Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Language
      Language
      Clear All
      Language
  • Subject
      Subject
      Clear All
      Subject
  • Item Type
      Item Type
      Clear All
      Item Type
  • Discipline
      Discipline
      Clear All
      Discipline
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
8,896 result(s) for "Security Measures - standards"
Sort by:
Information Security Breaches
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
Airport security: Intent to deceive?
Can the science of deception detection help to catch terrorists? Sharon Weinberger takes a close look at the evidence for it.
Prevalence of zolpidem use in France halved after secure prescription pads implementation in 2017: A SNDS database nested cohort study
Our objective was to quantify the impact on the use of zolpidem of the obligation implemented in France in 2017 to use secure prescription pads to prescribe it. We conducted a cohort study within the French SNDS healthcare database. Patients aged over 18 years of age were considered for inclusion. The number of prevalent users and incident episodes of zolpidem use were compared before the change in law (July 1, 2016 to January 1, 2017) and after (July 1, 2017 to January 1, 2018). A prevalent user was a patient who has been reimbursed for zolpidem at least once. An incident episode of zolpidem use was defined by a first administration of zolpidem without any prior administration within the previous six months. Regarding prevalence of zolpidem users, we observed a decrease from 2.79% (CI95%:2.75-2.83) to 1.48% (1.44-1.51), with a number of patients who stopped taking it after the change in law being approximately 4.3 times higher than the number of patients who started. We observed a negative association between the post-law change period (OR = 0.52 (0.51-0.53)) and the probability of receiving zolpidem, adjusting for sex, aging, low income and chronic disease. We observed a decrease from 183 treatment episodes per 100,000 insured months on average to 79 episodes per 100,000 insured months, with an incidence rate ratio (IRR) equal to 0.43 (0.38-0.49). The use of secure prescription pads seems to have reduced the exposure of the French population to zolpidem.
Eradicating polio in Pakistan: an analysis of the challenges and solutions to this security and health issue
Since the launch of the Global Polio Eradication Initiative (GPEI) in 1988 the global incidence of poliomyelitis has fallen by nearly 99 %. From a situation where wild type poliovirus was endemic in 125 countries across five continents, transmission is now limited to regions of just three countries – Pakistan, Afghanistan and Nigeria. A sharp increase in Pakistan’s poliomyelitis cases in 2014 prompted the International Health Regulations Emergency Committee to declare the situation a ‘public health emergency of international concern’. Global polio eradication hinges on Pakistan’s ability to address the religious, political and socioeconomic barriers to immunisation; including discrepancies in vaccine coverage, a poor health infrastructure, and conflict in polio-endemic regions of the country. This analysis provides an overview of the GPEI, focusing on the historical and contemporary challenges facing Pakistan’s polio eradication programme and the impact of conflict and insecurity, and sheds light on strategies to combat vaccine hesitancy, engage local communities and build on recent progress towards polio eradication in Pakistan.
Summary results of the 2014-2015 DARPA Chikungunya challenge
Background : Emerging pathogens such as Zika, chikungunya, Ebola, and dengue viruses are serious threats to national and global health security. Accurate forecasts of emerging epidemics and their severity are critical to minimizing subsequent mortality, morbidity, and economic loss. The recent introduction of chikungunya and Zika virus to the Americas underscores the need for better methods for disease surveillance and forecasting. Methods : To explore the suitability of current approaches to forecasting emerging diseases, the Defense Advanced Research Projects Agency (DARPA) launched the 2014–2015 DARPA Chikungunya Challenge to forecast the number of cases and spread of chikungunya disease in the Americas. Challenge participants ( n =38 during final evaluation) provided predictions of chikungunya epidemics across the Americas for a six-month period, from September 1, 2014 to February 16, 2015, to be evaluated by comparison with incidence data reported to the Pan American Health Organization (PAHO). This manuscript presents an overview of the challenge and a summary of the approaches used by the winners. Results : Participant submissions were evaluated by a team of non-competing government subject matter experts based on numerical accuracy and methodology. Although this manuscript does not include in-depth analyses of the results, cursory analyses suggest that simpler models appear to outperform more complex approaches that included, for example, demographic information and transportation dynamics, due to the reporting biases, which can be implicitly captured in statistical models. Mosquito-dynamics, population specific information, and dengue-specific information correlated best with prediction accuracy. Conclusion : We conclude that with careful consideration and understanding of the relative advantages and disadvantages of particular methods, implementation of an effective prediction system is feasible. However, there is a need to improve the quality of the data in order to more accurately predict the course of epidemics.
Registered access: a ‘Triple-A’ approach
We propose a standard model for a novel data access tier - registered access - to facilitate access to data that cannot be published in open access archives owing to ethical and legal risk. Based on an analysis of applicable research ethics and other legal and administrative frameworks, we discuss the general characteristics of this Registered Access Model, which would comprise a three-stage approval process: Authentication, Attestation and Authorization. We are piloting registered access with the Demonstration Projects of the Global Alliance for Genomics and Health for which it may provide a suitable mechanism for access to certain data types and to different types of data users.
User abnormal behavior recommendation via multilayer network
With the growing popularity of online services such as online banking and online shopping, one of the essential research topics is how to build a privacy-preserving user abnormal behavior recommendation system. However, a machine-learning based system may present a dilemma. On one aspect, such system requires large volume of features to pre-train the model, but on another aspect, it is challenging to design usable features without looking to plaintext private data. In this paper, we propose an unorthodox approach involving graph analysis to resolve this dilemma and build a novel private-preserving recommendation system under a multilayer network framework. In experiments, we use a large, state-of-the-art dataset (containing more than 40,000 nodes and 43 million encrypted features) to evaluate the recommendation ability of our system on abnormal user behavior, yielding an overall precision rate of around 0.9, a recall rate of 1.0, and an F1-score of around 0.94. Also, we have also reported a linear time complexity for our system. Last, we deploy our system on the \"Wenjuanxing\" crowd-sourced system and \"Amazon Mechanical Turk\" for other users to evaluate in all aspects. The result shows that almost all feedbacks have achieved up to 85% satisfaction.
Global Health Security
On September 30, 2014, the Centers for Disease Control and Prevention (CDC) received a report of a laboratory-confirmed case of Ebola virus disease (Ebola) in a man who had traveled from Liberia to Dallas, Texas. Two nurses who cared for him were eventually confirmed as having Ebola. Three weeks later, a physician who had recently returned from West Africa to New York City developed symptoms and had laboratory confirmation of Ebola infection. These 4 cases placed an astounding burden of work on the state and local health departments involved and required the efforts of hundreds of health care workers.1-3 The economic impact was steep; Congress allocated more than $570 million to CDC for the US domestic Ebola response as part of a larger $5.4 billion appropriation for Ebola and health security.4 The 4 cases of Ebola illustrate how the interconnectedness of today’s world brings an increased risk for disease acquisition, both in the United States and abroad.