Search results for " internet"
showing 10 items of 1234 documents
Prawne aspekty prowadzenia apteki internetowej jako elementu rynku e-health
2018
Wykorzystanie nowoczesnych technologii informatycznych jest elementem rozwojowym rynku farmaceutycznego, a sprzedaż internetowa stanowi interesujący kanał dystrybucji produktów leczniczych. Termin „apteka internetowa” nie posiada swojej definicji legalnej w polskim prawie. Jest on jednak powszechnie stosowany dla określenia aptek ogólnodostępnych i punktów aptecznych, które za pomocą Internetu prowadzą działalność polegającą na sprzedaży wysyłkowej produktów leczniczych. Możliwość ta dotyczy wyłącznie leków dostępnych bez recepty. Kluczowe znaczenie dla prezentowanej problematyki ma pojęcie sprzedaży wysyłkowej. Prowadzenie działalności z zakresu sprzedaży produktów leczniczych, również na …
Behind the scenes of artificial intelligence: a study of micro-work platforms in France
2019
Este artículo es una versión resumida del informe “Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?» This article is a summarized version of the report "Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?" .; International audience; Micro-work internet services allocate small, standardized tasks of data generation and annotation to crowds of providers. The outputs are mainly used to produce artificial intelligence solutions. It is an exemplary instance of the “platformization” of the economy, and of the transformations of labour that digital technologies bring about. To uncover the conditions under which micro-wo…
Attacking TrustZone on devices lacking memory protection
2021
AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future
2018
It is expected there will be 50 billion IoT/embedded connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their software/firmware is plagued with weaknesses and vulnerabilities. Moreover, various recent and prominent attacks, such as the Mirai botnet targeting Commercial Off-The-Shelf (COTS) IoT/embedded devices, and the ROCA attack targeting secure embedded hardware chips (in their many form-factors), clearly demonstrate the need to secure the many layers and components of the highly fragmented and heterogeneous ecosystem of IoT/embedded devices. In this paper we aim to explore, discuss and exemplify some research aspects and direction…
Tiny Machine Learning for Resource-Constrained Microcontrollers
2022
We use 250 billion microcontrollers daily in electronic devices that are capable of running machine learning models inside them. Unfortunately, most of these microcontrollers are highly constrained in terms of computational resources, such as memory usage or clock speed. These are exactly the same resources that play a key role in teaching and running a machine learning model with a basic computer. However, in a microcontroller environment, constrained resources make a critical difference. Therefore, a new paradigm known as tiny machine learning had to be created to meet the constrained requirements of the embedded devices. In this review, we discuss the resource optimization challenges of …
Teaching Knowledge Management by Combining Wikis and Screen Capture Videos
2011
PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…
A modelling framework for social media monitoring
2013
This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work
2013
Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.
Mobile Banking Services Continuous Usage -- Case Study of Finland
2016
Finland is at the forefront of using new information systems, such as mobile banking (m-banking). The present study develops and tests a model of continuous usage intentions toward m-banking services for a sample of 273 Finnish m-banking users. Results confirm the hypothesized direct relationships between self-congruence and perceived value, perceived risk and perceived value, perceived value and continuous usage, and continuous usage and word of mouth. The frequency of usage of m-banking services and experience moderate the relationship between perceived value and continuous usage. We discuss the theoretical and managerial implications of the study results and present recommendations for f…