Trustworthy evidence gathering mechanism for multilayer cloud compliance

Author(s):  
Markus Florian ◽  
Sarita Paudel ◽  
Markus Tauber
2020 ◽  
Author(s):  
Zahra Zandesh

BACKGROUND The complicated nature of cloud computing encompassing internet-based technologies and service models for delivering IT applications, processing capability, storage, and memory space and some notable features motivate organizations to migrate their core businesses to the cloud. Consequently, healthcare organizations are much interested to migrate to this new paradigm despite challenges about security, privacy and compliances issues. OBJECTIVE The present study was conducted to investigate all related cloud compliances in health domain in order to find gaps in this context. METHODS All works on cloud compliance issues were surveyed after 2013 in health domain in PubMed, Scopus, Web of Science, and IEEE Digital Library databases. RESULTS Totally, 36 compliances had been found in this domain used in different countries for a variety of purposes. Initially, all founded compliances were divided into three parts as well as five standards, twenty-eight legislations and three policies and guidelines each of which is presented here by in detail. CONCLUSIONS Then, some main headlines like compliance management, data management, data governance, information security services, medical ethics, and patients' rights were recommended in terms of any compliance or frameworks and their corresponding patterns which should be involved in this domain.


Author(s):  
Alexander Laban Hinton

This Preamble to Part II describes the reenactment at Tuol Sleng prison by Duch and participants as a part of the ECCC’s evidence gathering, and peace and reconciliation process. It introduces chapters on the lived experience of Cambodians who participated in ECCC.


2020 ◽  
Vol 37 (2) ◽  
pp. 249-264
Author(s):  
Jane R. Bambauer ◽  
Saura Masconale ◽  
Simone M. Sepe

AbstractA person’s epistemic goals sometimes clash with pragmatic ones. At times, rational agents will degrade the quality of their epistemic process in order to satisfy a goal that is knowledge-independent (for example, to gain status or at least keep the peace with friends.) This is particularly so when the epistemic quest concerns an abstract political or economic theory, where evidence is likely to be softer and open to interpretation. Before wide-scale adoption of the Internet, people sought out or stumbled upon evidence related to a proposition in a more random way. And it was difficult to aggregate the evidence of friends and other similar people to the exclusion of others, even if one had wanted to. Today, by contrast, the searchable Internet allows people to simultaneously pursue social and epistemic goals.This essay shows that the selection effect caused by a merging of social and epistemic activities will cause both polarization in beliefs and devaluation of expert testimony. This will occur even if agents are rational Bayesians and have moderate credences before talking to their peers. What appears to be rampant dogmatism could be just as well explained by the nonrandom walk in evidence-gathering. This explanation better matches the empirical evidence on how people behave on social media platforms. It also helps clarify why media outlets (not just the Internet platforms) might have their own pragmatic reasons to compromise their epistemic goals in today’s competitive and polarized information market. Yet, it also makes policy intervention much more difficult, since we are unlikely to neatly separate individuals’ epistemic goals from their social ones.


2019 ◽  
Vol 14 (1) ◽  
pp. A46-A58 ◽  
Author(s):  
Nishani Edirisinghe Vincent ◽  
Anne M. Wilkins

SUMMARY The novelty, ambiguity, and the lack of official guidance surrounding cryptocurrency transactions impose additional audit risks that should be considered during client acceptance and retention and planning audit procedures. We develop a four-quadrant model to assist auditors in client acceptance and continuance decisions and identify cryptocurrency risks that should be considered during audit planning and audit evidence gathering.


Sign in / Sign up

Export Citation Format

Share Document