60,585 research outputs found

    Conceivable security risks and authentication techniques for smart devices

    Get PDF
    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques

    Interpretable detection of unstable smart TV usage from power state logs

    Get PDF
    Power state logs from smart TVs are collected in order to construct a time-series representation of their usage. Time-series that belong to a TV exhibiting instability problems are classified accordingly. To do so, an automated feature extraction approach is used, together with linear classification methods in order to realise interpretable classification decisions. A normalized true positive rate of 0.84 ± 0.10 is obtained for the classification. The normalized true negative rate equals 0.80 ± 0.03. The final model returns a regularity statistic called the Approximate Entropy as its most important feature

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    Ossining, Town of and Town of Ossining Police Association (2006)

    Get PDF

    Impact of violence against women on severe acute maternal morbidity in the intensive care unit, including neonatal outcomes: a case–control study protocol in a tertiary healthcare facility in Lima, Peru

    Get PDF
    Introduction Preventing and reducing violence against women (VAW) and maternal mortality are Sustainable Development Goals. Worldwide, the maternal mortality ratio has fallen about 44% in the last 25 years, and for one maternal death there are many women affected by severe acute maternal morbidity (SAMM) requiring management in the intensive care unit (ICU). These women represent the most critically ill obstetric patients of the maternal morbidity spectrum and should be studied to complement the review of maternal mortality. VAW has been associated with all-cause maternal deaths, and since many women (30%) endure violence usually exerted by their intimate partners and this abuse can be severe during pregnancy, it is important to determine whether it impacts SAMM. Thus, this study aims to investigate the impact of VAW on SAMM in the ICU. Methods and analysis This will be a prospective case-control study undertaken in a tertiary healthcare facility in Lima-Peru, with a sample size of 109 cases (obstetric patients admitted to the ICU) and 109 controls (obstetric patients not admitted to the ICU selected by systematic random sampling). Data on social determinants, medical and obstetric characteristics, VAW, pregnancy and neonatal outcome will be collected through interviews and by extracting information from the medical records using a pretested form. Main outcome will be VAW rate and neonatal mortality rate between cases and controls. VAW will be assessed by using the WHO instrument. Binary logistic followed by stepwise multivariate regression and goodness of fit test will assess any association between VAW and SAMM. Ethics and dissemination Ethical approval has been granted by the La Trobe University, Melbourne-Australia and the tertiary healthcare facility in Lima-Peru. This research follows the WHO ethical and safety recommendations for research on VAW. Findings will be presented at conferences and published in peer-reviewed journals

    Biometrics and Network Security

    Get PDF
    This paper examines the techniques used in the two categories of biometric techniques (physiological and behavioral) and considers some of the applications for biometric technologies. Common physiological biometrics include finger characteristics (fingertip [fingerprint], thumb, finger length or pattern), palm (print or topography), hand geometry, wrist vein, face, and eye (retina or iris). Behavioral biometrics include voiceprints, keystroke dynamics, and handwritten signatures

    Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies

    Get PDF
    As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security and potential remedies for victims of data breaches or mishandled data. Ultimately, this Note makes policy proposals for future biometric privacy statutes, particularly recommending a private right of action as the most effective remedy for victims of biometric data breaches

    Assessment of the feasibility of an ultra-low power, wireless digital patch for the continuous ambulatory monitoring of vital signs.

    Get PDF
    BACKGROUND AND OBJECTIVES: Vital signs are usually recorded at 4–8 h intervals in hospital patients, and deterioration between measurements can have serious consequences. The primary study objective was to assess agreement between a new ultra-low power, wireless and wearable surveillance system for continuous ambulatory monitoring of vital signs and a widely used clinical vital signs monitor. The secondary objective was to examine the system's ability to automatically identify and reject invalid physiological data. SETTING: Single hospital centre. PARTICIPANTS: Heart and respiratory rate were recorded over 2 h in 20 patients undergoing elective surgery and a second group of 41 patients with comorbid conditions, in the general ward. OUTCOME MEASURES: Primary outcome measures were limits of agreement and bias. The secondary outcome measure was proportion of data rejected. RESULTS: The digital patch provided reliable heart rate values in the majority of patients (about 80%) with normal sinus rhythm, and in the presence of abnormal ECG recordings (excluding aperiodic arrhythmias such as atrial fibrillation). The mean difference between systems was less than ±1 bpm in all patient groups studied. Although respiratory data were more frequently rejected as invalid because of the high sensitivity of impedance pneumography to motion artefacts, valid rates were reported for 50% of recordings with a mean difference of less than ±1 brpm compared with the bedside monitor. Correlation between systems was statistically significant (p<0.0001) for heart and respiratory rate, apart from respiratory rate in patients with atrial fibrillation (p=0.02). CONCLUSIONS: Overall agreement between digital patch and clinical monitor was satisfactory, as was the efficacy of the system for automatic rejection of invalid data. Wireless monitoring technologies, such as the one tested, may offer clinical value when implemented as part of wider hospital systems that integrate and support existing clinical protocols and workflows

    Governance and information governance: some ethical considerations within an expanding information society

    Get PDF
    Governance and information governance ought to be an integral part of any government or organisations information and business strategy. More than ever before information and knowledge can be produced, exchanged, shared and communicated through many different mediums. Whilst sharing information and knowledge provides many benefits it also provides many challenges and risks to governments, global organisations and the individual citizen. Information governance is one element of a governance and compliance programme, but an increasingly important one, because many regulations apply to how information is managed and protected from theft and abuse, much of which resides with external agencies usually outside the control of the individual citizen. This paper explores some of the compliance and quality issues within governance and information governance including those ethical concerns as related to individual citizens and multiple stakeholders engaged directly or indirectly in the governance process

    Youth athlete leaders\u27 use of transformational behaviours and relations to trust in the leader and sport outcomes

    Get PDF
    Leadership is one of the most crucial factors determining whether a group succeeds or fails (Bass, 1990). Furthermore, leaders displaying transformational behaviours are thought to lift followers to higher levels of motivation to get them to perform beyond expectations (Bass, 1985), and they tend to have followers who are more committed and satisfied (Bass & Riggio, 2006). Another outcome of transformational leadership in organizations is that followers are more willing to trust leaders who show care and concern for the follower (Dirks & Ferrin, 2002). The purpose of the present study was to determine if the use of full range leadership behaviours by formal peer leaders on youth sport teams would relate to trust in the leader. Data were collected at two time points, once near the beginning of the season and again near the end of the season, using several questionnaires including the Multifactor Leadership Questionnaire – Form 5 (Bass & Avolio, 2004). Only data from participants who were present at both data collection points were included in the analyses of study hypotheses, which included 126 athletes (77 females, 49 males; mean age = 15.49) from 12 interdependent sport teams. It was found that perceptions of full range leadership were related to cognitive- and affect-based trust at both time points. Interestingly, the transformational components inspirational motivation and idealized influence (attributed) contributed positively, and the non-leadership component laissez-faire negatively, to the relationship with affect-based trust at both time points. The results of the current study also found that both transformational leadership behaviours and higher levels of trust related to athletes perceiving their leader as being effective and satisfying, as well as being willing to put in extra effort. The results lead to the suggestion that youth peer leaders’ use of transformational behaviours will promote higher levels of trust from their teammates, over and above the use of transactional and non-leadership behaviours
    • …
    corecore