Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 20 de 79
Filter
Add filters

Year range
1.
ACM Transactions on Computing for Healthcare ; 2(2) (no pagination), 2021.
Article in English | EMBASE | ID: covidwho-20241862

ABSTRACT

To combat the ongoing Covid-19 pandemic, many new ways have been proposed on how to automate the process of finding infected people, also called contact tracing. A special focus was put on preserving the privacy of users. Bluetooth Low Energy as base technology has the most promising properties, so this survey focuses on automated contact tracing techniques using Bluetooth Low Energy. We define multiple classes of methods and identify two major groups: systems that rely on a server for finding new infections and systems that distribute this process. Existing approaches are systematically classified regarding security and privacy criteria.Copyright © 2021 ACM.

2.
Digital Chinese Medicine ; 5(2):112-122, 2022.
Article in English | EMBASE | ID: covidwho-20239878

ABSTRACT

The Corona Virus Disease 2019 (COVID-19) pandemic has taught us many valuable lessons regarding the importance of our physical and mental health. Even with so many technological advancements, we still lag in developing a system that can fully digitalize the medical data of each individual and make it readily accessible for both the patient and health worker at any point in time. Moreover, there are also no ways for the government to identify the legitimacy of a particular clinic. This study merges modern technology with traditional approaches, thereby highlighting a scenario where artificial intelligence (AI) merges with traditional Chinese medicine (TCM), proposing a way to advance the conventional approaches. The main objective of our research is to provide a one-stop platform for the government, doctors, nurses, and patients to access their data effortlessly. The proposed portal will also check the doctors' authenticity. Data is one of the most critical assets of an organization, so a breach of data can risk users' lives. Data security is of primary importance and must be prioritized. The proposed methodology is based on cloud computing technology which assures the security of the data and avoids any kind of breach. The study also accounts for the difficulties encountered in creating such an infrastructure in the cloud and overcomes the hurdles faced during the project, keeping enough room for possible future innovations. To summarize, this study focuses on the digitalization of medical data and suggests some possible ways to achieve it. Moreover, it also focuses on some related aspects like security and potential digitalization difficulties.Copyright © 2022 Digital Chinese Medicine

3.
Early Intervention in Psychiatry ; 17(Supplement 1):314, 2023.
Article in English | EMBASE | ID: covidwho-20239348

ABSTRACT

Aims: The COVID-19 pandemic compelled replacement in traditional research practices (paper-pencil questionnaire) to technology-driven practices (online surveys). Such methods may be effective in reaching larger samples, geographically harder-to-reach populations, reduce recruitment costs, increase cost and time efficiency of recruitment. Despite these advantages, concerns about privacy and confidentiality, sample bias, data quality such as inaccurate responses, duplicate survey completion, and fraudster activity or bots prevail. We aim to provide researchers and reviewers with a series of recommendations for effectively executing and evaluating data collection via online platforms. Method(s): A rapid literature review was conducted and best practices and strategies to mitigate problems with e-research data collection were collated in summer 2021. Based on study needs, these strategies were applied in an on-going e-research in early psychosis intervention services with multiple stakeholder groups across Canada. Result(s): The results were categorized and prioritized based on strategy effectiveness (most, moderate, least) and at three implementation stages (before, during, and after recruitment). An 11-step data quality checklist was adapted and implemented in consultation and approval from institutional research ethics board thus ensured ethical acceptability. Key strategies include not sharing the full survey link publicly, collecting and checking paradata, attention check questions, and so forth. Conclusion(s): Given their unique strengths, the challenges of internetbased research and data collection should not deter researchers from using such approaches. Further, our study provides concrete evidence-based practices and insights for advancing ethical and highquality e-research, taking into account specific considerations associated with early psychosis settings.

4.
Journal of Cyber Security ; 8(1):40-54, 2023.
Article in Chinese | Scopus | ID: covidwho-20236511

ABSTRACT

With the continuous developing of the COVID-2019, more and more countries and regions have strictly supervised the personal information and location data of confirmed patients and their close contacts. At the same time, how to share the necessary information of patients while ensuring that the personal privacy of patients and their close contacts is not leaked, the access process is transparent, traceable, and data is not tampered with, has become a key issue that needs to be solved urgently. Based on this, we propose an accountable medical attribute pass (AMAP) access control scheme in this paper. The scheme first combines the blockchain with an attribute-based access control model. While introducing the blockchain to trace the source of the access process, the access control strategy and key steps in the access system are deployed on the blockchain in the form of smart contracts, so that the entire system can not only ensure the safe access of users to data, but also trace the source of the entire access process. In particular, the solution introduces the medical attribute pass module. Users apply for access in the form of a pass, which avoids multiple matches between subject attributes and access control strategies in the traditional access control model. While achieving fine-grained access control to medical data, a certain degree Improved access efficiency. Finally, the security analysis shows that this scheme can resist denial of service attacks, malicious tampering attacks, single point of failure attacks, main body masquerading attacks, replay attacks, etc. Experiments and performance analysis show that this solution is compared with other solutions. Under the same access control strategy, the more access times, the more obvious the advantages of this solution;the more access control strategies have the same access control strategy, the more effective the solution is. The more obvious the advantages. © 2023 Journal of Propulsion Technology. All rights reserved.

5.
ACM International Conference Proceeding Series ; : 236-242, 2023.
Article in English | Scopus | ID: covidwho-20233308

ABSTRACT

Online banking has been proven to be an effective and convenient way of providing banking services anywhere and has been a necessity since the COVID-19 pandemic has affected the Philippines. Alongside this fact, people have been victims of scams involving these online services. Therefore, this paper aimed to analyze reports of online banking scams reported on social media using content analysis. The 26 filtered posts are labeled with 27 codes generated, and the top six were discussed. Specifically, scam (88.46%) was the most common code, followed by phone calls (57.69%) and impersonation (53.84%). Benefits, verifying personal information, and social engineering all had 46.15% occurrences. It is recommended for potential online banking scams to verify with the bank before giving away information, and to raise awareness on the possible technique's scammers use. © 2023 ACM.

6.
Information and Computer Security ; 31(2):172-198, 2023.
Article in English | ProQuest Central | ID: covidwho-2325839

ABSTRACT

PurposeWith increased remote working, employers are concerned with employees' commitment and compliance with security procedures. Through the lens of psychological capital, this study aims to investigate whether strong organizational values can improve employees' commitment to the organization and security behaviors.Design/methodology/approachUsing Qualtrics platform, the authors conducted an online survey. The survey participants are college-educated, full-time employees. The authors used structural equation modeling to analyze 289 responses.FindingsThe results indicate perceived importance of organizational values is associated with increased organizational commitment and information security behavior. The authors find that psychological capital partially mediates these relations suggesting that employees' psychological capital effectively directs employees toward an affinity for the organization and information security behavior. The results highlight the importance of organizational values for improving security behavior and organizational commitment. Second, the results suggest that psychological capital is an effective mechanism for this influence. Finally, the authors find that individual differences (gender, organizational level and education) are boundary conditions on their findings, providing a nuanced view of their results and offering opportunities for further investigation.Originality/valueTo the best of the authors' knowledge, this study is the first to explore organizational values in relation to information security behaviors. In addition, this study investigates the underlying mechanism of this relationship by showing psychological capital's mediating role in this relationship. Therefore, the authors suggest organizations create a supportive environment that appreciates innovation, quality services, diversity and collaboration. Furthermore, organizations should communicate the importance of these values to their employees to motivate them to have a stronger affective commitment and a more careful set of security behaviors.

7.
Journal of Information and Communication Convergence Engineering ; 21(1):32-44, 2023.
Article in English | Scopus | ID: covidwho-2318806

ABSTRACT

Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs © The Korea Institute of Information and Communication Engineering

8.
Journal of Business Continuity and Emergency Planning ; 16(2):103-120, 2022.
Article in English | Scopus | ID: covidwho-2316141

ABSTRACT

In 2020, while the USA was experiencing suc-cessive waves of COVID-19, Universal Health Services experienced a major cyber attack that crippled electronic systems in over 200 hospitals, including a major academic medical centre that was playing a key regional role in COVID-19 care and clinical trials. This paper discusses the impact of the attack on clinical operations, infor-matics, research and teaching, contextualising the case study within more wide-scale trends driving the rise in cyber attacks on health-care systems. The compounding relationships between COVID-19, healthcare workforce depletion and cyber-security vulnerabilities form the framework of the discussion and action plan. Commitments to institutional best prac-tices, large-scale investments in infrastructure, and above all increasing support for the crit-ical human actors carrying out the work, are urgently needed to secure the healthcare system against these destabilising threats. Within this context, this paper argues that information security in the healthcare sector must be reimagined and integrated with greater support for the needs of frontline healthcare workers. © Henry Stewart Publications, 1749–9216.

9.
Sustainability ; 15(8):6519, 2023.
Article in English | ProQuest Central | ID: covidwho-2296429

ABSTRACT

This study aims to design and implement an online blockchain-based and real-time parcel monitoring and tracking system for cross-border runners and the customer via an online platform, during and post the COVID-19 pandemic. A blockchain is a distributed ledger system that serves as a transparent, understandable, and trustworthy store of data and analysis on the platform for participants to engage with each other. The result of proposing a blockchain-based tracking system is promising. The result and UAT show positive feedback on the use and features of the blockchain-based tracking system. As the world reacted to the pandemic, many organizations provided monitoring with their deliveries, which is a terrific method for businesses to prevent losing valuable customers. According to the findings of the study, organizations prefer to have blockchain-based tracking systems.

10.
Comput Secur ; 130: 103253, 2023 Jul.
Article in English | MEDLINE | ID: covidwho-2297196

ABSTRACT

As businesses have had to change how they operate due to the coronavirus pandemic, the need for remote work has risen. With the continuous advancements in technology and increases in typical job demands, employees need to increase their work productivity beyond regular work hours in the office. This type of work environment creates even more opportunities for security breaches due to employees intentionally violating information security policy violations. Although explicitly prohibited by information security policies (ISP), organizations have observed that employees bring critical data out of the office to complete their work responsibilities remotely. Consequently, developing a deeper understanding of how work pressure may influence employees to violate ISPs intentionally is crucial for organizations to protect their critical information better. Based upon the fraud triangle theory, this study proposes the opportunity to copy critical data, work pressure, and work completion justification as the primary motivational factors behind why employees copy critical company data to unsecured storage devices to work at home. A survey was conducted of 207 employees from a marketing research firm. The results suggest that opportunity, work pressure, and work completion justification are positively related to nonmalicious ISP violation intentions. Furthermore, the interaction effect between work completion justification and work pressure on the ISP violation intention is significant and positive. This study provides new insights into our understanding of the roles of work pressure and work completion justification on intentional nonmalicious ISP violation behaviors.

11.
NTT Technical Review ; 20(1):91-95, 2022.
Article in English | Scopus | ID: covidwho-2272313

ABSTRACT

Events that attract worldwide attention, such as the Olympic and Paralympic Games and international exhibitions, have become easy targets for cyber attacks, and it is no longer rare to hear of reports of damage from such attacks. The Olympic and Paralympic Games Tokyo 2020 was held in 2021 after a oneyear delay due to the novel coronavirus (COVID-19), and NTT, as a Gold Partner (Telecommunications Services), had the responsibility of managing the network infrastructure supporting the Tokyo 2020 Games, thus dealing with the threat of cyber attacks. This article describes how NTT-CERT (NTT Computer Security Incident Response and Readiness Coordination Team) of NTT Social Informatics Laboratories faced cyber attacks as the representative computer security incident response team of the NTT Group. © 2022 Nippon Telegraph and Telephone Corp.. All rights reserved.

12.
Indian Journal of Psychiatry ; 65(Supplement 1):S119, 2023.
Article in English | EMBASE | ID: covidwho-2265770

ABSTRACT

Globally, Technology and Psychiatry have emerged significant during the COVID-19 Pandemic. Technology is rapidly evolving and is definitely impacting the world of Psychiatry and mental health care across academics, research, training and clinical care. Technology is here to stay. It is pertinent that Psychiatrists and Allied professionals get adequate skills and training in Technology and Psychiatry for its application to clinical care and research. Many countries have relevant regulations, Guidelines, Bills, Policies, Acts, and Compliances regarding Technology and Health Care. The Telemedicine Guidelines were released during the COVID-19 Pandemic in India. Subsequently, The Telepsychiatry Guidelines were released by IPS and NIMHANS. There are certain regulations, such as EHR standards, Personal Data Protection Bill, DISHA, Information Technology Act, Drugs and Cosmetic Act, etc., for healthcare and technology in India. Aims and objectives of the workshop: * To create awareness of the regulatory and medicolegal aspects of Technology and Psychiatry in India * To improve the knowledge and skills Psychiatrists in Technology and Psychiatry Speakers and Topics: Dr Darpan Kaur : Conceptual Overview Framework of Needs and Perspectives of Regulatory and Medicolegal Aspects of Technology and Psychiatry in India, Dr Parmod Kumar: Telemedicine Guidelines and TelePsychiatry Guidelines in India Dr Shahul Ameen: Electronic Health Record (EHR) Standards and Personal Data Protection Bill Dr Vijay Chandra: Information Technology (IT) Act and Drugs and Cosmetic Act Dr Sudhir Bhave: Digital Information Security Health Care Act (DISHA).

13.
Internet of Things and Cyber-Physical Systems ; 2:70-81, 2022.
Article in English | Scopus | ID: covidwho-2254521

ABSTRACT

This study is aimed to explore the anti-epidemic effect of artificial intelligence (AI) algorithms such as digital twins on the COVID-2019 (novel coronavirus disease 2019), so that the information security and prediction accuracy of epidemic prevention and control (P & C) in smart cities can be further improved. It addresses the problems in the current public affairs governance strategy for the outbreak of the COVID-2019 epidemic, and uses digital twins technology to map the epidemic P & C situation in the real space to the virtual space. Then, the blockchain technology and deep learning algorithms are introduced to construct a digital twins model of the COVID-2019 epidemic (the COVID-DT model) based on blockchain combined with BiLSTM (Bi-directional Long Short-Term Memory). In addition, performance of the constructed COVID-DT model is analyzed through simulation. Analysis of network data security transmission performance reveals that the constructed COVID-DT model shows a lower average delay, its data message delivery rate (DMDR) is basically stable at 80%, and the data message disclosure rate (DMDCR) is basically stable at about 10%. The analysis on network communication cost suggests that the cost of this study does not exceed 700 bytes, and the prediction error does not exceed 10%. Therefore, the COVID-DT model constructed shows high network security performance while ensuring low latency performance, enabling more efficient and accurate interaction of information, which can provide experimental basis for information security and development trends of epidemic P & C in smart cities. © 2022

14.
Dissertation Abstracts International: Section B: The Sciences and Engineering ; 83(12-B):No Pagination Specified, 2022.
Article in English | APA PsycInfo | ID: covidwho-2281454

ABSTRACT

The role of technology has undoubtedly evolved into amplifying attackers' ability to use the cyber space for the deceit and abuse of Internet users. This dissertation seeks to investigate these problems from the lens of deceptive and abusive content (e.g., phishing, social engineering, dis- or misinformation, intimate partner surveillance). Phishing is an extremely popular cyber-social engineering attack that come with great costs to society-at-large, and along with mis- and disinformation, has risen to society's collective consciousness after the 2016 and 2020 U.S. General Elections, as well as the onset of the COVID-19 pandemic. Furthermore, research into crimes of abuse surrounding intimate partner violence (IPV), colloquially known as domestic abuse, is still in its infancy, yet IPS allows abusers to stalk, monitor, intimidate, and harass their victims as a form of further control. This thesis seeks to tackle these issues through a multi-methods approach, including natural language processing to detect the presence of influence cues in text, qualitative methods, and rigorous statistical analyses. I detail how cyber abuse is leveraged in social media, how expert advice can negative affect minorities, and investigate how subtle online toxicity can be automatically detected. I then investigate several different ways to mitigate the harms of online deception. The work detailed in this dissertation has resulted in novel and publicly available datasets that may pave the way for further novel mitigations and solutions within their fields and to the global problem of cyber deception and abuse. (PsycInfo Database Record (c) 2022 APA, all rights reserved)

15.
Computers and Security ; 124, 2023.
Article in English | Scopus | ID: covidwho-2238362

ABSTRACT

Stress plays a critical role in information security policy (ISP) compliance behavior. Since there are multiple sources of stress, the current literature does not provide a consistent view of the association between stress and ISP compliance behavior. Understanding the significance of the association between stress and ISP compliance behavior is valuable for managers, especially in managing the tradeoff between stress and ISP compliance behavior among individuals. It is also important to understand why there has been so much inconsistency in past studies. Thus, we attempted a meta-analysis to provide a generalized interpretation of the association between stress and ISP non-compliance behavior. A systematic literature review and a meta-analysis are conducted to examine the underlying contradiction and aggregate the findings of relevant studies. The results of this meta-analysis confirmed a weak positive correlation between stress and ISP non-compliance behavior. Demographic characteristics like age, country, and the category of the respondents (employee vs non-employee) are significant predictors of the association between stress and ISP non-compliance behavior. The meta-analysis presented here is also pertinent to the recent COVID-19 pandemic, which forced organizations to engage with their employees in new working conditions, putting employees under more stress and strain. © 2022 Elsevier Ltd

16.
Int J Inf Secur ; 22(3): 737-748, 2023.
Article in English | MEDLINE | ID: covidwho-2245870

ABSTRACT

Society has become increasingly dependent on IT infrastructure and services. Additionally, the pandemic of COVID-19 forced the transition of the traditional way of working (i.e., physical presence) into a more modern and flexible one (i.e., working remotely). This has led to an increase of cyberattacks, as a direct consequence of the increase of the attack surface but subsequently also led to an increased necessity for the protection of information systems. Toward the protection of information systems, cyber insurance is considered as a strategy for risk management, where necessary. Cyber insurance is emerging as an important tool to protect organizations against cyberattack-related losses. In this work, we extensively examine the relevant literature on cybersecurity insurance, research and practice, in order to draft the current landscape and present the trends.

17.
Open Public Health Journal ; 15(1) (no pagination), 2022.
Article in English | EMBASE | ID: covidwho-2236739

ABSTRACT

Background: The Internet of Medical Things (IoMT) is now being connected to medical equipment to make patients more comfortable, offer better and more affordable health care options, and make it easier for people to get good care in the comfort of their own homes. Objective(s): The primary purpose of this study is to highlight the architecture and use of IoMT (Internet of Medical Things) technology in the healthcare system. Method(s): Several sources were used to acquire the material, including review articles published in various journals that had keywords such as, Internet of Medical Things, Wireless Fidelity, Remote Healthcare Monitoring (RHM), Point-of-care testing (POCT), and Sensors. Result(s): IoMT has succeeded in lowering both the cost of digital healthcare systems and the amount of energy they use. Sensors are used to measure a wide range of things, from physiological to emotional responses. They can be used to predict illness before it happens. Conclusion(s): The term "Internet of Medical Things" refers to the broad adoption of healthcare solutions that may be provided in the home. Making such systems intelligent and efficient for timely prediction of important illnesses has the potential to save millions of lives while decreasing the burden on conventional healthcare institutions, such as hospitals. patients and physicians may now access real-time data due to advancements in IoM. Copyright © 2022 Wal et al.

18.
Problemy Ekorozwoju ; 17(2):80-90, 2022.
Article in English | Web of Science | ID: covidwho-2233711

ABSTRACT

The article considers the impact of transformation processes on business in the context of digitalization. Equally important is the study of the impact of these processes on the training of professionals whose work has had a direct impact on these transformations - accountants, business analysts and auditors. These specialists are faced with the task of analyzing the impact of the facts and determining the change in business development strategy in the context of global digitalization. The field of audit both in the world was able to adapt extremely flexibly to the new realities of functioning in the digitalized world. In this article, the authors reveal the main trends of digitalization of audit in the conditions of economic transformation and limited business practices caused by this global pandemic of 2019-2020. At the same time, the processes of digital transformation are the driving forces of the economy. Computer technology is becoming increasingly involved in reforming the audit institution and changing the trajectory of the auditor's role in such a society.

19.
Journal of Contingencies and Crisis Management ; 29(4):439-444, 2021.
Article in English | APA PsycInfo | ID: covidwho-2230542

ABSTRACT

The outbreak of the COVID-19 pandemic crisis around the world and the resulting unprecedented measures taken by governments required organizations to quickly adopt new ways of (remotely) working. At face value, this would suggest a higher vulnerability for cyber threats. This research note analyses how a global financial institution dealt with this challenge by using Hollnagel's four abilities for resilient performance as a theoretical lens. Semi-structured in-depth interviews with eleven key actors were conducted. Three findings stand out. First, the interviews suggest that the organization performed cyber resiliently in the sense that the number of incidents and impact were not significantly higher. Second, the interviews show that all four abilities of resilience were formally developed prior to the COVID-19 outbreak, but rarely resulted in anticipatory adjustment. Third, the interviews indicate that the ability to respond contributed most to the organization's cyber resilience during the pandemic crisis. To conclude, our research note raises the question to what extent the four potentials should be developed beforehand in order to perform resiliently during crises. (PsycInfo Database Record (c) 2023 APA, all rights reserved)

20.
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2229445

ABSTRACT

During the Covid-19 pandemic, people began to pay attention to their health and choose to use teleconsultation services to reduce physical contact and the possibility of contracting the virus. Users easily submit their data to facilitate the service process. The health industry must be prepared to secure data due to the prevalence of data leaks and sales. In addition to the company's security system, user awareness is the first protection that must be built. This research was conducted on a new object regarding users of telemedicine applications that are rarely applied in Indonesia but are frequently used nowadays. Data was collected by distributing questionnaires to 400 Alodokter users, one of the teleconsultation applications in Indonesia. The questionnaire was developed using the Human Aspect of Information System Questionnaire (HAIS-Q), with seven focus areas in each knowledge, attitude, and behavior dimension. The data is analyzed using Analytical Hierarchy Process (AHP). The result revealed that the information security awareness level is "Good". Based on the dimension, knowledge is the weakest dimension among others, especially related to the focus area of incident reporting and mobile devices. Based on focus areas, information handling is the lowest score, especially regarding setting a screensaver with a short time to minimize other people from accessing personal devices. Based on all items, the weakest item is regarding changing passwords periodically. This means that Alodokter must provide more education to users or improve Alodokter application by requiring users to change their passwords automatically for a period of time. © 2022 IEEE.

SELECTION OF CITATIONS
SEARCH DETAIL