A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Crowdsourcing Physiological Conditions and Subjective Emotions by Coupling Technical and Human Mobile Sensors
2015
GI_FORUM - Journal for Geographic Information Science
Finally, we discuss the use of emotion information in urban planning and point out related privacy issues together with a number of strategies to mitigate those. ...
In this paper we present our approach for crowdsourcing physiological conditions and subjective emotions by combining data from technical sensors (measuring psycho-physiological parameters) and human sensors ...
Mobile Apps for Collecting Physiological Data Mobile applications, which measure physiological conditions, are currently widely used in the field of health care. ...
doi:10.1553/giscience2015s514
fatcat:l7xlnhwyvrh4jnzgh62dmyg3tu
Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems
2016
IEEE Transactions on Emerging Topics in Computing
The first paper, "Physiological information leakage: a new frontier in health information security" by A. Mohsen-Nia, S. Sur-Kolay, A. Raghunathan, and N. ...
The authors propose a new class of information security attacks that exploit physiological information leakagevarious forms of information that naturally leak from the 318 2168-6750 ...
Next, the medical devices deployed within or on bodies also add to natural sources of physiological information leakage, thereby increasing opportunities for attackers. ...
doi:10.1109/tetc.2015.2482778
fatcat:5pt6o2jsifdqhcmq5ex7ufqnsa
A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis
2014
2014 International Conference on Management of e-Commerce and e-Government
establishment of the 'production frontiers'. ...
feasibility of setting up a bionic architecture of information system security. ...
Hence we devote to establish information system security architecture with the function emphasizing on "defense in depth" and seek out a new method to evaluate the information system security effectively ...
doi:10.1109/icmecg.2014.28
fatcat:7cn7kq4n4rd4tmzasuehcam36m
A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis
2015
International Journal of Security and Its Applications
establishment of the 'production frontiers'. ...
feasibility of setting up a bionic architecture of information system security. ...
Hence we devote to establish information system security architecture with the function emphasizing on "defense in depth" and seek out a new method to evaluate the information system security effectively ...
doi:10.14257/ijsia.2015.9.3.09
fatcat:mpy4btseuzdwlljpp5kpknre5e
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
2022
Applied Sciences
A subset of IoT is the Internet of Healthcare Things (IoHT) that consists of smart healthcare devices having significant importance in monitoring, processing, storing, and transmitting sensitive information ...
This article highlights the possible points and reasons for data leakage, such as conflicts in laws, the use of sub-standard devices, lack of awareness, and the non-availability of dedicated local law ...
There are several vulnerabilities in web-based interfaces that are prone to data leakage and information leakage attacks. ...
doi:10.3390/app12041927
fatcat:woyiywobr5aahedda4zyonhhau
Research on the Construction and Application of Breast Cancer-Specific Database System Based on Full Data Lifecycle
2021
Frontiers in Public Health
data lifecycle, including the establishment of data standards, data fusion and governance, multi-modal knowledge graph, data security sharing and value application of breast cancer-specific database. ...
clinical practices, scientific research, and teaching in hospitals, giving full play to the value of medical big data of the Biomedical Big Data Center of West China Hospital. ...
Due to the high security requirements of medical information data and the small volume of data in a single institution, federated learning, or multi-party secure computation can be considered to achieve ...
doi:10.3389/fpubh.2021.712827
fatcat:f4apg4dnsbhsteecoufukgaf6m
Health Care and Cybersecurity: Bibliometric Analysis of the Literature
2019
Journal of Medical Internet Research
The cybersecurity of health care information systems is now an essential component of safe, reliable, and effective health care delivery. ...
Over the past decade, clinical care has become globally dependent on information technology. ...
Ladep Software Development Security Physiological Information Leakage: A New Frontier in Health Information Security Nia, A. M., S. Sur-Kolay, A. Raghunathan and N. K. ...
doi:10.2196/12644
pmid:30767908
pmcid:PMC6396074
fatcat:xg2cw5qk3jh2nhdwozcy5dqxlm
Sensors for Context-Aware Smart Healthcare: A Security Perspective
2021
Sensors
However, the large number, variety and complexity of devices and systems involved in smart health systems involve a number of challenging considerations to be considered, particularly from security and ...
of individuals or to their immediate context), the transmission of these data through wireless communication networks, to the final storage and analysis of such information in the appropriate health information ...
Therefore, in the case of a data leakage, people's identities cannot be seamlessly associated to confidential information. ...
doi:10.3390/s21206886
pmid:34696099
pmcid:PMC8537585
fatcat:n7qzpwyzo5f4rppmtkknkznpz4
Sensing of Life Activities at the Human-Microwave Frontier
2021
IEEE Journal of Microwaves
Modern microwave radar technologies and systems are taking important roles in healthcare, security, and human-machine interface by remote sensing of human life activities. ...
Several future research directions will be laid out to solve challenges for ubiquitous deployment of these sensing technologies at the human-microwave frontier. ...
APPLICATIONS AT THE HUMAN-MICROWAVE FRONTIER New applications are being pursued at the human-microwave frontier, ranging from security, smart living, future of work, to healthcare. ...
doi:10.1109/jmw.2020.3030722
fatcat:p7ys76vc6nenzomqmvtarzmloq
Future Trend in Wearable Electronics in the Textile Industry
2021
Applied Sciences
Wearable technology is among the fastest growing parts of health, entertainment, and education. ...
In the future, the development of wearable electronics will be focused on multifunctional, user-friendly, and user acceptance and comfort features and shall be based on advanced electronic textile systems ...
The fabric eventually becomes a computer, and such wearer-garment symbiosis and dynamics open up new frontiers in textiles and human-factor research [94] . ...
doi:10.3390/app11093914
doaj:26af286be31f4590b856f9628da2f7fd
fatcat:wkihtflb3zgpzbsa25tciz76lu
Human Bond Communications: Architectures, Challenges, and Possibilities
2019
IEEE Communications Magazine
This has opened doors for exploring new frontiers in the domain of smart health-care especially patient monitoring and diagnosis. ...
Such a holistic communication medium is facilitated through specialized devices that help health-care experts in making crucial and timely data driven decisions for their patients. ...
Each sensor node in the HBC based WBAN performs a series of computing tasks on the collected physiological signals in order to extract information about the patient. ...
doi:10.1109/mcom.2018.1800531
fatcat:v44cv4ypqzhszjrmfhswtw44ee
Cyberbiosecurity Implications for the Laboratory of the Future
2019
Frontiers in Bioengineering and Biotechnology
, computer networks, information technology, and virtual reality) component associated with it. ...
Technological innovation has become an integral and inescapable aspect of our daily existence as almost everything of significance in our world now has a cyber (i.e., relating to, or involving computers ...
Regardless, in all cases it requires the organization to implement a risk-based graded approach to information security governance that enables the organization to secure its information, detect loss, ...
doi:10.3389/fbioe.2019.00182
pmid:31497596
pmcid:PMC6712584
fatcat:4wqgihef5zbm5bjq3voc7yp75q
A Story of Sanitary Ineptitude
1905
The Lancet
is by no means new in the history of mankind. ...
FAWOETT'S report is instructive in many ways and its broad lesson is that if recurrences of this nature are to be avoided a new Public Health Act should be introduced conferring greater powers upon the ...
doi:10.1016/s0140-6736(01)12637-1
fatcat:xe2v6amn5nhdvf32sge2p2lnay
Advancing Regulatory Science With Computational Modeling for Medical Devices at the FDA's Office of Science and Engineering Laboratories
2018
Frontiers in Medicine
FDA's Center for Devices and Radiological Health (CDRH), which regulates medical devices marketed in the U.S., envisions itself as the world's leader in medical device innovation and regulatory science-the ...
to a valuable regulatory tool, and developing mechanisms to rely more on digital evidence in place of other evidence. ...
Lochner for her support of advancing computational modeling as a regulatory tool, and for serving as a focal point for bringing academic, government and industry stakeholders together to tackle important ...
doi:10.3389/fmed.2018.00241
pmid:30356350
pmcid:PMC6167449
fatcat:moemrlqdbffg5am5mlycxuvh6q
When Augmented Reality meets Big Data
2017
2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW)
This enables us to blend information from our senses and the digitalized world in a myriad of ways that was not possible before. AR and big data have a logical maturity that inevitably converge them. ...
The tread of harnessing AR and big data to breed new interesting applications is starting to have a tangible presence. ...
Creating a virtual viewfinder to display a pertinent health record enables the doctor to quickly access valuable information in the context of patients. ...
doi:10.1109/icdcsw.2017.62
dblp:conf/icdcsw/BermejoHBH17
fatcat:ulc6bdkzqzd2hpjnv7wherkw5q
« Previous
Showing results 1 — 15 out of 896 results