Search results for "ERT"
showing 10 items of 21537 documents
Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications
2014
Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…
Activity Theory as a Lens to Identify Challenges in Surgical Skills Training at Hospital Work Environment
2015
In this paper the concepts from activity theory (AT) are applied for identifying the challenges and contradictions emerging in surgical residentâs curriculum based training at hospital. AT is utilised as a lens to identify contradictions that cause disturbances, problems, ruptures, breakdowns, and clashes which emerge while surgical skills training is implemented in a new way at hospital. We especially aim at finding solutions for contradictions which emerge while the new and old working culture are confronted and the workers are required to balance themselves between the patient care demands and workplace learning requirements. We are using the conceptual theoretical approach to describe…
Mobile Banking Services Continuous Usage -- Case Study of Finland
2016
Finland is at the forefront of using new information systems, such as mobile banking (m-banking). The present study develops and tests a model of continuous usage intentions toward m-banking services for a sample of 273 Finnish m-banking users. Results confirm the hypothesized direct relationships between self-congruence and perceived value, perceived risk and perceived value, perceived value and continuous usage, and continuous usage and word of mouth. The frequency of usage of m-banking services and experience moderate the relationship between perceived value and continuous usage. We discuss the theoretical and managerial implications of the study results and present recommendations for f…
High speed microfluidic prototyping by programmable proximity aperture MeV ion beam lithography
2013
Abstract Microfluidics refers to the science and technology for controlling and manipulating fluids that flow along microchannels. For the development of complex prototypes, many microfluidic test structures are required first. Normally, these devices are fabricated via photolithography. This technique requires a photomask for transferring a pattern to photoresists by exposing with UV light. However, this method can be slow when a new structure is required to change. This is because a series of photomasks are needed, which is time consuming and costly. Here, we present a programmable proximity aperture lithography (PPAL) technique for the development of microfluidic prototype in poly(methyl…
Consumer Acceptance and Use of Instagram
2016
This study extends the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to investigate factors affecting the acceptance and use of a social networking service (SNS) called Instagram. The UTAUT2 model is modified to better suit the context of SNSs by replacing the price value construct with self-congruence. Furthermore, we explore the effects of behavioral intention and use behavior on "user indegree" defined as the number of people who follow an SNS user. The results of the survey study largely support the hypothesized model in the context of Instagram. The findings contribute to previous knowledge by demonstrating the important roles of hedonic motivation and habit in co…
A Novel Model for Cybersecurity Economics and Analysis
2017
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…
Online anomaly detection using dimensionality reduction techniques for HTTP log analysis
2015
Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …
Health care and cyber threats
2019
Towards the cyber security paradigm of ehealth: Resilience and design aspects
2017
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…
Biased graph walks for RDF graph embeddings
2017
Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…