• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 101
  • 39
  • 28
  • 27
  • 24
  • 8
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 281
  • 70
  • 55
  • 53
  • 51
  • 45
  • 44
  • 43
  • 37
  • 35
  • 34
  • 31
  • 31
  • 27
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Patienters erfarenheter av bedside-rapportering : En litteraturöversikt

Stenqvist, Elin, Fällman, Hannah January 2020 (has links)
No description available.
102

Socialsekreterares upplevelse av deras handlingsutrymme och kompetens gällande sekretesslagen inom ramen för LVU-utredningar : ”Vi vill att det ska vara frivilligt” / Social worker´s experience regarding their room for maneuver and their competence in terms of confidentiality in the process of LVU

Lindstedt, Siri, Dahlqvist, Lovisa January 2020 (has links)
För att arbeta som socialsekreterare med utredning för barn och unga krävs det kunskap inom sociala områden, men även inom det juridiska fältet. För att kunna genomföra en barnavårdsutredning krävs ofta insamling av uppgifter från utomstående parter och myndigheter, varav det även krävs en kompetens och kunskap om hur detta ska göras på rätt sätt då socialtjänsten har en stark sekretess som omfattas av lagstiftning. Syftet med denna studie är att undersöka hur socialsekreterare uppfattar och förvaltar det handlingsutrymme som finns i arbetet med en LVU-utredning. Samt att få en djupare kunskap kring socialsekreterares egen kompetens och upplevelse om sekretess i barnavårdsärenden. Studiens data baseras på fyra kvalitativa intervjuer med socialsekreterare. Resultaten redovisas utifrån en tematisk analys, där de teman som berörs är upplevelse av sekretess, profession och etiska dilemman samt dubbla kompetenskrav och handlingsutrymme. I resultatet framkommer att det finns en viss osäkerhet kring sekretess, men att sekretessen inte ses som ett hinder i utredningar då man antingen via samtycke eller sekretessbrytande bestämmelser kan få tillgång till de uppgifter som behövs för att bedriva utredning. Det framkom även att frivilliga insatser och stöd är det som är mest förekommande, och att tvångsvård är något de flesta av socialsekreterare vill undvika om så är möjligt. I studiens diskussion tydliggörs att socialsekreterare som arbetar med LVU-utredningar har ett dubbelt kompetenskrav, de behöver dels ha kompetens inom det juridiska fältet, samtidigt som arbetet innefattar mötet med utsatta människor, där det krävs en professionalitet för att kunna stödja och hjälpa på ett bra sätt. I slutsatsen framkom även att socialsekreterarnas egen juridiska kompetens har utvecklingspotential. Det framkommer även att arbetet som socialsekreterare är ett komplext yrke som kräver en bred kompetens och att professionen socialsekreterare är unik utifrån dess maktposition och begränsade handlingsutrymme samtidigt som arbetet utförs klientnära och relationsbyggande. / Working as a social secretary investigating minors and young adults requires a wide range of skills. Social secretaries are expected to be knowledgeable not only about the social factors leading to investigations but also about legal aspects in the investigations. In order to be able to carry out an investigation of a minor, information is often acquired from outside parties and other authorities. The gathering of information needs to be done correctly and with legal certainty, as social services are bound by secrecy under law. The purpose of this study is to gain a deeper knowledge of the competence and experience of the social worker in child care matters, but also to explore how social workers perceive the area in which they can operate during the process of an LVU inquiry. The data of the study is based on four qualitative interviews with social workers and analysed with thematic analysis, with the different themes being experience of confidentiality, professionality and ethical dilemmas, double competence requirements and room for maneuver. The results show that there is some hesitation regarding secrecy among social workers, but that secrecy is not seen as an obstacle in investigations as one can either gain access to the information needed in order to conduct an investigation through consent, or that confidentiality can be breached when it is necessary to do so. The study also shows that voluntary effort and support is common, and that compulsory care is something that most social workers wish to avoid if possible.  The study concludes that social secretaries who work with LVU-investigations need a dual competence, and that competence surrounding law shows great prospects for development. Furthermore, the study shows that the profession itself is highly complex and requires a wide range of skills. The job is unique because it is one of power and is simultaneously limited in scopes of action, while requiring close work with clients in an effort to build relationships.
103

Návrh zavedeni DMS systému v organizační složce společnosti / Proposal for the Implementation of DMS System in the Organisational Unit of a Company

Mužilová, Gabriela January 2016 (has links)
Master´s thesis focuses on company´s internal documentation and Document Management Systems. It presents a proposal for the project of SharePoint implementation in the selected organisational unit of a company, using the Cloud Computing technology. An assessment of risks, resulted from the project and especially from the Cloud Computing, leads to the essential part of this paper, to the proposal of security arrangements and solutions. The arrangements will be advised to the organisational unit considering the economic cost comparison with potential risks.
104

Secure Distributed MapReduce Protocols : How to have privacy-preserving cloud applications? / Protocoles distribués et sécurisés pour le paradigme MapReduce : Comment avoir des applications dans les nuages respectueuses de la vie privée ?

Giraud, Matthieu 24 September 2019 (has links)
À l’heure des réseaux sociaux et des objets connectés, de nombreuses et diverses données sont produites à chaque instant. L’analyse de ces données a donné lieu à une nouvelle science nommée "Big Data". Pour traiter du mieux possible ce flux incessant de données, de nouvelles méthodes de calcul ont vu le jour. Les travaux de cette thèse portent sur la cryptographie appliquée au traitement de grands volumes de données, avec comme finalité la protection des données des utilisateurs. En particulier, nous nous intéressons à la sécurisation d’algorithmes utilisant le paradigme de calcul distribué MapReduce pour réaliser un certain nombre de primitives (ou algorithmes) indispensables aux opérations de traitement de données, allant du calcul de métriques de graphes (e.g. PageRank) aux requêtes SQL (i.e. intersection d’ensembles, agrégation, jointure naturelle). Nous traitons dans la première partie de cette thèse de la multiplication de matrices. Nous décrivons d’abord une multiplication matricielle standard et sécurisée pour l’architecture MapReduce qui est basée sur l’utilisation du chiffrement additif de Paillier pour garantir la confidentialité des données. Les algorithmes proposés correspondent à une hypothèse spécifique de sécurité : collusion ou non des nœuds du cluster MapReduce, le modèle général de sécurité étant honnête mais curieux. L’objectif est de protéger la confidentialité de l’une et l’autre matrice, ainsi que le résultat final, et ce pour tous les participants (propriétaires des matrices, nœuds de calcul, utilisateur souhaitant calculer le résultat). D’autre part, nous exploitons également l’algorithme de multiplication de matrices de Strassen-Winograd, dont la complexité asymptotique est O(n^log2(7)) soit environ O(n^2.81) ce qui est une amélioration par rapport à la multiplication matricielle standard. Une nouvelle version de cet algorithme adaptée au paradigme MapReduce est proposée. L’hypothèse de sécurité adoptée ici est limitée à la non-collusion entre le cloud et l’utilisateur final. La version sécurisée utilise comme pour la multiplication standard l’algorithme de chiffrement Paillier. La seconde partie de cette thèse porte sur la protection des données lorsque des opérations d’algèbre relationnelle sont déléguées à un serveur public de cloud qui implémente à nouveau le paradigme MapReduce. En particulier, nous présentons une solution d’intersection sécurisée qui permet à un utilisateur du cloud d’obtenir l’intersection de n > 1 relations appartenant à n propriétaires de données. Dans cette solution, tous les propriétaires de données partagent une clé et un propriétaire de données sélectionné partage une clé avec chacune des clés restantes. Par conséquent, alors que ce propriétaire de données spécifique stocke n clés, les autres propriétaires n’en stockent que deux. Le chiffrement du tuple de relation réelle consiste à combiner l’utilisation d’un chiffrement asymétrique avec une fonction pseudo-aléatoire. Une fois que les données sont stockées dans le cloud, chaque réducteur (Reducer) se voit attribuer une relation particulière. S’il existe n éléments différents, des opérations XOR sont effectuées. La solution proposée reste donc très efficace. Par la suite, nous décrivons les variantes des opérations de regroupement et d’agrégation préservant la confidentialité en termes de performance et de sécurité. Les solutions proposées associent l’utilisation de fonctions pseudo-aléatoires à celle du chiffrement homomorphe pour les opérations COUNT, SUM et AVG et à un chiffrement préservant l’ordre pour les opérations MIN et MAX. Enfin, nous proposons les versions sécurisées de deux protocoles de jointure (cascade et hypercube) adaptées au paradigme MapReduce. Les solutions consistent à utiliser des fonctions pseudo-aléatoires pour effectuer des contrôles d’égalité et ainsi permettre les opérations de jointure lorsque des composants communs sont détectés.(...) / In the age of social networks and connected objects, many and diverse data are produced at every moment. The analysis of these data has led to a new science called "Big Data". To best handle this constant flow of data, new calculation methods have emerged.This thesis focuses on cryptography applied to processing of large volumes of data, with the aim of protection of user data. In particular, we focus on securing algorithms using the distributed computing MapReduce paradigm to perform a number of primitives (or algorithms) essential for data processing, ranging from the calculation of graph metrics (e.g. PageRank) to SQL queries (i.e. set intersection, aggregation, natural join).In the first part of this thesis, we discuss the multiplication of matrices. We first describe a standard and secure matrix multiplication for the MapReduce architecture that is based on the Paillier’s additive encryption scheme to guarantee the confidentiality of the data. The proposed algorithms correspond to a specific security hypothesis: collusion or not of MapReduce cluster nodes, the general security model being honest-but-curious. The aim is to protect the confidentiality of both matrices, as well as the final result, and this for all participants (matrix owners, calculation nodes, user wishing to compute the result). On the other hand, we also use the matrix multiplication algorithm of Strassen-Winograd, whose asymptotic complexity is O(n^log2(7)) or about O(n^2.81) which is an improvement compared to the standard matrix multiplication. A new version of this algorithm adapted to the MapReduce paradigm is proposed. The safety assumption adopted here is limited to the non-collusion between the cloud and the end user. The version uses the Paillier’s encryption scheme.The second part of this thesis focuses on data protection when relational algebra operations are delegated to a public cloud server using the MapReduce paradigm. In particular, we present a secureintersection solution that allows a cloud user to obtain the intersection of n > 1 relations belonging to n data owners. In this solution, all data owners share a key and a selected data owner sharesa key with each of the remaining keys. Therefore, while this specific data owner stores n keys, the other owners only store two keys. The encryption of the real relation tuple consists in combining the use of asymmetric encryption with a pseudo-random function. Once the data is stored in the cloud, each reducer is assigned a specific relation. If there are n different elements, XOR operations are performed. The proposed solution is very effective. Next, we describe the variants of grouping and aggregation operations that preserve confidentiality in terms of performance and security. The proposed solutions combine the use of pseudo-random functions with the use of homomorphic encryption for COUNT, SUM and AVG operations and order preserving encryption for MIN and MAX operations. Finally, we offer secure versions of two protocols (cascade and hypercube) adapted to the MapReduce paradigm. The solutions consist in using pseudo-random functions to perform equality checks and thus allow joining operations when common components are detected. All the solutions described above are evaluated and their security proven.
105

Maintaining Confidentiality among HIV Infected Couples: Physicians' Patterns of Decision in Nigeria

Ayaebene, Francess Uju 01 January 2019 (has links)
Policies mandating HIV status disclosure to decrease incidence create ethical challenges for physicians on whether to breach or maintain infected patients' confidentiality. In Sub-Saharan Africa where HIV incidence is high, there is a need for clear guidelines/policies on making confidentiality decisions. The purpose of this quantitative quasi experiment was to determine whether the gender, gender orientation, and sexual relationship of an infected patient and physicians' demographics predicted physicians' decisions to breach confidentiality. In Plateau State, Nigeria, 222 physicians were given vignette questionnaires containing 6 different descriptions of gender, gender orientation, and sexual relationships of a hypothetical patient. Each physician decided to maintain or breach a patient's confidentiality in a variant. The utilitarian framework was applied, and data were analyzed using logistic regression models. A majority of the participants (70%) indicated a breach by directly informing sex partners or informing or referring to the health department. Only physicians' feature of previous confidentiality breach significantly predicted the decision to breach [p =.028, Exp (B) =.1.345, 95%CI (1.032, 1.753)]. The results suggested that regardless of patients' characteristics, physicians will breach confidentiality to protect sex partners potentially at risk of HIV infection. These findings may bring about positive social change by clarifying reasons for physicians' breach decisions, by informing the development of physicians' decision guidelines that would enhance physicians' practices in managing discordant couples, which could reduce HIV transmission among discordant couples leading to better and longer lives.
106

Mobile Application for Secure Healthcare System

Yesmin, Sabina January 2013 (has links)
Usage of mobile applications and wireless networks is growing rapidly at different sectors in the world. Mobile healthcare application is devotedly accepted by the healthcare organizations and also by patients. The reasons behind accepting mobile healthcare applications are as user friendly, reliable, low cost, time efficient, mobility etc. Though the use of mobile applications is rising day by day in the healthcare sectors still those applications are not completely secure to prevent disclosure and misuse of patient’s sensitive data. However, security issues in healthcare applications get attention by many organizations. In this thesis we have presented an integrated architecture for secure mobile healthcare system. This application provides management of patient medical records in a regional environment. Our mobile application is developed for Android platform. This solution is secure enough, because it fulfills important security requirements: integrity, confidentiality and availability.
107

Reporting obligations: A challenge for South African lawyers.

Dowman, Nadia January 2019 (has links)
Magister Legum - LLM / “Threats to the independence of the legal profession have become a preoccupation for bar leaders, regulators and academics, driven by the dual pressures of globalization and the changing business structure of the profession.”1 Money laundering is a transnational economic crime that has plagued the world economy for many decades. It is a crime that eluded the attention of most world leaders. Hence, it is this elusiveness and this non-interest in money-laundering as a serious economic crime, that afforded many individuals such as former dictators and military leaders in developing countries the chance to avoid prosecution for depleting the economic resources of their particular state.2
108

Att överföra en sekretessreglerad uppgift till en molntjänst / To transfer information under the Swedish confidentiality regulation to a cloud service

Storsved, Hanna January 2020 (has links)
Den svenska it-politiken har som mål att den offentliga sektorn i Sverige ska bli bäst i världen på att ta tillvara på digitaliseringens möjligheter. Flera studier har påvisat att digitaliseringen av den offentliga sektorn kan gynnas genom en användning av molntjänster. När det talas om den offentliga sektorns molntjänstanvändning åsyftas i regel att en extern molntjänstleverantör tillgängliggör en funktion till användaren som denne vanligtvis hanterar på egen hand. Genom att använda molntjänster för informationshantering överförs uppgifter, däribland möjligtvis även sekretessreglerade sådana, till en molntjänstleverantör. I den här uppsatsen utreds huruvida den offentliga sektorns molntjänstanvändning är förenlig med den svenska sekretesslagstiftningen. Uppsatsen fokuserar på dels röjande av en sekretessreglerad uppgift för en molntjänstleverantör, dels utlämnande av en sekretessreglerad uppgift till en molntjänstleverantör efter en skade- och menprövning. I samband med de ovanstående rättsfrågorna utreds huruvida kryptering av de uppgifter som överförs är en lösning på de rättsliga problem som uppkommer när molntjänster används.
109

Brottslighet bland barn och unga : Vad orsakar brottsligt beteende hos barn och unga samt hur arbetar socialtjänst och polis för att motverka en sådan negativ utveckling? / Crime among children and youths : What causes criminal behaviour among children and youths and how does the social services and the police force work to prevent such a negative developement?

Claesson, Emelie, Jennstig, Linda January 2021 (has links)
Brottslighet är när individer begår handlingar som inte är accepterade av samhället. När ett brott begås faller ansvaret på rättsväsendet och polisens verksamhet, men när gärningsmannen är ett barn faller hanteringen under socialtjänstens ansvar. Det fanns ett intresse av att undersöka vilka risker som kan leda till att barn begår brott, samt hur socialtjänsten och polisen arbetar i samverkan med varandra. Syftet med denna studie var tvåfaldigt, dels att undersöka socialarbetares och polisers uppfattningar om riskfaktorer för brottslighet bland barn, och dels hur yrkesverksamma samverkar för att förhindra utvecklingen av ett normbrytande beteende i form av brottslighet. Syftet undersöktes genom en kvalitativ metod där sju stycken yrkesverksamma inom polis och socialtjänst intervjuades. För att förstå resultatet applicerades teorin om det sociala rummet, fält och doxa. I resultatet framkom att de främsta riskfaktorerna för brottslighet bland barn uppfattas vara riskfaktorer i familjen, hemmiljön och skolan. Utifrån detta behöver socialtjänst och polis samverka tillsammans med varandra. Den främsta faktorn som försvårar samverkan mellan de två aktörerna verkar vara verksamheternas skilda uppdrag och sekretesslagstiftningar. Den skilda tillgången till information - där socialtjänsten har mer och polisen mindre - påverkar möjligheterna till effektiv samverkan. Polis och socialtjänst tvingas på grund av politisk styrning tillsätta insatser som fungerar kortsiktigt även om det långsiktiga perspektivet vore att föredra. / Crime is when individuals commit actions that’s not accepted by the community. When a crime is committed the responsibility falls to the judiciary and the police force, but when a culprit is a child they fall under the management of the child protective services. There was an interest in investigating the risks that may lead children to commit a criminal offence and also to investigate how collaboration between the social services and the police. The purpose of this study was twofolded, partly to investigate social workers and police officers understandings of riskfactors for crime among children, and partly how working professionals collaborate to prevent normbreaking behaviours in the form of crimes. The studys purpose was investigated through a qualitative method were seven representatives from the social services and the police authorities were interviewed. To understand the results, the theory of “the social space” and the concepts of fields and doxa were applied. The results show that the prime risks for commiting crime among children are perceived to be riskfactors among the family and home environment. The prime factors that complicate collaboration between the two organisations seem to be the organisations different assignments and secrecy legislation. The different access to information - where the social services have more and the police authorities less - affects the possibilities to effective collaboration. The results show that social workers and police officers are forced to appoint short term-working interventions, due to political governance decisions. Even if a long term perspective would be to prefer.
110

Perceptions of Confidentiality and Stigma Associated with use of Counseling Services

Hall, Jesi 01 December 2018 (has links) (PDF)
Counseling services are offered in most universities, but are often underutilized. Past researchers found that students listed time, cost, stigma, and confidentiality concerns as their top reasons for avoiding seeking help (e.g., Clement et al., 2015; Dearing, Maddux, and Tangney, 2005). The purpose of this study was to identify whether concerns about confidentiality affect stigma related to use of mental health services. Students answered questions about perceived stigma and the reasons they have avoided seeking counseling in the past. Those who had previously used services reported fewer confidentiality concerns. In a stepwise multiple regression, concerns about confidentiality were found to predict significantly more of the variability in perceived stigma. Students with confidentiality concerns were invited to a focus group to explore further, and major themes included pride, accessibility, cost, and lack of information. Future research is needed in implementing better communication with students about services and the purpose of counseling.

Page generated in 0.0718 seconds