Advertisement

Topics

PubMed Journals Articles About "Security Compliance Corporation" RSS

11:45 EDT 22nd October 2017 | BioPortfolio

Security Compliance Corporation PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Security Compliance Corporation articles that have been published worldwide.

More Information about "Security Compliance Corporation" on BioPortfolio

We have published hundreds of Security Compliance Corporation news stories on BioPortfolio along with dozens of Security Compliance Corporation Clinical Trials and PubMed Articles about Security Compliance Corporation for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Security Compliance Corporation Companies in our database. You can also find out about relevant Security Compliance Corporation Drugs and Medications on this site too.

Showing "Security Compliance Corporation" PubMed Articles 1–25 of 492

Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.

In the past decade, public and private organizations have experienced a significant and alarming rise in the number of data breaches. Across all sectors, there seems to be no safe haven for the protection of information. In the health care industry, the trend is even worse. Information security is at an unbelievable low point, and it is unlikely that government oversight can fix this issue. Health care organizations have ramped up their approaches to addressing the problem; however, these initiatives are of...


Validation of the "Security Needs Assessment Profile" for measuring the profiles of security needs of Chinese forensic psychiatric inpatients.

Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translat...

A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.

Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the diffi...


Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience.

Hepatitis B testing and treatment in HIV patients in The Gambia-Compliance with international guidelines and clinical outcomes.

Compliance with WHO guidelines on HBV screening and treatment in HIV-coinfected patients is often challenging in resource limited countries and has been poorly assessed in sub-Saharan Africa.

Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.

Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and s...

Security Techniques for the Electronic Health Records.

The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry....

Social Security Contributions and Return Migration Among Older Male Mexican Immigrants.

For decades, scholars have studied the effects of immigration on the U.S. social security system. To date, this research has been primarily limited to migrants within the United States and does not consider those who return to their countries of origin. We estimate the proportion of male Mexican return migrants who contributed to the U.S. social security system and analyze their socioeconomic characteristics and migration histories. We also estimate the proportion that receive or expect to receive U.S. soci...

The new subversive geranium: some notes on the management of additional troubles in maximum security prisons.

In this paper, we revisit King and McDermott's 1990 article on the social construction of 'control problem' prisoners and their management in high security prisons, in the light of our recent research on the location and building of trust in contemporary high security prisons. We examine how religious and race identities are now deeply implicated in the construction of risk, and we describe the procedures for and some of the consequences of managing the new risks of radicalization and extremist violence in ...

Assessing the Security of Connected Diabetes Devices.

This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.

Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors.

Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients' expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients' physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and securit...

Cultural Adaptation and Reliability of the Compliance with Standard Precautions Scale (CSPS) for Nurses in Brazil.

this study aimed to carry of the cultural adaptation and to evaluate the reliability of the Compliance with Standard Precautions Scale (CSPS) for nurses in Brazil.

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed t...

A novel income security intervention to address poverty in a primary care setting: a retrospective chart review.

To examine the development and implementation of a novel income security intervention in primary care.

Defining the Synthetic Biology Supply Chain.

Several recent articles have described risks posed by synthetic biology and spurred vigorous discussion in the scientific, commercial, and government communities about how to best detect, prevent, regulate, and respond to these risks. The Pacific Northwest National Laboratory's (PNNL) deep experience working with dual-use technologies for the nuclear industry has shown that analysis of supply chains can reveal security vulnerabilities and ways to mitigate security risk without hindering beneficial research ...

A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications.

Body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health records and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With the extensive development of healthcare appli...

Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.

Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We...

Change in Attachment Predicts Change in Emotion Regulation Particularly Among 5-HTTLPR Short-Allele Homozygotes.

In view of the theory that the attachment relationship provides a foundation for the development of emotion regulation, here, we evaluated (a) whether change in attachment security from 4 to 6 years predicts change in emotion regulation from 6 to 8 years and (b) whether 5-HTTLPR moderates this relation in a Norwegian community sample (n = 678, 99.7% Caucasian). Attachment was measured with the Manchester Child Attachment Story Task, and teachers completed the Emotion Regulation Checklist. Attachment securit...

Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?

During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features.

Brain Trauma Foundation Guidelines for Intracranial Pressure Monitoring: Compliance and Effect on Outcome.

Brain Trauma Foundation (BTF) guidelines recommend intracranial pressure (ICP) monitoring in patients who sustained severe traumatic brain injury (TBI). Compliance to BTF guidelines is variable, and the effect of ICP monitoring on outcomes remains a controversial issue. The purpose of this study was to assess guidelines compliance in patients who sustain a severe TBI and to analyze the effect of ICP monitoring on outcomes.

Attitudes to personality disorder of staff working in high-security and medium-security hospitals.

The discourse surrounding personality disorder is largely negative, and the diagnosis is considered to be associated with a degree of stigma. This study aimed to investigate staff attitudes towards personality disorder in high-security and medium-security forensic-psychiatric hospitals in the UK. The Attitude to Personality Disorder Questionnaire was completed by 132 participants who were all current employees with clinical roles. Staff attitudes to personality disorder in the current study were significant...

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., A...

Healthcare Reform: Enforcement and Compliance.

Editorial Message: Compliance Revisited.

Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog ...


Quick Search
Advertisement