6,663 research outputs found
Characteristics of the Audit Processes for Distributed Informatics Systems
The paper contains issues regarding: main characteristics and examples of the distributed informatics systems and main difference categories among them, concepts, principles, techniques and fields for auditing the distributed informatics systems, concepts and classes of the standard term, characteristics of this one, examples of standards, guidelines, procedures and controls for auditing the distributed informatics systems. The distributed informatics systems are characterized by the following issues: development process, resources, implemented functionalities, architectures, system classes, particularities. The audit framework has two sides: the audit process and auditors. The audit process must be led in accordance with the standard specifications in the IT&C field. The auditors must meet the ethical principles and they must have a high-level of professional skills and competence in IT&C field.informatics audit, characteristic, distributed informatics system, standard
Cyber security investigation for Raspberry Pi devices
Big Data on Cloud application is growing rapidly. WhenĀ the cloud is attacked, the investigation relies on digital forensicsĀ evidence. This paper proposed the data collection via Raspberry PiĀ devices, in a healthcare situation. The significance of this work isĀ that could be expanded into a digital device array that takes big dataĀ security issues into account. There are many potential impacts inĀ health area. The field of Digital Forensics Science has been taggedĀ as a reactive science by some who believe research and study in theĀ field often arise as a result of the need to respond to event whichĀ brought about the needs for investigation; this work was carried as aĀ proactive research that will add knowledge to the field of DigitalĀ Forensic Science.
The Raspberry Pi is a cost-effective, pocket sized computer that hasĀ gained global recognition since its development in 2008; with theĀ wide spread usage of the device for different computing purposes.Ā Raspberry Pi can potentially be a cyber security device, which canĀ relate with forensics investigation in the near future. This work hasĀ used a systematic approach to study the structure and operation ofĀ the device and has established security issues that the widespreadĀ usage of the device can pose, such as health or smart city.Ā Furthermore, its evidential information applied in security will beĀ useful in the event that the device becomes a subject of digitalĀ forensic investigation in the foreseeable future. In healthcare system,Ā PII (personal identifiable information) is a very important issue.Ā When Raspberry Pi plays a processor role, its security is vital;Ā consequently, digital forensics investigation on the Raspberry PiesĀ becomes necessary
Formal modelling and design of mobile prescription applications
Adverse drug effects are a major cause of death in the world with tens of thousand deaths occurring each
year because of medication or prescription errors. Many errors involve the prescription or administration of the
wrong drug or dosage by care givers to patients due to illegible handwriting, dosage mistakes, confusing drug
names. With the use of mobile devices such as personal digital assistants and smart phones some of these
errors could be eliminated because they allow prescription information to be captured and viewed in type
rather than handwriting. This paper presents a formal modelling, and design of a prescription application to
improve health care services. This could lead to costs and life savings in healthcare centres across the world
especially in developing countries where treatment processes are usually paper based
Recommended from our members
A Jini-Based Solution for Electronic Prescriptions
In most countries today, handwritten, paper-based
medical prescriptions are the norm.While efforts have been made in the past and are being made at present to migrate toward electronic dispensation of prescriptions, these have generally omitted to incorporate ubiquitous computing technology in their proposed solutions. In this paper, we focus on this issue and describe a Jini-based prototypical solution for electronic prescriptions, which allows for their wireless transmission to in-range pharmacies and the augmentation of the service levels rendered to the user, with, for instance, information about queue lengths and estimated waiting times being provided to the patients. Clinical and user evaluation revealed that there were high levels of
agreement as regards the prototypeās effectiveness, ease of use, and usefulness
Recommended from our members
HMD versus PDA: A comparative study of the user out-of-box experience
The out-of-box experience (OOBE) has been identified as a significant factor contributing to user perception and acceptance of products and technologies. Whilst there has been considerable emphasis placed on formalising methodological procedures for evaluating the OOBE and on the creation of positive user experiences through appropriate interfaces and applications, relatively little work has been undertaken examining how the OOBE is impacted when the experience itself covers a range of (possibly interconnected) devices. In this paper we report the results of an empirical study which examined the OOBE when a Personal Digital Assistant (PDA) and Head Mounted Device (HMD) were configured and then connected for inter-operability purposes. Our findings show that type of device has a considerable impact on the OOBE, with the ask of interconnecting devices having a detrimental effect on the OOBE. The OOBE, however, is in main unaffected by user type and gender
Experimental Study on One-Time Password used in Authentication within Norwegian Banking
Postponed access: the file will be accessible after 2021-06-02Authentication is a vital part of this fast-growing, digitalized world. Fundamentally, todayās society is more reliant on computer technology and digitalization than ever before. Therefore, the use of dynamic one-time passwords plays a significant role within online banking in Norway by strengthening the level of security. This study examines four tokens provided by DNB, Sparebanken MĆøre, Sparebank 1 and Nordea used in token-based authentication and the one-time passwords they generate. By studying one-time passwords collected at various time intervals, it was able to reconstruct the internal token-algorithm and the verification protocol. This research argues that three out of four tokens indicate weaknesses that can have damaging effects. This is also proven by explaining a basic theoretical attack, which demonstrates that the success probability of an attack is higher than the expected probability of 10^(-6) or 10^(-8).MasteroppgĆ„ve i informatikkINF399MAMN-PROGMAMN-IN
Modified Authentication using One Time Password to SupportWeb Services Security
Freshness in accessing a web service is a challenge identified
by the security of the website itself. It usually including
advantages and disadvantages on architecture security
and the machine language used by the site. With the recent
technology available completed by sufficient information
about risks thread in web services, there are a lot of
things to be concerned. In this paper, we try to inform
what actually a web service is, what are the risks we will
face, and several techniques in handling web services security.
This paper also propose a new design of authentication
model added with one-time password (OTP) generatorsource
code written in Java, as a technique to enhance its
security
- ā¦