نتایج جستجو برای: whistleblower protection
تعداد نتایج: 180007 فیلتر نتایج به سال:
Social networking sites supporting federated identities offer a convenient and increasingly popular mechanism for cross-site authentication. Unfortunately, they also exacerbate many privacy and tracking risks. We propose Crypto-Book, an anonymizing layer enabling cross-site authentication while reducing these risks. Crypto-Book relies on a set of independently managed servers that collectively ...
Reporting and learning systems are key organisational tools for the management and prevention of clinical risk. However, current approaches, such as incident reporting, are struggling to meet expectations of turning health systems like the UK National Health Service (NHS) into learning organisations. This article aims to open up debate on the potential for novel reporting and learning systems i...
The civil False Claims Act (FCA) imposes harsh penalties against parties who misappropriate federal funds. The statute's qui tam whistle-blower provisions create strong financial incentives for private individuals to bring and pursue FCA cases against health providers on the government's behalf--even where government attorneys decline to intervene. FCA cases where the government declined to int...
BY LAURA G. HOEY AND DEBORAH K. GARDNER I n 2014, San Diego-based Millennium Health LLC, one of the nation’s largest drug-testing laboratories, employed approximately 1,000 people, tested over 2.5 million specimens annually, and generated roughly $680 million in annual revenue. On the other side of the country, Health Diagnostic Laboratory Inc. (HDL), a Virginia-based company specializing in ca...
In this paper, we investigate the connection availabilities for the new protection scheme Demand-wise Shared Protection (DSP) and describe an appropriate approach for their computation. The exemplary case study on two realistic network scenarios shows that in most cases the availabilities for DSP are comparable with that for 1+1 path protection and better than in case of shared path protection.
Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace e↵ective and are the conventional metaphors...
The effect of "Maverick": A study of Group Dynamics on Breakthrough in Collaborative Problem solving
The presented study is concerned with one aspect of the effect of a "whistleblower" or a person arousing or informing a different perspective on a collaborative problem-solving task. Its purpose is to find out, through an experiment, how a whistle-blower (which we called "Maverick") affects the facilitation of a breakthrough in a rule-discovery task. In the experiment two hypotheses were tested...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید