نتایج جستجو برای: whistleblower protection

تعداد نتایج: 180007  

Journal: :CoRR 2014
John Maheswaran Daniel Jackowitz David Wolinsky Lining Wang Bryan Ford

Social networking sites supporting federated identities offer a convenient and increasingly popular mechanism for cross-site authentication. Unfortunately, they also exacerbate many privacy and tracking risks. We propose Crypto-Book, an anonymizing layer enabling cross-site authentication while reducing these risks. Crypto-Book relies on a set of independently managed servers that collectively ...

2015
Mark Sujan Dominic Furniss

Reporting and learning systems are key organisational tools for the management and prevention of clinical risk. However, current approaches, such as incident reporting, are struggling to meet expectations of turning health systems like the UK National Health Service (NHS) into learning organisations. This article aims to open up debate on the potential for novel reporting and learning systems i...

Journal: :Health matrix 2013
Andrew M Hyer

The civil False Claims Act (FCA) imposes harsh penalties against parties who misappropriate federal funds. The statute's qui tam whistle-blower provisions create strong financial incentives for private individuals to bring and pursue FCA cases against health providers on the government's behalf--even where government attorneys decline to intervene. FCA cases where the government declined to int...

2016
LAURA G. HOEY DEBORAH K. GARDNER

BY LAURA G. HOEY AND DEBORAH K. GARDNER I n 2014, San Diego-based Millennium Health LLC, one of the nation’s largest drug-testing laboratories, employed approximately 1,000 people, tested over 2.5 million specimens annually, and generated roughly $680 million in annual revenue. On the other side of the country, Health Diagnostic Laboratory Inc. (HDL), a Virginia-based company specializing in ca...

2006
RALF HÜLSERMANN MONIKA JÄGER ARIE M.C.A. KOSTER SEBASTIAN ORLOWSKI ROLAND WESSÄLY ADRIAN ZYMOLKA Ralf Hülsermann Monika Jäger Arie M. C. A. Koster Sebastian Orlowski Roland Wessäly

In this paper, we investigate the connection availabilities for the new protection scheme Demand-wise Shared Protection (DSP) and describe an appropriate approach for their computation. The exemplary case study on two realistic network scenarios shows that in most cases the availabilities for DSP are comparable with that for 1+1 path protection and better than in case of shared path protection.

2016
Theodore Tryfonas Michael Carter Tom Crick Panagiotis Andriotis

Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace e↵ective and are the conventional metaphors...

2012
Yugo Hayashi

The presented study is concerned with one aspect of the effect of a "whistleblower" or a person arousing or informing a different perspective on a collaborative problem-solving task. Its purpose is to find out, through an experiment, how a whistle-blower (which we called "Maverick") affects the facilitation of a breakthrough in a rule-discovery task. In the experiment two hypotheses were tested...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید