65,657 Hits in 7.1 sec

Results of the Technical Validation of an Accessible Contact Manager for Mobile Devices [chapter]

Jon Azpiroz, Juan Bautista Montalvá Colomer, María Fernanda Cabrera-Umpiérrez, María Teresa Arredondo, Julio Gutiérrez
2011 Lecture Notes in Computer Science  
This paper presents the technical validation process and results of an Accessible Contact Manager for mobile phones as a part of the evaluation of accessible applications for mobile phones for people with  ...  The need of accessible applications for mobile is very important especially when it comes to access basic mobile functions such as making calls through a contact manager.  ...  This work has been carried out as part of the AEGIS (Open Accessibility Everywhere: Ground-work, Infrastructure, Standards) project co-funded by the European Commission under the Seventh Framework Programme  ... 
doi:10.1007/978-3-642-21666-4_1 fatcat:5qw77ltpuna5rcdt6t7xet6z4u

Using System Dynamics to Investigate the Effect of the Information Medium Contact Policy on the Information Security Management

Pei-Chen Sung, Chien-Yuan Su
2013 International Journal of Business and Management  
This research explored further the users who contact with media and discuss information security controls, including management and technical.  ...  and the application software on hosts and servers should be updated and patched regularly; (5) the removable storage and removable/mobile access media should be restricted.  ...  Control of Technical Vulnerabilities In Chapter 12.6.1 of ISO 27001, is for the technical vulnerability management.  ... 
doi:10.5539/ijbm.v8n12p83 fatcat:tef3ylleh5flfpzcd7fujjasgq

Exploring mobile information systems for chronically ill adolescent patients

Jan Marco Leimeister, Uta Knebel, Helmut Krcmar
2007 International Journal of Web Based Communities  
The objective of this article is to present the first steps of an empirical exploration of the possibilities of mobile IT support for communication and coordination for this target group during treatment  ...  Special emphasis is put on the effects of mobile systems on the patient's perceived quality of life.  ...  Acknowledgements The authors would like to express their gratitude to the IIIrd Department of Pediatrics -Department of Pediatric Oncology, Hematology and Immunology (headed by Prof.  ... 
doi:10.1504/ijwbc.2007.015866 fatcat:kide5qdg4ndg3dv6qasz4btppa

From Tapping to Touching: Making Touch Screens Accessible to Blind Users

Tiago Guerreiro, Paulo Lagoá, Hugo Nicolau, Daniel Gonçalves, Joaquim A. Jorge
2008 IEEE Multimedia  
Gonçalves has a PhD in personal information management from the Instituto Superior Técnico, Technical University of Lisboa. He is a member of the ACM and Eurographics.  ...  Hugo Nicolau is an MSc student in orientation systems for blind people at Instituto Superior Técnico, Technical University of Lisboa.  ... 
doi:10.1109/mmul.2008.88 fatcat:kk2zjhbq6bfyzfr6ermtnxeoze

Ebola Outbreak Containment: Real-Time Task and Resource Coordination With SORMAS

Cindy Perscheid, Justus Benzler, Claus Hermann, Michael Janke, David Moyer, Todd Laedtke, Olawunmi Adeoye, Kerstin Denecke, Göran Kirchner, Sandra Beermann, Norbert Schwarz, Daniel Tom-Aba (+1 others)
2018 Frontiers in ICT  
We designed our system to be a cloud application that consists of interfaces for both mobile devices and desktop computers to support all stakeholders in the process.  ...  General feedback showed high enthusiasm about the system and stressed its benefits for an effective outbreak containment of infectious diseases.  ...  ACKNOWLEDGMENTS This project was an interdisciplinary effort between multiple institutions across the globe.  ... 
doi:10.3389/fict.2018.00007 fatcat:7x3yecmdwnf6lnyxpvkp4nvly4

National surveillance using mobile systems for health monitoring: complexity, functionality and feasibility

Yages Singh, Debra Jackson, Sanjana Bhardwaj, Natasha Titus, Ameena Goga
2019 BMC Infectious Diseases  
In all three surveys a technical protocol and iterative system for mobile data collection was developed.  ...  an additional 45 min for data capture).  ...  : Methods, results and implications for PMTCT Option B+ from South Africa.  ... 
doi:10.1186/s12879-019-4338-z pmid:31526387 pmcid:PMC6745771 fatcat:njo465we65andeqnirhm3vsspa

An Internet of Things (IoT) Reference Model for an Infectious Disease Active Digital Surveillance System

Nur Hayati, Kalamullah Ramli, Muhammad Suryanegara, Muhammad Salman
2021 International Journal of Advanced Computer Science and Applications  
The proof of concept was conducted by adopting the reference model into an IoT system design for the active digital surveillance of the Covid-19 disease.  ...  This paper proposes a reference model for the design of an active digital surveillance system of infectious diseases with IoT technology.  ...  For the design, as an IoT point of care device, RT-PCR was designed to support mobility and to be connected to a data center via an internet network.  ... 
doi:10.14569/ijacsa.2021.0120956 fatcat:4bot6kj7xvgn7hmcwylyqteaja

Surveillance and Outbreak Response Management System (SORMAS) to support the control of the Ebola virus disease outbreak in West Africa

C Fähnrich, K Denecke, O O Adeoye, J Benzler, H Claus, G Kirchner, S Mall, R Richter, M P Schapranow, N Schwarz, D Tom-Aba, M Uflacker (+2 others)
2015 Eurosurveillance  
SAP cloud tools, such as SAP Afaria (a mobile device management software).  ...  The user interface consists of specific front-ends for smartphones and tablet devices, which are independent from physical configurations.  ...  Acknowledgements The project is being funded by the German Ministry for Education and Research (BMBF) via the German Centre for Infection Research (DZIF) under the project title "EBOKON 10".  ... 
pmid:25846493 fatcat:zuvq7vlcvjbtznnu44gxdwvcti

Mobile Technology in Healthcare Environment: Security Vulnerabilities and Countermeasures [article]

Sajedul Talukder, Shalisha Witherspoon, Kanishk Srivastava, Ryan Thompson
2018 arXiv   pre-print
that the use of mobile devices in the healthcare environment brings, and introduce countermeasures and mitigations to reduce the risk while maintaining regulatory compliance.  ...  As a test case, we examine Epic Rover, a mobile application that has been identified as a viable solution to manage the electronic medical system.  ...  , while providing safeguards to ensure the confidentiality, integrity, and availability of the EPHI contained on the mobile device.  ... 
arXiv:1807.11086v1 fatcat:2j6ejeelfjdmvegjzumimyc72e

Real-Time & Autonomous Data Transmission for Vital-Sign Telemonitoring: Requirements & Conceptualization

Marco Schweitzer, Lukas Huber, Thilo Gorfer, Alexander Hoerbst
2019 Studies in Health Technology and Informatics  
The results yielded to a concept for a seamless integrated, unobtrusive home monitoring system for elderly people with real-time data synchronization and communication features to support the mobile nurse  ...  Real-time monitoring features for supporting mobile care require the easy conduction of self-measurements on vital signs for patients.  ...  The main categories for functional properties contain access rights, user management, web app nurses, a mobile app for clients, device management, communication and logging.  ... 
doi:10.3233/shti190801 pmid:31483251 fatcat:fixe4zqt55chvm67qu7ntjuuqy

Surveillance and Outbreak Response Management System (SORMAS) to support the control of the Ebola virus disease outbreak in West Africa

C Fähnrich, K Denecke, O Adeoye, J Benzler, H Claus, G Kirchner, S Mall, R Richter, M Schapranow, N Schwarz, D Tom-Aba, M Uflacker (+3 others)
2015 Eurosurveillance  
SORMAS may become a platform for outbreak management and improved routine surveillance of any infectious disease.  ...  information exchange between field workers and the EOC, ensures supervision of contact follow-up, automated status reports, and GPS tracking.  ...  Acknowledgements The project is being funded by the German Ministry for Education and Research (BMBF) via the German Centre for Infection Research (DZIF) under the project title "EBOKON 10".  ... 
doi:10.2807/1560-7917.es2015.20.12.21071 fatcat:6tex7xl5jrb63cwnr5phev72oq

Trust in M2M communication

Inhyok Cha, Yogendra Shah, Andreas Schmidt, Andreas Leicher, Michael Meyerstein
2009 IEEE Vehicular Technology Magazine  
Considering the large number of M2MEs expected to be deployed in highly distributed networks and because of the requirements for low-cost devices and implementations, global enforcement of security will  ...  This evolved security model, balancing trust and enforcement, results in a useful, practical, and scalable approach for M2M communication security, which is a critical factor for the overall success of  ...  Validation, denoting the ability to technically assess the state of a system for all security-relevant properties, requires that a reporting entity transfers the results of verification to an external  ... 
doi:10.1109/mvt.2009.933478 fatcat:q6qh3zg3x5dirnr5u6wccbw7nu

Secure mobile business applications – framework, architecture and implementation

Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson
2004 Information Security Technical Report  
In this contribution we present an indepth analysis of the current situation enterprises are faced with in the mobile arena, both from a security and a management perspective.  ...  Security management instruments in the form of enforceable enterprise policies are defined which target the security and trust-related deployment and configuration of mobile devices and business applications  ...  Acknowledgements We would like to thank our partners in the WiTness project for fruitful discussions and contributions to the presented framework.  ... 
doi:10.1016/s1363-4127(05)70036-4 fatcat:r5chfin2jbchhexv7ft7jshz5q

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

Chalee Vorakulpipat, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, Visut Savangsuk
2017 Security and Communication Networks  
Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD).  ...  This review spans a large spectrum of information security research, ranging from management (risk and policy) to technical aspects of privacy and confidentiality in BYOD.  ...  For example, the data on a mobile device can be remotely wiped when a user violates the BYOD policy. Because of this, limited separation can be confronted with both technical and management issues.  ... 
doi:10.1155/2017/2057260 fatcat:xbybwhsoqnappf6xotoxo3b4eq

Integrating Mobile Computing in University Information Management Systems to Improve Access and User Experience

Amrani Hassan, Department of Information and Communication Technology, Pwani University, 195-80108,Kilifi, Kenya, Newton Andebe, Devotha G Nyambo, Shubi Kaijage
2022 Indian Journal of Science and Technology  
Objectives: To develop a mobile application and integrate it with an existing University Management System for improving access and user experience for services to be accessed anytime, anywhere through  ...  The majority of students 97% agreed that the justifications for developing the app were valid.  ...  Special thanks to Pwani University management for the approval to conduct the research.  ... 
doi:10.17485/ijst/v15i8.1060 fatcat:nuediizomnfcfaq23db4tgqtxa
« Previous Showing results 1 — 15 out of 65,657 results