370 research outputs found

    The development of mobile health-care in China

    Get PDF
    The background for this dissertation is a preliminary discussion on the brief history and current status of China mobile health development, in order to provide reference for China future mobile healthcare. The main research object is the development of China Mobile health. The main results of this study are mainly reflected in four aspects. 1. Through the research and analysis of a large amount of literature, we see that mobile health is in a period of rapid development, new production and service models are emerging, support policies are obvious, and market demand is huge. 2. It is concluded that mobile medicine represents a high proportion in the overall mobile medical products, it shows broad development prospects and prominent potential legal risks, so inquiry mobile medicine has a distinct representative position in the research of mobile medical legal issues. 3. The public is still used to choose the general hospital registration mode, and they do not fully understand the online consultation mode and also remain skeptical of its safety. Operators should vigorously promote the characteristics of their products, not only focusing on common projects, otherwise it will be difficult to win in the medical app industry which has a large base and strong competitiveness. 4. “Ping An good doctor" and the problems existing in the mobile medical market medical app homogenization are relatively serious, user personal information security problems need to be solved, user trust is unsatisfactory and there is a lack of standard foundation, capital management and business model are not mature, all of which make profit more difficult.O quadro contextual desta dissertação é uma discussão preliminar relativa à breve história e o estado atual do desenvolvimento da oferta de serviços de saúde por telemóvel na China, na perspetiva da sua evolução futura. O objeto de investigação é o desenvolvimento a oferta de serviços de saúde por telemóvel na China. Os principais resultados estão refletidos nos seguintes quatro pontos: 1.Percebeu-se que a indústria de oferta de serviços de saúde por telemóvel encontra-se num rápido desenvolvimento onde novas ofertas de produtos e serviços emergem, a sustentação de políticas públicas é óbvia e a procura é elevada; 2.O serviço de consulta médica por telemóvel representa uma elevada proporção no cômputo global de oferta de produtos médicos via telemóvel e há clara evidência na sua evolução como também em possíveis incumprimentos legais de modo que as questões de consultas médicas por telemóvel têm uma representatividade clara nos trabalhos de investigação nesta área. 3.O público continua a preferir o registo para consultas hospitalares via telemóvel e compreendem mal o modo de consulta online e têm dúvidas quanto à sua segurança. Os operadores devem promover vigorosamente as características dos seus novos produtos e não focar nos lugares comuns, caso contrário será difícil ter sucesso na indústria de serviços médicos por telemóveis. 4.O estudo de caso da empresa “Ping Na good doctor” revela os problemas existentes na indústria de serviços médicos por telemóvel, nomeadamente, na segurança de informação dos doentes, na confiança e na gestão de orçamentos de modo que torna difícil a criação de valor

    BioSecure: white paper for research in biometrics beyond BioSecure

    Get PDF
    This report is the output of a consultation process of various major stakeholders in the biometric community to identify the future biometrical research issues, an activity which employed not only researchers but representatives from the entire biometrical community, consisting of governments, industry, citizens and academia. It is one of the main efforts of the BioSecure Network of Excellence to define the agenda for future biometrical research, including systems and applications scenarios

    Detecting Abnormal Behavior in Web Applications

    Get PDF
    The rapid advance of web technologies has made the Web an essential part of our daily lives. However, network attacks have exploited vulnerabilities of web applications, and caused substantial damages to Internet users. Detecting network attacks is the first and important step in network security. A major branch in this area is anomaly detection. This dissertation concentrates on detecting abnormal behaviors in web applications by employing the following methodology. For a web application, we conduct a set of measurements to reveal the existence of abnormal behaviors in it. We observe the differences between normal and abnormal behaviors. By applying a variety of methods in information extraction, such as heuristics algorithms, machine learning, and information theory, we extract features useful for building a classification system to detect abnormal behaviors.;In particular, we have studied four detection problems in web security. The first is detecting unauthorized hotlinking behavior that plagues hosting servers on the Internet. We analyze a group of common hotlinking attacks and web resources targeted by them. Then we present an anti-hotlinking framework for protecting materials on hosting servers. The second problem is detecting aggressive behavior of automation on Twitter. Our work determines whether a Twitter user is human, bot or cyborg based on the degree of automation. We observe the differences among the three categories in terms of tweeting behavior, tweet content, and account properties. We propose a classification system that uses the combination of features extracted from an unknown user to determine the likelihood of being a human, bot or cyborg. Furthermore, we shift the detection perspective from automation to spam, and introduce the third problem, namely detecting social spam campaigns on Twitter. Evolved from individual spammers, spam campaigns manipulate and coordinate multiple accounts to spread spam on Twitter, and display some collective characteristics. We design an automatic classification system based on machine learning, and apply multiple features to classifying spam campaigns. Complementary to conventional spam detection methods, our work brings efficiency and robustness. Finally, we extend our detection research into the blogosphere to capture blog bots. In this problem, detecting the human presence is an effective defense against the automatic posting ability of blog bots. We introduce behavioral biometrics, mainly mouse and keyboard dynamics, to distinguish between human and bot. By passively monitoring user browsing activities, this detection method does not require any direct user participation, and improves the user experience

    Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review

    Get PDF
    Strategic investment(s) in vehicle automation technologies led to the rapid development of technology that revolutionised transport services and reduced fatalities on a scale never seen before. Technological advancements and their integration in Connected Autonomous Vehicles (CAVs) increased uptake and adoption and pushed firmly for the development of highly supportive legal and regulatory and testing environments. However, systemic threats to the security and privacy of technologies and lack of data transparency have created a dynamic threat landscape within which the establishment and verification of security and privacy requirements proved to be an arduous task. In CAVs security and privacy issues can affect the resilience of these systems and hinder the safety of the passengers. Existing research efforts have been placed to investigate the security issues in CAVs and propose solutions across the whole spectrum of cyber resilience. This paper examines the state-of-the-art in security and privacy solutions for CAVs. It investigates their integration challenges, drawbacks and efficiencies when coupled with distributed technologies such as Blockchain. It has also listed different cyber-attacks being investigated while designing security and privacy mechanism for CAVs

    Security Enhanced Applications for Information Systems

    Get PDF
    Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments

    Development of a mini-program "My Health" medical records management

    Full text link
    С ростом популярности смартфонов, они не только делают жизнь людей более удобной, но и помогают им управлять информацией о своем физическом здоровье с помощью приложений. Основной задачей данной работы является разработка и внедрение мини-программы для здоровья, которая может помочь пользователям управлять своими медицинскими записями. Проектирование и внедрение продукта будет основано на перспективе пользовательского опыта, анкетном опросе, основанном на модели Кано и анализе AHP, а также исследовании и анализе теорий, связанных с интерфейсом мини-программы здоровья WeChat, в сочетании с проектными кейсами для выяснения поведения и потребностей пользователей в процессе эксплуатации и опыта.With the popularity of smartphones, it not only makes people's lives more convenient but also helps them manage their physical health information through applications. The main task of this work is to design and implement a health mini-program that can help users manage their medical records. The design and implementation of the product will be based on the perspective of user experience, a questionnaire survey based on the Kano model and AHP analysis, as well as research and analysis of theories related to the interface of the health WeChat mini-program, combined with design cases to clarify the behavior and needs of users in the process of operation and experience

    Development of secured algorithm to enhance the privacy and security template of biometric technology

    Get PDF
    A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Mathematical and Computer Science and Engineering of the Nelson Mandela African Institution of Science and TechnologyThe security of information and personal privacy are the growing concerns in today’s human life worldwide. The storage of biometric data in the database has raised the prospect of compromising the database leading to grave risks and misuse of the person’s privacy such as growth in terrorism and identity fraud. When a person’s biometric data stored is revealed, their security and privacy are being compromised. This research described a detailed evaluation on several outbreaks and threats associated with the biometric technology. It analyzed the user’s fear and intimidations to the biometric technology alongside the protection steps for securing the biometric data template in the database. It is known that, when somebody’s biometric data template is compromised from the database that consequently might indicate proof of identity robbery of that person. Mixed method to compute and articulate the results as well as a new tactic of encryption-decryption algorithm with a design pattern of Model View Template (MVT) are used for securing the biometric data template in the database. The model managed information logically, the view indicated the visualization of the data, and the template directed the data migration into pattern object. Factors influencing fear of biometric technology such as an exposer of personal information, improper data transfer, and data misuse are found. Strong knowledge of the ideal technology like the private skills of the biometric technology, data secrecy and perceived helpfulness are established. The fears and attacks along the technology like a counterfeit of documents and brute-force attack are known. The designed algorithm based on the cryptographic module of the Fernet keys instance are utilized. The Fernet keys are combined to generate a multiFernet key, integrated with biometric data to produce two encrypted files (byte and text file). These files are incorporated with Twilio message and firmly stored in the database. The storage database has security measures that guard against an impostor’s attack. The database system can block the attacker from unauthorized access. Thus, significantly increased individual data privacy and integrity

    MLAT Jiu-Jitsu and Tor: Mutual Legal Assistance Treaties in Surveillance

    Get PDF
    A corrupt Australian Law Enforcement Agency (LEA) wishes to track the communications of a journalist who has published leaked whistleblowing documents from a confidential source, revealing the Australian LEA\u27s complicity in illegal narcotics activity. The target journalist lives in New York and is a U.S. citizen. She opens her laptop, goes online and fires up Tor Browser. She is communicating with her whistleblowing source in Australia, who faces death if his identity is uncovered. Her communication and network traffic passes through Tor relays in Canada, Finland, and Malaysia before arriving at her source in Australia

    Cyber resilience of e-government: comparative case analysis of Estonia and South Korea

    Get PDF
    E-government has evolved throughout modern times and shaped the new norm of governance. While global society pays more attention to this next-generation platform than before, it is also true that state actors should build up a robust security strategy to protect e-government and their extended territory in cyberspace. At the same time, a high level of digitalization does not always mean their e-government framework is also strong enough to endure external threats. This thesis examines the difference in security preparedness of e-government by comparing a set of countries that have similarly well-developed online government but are lagging in the cyber defense aspect. In order to examine this, the research used cyber resilience as a conceptual framework to analyze several factors that cause differences. This concept overcomes the blind spot of the traditional cyber security approach and points out the relation with conventional hard security study. To uncover the differences in cyber security of e-government, this study picks up Estonia as a successful model and South Korea as the opposite. Based on cyber resilience, the thesis identifies external and internal factors including regional security, nature of neighbors, and internal factors triggering variance within these countries.https://www.ester.ee/record=b5439277*es

    Міжнародна інформація : методичні рекомендації

    Get PDF
    Видання містить комплекс завдань: тематику лекційного курсу, семінарські заняття, перелік питань для самоконтролю, список рекомендованих джерел, словник основних понять та міжнародних організацій. Для бакалаврів галузі знань 0302 «міжнародні відносини», напряму підготовки 6.030201 «міжнародні відносини»
    corecore