166,005 research outputs found

    Future challenges and recommendations

    Get PDF
    Rapid advances in information technology and telecommunications, and in particular mobile and wireless communications, converge towards the emergence of a new type of “infostructure” that has the potential of supporting a large spectrum of advanced services for healthcare and health. Currently the ICT community produces a great effort to drill down from the vision and the promises of wireless and mobile technologies and provide practical application solutions. Research and development include data gathering and omni-directional transfer of vital information, integration of human machine interface technology into handheld devices and personal applications, security and interoperability of date and integration with hospital legacy systems and electronic patient record. The ongoing evolution of wireless technology and mobile device capabilities is changing the way healthcare providers interact with information technologies. The growth and acceptance of mobile information technology at the point of care, coupled with the promise and convenience of data on demand, creates opportunities for enhanced patient care and safety. The developments presented in this section demonstrate clearly the innovation aspects and trends towards user oriented applications

    Mobile and Wireless Information Systems: Applications, Networks, and Research Problems

    Get PDF
    Mobile and Wireless Information Systems received considerable interest in research and development communities. As a result, significant advances were made, which will affect our life both as users and researchers of mobile and wireless technologies. In this paper, we discuss both the current state of mobile and wireless information systems and the challenges in the wide-scale deployment and use of these systems. In particular, we address applications, wireless networks, mobile payments, security, challenges and research problems

    Gathering experience in trust-based interactions

    Get PDF
    As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the shift towards ubiquitous computing systems it is becoming increasingly clear that security is a major concern. While this is true of all computing paradigms, the characteristics of ubiquitous systems amplify this concern by promoting spontaneous interaction between diverse heterogeneous entities across administrative boundaries [5]. Entities cannot therefore rely on a specific control authority and will have no global view of the state of the system. To facilitate collaboration with unfamiliar counterparts therefore requires that an entity takes a proactive approach to self-protection. We conjecture that trust management is the best way to provide support for such self-protection measures

    Managing Security Issues and the Hidden Dangers of Wearable Technologies

    Get PDF
    © 2017 by IGI Global. All rights reserved. Advances in mobile computing have provided numerous innovations that make people\u27s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices

    Cyber-security internals of a Skoda Octavia vRS:a hands on approach

    Get PDF
    The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . . ). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified

    Aplicaciones móviles en salud: potencial, normativa de seguridad y regulación

    Get PDF
    The objective of the present study is to analyze the implications and the potential of the denominated mobile health or mHealth, as well as to revise the normative and regulations about security, developed by mobile applications in health. The use of mobile technologies to support the achievement of health goals has the potential to transform health care delivery worldwide. This includes rapid advances in technology and the exponential growth of mobile applications, leading to new opportunities for the integration of mobile health into health services. However, the quality of these applications is very variable, in terms of both their content and their functionality. Many of them are of doubtful reliability and most are not integrated into the health care system. This disorderly growth makes it necessary to establish regulatory mechanisms to ensure that these applications are used safely. The present paper discusses the steps taken on an international, regional and national level (Spain) to regulate the professional and patient use of mobile health applications and other applications aimed at disease prevention and the building of healthy habits. An analysis of the most outstanding health regulations in the field reveals that some of the applications considered to be safe by some regulatory agencies, do not pass some of the mobile security tests, such as the OWASP, established by the Open Web Application Security Project. It is therefore recommended that steps are taken to minimize the possible risks of using mobile health applications
    corecore