896 Hits in 4.1 sec

Crowdsourcing Physiological Conditions and Subjective Emotions by Coupling Technical and Human Mobile Sensors

Bernd Resch, Martin Sudmanns, Günther Sagl, Anja Summa, Peter Zeile, Jan-Philipp Exner
2015 GI_FORUM - Journal for Geographic Information Science  
Finally, we discuss the use of emotion information in urban planning and point out related privacy issues together with a number of strategies to mitigate those.  ...  In this paper we present our approach for crowdsourcing physiological conditions and subjective emotions by combining data from technical sensors (measuring psycho-physiological parameters) and human sensors  ...  Mobile Apps for Collecting Physiological Data Mobile applications, which measure physiological conditions, are currently widely used in the field of health care.  ... 
doi:10.1553/giscience2015s514 fatcat:l7xlnhwyvrh4jnzgh62dmyg3tu

Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems

Mehran Mozaffari Kermani, Erkay Savas, Shambhu J. Upadhyaya
2016 IEEE Transactions on Emerging Topics in Computing  
The first paper, "Physiological information leakage: a new frontier in health information security" by A. Mohsen-Nia, S. Sur-Kolay, A. Raghunathan, and N.  ...  The authors propose a new class of information security attacks that exploit physiological information leakagevarious forms of information that naturally leak from the 318 2168-6750  ...  Next, the medical devices deployed within or on bodies also add to natural sources of physiological information leakage, thereby increasing opportunities for attackers.  ... 
doi:10.1109/tetc.2015.2482778 fatcat:5pt6o2jsifdqhcmq5ex7ufqnsa

A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis

Jianrong Yao, Minxue Wei
2014 2014 International Conference on Management of e-Commerce and e-Government  
establishment of the 'production frontiers'.  ...  feasibility of setting up a bionic architecture of information system security.  ...  Hence we devote to establish information system security architecture with the function emphasizing on "defense in depth" and seek out a new method to evaluate the information system security effectively  ... 
doi:10.1109/icmecg.2014.28 fatcat:7cn7kq4n4rd4tmzasuehcam36m

A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis

Jianrong Yao, Minxue Wei
2015 International Journal of Security and Its Applications  
establishment of the 'production frontiers'.  ...  feasibility of setting up a bionic architecture of information system security.  ...  Hence we devote to establish information system security architecture with the function emphasizing on "defense in depth" and seek out a new method to evaluate the information system security effectively  ... 
doi:10.14257/ijsia.2015.9.3.09 fatcat:mpy4btseuzdwlljpp5kpknre5e

Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)

Jahanzeb Shahid, Rizwan Ahmad, Adnan K. Kiani, Tahir Ahmad, Saqib Saeed, Abdullah M. Almuhaideb
2022 Applied Sciences  
A subset of IoT is the Internet of Healthcare Things (IoHT) that consists of smart healthcare devices having significant importance in monitoring, processing, storing, and transmitting sensitive information  ...  This article highlights the possible points and reasons for data leakage, such as conflicts in laws, the use of sub-standard devices, lack of awareness, and the non-availability of dedicated local law  ...  There are several vulnerabilities in web-based interfaces that are prone to data leakage and information leakage attacks.  ... 
doi:10.3390/app12041927 fatcat:woyiywobr5aahedda4zyonhhau

Research on the Construction and Application of Breast Cancer-Specific Database System Based on Full Data Lifecycle

Yin Jin, Wang Junren, Jiang Jingwen, Sun Yajing, Chen Xi, Qin Ke
2021 Frontiers in Public Health  
data lifecycle, including the establishment of data standards, data fusion and governance, multi-modal knowledge graph, data security sharing and value application of breast cancer-specific database.  ...  clinical practices, scientific research, and teaching in hospitals, giving full play to the value of medical big data of the Biomedical Big Data Center of West China Hospital.  ...  Due to the high security requirements of medical information data and the small volume of data in a single institution, federated learning, or multi-party secure computation can be considered to achieve  ... 
doi:10.3389/fpubh.2021.712827 fatcat:f4apg4dnsbhsteecoufukgaf6m

Health Care and Cybersecurity: Bibliometric Analysis of the Literature

Mohammad S Jalali, Sabina Razak, William Gordon, Eric Perakslis, Stuart Madnick
2019 Journal of Medical Internet Research  
The cybersecurity of health care information systems is now an essential component of safe, reliable, and effective health care delivery.  ...  Over the past decade, clinical care has become globally dependent on information technology.  ...  Ladep Software Development Security Physiological Information Leakage: A New Frontier in Health Information Security Nia, A. M., S. Sur-Kolay, A. Raghunathan and N. K.  ... 
doi:10.2196/12644 pmid:30767908 pmcid:PMC6396074 fatcat:xg2cw5qk3jh2nhdwozcy5dqxlm

Sensors for Context-Aware Smart Healthcare: A Security Perspective

Edgar Batista, M. Angels Moncusi, Pablo López-Aguilar, Antoni Martínez-Ballesté, Agusti Solanas
2021 Sensors  
However, the large number, variety and complexity of devices and systems involved in smart health systems involve a number of challenging considerations to be considered, particularly from security and  ...  of individuals or to their immediate context), the transmission of these data through wireless communication networks, to the final storage and analysis of such information in the appropriate health information  ...  Therefore, in the case of a data leakage, people's identities cannot be seamlessly associated to confidential information.  ... 
doi:10.3390/s21206886 pmid:34696099 pmcid:PMC8537585 fatcat:n7qzpwyzo5f4rppmtkknkznpz4

Sensing of Life Activities at the Human-Microwave Frontier

Changzhi Li, Victor M. Lubecke, Olga Boric-Lubecke, Jenshan Lin
2021 IEEE Journal of Microwaves  
Modern microwave radar technologies and systems are taking important roles in healthcare, security, and human-machine interface by remote sensing of human life activities.  ...  Several future research directions will be laid out to solve challenges for ubiquitous deployment of these sensing technologies at the human-microwave frontier.  ...  APPLICATIONS AT THE HUMAN-MICROWAVE FRONTIER New applications are being pursued at the human-microwave frontier, ranging from security, smart living, future of work, to healthcare.  ... 
doi:10.1109/jmw.2020.3030722 fatcat:p7ys76vc6nenzomqmvtarzmloq

Future Trend in Wearable Electronics in the Textile Industry

Chi-Wai Kan, Yin-Ling Lam
2021 Applied Sciences  
Wearable technology is among the fastest growing parts of health, entertainment, and education.  ...  In the future, the development of wearable electronics will be focused on multifunctional, user-friendly, and user acceptance and comfort features and shall be based on advanced electronic textile systems  ...  The fabric eventually becomes a computer, and such wearer-garment symbiosis and dynamics open up new frontiers in textiles and human-factor research [94] .  ... 
doi:10.3390/app11093914 doaj:26af286be31f4590b856f9628da2f7fd fatcat:wkihtflb3zgpzbsa25tciz76lu

Human Bond Communications: Architectures, Challenges, and Possibilities

Tayaba Iftikhar, Hasan Ali Khattak, Zoobia Ameer, Munam Ali Shah, Faisal Fayyaz Qureshi, Muhammad Zeeshan Shakir
2019 IEEE Communications Magazine  
This has opened doors for exploring new frontiers in the domain of smart health-care especially patient monitoring and diagnosis.  ...  Such a holistic communication medium is facilitated through specialized devices that help health-care experts in making crucial and timely data driven decisions for their patients.  ...  Each sensor node in the HBC based WBAN performs a series of computing tasks on the collected physiological signals in order to extract information about the patient.  ... 
doi:10.1109/mcom.2018.1800531 fatcat:v44cv4ypqzhszjrmfhswtw44ee

Cyberbiosecurity Implications for the Laboratory of the Future

J. Craig Reed, Nicolas Dunaway
2019 Frontiers in Bioengineering and Biotechnology  
, computer networks, information technology, and virtual reality) component associated with it.  ...  Technological innovation has become an integral and inescapable aspect of our daily existence as almost everything of significance in our world now has a cyber (i.e., relating to, or involving computers  ...  Regardless, in all cases it requires the organization to implement a risk-based graded approach to information security governance that enables the organization to secure its information, detect loss,  ... 
doi:10.3389/fbioe.2019.00182 pmid:31497596 pmcid:PMC6712584 fatcat:4wqgihef5zbm5bjq3voc7yp75q

A Story of Sanitary Ineptitude

1905 The Lancet  
is by no means new in the history of mankind.  ...  FAWOETT'S report is instructive in many ways and its broad lesson is that if recurrences of this nature are to be avoided a new Public Health Act should be introduced conferring greater powers upon the  ... 
doi:10.1016/s0140-6736(01)12637-1 fatcat:xe2v6amn5nhdvf32sge2p2lnay

Advancing Regulatory Science With Computational Modeling for Medical Devices at the FDA's Office of Science and Engineering Laboratories

Tina M. Morrison, Pras Pathmanathan, Mariam Adwan, Edward Margerrison
2018 Frontiers in Medicine  
FDA's Center for Devices and Radiological Health (CDRH), which regulates medical devices marketed in the U.S., envisions itself as the world's leader in medical device innovation and regulatory science-the  ...  to a valuable regulatory tool, and developing mechanisms to rely more on digital evidence in place of other evidence.  ...  Lochner for her support of advancing computational modeling as a regulatory tool, and for serving as a focal point for bringing academic, government and industry stakeholders together to tackle important  ... 
doi:10.3389/fmed.2018.00241 pmid:30356350 pmcid:PMC6167449 fatcat:moemrlqdbffg5am5mlycxuvh6q

When Augmented Reality meets Big Data

Carlos Bermejo, Zhanpeng Huang, Tristan Braud, Pan Hui
2017 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW)  
This enables us to blend information from our senses and the digitalized world in a myriad of ways that was not possible before. AR and big data have a logical maturity that inevitably converge them.  ...  The tread of harnessing AR and big data to breed new interesting applications is starting to have a tangible presence.  ...  Creating a virtual viewfinder to display a pertinent health record enables the doctor to quickly access valuable information in the context of patients.  ... 
doi:10.1109/icdcsw.2017.62 dblp:conf/icdcsw/BermejoHBH17 fatcat:ulc6bdkzqzd2hpjnv7wherkw5q
« Previous Showing results 1 — 15 out of 896 results