957 research outputs found

    Strategies to Protect Against Security Violations During the Adoption of the Internet of Things by Manufacturers

    Get PDF
    Security violations have been one of the key factors affecting manufacturers in adopting the Internet of Things (IoT). The corporate-level information technology (IT) leaders in the manufacturing industry encounter issues when adopting IoT due to security concerns because they lack strategies to protect against security violations. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative multiple case study was to explore strategies corporate-level IT leaders use in protecting against security violations while adopting IoT for manufacturers. The participants were senior IT leaders in the eastern region of the United States. The data collection process included interviews with corporate-level IT leaders (n = 6) and examination of company documents (n = 10). The data analysis process involved searching patterns for words, codes, or themes and their relationships to confirm the findings. During analysis, four major themes emerged: relevance of securing IoT devices in IoT adoption, identifying and separating personal and confidential data from analytical data, adequate budget for securing IoT network devices and infrastructure as key factors in IoT adoption, and risk mitigation policy relevant to securing IoT devices. The implications for positive social change include the potential for corporate-level IT leaders to develop tools that will detect threats, prevent malicious attacks, and monitor IoT networks for any IoT device vulnerabilities. Improved protection from security violations may result in more efficient ways for people to use natural resources. Additionally, there may be a wider usage of smartphones connected to IoT to simplify people’s lives

    Exploring Security, Privacy, and Reliability Strategies to Enable the Adoption of IoT

    Get PDF
    The Internet of things (IoT) is a technology that will enable machine-to-machine communication and eventually set the stage for self-driving cars, smart cities, and remote care for patients. However, some barriers that organizations face prevent them from the adoption of IoT. The purpose of this qualitative exploratory case study was to explore strategies that organization information technology (IT) leaders use for security, privacy, and reliability to enable the adoption of IoT devices. The study population included organization IT leaders who had knowledge or perceptions of security, privacy, and reliability strategies to adopt IoT at an organization in the eastern region of the United States. The diffusion of innovations theory, developed by Rogers, was used as the conceptual framework for the study. The data collection process included interviews with organization IT leaders (n = 8) and company documents and procedures (n = 15). Coding from the interviews and member checking were triangulated with company documents to produce major themes. Through methodological triangulation, 4 major themes emerged during my analysis: securing IoT devices is critical for IoT adoption, separating private and confidential data from analytical data, focusing on customer satisfaction goes beyond reliability, and using IoT to retrofit products. The findings from this study may benefit organization IT leaders by enhancing their security, privacy, and reliability practices and better protect their organization\u27s data. Improved data security practices may contribute to social change by reducing risk in security and privacy vulnerabilities while also contributing to new knowledge and insights that may lead to new discoveries such as a cure for a disease

    The Personal protective technology program at NIOSH: reviews of research programs of the National Institute for Occupational Safety and Health

    Get PDF
    Maintaining the health and safety of workers in the United States and globally is accomplished in part by reducing hazardous exposures through the use of personal protective equipment. Personal protective technologies (PPT) include respirators worn by construction workers and miners; protective clothing, respirators, and gloves worn by firefighters and mine rescue workers; and respirators and protective clothing worn by healthcare workers. An estimated 5 million workers are required to wear respirators in 1.3 million U.S. workplaces. For some occupations, such as firefighting, the worker's protective equipment is the only form of protection against life-threatening hazards; for other workers, the PPT is a supplement to ventilation and other environmental, engineering, or administrative hazard controls. In the United States, federal responsibility for civilian worker PPT is integral to the mission of the National Institute for Occupational Safety and Health (NIOSH). This book examines the NIOSH Personal Protective Technology Program (PPT Program) and specifically focuses on the relevance and impact of this program in reducing hazardous exposures and improving worker health and safety.Summary -- 1. Introduction -- 2. Relevance of the NIOSH PPT Program -- 3. Impact of the NIOSH PPT Program -- 4. Emerging issues and research areas in personal protective technology -- 5. Recommendations for PPT program improvement -- Appendix A: Framework for the review of research programs of the National Institute for Occupational Safety and Health -- Appendix B: Methods: Committee information gathering -- Appendix C: Information Provided by the NIOSH PPT Program -- Appendix D: Biographical sketches of committee membersCommittee to Review the NIOSH Personal Protective Technology Program, Board on Health Sciences Policy, Institute of Medicine and National Research Council of the National Academies.Also available via the World Wide Web.Includes bibliographical references

    Moral Science: Protecting Participants in Human Subjects Research

    Get PDF
    The Presidential Commission for the Study of Bioethical Issues today issued its report concerning federally-sponsored research involving human volunteers, concluding that current rules and regulations provide adequate safeguards to mitigate risk. In its report, “Moral Science: Protecting Participants in Human Subjects Research," the Commission also recommended 14 changes to current practices to better protect research subjects, and called on the federal government to improve its tracking of research programs supported with taxpayer dollars. President Obama requested that the Commission undertake an assessment of research standards following the October 2010 revelation that the U.S. Public Health Service supported unethical research in Guatemala from 1946 to 1948 that involved intentionally exposing thousands of Guatemalans to sexually transmitted diseases without their consent. The President gave the Bioethics Commission two assignments: to oversee a thorough fact-finding investigation into the specifics of the studies (released September 13, 2011); and to assure that current rules for research participants protect people from harm or unethical treatment, domestically as well as internationally.http://bioethics.gov/cms/node/55

    NIOSH Healthcare and Social Assistance Program: Evidence Package 2006-2016

    Get PDF
    This document contains materials to demonstrate the relevance and impact of the Healthcare and Social Assistance Program\u2019s work in the areas of safe and healthy workplaces, musculoskeletal disorders, hazardous drugs and other chemicals, and infectious disease transmission

    Mobile Technology Deployment Strategies for Improving the Quality of Healthcare

    Get PDF
    Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer\u27s health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, followed by within-case and cross-case analyses for triangulation and data saturation. Key themes that emerged from data analysis included the application of disruptive technology in healthcare, ownership and management of mobile health equipment, and cybersecurity. The healthcare CIOs and consultants emphasized their concern about the lack of cybersecurity in mobile technology. CIOs were reluctant to deploy the bring-your-own-device strategy in their organizations. The implications of this study for positive social change include the potential for healthcare CIOs to emphasize the business practice of supporting healthcare providers in using secure mobile equipment deployment strategies to provide enhanced care, safety, peace of mind, convenience, and ease of access to patients while controlling costs

    Digital transformation in healthcare: an innovative business plan for an application digitizing physical rehabilitation

    Get PDF
    The health care system adapts to innovations very slowly, as strict rules control all measures. It is even more challenging when one wants to introduce a digital solution for the healthcare market. Even minor changes to the code can mean major hurdles for approvals. This challenge was taken up in the following master thesis. The status quo of gait analysis has hardly been innovated for decades. The approach of reha buddy is to analyze how a human walks through wireless sensors. This represents an innovation that will revolutionize the market for gait analysis. Above all, trends of the last two years, which were pushed even more by the last pandemic, have shown that there is probably no better time to pursue this project. Additionally, a literature review and expert interviews were conducted to support all statements in the thesis. What is more, for a precise examination of each chapter of the business plan, a market analysis was carried out focusing on all specific characteristics of the health care market. The team of reha buddy has to overcome some major obstacles in the next few years but is well-positioned with their team of experts who set some important milestones for managing those hurdles. The result of this work is a business plan which clarifies that reha buddy's vision has an entrepreneurial foundation and that the team's idea should be pursued.O Sistema de Saúde adapta-se às inovações muito lentamente, uma vez que regras rígidas controlam todas as medidas. É um desafio ainda maior quando se deseja introduzir uma solução digital no setor da Saúde. Mesmo pequenas alterações no código podem significar grandes dificuldades para aprovações. Este desafio é abordado na presente tese de mestrado. O status quo da locomoção praticamente não foi inovado durante décadas. A abordagem do Reha Buddy passa por analisar como um humano se desloca através de sensores sem fios, o que representa uma inovação que irá revolucionar o mercado da locomoção. Acima de tudo, as tendências dos últimos dois anos, que foram impulsionadas ainda mais pela última pandemia, mostraram que provavelmente não há melhor momento para avançar com este projeto. Foi realizada uma revisão de literatura, assim como entrevistas com especialistas com o objetivo de apoiar todas as afirmações. Adicionalmente, para uma análise eficaz de cada capítulo do plano de negócios, foi realizada uma análise de mercado com foco em todas as características específicas do mercado da Saúde. A equipa do Reha Buddy terá que superar alguns obstáculos importantes nos próximos anos; está, no entanto, bem posicionada com a sua equipa de especialistas que estabeleceu alguns marcos importantes para gerir esses obstáculos. O resultado do presente projeto é um plano de negócios que esclarece que a visão do Reha Buddy tem uma base empreendedora e que a ideia apresentada pela equipa deve ser concretizada

    NIOSH strategic plan : FYs 2019-2023

    Get PDF
    Version 4: October 2019"The National Institute for Occupational Safety and Health (NIOSH) studies occupational safety and health through scientific research. The Institute then transforms its research into cost-effective, global work practices. The Occupational Safety and Health Act of 1970 established NIOSH and it is now part of the Centers for Disease Control and Prevention in the U.S. Department of Health and Human Services. NIOSH works with public and private sectors to make work safer, healthier, and more productive for workers, employers, and the nation. The NIOSH Strategic Plan reports research and service goals for fiscal years 2019-2023. These goals address a broad range of occupational health and safety hazards, affecting an ever-changing workforce. Jobs in the U.S. economy continue to shift from manufacturing to services. Longer hours, compressed workweeks, an aging workforce, reduced job security, and part-time and temporary work have also changed the workforce. These changes represents a major challenge for NIOSH as it manages limited resources to address its research portfolio priorities. The NIOSH Strategic Plan introduces strategic, intermediate, and activity goals that guide occupational health and safety research priorities and service work. NIOSH's unique portfolio of research programs includes sector, cross-sector, and core and specialty research programs. These programs perform research that covers a wide range of activities, from basic to applied research. Service work covers non-research work that supports NIOSH's mission or fulfills a legislative mandate. Service work can also support research work within NIOSH and outside with external partners. For example, the Surveillance Program provides data and analysis as a service to both NIOSH's programs and to external partners, while the Health Hazard Evaluation Program provides an external service. NIOSH awards funding priority to outside researchers conducting extramural projects that address the research goals identified in the NIOSH Strategic Plan. NIOSH will also lead new intramural projects to address the goals stated within this plan. NIOSH recognizes that new issues may emerge or become more important during the five-year plan. Goals may be retired because they have been achieved. Priorities may shift in response to changing conditions. NIOSH will add or remove issues based on current or anticipated burden, need, and impact and allocate resources to address these changes. The next section explains how NIOSH develops and organizes its research goals and the section after that focuses on how NIOSH develops and organizes service goals." - NIOSHTIC-2NIOSHTIC no. 20061089NIOSH-Strategic-Plan_V4_Oct-2019_1.pdf20191074
    corecore