Search results for "ERT"

showing 10 items of 21537 documents

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Activity Theory as a Lens to Identify Challenges in Surgical Skills Training at Hospital Work Environment

2015

In this paper the concepts from activity theory (AT) are applied for identifying the challenges and contradictions emerging in surgical resident’s curriculum based training at hospital. AT is utilised as a lens to identify contradictions that cause disturbances, problems, ruptures, breakdowns, and clashes which emerge while surgical skills training is implemented in a new way at hospital. We especially aim at finding solutions for contradictions which emerge while the new and old working culture are confronted and the workers are required to balance themselves between the patient care demands and workplace learning requirements. We are using the conceptual theoretical approach to describe…

ta113Medical educationKnowledge managementbusiness.industryeducationsurgical skills trainingActivity theoryTraining (civil)humanitiesPatient careWork environmentsurgical simulatorWorkplace learningexpertise developmentPhenomenonSurgical skillsta516businessPsychologyactivity theoryCurriculumta217
researchProduct

Mobile Banking Services Continuous Usage -- Case Study of Finland

2016

Finland is at the forefront of using new information systems, such as mobile banking (m-banking). The present study develops and tests a model of continuous usage intentions toward m-banking services for a sample of 273 Finnish m-banking users. Results confirm the hypothesized direct relationships between self-congruence and perceived value, perceived risk and perceived value, perceived value and continuous usage, and continuous usage and word of mouth. The frequency of usage of m-banking services and experience moderate the relationship between perceived value and continuous usage. We discuss the theoretical and managerial implications of the study results and present recommendations for f…

ta113Mobile bankingbusiness.industry05 social sciencesWord of mouthSample (statistics)AdvertisingRisk perception0502 economics and businessInformation systemmobile banking050211 marketingThe InternetBusinessMarketingta512Value (mathematics)Finland050203 business & managementConsumer behaviour2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

High speed microfluidic prototyping by programmable proximity aperture MeV ion beam lithography

2013

Abstract Microfluidics refers to the science and technology for controlling and manipulating fluids that flow along microchannels. For the development of complex prototypes, many microfluidic test structures are required first. Normally, these devices are fabricated via photolithography. This technique requires a photomask for transferring a pattern to photoresists by exposing with UV light. However, this method can be slow when a new structure is required to change. This is because a series of photomasks are needed, which is time consuming and costly. Here, we present a programmable proximity aperture lithography (PPAL) technique for the development of microfluidic prototype in poly(methyl…

ta113Nuclear and High Energy PhysicsMaterials scienceFabricationApertureMicrofluidicsProcess (computing)NanotechnologyIon beam lithographylaw.inventionlawta318PhotomaskPhotolithographyInstrumentationLithographyNuclear Instruments and Methods in Physics Research Section B: Beam Interactions with Materials and Atoms
researchProduct

Consumer Acceptance and Use of Instagram

2016

This study extends the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to investigate factors affecting the acceptance and use of a social networking service (SNS) called Instagram. The UTAUT2 model is modified to better suit the context of SNSs by replacing the price value construct with self-congruence. Furthermore, we explore the effects of behavioral intention and use behavior on "user indegree" defined as the number of people who follow an SNS user. The results of the survey study largely support the hypothesized model in the context of Instagram. The findings contribute to previous knowledge by demonstrating the important roles of hedonic motivation and habit in co…

ta113Service (business)Value (ethics)Context modelHedonic motivationsocial media05 social sciencesSurvey researchContext (language use)AdvertisingUnified theory of acceptance and use of technology0502 economics and businessInstagram050211 marketingConstruct (philosophy)Psychologyta512consumer acceptance050203 business & management2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

Health care and cyber threats

2019

ta113critical infrastructurecyber threatkyberuhkaterveydenhuoltocyber securitykyberturvallisuushealth carekriittinen infrastruktuuriFinnish Journal of eHealth and eWelfare
researchProduct

Towards the cyber security paradigm of ehealth: Resilience and design aspects

2017

Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…

ta113e-healthcareEmerging technologiesbusiness.industrycyber securityComputer securitycomputer.software_genreAnticipation (artificial intelligence)Critical information infrastructureHealth careSystemic riskeHealthBusinessteleterveydenhuoltoResilience (network)kyberturvallisuuscomputerHealthcare system
researchProduct

Biased graph walks for RDF graph embeddings

2017

Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…

ta113graph embeddingsGraph kernelComputer scienceVoltage graphComparability graphdata mining02 engineering and technologycomputer.software_genre020204 information systemsyhdistetty avoin tietolinked open data0202 electrical engineering electronic engineering information engineeringTopological graph theoryGraph (abstract data type)020201 artificial intelligence & image processingData miningtiedonlouhintaGraph propertyNull graphLattice graphavoin tietocomputerProceedings of the 7th International Conference on Web Intelligence, Mining and Semantics
researchProduct