نتایج جستجو برای: accountable
تعداد نتایج: 5959 فیلتر نتایج به سال:
professor naoki ikegami’s “fee-for-service payment – an evil practice that must be stamped out” summarizes many of the failings of alternatives to fee-for-service (ffs) payment systems. his article also offers several suggestions for improving ffs systems. however, even powerful arguments against many of the alternatives to ffs, does not make a convincing argument for ffs systems. in addition, ...
PURPOSE To verify the oral narrative abilities in preschoolers, before and after language stimulation. METHODS Participants were 58 preschoolers. The study was developed in three stages: 1. Pre-stimulation stage (Moment 1) - preschoolers produced the first autonomous narrative based on a sequence of pictures, and the second under adult scaffolding; 2. Stimulation stage - it was conducted a we...
Governance researchers have repeatedly discussed how to make public governance more accountable given the relatively ‘thin’ accountability of representative government. Recent decades seen growth new, compensatory forms accountability. However, these measures do not seem satisfied demands for strengthening sector Drawing on concept social accountability, this article challenges common wisdom in...
OBJECTIVE To assess the effect of introducing named accountable general practitioners (GPs) for patients aged 75 years on patterns of general practice utilisation, including continuity of care. DESIGN Regression discontinuity design applied to data from the Clinical Practice Research Datalink to estimate the treatment effect for compliers aged 75. SETTING 200 general practices in England. ...
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to spam or disrupt the group. Messaging protocols such as Mix-nets and DC-nets leave online groups vulnerable to denial-of-service and Sybil attacks, while accountable voting protocols are unusable or inefficient for general anonymous messaging. We present the first general messaging pro...
Demands for lawful access to encrypted data are a long standing obstacle to integrating cryptographic protections into communication systems. A common approach is to allow a trusted third party (TTP) to gain access to private data. However, there is no way to verify that this trust is well place as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well w...
Today’s IP network layer provides little to no protection against misconfiguration or malice. Despite some progress in improving the robustness and security of the IP layer, misconfigurations and attacks still occur frequently. We show how a network layer that provides accountability, i.e., the ability to associate each action with the responsible entity, provides a firm foundation for defenses...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید