678 research outputs found

    Enhancing pharmaceutical packaging through a technology ecosystem to facilitate the reuse of medicines and reduce medicinal waste

    Get PDF
    The idea of reusing dispensed medicines is appealing to the general public provided its benefits are illustrated, its risks minimized, and the logistics resolved. For example, medicine reuse could help reduce medicinal waste, protect the environment and improve public health. However, the associated technologies and legislation facilitating medicine reuse are generally not available. The availability of suitable technologies could arguably help shape stakeholders’ beliefs and in turn, uptake of a future medicine reuse scheme by tackling the risks and facilitating the practicalities. A literature survey is undertaken to lay down the groundwork for implementing technologies on and around pharmaceutical packaging in order to meet stakeholders’ previously expressed misgivings about medicine reuse (’stakeholder requirements’), and propose a novel ecosystem for, in effect, reusing returned medicines. Methods: A structured literature search examining the application of existing technologies on pharmaceutical packaging to enable medicine reuse was conducted and presented as a narrative review. Results: Reviewed technologies are classified according to different stakeholders’ requirements, and a novel ecosystem from a technology perspective is suggested as a solution to reusing medicines. Conclusion: Active sensing technologies applying to pharmaceutical packaging using printed electronics enlist medicines to be part of the Internet of Things network. Validating the quality and safety of returned medicines through this network seems to be the most effective way for reusing medicines and the correct application of technologies may be the key enabler

    Pharmaceutical Quality and Policy in Nigeria: Stakeholder Perspectives and Validation of the Mobile Authentication Service

    Get PDF
    Background Medicines that are of poor quality present a challenge to many countries especially the developing countries. Many interventions against medicines counterfeiting are often not evaluated and qualitative fieldwork to find how stakeholders perceive the problem of poor quality medicines is currently lacking. Aims 1) To conduct a systematic review of the literature 2) To validate the Mobile Authentication Service (MAS) 3) To explore stakeholder experiences and perceptions of the current situation of medicines counterfeiting and quality of medicines distributed in Nigeria. Methods 1) A quantitative study involving Short Message Service (SMS) authentication of tagged Glucophage® (metformin) samples, packaging and chemical (Near Infrared spectroscopyand High Performance Liquid Chromatography) analysis of metformin samples, randomly selected from retail outlets in Lagos, Nigeria, 2) A qualitative study involving semi-structured interviews with different stakeholders. Results The results of the SMS authentication agree with that of packaging and chemical analyses. The Glucophage® samples were significantly different in quality from the generic versions in terms of the concentration of active ingredient with a p value of 0.006. This difference in quality was in favour of the innovator brand, Glucophage® and it is similar to the findings from the qualitative interviews where majority of the participants perceived innovator brands better in quality than their generic versions. Majority of the participants felt that the problem of poor quality medicines in Nigeria is decreasing. Increase in cost of medicines, poor dispensing practices, poor phone network, time constraints, consumer trust in medicine sellers, low level of awareness and complacency by the consumers were identified as factors that may be a barrier to the use of MAS. Conclusion MAS seem to be successful in helping consumers authenticate their medicines. However, recommendations arising from this study should be adopted to overcome barriers to its use. Substandard medicines may present a greater challenge than medicines counterfeiting and should therefore not be neglected

    Android forensics: Automated data collection and reporting from a mobile device

    Get PDF
    As Android smartphones gain popularity, industry and government will face increasing pressure to integrate them into their environments. The implementation of these devices on an enterprise can save on costs and add capabilities previously unavailable; however, the organizations that incorporate this technology must be prepared to mitigate the associated risks. These devices can contain vast amounts of personal and work-related data that can impact internal investigations, including (but not limited to) those of policy violations, intellectual property theft, misuse, embezzlement, sabotage, and espionage. Physical access has been the traditional method for retrieving data useful to these investigations from Android devices, with the exception of some limited collection abilities in commercial mobile device management systems and remote enterprise forensics tools. As part of this thesis, a prototype enterprise monitoring system for Android smartphones was developed to continuously collect many of the data sets of interest to incident responders, security auditors, proactive security monitors, and forensic investigators. Many of the data sets covered were not found in other available enterprise monitoring tools. The prototype system neither requires root access privileges nor exploiting weaknesses in the Android architecture for proper operation, thereby increasing interoperability among Android devices and avoiding a spyware classification for the system. An anti-forensics analysis on the system was performed to identify and further strengthen areas vulnerable to tampering. The results of this research include the release of the first open-source Android enterprise monitoring solution of its kind, a comprehensive guide of data sets available for collection without elevated privileges, and the introduction of a novel design strategy implementing various Android application components useful for monitoring on the Android platform

    Fingerprint Verification Using Spectral Minutiae Representations

    Get PDF
    Most fingerprint recognition systems are based on the use of a minutiae set, which is an unordered collection of minutiae locations and orientations suffering from various deformations such as translation, rotation, and scaling. The spectral minutiae representation introduced in this paper is a novel method to represent a minutiae set as a fixed-length feature vector, which is invariant to translation, and in which rotation and scaling become translations, so that they can be easily compensated for. These characteristics enable the combination of fingerprint recognition systems with template protection schemes that require a fixed-length feature vector. This paper introduces the concept of algorithms for two representation methods: the location-based spectral minutiae representation and the orientation-based spectral minutiae representation. Both algorithms are evaluated using two correlation-based spectral minutiae matching algorithms. We present the performance of our algorithms on three fingerprint databases. We also show how the performance can be improved by using a fusion scheme and singular points

    Putting the ‘digital’ in Digital Intermediaries: the role of technical infrastructure in building business models

    Get PDF
    Digital Technology Innovation and Financial Business Practices The UK economy has a huge dependence on financial services, and this is increasingly based on digital platforms. Innovating new economic models around consumer financial services through the use of digital technologies is seen as increasingly important in developed economies. There are a number of drivers for this, ranging from national economic factors to the prosaic nature of enabling cheap, speedy and timely interactions for users. The potential for these new digital solutions is that they will allay an over-reliance on the traditional banking sector, which has proved itself to be unstable and risky, and we have seen a number of national policy moves to encourage growth in this sector. Partly as a result of the 2008 banking crisis, there has been an explosion in peer-to-peer financial services for non-professional consumers. These organisations act as intermediaries between users looking to trade goods or credit. However, building self-sustaining or profitable financial services within this novel space is itself fraught with commercial, regulatory, technical and social problems. This report addresses the mutual shaping of business models and innovations in digital technical infrastructure – both client-facing and administrative back-end – in two retail financial products currently in use in the United Kingdom: peer-to-peer consumer lending and a local digital/paper hybrid currency system. The two products and their issuing firms, Zopa Limited (Zopa) and The Bristol Pound Community Interest Company (the Bristol Pound), respectively, are established leaders in their respective product areas: Zopa was established in 2005 and the Bristol Pound in 2010. Each of these firms seeks to disrupt an established financial market through the application of digital technologies and processes: consumer lending for Zopa and retail payment for the Bristol Pound. Our research has involved teams from Lancaster University examining Zopa and Brunel University focusing on the Bristol Pound over approximately a one-year period from October 2013 to October 2014. Extensive interviews, document analysis, observation of user interactions, and other methods have been employed to develop the process analyses of the firms presented here. This report is comprised of three primary sections: descriptions of the business and technological processes of each of Zopa and the Bristol Pound, and a final analytical section drawing preliminary conclusions from the research presented.3DaRoC is funded by the UK’s Digital Economy ‘Research in the Wild’ initiative. It has a substantial research budget of over £320K, with £35K of additional industrial support

    Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions

    Get PDF
    Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones. The present research is aimed at helping the IT environment get a more precise view over the phishing attacks in Romania; in order to achieve this goal we have designed an application able to retrieve and interpret phishing related data from five other trusted web sources and compile them into a meaningful and more targeted report. As a conclusion, besides making available regular reports, we underline the need for a higher degree of awareness related to this issue.Security, Phishing, Ev-SSL, Security Solutions

    The Digitalisation of African Agriculture Report 2018-2019

    Get PDF
    An inclusive, digitally-enabled agricultural transformation could help achieve meaningful livelihood improvements for Africa’s smallholder farmers and pastoralists. It could drive greater engagement in agriculture from women and youth and create employment opportunities along the value chain. At CTA we staked a claim on this power of digitalisation to more systematically transform agriculture early on. Digitalisation, focusing on not individual ICTs but the application of these technologies to entire value chains, is a theme that cuts across all of our work. In youth entrepreneurship, we are fostering a new breed of young ICT ‘agripreneurs’. In climate-smart agriculture multiple projects provide information that can help towards building resilience for smallholder farmers. And in women empowerment we are supporting digital platforms to drive greater inclusion for women entrepreneurs in agricultural value chains

    Real Implantation for SMS Encryption–Based on Android Message Application

    Get PDF
    Short Message Service (SMS) is a very popular way for mobile phone and portable device users to send and receive simple text messages. Unfortunately, SMS does not offer a secure environment for confidential data during transmission. This paper deals with an SMS encryption for mobile communication on Android message application. The transmission of an SMS in mobile communication is not secure. Therefore, we have implemented three of block cipher symmetric cryptography algorithms (i.e. AES algorithm, DES, and 3-DES) and compared between three of them in terms of encryption and decryption delay time. This provides a guideline for the choice of the most suitable cryptography algorithm for mobile communication on Android message application.  From our experiment tests, the DES encryption algorithm has low encryption delay time in different message sizes (i.e. 32, 64,128,256,512, and 1024) bit. Keywords: SMS, Mobile Application, Android, Encryptio

    News – European Union

    Get PDF
    corecore