Search results for "Security"

showing 10 items of 1693 documents

Artificial intelligence: the unstoppable revolution in ophthalmology.

2020

Artificial Intelligence (AI) is an unstoppable force that is starting to permeate all aspects of our society as part of the revolution being brought into our lives (and into medicine) by the digital era, and accelerated by the current COVID-19 pandemic. As the population ages and developing countries move forward, AI-based systems may be a key asset in streamlining the screening, staging, and treatment planning of sight-threatening eye conditions, offloading the most tedious tasks from the experts, allowing for a greater population coverage, and bringing the best possible care to every patient. This paper presents a review of the state of the art of AI in the field of ophthalmology, focusin…

medicine.medical_specialtyCoronavirus disease 2019 (COVID-19)Digital eraComputer sciencePopulationAsset (computer security)Field (computer science)03 medical and health sciences0302 clinical medicineArtificial IntelligenceOphthalmologymedicineHumanseducationPandemicseducation.field_of_studybusiness.industrySARS-CoV-2Infant NewbornCOVID-19GlaucomaImage enhancementOphthalmology030221 ophthalmology & optometryArtificial intelligenceApplications of artificial intelligencebusiness030217 neurology & neurosurgeryStrengths and weaknessesSurvey of ophthalmology
researchProduct

Fire in operating room: The adverse "never" event. Case report, mini-review and medico-legal considerations.

2020

Abstract The patient’s security and safety represent a topic of great importance for public health that led several healthcare organizations in many Countries to share documents to promote risk management and preventing adverse events. Surgical Fire (SF) is an infrequent adverse event generally occurring in the operating room (OR) and consisting of a fire that occurs in, on, or around a patient undergoing a medical or surgical procedure. Here a medico-legal case involving a 65-year-old woman reporting burns to the neck due to an SF during a thyroidectomy was described. A literature review was performed using Pubmed and Scopus databases, focusing on epidemiology, causes, prevention activitie…

medicine.medical_specialtyOperating RoomsBest practiceScopus01 natural sciencesFiresPathology and Forensic Medicine03 medical and health sciences0302 clinical medicineBurns; Clinical risk management; Healthcare security and safety; Medical liability; Surgery; Surgical fireHealthcare security and safetyEpidemiologyHealth caremedicineHumans030216 legal & forensic medicineAdverse effectRisk managementSurgical fireAgedClinical risk managementMedical ErrorsMedical liabilitybusiness.industryPublic health010401 analytical chemistryLiabilityLiability Legalmedicine.disease0104 chemical sciencesIssues ethics and legal aspectsSurgeryFemaleMedical emergencybusinessBurnsLegal medicine (Tokyo, Japan)
researchProduct

User experience and the security of graphical passwords

2015

Graafiset salasanat ovat lupaava vaihtoehto alfanumeeriselle autentikaatiolle. Älypuhelinten ja muiden korkea resoluutioisten kosketusnäytöllisten laitteiden määrä on kasvussa ja alfanumeeriset salasanat ovat kehitetty alun perin näppäimistölle syötettäviksi. Tarkkuutta vaativa kirjoittaminen ei tällöin ole välttämättä käyttäjälle kaikkein mielekkäintä. Graafisia ja alfanumeerisia salasanoja on tutkittu muistin toiminnan sekä käytettävyyden näkökulmasta. Tutkielma on tehty kirjallisuuden pohjalta käyttäen apuna erilaisia tieteellisia julkaisuja sisältäviä tietokantoja, kuten IEE Explore ja ACM Digital Library - tietokantoja. Tutkielman tarkoituksena oli kuvata ja tutkia tieteellisten artikk…

memoryalfanumeerinen käytettävyysalphanumerical passwords information securityuser experiencegraafinen salasanamuistikäyttäjäkokemusgraphical passwordsconvenience
researchProduct

Assessment of Cyber Security risks : A Smart Terminal Process

2023

In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operatio…

merikuljetusmaritime logisticsmart terminal processcyber security managementmeriliikennelogistiikkaälytekniikkamerenkulkusatamatriskinarviointikyberturvallisuusrisk assessments
researchProduct

Sorption of V and VI group metalloids (As, Sb, Te) on modified peat sorbents

2016

AbstractThe present work investigates arsenic, antimony and tellurium sorption using iron modified peat. The results were obtained using batch tests and the sorption was studied as a function of initial metalloid concentration, pH and sorption time, as well as the presence of competing substances. The obtained results indicate that modification of peat with Fe compounds significantly enhances the sorption capacity of the sorbents used for sorption of arsenic, antimony and tellurium. The optimal pH interval for the sorption of Sb(III) is 6.5–9 and for As(V) and Sb(V) – 3–6, while As(III) and tellurium sorption using Fe-modified peat is favourable in a wider interval of 3–9. The presence of c…

metalloidsPeatantimony0211 other engineering and technologieschemistry.chemical_element02 engineering and technology010501 environmental sciences01 natural scienceslcsh:ChemistryAntimonyGroup (periodic table)telluriumMaterials ChemistryArsenic0105 earth and related environmental sciences021110 strategic defence & security studiesarsenicSorptionGeneral Chemistrylcsh:QD1-999chemistrysorbentsEnvironmental chemistrypeatMetalloidTelluriumOpen Chemistry
researchProduct

Informační operace

2017

The author of this article points out various issues in information management of information operations. To ensure the attainment of high security it is essential to maintain and develop the information system to implement new technologies for the needs of conducted military operations. In the environment of the terrorism threat, is the need for developing IO; means of communication, identification elements, components for conducting intelligence, special and reconnaissance operations

military environmentinformation operationssecurity systeminformation
researchProduct

Informační operace

2016

The author of this article points out various issues in information management of information operations. To ensure the attainment of high security it is essential to maintain and develop the information system to implement new technologies for the needs of conducted military operations. In the environment of the terrorism threat, is the need for developing IO; means of communication, identification elements, components for conducting intelligence, special and reconnaissance operations.

military environmentinformation operationssecurity systeminformation
researchProduct

An Empirical Examination of the Economics of Mobile Application Security

2021

The growth of mobile devices coupled with the advances in mobile technologies has resulted in the development and widespread use of a variety of mobile applications (apps). Mobile apps have been developed for social networking, banking, receiving daily news, maintaining fitness, and for job-related tasks. The security of the apps is an important concern. However, in some cases, the app developers may be less interested to invest in the security of the apps, if users are unwilling to pay for the added security. In this paper, we empirically examine whether consumers are less willing to pay for security features than for usability features. In addition, we examine whether a third-party certif…

mobile appsinformation asymmetrykäytettävyysturvallisuusrisk perceptionskäyttötietosuojamaksuhalukkuusmobiililaitteetmobiilipalvelutapplication securitymobiilisovelluksetmaksullisuustietoturvawillingness to paymatkapuhelimetriskit
researchProduct

Henkilöstön tietoturvakäyttäytyminen yrityskontekstissa

2016

Tämä tutkielma on toteutettu kirjallisuuskatsauksena, jonka lähteinä on käytet-ty pääasiassa akateemisten julkaisujen artikkeleita. Tutkielman tarkoitus oli sel-vittää mitä on tietoturvakäyttäytyminen, tekijät jotka vaikuttavat henkilöstön tietoturvakäyttäytymiseen ja miten henkilöstön käyttäytymistä voitaisiin paran-taa, tietoturvan säilyttämiseksi. Kirjallisuuden perusteella onnistuttiin löytä-mään kattava lista erilaisia käyttäytymisen vaikuttavia tekijöitä ja henkilöstön motivoinnin keinoja. Näistä tekijöistä ja keinoista muodostettiin kontribuutiona havainnollistava kuva, sekä konkreettinen tehtävälista. This thesis is a literature review based mainly on academic publications. Mean-ing…

motivaatioinformation security policymotivationinformation securitybehaviortietoturvapolitiikkahenkilöstöpersonneltietoturvakäyttäytyminen
researchProduct

Prosessiteoreettinen näkökulma, joka selittää henkilökohtaisen tietokoneen käyttöön liittyvää tietoturvakäyttäytymisen muutosta

2016

IS security behavior has become a mainstream topic in information systems. Extent research is dominated with the viewpoint for discovery of generic and stable predictors. The viewpoint rests on the implicit assumption that information security behavior can be explained by discovering these factors. The best know examples are IS security behavior models grounded upon Protection Motivation Theory (PMT) and the Deterrence Theory (DT). The success of this perspective hinges on the question as to what extend the IS security behavior and the reasons for it, are constant from time to time and from one specific security situation to another. The viewpoint is successful if computer users have built …

motivaatiosubjective construction of realitytarpeetIS security practicesprosessiteoriasubjektiivisuustietoturvakäyttäytyminenIS securitymotivestunteetkokemuksetmotivaatiopsykologiatietoturvakäyttäytyminenIS security behavior
researchProduct