Filters








780,051 Hits in 4.2 sec

Security Practitioners in Context: Their Activities and Collaborative Interactions

Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov
2008 Zenodo  
This study develops the context of interactions of IT security practitioners.  ...  Preliminary qualitative analysis of 22 interviews (to date) and participatory observation has identified eight different types of activities that require interactions between security practitioners and  ...  Notifications Notifications Systems Notifications Notifications Discussion of action plan Discussion of next steps Analysis of the incident  ... 
doi:10.5281/zenodo.3264307 fatcat:zg2url2uendx5d2oq2l6gehkpa

ModifiedCritical Incident (mCIT): AMeans to Uncover Experience of Mobile Social Messaging System Using Informant-SpecificCues

FazillahMohmad Kamal Et.al
2021 Turkish Journal of Computer and Mathematics Education  
Thus, our adapted version of CIT utilizes the procedures and logic of CIT, but differs in two ways: 1) Relying on situated and informants' genuine critical incidents to elicit experience of interaction  ...  This article describes a study whereCritical Incident Technique (CIT) was adapted to HCI research and applied in the context of social messaging system use in understanding technology-mediated familial  ...  In brief, the selection of bonding incidents is on the basis that ritualistic human-technology interaction involves deeper level of emotional investment and engagement during interaction (Kamal, Noor,  ... 
doi:10.17762/turcomat.v12i3.1021 fatcat:uaucyqmc6jf63kpnahacj5cize

An analysis of electronic health record-related patient safety concerns

Derek W Meeks, Michael W Smith, Lesley Taylor, Dean F Sittig, Jean M Scott, Hardeep Singh
2014 JAMIA Journal of the American Medical Informatics Association  
Acknowledgements We acknowledge the Informatics Patient Safety Office of the Veterans Health Administration for their collaboration on this work.  ...  When more than one sociotechnical dimension was involved in a safety incident, we noted this interaction by counting co-occurring dimensions.  ...  Safety concerns typically emerged from complex interactions of multiple sociotechnical aspects of the EHR system.  ... 
doi:10.1136/amiajnl-2013-002578 pmid:24951796 pmcid:PMC4215044 fatcat:s32dpivlsvcivl4bpkijrfkofq

An analysis of electronic health record–related patient safety incidents

Sari Palojoki, Matti Mäkelä, Lasse Lehtonen, Kaija Saranto
2016 Health Informatics Journal  
Human-computer interaction problems were the most frequently reported. The results show the possibility of error arising from the complex interaction between clinicians and computers.  ...  The aim of this study was to analyse electronic health record-related patient safety incidents in the patient safety incident reporting database in fully digital hospitals in Finland.  ...  The study involved searching the HaiPro incident reporting system and identifying incidents according to the current HaiPro classification of incidents.  ... 
doi:10.1177/1460458216631072 pmid:26951568 fatcat:t4hwjfgiz5dclalq3vkqnrbbwm

Czech Childhood Cancer Information System: Data Analysis and Interactive Visualisation (Preprint)

Denisa Krejčí, Matěj Karolyi, Lucie Pehalová, Jakub Ščavnický, Michaela Zapletalová, Ivana Svobodová, Jaroslav Štěrba, Jan Starý, Lenka Šnajdrová, Martin Komenda, Ladislav Dušek
2020 JMIR Public Health and Surveillance  
It involves an interactive tool for analytical reporting, which provides information on the following basic topics in the form of graphs or tables: incidence, mortality, and overall survival.  ...  These validated data were then used to determine the incidence and survival rates of childhood cancer patients aged 0 to 19 years who were diagnosed in the period 1994 to 2016 (N=9435).  ...  The authors are also thankful to all specialists involved in data collection and administration.  ... 
doi:10.2196/23990 pmid:34185010 fatcat:dl3nnhnd7bgx3gsu3k6zlzrkse

A study of emergency response work

Jonas Landgren, Urban Nulden
2007 Proceedings of the SIGCHI conference on Human factors in computing systems - CHI '07  
Patterns of mobile phone interaction in such work is analyzed showing how the dyadic exchange of mobile phone numbers between the actors plays an important role in the social interactions in the organizing  ...  management information systems [26] , improved design of radio communication on the fire ground [4], ubiquitous computing to improve accountability and awareness for the fire crew [10] .  ...  The analysis of the incidents shows examples of three patterns of interactions in organizing a response network where the mobile phone had a fundamental role.  ... 
doi:10.1145/1240624.1240824 dblp:conf/chi/LandgrenN07 fatcat:pnvmd6eebrdunj6owbkqwl4lye

How a cockpit calculates its speeds and why errors while doing this are so hard to detect

Eder Henriqson, Roel van Winsen, Tarcisio Abreu Saurin, Sidney W. A. Dekker
2010 Cognition, Technology & Work  
We took the cockpit as the joint cognitive system under analysis and conducted an ethnographic study based on documental analysis, flight observations, interviews, and the analysis of 22 events involving  ...  These vulnerabilities are a matter of interactions among cognitive systems in the cockpit, rather than vulnerabilities of individual agents, such as humans or artifacts.  ...  (d) analysis of incidents and accidents involving the calculation of take-off speeds.  ... 
doi:10.1007/s10111-010-0161-4 fatcat:ahm6y4dlqzdn3j7cncjksntaza

Systematic Collection of Bear–human Interaction Information for Alaska's National Parks

James M. Wilder, Terry D. DeBruyn, Tom S. Smith, Angie Southwould
2007 Ursus (International Association for Bear Research and Management)  
patterns of bear-human interactions in Alaska's National Parks.  ...  The National Park Service Alaska Region Bear-Human Information Management System (BHIMS) facilitates the systematic collection of biologically relevant data, consolidates bear management information, helps  ...  We are grateful to everyone who reported details of their bear-human interactions within Alaska's National Parks.  ... 
doi:10.2192/1537-6176(2007)18[209:scobii]2.0.co;2 fatcat:fnlgoxufkvgn7cwx7iytepbpte

Security practitioners in context: Their activities and interactions with other stakeholders within organizations

Rodrigo Werlinger, Kirstie Hawkey, David Botta, Konstantin Beznosov
2009 International Journal of Human-Computer Studies  
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation.  ...  Our analysis also reveals that the tools used by our participants to perform their security tasks provide insufficient support for the complex, collaborative interactions that they need to perform.  ...  Acknowledgments The authors would like to thank our participants for taking part in our study, members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) for feedback on  ... 
doi:10.1016/j.ijhcs.2009.03.002 fatcat:lqwfprrjsjcejaqi63njhbklbq

Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context

Maduhu Mshangi, Edephonce Ngemera Nfuka, Camilius Sanga
2018 Journal of Information Security  
Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents.  ...  Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace.  ...  The pull SMS will involve SMS interactions by requesting incidents status from the database repository.  ... 
doi:10.4236/jis.2018.93014 fatcat:v4wouvmgnjabfi6hkdw3xbpnfm

New Approach of Assessing Human Errors in Railways

Habib Hadj-Mabrouk
2018 Transactions of the VŠB: Technical University of Ostrava, Safety Engineering Series  
of rail transport systems involves three complementary levels.  ...  The third level of behavioral analysis (after the accident) focuses on evaluating the consequences of a wrong action in terms of damage to humans, the environment and the human-machine system.  ...  involved in accidents and incidents.  ... 
doi:10.2478/tvsbses-2018-0007 fatcat:2wq2vropmnasxfzgbdvib2icta

Capturing emerging complex interactions: Safety analysis in air traffic management

Massimo Felici
2006 Reliability Engineering & System Safety  
This paper is concerned with some limitations of safety analysis with respect to operational aspects of introducing new systems (functionalities).  ...  The future development of air traffic management (ATM), set by the ATM 2000+ Strategy, involves a structural revision of ATM processes, a new ATM concept and a system approach for the ATM network.  ...  Many relevant repositories 1 report critical incidents involving the ATM system.  ... 
doi:10.1016/j.ress.2006.01.010 fatcat:maetkq37k5chnn7oxc5o66yn7e

Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain [chapter]

Massimo Felici
2005 Lecture Notes in Computer Science  
Industry will be involved as early as possible in the lifecycle of ATM projects.  ...  EURO-CONTROL manages the processes that involve the definition and validation of new ATM solutions using Industry capabilities (e.g., SMEs).  ...  Many relevant repositories 3 report critical incidents involving the ATM System.  ... 
doi:10.1007/11563228_16 fatcat:fzggchbmzzakxe2xh5xga6uvn4

Using Systems Thinking Strategy in an Environment Course

Li-Ting Cheng, Jeng-Fung Hung, Shiang-Yao Liu
2015 US-China Education Review. A  
Analysis of individual student system maps revealed that most students were able to identify the elements of the issue from different perspectives and recognize the operations of and interactions between  ...  What are the factors influencing the development of students' systems thinking ability? and 2. What kinds of relationships are existent among the cognitive components of systems thinking?  ...  Systems thinking involves many high-order thinking skills, such skills involve a cluster of elaborative mental activities requiring nuance judgment and analysis of complex situations according to multiple  ... 
doi:10.17265/2161-623x/2015.01.005 fatcat:wmysf5rxnjfore3wq6oloo55hi

F-121LYMPH NODAL METASTASES IN THYMIC MALIGNANCIES: A CHINESE ALLIANCE FOR RESEARCH OF THYMOMAS RETROSPECTIVE DATABASE ANALYSIS

Zhitao Gu, W. Fang, Y. Shen, Y. Wei, K. Chen, Z. Yu, L. Tan, J. Fu, L. Pang, Y. Li, Y. Han, Y. Wang (+8 others)
2016 Interactive Cardiovascular and Thoracic Surgery  
The ITMIG proposal of a new staging system for TETs was used to define the pathological stage. Incidence of nodal metastases and its impact on survival were examined.  ...  Objectives: Lymphatic involvement is believed to be relatively rare in thymic epithelial tumours (TETs). The incidence and prognostic significance of nodal metastases is still unclear.  ...  The ITMIG proposal of a new staging system for TETs was used to define the pathological stage. Incidence of nodal metastases and its impact on survival were examined.  ... 
doi:10.1093/icvts/ivw260.119 fatcat:pxsujp3ksjeydlmtz7xwicaiim
« Previous Showing results 1 — 15 out of 780,051 results