963 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present status and future prospects of functional information materials, mainly focusing on semiconductor microstructural materials, are introduced first in this paper. Then a brief discussion how to enhance the academic level and innovation capability of research and development of functional information materials in China are made. Finally the main problems concerning the studies of materials science and technology are analyzed, and possible measures for promoting its development are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present status and future prospects of functional information materials, mainly focusing on semiconductor microstructural materials, are introduced first in this paper. Then a brief discussion how to enhance the academic level and innovation capability of research and development of functional information materials in China are made. Finally the main problems concerning the studies of materials science and technology are analyzed, and possible measures for promoting its development are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction: Electronic assistive technology (EAT) includes computers, environmental control systems and information technology systems and is widely considered to be an important part of present-day life. Method: Fifty-six Irish community occupational therapists completed a questionnaire on EAT. All surveyed were able to identify the benefits of EAT. Results: While respondents reported that they should be able to assess for and prescribe EATs, only a third (19) were able to do so, and half (28) had not been able to do so in the past. Community occupational therapists identified themselves as havinga role in a multidisciplinary team to assess for and prescribe EAT. Conclusion: Results suggest that it is important for occupational therapists to have up-to-date knowledge and training in assistive and computer technologies in order to respond to the occupational needs of clients.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: Automated reporting of estimated glomerular filtration rate (eGFR) is a recent advance in laboratory information technology (IT) that generates a measure of kidney function with chemistry laboratory results to aid early detection of chronic kidney disease (CKD). Because accurate diagnosis of CKD is critical to optimal medical decision-making, several clinical practice guidelines have recommended the use of automated eGFR reporting. Since its introduction, automated eGFR reporting has not been uniformly implemented by U. S. laboratories despite the growing prevalence of CKD. CKD is highly prevalent within the Veterans Health Administration (VHA), and implementation of automated eGFR reporting within this integrated healthcare system has the potential to improve care. In July 2004, the VHA adopted automated eGFR reporting through a system-wide mandate for software implementation by individual VHA laboratories. This study examines the timing of software implementation by individual VHA laboratories and factors associated with implementation. METHODS: We performed a retrospective observational study of laboratories in VHA facilities from July 2004 to September 2009. Using laboratory data, we identified the status of implementation of automated eGFR reporting for each facility and the time to actual implementation from the date the VHA adopted its policy for automated eGFR reporting. Using survey and administrative data, we assessed facility organizational characteristics associated with implementation of automated eGFR reporting via bivariate analyses. RESULTS: Of 104 VHA laboratories, 88% implemented automated eGFR reporting in existing laboratory IT systems by the end of the study period. Time to initial implementation ranged from 0.2 to 4.0 years with a median of 1.8 years. All VHA facilities with on-site dialysis units implemented the eGFR software (52%, p<0.001). Other organizational characteristics were not statistically significant. CONCLUSIONS: The VHA did not have uniform implementation of automated eGFR reporting across its facilities. Facility-level organizational characteristics were not associated with implementation, and this suggests that decisions for implementation of this software are not related to facility-level quality improvement measures. Additional studies on implementation of laboratory IT, such as automated eGFR reporting, could identify factors that are related to more timely implementation and lead to better healthcare delivery.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Science-based approaches to support the conservation of marine biodiversity have been developed in recent years. They include measures of ‘rarity’, ‘diversity’, ‘importance’, biological indicators of water ‘quality’ and measures of ‘sensitivity’. Identifying the sensitivity of species and biotopes, the main topic of this contribution, relies on accessing and interpreting available scientific data in a structured way and then making use of information technology to disseminate suitably presented information to decision makers. The Marine Life Information Network (MarLIN) has achieved that research for a range of environmentally critical species and biotopes over the past four years and has published the reviews on the MarLIN Web site (www.marlin.ac.uk). Now, by linking the sensitivity database and databases of survey information, sensitivity mapping approaches using GIS are being developed. The methods used to assess sensitivity are described and the approach is advocated for wider application in Europe.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development of the Internet and in particular of social networks has supposedly given a new view to the different aspects that surround human behavior. It includes those associated with addictions, but specifically the ones that have to do with technologies. Following a correlational descriptive design we present the results of a study, which involved university students from Social and Legal Sciences as participants, about their addiction to the Internet and in particular to social networks. The sample was conformed of 373 participants from the cities of Granada, Sevilla, Málaga, and Córdoba. To gather the data a questionnaire that was design by Young was translated to Spanish. The main research objective was to determine if university students could be considered social network addicts. The most prominent result was that the participants don’t consider themselves to be addicted to the Internet or to social networks; in particular women reflected a major distance from the social networks. It’s important to know that the results differ from those found in the literature review, which opens the question, are the participants in a phase of denial towards the addiction?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information retrieval in the age of Internet search engines has become part of ordinary discourse and everyday practice: "Google" is a verb in common usage. Thus far, more attention has been given to practical understanding of information retrieval than to a full theoretical account. In Human Information Retrieval, Julian Warner offers a comprehensive overview of information retrieval, synthesizing theories from different disciplines (information and computer science, librarianship and indexing, and information society discourse) and incorporating such disparate systems as WorldCat and Google into a single, robust theoretical framework. There is a need for such a theoretical treatment, he argues, one that reveals the structure and underlying patterns of this complex field while remaining congruent with everyday practice. Warner presents a labor theoretic approach to information retrieval, building on his previously formulated distinction between semantic and syntactic mental labor, arguing that the description and search labor of information retrieval can be understood as both semantic and syntactic in character. Warner's information science approach is rooted in the humanities and the social sciences but informed by an understanding of information technology and information theory. The chapters offer a progressive exposition of the topic, with illustrative examples to explain the concepts presented. Neither narrowly practical nor largely speculative, Human Information Retrieval meets the contemporary need for a broader treatment of information and information systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The importance of digital inclusion to Europe is obvious: as we move towards an ever more internet-communicating society the lack of access to basic digital infrastructures for a significant segment of the population is both problematic for those individuals without access and also problematic for those providing services which should be efficient and fully utilised. The EU’s ‘Information Society’ project has been the central plank of the European attempt to build a European digital marketplace, a concept which necessitates digital inclusion of the population at large. It is a project which prefers universal service obligations to achieve inclusion. If that is to be the preferred solution I suggest that we must consider exclusion from the banking system, given that the Information Society is at root an economic community.

However, universal service obligations are not the only method whereby digital inclusion can be encouraged and I posit we may need to reconsider the role of the state as supplier of services through the concept of ‘social solidarity’.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An overview of research on reconfigurable architectures for network processing applications within the Institute of Electronics, Communications and Information Technology (ECIT) is presented. Three key network processing topics, namely node throughput, Quality of Service (QoS) and security are examined where custom reconfigurability allows network nodes to adapt to fluctuating network traffic and customer demands. Various architectural possibilities have been investigated in order to explore the options and tradeoffs available when using reconfigurability for packet/frame processing, packet-scheduling and data encryption/decryption. This research has shown there is no common approach that can be applied. Rather the methodologies used and the cost-benefits for incorporation of reconfigurability depend on each of the functions considered, for example being well suited to encryption/decryption but not packet/frame processing. © 2005 IEEE.