Search results for " internet"

showing 10 items of 1234 documents

Prawne aspekty prowadzenia apteki internetowej jako elementu rynku e-health

2018

Wykorzystanie nowoczesnych technologii informatycznych jest elementem rozwojowym rynku farmaceutycznego, a sprzedaż internetowa stanowi interesujący kanał dystrybucji produktów leczniczych. Termin „apteka internetowa” nie posiada swojej definicji legalnej w polskim prawie. Jest on jednak powszechnie stosowany dla określenia aptek ogólnodostępnych i punktów aptecznych, które za pomocą Internetu prowadzą działalność polegającą na sprzedaży wysyłkowej produktów leczniczych. Możliwość ta dotyczy wyłącznie leków dostępnych bez recepty. Kluczowe znaczenie dla prezentowanej problematyki ma pojęcie sprzedaży wysyłkowej. Prowadzenie działalności z zakresu sprzedaży produktów leczniczych, również na …

sprzedaż wysyłkowamail-order salee-health.medicinal producte-zdrowieapteka internetowaprodukt leczniczyonline pharmacyFarmacja Polska
researchProduct

Behind the scenes of artificial intelligence: a study of micro-work platforms in France

2019

Este artículo es una versión resumida del informe “Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?» This article is a summarized version of the report "Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?" .; International audience; Micro-work internet services allocate small, standardized tasks of data generation and annotation to crowds of providers. The outputs are mainly used to produce artificial intelligence solutions. It is an exemplary instance of the “platformization” of the economy, and of the transformations of labour that digital technologies bring about. To uncover the conditions under which micro-wo…

standardized tasks of data generation and annotation to crowds of providers. The outputs are mainly used to produce artificial intelligence solutions. It is an exemplary instance of the ?platformization? of the economyinteligencia artificialwithout adequate protection and with only limited opportunities to voice issues or seek advice. Especially as the current boom of artificial intelligence raises demand for their servicesPaolawe use the data collected to present the socio-economic backgrounds of the people who engage in micro-workmicro-workClémentand the general public. This article is a summarized version of the report ?Le Micro-travail en France. Derrière l?automatisation de nouvelles précarités au travail?» trabajo digitaltrabajo digitaltheir motivations and needsUNESCO::SOCIOLOGÍAwhile the micro-working population is very diverseand its broader societal implicationsLe Ludecwe conducted an extensive empirical study in France. In this paperand of the transformations of labour that digital technologies bring about. To uncover the conditions under which micro-work is performedmicro-trabajoElinor Micro-work internet services allocate small[SHS.SOCIO]Humanities and Social Sciences/SociologyWahal1137-7038 8537 Arxius de sociologia 558787 2019 41 7605683 En la trastienda de la inteligencia artificial. Una investigación sobre las plataformas de micro-trabajo en francia Casillia significant portion (including working women with children and with higher education degrees) face pressing financial needs and rely on this activity to make ends meet. Micro-workers are also exposed to distinctive psycho-social risksTubaro:SOCIOLOGÍA [UNESCO]artificial intelligenceand their everyday practices. We show thatartificial intelligence 87 107unionseconomía de plataformasdigital labourtheir working conditions call for attention from policy-makersAntonio A.platform economy
researchProduct

Attacking TrustZone on devices lacking memory protection

2021

AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.

sulautettu tietotekniikkaComputational Theory and MathematicsHardware and ArchitectureComputer Science (miscellaneous)esineiden internetTrustZonesecuritytietoturvaverkkohyökkäyksetSoftwarehaavoittuvuus
researchProduct

Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems

2022

In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed

sulautettu tietotekniikkacybersecurityprotocolsasejärjestelmätilmailucyber-physical systemsfirmwaretakaisinmallinnusvideo surveillanceesineiden internetCCTVkyberturvallisuushaavoittuvuusvulnerabilitieswireless pyrotechnicsremote firing systemsexploitsvalvontajärjestelmätreverse engineeringZigbeeprotokollatcritical infrastructureaviationRFinfrastruktuuritbinareADS-B
researchProduct

IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future

2018

It is expected there will be 50 billion IoT/embedded connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their software/firmware is plagued with weaknesses and vulnerabilities. Moreover, various recent and prominent attacks, such as the Mirai botnet targeting Commercial Off-The-Shelf (COTS) IoT/embedded devices, and the ROCA attack targeting secure embedded hardware chips (in their many form-factors), clearly demonstrate the need to secure the many layers and components of the highly fragmented and heterogeneous ecosystem of IoT/embedded devices. In this paper we aim to explore, discuss and exemplify some research aspects and direction…

sulautettu tietotekniikkaesineiden internetsecuritytietoturva
researchProduct

Tiny Machine Learning for Resource-Constrained Microcontrollers

2022

We use 250 billion microcontrollers daily in electronic devices that are capable of running machine learning models inside them. Unfortunately, most of these microcontrollers are highly constrained in terms of computational resources, such as memory usage or clock speed. These are exactly the same resources that play a key role in teaching and running a machine learning model with a basic computer. However, in a microcontroller environment, constrained resources make a critical difference. Therefore, a new paradigm known as tiny machine learning had to be created to meet the constrained requirements of the embedded devices. In this review, we discuss the resource optimization challenges of …

sulautettu tietotekniikkakoneoppiminenreunalaskentaesineiden internetresurssit
researchProduct

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work

2013

Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.

ta113Information Systems and Managementbusiness.industrymedia_common.quotation_subjectAffect (psychology)Work relatedInterpersonal behaviorManagement Information SystemsWork (electrical)PhenomenonThe InternetHabitbusinessPsychologySocial psychologyInformation SystemsSocial influencemedia_commonInformation & Management
researchProduct

Mobile Banking Services Continuous Usage -- Case Study of Finland

2016

Finland is at the forefront of using new information systems, such as mobile banking (m-banking). The present study develops and tests a model of continuous usage intentions toward m-banking services for a sample of 273 Finnish m-banking users. Results confirm the hypothesized direct relationships between self-congruence and perceived value, perceived risk and perceived value, perceived value and continuous usage, and continuous usage and word of mouth. The frequency of usage of m-banking services and experience moderate the relationship between perceived value and continuous usage. We discuss the theoretical and managerial implications of the study results and present recommendations for f…

ta113Mobile bankingbusiness.industry05 social sciencesWord of mouthSample (statistics)AdvertisingRisk perception0502 economics and businessInformation systemmobile banking050211 marketingThe InternetBusinessMarketingta512Value (mathematics)Finland050203 business & managementConsumer behaviour2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct