Filters








33,423 Hits in 8.7 sec

You Get Where You're Looking for: The Impact of Information Sources on Code Security

Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky
2016 2016 IEEE Symposium on Security and Privacy (SP)  
In this paper, we for the first time systematically analyzed how the use of information resources impacts code security.  ...  only 17% of them contained secure code snippets.  ...  This work was supported in part by the German Ministry for Education and Research (BMBF) through funding for the Center for IT-Security, Privacy and Accountability (CISPA), and by the U.S.  ... 
doi:10.1109/sp.2016.25 dblp:conf/sp/AcarBFKMS16 fatcat:bqranncibjgp3h53ez4q7bb4xa

Horizon Scanning for Cyber Security

Mark Brett
2021 figshare.com  
A high level overview of emergent technologies and Threats for Local Government in the UK in 2021.  ...  Looking at cloud computing, building out software defined networks, zero trust security around it will get you to a point where you can deal with the internet things.  ...  It is as much about geospatial information, not just knowing where you are, but what floor you're on, what office you're in.  ... 
doi:10.6084/m9.figshare.13675480.v1 fatcat:tq7ug63osrdprdrc3uuuplwhwm

Using computers for intensive care unit research

Nicholas S Ward
2004 Respiratory care  
A computerized clinical information system (CIS) is potentially a very important information tool for research and improving health care processes as well as for optimizing data management and thereby  ...  At my institution we have used CIS data to study changes in patients' code status and to evaluate a protocol for arterial blood gas (ABG) testing.  ...  CISs have been around for about 10 years, depending on where you want to draw the starting line.  ... 
pmid:15107140 fatcat:ehp3cludxnhxvhawckdbzfnf6y

Motivating Cybersecurity Advocates

Julie M. Haney, Wayne G. Lutters
2019 Proceedings of the 2019 on Computers and People Research Conference - SIGMIS-CPR '19  
Motivations included interest in the field, sense of duty, self-efficacy, evidence of impact, comradery, and, to a lesser degree, awards and monetary compensation.  ...  Given modern society's dependence on technological infrastructure vulnerable to cyber-attacks, the need to expedite cybersecurity adoption is paramount.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their comments that helped improve the quality of this paper.  ... 
doi:10.1145/3322385.3322388 dblp:conf/sigcpr/HaneyL19 fatcat:iwteoi2qtrdbfjkokuio22ijcy

Coming of Age on the Margins: Mental Health and Wellbeing Among Latino Immigrant Young Adults Eligible for Deferred Action for Childhood Arrivals (DACA)

Rachel Siemons, Marissa Raymond-Flesh, Colette L. Auerswald, Claire D. Brindis
2016 Journal of Immigrant and Minority Health  
Research into the impacts of policy changes on young immigrants' MHWB can guide stakeholders to better address this population's health needs.  ...  For those qualified, the Deferred Action for Childhood Arrivals (DACA) program's protections may alleviate stressors, with implications for their mental health and wellbeing (MHWB).  ...  Do you know what type of insurance they might have or how they find out about insurance and where they get it?  ... 
doi:10.1007/s10903-016-0354-x pmid:26852235 fatcat:nnt7t3mit5deplvbnbxrfhiije

Silver Bullet Talks with Matthew Green

Gary McGraw
2014 IEEE Security and Privacy  
I would advise that you look at real systems-there are tons of them and tons of code as well, especially in the open source area.  ...  If you're doing statistical simulations, you need random-looking numbers, and there are algorithms for generating them. But when you're talking about cryptography, you need something stronger.  ...  Everybody knows it, so you can get people to write for cheap. Th at's the bott om line. Register today!  ... 
doi:10.1109/msp.2014.34 fatcat:gqhzvtl6nzhohedc2e3wnlsxbm

Design Considerations for Residents with Impeded Cognitive Functioning: Conversations with People with Schizophrenia

Elizabeth Karol, Dianne Smith
2021 Sustainability  
The findings will inform the development of accommodation design considerations that focus on improving quality of life for people with schizophrenia.  ...  Considerations include the importance of the home's proximity to places for potential relaxation, the need for security of housing tenure rather than short-term crisis housing, awareness of the support  ...  Although it complies with the requirements for qualitative conversational interviews, the research would be enriched by interviewing more participants with experiences drawn from a more diverse range of  ... 
doi:10.3390/su13147733 fatcat:jmxgyi5dlvde5jtapcee7cvnyy

Challenging software developers: dialectic as a foundation for security assurance techniques

Charles Weir, Awais Rashid, James Noble
2020 Journal of Cybersecurity  
Concentrating on these six assurance techniques, and the dialectical interactions they involve, has the potential to increase the security of development activities and thus improve software security for  ...  Development teams are increasingly expected to deliver secure code, but how can they best achieve this?  ...  It explains what security misconfiguration is, . . . it gives me external resources, . . . and a sharing knowledge base, where you get can more information on what to fix, and how to remediate it.  ... 
doi:10.1093/cybsec/tyaa007 dblp:journals/cybersecurity/WeirR020 fatcat:lcujnyfisfgrzlngwtfxa7px5m

Online Personal Learning Networks for Older Adults: Impacts on Social and Mental Well-Being

Dirk Morrison
2020 Journal of Studies in Education  
Interpretive speculation is provided regarding how these informal online learning experiences and oPLNs in particular, may point to a favorable impact on similar retired older adults' personal, social,  ...  A thematic analysis of the focus group transcripts revealed themes informing how oPLNs facilitated their informal learning goals and influenced participants' personal valuing of their online activity.  ...  you're dealing with you can then find out that you don't have to agree on a lot of things and you can actually increase your degree of respect for difference of opinion or viewpoint on things.  ... 
doi:10.5296/jse.v10i2.16600 fatcat:cdpbpomz25fv7er324l4ebfcoa

On the Outside Looking Out: an interview with the Institute for Applied Autonomy (IAA)

Erich W. Schienke, Institute for Applied Autonomy (IAA)
2002 Surveillance & Society  
Their projects range from constructing robots for activists so as to avoid identification, to building websites for looking up "paths of least surveillance"; in Manhattan and London.  ...  This interview with members of the Institute for Applied Autonomy is a discussion of their critically intervening projects and products - projects and products that boldly dip into and out of the socio-technical  ...  The version of iSee that's on the web now was put up very quickly and in some ways was almost a one-off. What we're developing now is a much more general-purpose mapping tool using open-source code.  ... 
doi:10.24908/ss.v1i1.3396 fatcat:txssephk6rdczk65hjdbqjg5fq

A Patient-Prioritized Agenda for Information Needs during the COVID-19 Pandemic: A Qualitative Study of Patients with Inflammatory Bowel Disease

Millie D Long, Mary E Grewe, Emily Cerciello, Laura Weisbein, Kyra Catabay, Michael D Kappelman
2021 Crohn's & Colitis 360  
We included questions on patients' experiences navigating the pandemic with IBD, differences in their experience as compared to peers, their concerns and fears, as well as preferred information sources  ...  used for IBD worsening risks of COVID-19.  ...  A c c e p t e d M a n u s c r i p t Introduction: Over the course of the COVID-19 pandemic, there has been a high level of patient demand for information about COVID-19 and its impacts on the inflammatory  ... 
doi:10.1093/crocol/otab066 pmid:34805986 pmcid:PMC8600949 fatcat:ldraq5e2mrbuxbraf6tjh7pfhy

The Codes of Conduct - interpretation elements for practicing a sustainable tourism in the Danube Delta Biosphere Reserve

NICHIFOR Cristina, BOTA Diana, BOZAGIEVICI Raluca
2007 Scientific Annals of the Danube Delta Institute  
The paper present the Codes of Conduct, designed both for tourists and the tour-operators,recommended for practicing a sustainable tourism in DDBR.  ...  The relation between recreation and education is one of the most important in protecting the environment.  ...  same time as guides for the tourists taking short trips on the banks and as the source of information on the local conservation and safety requirements.  ... 
doaj:522c64c1def14424a52ef9e2a023317d fatcat:jb6rgiudhjgzhfvvvq22tiomvq

Family Perspectives on Telemedicine for Pediatric Subspecialty Care

Kristin N. Ray, Laura Ellen Ashcraft, Ateev Mehrotra, Elizabeth Miller, Jeremy M. Kahn
2017 Telemedicine journal and e-health  
Informants felt that it was important for telemedicine programs to have transparent and reliable scheduling, same-day scheduling options, continuity of care with trusted providers, clear guidelines on  ...  acceptance and, ultimately, maximize impact for patients and their families.  ...  This work was supported, in part, by grants from the Agency for Healthcare Research and Quality (K12HS022989, Dr. Ray) and the Children's Hospital of Pittsburgh of the UPMC Health System (Dr.  ... 
doi:10.1089/tmj.2016.0236 pmid:28430021 pmcid:PMC5651976 fatcat:kpbo62oy2bcddeuo57krvlobti

DevOps Finetuning [chapter]

Aruna Ravichandran, Kieran Taylor, Peter Waterhouse
2016 DevOps for Digital Leaders  
Get out of the office and "gemba," or walk your own software production line. Look for all the warning indicators that might be causing people to do the wrong things.  ...  Take, for example, a situation where a mobile development team needs access test data residing on a mainframe or insight into the performance implications of newly released code.  ... 
doi:10.1007/978-1-4842-1842-6_10 fatcat:jo5d6nw7fzckloyeiio5vwhthy

Ten AI Stepping Stones for Cybersecurity [article]

Ricardo Morla
2019 arXiv   pre-print
We draw on the state of the art to provide factual arguments for a discussion on well-established AI in cybersecurity issues, including the current scope of AI and its application to cybersecurity, the  ...  and improve the efficiency of their security operation centers.  ...  If you're running a security operations center and relying on some sort of anti-virus, spam detection engine, or advanced SIEM, you may already be using it.  ... 
arXiv:1912.06817v1 fatcat:ujeitni5grcopbhl6dwenncjje
« Previous Showing results 1 — 15 out of 33,423 results