A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Practitioners in Context: Their Activities and Collaborative Interactions
2008
Zenodo
This study develops the context of interactions of IT security practitioners. ...
Preliminary qualitative analysis of 22 interviews (to date) and participatory observation has identified eight different types of activities that require interactions between security practitioners and ...
Notifications
Notifications
Systems
Notifications
Notifications
Discussion
of action plan
Discussion
of next steps
Analysis of
the incident ...
doi:10.5281/zenodo.3264307
fatcat:zg2url2uendx5d2oq2l6gehkpa
ModifiedCritical Incident (mCIT): AMeans to Uncover Experience of Mobile Social Messaging System Using Informant-SpecificCues
2021
Turkish Journal of Computer and Mathematics Education
Thus, our adapted version of CIT utilizes the procedures and logic of CIT, but differs in two ways: 1) Relying on situated and informants' genuine critical incidents to elicit experience of interaction ...
This article describes a study whereCritical Incident Technique (CIT) was adapted to HCI research and applied in the context of social messaging system use in understanding technology-mediated familial ...
In brief, the selection of bonding incidents is on the basis that ritualistic human-technology interaction involves deeper level of emotional investment and engagement during interaction (Kamal, Noor, ...
doi:10.17762/turcomat.v12i3.1021
fatcat:uaucyqmc6jf63kpnahacj5cize
An analysis of electronic health record-related patient safety concerns
2014
JAMIA Journal of the American Medical Informatics Association
Acknowledgements We acknowledge the Informatics Patient Safety Office of the Veterans Health Administration for their collaboration on this work. ...
When more than one sociotechnical dimension was involved in a safety incident, we noted this interaction by counting co-occurring dimensions. ...
Safety concerns typically emerged from complex interactions of multiple sociotechnical aspects of the EHR system. ...
doi:10.1136/amiajnl-2013-002578
pmid:24951796
pmcid:PMC4215044
fatcat:s32dpivlsvcivl4bpkijrfkofq
An analysis of electronic health record–related patient safety incidents
2016
Health Informatics Journal
Human-computer interaction problems were the most frequently reported. The results show the possibility of error arising from the complex interaction between clinicians and computers. ...
The aim of this study was to analyse electronic health record-related patient safety incidents in the patient safety incident reporting database in fully digital hospitals in Finland. ...
The study involved searching the HaiPro incident reporting system and identifying incidents according to the current HaiPro classification of incidents. ...
doi:10.1177/1460458216631072
pmid:26951568
fatcat:t4hwjfgiz5dclalq3vkqnrbbwm
Czech Childhood Cancer Information System: Data Analysis and Interactive Visualisation (Preprint)
2020
JMIR Public Health and Surveillance
It involves an interactive tool for analytical reporting, which provides information on the following basic topics in the form of graphs or tables: incidence, mortality, and overall survival. ...
These validated data were then used to determine the incidence and survival rates of childhood cancer patients aged 0 to 19 years who were diagnosed in the period 1994 to 2016 (N=9435). ...
The authors are also thankful to all specialists involved in data collection and administration. ...
doi:10.2196/23990
pmid:34185010
fatcat:dl3nnhnd7bgx3gsu3k6zlzrkse
A study of emergency response work
2007
Proceedings of the SIGCHI conference on Human factors in computing systems - CHI '07
Patterns of mobile phone interaction in such work is analyzed showing how the dyadic exchange of mobile phone numbers between the actors plays an important role in the social interactions in the organizing ...
management information systems [26] , improved design of radio communication on the fire ground [4], ubiquitous computing to improve accountability and awareness for the fire crew [10] . ...
The analysis of the incidents shows examples of three patterns of interactions in organizing a response network where the mobile phone had a fundamental role. ...
doi:10.1145/1240624.1240824
dblp:conf/chi/LandgrenN07
fatcat:pnvmd6eebrdunj6owbkqwl4lye
How a cockpit calculates its speeds and why errors while doing this are so hard to detect
2010
Cognition, Technology & Work
We took the cockpit as the joint cognitive system under analysis and conducted an ethnographic study based on documental analysis, flight observations, interviews, and the analysis of 22 events involving ...
These vulnerabilities are a matter of interactions among cognitive systems in the cockpit, rather than vulnerabilities of individual agents, such as humans or artifacts. ...
(d) analysis of incidents and accidents involving the calculation of take-off speeds. ...
doi:10.1007/s10111-010-0161-4
fatcat:ahm6y4dlqzdn3j7cncjksntaza
Systematic Collection of Bear–human Interaction Information for Alaska's National Parks
2007
Ursus (International Association for Bear Research and Management)
patterns of bear-human interactions in Alaska's National Parks. ...
The National Park Service Alaska Region Bear-Human Information Management System (BHIMS) facilitates the systematic collection of biologically relevant data, consolidates bear management information, helps ...
We are grateful to everyone who reported details of their bear-human interactions within Alaska's National Parks. ...
doi:10.2192/1537-6176(2007)18[209:scobii]2.0.co;2
fatcat:fnlgoxufkvgn7cwx7iytepbpte
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
2009
International Journal of Human-Computer Studies
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. ...
Our analysis also reveals that the tools used by our participants to perform their security tasks provide insufficient support for the complex, collaborative interactions that they need to perform. ...
Acknowledgments The authors would like to thank our participants for taking part in our study, members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) for feedback on ...
doi:10.1016/j.ijhcs.2009.03.002
fatcat:lqwfprrjsjcejaqi63njhbklbq
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
2018
Journal of Information Security
Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. ...
Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. ...
The pull SMS will involve SMS interactions by requesting incidents status from the database repository. ...
doi:10.4236/jis.2018.93014
fatcat:v4wouvmgnjabfi6hkdw3xbpnfm
New Approach of Assessing Human Errors in Railways
2018
Transactions of the VŠB: Technical University of Ostrava, Safety Engineering Series
of rail transport systems involves three complementary levels. ...
The third level of behavioral analysis (after the accident) focuses on evaluating the consequences of a wrong action in terms of damage to humans, the environment and the human-machine system. ...
involved in accidents and incidents. ...
doi:10.2478/tvsbses-2018-0007
fatcat:2wq2vropmnasxfzgbdvib2icta
Capturing emerging complex interactions: Safety analysis in air traffic management
2006
Reliability Engineering & System Safety
This paper is concerned with some limitations of safety analysis with respect to operational aspects of introducing new systems (functionalities). ...
The future development of air traffic management (ATM), set by the ATM 2000+ Strategy, involves a structural revision of ATM processes, a new ATM concept and a system approach for the ATM network. ...
Many relevant repositories 1 report critical incidents involving the ATM system. ...
doi:10.1016/j.ress.2006.01.010
fatcat:maetkq37k5chnn7oxc5o66yn7e
Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain
[chapter]
2005
Lecture Notes in Computer Science
Industry will be involved as early as possible in the lifecycle of ATM projects. ...
EURO-CONTROL manages the processes that involve the definition and validation of new ATM solutions using Industry capabilities (e.g., SMEs). ...
Many relevant repositories 3 report critical incidents involving the ATM System. ...
doi:10.1007/11563228_16
fatcat:fzggchbmzzakxe2xh5xga6uvn4
Using Systems Thinking Strategy in an Environment Course
2015
US-China Education Review. A
Analysis of individual student system maps revealed that most students were able to identify the elements of the issue from different perspectives and recognize the operations of and interactions between ...
What are the factors influencing the development of students' systems thinking ability? and 2. What kinds of relationships are existent among the cognitive components of systems thinking? ...
Systems thinking involves many high-order thinking skills, such skills involve a cluster of elaborative mental activities requiring nuance judgment and analysis of complex situations according to multiple ...
doi:10.17265/2161-623x/2015.01.005
fatcat:wmysf5rxnjfore3wq6oloo55hi
F-121LYMPH NODAL METASTASES IN THYMIC MALIGNANCIES: A CHINESE ALLIANCE FOR RESEARCH OF THYMOMAS RETROSPECTIVE DATABASE ANALYSIS
2016
Interactive Cardiovascular and Thoracic Surgery
The ITMIG proposal of a new staging system for TETs was used to define the pathological stage. Incidence of nodal metastases and its impact on survival were examined. ...
Objectives: Lymphatic involvement is believed to be relatively rare in thymic epithelial tumours (TETs). The incidence and prognostic significance of nodal metastases is still unclear. ...
The ITMIG proposal of a new staging system for TETs was used to define the pathological stage. Incidence of nodal metastases and its impact on survival were examined. ...
doi:10.1093/icvts/ivw260.119
fatcat:pxsujp3ksjeydlmtz7xwicaiim
« Previous
Showing results 1 — 15 out of 780,051 results