To see the other types of publications on this topic, follow the link: Unauthorised access.

Journal articles on the topic 'Unauthorised access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Unauthorised access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bainbridge, David I. "Hacking-The Unauthorised Access of Computer Systems; the Legal Implications." Modern Law Review 52, no. 2 (March 1989): 236–45. http://dx.doi.org/10.1111/j.1468-2230.1989.tb02820.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peady, C. "Unauthorised access to the contents of a Graseby 3300 PCA pump." Anaesthesia 62, no. 1 (January 2007): 98–99. http://dx.doi.org/10.1111/j.1365-2044.2006.04929_1.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Osagie, M. S. U., and Amenze Joy Osagie. "A Bit of Hacking Techniques for Vulnerable Subdomain." Journal of Advances in Computing, Communications and Information Technology 1 (April 25, 2021): 1–7. http://dx.doi.org/10.37121/jaccit.v1.133.

Full text
Abstract:
Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability.
APA, Harvard, Vancouver, ISO, and other styles
4

Kachaeva, G. I., A. D. Popov, and E. A. Rogozin. "FUNCTIONAL PERFORMANCE INDICATORS DURING SYSTEMS DEVELOPMENT TO PROTECT INFORMATION FROM UNAUTHORISED ACCESS." Herald of Dagestan State Technical University. Technical Sciences 45, no. 1 (June 13, 2018): 147–59. http://dx.doi.org/10.21822/2073-6185-2018-45-1-147-159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taylor, Savitri. "Should unauthorised arrivals in Australia have free access to advice and assistance?" Australian Journal of Human Rights 6, no. 1 (February 2000): 34–58. http://dx.doi.org/10.1080/1323238x.2000.11911026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Shane, Kevin Curran, and Tom Lunney. "Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses." International Journal of Digital Crime and Forensics 13, no. 6 (November 2021): 1–20. http://dx.doi.org/10.4018/ijdcf.20211101.oa8.

Full text
Abstract:
The detection of unauthorised users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or Virtual Private Networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. The experiments conducted to classify OpenVPN usage found that the Neural Network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.
APA, Harvard, Vancouver, ISO, and other styles
7

Maurushat, Alana, and Ron Yu. "When Internet protocols and legal provisions collide: Unauthorised access and Sierra v. Ritz." Computer Law & Security Review 25, no. 2 (January 2009): 185–88. http://dx.doi.org/10.1016/j.clsr.2009.02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alferov, V. P., A. V. Butskikh, A. V. Krisilov, A. D. Popov, and E. A. Rogozin. "USE OF A NUMERICAL ANALYTICAL MODEL FOR ASSESSING THE FUNCTIONAL EFFECTIVENESS OF AN INFORMATION PROTECTION SYSTEM BY ANALYSING ITS PROBABILISTIC-TEMPORAL CHARACTERISTICS." Herald of Dagestan State Technical University. Technical Sciences 47, no. 1 (April 21, 2020): 58–71. http://dx.doi.org/10.21822/2073-6185-2020-47-1-58-71.

Full text
Abstract:
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilistic-temporal characteristics of protection functions for automated information systems is a complex and costly task. In order to study the dynamics of transitions between the states of this type of system, it is necessary to develop a mathematical model and an algorithm for computing the corresponding characteristics.Method. To achieve this goal, a mathematical model of the information security system was developed in the MATLAB software environment. The main advantages of this software environment consist in a high level of visualisation, the ability to modify models to analyse other systems of this type and the availability of integration tools with other software products.Results. The article presents a numerical and analytical model of a system for protecting information from unauthorised access. The functional dynamics of the system are described using a stochastic Petri net. In order to solve the integral equations and determine the probabilities of reaching the final state in a given time, the Laplace transform is used. The solution is carried out in an analytical mode to obtain an explicit form of the dependences of the probability-time characteristics of the system on the probabilities of transitions between states and the average times the system stays in each state. The paper presents the results of calculating the probability-time characteristics of the “Turning on the personal computer and user identification” subsystem of the “Guard NT” system for preventing unauthorised access to information.Conclusion. The developed model, which can be used to study the dynamics of transitions between states of an information protection system against unauthorised access in an automated system, as well as to optimise the time it takes to complete functional tasks, can also be used to improve the operational efficiency of these systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Selvadurai, Niloufer, Md Rizwanul Islam, and Peter Gillies. "Unauthorised access to wireless local area networks: The limitations of the present Australian laws." Computer Law & Security Review 25, no. 6 (November 2009): 536–42. http://dx.doi.org/10.1016/j.clsr.2009.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Marrow, Helen B., and Tiffany D. Joseph. "Excluded and Frozen Out: Unauthorised Immigrants’ (Non)Access to Care after US Health Care Reform." Journal of Ethnic and Migration Studies 41, no. 14 (July 17, 2015): 2253–73. http://dx.doi.org/10.1080/1369183x.2015.1051465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Karagiannopoulos, Vasileios. "Insider unauthorised use of authorised access: What are the alternatives to the Computer Misuse Act 1990?" International Journal of Law, Crime and Justice 47 (December 2016): 85–96. http://dx.doi.org/10.1016/j.ijlcj.2016.08.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Malik, Aftab Ahmad. "Bank Frauds Using Digital Devices and the Role of Business Ethics." International Journal for Electronic Crime Investigation 2, no. 4 (December 7, 2018): 7. http://dx.doi.org/10.54692/ijeci.2018.020421.

Full text
Abstract:
The paper focuses on the use of digital devices to commit the banking frauds in collaboration with bank employees. There have been enormous cases of small and large size embezzlements, illegal deductions and frauds with customers. Most of these frauds are accomplished using digital devices. The recent developments in computer networking, detection of illegal access to accounts by unauthorised attackers and hackers have made the task of protection to customers easier. This paper considers the role of business ethics in banking sector which may serve as a deterrent force for the employees. Several studies haverevealedthattheimplementationofcodebusinessethics producedencouragingresults.
APA, Harvard, Vancouver, ISO, and other styles
13

Malik, Aftab Ahmad. "Bank Frauds Using Digital Devices and the Role of Business Ethics." International Journal for Electronic Crime Investigation 2, no. 4 (December 7, 2018): 7. http://dx.doi.org/10.54692/ijeci.2019.030121.

Full text
Abstract:
The paper focuses on the use of digital devices to commit the banking frauds in collaboration with bank employees. There have been enormous cases of small and large size embezzlements, illegal deductions and frauds with customers. Most of these frauds are accomplished using digital devices. The recent developments in computer networking, detection of illegal access to accounts by unauthorised attackers and hackers have made the task of protection to customers easier. This paper considers the role of business ethics in banking sector which may serve as a deterrent force for the employees. Several studies haverevealedthattheimplementationofcodebusinessethics producedencouragingresults.
APA, Harvard, Vancouver, ISO, and other styles
14

Weir, Michael. "Land access perspectives in unconventional gas—where is the balance?" APPEA Journal 52, no. 1 (2012): 367. http://dx.doi.org/10.1071/aj11029.

Full text
Abstract:
A landholder or occupier is generally entitled to control access to their property. An unauthorised entry onto a person’s property will provide the landholder with the entitlement to commence an action in trespass subject to statutory protection being available to the trespasser. Land access is a significant factor in the public debate surrounding the recovery of unconventional gas that requires access for tenure holders for various purposes. This paper first discusses the common law background to the entitlement of landholders to control access to land. The paper will then analyse the statutory regulatory structure applying in Queensland, NSW, WA and SA that entitles access to land for tenure holders in relation to unconventional gas. This paper will discuss the nature of property and perceptions of property that impact on the context in which negotiations occur between landholders and tenure holders. The paper will discuss some of the reasons the issue of access goes beyond mere legal rights from the perspective of the landholder, and how this may impact the approach taken by tenure holders and landholders in the negotiations for access to land. For the benefit of both the tenure holder and the landholder, the paper will suggest factors that may assist in promoting good negotiated outcomes.
APA, Harvard, Vancouver, ISO, and other styles
15

Borovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.

Full text
Abstract:
Abstract: in this publicaton, a technique to increase trust levels of foreign and domestic-made hardware-software platforms, which are used to create specialised devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities, to work with classified information, was made. Problems, which developer might encounter, were listed; methods of troubleshooting were proposed, and conclusions were made. The purpose of research is to investigate an ability of designing trusted foreign and domestic-made hardwaresoftware platforms, protected from exploiting BIOS vulnerabilities. Research methods: in order to achieve the purpose of research, an analysis of Russian’s industrial-grade PC modules was made in order to choose PC module that will be used for designing trusted hardware-software platform, an analysis of known BIOS vulnerabilities was made; proprietary BIOS replacement in a form of domestic-made Horizon bootloader, which includes unauthorised access to information protection measures, was made and possibilty of practical use of trusted hardware-software platform with Horizon bootloader was overviewed. Obtained result: PC module for trusted hardware-software platform was selected, proprietary BIOS replacement in a form of domestic-made Horizon bootloader, which includes unauthorized access to information protection measures, was made; technique to increase trust levels of foreign and domestic-made hardware-software platforms, which are used to create specialized devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities, to work with classified information, was made; an approach to create trusted hardware-software platform design requirements and conditions was made; needs to exclude potentially dangerous Intel Management Engine controller’s functionality were justified and proposal to use trusted hardware-software platform with Horizon bootloader was made.
APA, Harvard, Vancouver, ISO, and other styles
16

Goold, Benjamin J. "Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy." Surveillance & Society 1, no. 2 (September 1, 2002): 191–203. http://dx.doi.org/10.24908/ss.v1i2.3352.

Full text
Abstract:
Drawing on a recent study of the impact of closed circuit television (CCTV) cameras on policing practices in a large English police force, this paper considers whether the presence of surveillance cameras affects the working attitudes and behaviour of individual police officers. In particular, this paper asks whether CCTV makes the police more accountable or more cautious in the exercise of their discretion in public spaces. Although noting that in certain circumstances CCTV may inadvertently help to reduce incidences of police misconduct, this paper concludes by arguing that more needs to be done to prevent the police from interfering with the operation of CCTV and gaining unauthorised access to potentially incriminating video evidence.
APA, Harvard, Vancouver, ISO, and other styles
17

GARCÍA ADEVA, JUAN JOSÉ, and JUAN MANUEL PIKATZA ATXA. "WEB MISUSE DETECTION THROUGH TEXT CATEGORISATION OF APPLICATION SERVER LOGS." International Journal on Artificial Intelligence Tools 15, no. 05 (October 2006): 849–54. http://dx.doi.org/10.1142/s0218213006002989.

Full text
Abstract:
Security in web-based systems that handle confidential information can be considered a particularly sensitive subject that requires assuming some responsibilities about security. Achieving a secure web application involves tackling several issues such encryption of traffic and certain database information, strictly restricted access control, etc. In this work we focus on detecting misuse of the web application in order to gain unauthorised access. We introduce an Intrusion Detection component that by applying Text Categorisation is capable of learning the characteristics of both normal and malicious user behaviour from the regular, high-level log entries generated by web application through its application server. Therefore, the detection of misuse in the web application is achieved without the need of explicit programming or modification of the existing web application. We applied our Intrusion Detection component to a real web-based telemedicine system in order to offer some evaluation measurements. This articles offers an overview of the model, our experiences, and observations.
APA, Harvard, Vancouver, ISO, and other styles
18

Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (March 10, 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.

Full text
Abstract:
Hacking or unauthorised access is criminalised in many jurisdictions, including Malaysia, Singapore, the United Kingdom, Hong Kong, and a few other countries. Hacking is the act of gaining access through the computer system or network without proper authority or exceeding the original authority given to him. Many commentators and researchers have reported on the conceptual and legal aspects of hacking. However, hacking's theoretical, conceptual, and legal aspects have remained under-researched. Therefore, this paper's primary objective is to outline the various theories, which could inform the criminalisation of hacking. The theories of routine activities, deterrence theory, social learning and self-control, general strain theory, and deviant subcultures are deliberated in this paper alongside illustrations within the context of hacking. This paper will shed light on the body of literature and contribute to a better understanding of hacking criminalisation from various theories discussed in this paper. Future research should be directed to provide empirical evidence of applying the theory to hacking criminalisation.
APA, Harvard, Vancouver, ISO, and other styles
19

Geeraert, Jérémy. "Sick and Vulnerable Migrants in French Public Hospitals. The Administrative and Budgetary Dimension of Un/Deservingness." Social Policy and Society 20, no. 3 (February 10, 2021): 487–96. http://dx.doi.org/10.1017/s1474746420000767.

Full text
Abstract:
This article explores how staff in French public hospitals are indirectly involved in the governing of migration through healthcare. It unpacks the construction of differentiated values of life assigned to specific categories of vulnerable (authorised and unauthorised) migrants according to their perceived un/deservingness in context of budgetary restrictions. This context emphasises tensions between medical and administrative staff in the decision-making process regarding access to healthcare. The analysis rests upon empirical data (participant observations and semi-directed interviews) gathered in ‘healthcare access units’ located in public hospitals. Perceptions of un/deservingness lead to both healthcare rationing and healthcare denial and are built upon entangled criteria related to both migration status and budgetary concerns. These mechanisms reveal the administrative and budgetary dimensions that underlie the perceptions of health-related un/deservingness, which is linked to the costs of healthcare: the higher the costs, the less likely patients are to be designated to be deserving of healthcare.
APA, Harvard, Vancouver, ISO, and other styles
20

Jansone, Anita, Kaspars Lauris, and Ivars Šaudinis. "Multi factor authentication as a necessary solution in the fight with information technology security threats." Environment. Technology. Resources. Proceedings of the International Scientific and Practical Conference 3 (June 16, 2015): 114. http://dx.doi.org/10.17770/etr2015vol3.183.

Full text
Abstract:
In the publication multi factor authentication solutions are offered as a necessary tool for decrease of information technology security risks. The work includes description of authentication process from the viewpoint of information technology security aspect, as well as authentication factors are described, which can be used in authentication process modules. Some recommendations for decrease of security risks are given using multi factor authentication solutions. In the work a multi-factor authentication security testing experiment is described, which involves use of Linux remote console - SSH service. Analysis of data of unauthorised access efforts obtained during tests is described: it is determined from which countries or regions, as well as in which days there is the highest threat to information technology security.
APA, Harvard, Vancouver, ISO, and other styles
21

Pawlik, Marek, and Marcin Kowalski. "Rail safety in the context of relationships between directives on safety and interoperability - analysis from the point of view of the essential requirements of the essential 'security'." Transportation Overview - Przeglad Komunikacyjny 2016, no. 12 (December 1, 2016): 17–26. http://dx.doi.org/10.35117/a_eng_16_12_03.

Full text
Abstract:
The article presents relationships between railway safety directive and railway interoperability directive. The carried out analysis starts from the definition of the railway interoperability and is based on essential requirement of ‘safety’. Ten safety requirements areas were indicated, which are contained in the Technical Specifications for Interoperability TSIs. The article takes into account: degraded situations, construction safety, electrical safety, protection against unauthorised access and fire, influence of forces from rolling stock on track and wheel-rail stability requirements, control command and signalling, influence of traction power supply systems on signalling equipment, operational rules and staff qualifications, panic countervail, as well as informatics support for safety. The article complements analyses, which will be presented in the following issue of the journal.
APA, Harvard, Vancouver, ISO, and other styles
22

Irshad, Shareen, Muhammad Nawaz Brohi, and Tariq Rahim Soomro. "Block-ED: The Proposed Blockchain Solution for Effectively Utilising Educational Resources." Applied Computer Systems 25, no. 1 (May 1, 2020): 1–10. http://dx.doi.org/10.2478/acss-2020-0001.

Full text
Abstract:
AbstractIn this day and age, access to the Internet has become very easy, thereby providing access to different educational resources posted on the cloud even easier. Open access to resources, such as research journals, publications, articles in periodicals etc. is restricted to retain their authenticity and integrity, as well as to track and record their usage in the form of citations. This gives the author of the resource his fair share of credibility in the community, but this may not be the case with open educational resources such as lecture notes, presentations, test papers, reports etc. that are produced and used internally within an organisation or multiple organisations. This calls for the need to build a system that stores a permanent and immutable repository of these resources in addition to keeping a track record of who utilises them. Keeping in view the above-mentioned problem in mind, the present research attempts to explore how a Blockchain based system called Block-ED can be used to help the educational community manage their resources in a way to avoid any unauthorised manipulations or alterations to the documents, as well as recognise how this system can provide an innovative method of giving credibility to the creator of the resource whenever it is utilised.
APA, Harvard, Vancouver, ISO, and other styles
23

Miller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (July 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.

Full text
Abstract:
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the presented models are capable of classifying network traffic in a binary manner as direct (originating directly from a user's own device) or indirect (makes use of identity and location hiding features of VPNs) with high degrees of accuracy. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. The further work done to classify Stunnel OpenVPN usage found that the Neural Network was able to correctly identify VPN traffic with an overall accuracy of 97.82% accuracy when using 10-fold cross validation. This final experiment also provided an observation of 3 different validation techniques and the different accuracy results obtained. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.
APA, Harvard, Vancouver, ISO, and other styles
24

Greacen, Tim, David Friboulet, Lionel Fugon, Serge Hefez, Nicolas Lorente, and Bruno Spire. "Access to and use of unauthorised online HIV self-tests by internet-using French-speaking men who have sex with men." Sexually Transmitted Infections 88, no. 5 (March 21, 2012): 368–74. http://dx.doi.org/10.1136/sextrans-2011-050405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." International Journal of Information Systems for Crisis Response and Management 10, no. 2 (April 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.

Full text
Abstract:
As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
26

Olapade, Daramola Thompson, Benjamin Gbolahan Ekemode, and Abel Olaleye. "Considerations for the design and management of property database in opaque markets." Journal of Property Investment & Finance 37, no. 5 (August 5, 2019): 445–54. http://dx.doi.org/10.1108/jpif-10-2018-0080.

Full text
Abstract:
PurposeEarlier studies have suggested the creation of a central database of concluded property transactions as a panacea to the property data debacle. It is in this regard that the purpose of this paper is to examine the perception of potential users of centralised property database on the consideration for the design and management of such database.Design/methodology/approachQuestionnaires were administered on 190 property practitioners (referred as estate surveying and valuation firms) in Lagos property market. Frequency index, frequency distribution and percentage were employed for data analysis.FindingsThe result showed that respondents preferred a web-based databank and free access to the information in the databank by those who recorded their market data in it. They also preferred uniform recording standard in the databank, an interface that must be user friendly and secure to prevent unauthorised user from gaining access, amongst others. The practitioners also preferred that their professional body manage the databank when it is created.Practical implicationsThe paper provides useful insights into creating a property database that will improve accessibility to property data in opaque markets.Originality/valueThere is still little or no empirical research on framework/end-users’ requirements for the creation of property transaction database in emerging property markets.
APA, Harvard, Vancouver, ISO, and other styles
27

Omelchuk, Oleh M., Mariia P. Muzyka, Mykola O. Stefanchuk, Iryna P. Storozhuk, and Inna A. Valevska. "Legal grounds for restricting access to information: a philosophical aspect." Journal of the National Academy of Legal Sciences of Ukraine 28, no. 3 (September 17, 2021): 64–73. http://dx.doi.org/10.37635/jnalsu.28(3).2021.64-73.

Full text
Abstract:
The rapid spread of the Internet and communication technologies raises the issue of access to information, especially access to information via the Internet. The amount of information on the network is constantly increasing, and at the same time more and more efforts are being made to limit users' access to it to some extent. The more restrictions state bodies create in this area, the more efforts are made to circumvent or violate these prohibitions. Free access to information in a democratic society should be the rule, and restriction of this right – the exception. These restrictions should be clearly defined by law and applied only in cases where legitimate and vital interests, such as national security and privacy, need to be respected. The main purpose of this study is to consider the legal and socio-philosophical aspects of access to information. Restricting access to documents as media has been practiced since ancient times. The study highlights the existing inconsistencies and lags in the implementation of the principles of exercise of the right to information in Ukraine at the level of laws and subordinate legislation. The study classifies information according to the nature of restrictions (exercise) of constitutional rights and freedoms in the information sphere. It was discovered that the legislation of Ukraine does not systematise the list of confidential information in a single regulation in contrast to the Russian Federation and provides the main types of confidential personal information. It was found that restrictions on any freedoms and human rights, including in the information space, can be established with the help of various regulators, the dominant among which are the following levels of implementation: legal (legislative); moral self-consciousness of society; autonomy of the person. Features and spheres of action of regulators of restriction of freedoms and human rights are described. To restrict access to information, various methods are used to protect it from unauthorised receipt, which can be divided into two groups: formal and informal
APA, Harvard, Vancouver, ISO, and other styles
28

Lytvynenko, Anatoliy A. "The Concept of the Patient’s Autonomy: From the Vaults of Civil Law." ATHENS JOURNAL OF LAW 8, no. 1 (December 29, 2021): 83–106. http://dx.doi.org/10.30958/ajl.8-1-5.

Full text
Abstract:
The concept of patient’s rights itself was fairly known before the last four or five decades, and medical malpractice of all kinds made the aggrieved party to seek redress at a court; but no special legislation, apart from rare exceptions, has ever existed to anchor the patient’s rights before the late 20th century. In the civil law tradition of the 20th century, especially its earlier decades, doctors could be held criminally or civilly liable for a wide variety of malpractice, including unauthorised medical intervention or divulgation of patient’s information, though such provisions did not develop actual rights, were quite general in their nature, and were individually assessed by the courts in each case. Within in the gradual change in the doctrines of medical law, the term “autonomy”, shaping the patient’s right to decide what medical interventions could or could not be performed upon his body, intervened into the existing legal scholarship, which was later augmented with various issues, such as access to medical records of the patient, refusal of blood transfusion, participation in medical experiments, deciding upon end-of-life situations or relating to various reproductive law considerations, not always permitted by national law. Many of these rights are much older than the concept of patient’s autonomy themselves, and have developed in the case law which itself has originated from lawsuits against doctors and hospitals for acts, being nearly obscure in the existing legal doctrine, such as unauthorised medical experiments. The given paper is aimed to discuss the academic development and overall gist of the patient’s right to autonomy, as well as some of its early interpretations in civil law doctrine. Keywords: patient’s rights, medical malpractice, theory of law, medical law, patient autonomy, civil law.
APA, Harvard, Vancouver, ISO, and other styles
29

Hussain, Hafezali Iqbal, Fakarudin Kamarudin, Zuraidah Mohd-Sanusi, Shuhaida Mohamed Shuhidan, Ahmed Abdullah Saad Al-Dhubaibi, and Mohd Shahril Ahmad Razimi. "Governance in the Internet of Vehicles (IoV) Context: Examination of Information Privacy, Transport Anxiety, Intention, and Usage." Journal of Advanced Transportation 2021 (April 23, 2021): 1–10. http://dx.doi.org/10.1155/2021/5563260.

Full text
Abstract:
This study examines the validity and acceptability of concern for information privacy with the Internet of vehicle context. For this purpose, the exploratory and confirmatory analysis processes were performed for testing the validity of concern for the Internet of vehicle information privacy. A total number of 357 responses were received online which were complete in all respects from college and university students studying information system course at undergraduate and graduate level. The estimated results obtained from exploratory and confirmatory factor analysis revealed that 3-dimension construct containing collection, error, and information accuracy measuring governance for Internet of vehicle information privacy (CFIOVIP) was validated through second order construction with strong goodness-of-fit estimates. The relevant factors were reliable and valid as per their internal and external validity estimates of Cronbach Alpha, average variance extracted, composite reliability, discriminant validity, and factor loading values including their fitness indices for 16 items for 3-dimension construct of CFIOVIP. The findings of the study indicate that Internet of vehicle users view secondary usage of information and unauthorised access of information as the same dimension with the title of information access for measuring CFIOVIP along with two other constructs like collection and error in information for the Internet of vehicle context. The study recommends a 2nd order CFIOVIP construct based on three dimensions, namely, collection, error, and information access, for testing the present governance of the Internet of vehicles.
APA, Harvard, Vancouver, ISO, and other styles
30

Morrison, Michael, Chantal Wight, and Emily Evans. "Report on excavation of a shell mound site at Mandjungaar, western Cape York Peninsula." Queensland Archaeological Research 21 (May 2, 2018): 13–26. http://dx.doi.org/10.25120/qar.21.2018.3637.

Full text
Abstract:
This short report presents results of excavation and analysis of a shell mound deposit at Mandjungaar, near Weipa, Cape York Peninsula. This study was initiated as a cultural heritage management project focused on a shell mound site damaged by unauthorised clearing of access tracks. This study included a small research component to establish a baseline understanding of longer-term use history of the Mandjungaar area at the request of Ndrua’angayth custodians. This included excavation and analysis of a test pit at the site. Results of the study are presented and contextualised in relation to previous research on the Weipa Peninsula in order to expand our understanding of the wider cultural history of the southern Weipa Peninsula. These results provide further support for the assertion that shell mound formation in the Albatross Bay region involved food production activities that were strategically focused on estuarine mud and sandflat ecosystems. In doing so, this dataset provides additional support for the previously proposed niche production model of shell mound formation.
APA, Harvard, Vancouver, ISO, and other styles
31

Rogozin, E. A., D. G. Silka, and O. A. Gulyaev. "METHODOLOGY FOR ASSESSING THE SECURITY OF INFORMATION PASSED THROUGH THE TECHNICAL CHANNELS OF A SPECIAL-PURPOSE INFORMATISATION OBJECT." Herald of Dagestan State Technical University. Technical Sciences 46, no. 4 (January 2, 2020): 123–33. http://dx.doi.org/10.21822/2073-6185-2019-46-4-123-133.

Full text
Abstract:
Objectives. In order to determine the security of a special-purpose informatisation object, it is necessary to calculate the effectiveness indicators of information security (IS) measures aimed at preventing unauthorised access (UA) threats associated with information leakage through technical (acoustic) channels. In order to determine the actual channels of information leakage, it is necessary to develop a list of actions to neutralise potential threats, including the development of an information protection system for a special-purpose informatisation object.Method. A security assessment of the special-purpose informatisation object is carried out using expert documentary and instrumental methods.Results. The results of evaluating the indicators of protection against information leakage through the air (acoustic) channel are presented and aspects of improving special measures for protecting information at the special-purpose informatisation object are identified.Conclusion. Due to its relevance, the direction of this study requires further development of organisational and technical measures to implement the requirements of regulatory documents on the protection of information in special-purpose informatisation objects.
APA, Harvard, Vancouver, ISO, and other styles
32

van Waas, Laura. "The Children of Irregular Migrants: A Stateless Generation?" Netherlands Quarterly of Human Rights 25, no. 3 (September 2007): 437–58. http://dx.doi.org/10.1177/016934410702500303.

Full text
Abstract:
Irregular migration is on the rise. In countries around the world, the – increasingly permanent – presence of large numbers of unauthorised immigrants is putting pressure on immigration and citizenship policies as a balance is sought between inclusion and exclusion. Neither large-scale regularisation or naturalisation, nor deportation, offer an appropriate solution for much of this group, so they remain – irregularly and indefinitely. Meanwhile, life goes on and families expand. Yet the arrival of a new generation, born to irregular migrants on the territory of the host State, is often overlooked by official government records. Unable to access birth registration for a number of reasons, these children miss out on that crucial evidence of their relationship with their parents and the State. Without proof of these ties, the child will have difficulty claiming the nationality to which he is entitled. This article explores how the vulnerability of irregular migrants' children to a lack of birth registration could herald the arrival of a whole generation of stateless children.
APA, Harvard, Vancouver, ISO, and other styles
33

Zajcew, Oleg, and Aleksander Yepikhin. "The Subject Matter of Criminal Evidence Relating to the Disclosure of Information on Security Measures Applicable to Law Enforcement or Control Officials." Internal Security 10, no. 1 (November 27, 2018): 261–70. http://dx.doi.org/10.5604/01.3001.0012.7526.

Full text
Abstract:
The article analyses the characteristics of the subject of evidence (Article 73 of the Penal Code of the Russian Federation) of objective and subjective characteristics of crime, which are listed in Article 320 of the Penal Code of the Russian Federation. Considerable attention has been given to the establishment of criminal sanctions for the disclosure of information on security measures towards law enforcement or control officials as an important guarantee of the stability of the Russian management system and legal protection activities. The characteristics of the subject-matter of the evidence in criminal matters under investigation are expressed in the need to establish objective and subjective grounds for disclosing information on security measures in the course of criminal proceedings against law enforcement or control officials. The state protection measures themselves are defined by separate regulations and are applied in the process of criminal proceedings and in the presence of evidence. However, this complex and multifaceted security process could be seriously undermined by the‘leak’ of classified security information. In case of such illegal disclosure, the penalty is defined in Article 320 of the Penal Code of the Russian Federation. The authors draw attention to the existence of a direct or indirect relationship between the unauthorised activity and performing state service in legal protection bodies, as well as the need to prove the intention to commit this crime and the awareness of not disclosing secret information to unauthorized persons who do not have formal access to the above information. The authors conclude that the implementation of criminal evidence proceedings for the criminal case of the offence under Article 320 of the Penal Code of the Russian Federation needs to be improved at this stage in order to increase the effectiveness and security of the protection of judges, law enforcement and control officials in Russia.
APA, Harvard, Vancouver, ISO, and other styles
34

Sadikin, Mohamad Ali, and Rini Wisnu Wardhani. "Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application." CommIT (Communication and Information Technology) Journal 10, no. 2 (October 31, 2016): 63. http://dx.doi.org/10.21512/commit.v10i2.1549.

Full text
Abstract:
This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR) application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.
APA, Harvard, Vancouver, ISO, and other styles
35

Banu, Anees. "Improved Algorithm of Steganography Combined with Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.

Full text
Abstract:
When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.
APA, Harvard, Vancouver, ISO, and other styles
36

Rachappa, Halkar. "Experimental Analysis of Latest Biometric Security Strategies and Its Impact on Authentication Methods." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 10 (October 31, 2019): 08–12. http://dx.doi.org/10.17762/ijritcc.v7i10.5516.

Full text
Abstract:
Biometric technology is the latest method which is used for security purpose. The technique uses biological features for authorised access. It is unique way of security methods and reliable as compared to other traditional methods of security. The technique uses features like fingerprint, face recognition, thumb impressions, digital signature etc as a means of security methods. It is automatic way of identifying the identity of the person which is based on physical characteristics of person. It is more safe and secure method of authentication as biological or physical features is unique to individual and cannot result in security threat and cannot be accessed by unauthorised user. There are many varieties of biometric technique and the organisations can select any one of them based upon the type of business they are doing and how safe they want to keep the data and information of the individual. There are many advantages as well as challenges of biometric technique which will be explained in this paper. The components of biometric architecture will also be explained in this paper.
APA, Harvard, Vancouver, ISO, and other styles
37

Shafack, Rosemary M. "Securing Library and Information Resources: The Situation in Two State University Libraries in Cameroon." European Journal of Education and Pedagogy 2, no. 1 (January 11, 2021): 25–31. http://dx.doi.org/10.24018/ejedu.2021.2.1.13.

Full text
Abstract:
Information services such as the library, under normal international standards should consider safety and security of its infrastructure and resources (human resources inclusive) as part of its workflow. Information is expanding and covering untold grounds every day and information bearing facilities are equally being transformed with the help of Information and Communication Technologies (ICTs) whose evolution seem to know no bounds. This trend is not only changing the role of the Library and Information Professional but urging this professional to ensure the security of access to the information resources platform. Thus it is not only worthwhile to collect, organize and make accessible information resources but it is equally important to secure these resources to last long and prevent unauthorized and unethical access. This therefore calls for a carefully developed security policy for every information service that can be updated as knowledge expands and the ICT platform continue to expand and evolve. Such a policy should be well thought out to cover all the forms information takes and include, print, electronic and graphics. It should equally include securing the human resources implicated in the running and using of the Library services. This paper is an investigation of the challenges faced in securing information resources in public university libraries in Anglophone Cameroon. The research design used for the study is a survey with data collecting instruments made of a questionnaire and an interview guide from library staff and library administrators respectively. Three main research questions were coined for the study having as thrust the following: security challenges faced, security policies put in place to secure library resources and difficulties libraries face in providing appropriate security and how these difficulties could be solved. The analysis of the data collected was done by a simple calculation of the percentages of the responses of the respondents to determine the threats and the extent of each threat. Academic libraries have been plagued with security issues for a long time. It is difficult to replace materials that are under security threats in libraries. Theft, mutilation and unauthorised access to libraries and their resources constitute serious problems which affect users. It is important that libraries with physical security systems reinforce these systems with electronic security systems. More effort is needed to properly train and encourage staff to be security conscious and to take the necessary precautionary measures. It is anticipated that if the right measures are put in place to resolve library security issues, libraries would be able to better protect their resources and render better services.
APA, Harvard, Vancouver, ISO, and other styles
38

Al-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System." International Journal of Environmental Research and Public Health 16, no. 9 (April 27, 2019): 1490. http://dx.doi.org/10.3390/ijerph16091490.

Full text
Abstract:
Electronic health record (EHR) systems are extremely useful for managing patients' data and are widely disseminated in the health sector. The main problem with these systems is how to maintain the privacy of sensitive patient information. Due to not fully protecting the records from unauthorised users, EHR systems fail to provide privacy for protected health information. Weak security measures also allow authorised users to exceed their specific privileges to access medical records. Thus, some of the systems are not a trustworthy source and are undesirable for patients and healthcare providers. Therefore, an authorisation system that provides privacy when accessing patients' data is required to address these security issues. Specifically, security and privacy precautions should be raised for specific categories of users, doctor advisors, physician researchers, emergency doctors, and patients' relatives. Presently, these users can break into the electronic systems and even violate patients' privacy because of the privileges granted to them or the inadequate security and privacy mechanisms of these systems. To address the security and privacy problems associated with specific users, we develop the Pseudonymization and Anonymization with the XACML (PAX) modular system, which depends on client and server applications. It provides a security solution to the privacy issues and the problem of safe-access decisions for patients' data in the EHR. The~results of theoretical and experimental security analysis prove that PAX provides security features in preserving the privacy of healthcare users and is safe against known attacks.
APA, Harvard, Vancouver, ISO, and other styles
39

Song, Qun, Yuhao Chen, Yan Zhong, Kun Lan, Simon Fong, and Rui Tang. "A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–24. http://dx.doi.org/10.1145/3409798.

Full text
Abstract:
Numerous supply-chain combines with internet of things (IoT) applications have been proposed, and many methods and algorithms enhance the convenience of supply chains. However, new businesses still find it challenging to enter a supply chain, because unauthorised IoT devices of different companies illegally access resources. As security is paramount in a supply chain, IoT management has become very difficult. Public resources allocation and waste management also pose a problem. To solve the above problems, we proposed a new IoT management framework that embraces blockchain technology to help companies to form a supply chain effectively. This framework consists of an access control system, a backup peer mechanism and an internal data isolation and transmission approach. The access control system has a registrar module and an inspection module. The registrar module is mainly responsible for information registration with a registration policy, which has to be followed by all the companies in the supply chain. Besides, it provides a revocation and updating function. The inspection module focuses on judging misbehaviour and monitors the actions of the subjects; when any misoperation occurs, the system will correspondingly penalise violators. So that all related actions and information are verified and stored into blockchain, the IoT access control and safety of IoT admission are enhanced. Furthermore, in a blockchain system, if one single peer in the network breaks down, then the whole system may stop, because consensus cannot be reached. The data of the broken peer may be lost if it does not commit yet. The backup peer mechanism allows the primary peer and the backup peer to connect to an inspecting server for acquiring real-time data. The internal data isolation and transmission modules transmit and stores private data without creating a new subchannel. The proposed method is taken full account of the stability of the network and the fault tolerance to guarantee the robust of the system. To obtain unbiases results, experiments are conducted in two different blockchain environment. The results show our proposed method are promising IoT blockchain system for the supply chain.
APA, Harvard, Vancouver, ISO, and other styles
40

Alhaqbani, Bandar, and Colin Fidge. "Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance." International Journal of Information Security and Privacy 4, no. 4 (October 2010): 35–59. http://dx.doi.org/10.4018/jisp.2010100103.

Full text
Abstract:
Traditional access control models protect sensitive data from unauthorised direct accesses; however, they fail to prevent indirect inferences. Information disclosure via inference channels occurs when secret information is derived from unclassified (non-secure) information and other sources like metadata and public observations. Previously, techniques using precise and fuzzy functional dependencies were proposed to detect inference channels. However, such methods are inappropriate when probabilistic relationships exist among data items that may be used to infer information with a predictable likelihood of accuracy. In this paper, the authors present definitions and algorithms for detecting inference channels in a probabilistic knowledge base and maximising an attacker’s uncertainty by restricting selected inference channels to comply with data confidentiality and privacy requirements. As an illustration, a healthcare scenario is used to show how inference control can be performed on probabilistic relations to address patients’ privacy concerns over Electronic Medical Records. To limit an attacker’s ability to know secret data selected inference channels are restricted by using a Bayesian network that incorporates the information stored within a medical knowledge base to decide which facts must be hidden to limit undesired inferences.
APA, Harvard, Vancouver, ISO, and other styles
41

Fattah, Kazi Nazrul, and Peter Walters. "“A Good Place for the Poor!” Counternarratives to Territorial Stigmatisation from Two Informal Settlements in Dhaka." Social Inclusion 8, no. 1 (February 27, 2020): 55–65. http://dx.doi.org/10.17645/si.v8i1.2318.

Full text
Abstract:
<p>With many cities in the Global South experiencing immense growth in informal settlements, city authorities frequently try to assert control over these settlements and their inhabitants through coercive measures such as threats of eviction, exclusion, blocked access to services and other forms of structural violence. Such coercive control is legitimized through the discursive formation of informal settlements as criminal and unsanitary, and of the residents as migrants and as temporary and illegitimate settlers. Using findings from ethnographic research carried out in two informal settlements in Dhaka, Bangladesh, this article explores how informal settlement residents engage with and resist territorial stigma in a rapidly growing Southern megacity. Findings show residents resist stigmatising narratives of neighbourhood blame by constructing counternarratives that frame informal settlements as a “good place for the poor.” These place-based narratives emerge from shared experiences of informality and associational life in a city where such populations are needed yet unwanted. While residents of these neighbourhoods are acutely aware of the temporariness and illegality of unauthorised settlements, these narratives produce solidarities to resist eviction and serve to legitimise their claim to the city.</p>
APA, Harvard, Vancouver, ISO, and other styles
42

Kelkar, Vishakha, Kushal Tuckley, and Hitesh Nemade. "Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity." Journal of Healthcare Engineering 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/3538979.

Full text
Abstract:
In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.
APA, Harvard, Vancouver, ISO, and other styles
43

van Scheers, Louise, Johan Botha, and Jacques van Scheers. "Small and medium enterprise (SME) internet marketing challenges in the Tshwane area, South Africa." Journal of Governance and Regulation 4, no. 4 (2015): 590–95. http://dx.doi.org/10.22495/jgr_v4_i4_c5_p3.

Full text
Abstract:
The aim of this paper is to establish Internet marketing challenges of SMEs in the Tshwane area. It seems that the benefits of Internet marketing seem to be ignored by most SMEs however but unfortunately, Internet marketing challenges prevent SME owners from using these tools effectively. A survey study method of research design has been selected for the research. The sample for the study comprised 200 SMEs in the Tshwane area. Internet marketing usage in SMEs and the impact thereof is viewed as an essential part of modern day organisational operations for SMEs to promote their business both domestically and globally. ‘Unauthorised access to sensitive or proprietary information and limited verification of authorship of messages’ is mentioned as the largest challenges. The conducted research recommends that Internet marketing can be cost effective if the SMEs make use of their social networks and use best practises that enable them to get their adverts or posts shared across social networks. The conducted research also recommends that SMEs with limited resources start with social media and YouTube as a marketing tool, as the learning curve is low and cost involved almost nil. This paper conclude that Tshwane SMEs are using both Internet marketing and traditional marketing to promote their businesses.
APA, Harvard, Vancouver, ISO, and other styles
44

Lewis, Harry. "Review of unauthorized access." ACM SIGACT News 45, no. 1 (March 17, 2014): 16–19. http://dx.doi.org/10.1145/2596583.2596588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mulligan, Ea, and Moira Paterson. "Patients rarely detect breaches of confidence." Australian Health Review 26, no. 3 (2003): 73. http://dx.doi.org/10.1071/ah030073a.

Full text
Abstract:
Objective:To measure the prevalence of patient reported breaches of confidence emanating from health services inSouth Australia.Methods:A community household survey with follow up telephone interviews of those reporting unauthorised disclosures.Recruitment interviews were conducted during October and November 2001 with 3037 South Australian residentsover 15 years of age. South Australian households were selected randomly within a representative selection of censuscollection districts. Follow up telephone interviews were conducted with 18 respondents who reported unauthorisedinformation releases in the twelve months prior to the initial survey.Results:The one year prevalence of breaches of confidence reported by patients was 0.23 +/- 0.17% (1.96 x SE).This prevalence was significantly lower than a previously published estimate (Mulligan, 2001) of 1.1 +/- 0.4%(difference between proportions p= 0.003, z= 4.415) which relied upon reports of information disclosed without thepatients permission as a proxy for breaches of confidence.An incidental finding was that 0.20+/- 0.16% (1.96 x SE) of respondents reported exchanges of information amongstmembers of treating teams which had not been authorised by the patient.Conclusion:True breaches of confidence arising from health care interactions are rarely detected by patients. Ordinary informationsharing within treating teams may be a more important source of misunderstandings between patients and health careproviders. This issue can be addressed at the point of care by informing patients what will be done with their healthinformation and who may later gain access to it.
APA, Harvard, Vancouver, ISO, and other styles
46

Nepelski, Mariusz, and Dominik Hryszkiewicz. "Intranet Communication on the Example of an IT System for Research and Decision‑making Analysis “SINDBAD”." Internal Security 8, no. 2 (December 31, 2016): 0. http://dx.doi.org/10.5604/01.3001.0010.2276.

Full text
Abstract:
The purpose of this article is to present the results of research on internal communication in the Police. The measurable outcome of the research is the development of an IT tool to form a discussion forum that improves intra-organisational communication in hierarchical institutions, and thus management of the organisation. The research is being carried out under the project “Creation of an IT system supporting communication in the Police and other services subordinated to the Ministry of the Interior in terms of internal security — SINDBAD,” No. DOB-BIO7/03/01/2015. The project is co-financed by the National Centre for Research and Development in Warsaw, for which a grant of PLN 5 million has been obtained. This information exchange platform is being created by a research consortium led by the Police Academy in Szczytno. The essence of this tool is its internal structure, which is based on a detailed analysis of the needs of future users. The solution will be equipped with the following modules: research development and management, consultation on legal acts, crisis analysis and statistical analysis. Significantly, the system created will allow maximum anonymity of expression and security against unauthorised access by third parties. The result of the project will include an anonymous IT modular platform for collecting and analysing data to monitor problem areas and planning interventions at the organisational level to ensure internal security, including an organisational and technical solution that ensures the anonymity of contributors.
APA, Harvard, Vancouver, ISO, and other styles
47

Rehman, Amjad, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Adeel Anjum. "Data hiding technique in steganography for information security using number theory." Journal of Information Science 45, no. 6 (December 6, 2018): 767–78. http://dx.doi.org/10.1177/0165551518816303.

Full text
Abstract:
In the current era, due to the widespread availability of the Internet, it is extremely easy for people to communicate and share multimedia contents with each other. However, at the same time, secure transfer of personal and copyrighted material has become a critical issue. Consequently, secure means of data transfer are the most urgent need of the time. Steganography is the science and art of protecting the secret data from an unauthorised access. The steganographic approaches conceal secret data into a cover file of type audio, video, text and/or image. The actual challenge in steganography is to achieve high robustness and capacity without bargaining on the imperceptibility of the cover file. In this article, an efficient steganography method is proposed for the transfer of secret data in digital images using number theory. For this purpose, the proposed method represents the cover image using the Fibonacci sequence. The representation of an image in the Fibonacci sequence allows increasing the bit planes from 8-bit to 12-bit planes. The experimental results of the proposed method in comparison with other existing steganographic methods exhibit that our method not only achieves high embedding of secret data but also gives high quality of stego images in terms of peak signal-to-noise ratio (PSNR). Furthermore, the robustness of the technique is also evaluated in the presence of salt and pepper noise attack on the cover images.
APA, Harvard, Vancouver, ISO, and other styles
48

Kuts, D. V., and S. V. Porshnev. "THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS." Journal of the Ural Federal District. Information security 20, no. 3 (2020): 27–33. http://dx.doi.org/10.14529/secur200303.

Full text
Abstract:
This article describes the features of mandatory access control model in unauthorized ac-cess data protection tools, which can affect its efficiency. Also, some flaws of unauthorized ac-cess data protection tools and possible scenarios of unauthorized access bypassing these tools are analyzed. The countermeasures and methods of its application, eliminating detected flaws are offered. The conclusions about necessarity of analyze of unauthorized access data protec-tion tools policies and revision of its severeness, if it is necessary, were made.
APA, Harvard, Vancouver, ISO, and other styles
49

Brushwood, David B. "Unauthorized police access to PDMP data." Pharmacy Today 19, no. 7 (July 2013): 49. http://dx.doi.org/10.1016/s1042-0991(15)31271-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rees, Frank. "ABS vulnerable to unauthorized computer access." Computer Fraud & Security Bulletin 1993, no. 12 (December 1993): 3. http://dx.doi.org/10.1016/0142-0496(93)90251-q.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography