876 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security
Resumo:
Photographic and image-based dietary records have limited evidence evaluating their performance and use among adults with a chronic disease. This study evaluated the performance of a mobile phone image-based dietary record, the Nutricam Dietary Assessment Method (NuDAM), in adults with type 2 diabetes mellitus (T2DM). Criterion validity was determined by comparing energy intake (EI) with total energy expenditure (TEE) measured by the doubly-labelled water technique. Relative validity was established by comparison to a weighed food record (WFR). Inter-rater reliability was assessed by comparing estimates of intake from three dietitians. Ten adults (6 males, age=61.2±6.9 years, BMI=31.0±4.5 kg/m2) participated. Compared to TEE, mean EI was under-reported using both methods, with a mean ratio of EI:TEE 0.76±0.20 for the NuDAM and 0.76±0.17 for the WFR. There was moderate to high correlations between the NuDAM and WFR for energy (r=0.57), carbohydrate (r=0.63, p<0.05), protein (r=0.78, p<0.01) and alcohol (rs=0.85, p<0.01), with a weaker relationship for fat (r=0.24). Agreement between dietitians for nutrient intake for the 3-day NuDAM (ICC = 0.77-0.99) was marginally lower when compared with the 3-day WFR (ICC=0.82-0.99). All subjects preferred using the NuDAM and were willing to use it again for longer recording periods.
Resumo:
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance
Resumo:
A bank guarantee has traditionally been viewed as a cash equivalent. This view is supported by the operation of the autonomy principle. However, the autonomy principle is subject to certain recognised exceptions both at common law and under statute. One of these exceptions is commonly referred to as the negative stipulation or underlying contract exception. In recent times the operation of this particular exception has given rise to a wealth of case law. This article examines whether this recent case law appropriately recognises the reasonable expectations of the beneficiary of a bank guarantee that a bank guarantee should function not only as a security but as a risk allocation device.
Resumo:
Introduction Behavioural interventions have been shown to improve outcomes in patients with type 1 diabetes mellitus (T1DM). There are a small number of studies that suggest text-messages (TM), native mobile applications (NMAs), and other mobile tools may be useful platforms for delivering behavioural interventions to adolescents. Aim The aim of this study was to explore, by way of a systematic review of available literature, (a) the outcomes of interventions using mobile technology for youth with T1DM and (b) what mobile technologies, functional design elements and aesthetic design elements have the best evidence to support their use. Methods A search of six online databases returned 196 unique results, of which 13 met the inclusion criteria. Results Four studies were randomised controlled trials (RCTs), and all others prospective cohort studies. TM (10) was the most common intervention technology, while NMAs were used in four studies. The most common outcome measured was HbA1c (9); however, only three studies showed a significant decrease. Similarly, the results reported for other outcome measures were mixed. The studies included in this review suggest that interventions which have data collection and clinician support functionality may be more effective in improving adherence and glycaemic control, but more evidence is needed. Further, the evidence base supporting the use of NMAs in T1DM management for adolescents is weak, with most studies adopting TM as the intervention tool. Overall, the studies lack adequate descriptions of their methodology, and better quality studies are required to inform future intervention design.
Resumo:
Background There is growing evidence for the positive impact of mindfulness on wellbeing. Mindfulness-based mobile apps may have potential as an alternative delivery medium for training. While there are hundreds of such apps, there is little information on their quality. Objective This study aimed to conduct a systematic review of mindfulness-based iPhone mobile apps and to evaluate their quality using a recently-developed expert rating scale, the Mobile Application Rating Scale (MARS). It also aimed to describe features of selected high-quality mindfulness apps. Methods A search for “mindfulness” was conducted in iTunes and Google Apps Marketplace. Apps that provided mindfulness training and education were included. Those containing only reminders, timers or guided meditation tracks were excluded. An expert rater reviewed and rated app quality using the MARS engagement, functionality, visual aesthetics, information quality and subjective quality subscales. A second rater provided MARS ratings on 30% of the apps for inter-rater reliability purposes. Results The “mindfulness” search identified 700 apps. However, 94 were duplicates, 6 were not accessible and 40 were not in English. Of the remaining 560, 23 apps met inclusion criteria and were reviewed. The median MARS score was 3.2 (out of 5.0), which exceeded the minimum acceptable score (3.0). The Headspace app had the highest average score (4.0), followed by Smiling Mind (3.7), iMindfulness (3.5) and Mindfulness Daily (3.5). There was a high level of inter-rater reliability between the two MARS raters. Conclusions Though many apps claim to be mindfulness-related, most were guided meditation apps, timers, or reminders. Very few had high ratings on the MARS subscales of visual aesthetics, engagement, functionality or information quality. Little evidence is available on the efficacy of the apps in developing mindfulness.
Resumo:
In plants and nematodes, RNAi can spread from cells from which it is initiated to other cells in the organism. The underlying mechanism controlling the mobility of RNAi signals is not known, especially in the case of plants. A genetic screen designed to recover plants impaired in the movement but not the production or effectiveness of the RNAi signal identified RCI3, which encodes a hydrogen peroxide (H2O2)-producing type III peroxidase, as a key regulator of silencing mobility in Arabidopsis thaliana. Silencing initiated in the roots of rci3 plants failed to spread into leaf tissue or floral tissue. Application of exogenous H2O2 reinstated the spread in rci3 plants and accelerated it in wild-type plants. The addition of catalase or MnO2, which breaks down H2O2, slowed the spread of silencing in wild-type plants. We propose that endogenous H2O2, under the control of peroxidases, regulates the spread of gene silencing by altering plasmodesmata permeability through remodelling of local cell wall structure, and may play a role in regulating systemic viral defence.
Resumo:
Since their inception in 1962, Petri nets have been used in a wide variety of application domains. Although Petri nets are graphical and easy to understand, they have formal semantics and allow for analysis techniques ranging from model checking and structural analysis to process mining and performance analysis. Over time Petri nets emerged as a solid foundation for Business Process Management (BPM) research. The BPM discipline develops methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. Mainstream business process modeling notations and workflow management systems are using token-based semantics borrowed from Petri nets. Moreover, state-of-the-art BPM analysis techniques are using Petri nets as an internal representation. Users of BPM methods and tools are often not aware of this. This paper aims to unveil the seminal role of Petri nets in BPM.
Resumo:
Driver distraction through mobile phone use in the car is a growing road safety concern. This paper presents findings of a survey (N = 528), which seeks to better understand the predictors of mobile phone use while driving in young (18-25) adult drivers. The survey investigated factors and motivations such as young adults' boredom proneness and their social connectedness, as well as their general mobile phone use and phone use in the car. We found, e.g., that boredom proneness plays a larger role (compared to social connectedness) in determining how much a young male uses their phone in the car (compared to young females). Despite the study’s limitations, this initial understanding allows us to better design and develop innovative HCI interventions that prevent young adults, particularly males, from phone use while driving in a way that appeals to their needs.
Resumo:
In this paper, we introduce a path algebra well suited for navigation in environments that can be abstracted as topological graphs. From this path algebra, we derive algorithms to reduce routes in such environments. The routes are reduced in the sense that they are shorter (contain fewer edges), but still connect the endpoints of the initial routes. Contrary to planning methods descended from Disjktra’s Shortest Path Algorithm like D , the navigation methods derived from our path algebra do not require any graph representation. We prove that the reduced routes are optimal when the graphs are without cycles. In the case of graphs with cycles, we prove that whatever the length of the initial route, the length of the reduced route is bounded by a constant that only depends on the structure of the environment.
Resumo:
Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
Travel speed is one of the most critical parameters for road safety; the evidence suggests that increased vehicle speed is associated with higher crash risk and injury severity. Both naturalistic and simulator studies have reported that drivers distracted by a mobile phone select a lower driving speed. Speed decrements have been argued to be a risk compensatory behaviour of distracted drivers. Nonetheless, the extent and circumstances of the speed change among distracted drivers are still not known very well. As such, the primary objective of this study was to investigate patterns of speed variation in relation to contextual factors and distraction. Using the CARRS-Q high-fidelity Advanced Driving Simulator, the speed selection behaviour of 32 drivers aged 18-26 years was examined in two phone conditions: baseline (no phone conversation) and handheld phone operation. The simulator driving route contained five different types of road traffic complexities, including one road section with a horizontal S curve, one horizontal S curve with adjacent traffic, one straight segment of suburban road without traffic, one straight segment of suburban road with traffic interactions, and one road segment in a city environment. Speed deviations from the posted speed limit were analysed using Ward’s Hierarchical Clustering method to identify the effects of road traffic environment and cognitive distraction. The speed deviations along curved road sections formed two different clusters for the two phone conditions, implying that distracted drivers adopt a different strategy for selecting driving speed in a complex driving situation. In particular, distracted drivers selected a lower speed while driving along a horizontal curve. The speed deviation along the city road segment and other straight road segments grouped into a different cluster, and the deviations were not significantly different across phone conditions, suggesting a negligible effect of distraction on speed selection along these road sections. Future research should focus on developing a risk compensation model to explain the relationship between road traffic complexity and distraction.
Resumo:
The power system network is assumed to be in steady-state even during low frequency transients. However, depending on generator dynamics, and toad and control characteristics, the system model and the nature of power flow equations can vary The nature of power flow equations describing the system during a contingency is investigated in detail. It is shown that under some mild assumptions on load-voltage characteristics, the power flow equations can be decoupled in an exact manner. When the generator dynamics are considered, the solutions for the load voltages are exact if load nodes are not directly connected to each other
Resumo:
Migration within the European Union (EU) has increased since the Union was established. Community pharmacies provide open access to health care services and can be the first, most frequently used or even the only contact with a nation s health care system among mobile community residents. In some of the mass-migration areas in Southern Europe, most of the customers may represent mobile citizens of foreign background. This has not always been taken into consideration in the development of community pharmacy services. Mobile patients have been on the EU's health policy agenda, but they have seldom been mentioned in the context of community pharmacies. In most of the EU member states, governments control the specific legislation concerning community pharmacies and there is no harmonised pharmaceutical policy or consistent minimal standards for community pharmacy services in the EU. The aim of this study was to understand medication use, the role of community pharmacies and the symptom mitigation process of mobile community residents. Finns living in Spain were used as an example to examine how community pharmacies in a EU member state meet the needs of mobile community residents. The data were collected by a survey in 2002 (response rate 53%, n= 533) and by five focus group discussions in 2006 (n=30). A large number (70%) of the respondents had moved to Spain for health reasons and suffered from chronic morbidity. Community pharmacies had an important role in the healthcare of mobile community residents and the respondents were mostly satisfied with these services. However, several medication safety risks related to community pharmacy practices were identified: 1) Availability of prescription medicines without prescription (e.g., antibiotics, sleeping pills, Viagra®, asthma medications, cardiovascular medicines, psoriasis medicines and analgesics); 2) Irrational use of medicines (e.g., 41% of antibiotic users had bought their antibiotics without a prescription, and the most common reasons for antibiotic self-medication were symptomatic common colds and sore throats); 3) Language barriers between patients and pharmacy professionals; 4) Lack of medication counselling; 5) Unqualified pharmacy personnel providing pharmacotherapy. A fifth of the respondents reported experiencing problems during pharmacy visits in Spain, and the lack of a common language was the source of most of these problems. The findings of this study indicate that regulations and their enforcement can play a crucial role in actually assuring the rational and safe use of medicines. These results can be used in the development of pharmaceutical and healthcare policies in the EU. It is important to define consistent minimum standards for community pharmacy services in the EU. Then, the increasing number of mobile community residents could access safe and high quality health care services, including community pharmacy services, in every member state within the EU.
Resumo:
The potential of using mobile devices to increase learner engagement within a small group of at-risk vocational education students was studied through a qualitative case study. It was found that the use of mobile devices could be a strategy educators may use to reduce the barriers these students often encounter within traditional classrooms. Notions of interactivity, ease of use, existing familiarity and fluency were found to be fundamental variables that were central to the group's use of mobile devices. The study provides direction for educators looking for innovative ways to engage students who struggle in a classroom situation.