99 research outputs found

    Information Sharing and Emergency Services: An Examination Using Information Security Principles

    Get PDF
    Though hospital information systems have been extensively studied as a technology and there is now a growing body of literature in the area of infrastructure interdependencies, the dependencies of civil and built infrastructure on the health care information infrastructure (HII) is understudied. In particular, there is no study to our knowledge that addresses the issue of Hospital Information Infrastructure in the context of disasters. This study explores how an organization’s information systems infrastructure is affected by disasters and examines the relationship between organizational resilience and information infrastructure effectiveness by using conceptual model

    The Role of Consequences in Securing Cyber-Physical Systems

    Get PDF
    The importance of cybersecurity of cyber-physical systems is increasing across the wide spectrum of critical infrastructure systems and resulting in governmental attention to methods of reducing risks. Although these systems use computers to manage the communication and control of the processes, the systems are distinctly different from IT systems in business. Securing these cyber-physical systems require a different approach and set of tools. There are some unique characteristics of the physical systems under control that can be used to help mitigate risks associated with control system failures. This paper examines how security measures need to take a wider approach than just application of IT controls to a new environment if one is interested in truly managing the risk of these systems

    What the Graduate Needs to Know about Operational Information Security

    Get PDF
    Information security is becoming ever more important in our daily lives. Every day there are headlines concerning cyber attacks on government organizations, private and public firms and individuals. Colleges and universities have shown a strong interest in teaching information assurance because of the growing number if high paying jobs for graduates. The federal government has been backing information security education for years with numerous scholarship programs, center of academic excellence programs, and research funding. One of the challenges associated with teaching information security is how does one decide what belongs in a particular curriculum and what does not. The emphasis in cyber security is shifting from the traditional vulnerability prevention to risk assessment and protecting the digital assets in a near real time environment. The purpose of this paper is to examine the needs of industry and graduates in an attempt to create an educational program that assists in the placement and future success of graduates in cyber security careers

    Contrasting the CSEC 2017 and the CAE Designation Requirements

    Get PDF
    The draft 2017 Cybersecurity Curricula, also called CSEC2017, is being developed to provide guidelines for cybersecurity curricula development. One component, the Knowledge Areas, includes Knowledge Units. This terminology is the same as is used for the U.S. NSA/DHS Centers of Academic Excellence in various disciplines of cybersecurity. The two are different, yet complementary. In order to aid faculty and others in understanding the difference between the two programs, this paper explores both the CSEC2017 and CAE academic designation criteria, and compares and contrasts them

    Re-examining the Information Systems Security Problem from a Systems Theory Perspective

    Get PDF
    This theoretical paper discusses a recent shift in cyber attackers’ interest away from traditional network and operating systems vulnerabilities and towards application level security flaws in end user systems. The authors argue that this shift signals a strong need to re-examine the way that security is addressed during the systems development process. Most of the systems development methodologies currently used do not contain formal processes for dealing with the interconnected complexity and risks associated with today’s computing environments. Using systems theory as a theoretical lens, the fundamental processes of current systems development methodologies are analyzed and weaknesses in their ability to deal with these environmental factors are discussed. The authors then present a proposed holistic framework for integrating security into existing systems development methods. The paper concludes with a discussion of the need for more scholarly research in this area and suggestions for future research directions are offered

    P300 amplitude is insensitive to working memory load in schizophrenia

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Working memory (WM) tasks usually elicit a P300 ERP component, whose amplitude decreases with increasing WM load. So far, this effect has not been studied in schizophrenics (SZs), a group that is considered to have an aberrant brain connectivity and impairments in WM capacity. The aim of this study was to determine the dependency of the P300 component on WM load in a sample of SZ subjects.</p> <p>Methods</p> <p>We recorded 26 subjects (13 SZ patients and their matched controls) with an 80-channel electroencephalogram. Subjects performed an N-back task, a WM paradigm that manipulates the number of items to be stored in memory.</p> <p>Results</p> <p>In healthy subjects, P300 amplitude was highest in the low WM load condition, and lowest in both the attentional control condition and the high WM load condition. In contrast, SZs evidenced low P300 amplitude in all conditions. A significant between group difference in P300 amplitude was evidenced only at the low WM load condition (1 -back), being smaller in SZs.</p> <p>Conclusions</p> <p>SZ subjects display a lower than normal P300 amplitude, which does not vary as a function of memory load. These results are consistent with a general impairment in WM capacity in these patients.</p

    Complete Sequences of the Mitochondrial DNA of the Wild Gracilariopsis lemaneiformis and Two Mutagenic Cultivated Breeds (Gracilariaceae, Rhodophyta)

    Get PDF
    The complete mitochondrial DNA (mtDNA) of Gracilariopsis lemaneiformis was sequenced (25883 bp) and mapped to a circular model. The A+T composition was 72.5%. Forty six genes and two potentially functional open reading frames were identified. They include 24 protein-coding genes, 2 rRNA genes, 20 tRNA genes and 2 ORFs (orf60, orf142). There is considerable sequence synteny across the five red algal mtDNAs falling into Florideophyceae including Gr. lemaneiformis in this study and previously sequenced species. A long stem-loop and a hairpin structure were identified in intergenic regions of mt genome of Gr. lemaneiformis, which are believed to be involved with transcription and replication. In addition, the mtDNAs of two mutagenic cultivated breeds (“981” and “07-2”) were also sequenced. Compared with the mtDNA of wild Gr. lemaneiformis, the genome size and gene length and order of three strains were completely identical except nine base mutations including eight in the protein-coding genes and one in the tRNA gene. None of the base mutations caused frameshift or a premature stop codon in the mtDNA genes. Phylogenetic analyses based on mitochondrial protein-coding genes and rRNA genes demonstrated Gracilariopsis andersonii had closer phylogenetic relationship with its parasite Gracilariophila oryzoides than Gracilariopsis lemaneiformis which was from the same genus of Gracilariopsis

    Implementation of a Practice Development Model to Reduce the Wait for Autism Spectrum Diagnosis in Adults

    Get PDF
    This study examined waiting times for diagnostic assessment of Autism Spectrum Disorder in 11 adult services, prior to and following the implementation of a 12 month change program. Methods to support change are reported and a multi-level modelling approach determined the effect of the change program on overall wait times. Results were statistically significant (b = − 0.25, t(136) = − 2.88, p = 0.005). The average time individuals waited for diagnosis across all services reduced from 149.4 days prior to the change program and 119.5 days after it, with an average reduction of 29.9 days overall. This innovative intervention provides a promising framework for service improvement to reduce the wait for diagnostic assessment of ASD in adults across the range of spectrum presentations
    • 

    corecore