Статті в журналах з теми "Confidentialité des clients"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Confidentialité des clients.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Confidentialité des clients".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Brasel, Kelsey R., and Brian E. Daugherty. "Cook and Thomas, LLC: Balancing Auditor Liability, Client Confidentiality, and the Public Interest." Issues in Accounting Education 32, no. 1 (October 1, 2015): 17–32. http://dx.doi.org/10.2308/iace-51318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT In this case students are asked to assume the role of Alex Trifold, CPA, an audit partner for the public accounting firm, Cook and Thomas, LLC, who holds going concern information about an audit client that may impact other entities audited by Cook and Thomas. The case study illustrates how adherence to auditing standards may place auditors in a difficult situation when balancing the auditor's risk of litigation, the clients' rights to confidentiality, and the auditor's duty to the public. Additionally, the case provides exposure to prior litigation cases against auditors with unfavorable outcomes when auditors chose to protect their client's confidentiality, and, conversely, in cases where auditors chose to protect the greater public interest. The case requires students to engage in critical thinking by providing their viewpoints as to the optimal balance of limiting auditor liability, adhering to client confidentiality requirements, and simultaneously serving the public interest. The case study is appropriate for both undergraduate and graduate auditing courses.
2

P., Usha Rani S., Rashmi Kundapur, Anusha Rashmi, and Harsha Acharya. "Client Satisfaction among the clients attending tertiary care centers in Mangalore, South India." Journal of Health and Allied Sciences NU 07, no. 03 (September 2017): 003–6. http://dx.doi.org/10.1055/s-0040-1708716.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Background: Provision of services in line with the wishes and needs of patients is central to a human health care system .The hospital market has today as changed from a seller's market to a buyer's market and there is a need to improve the quality in the health care delivery. Client satisfaction is a key determinant of quality of care provided in health care centers. Objectives: To determine the client satisfaction among the patients attending tertiary care centers in Mangalore. Materials and Methodology: The study was a cross sectional study which was conducted among the clients attending five teaching hospitals in Mangalore. With 60% of client satisfaction obtained in our pilot study, the sample size was 384 and adding 20% for dropouts the total sample size came up to 462.The clients were selected randomly from each hospital. A pretested Proforma was used outside the hospital with strict confidentiality. Results: In our study we found that,87.6% of the clients felt that the clinic hours at health facility were adequate,79.3% felt health care was easily accessible,89.2% were happy with hygiene and comfort of waiting area. Average waiting time was 116mins.Only 45.4% could meet the same service provider in follow up visit and only 51.5% availed similar services as in the first visit in the follow up. Satisfaction with provider's skill and ability was seen in 82.5% of the clients. Only 69.2% of the clients were satisfied with the cost of services available. Conclusion: Our study revealed that waiting time was a major concern for the client's satisfaction.
3

Ezhova, E. V. "SOME PROBLEMS OF ENSURING THE PROTECTION OF ATTORNEY-CLIENT PRIVILEGE IN THE CRIMINAL PROCESS OF RUSSIA AND BELARUS." Juvenis scientia, no. 9 (September 30, 2018): 41–43. http://dx.doi.org/10.32415/jscientia.2018.09.08.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article deals with the basic guarantees of protection of attorney-client confidentiality in criminal proceedings. A comparative analysis of the legislative norms of the Russian Federation and the Republic of Belarus regulating the legal regime of attorney-client confidentiality is carried out. The article presents the legal positions of the constitutional Court of the Russian Federation on the issue under consideration, which contributed to the amendments to the criminal procedure law of Russia aimed at providing additional guarantees for the protection of attorney-client confidentiality. The author concludes that the practice of application of the rules containing guarantees of protection of attorney-client confidentiality testifies, on the one hand, to the need to strengthen the protection of citizens' rights to ensure the confidentiality of information provided to the lawyer, and, on the other hand, to the importance of preventing abuse of the right to protection by lawyers and their clients
4

Uys, Leana R. "Confidentiality and HIV/AIDS in South Africa." Nursing Ethics 7, no. 2 (March 2000): 158–66. http://dx.doi.org/10.1177/096973300000700209.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Keeping the diagnosis of a client confidential is one of the cornerstones of professional practice. In the case of a diagnosis such as HIV/AIDS, however, the ethics of this action may be challenged. Such a decision has a range of negative effects, for example, the blaming of others, supporting the denial of the client, and complicating the health education and care of the patient. It is suggested that the four ethical principles should be used to explore the ethics of such decisions, and that professional regulatory bodies and organizations should support professionals in situations where the client’s sexual partner is informed against the wishes of the client.
5

Bingulac, Nenad, and Dragan Miljenović. "Lawyer confidentiality." Pravo - teorija i praksa 38, no. 3 (2021): 42–52. http://dx.doi.org/10.5937/ptp2103042b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The role of the lawyer is characterized by a focus on counseling, advocacy and conciliation. A lawyer advises a client on legal issues, considers the possibilities of resolving the dispute amicably and certainly advocates in a legal proceedings if this occurs. In order the previously mentioned activities between the client and lawyer to be achieved, it is necessary to establish a mutual connection. Talking about a lawyer`s capability of fulfilling the role of a counsel and client's representative, he/she must be independent in his/her work, especially having professional independence in relation to courts, state bodies, but also in relation to his/her own interests. It is this independence that represents a significant foundation in gaining trust in the client-lawyer relationship. Achieving trust is not easy, although it is a priori expected. In order to gain trust and to be able to access an adequate representation in a legal proceedings, the lawyer's obligation is to keep the lawyer's secret and not to disclose confidential information. A lawyer's secret can be considered from several aspects, from the moral, contractual, ethical... In this research, certain important theoretical frameworks will be considered, with the focus on presenting and reviewing the international, primarily European legislative regulation of the issue of legal secrecy. This paper will certainly include the aspect of domestic legislation too. In addition to the above, some important positions of the European Court of Human Rights will be pointed out. Before presenting the conclusions emerged from this research, a special attention will be paid to the circumstances when a lawyer can reveal a secret.
6

Grimley-Baker, Kathy. "Ethical Implications of Mandatory Reporting of Intimate Partner Violence." Creative Nursing 20, no. 4 (2014): 254–57. http://dx.doi.org/10.1891/1078-4535.20.4.254.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Nurses are expected to provide a safe haven for clients. When clients seek the services of nurses, they are vulnerable, and they expect privacy and confidentiality. Reporting acknowledged or suspected intimate partner violence (IPV) to authorities can impact nurse–client trust relationships. This article discusses the legal ramifications of reporting of IPV and their implications in a health care setting.
7

Hamon, Jessie K., Jenna Hoyt, Shari Krishnaratne, Ariko Angela Barbra, Job Morukileng, Nathaly Spilotros, Miriam Mbembe, Seth Marcus, and Jayne Webster. "Perceptions of quality and the integrated delivery of family planning with childhood immunisation services in Kenya and Uganda." PLOS ONE 17, no. 6 (June 6, 2022): e0269690. http://dx.doi.org/10.1371/journal.pone.0269690.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The integration of family planning (FP) with childhood immunisations is considered a promising approach to addressing postpartum women’s unmet need for FP in resource limited settings. This study set out to examine client and health provider perceptions of the quality of FP services that were integrated with childhood immunisations in Kenya and Uganda. Semi-structured interviews with clients (n = 30) and health providers (n = 27) were conducted in 16 rural health facilities. Interviews centred on the respondents’ experiences receiving/delivering FP services, their interactions with providers/clients, and their views on the quality of FP services. Client and provider perceptions of quality were compared through a thematic analysis of interview transcripts, and findings were synthesised using Jain and Hardee’s revised FP Quality of Care Framework. Using audit data, health facility characteristics and resources were also summarised through descriptive statistics to contextualise the qualitative findings. The dignity and respect experienced by clients was central to the respondents’ perceptions of quality. These two dimensions were not conceptualised as distinct facets of quality, but were instead perceived to be a product of the 1) access to needed services, 2) choice of contraceptives, 3) interpersonal communication, 4) information, and 5) confidentiality afforded to clients. Additionally, clients and providers alike believed that the integration of FP services with childhood immunisations had a positive effect on clients’ access to needed services and on the confidentiality they experienced in a context where modern contraceptive use was stigmatised and where a lack of support from some husbands impeded access to FP services. Understanding clients’ and providers’ conceptualisation of quality is critical to the design of high quality and client-centred integrated FP services.
8

Zaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns." Sciential - McMaster Undergraduate Science Journal, no. 1 (November 25, 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Obtaining information about your genes can be as easy as swabbing your cheek for DNA testing. Companies that offer direct-to-consumer genetic testing with saliva have the authority to collect and share personal data as well as test results from their clients. However, patients want their personal information to be protected and although these companies ask for consent before sharing information with third-party sources, companies have the right to use client data to initiate research or improve their business. Genetic testing companies need to respect their clients and understand that they are paying for a service which deals with sensitive information that individuals may not want collected and stored.
9

Ordway, Ann M., and Arielle F. Casasnovas. "A Subpoena: The Other Exception to Confidentiality." Family Journal 27, no. 4 (August 21, 2019): 352–58. http://dx.doi.org/10.1177/1066480719868701.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A good deal of attention is paid in counselor education programs to the significance of confidentiality and the rare categories of exception that would compel the counselor to break that sacred vow. The exceptions identified are danger to self, danger to others, and child abuse. In some states, additional mention is made of situations involving elder abuse. Rarely, however, do counselor educators discuss the impact of litigation on the sanctity of the counselor–client relationship and the ability of a subpoena to pierce the cloak of confidentiality that otherwise protects a client’s innermost thoughts and raw vulnerability. This article is an examination of the long arm of the court system and, by extension, the role of a subpoena as the often overlooked, other, exception to confidentiality. The effect of court involvement initiated either by the counselor’s client or by an opposing party on the counselor–client relationship should be clearly addressed in informed consent discussions and written documents to avoid unforeseen complications when a counselor receives and responds to a subpoena.
10

Nishkala, H. M., S. H. Anu, D. A. Bindushree, and S. L. Manoj. "Data Partitioning and Reduplication for Providing Integrity to Data in the Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4070–74. http://dx.doi.org/10.1166/jctn.2020.9021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cloud Computing is a boon to the field of information and technology. The two major elements of client worries are Data security and Privacy Protection. Data may be revised and improved when client stores the information in the cloud so there might be danger of data loss. Therefore client information is moved to the data hub which cannot be controlled by the clients. Hence high safety efforts are required to secure data inside the cloud. Here data is divided into fragments and they are converted into encrypted file. This encrypted file is issued to arbitrarily chosen cloud service providers by the cloud data owners. Even after the successful attack, attackers do not get the meaning full information. If cloud data clients access to get any document that relating to encrypted file is regenerated from the fragments and clients must download it. When the applicant coordinates the strategy with the original details, then only file can be decoded. Therefore it demonstrates that prospective strategy improves the data integrity and confidentiality.
11

Nord, Catharina. "Confidentiality in Architectural Space: A Study of HIV Healthcare Facilities in Uganda." Open House International 33, no. 4 (December 1, 2008): 53–62. http://dx.doi.org/10.1108/ohi-04-2008-b0007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article analyses and discusses spatial conditions contributing to confidentiality in HIV healthcare facilities carried out by two non-governmental organisations in Uganda, the AIDS Information Centre (AIC) and The AIDS Support Organisation (TASO). The provision of confidential space was found to be the most important architectural quality promoting client wellbeing, where Voluntary Counselling and Testing (VCT) as well as ongoing services to people living with HIV are provided. The study shows that confidential space is a requirement in a number of situations: when the client approaches the health centre; during the visit; and in the meeting between client, counsellor and medical staff. An unobtrusive location of the centre and separate, private counselling rooms are thus the most favourable spatial conditions. This article is based on a qualitative, explorative case study carried out in Jinja, Uganda during four months in 2004. Direct observation, interviews, primarily with clients and staff, spatial analyses and a qualitative content analysis were carried out.
12

Snyder, Herbert, and Reed McKnight. "Client Confidentiality and Fraud." Business and Professional Ethics Journal 23, no. 1 (2004): 245–57. http://dx.doi.org/10.5840/bpej2004231/231.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Pizzimenti, Lee A. "Informing Clients About Limits to Confidentiality." Business and Professional Ethics Journal 9, no. 1 (1990): 207–22. http://dx.doi.org/10.5840/bpej199091/24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Fouque, Pierre-Alain, Cristina Onete, and Benjamin Richard. "Achieving Better Privacy for the 3GPP AKA Protocol." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (October 1, 2016): 255–75. http://dx.doi.org/10.1515/popets-2016-0039.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Proposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G and 4G mobile-network communications, the AKA protocol is meant to provide a mutually-authenticated key-exchange between clients and associated network servers. As a result AKA must guarantee the indistinguishability from random of the session keys (key-indistinguishability), as well as client- and server-impersonation resistance. A paramount requirement is also that of client privacy, which 3GPP defines in terms of: user identity confidentiality, service untraceability, and location untraceability. Moreover, since servers are sometimes untrusted (in the case of roaming), the AKA protocol must also protect clients with respect to these third parties. Following the description of client-tracking attacks e.g. by using error messages or IMSI catchers, van den Broek et al. and respectively Arapinis et al. each proposed a new variant of AKA, addressing such problems. In this paper we use the approach of provable security to show that these variants still fail to guarantee the privacy of mobile clients. We propose an improvement of AKA, which retains most of its structure and respects practical necessities such as key-management, but which provably attains security with respect to servers and Man-in-the- Middle (MiM) adversaries. Moreover, it is impossible to link client sessions in the absence of client-corruptions. Finally, we prove that any variant of AKA retaining its mutual authentication specificities cannot achieve client-unlinkability in the presence of corruptions. In this sense, our proposed variant is optimal.
15

Ikerionwu, Charles, David Edgar, and Edwin Gray. "The development of service provider’s BPO-IT framework." Business Process Management Journal 23, no. 5 (September 4, 2017): 897–917. http://dx.doi.org/10.1108/bpmj-10-2015-0146.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The decision to operate BPO-IT organisational model by a business process outsourcing (BPO) service provider has far reaching benefits. The purpose of this paper is to develop a service provider’s BPO-IT framework that provides in-house IT function (software) required to process client services. Design/methodology/approach The multi-case study adopted an exploratory sequential mixed method research approach. In the first instance, seven BPO service provider organisations were investigated in the qualitative phase and 156 in the quantitative phase, respectively. Findings The adoption of the developed framework indicates that it could reduce failures in BPO relationships through reduced turnaround time in processing client services, improved quality of service, reduced cost, improved client and provider’s competitiveness, and confidentiality of client operations. Outsourcing clients could lay the foundation for a successful relationship by adopting a selection process that could choose the right provider. Originality/value The paper reveals BPO-IT organisation’s operation towards in-house provision of software required to process client services. A research exploring BPO service providers from a top outsourcing destination like India could provide offshore outsourcing clients the information to move towards onshore outsourcing.
16

Safdar, Muhammad Asif, Waqas Rafiq, and Farhana Aziz Rana. "Legal Ethics and Privilege Communication." Journal of Law & Social Studies 4, no. 3 (September 30, 2022): 449–57. http://dx.doi.org/10.52279/jlss.04.03.449457.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The lawyer-client privilege is a significant characteristic of their fiduciary relationship. The duty of confidentiality obliges the communication that occurred between the client and lawyer should not be disclosed anywhere. This article inspects the significance and importance of the privileged professional communication held between the lawyer and his client. This research piece qualitatively surveys and critically analyses the laws of various jurisdictions including Pakistan, India, the United Kingdom, and the United States to highlight why the communication between lawyer and client is privileged and should not be disclosed. With that aim, this paper pinpoints the broad and loose application of privileged professional communication laws by the various courts. This article finds how the privileged professional communication laws have increased the confidence of clients and strengthened the fiduciary relationship between lawyer and client.
17

Lemons-Lyn, Ansley, William Reidy, Wah Wah Myint, Khin N. Chan, Elaine Abrams, Zaw Zaw Aung, Irene Benech, et al. "Optimizing HIV Services for Key Populations in Public-Sector Clinics in Myanmar." Journal of the International Association of Providers of AIDS Care (JIAPAC) 20 (January 2021): 232595822110559. http://dx.doi.org/10.1177/23259582211055933.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Key populations, ie, female sex workers, men who have sex with men, transgender people, people who inject drugs, and people in prisons and other closed settings, experience stigma, discrimination, and structural barriers when accessing HIV prevention and care. Public health facilities in Myanmar became increasingly involved in HIV service delivery, leading to an urgent need for healthcare workers to provide client-centred, key population-friendly services. Between July 2017–June 2018, the Myanmar Ministry of Health and Sports and National AIDS Programme collaborated with ICAP at Columbia University and the US Centers for Disease Control and Prevention to implement a quasi-experimental, multicomponent intervention including healthcare worker sensitization training with pre- and post- knowledge assessments, healthcare worker and client satisfaction surveys, and structural changes. We observed modest improvements among healthcare workers (n = 50) in knowledge assessments. Classification of clients into key population groups increased and fewer clients were classified as low risk. Key population clients reported favourable perceptions of the quality and confidentiality of care through self-administered surveys. Our findings suggest public health facilities can deliver HIV services that are valued by key population clients.
18

Blackwell, Terry L., Jan C. Case, Mary Barros-Bailey, and Ashley K. Waldmann. "Special Issues in Rehabilitation Counselor Ethics in Disasters." Journal of Applied Rehabilitation Counseling 40, no. 1 (March 1, 2009): 14–26. http://dx.doi.org/10.1891/0047-2220.40.1.14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Natural and human-made disasters result in the need for the emergency provision of services to current clients and to new clients. The provision of counseling services in this context may cause a counselor to reassess his or her practices with respect to the ethical principles of autonomy, beneficence, nonmaleficence, justice, fidelity, and veracity. Dealing with ethical issues such as client-counselor relations, resource allocation, confidentiality, and advocacy in the absence of resources is discussed. This article seeks to (a) build awareness of the ethical issues inherent in the delivery of rehabilitation services in disaster situations, and (b) provide suggested best practices to address potential dilemmas.
19

Patronek, Gary J. "Issues for Veterinarians in Recognizing and Reporting Animal Neglect and Abuse." Society & Animals 5, no. 3 (1997): 267–80. http://dx.doi.org/10.1163/156853097x00178.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThis article discusses issues relevant to recent efforts to increase veterinary reporting of cases of animal mistreatment in the USA. These issues include mandatory vs. voluntary reporting, client confidentiality obligations, the legal definitions of animal cruelty, abuse, and neglect in state laws, ethical conflicts between a veterinarian's obligations to animals and clients, perceived vs. real barriers to reporting, the circumstances under which a veterinarian is likely to encounter animal mistreatment in practice, and the lack of accepted diagnostic criteria for the "battered pet."
20

Woodall, Jean. "Adventure Training and Client Confidentiality." Advances in Developing Human Resources 3, no. 1 (February 2001): 21–25. http://dx.doi.org/10.1177/15234220122238210.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Sim, Julius. "Client Confidentiality: Ethical Issues in Occupational Therapy." British Journal of Occupational Therapy 59, no. 2 (February 1996): 56–61. http://dx.doi.org/10.1177/030802269605900204.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Confidentiality is a central ethical concern in occupational therapy practice and one that is emphasised in professional codes of ethics. This article examines the conceptual and moral basis of confidentiality, and relates it to the fundamental ethical principles of respect for autonomy, respect for persons and non-maleficence. The moral conflicts that may arise between the requirement of confidentiality on the one hand, and the need to safeguard the interests and welfare of others on the other hand, are explored with reference to the Tarasoff case. Both consequentialist (outcome-based) and deontological (duty-based) perspectives are examined. It is argued that confidentiality should be given a special status within the client-therapist relationship and, up to a certain critical threshold, should be protected from considerations of general welfare. It is argued that, whilst confidentiality may on occasions be breached in the interests of others, it Is rarely permissible to do so in the client's own Interest. In conclusion, occupational therapists are urged to give a high regard to confidentiality and to cultivate the virtue of discretion in their professional practice.
22

Naudé, Alida, and Juan Bornman. "Using Nominal Group Technique to Identify Key Ethical Concerns Regarding Hearing Aids With Machine Learning." Perspectives of the ASHA Special Interest Groups 6, no. 6 (December 17, 2021): 1800–1808. http://dx.doi.org/10.1044/2021_persp-21-00126.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose: Machine learning (ML) in new-generation hearing aid technology presents a beneficial opportunity for development in audiology. It is, however, important to balance new applications against the audiologist's professional ethics to protect the client from any harm. This study aimed to identify the key ethical concerns related to the latest digital hearing aid technology that incorporates ML that could potentially impact the client and/or the audiologist. Method: A nominal group technique was conducted with the audiologist to generate and prioritize a list of key ethical concerns related to human data interaction, with specific focus on hearing aids. Results: Five categories were identified in relation to the potential impact on the client: (a) privacy and confidentiality, (b) relationship and trust, (c) nonmaleficence, (d) informed decision making, and (e) financial gain. An additional five categories were identified in relation to the potential impact on the audiologist: (a) privacy and confidentiality, (b) professional responsibility, (c) relationship and trust, (d) financial gain, and (e) trust technology. Privacy and confidentiality were ranked as the highest priority that should be considered when supplying clients with the latest hearing aid technology. Conclusions: Hearing aid technology has evolved considerably, and audiologists need to keep abreast of and master the general technological developments and the associated ethical challenges that may arise. Discussions on the ethics related to ML and hearing aid fittings will help identify the key ethical concerns involved and, thereby, enhance the ethical sensitivity of the profession.
23

Ryder, Nathan, and Anna M. McNulty. "Confidentiality and access to sexual health services." Sexual Health 6, no. 2 (2009): 153. http://dx.doi.org/10.1071/sh08078.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background: Confidentiality concerns are often described as barriers to seeking sexual health care. There has been little research describing the relative importance of confidentiality to clients of sexual health clinics, and whether members of high-risk groups have greater concerns. This study aimed to determine the importance of confidentiality and anonymity to clients of a public sexual health clinic, and determine associations with gender and sexuality. Methods: A self-administered questionnaire was offered to consecutive new English-speaking clients in October and November 2007. Participants were asked to describe the reasons for presenting, likelihood of disclosing identifying information, and concern should specific people and agencies become aware of their attendance. Results: Of 350 eligible clients, 270 (77%) participated in the survey. Expert care was included in the top three reasons for choosing a sexual health clinic rather than a general practitioner by over half of participants, while confidentiality and cost were each included in the top three reasons by one-third of respondents respectively. Over 90% of clients reported they were likely to give accurate identifying information to the clinic. Participants were comfortable with disclosure of information to other health-care workers but became increasingly unwilling for information to be shared with services not directly involved in their care. Overall there were few associations with gender or sexuality. Conclusion: Clients choose to attend our clinic for a variety of reasons, with confidentiality and anonymity being of lesser importance than competence and cost. Confidentiality is important to the majority of clients, whereas few desire anonymity. Most clients would accept information being shared with other health services, suggesting that confidentiality may not be a barrier to the use of electronic health records in sexual health clinics.
24

Katz, Anna J., Ana Maria Ramirez, Chiara Bercu, Sofia Filippa, Osasuyi Dirisu, Ijeoma Egwuatu, Sybil Nmezi, Lucky Palmer, and Sarah E. Baum. "“I just have to hope that this abortion should go well”: Perceptions, fears, and experiences of abortion clients in Nigeria." PLOS ONE 17, no. 2 (February 7, 2022): e0263072. http://dx.doi.org/10.1371/journal.pone.0263072.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This qualitative study aimed to examine how abortion clients in Nigeria perceive abortion and explore the role their beliefs and fears play in their care-seeking experiences and interactions with providers. Abortion is severely legally restricted in Nigeria but remains common. We conducted in-depth interviews with 25 people who obtained abortion services through three distinct models of care. We coded interview transcripts and conducted thematic analysis. Clients perceived negative attitudes toward abortion in their communities, though clients’ own beliefs were more nuanced. Clients recounted a range of fears, and nearly all mentioned worrying that they might die as a result of their abortion. Despite their concerns, clients relied on social networks and word-of-mouth recommendations to identify providers they perceived as trustworthy and safe. Kind and non-judgmental treatment, clear instructions, open communication, and reassurance of privacy and confidentiality by providers alleviated client fears and helped clients feel supported throughout their abortion process. Within restrictive contexts, the mobilization of information networks, provision of high-quality care through innovative models, and personalization of care to individual needs can assuage fears and contribute to reducing stigma and increasing access to safe abortion services.
25

Saud Al Alawi, Saad Rashid, Muhammad Muqeet Ullah, Ahmed Yar Mohammed Dawood Al Balushi, Rajeev Kashyap, and Vandita Kailas Patil. "Rapid HIV Testing in Al Buraimi Governorate Sultanate of Oman: A Cross Sectional Study." Global Journal of Health Science 10, no. 11 (October 24, 2018): 153. http://dx.doi.org/10.5539/gjhs.v10n11p153.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
BACKGROUND: Due to one of the highest HIV prevalent province in Oman, Voluntary Counselling Testing (VCT) services were integrated in health system of Al Buraimi Governorate, Oman since December 2014. AIM & OBJECTIVE: The study aimed to analyze the situation on HIV rapid testing in Al Buraimi Governorate with objective to identify client’s risk factor among common age group and gender. METHODOLOGY: Cross sectional retrospective study was conducted in Al Buraimi Governorate, Oman among 1412 registered adult VCT clients, unbooked pregnant women with no documented HIV status at the time of delivery or abortion at Buraimi Hospital and clients during outreach community awareness activities on HIV. Retrospective analysis was performed for 3 years from December 2014 to December 2017 on parameters like Age, gender, nationality, risk factors, outcome and place of testing (Hospital and Outreach) using standard national client information form. Descriptive statistics was applied in Microsoft excel and SPSS version 24. Clients’ personal information and confidentiality of the record was maintained during entire study period with approval from regional research and ethical review committee. RESULTS: Of 1412 clients for Rapid Diagnostic Tests (RDTs), 990 (70.1%) were females and 422 (29.9%) were males with mean age 27.13±7.02. Majority, 806 (57.1%) RDTs were in outreach followed by 470 (33.3%) and 136 (9.6%) at Maternity ward and Couselling Clinic respectively. Clients included 1294 (91.6%) Omani nationals and 118 (8.4%) non-Omani nationals. The risky behavior was found to be 126 (9%) among clients with heterosexual contributes 65 (4.6%). Among all risk factors, male clients contributed 124 (8.7%) with common age group 26-35 years 56 (3.9%). CONCLUSION: RDTs were utilized mainly during outreach activities that highlight the need of promoting VCT facilities in the clinical setting as services are available 24/7 through hotline. This baseline study would facilitate to develop plan for client’s risk reduction.
26

Hunter, Richard J., and John H. Shannon. "Assessing Confidentiality in the Lawyer-Client Relationship: A Client Perspective." Advances in Social Sciences Research Journal 9, no. 10 (October 28, 2022): 418–30. http://dx.doi.org/10.14738/assrj.910.13320.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article will provide information on issues relating to the attorney-client relationship and the attorney-client privilege, the duty of confidentiality, the crime- fraud exception, the work product doctrine, and other exceptions to the general duty of confidentiality existing in the lawyer-client relationship. The article is based on an analysis of decisional cases and selected commentaries found in law reviews and writings of prominent legal practioners.
27

Anonymous. "Confidentiality-Protecting Yourself and Your Client." Journal of Psychosocial Nursing and Mental Health Services 26, no. 6 (June 1988): 34. http://dx.doi.org/10.3928/0279-3695-19880601-11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Rubanowitz, Daniel E. "Public attitudes toward psychotherapist-client confidentiality." Professional Psychology: Research and Practice 18, no. 6 (December 1987): 613–18. http://dx.doi.org/10.1037/0735-7028.18.6.613.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

6, Perri, Christine Bellamy, Charles Raab, and Adam Warren. "Partnership and Privacy – Tension or Settlement? The Case of Adult Mental Health Services." Social Policy and Society 5, no. 2 (April 2006): 237–48. http://dx.doi.org/10.1017/s1474746405002927.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Mental health is a good example of a field where imperatives for partnership or collaborative working can be in tension with those for client confidentiality. Both imperatives have been reinforced by additional regulation in recent years, in response to major inquiries. Professionals face the dilemma that either sharing clients' or patients' information or not sharing it could lead to outcomes for which they might be blamed; any rule adopted risks one or other type of error. This article examines two cases from a larger interview-based study of how local organisations are trying practically to reconcile these competing pressures.
30

Zipursky, Benjamin C. "Loyalty and Disclosure in Legal Ethics." American Journal of Jurisprudence 65, no. 1 (June 1, 2020): 83–107. http://dx.doi.org/10.1093/ajj/auaa005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract: As fiduciaries, lawyers owe duties of loyalty to their clients, and such duties are widely understood to entail strong duties of confidentiality. This article addresses the question of whether loyalty-based duties of confidentiality preclude the legal system from imposing on lawyers duties to disclose that their clients have been engaging in financial fraud. It distinguishes two possible bases for such duties of disclosure: alleged duties of care to investors who will suffer financial harm if these frauds are not revealed, and legislative mandates requiring lawyers to report evidence of legal violations to a government institution. The latter—driven by a “gatekeeping” rationale, and illustrated here by a (failed) proposal of the United States Securities and Exchange Commission—is different in substance and structure from the former, “duty-of-care” rationale. The article argues that, while there may be good arguments based on a lawyer’s role-based duty of loyalty to a reject a duty-of-care based rationale for disclosure duties, these arguments do not defeat the gatekeeping, legislative-mandate rationales for disclosure duties. While a stringent duty of loyalty to a client may indeed conflict with the structure of duties of care to third parties, it need not conflict with a positive mandate to report legal violations.
31

Allison, Althea, and Ann Ewens. "Tensions in Sharing Client Confidences While Respecting Autonomy: implications for interprofessional practice." Nursing Ethics 5, no. 5 (September 1998): 441–50. http://dx.doi.org/10.1177/096973309800500507.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article aims to explore the ethical issues arising from the sharing of information in the context of interprofessional collaboration. The increased emphasis on interprofessional working has highlighted the need for greater collaboration and sharing of client information. Through the medium of a case study, we identify a number of tensions that arise from collaborative relationships, which are not conducive to supporting interprofessional working in an ethically sound manner. Within this article, it is argued that the way forward within these collaborative relationships is to set clear parameters to the professional-client relationship, paying full regard to the autonomy of both the clients and the professionals involved. We conclude that this approach to working will place the client at the centre of care provision and arguments used for not collaborating that are based on breaches of confidentiality will be negated. Using the approach offered, collaborative working will be not only possible but desirable.
32

Perlson, Jacob, Blake Kruger, Sravanthi Padullaparti, Elizabeth Eccles, and Tim Lahey. "1290. A Model for “At-Distance” PrEP Navigation: Acceptability and Early Insights." Open Forum Infectious Diseases 5, suppl_1 (November 2018): S394. http://dx.doi.org/10.1093/ofid/ofy210.1123.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Background HIV pre-exposure prophylaxis (PrEP) awareness and uptake among at-risk individuals remains suboptimal despite clear evidence of efficacy. Health navigators and peer educators have been employed to facilitate linkage and retention in many aspects of HIV prevention and care, including to improve PrEP utilization. Yet, the use of health navigators to improve PrEP utilization has not been well-explored in rural areas where unique challenges to HIV care have been well documented. Little is known, too, about how telemedicine may strengthen these efforts. We assessed acceptability and evaluated a health navigation program that primarily engages clients through at-distance technology-based methods. Methods To guide the design and implementation of a pilot PrEP tele-navigation program, we conducted a survey in at-risk clients contacted through social networks and at a state-funded STI clinic in New Hampshire. Approximately nine months after the launch of the navigation platform, we analyzed characteristics of client-navigator interactions. Feedback surveys were distributed to clients 3 months following engagement with the navigator. Results From July 2017 to April 2018, 139 individuals engaged the navigator program via email, text, chat, phone call, or in-person. Among the most common services provided were PrEP counseling (n = 63 or 45% of inquiries), referral to STI/HIV testing (22%), and risk reduction counseling (19%). Eight clients have been linked to PrEP care to-date. Qualitative analysis of client-navigator interactions revealed a variety of recurring barriers expressed by clients including concerns maintaining confidentiality with parents and partners, side effects of PrEP, and financial constraints. Clients provided suggestions for program improvement and indicated they felt engagement with the program increased knowledge of PrEP as well as linkage to testing and HIV prevention services. Conclusion Our pilot program highlighted the diverse obstacles to PrEP utilization in at-risk rural clients, and suggests at-distance PrEP navigation and telemedicine can support improved PrEP utilization in the rural United States. Such a navigator program should be equipped to engage clients along the PrEP care continuum. Disclosures All authors: No reported disclosures.
33

Cain, Paul. "The Limits of Confidentiality." Nursing Ethics 5, no. 2 (March 1998): 158–65. http://dx.doi.org/10.1177/096973309800500207.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Two conditions are commonly taken to constitute an obligation of confidentiality: information is entrusted by one person to another; and there is an express understanding that this will not be divulged. This conception of confidentiality, however, does not match much of the practice of health care. Health care practitioners would, for example, hold themselves to be under an obligation of confidentiality in situations where neither of these conditions obtain. The discussion proposes, therefore, two additional grounds for confidentiality. This is in order to clarify, in general terms, the scope of this obligation (i.e. to clarify at what point confidentiality can be said to have been broken). The ‘limits of confidentiality’, it is argued, are set by the wishes of the client or, where these are not known, by reference to those whose right and need to know relate to the care of the client. Anonymous references to the client outside this limit may not be breaches of confidence; whether they are or not depends, it is suggested, on if such reference is responsible.
34

Park, Cheolhee, Hyunil Kim, Dowon Hong, and Changho Seo. "A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments." Security and Communication Networks 2018 (November 1, 2018): 1–16. http://dx.doi.org/10.1155/2018/2193897.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Over the recent years, cloud storage services have become increasingly popular, where users can outsource data and access the outsourced data anywhere, anytime. Accordingly, the data in the cloud is growing explosively. Among the outsourced data, most of them are duplicated. Cloud storage service providers can save huge amounts of resources via client-side deduplication. On the other hand, for safe outsourcing, clients who use the cloud storage service desire data integrity and confidentiality of the outsourced data. However, ensuring confidentiality and integrity in the cloud storage environment can be difficult. Recently, in order to achieve integrity with deduplication, the notion of deduplicatable proof of storage has emerged, and various schemes have been proposed. However, previous schemes are still inefficient and insecure. In this paper, we propose a symmetric key based deduplicatable proof of storage scheme, which ensures confidentiality with dictionary attack resilience and supports integrity auditing based on symmetric key cryptography. In our proposal, we introduce a bit-level challenge in a deduplicatable proof of storage protocol to minimize data access. In addition, we prove the security of our proposal in the random oracle model with information theory. Implementation results show that our scheme has the best performance.
35

Occupational Therapists, World Federation Of. "World Federation of Occupational Therapists' Position Statement on Telehealth." International Journal of Telerehabilitation 6, no. 1 (September 3, 2014): 37–40. http://dx.doi.org/10.5195/ijt.2014.6153.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The purpose of this document is to state the World Federation of Occupational Therapists’ (WFOT) position on the use of telehealth for the delivery of occupational therapy services. Telehealth is the use of information and communication technologies (ICT) to deliver health-related services when the provider and client are in different physical locations. Additional terms used to describe this service delivery model include: tele-occupational therapy, telerehabilitation, teletherapy, telecare, telemedicine, and telepractice, among other terms. Telehealth may be used by occupational therapy practitioners for evaluation, intervention, monitoring, supervision, and consultation (between remote therapist, client, and/or local health-care provider) as permitted by jurisdictional, institutional, and professional regulations and policies governing the practice of occupational therapy.Occupational therapy services via telehealth should be appropriate to the individuals, groups and cultures served,and contextualized to the occupations and interests of clients. Important considerations related to licensure/registration, collaboration with local occupational therapists, client selection, consent to treat, professional liability insurance, confidentiality, personal and cultural attributes, provider competence/standards of care, reimbursement/payer guidelines, and authentic occupational therapy practice are discussed.
36

Tam, Ekman P. C. "Ethical Issues in Counseling with Gay and Lesbian Clients: Conversion Therapy and Confidentiality Limits." Journal of Pastoral Care 51, no. 1 (March 1997): 13–24. http://dx.doi.org/10.1177/002234099705100103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Examines the contemporary dispute over conversion therapy with gay and lesbian clients and explores the dilemma of confidentiality limits with clients who have HIV. Suggests frameworks for pastoral counselors to consider in making decisions regarding this population of clients.
37

Faustman, William O., and David J. Miller. "Considerations in Prewarning Clients of the Limitations of Confidentiality." Psychological Reports 60, no. 1 (February 1987): 195–98. http://dx.doi.org/10.2466/pr0.1987.60.1.195.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Many clinicians have advocated that therapists should pre-warn clients of the limitations of confidentiality prior to the initiation of therapy. Surprisingly, little attention has been given to arguments against prewarning clients. The present work notes that the act of prewarning may subvert the intent and effectiveness of numerous laws and legal rulings designed for the protection of innocent victims. Discussion is provided regarding how certain laws may have placed psychologists in the role of an agent of society.
38

Gustafson, Kathryn E., and J. Regis McNamara. "Confidentiality with minor clients: Issues and guidelines for therapists." Professional Psychology: Research and Practice 18, no. 5 (1987): 503–8. http://dx.doi.org/10.1037/0735-7028.18.5.503.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

GRAY, LIZBETH A., and ANNA K. HARDING. "Confidentiality Limits with Clients Who Have the AIDS Virus." Journal of Counseling & Development 66, no. 5 (January 1988): 219–23. http://dx.doi.org/10.1002/j.1556-6676.1988.tb00851.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Issad, M., N. Anane, A. M. Bellemou, and B. Boudraa. "Secure Hybrid Crypto-system AES/RSA on FPGA for Data Communication." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (June 30, 2020): 14–23. http://dx.doi.org/10.37231/myjcam.2020.3.1.38.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the development of information technologies, our environment is surrounded by digital data that transit via networks. When data are important, they become vulnerable to external attacks which can be avoided by using cryptography which provides confidentiality, integrity and availability required to secure digital data transactions such as e- commerce, mobile telephony and Internet. This paper deals with securing data transmitted over a network composed by a server and several clients, where a security platform has been integrated into the server and embedded on an FPGA circuit. The protection of data transfer between clients is provided by hybrid cryptography combining symmetric and asymmetric cryptographies. The security of client-server communication is ensured by the AES protocol and the Diffie-Hellman key exchange protocol. To offer a good management of keys and their sharing, a dedicated system for generating keys is designed to fit with public key infrastructures. This system is a part of the server and has been implemented using JAVA language and executed on a computer. This communication system provides a Graphical User Interface (GUI) offering to clients ease and flexibility in transferring their data.
41

Curtis, Patrick Almond, and Anita M. Lutkus. "Client Confidentiality in Police Social Work Settings." Social Work 30, no. 4 (July 1, 1985): 355–60. http://dx.doi.org/10.1093/sw/30.4.355.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Glen, Sally. "Confidentiality: a critique of the traditional view." Nursing Ethics 4, no. 5 (September 1997): 403–6. http://dx.doi.org/10.1177/096973309700400506.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
‘Confidentiality’ can become a somewhat embellishing signboard for paternalistic caring. In essence, one needs to distinguish between confidentiality as a respectful attitude to a patient/client, where it becomes credible that the caring professional will not misuse the information he or she obtains about the patient/client, and between confidentiality misused as an instrument of power to keep the patient/client outside of processes in which it might be important or advantageous for him or her to participate.
43

Christofferson, Sarah M. Beggs. "Is Preventive Treatment for Individuals With Sexual Interest in Children Viable in a Discretionary Reporting Context?" Journal of Interpersonal Violence 34, no. 20 (September 5, 2019): 4254–80. http://dx.doi.org/10.1177/0886260519869236.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study explored the viability of preventive treatment services for individuals with sexual interest in children, in jurisdictions without mandatory reporting but where risk-related disclosures to authorities are permitted at therapists’ discretion. Health professionals ( N = 112) were surveyed regarding their comfort, confidence, knowledge of relevant legal provisions, and personal disclosure thresholds, in relation to a hypothetical scenario of a client confiding pedophilic interest to seek help. Findings were mixed regarding implications for prevention service viability. Despite the complexities of the legal and ethical context of the study setting (New Zealand), predictions regarding professionals’ uncertainty in relation to their legal and ethical duties, and displaying a bias toward disclosing information to authorities when permitted, were not fully borne out, although pervasive knowledge inaccuracies and associated training needs were revealed. Instead, general tendencies among respondents were toward comfort, confidence, and the inclination toward maintaining client confidentiality. Yet, widespread variance within the sample, and individuals’ thresholds appearing rather unpredictable on the basis of demographic or professional variables, highlights likely barriers for potential clients in feeling safe enough to come forward. Given that preventive treatment viability in this context relies on self-referral, it is suggested that a purpose-designed preventive treatment service, with clear accessible confidentiality and reporting policies that are well within the law, could be the best way forward for viable preventive treatment in discretionary reporting contexts.
44

RUIZ, ROCIO. "PRINCIPIO DE ÉTICA; CONFIDENCIALIDAD EN LA PROFESIÓN CONTABLE." Pensamiento Republicano 13 (January 31, 2021): 89–99. http://dx.doi.org/10.21017/pen.repub.2021.n13.a77.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The professional secret is a link in any type of relationship where a contract exists, the objective of the principle of ethics is to force the professional to keep secret the information provided by third parties, since the information that is revealed is important, additionally the principle manages to establish a relationship of trust in the exercise of the assignment between client and professional sustaining a profitable relationship, if a professional violates the principle is exposed to different sanctions, so this investigation will allow to know, to analyze, and to conclude the types of sanctions imposed according to the mentioned infraction.
45

Vukosavljevic-Gvozden, Tatjana. "Confidentiality in psychotherapy: Some of actual dilemmas." Psihologija 37, no. 1 (2004): 33–50. http://dx.doi.org/10.2298/psi0401033v.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article examines confidentiality principle from different perspectives: as the factor which plays a very important part in developing a productive therapist-client relationship, ethical and, in many countries, legal issue. Ways to maintain confidentiality in therapy are stated, as well as situations in which it is inevitably limited. Three dilemmas concerning confidentiality are explained and discussed. The first is when one should speak and when one should be silent and what we should do when we are in two minds. The second is whether the client should be informed about confidentiality limitations at the very beginning, or when the need arises during the treatment. The third is whether confidentiality limitation (when a client poses a threat to himself or to the society) should be legally regulated, as it is being done in many western countries.
46

Ceolta-Smith, Jenny, and Christine Kenney. "Healthcare professionals' roles within UK welfare-to-work provision: a multiple case study exploration." International Journal of Therapy and Rehabilitation 28, no. 7 (July 2, 2021): 1–24. http://dx.doi.org/10.12968/ijtr.2019.0115.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background/aims Healthcare professionals play an important role in vocational rehabilitation for people receiving welfare support. The research questions for this study were: how do qualified healthcare professionals operate in UK welfare-to-work settings? What factors influence healthcare professionals' practice within a UK welfare-to-work setting? Methods A qualitative methodology was adopted. Four semi-structured interviews were conducted and additional documents (the awarded Work and Health Programme bids and job descriptions) about the healthcare professionals' roles were reviewed. Inductive thematic analysis was undertaken. Results Five themes were generated from the interview data: supporting frontline staff to understand clients' health needs; moving clients with complex needs closer to work; getting it right for the client by individualising support; gaining consent and maintaining confidentiality; and seeking and organising clinical supervision. These themes were corroborated with the document data. Conclusions Healthcare professionals have a key role within welfare-to-work provision. Further research is needed to determine if the proposed healthcare professional roles have come to fruition, to identify their prevalence, and to explore their effectiveness.
47

VandeCreek, Leon, Samuel Knapp, and Cindy Herzog. "Privileged Communications for Social Workers." Social Casework 69, no. 1 (January 1988): 28–34. http://dx.doi.org/10.1177/104438948806900105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Psychotherapy clients expect and deserve confidentiality. However, privileged communication laws vary by state and profession. The authors discuss and recommend a functional privilege that would apply to all psychotherapy clients of all recognized mental health professions.
48

Joe, Jennifer, Arnold Wright, and, and Sally Wright. "The Impact of Client and Misstatement Characteristics on the Disposition of Proposed Audit Adjustments." AUDITING: A Journal of Practice & Theory 30, no. 2 (May 1, 2011): 103–24. http://dx.doi.org/10.2308/ajpt-50007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
SUMMARY We present evidence on the resolution of proposed audit adjustments during a unique time period, immediately following several U.S. financial scandals and surrounding calls for reforms in auditing and financial reporting, which culminated in the passage of the Sarbanes-Oxley Act (SOX). During this period, auditors and their clients faced increased scrutiny from investors and regulators. In addition, auditors had to contend with changed incentives, a new external regulator (i.e., the PCAOB), and upcoming annual PCAOB inspections. We extend prior studies by considering a broader range of factors potentially impacting the resolution of proposed adjustments, including the effect of client tenure, strength of internal controls, and repeat adjustments. Data on 458 proposed adjustments are obtained from the working papers of a sample of 163 audit engagements conducted during 2002 by a Big 4 firm. We find that 24.2 percent of proposed adjustments were subsequently waived. The results indicate audit adjustments are more likely to be waived for clients with whom the audit firm has had a longer relationship, although the pattern does not reflect favoring such clients. We also find that adjustments are more likely to be waived for repeat adjustments. Data Availability: Due to a confidentiality agreement with the participating audit firm the data are proprietary.
49

Mittal, Sonam, Shagun Sharma, and K. R. Ramkumar. "A Matrix-Based Homomorphic Encryption for Preserving Privacy in Clouds." ECS Transactions 107, no. 1 (April 24, 2022): 5441–48. http://dx.doi.org/10.1149/10701.5441ecst.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As huge data need to store on clouds for big data analytics and related features to analyze data computationally. Cloud computing serves many services to the client over their data such as data storage, analysis, and different resources. To avail such services over clouds, client needs to provide the access to cloud service providers (CSPs) over their data, which leaves data unprotected and confidentiality of their data is at stake. Different techniques are proposed to preserve the privacy and confidentiality of client’s data. One of the most common is, cryptography, which converts plaintext to unreadable form that is ciphertext. But almost all the existing cryptographic techniques are not up to mark and don’t have potential to perform the computation on the ciphertext. The recent trends in field of cryptography, the homomorphic encryption is emerged as a boom, which enhance the privacy of data to a large extent, without compromising the confidentiality of users’ data at cloud end. Homomorphic encryption provides the ability to perform computation on encrypted data, even when data is in use. Most of the existing homomorphic encryption algorithms are having high computational and time complexity. In this paper, an enhanced homomorphic encryption algorithm is proposed specifically for the cloud environments, having better performance. In this paper, an enhanced homomorphic encryption algorithm is proposed specifically for the cloud environments, may having better performance. The algorithm uses prime number-based matrix for encryption and decryption. The algorithm may give better performance in terms of encryption, decryption, and overall execution time.
50

Sun, Jiameng, Binrui Zhu, Jing Qin, Jiankun Hu, and Qianhong Wu. "Confidentiality-Preserving Publicly Verifiable Computation." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 799–818. http://dx.doi.org/10.1142/s0129054117400196.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cloud computing enables users to outsource complicated computational tasks to a commercial computing server and relieves the users from establishing and maintaining expensive local computation systems. In this scenario, the minimum security requirement is that the result returned by the server must be correct. Publicly verifiable computation (PVC) has been proposed to address this issue by allowing the computational result to be publicly verifiable. Observing that computational tasks are usually private business in practice, we propose a confidentiality-preserving security tool referred to as confidentiality-preserving publicly verifiable computation (CP-PVC), to efficiently address the scenario where a client would like to outsource a computational task to a cloud server but does not possess the input value locally. The CP-PVC allows the client to delegate the outsourcing computational task to anyone authorized and keeps the computational result confidential to anyone except the client, while not sacrificing the property of public verifiability. We propose a CP-PVC construction based on any one-key secure attribute-based encryption (ABE). Our construction is general as known ABE schemes are all one-key secure. Analysis shows that our CP-PVC scheme achieves computational result privacy without any significant extra cost and is almost as efficient as the up-to-date PVC schemes. These features render our CP-PVC as a practical and widely applicable tool to secure cloud computing.

До бібліографії