker tries to intercept the channel transmission outside of marked zone. The main and wiretap channel are both assumed to be subjected to Fisher-Snedecor fading process. Under such system/channel scenario, the average secrecy capacity, lower bound of secrecy outage probability, intercept probability and non-zero secrecy capacity are characterized in terms of mathematical tractable forms. In addition, numerical and simulation results are presented to verify the correctness of theoretical ones. The impact of different positions of UAVs (their heights and mutual distances) and various conditions over channels on the secrecy transmission is analysed and discussed in details. The proposed PLS scenario can be utilized in Internet of Things environments, with UAV as a data collector, to enhance the security of energy-aware or disaster-stricken transmissions. All obtained results can be helpful in prediction of positioning UAV to achive low probability of interception of confidential communication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Data Hiding Scheme for Spatial Domain Images Using Fuzzy Logic and Modulus Operation.
- Author
-
Achmad, Riki Mi’roj, Arrizki, Deka Julian, Prasetyo Raharja, I Putu Bagus Gede, De La Croix, Ntivuguruzwa Jean, and Ahmad, Tohari
- Subjects
INFORMATION technology security ,FUZZY logic ,CONFIDENTIAL communications ,STATISTICAL smoothing ,NATIONAL security - Abstract
The concealment of secret information has become a significant concern in today's highly digitalized world due to the rapid increase in unauthorized data access and network policy violations. In response, steganography has emerged as an alternative technique for securing communication by embedding confidential information within digital files. This paper presents an enhanced scheme for hiding secret bits by utilizing fuzzy-detected edges and a modulus function applied to image pixels in the spatial domain. Unlike previous approaches that focused solely on concealing data in the image’s smooth areas with limited differences, neglecting other potential values, this method addresses these limitations by considering positive and negative difference values between adjacent pixels to hide the secret data effectively. Experimental results show an average improvement of 15% in peak signal-tonoise ratio (PSNR), indicating better stego image quality and a 20% increase in embedding capacity compared to existing benchmark methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Die Verschwiegenheitspflicht im Krankenanstaltenrecht.
- Author
-
Santeler, Matthias
- Subjects
- *
CONFIDENTIAL communications , *HEALTH facilities , *INFORMATION sharing , *PROFESSIONAL relationships , *PERIODICAL articles - Abstract
The present article in the Journal for Medical and Health Law examines the duty of confidentiality in hospital law. Various aspects of the duty of confidentiality, its relationship to other professional obligations of secrecy, and the reasons for its breach are discussed. The duty of confidentiality applies to individuals working in hospitals and medical facilities and encompasses all information regarding the health status and personal circumstances of patients. The regulations regarding the duty of confidentiality are adopted by the individual federal states. The article discusses the scope of application of the duty of confidentiality and whether it extends beyond professional obligations. Exceptions to the duty of confidentiality and the necessity of information exchange for continuous treatment in hospital operations are also addressed. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
16. Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs.
- Author
-
Kilčiauskas, Aušrys, Bendoraitis, Antanas, and Sakalauskas, Eligijus
- Subjects
- *
PUBLIC key cryptography , *DATA privacy , *TAX collection , *CONFIDENTIAL communications , *PRIVACY - Abstract
One of the main trends for the monitoring and control of business processes is to implement these processes via private blockchain systems. These systems must ensure data privacy and verifiability for the entire network here denoted by 'Net'. In addition, every business activity should be declared to a trusted third party (TTP), such as an Audit Authority (AA), for tax declaration and collection purposes. We present a solution for a confidential and verifiable realization of transactions based on the Unspent Transaction Output (UTxO) paradigm. This means that the total sum of transaction inputs (incomes) I n must be equal to the total sum of transaction outputs (expenses) E x , satisfying the balance equation I n = E x. Privacy in a private blockchain must be achieved through the encryption of actual transaction values. However, it is crucial that all participants in the network be able to verify the validity of the transaction balance equation. This poses a challenge with probabilistically encrypted data. Moreover, the inputs and outputs are encrypted with different public keys. With the introduction of the AA, the number of different public keys for encryption can be reduced to two. Incomes are encrypted with the Receiver's public key and expenses with the AA's public key. The novelty of our realization lies in taking additively-multiplicative, homomorphic ElGamal encryption and integrating it with a proposed paradigm of modified Schnorr identification providing a non-interactive zero-knowledge proof (NIZKP) using a cryptographically secure h-function. Introducing the AA as a structural element in a blockchain system based on the UTxO enables effective verification of encrypted transaction data for the Net. This is possible because the proposed NIZKP is able to prove the equivalency of two ciphertexts encrypted with two different public keys and different actors. This integration allows all users on the Net to check the UTxO-based transaction balance equation on encrypted data. The security considerations of the proposed solution are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. The Research Ecosystem and the Collaborative Research Cycle.
- Author
-
Delgado, Janet
- Subjects
- *
PATIENT selection , *DATA security , *INTERPROFESSIONAL relations , *PLAGIARISM , *EVIDENCE gaps , *MEDICAL care , *HUMAN research subjects , *ARTIFICIAL intelligence , *ECOSYSTEMS , *CONFIDENTIAL communications , *DATA analytics , *MEDICAL research , *ENDOWMENT of research , *PUBLISHING , *INTERDISCIPLINARY research , *RESEARCH ethics - Abstract
The author offers insights on the research ecosystem wherein all individuals play a significant role. Topics discussed include the importance of high-quality health sciences research, a model developed to explain the actors in the research ecosystem, and responsibilities of the editorial and peer review process.
- Published
- 2024
- Full Text
- View/download PDF
18. BSAS: blockchain-based shareable authentication scheme for smart healthcare.
- Author
-
Rani, Divya, Tripathi, Sachin, and Tomar, Ashish
- Subjects
- *
SMART devices , *CONFIDENTIAL communications , *CONSORTIA , *TRUST , *BLOCKCHAINS , *NEAR field communication - Abstract
Nowadays, research efforts are strongly directed toward integrating Blockchain into Smart Healthcare Systems to achieve distribution, transparency, and immutability within the system. The IoT-based Healthcare System incorporates numerous Smart Devices to gather extensive data. The Hospital Authority collects this vital information for diverse analyses via an intermediary data collector. The healthcare data is very crucial and requires secure data transmission from Smart Devices to the Hospital Authority to prevent unauthorized access. The traditional authentication scheme faces challenges such as a single point failure, heavy reliance on the Trusted Third Party, and the absence of channel communication. This can increase the computational load and system latency. The proposed solution introduces the Blockchain-based Shareable Authentication Scheme (BSAS) for Smart Healthcare. The BSAS scheme leverages a Consortium Blockchain which is implemented by using Hyperledger Fabric that supports channel communication among different hospital departments. This eliminates the burden of repetitive registration across all departments and reduces computational overhead. Moreover, a mutual authentication and key agreement scheme employing lightweight operations ensures the secure transmission of data from smart devices to the hospital authorities. The formal analysis using the ROR model and informal analysis confirm the security of the BSAS scheme. Additionally, formal simulations with the Scyther tool reveal no attacks within the bounds. The evaluation of performance using Hyperledger Caliper indicates a consistent and maximum throughput of 100 transactions per second for read operations or an increasing trend for certain operations with a rise in transaction count. The latency remains consistently minimal for read operations and is below 6.5 s for other operations. This comprehensive analysis underscores that the scheme is resilient to various attacks, has computational efficiency, and additional security enhancements, including data immutability, confidential communication through channels, and a distributed system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Gedanken über die misslingende Generativität an psychoanalytischen Instituten.
- Author
-
Acquarone, Paola F., Garrels, Lutz, Gerlach, Julia, and Schulze, Sylvia
- Subjects
- *
CONFIDENTIAL communications , *LECTURES & lecturing , *SCARCITY , *CONFERENCES & conventions - Abstract
For some time now, a blatant shortage of training analysts has been observed in the German Psychoanalytical Society (DPG) and many other psychoanalytical societies, which threatens psychoanalytical training and could make it impossible in the long term. Apparently, there is a phenomenon that can be observed worldwide that younger colleagues are critical or even negative about working as training analysts. Why is it so difficult to interest and inspire young analysts to become training analysts? We were commissioned to give a group lecture that would address the question of why generative transmission fails and what could be causing the phenomenon of missing training analysts. The lecture was presented as a group lecture at the Training Analysts Conference of the DPG, which took place online at the beginning of 2024. The speakers came from various DPG institutes spread across the whole of Germany. For confidentiality reasons, we decided to write as a group and to mix our personal contributions so that they can no longer be individually assigned. We see the following text as a contribution to an urgently needed debate that we would like to stimulate. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Fast Range Query on Encrypted Multi-dimensional Data in Cloud Environment.
- Author
-
Zhuolin Mei, Jing Zeng, Caicai Zhang, Shimao Yao, Jiaoli Shi, and Bin Wu
- Subjects
DATA privacy ,CLOUD computing ,CONFIDENTIAL communications ,TREES - Abstract
Cloud computing has extensively grown in recent years. A large amount of data is stored in cloud servers. To ensure confidentiality, these data is often encrypted and then stored in cloud servers. However, encryption makes range queries difficult to perform. To solve this issue, we present a scheme that facilitates fast range queries on encrypted multi-dimensional data in scenarios involving multiple users. In our scheme, we construct a tree index on encrypted multi-dimensional data, and each node is linked to a secure enhanced multi-dimensional range (MDR). To support efficient range query on the tree index, we adopt bloom filter technique. Additionally, users’ privileges are designed in a one-way calculation manner to support that different users can only perform range queries within their own privileges. Finally, we conduct extensive experiments which show the efficiency of our scheme, and also conduct a thorough analysis of its security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. A Partial-Filename Search Mechanism for Encrypted Filenames in a PZP Network.
- Author
-
SHIN-YAN CHIOU
- Subjects
SECURITY systems ,SMARTPHONES ,CONFIDENTIAL communications ,STORAGE - Abstract
The efficiency and accuracy of data search, storage, confidentiality and security of P2P systems is a serious concern. Previous studies have proposed using a partial filename search function which allows the user to input a partial filename to search for associated filenames on the remote system. However, if the file name is encn, pted for enhanced security. this search function is ineffective. This paper proposes a search mechanism for encrypted filenames. In the case of filename encryption, the proposed method can also achieve a partial filename search function while maintaining filename confidentiality. The proposed system was implemented on an Android smartphone to simulate encrypted filename search. To the best of our knowledge, this is the first work done on partial-filename search for encrypted filenames. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Enhanced QSimon Algorithm for Attacking the Offset Two‐Round Scheme.
- Author
-
Wu, Hong‐Yu, Feng, Xiao‐Ning, Zhang, Ke‐Jia, and Sun, Hong‐Wei
- Subjects
LINEAR equations ,CRYPTOGRAPHY ,ALGORITHMS ,PROBABILITY theory ,CONFIDENTIAL communications - Abstract
QSimon algorithm (a full quantum version of Simon's algorithm) is used to find periods in commitment functions and does not require classical calculations. However, QSimon algorithm circuit is incomplete, and the implementation of an essential component (solving boolean linear equations) has high resource consumption. This work further studies QSimon algorithm and applies QSimon algorithm to attack the offset two‐round (OTR) scheme. QSimon algorithm is established by quantum boolean linear equations solving algorithm and general quantum truncation technique, which can obtain the period of any truncated function with overwhelming probability. The confidentiality and integrity of the OTR scheme are compromised by employing QSimon algorithm. The attacks ensure a high success rate and realize exponential speedup compared with classical versions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Transforming the Translation Industry: Innovative Applications of Blockchain Technology.
- Author
-
Alsubhi, Waleed O.
- Subjects
BLOCKCHAINS ,EDUCATIONAL outcomes ,CONFIDENTIAL communications ,COST effectiveness ,PERENNIALS ,DATA security - Abstract
Blockchain technology has emerged as a disruptive force with transformative potential across various industries. This study explores its profound implications within the translation industry, aiming to address critical challenges while uncovering new opportunities. Through a comprehensive analysis of survey interview responses from industry professionals and an in-depth examination of three compelling case studies, we delve into the multifaceted dimensions of blockchain's influence. Our findings reveal that blockchain promises to revolutionize the translation industry on multiple fronts. It offers a robust solution to the perennial challenge of data security, ensuring the confidentiality and integrity of sensitive documents. Blockchain's inherent transparency and traceability mechanisms instill trust by enabling stakeholders to verify the authenticity of translated work. Moreover, blockchain streamlines translation processes, enhancing efficiency through smart contracts and tokens and reducing reliance on intermediaries. This newfound efficiency reduces costs and accelerates payment processing, reducing delays and disputes. In educational contexts, blockchain elevates the quality of translation guidance by improving access verification and reliability, fostering better student learning outcomes. As we conclude, blockchain technology can potentially reshape the translation industry. Its impact extends to security, efficiency, cost-effectiveness, trust, and educational enhancements. While challenges remain, our research provides a roadmap for industry stakeholders to embrace this transformative technology, ushering in an era where translation services are more secure, reliable, and accessible than ever before. The translation industry stands on the brink of a paradigm shift, and blockchain technology catalyzes this transformative journey. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Proxy re-signature scheme with cryptographic reverse firewall for medical data security.
- Author
-
Yang, Xiaodong, Wei, Lizhen, Li, Songyu, Du, Xiaoni, and Wang, Caifen
- Subjects
DATA security ,INFORMATION sharing ,PUBLIC institutions ,ANONYMITY ,CONFIDENTIAL communications - Abstract
To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Clinical Dentistry Author Guidelines.
- Subjects
INFORMED consent (Medical law) ,DISCLOSURE ,FRAUD in science ,CONFIDENTIAL communications ,PATIENTS' rights - Published
- 2024
26. Blockchain-based evault for legal records: A framework for review.
- Author
-
Ismail, Firdous Sadaf M., Baheti, Jatin, Kurani, Suhani, Sharma, Ojas, Goyal, Shubh, and Thakur, Yogesh
- Subjects
- *
TECHNOLOGICAL innovations , *LEGAL education , *JUSTICE administration , *PROBLEM solving , *CONFIDENTIAL communications , *BLOCKCHAINS - Abstract
The blockchain is an innovative technology which opened doors to new applications for solving numerous problems in distributed environments. In this work, we design a Blockchain based e-vault system for legal records. Blockchain technology has emerged as a potential solution for improving the transparency and security of legal contracts. The use of blockchain to manage legal contracts can not only promote transparency but also streamline the process, making it more cost-effective. This innovative approach to exercising blockchain technology extends its operation to legal records and education, addressing challenges in translucency, security, and effectiveness. The e-vault system for legal records enhances the overall trustability and tamper resistance of legal contracts, offering a cost-effective and streamlined result. In the education sector, the proposed decentralised system not only ensures the confidentiality and security of pupil records through encryption but also establishes a robust frame for flawless record operation. The unique aspect of incorporating Aadhar/pan authentication systems in the blockchain authentication process sets this study piecemeal. This work not only proposes innovative results for legal record-keeping and pupil record operation but also introduces a new approach to strengthening blockchain authentication processes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. A secure communication system based on deep image steganography technology.
- Author
-
Rajab, Haider Akeed, Gaata, Methaq Talib, and Younis, Muhanad Tahrir
- Subjects
- *
DIGITAL rights management , *FEATURE extraction , *TELECOMMUNICATION systems , *MILITARY communications , *CONFIDENTIAL communications - Abstract
Image steganography is a technique used to hide information within an ordinary image, creating a secret way for confidential communication. It is extensively utilized in the fields of cybersecurity, military intelligence, and digital rights management to protect confidential information in the cybersecurity sector and provide hidden communication in military activities. Traditional image steganography methods may have weaknesses due to predetermined algorithms, making them less adaptive to diverse image content and susceptible to detection by advanced steganalysis techniques. Therefore, new methods are required to tackle these weaknesses by providing deep learning-based techniques that are more efficient in identifying important features and extracting edges and are resistant to analytical processes. This paper presents a new image steganography system. The proposed system utilizes a Convolutional Neural Network-based encoder-decoder network architecture to assist the processes of concealing and extracting information. To evaluate the performance of the proposed system, several metrics such as Peak Signal-to-Noise Ratio, concealing capacity, and imperceptibility, were performed on CelebA, COCO and CIFAR10 datasets. In terms of PSNR, the proposed method achieved 74.57, 72.64, and 74.57 respectively. Hence, the method illustrated that the suggested approach exhibits superior concealment capability, security, robustness, and imperceptibility as opposed to some selected methods from the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Random shift and OTP based encryption and decryption.
- Author
-
Saini, Akshat and Singh, Rohit
- Subjects
- *
DATA security failures , *INFORMATION sharing , *CYBERTERRORISM , *DATA encryption , *CONFIDENTIAL communications - Abstract
In the current era characterized by a rising number of cyber threats and instances of data breaches, the importance of ensuring secure communication and information exchange has reached a critical level. The utilization of encryption techniques holds significant importance in the protection of confidential information, and the ongoing progress in encryption methodologies is imperative to maintain an advantage over ever-changing security risks. This manuscript presents a novel methodology for augmenting the security of data encryption and decryption by integrating a Random Shift technique with the OTP encryption method. The proposed method provides an additional level of safeguarding, guaranteeing the preservation of confidentiality, integrity, and authenticity of transmitted data. The efficacy of the proposed framework is exemplified through extensive experimentation and analysis, elucidating its superiority over conventional encryption techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. The records side of cyber security
- Author
-
Arim, Xander Hunter
- Published
- 2024
30. Le conversioni silenti.
- Author
-
Bastianini, Lucia
- Subjects
- *
CONFIDENTIAL communications - Abstract
This essay tries to analyze the similarities between the two nights spent by Renzo and Lucia (respectively in chapter XVII and XXI of The Betrothed) considering them as two moments of reflection and change for the two protagonists. Indeed Renzo and Lucia, too, are subject to metanoia and in their silent conversions, which don't even seem such, may be felt the echo of Alessandro Manzoni’s conversion, which, in turn, has always been shrouded in a veil of confidentiality and mystery. [ABSTRACT FROM AUTHOR]
- Published
- 2024
31. Noncompetes and Their Potential Impact on Trade Secret Cases.
- Author
-
Giri, Animesh, Dang, April, and McKiernan, Marie
- Subjects
COVENANTS not to compete ,CONFIDENTIAL communications ,TRADE secrets ,INEVITABLE disclosure (Trade secrets) ,BUSINESS intelligence - Abstract
The article examines state-level variations in noncompete regulations over time alongside annual federal trade secret caseloads. Topics discussed include regulatory landscape for trade secrets and noncompetes in the U.S., volume of trade secret cases and variation in state-level noncompete legislation, and impact of noncompete regulations on trade secret caseloads.
- Published
- 2024
32. Enhancing data authentication in software-defined networking (SDN) using multiparty computation.
- Author
-
Hendaoui, Fatma, Eltaief, Hamdi, and Youssef, Habib
- Subjects
- *
SOFTWARE-defined networking , *END-to-end delay , *CONFIDENTIAL communications , *DENSITY , *COMPUTER software - Abstract
In software-defined networking (SDN), where software assumes a progressively prominent position in the network administration, it becomes imperative to emphasize the enhancement of data authentication and non-repudiation methodologies. The study presents a novel approach that incorporates Multi-Party Computation (MPC) into symmetric systems to enhance data authentication inside SDN settings. The use of MPC ensures the timely authentication of identities, prevention of repudiation, and maintenance of data accuracy, while simultaneously protecting the confidentiality of sensitive data and parameters. The evaluation of our technique's performance is accomplished through rigorous simulations utilising NS-3. The simulations yielded positive results in terms of packet delivery ratio, end-to-end delay, and throughput. The findings of the research illustrate that the proposed approach demonstrates consistent efficacy and reliability, even under conditions of heightened network node density. This study presents a complete methodology aimed at enhancing data authentication in SDN. This paper examines the increasing security challenges associated with cloud-based SDN solutions. This research demonstrates a significant progress in the quest for a secure and efficient SDN environment, setting new standards for data authentication and non-repudiation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Breaching Confidentiality in Genetic and Non-Genetic Cases: Two Problematic Distinctions.
- Author
-
Kilbride, Madison K.
- Subjects
- *
PROFESSIONAL ethics , *GENETIC privacy , *THREATS of violence , *CONFIDENTIAL communications , *MEDICAL personnel - Abstract
AbstractEthical questions about confidentiality arise when patients refuse to inform relatives who are at risk of a genetic condition. Specifically, healthcare providers may struggle with the permissibility of breaching confidentiality to warn patients’ at-risk relatives. In exploring this issue, several authors have converged around the idea that genetic cases differ from non-genetic cases (e.g., involving a threat of violence or the spread of an infectious disease) along two related dimensions: (1) In genetic cases, the risk of harm is already present in an at-risk third party, whereas in non-genetic cases, it is not; and (2) In genetic cases, the patient does not create a risk of harm to a third party, whereas in non-genetic cases, the patient does. I argue that these distinctions do not exclusively differentiate genetic from non-genetic cases and should not bear on the permissibility of breaching confidentiality. Instead, such determinations should be based on other considerations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity.
- Author
-
Ali, Ali Salem, Alsamaraee, Suray, Hussein, Aya Ayad, and Singh, Debabrata
- Subjects
PARTICLE swarm optimization ,RESEARCH personnel ,CONFIDENTIAL communications ,SECURITY systems ,PIXELS - Abstract
To secure the massive amounts of secret messages, the integrity and confidentiality challenges must be addressed. Pressing challenges in the context of a steganography system include security, imperceptibility, and capacity issues. There are trade‐offs between payload and security that have been neglected by researchers, as fixing one issue has been indicated to affect the other, and vice versa. To overcome these challenges, a new steganography scheme based on HMPSO and DDV was introduced. The HMPSO is short for Hénon map and particle swarm optimization, while DDV is short for distinction disparity value. The proposed scheme consisted of four phases with different contributions. The first phase was used to preprocess the secret messages and cover images. In this phase, the secret message has been compressed using the Huffman method. The second phase involved the embedding procedure. This phase consists of two different contributions HMPSO and DDV. The HMPSO is responsible for the optimal pixels' selection. While the DDV is responsible for the embedding process. The third phase involves the extraction method. In extraction, the reverse processes of the previous steps are implemented. Different evaluation parameters have been used to validate and test the proposed scheme such as SSIM, PSNR, HVS, Histogram analysis, and chi‐square test. Based on the findings, the proposed scheme has solved the confidentiality and integrity challenges and provides a robust steganography system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Stepping out of the shadows: the legitimacy of the Bahamas’ NCIA.
- Author
-
McPhee, Glenn Edward
- Subjects
- *
CONFIDENTIAL communications , *INTELLIGENCE service , *NATIONAL security , *CRIME , *ARCHIPELAGOES , *HUMAN smuggling , *SMUGGLING - Abstract
The Bahamas is a relatively small archipelago challenged by a broad spectrum of diverse, complex, and consequential national security threats that extend to the ‘unknown’ of a global security threat equation. To address the threat spectrum, Bahamian policymakers incorporated the National Crime Intelligence Agency (NCIA) within the national security architecture. For various reasons, Bahamians are sceptical about, scared of, and uncomfortable with the idea or reality of the NCIA. As such, the NCIA has to pass the legitimacy test as it steps out of the shadows. This article provides a preview into the legitimacy test of The Bahamas’ professional secret intelligence service. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Secrecy Analysis of Decode-and-Forward Relay Based Heterogeneous Terrestrial RF - Underwater Acoustic System.
- Author
-
Bhatnagar, Romya and Garg, Parul
- Subjects
- *
PROBABILITY theory , *CONFIDENTIAL communications , *SIGNALS & signaling , *SYMBOL error rate - Abstract
This study examines how well a heterogeneous dual-hop terrestrial radio frequency and underwater acoustic downlink system maintain confidentiality. It includes an RF source, an intermediate decode-and-forward relay, an underwater multi-hydrophone destination, and a nearby eavesdropper. Eavesdropper overhears underwater acoustic signal transmitted by the relay. RF and underwater acoustic links undergo Nakagami-m and Rayleigh fading, respectively. Due to the propagation delay of underwater scenario, both destination and eavesdropper links are associated with outdated channel state information which also employs maximal-ratio combining. The closed form expressions of secrecy outage probability, strictly positive secrecy capacity, and intercept probability are derived. Monte-Carlo simulations are obtained to certify the analytical expressions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. ¿REVELAR, VELAR O DEVELAR?: LA ANONIMIZACIÓN POR NIVELES EN LAS ENTREVISTAS CUALITATIVAS.
- Author
-
MARTÍNEZ TRUJILLO, MARÍA TERESA
- Subjects
- *
RESEARCH personnel , *ETHNOLOGY , *CONFIDENTIAL communications , *FIELD research - Abstract
The process of anonymization during the analysis and the restitution of qualitative interviews is complex and cannot be achieved by following a set of steps dictated by a manual. It implies finding a balance between preserving the confidentiality of those who, during ethnographic exercises, share their stories and facts with us, while recovering and showing the analytical richness of the information collected. In this article, based on my fieldwork experience in a sensitive field, I propose a path of anonymization of qualitative interviews consisting of four levels, which can be applied to specific conditions and dilemmas that researchers commonly face. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis.
- Author
-
Haverkamp, Indy and Sarmah, Dipti K.
- Subjects
- *
CRYPTOGRAPHY , *INFORMATION technology security , *CONFERENCE papers , *USER experience , *PERIODICAL articles , *CONFIDENTIAL communications - Abstract
In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary methods used for information security. While these methods have diverse applications, there is ongoing exploration into the potential benefits of merging them. This review focuses on journal articles from 2010 onwards and conference papers from 2018 onwards that integrate steganography and cryptography in practical applications. The results are gathered through different databases like Scopus, IEEE, and Web of Science. Our approach involves gaining insights into real-world applications explored in the existing literature and categorizing them based on domains and technological areas. Furthermore, we comprehensively analyze the advantages and limitations associated with these implementations, examining them from three evaluation perspectives: security, performance, and user experience. This categorization offers guidance for future research in unexplored areas, while the evaluation perspectives provide essential considerations for analyzing real-world implementations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments.
- Author
-
Han, Shumin, Shen, Kuixing, Shen, Derong, and Wang, Chuang
- Subjects
- *
COLLUSION , *DECISION making , *DISCLOSURE , *CONFIDENTIAL communications , *PRIVACY - Abstract
With the world's data volume growing exponentially, it becomes critical to link it and make decisions. Privacy-preserving record linkage (PPRL) aims to identify all the record information corresponding to the same entity from multiple data sources, without disclosing sensitive information. Previous works on multi-party PPRL methods typically adopt homomorphic encryption technology due to its ability to perform computations on encrypted data without needing to decrypt it first, thus maintaining data confidentiality. However, these methods have notable shortcomings, such as the risk of collusion among participants leading to the potential disclosure of private keys, high computational costs, and decreased efficiency. The advent of trusted execution environments (TEEs) offers a solution by protecting computations involving private data through hardware isolation, thereby eliminating reliance on trusted third parties, preventing malicious collusion, and improving efficiency. Nevertheless, TEEs are vulnerable to side-channel attacks. In this work, we propose an enhanced PPRL method based on TEE technology. Our methodology involves processing plaintext data within a TEE using the inner product mask technique, which effectively obfuscates the data, making it impervious to side-channel attacks. The experimental results demonstrate that our approach not only significantly improves resistance to side-channel attacks but also enhances efficiency, showing better performance and privacy preservation compared to existing methods. This work provides a robust solution to the challenges faced by current PPRL methods and sets the stage for future research aimed at further enhancing scalability and security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Improving the lightweight implementation of SNOW-V.
- Author
-
Gil, Jezabel Molina, Álvarez, Óscar Cigala, González, Yanira González, and Corbella, Irene Márquez
- Subjects
- *
WIRELESS sensor networks , *STREAM ciphers , *5G networks , *INTERNET of things , *CONFIDENTIAL communications - Abstract
This paper presents a proposal to improve the software implementation of SNOW-V, a candidate for encrypting 5G communications. In particular, we focus on the proposal for 32-bit architectures with limited resources, such as wireless sensor networks. SNOW-V is a pseudorandom number generator, this type of structures are traditionally implemented in hardware. The advent of 5G means that this implementation must be purely software, losing the advantages and speed of a purely hardware or even hybrid implementation. Due to the wide variety of interconnected devices in the IoT, we cannot assume or associate security with a given architecture or unlimited resource devices. For this reason, we have focused our efforts on analyzing and improving the speed of the proposed 5G encryption on lightweight architectures. Specifically, we analyze its software implementation and propose improvements to speed up the encryption process while protecting confidentiality and integrity for 32-bit devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. BLE-based secure tracking system proposal.
- Author
-
Hernández-Goya, Candelaria, Aguasca-Colomo, Ricardo, and Caballero-Gil, Cándido
- Subjects
- *
PUBLIC spaces , *CRYPTOGRAPHY , *SMARTPHONES , *CONFIDENTIAL communications , *SUPERVISION - Abstract
As communication capabilities of mobile devices continue to advance, ensuring reliability and security has become increasingly crucial. The aerial tracking system presented in this paper provides a useful solution for tracking and tracing objects in various scenarios. To ensure reliability and security, the system incorporates appropriate mechanisms, including Lightweight Cryptography, to prioritize confidentiality and integrity. The Android component of the system has two modes of operation: Tracker Mode, running on a smartphone mounted on a drone (RPA), and Client Mode, running on mobile devices on the ground. In Client Mode, users transmit their positioning and trajectory information via Bluetooth Low Energy beacon mode, which is then relayed to the server backend via the 4G/5G network once the RPA enters an area with coverage. The system provides a reliable and secure solution for situations where tracking and tracing are essential, such as the supervision and control of public areas with capacity control or tracking and localizing people in isolated environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Shhh... Do Gender-Diverse Boards Prioritize Product Market Concerns Over Capital Market Incentives?
- Author
-
Naidu, Dharmendra and Ranjeeni, Kumari
- Subjects
BUSINESS enterprises ,DIVERSITY in the workplace ,BOARDS of directors ,GENDER ,CAPITAL market ,ECONOMIC competition ,COST ,DISCLOSURE ,CONFIDENTIAL communications - Abstract
We examine whether gender-diverse boards prioritize product market concerns over capital market incentives when proprietary costs are high. We argue that gender-diverse boards protect their firm's competitive edge and maximize long-term shareholder wealth by ethically and carefully maintaining the confidentiality of proprietary information. Due to the reduced disclosure of proprietary information, firms with gender-diverse boards are likely to face more adverse selection when proprietary costs are high. However, the reduced disclosure of proprietary information enables firms with gender-diverse boards to enhance and maintain their competitive edge and gain higher long-term returns. Using a matched sample of the United States-listed companies, we find that firms with gender-diverse boards, relative to similar firms with all-male boards, (1) are associated with higher adverse selection costs and (2) higher long-run stock returns when the firm faces high product market competition. Collectively, our results suggest that firms with gender-diverse boards, which initially experience higher adverse selection in a competitive environment, are rewarded with a net gain of about 10 percent of their stock price in three years. Our research contributes to the literature by highlighting the importance of board gender diversity in fostering the ethical redaction of proprietary information for proprietary cost-based motives as opposed to agency cost-based motives. Our findings have important implications for regulators, firms, and shareholders by identifying gender-diverse boards as an antecedent for the ethical redaction of proprietary information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Experimental demonstration of quantum encryption in phase space with displacement operator in coherent optical communications.
- Author
-
Khalil, Mostafa, Chan, Adrian, Plant, David V., Chen, Lawrence R., and Kuang, Randy
- Subjects
OPTICAL communications ,PHYSICAL layer security ,COHERENT states ,DATA transmission systems ,CONFIDENTIAL communications - Abstract
We provide experimental validation of quantum encryption in phase space using displacement operators in coherent states (DOCS) in a conventional coherent optical communication system. The proposed encryption technique is based on displacing the information symbols in the phase space using random phases and amplitudes to achieve encryption randomly and provide security at the physical layer. We also introduce a dual polarization encryption approach where we use two different and random DOCS to encrypt the X and Y polarizations separately. The experimental results show that only authorized users can decrypt the signal correctly, and any mismatch in the displacement operator coefficients, amplitudes, or phases will lead to a bit error ratio (BER) of approximately 50%. We also compare the performance of the system with and without encryption over 80 km of standard-single mode fiber (SSMF) transmission to assess the added penalty of such encryption. The achieved net bit rates are 224, 448, and 560 Gb/s for QPSK, 16QAM, and 32QAM modulation formats, respectively. The experimental results showcase the efficacy of the DOCS encryption technique in resisting various decryption attempts, demonstrating its effectiveness in ensuring the security and confidentiality of transmitted data in a real-world transmission scenario. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. The attitudes, knowledge and confidence of healthcare professionals about cannabis-based products.
- Author
-
Russo, Emilio, Agredano, Paula Martinez, Flachenecker, Peter, Lawthom, Charlotte, Munro, Duncan, Hindocha, Chandni, Bagul, Makarand, and Trinka, Eugen
- Subjects
MEDICAL personnel ,CONFIDENTIAL communications ,GENERAL practitioners ,ATTITUDE (Psychology) ,PHARMACISTS ,NEUROBIOLOGY - Abstract
Background: Use of cannabis-based products is becoming more frequent, and it is important that healthcare professionals are informed and confident about them when making evidence-based decisions about their use. This study aimed to gain an international perspective on the attitudes, knowledge, and confidence of healthcare professionals about cannabis-based products. Methods: An online questionnaire regarding these products was completed by 1580 healthcare professionals (neurologists, psychiatrists, general practitioners, pharmacists and nurses) from 16 countries across Asia, Europe, Oceania, South America, and the Middle East. Results: Respondents expressed a high level of interest in cannabis-based products (median score 9 out of 10) and reported that they felt knowledgeable about them (median score 6 out of 7). They reported a high level of confidence when providing patients with information on cannabis-based products, returning median scores of 6 and 5 out of 7 for their legality and regulations, and their benefits and risks, respectively. Despite this, healthcare professionals sought further information on cannabis-based products across areas including legality, neurobiology, and scientific evidence. Finally, 59% (n = 930) of respondents considered robust clinical trial evidence as the most important factor to ensure patient safety in the context of these products. Few nominally significant differences emerged between healthcare professionals from different specialities or regions. Conclusion: In conclusion, this large survey of attitudes held by healthcare professionals towards cannabis-based products revealed a high level of interest and a demand for more information. Limitations of this study include potential sample bias and limited external validity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. The Visual Governance of Canadian Migration Agencies.
- Author
-
Massari, Alice
- Subjects
- *
MASS migrations , *COMMUNICATION of technical information , *VISUAL communication , *PUBLIC institutions , *CONFIDENTIAL communications , *BASHFULNESS - Abstract
AbstractDespite increasing attention to images in the study of world politics, the role of visual representations in transnational governance processes in general and migration governance, in particular, has received less attention. This paper aims to fill this gap by examining the visual representation of migration governance by the two Canadian government institutions responsible for it: Immigration, Refugees and Citizenship Canada (IRCC) and the Canada Border Services Agency (CBSA). Through a multi-modal analysis of their X (formerly Twitter) images, the paper shows how they tend to shy away from a visual representation of people on the move, privileging a technical communication in an aspiration toward a “neutral” representation of migration issues. Secondly, it sheds light on the discrepancies between the policies directed toward Afghani and Ukrainian refugees and the unexpectedly undifferentiated visual communication about the two groups. Finally, the paper explores what the pictures accompanying X (formerly Twitter) posts of IRCC and CBSA can tell about how these government institutions represent themselves. Findings showed that government institutions’ esthetic practices are not always in line with the institutional migration policies and text narratives, suggesting that different government implementation tools (i.e., regulations, practices, textual discourses) may not reinforce each other but advance alternative perspectives. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology.
- Author
-
Yan, Yiming, Zhao, Haiyong, and Qu, Haipeng
- Subjects
PROCESS capability ,PERSONALLY identifiable information ,PHISHING ,CONFIDENTIAL communications - Abstract
Users encounter various threats, such as cross-site scripting attacks and session hijacking, when they perform login operations in the browser. These attacks pose significant risks to the integrity and confidentiality of personal data. The browser fingerprint, as an authentication technique, can effectively enhance user security. However, attackers can bypass browser fingerprint authentication through phishing attacks and other methods, leading to unauthorized logins. To address these issues, we propose a secure browser fingerprint authentication scheme that integrates the data of the browser cache side-channel into the traditional browser fingerprint. Consequently, it enhances the dynamics and non-determinism of the browser fingerprint and improves the anti-attack capabilities of the authentication process. Experimental results demonstrate that this scheme can effectively mitigate phishing attacks and man-in-the-middle attacks, achieving a 95.33% recognition rate for attackers and a 96.17% recall rate for authorized users. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Qualitative evaluation of a multidisciplinary master of cancer sciences: impacts on graduates and influencing curricular factors.
- Author
-
Lai-Kwon, Julia, Woodward-Kron, Robyn, Seignior, David, Allen, Louise, McArthur, Grant, Barrett, Michelle, and Kok, David L
- Subjects
CAREER development ,PROFESSIONAL identity ,PROFESSIONAL practice ,INTERACTIVE learning ,CONFIDENTIAL communications - Abstract
Background: Evaluations of continuing professional development programs typically focus on short-term knowledge and skill acquisition. There is a need for more comprehensive program evaluation methods that assess a broader range of impacts and can elicit how and why these outcomes occurred. We conducted a qualitative study to investigate the impacts of a multidisciplinary, online health professional postgraduate degree and to gain insights into the factors that led to these impacts. Methods: Participants were graduates of the University of Melbourne's Master of Cancer Sciences who could participate in an online interview. Semi-structured, qualitative interviews were conducted exploring a broad range of impacts, including changes in professional practice and career trajectory since graduation, and how the degree influenced these impacts. Data were analysed inductively. Results: Fifteen participants (female: 80%, 31–50 years old: 67%) from a range of professions were interviewed. A number of major themes were uncovered. Impacts on career trajectory included expanded career horizons (e.g. increased role diversity and complexity), and increased confidence in their professional identity. Impacts on professional practice included individual improvements in patient care and research, as well as changes in organisational practice. Factors identified as leading to these impacts were: (i) active, interactive and interprofessional learning; (ii) networking, informal mentoring, and role-modelling; and (iii) support at multiple levels. Conclusion: This study provides preliminary evidence of the positive impact of a Master of Cancer Sciences on graduate career trajectory and professional practice. In addition, the inductive methodology enabled identification of the curricular features (both planned and emergent) that influenced these impacts, facilitating potential transferability of learnings to other teaching programs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Implementing a School‐Based Health Center Virtual Care Program: A Qualitative Exploration of the School Nurse Perspective.
- Author
-
Burnett, Honora Quinn, Boral, Alyssa, Schaap, Samantha, Haas‐Howard, Christy, and O'Leary, Sonja
- Subjects
- *
NURSES , *HUMAN services programs , *QUALITATIVE research , *RESEARCH funding , *PUBLIC sector , *SCHOOLS , *INTERVIEWING , *HEALTH policy , *PILOT projects , *CONFIDENTIAL communications , *TELEMEDICINE , *THEMATIC analysis , *SOUND recordings , *SCHOOL nursing , *NURSES' attitudes , *RESEARCH methodology , *VIDEOCONFERENCING , *STUDENT health , *SCHOOL health services , *RESEARCH ethics - Abstract
BACKGROUND: School‐based health centers (SBHCs) have the capability to overcome youth barriers to care. Virtual care programs (VCP) facilitate connection between school nurse and off‐site SBHC providers and can increase the reach of SBHCs. This project aimed to examine Denver Public School nurses' perspectives of a pilot VCP. METHODS: Thirteen semi‐structured qualitative interviews were conducted and coded using an inductive approach to identify key themes. RESULTS: Four major themes emerged: (1) obtaining consent, finding space, and capacity are challenges and nurses have suggestions; (2) nurses enjoy feeling like a valued member of a health care team, and providing additional resources to students; (3) nurses perceive benefits in providing free, efficient, higher level of care; (4) adopting novel technology is a facilitator and challenge; limitations included space and privacy. CONCLUSIONS: Key findings can be utilized to further inform practice. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. WE MIGHT BE ON (TO) SOMETHING, BUT WHO KNOWS? A FRESH LOOK AT THE PHARMACIST-PATIENT PRIVILEGE.
- Author
-
MOBERLY, MICHAEL D.
- Subjects
- *
PHARMACISTS , *PHYSICIAN-patient privilege , *CONFIDENTIAL communications , *MEDICAL ethics , *MEDICAL laws - Abstract
This Article will advocate for broader recognition of the pharmacist-patient evidentiary privilege that currently exists in only a handful of states. The Article will discuss the lack of common law support for the privilege, as well as its recent legislative adoption in a few states. The Article also will examine the privilege's similarity to the widely recognized physician-patient privilege, arguing that confidentiality is as essential to the relationship between patients and their pharmacists as it is to the relationship between patients and their doctors. Because complete confidentiality in these relationships is only assured if they are protected by an evidentiary privilege, the Article will conclude that states that recognize the physician-patient privilege also should recognize a comparable pharmacist-patient privilege. [ABSTRACT FROM AUTHOR]
- Published
- 2024
50. Exploring Respondents' Problems and Evaluation in a Survey Proposing Voice Inputs.
- Author
-
Revilla, Melanie and Couper, Mick P.
- Subjects
RESEARCH questions ,INTERNET surveys ,OPEN-ended questions ,CONFIDENTIAL communications ,EVERYDAY life - Abstract
Integrating voice inputs into web surveys holds the potential for various benefits, including eliciting more comprehensive and elaborate responses or extracting additional information from vocal tones and ambient sounds. Nevertheless, important challenges persist, including technical problems, privacy concerns, and low participation rates. Given the limited knowledge on this subject, this research note addresses four research questions, distinguishing between two voice input methods (dictation and voice recording) and two approaches to presenting them (providing a choice, or pushing respondents toward voice inputs, with a text alternative offered only in the absence of response): RQ1. What reasons are provided for not opting for voice inputs when they are offered? RQ2. Which variables are associated with the reported use of voice inputs? RQ3. What challenges do individuals answering through voice inputs report? And RQ4. How do respondents evaluate the different methods of answering they employed? Drawing on data from a survey on nursing homes conducted in February/March 2023 within the Netquest opt-in online panel in Spain (1,001 completes), where participants were offered to respond to two experimental questions through voice methods, our analyses reveal that contextual factors and the perceived challenge of oral expression are key reasons for abstaining from voice input responses. Furthermore, individuals who exhibited complete trust in the confidentiality of their responses and those already using voice input in their daily lives were significantly more likely to opt for voice inputs. Among respondents utilizing voice inputs, recurring challenges included contextual constraints and difficulties in verbal expression, alongside technical problems. Despite these hurdles, a majority of participants found answering through voice easy, although a lower proportion reported liking it. These results contribute to the limited literature and can help enhance the effectiveness of voice input surveys. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.