Search results for "Security"
showing 10 items of 1693 documents
Artificial intelligence: the unstoppable revolution in ophthalmology.
2020
Artificial Intelligence (AI) is an unstoppable force that is starting to permeate all aspects of our society as part of the revolution being brought into our lives (and into medicine) by the digital era, and accelerated by the current COVID-19 pandemic. As the population ages and developing countries move forward, AI-based systems may be a key asset in streamlining the screening, staging, and treatment planning of sight-threatening eye conditions, offloading the most tedious tasks from the experts, allowing for a greater population coverage, and bringing the best possible care to every patient. This paper presents a review of the state of the art of AI in the field of ophthalmology, focusin…
Fire in operating room: The adverse "never" event. Case report, mini-review and medico-legal considerations.
2020
Abstract The patient’s security and safety represent a topic of great importance for public health that led several healthcare organizations in many Countries to share documents to promote risk management and preventing adverse events. Surgical Fire (SF) is an infrequent adverse event generally occurring in the operating room (OR) and consisting of a fire that occurs in, on, or around a patient undergoing a medical or surgical procedure. Here a medico-legal case involving a 65-year-old woman reporting burns to the neck due to an SF during a thyroidectomy was described. A literature review was performed using Pubmed and Scopus databases, focusing on epidemiology, causes, prevention activitie…
User experience and the security of graphical passwords
2015
Graafiset salasanat ovat lupaava vaihtoehto alfanumeeriselle autentikaatiolle. Älypuhelinten ja muiden korkea resoluutioisten kosketusnäytöllisten laitteiden määrä on kasvussa ja alfanumeeriset salasanat ovat kehitetty alun perin näppäimistölle syötettäviksi. Tarkkuutta vaativa kirjoittaminen ei tällöin ole välttämättä käyttäjälle kaikkein mielekkäintä. Graafisia ja alfanumeerisia salasanoja on tutkittu muistin toiminnan sekä käytettävyyden näkökulmasta. Tutkielma on tehty kirjallisuuden pohjalta käyttäen apuna erilaisia tieteellisia julkaisuja sisältäviä tietokantoja, kuten IEE Explore ja ACM Digital Library - tietokantoja. Tutkielman tarkoituksena oli kuvata ja tutkia tieteellisten artikk…
Assessment of Cyber Security risks : A Smart Terminal Process
2023
In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operatio…
Sorption of V and VI group metalloids (As, Sb, Te) on modified peat sorbents
2016
AbstractThe present work investigates arsenic, antimony and tellurium sorption using iron modified peat. The results were obtained using batch tests and the sorption was studied as a function of initial metalloid concentration, pH and sorption time, as well as the presence of competing substances. The obtained results indicate that modification of peat with Fe compounds significantly enhances the sorption capacity of the sorbents used for sorption of arsenic, antimony and tellurium. The optimal pH interval for the sorption of Sb(III) is 6.5–9 and for As(V) and Sb(V) – 3–6, while As(III) and tellurium sorption using Fe-modified peat is favourable in a wider interval of 3–9. The presence of c…
Informační operace
2017
The author of this article points out various issues in information management of information operations. To ensure the attainment of high security it is essential to maintain and develop the information system to implement new technologies for the needs of conducted military operations. In the environment of the terrorism threat, is the need for developing IO; means of communication, identification elements, components for conducting intelligence, special and reconnaissance operations
Informační operace
2016
The author of this article points out various issues in information management of information operations. To ensure the attainment of high security it is essential to maintain and develop the information system to implement new technologies for the needs of conducted military operations. In the environment of the terrorism threat, is the need for developing IO; means of communication, identification elements, components for conducting intelligence, special and reconnaissance operations.
An Empirical Examination of the Economics of Mobile Application Security
2021
The growth of mobile devices coupled with the advances in mobile technologies has resulted in the development and widespread use of a variety of mobile applications (apps). Mobile apps have been developed for social networking, banking, receiving daily news, maintaining fitness, and for job-related tasks. The security of the apps is an important concern. However, in some cases, the app developers may be less interested to invest in the security of the apps, if users are unwilling to pay for the added security. In this paper, we empirically examine whether consumers are less willing to pay for security features than for usability features. In addition, we examine whether a third-party certif…
Henkilöstön tietoturvakäyttäytyminen yrityskontekstissa
2016
Tämä tutkielma on toteutettu kirjallisuuskatsauksena, jonka lähteinä on käytet-ty pääasiassa akateemisten julkaisujen artikkeleita. Tutkielman tarkoitus oli sel-vittää mitä on tietoturvakäyttäytyminen, tekijät jotka vaikuttavat henkilöstön tietoturvakäyttäytymiseen ja miten henkilöstön käyttäytymistä voitaisiin paran-taa, tietoturvan säilyttämiseksi. Kirjallisuuden perusteella onnistuttiin löytä-mään kattava lista erilaisia käyttäytymisen vaikuttavia tekijöitä ja henkilöstön motivoinnin keinoja. Näistä tekijöistä ja keinoista muodostettiin kontribuutiona havainnollistava kuva, sekä konkreettinen tehtävälista. This thesis is a literature review based mainly on academic publications. Mean-ing…
Prosessiteoreettinen näkökulma, joka selittää henkilökohtaisen tietokoneen käyttöön liittyvää tietoturvakäyttäytymisen muutosta
2016
IS security behavior has become a mainstream topic in information systems. Extent research is dominated with the viewpoint for discovery of generic and stable predictors. The viewpoint rests on the implicit assumption that information security behavior can be explained by discovering these factors. The best know examples are IS security behavior models grounded upon Protection Motivation Theory (PMT) and the Deterrence Theory (DT). The success of this perspective hinges on the question as to what extend the IS security behavior and the reasons for it, are constant from time to time and from one specific security situation to another. The viewpoint is successful if computer users have built …