Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe +2 more
doaj +1 more source
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman +8 more
wiley +1 more source
Using computer vision in security applications [PDF]
In this paper we present projects developed in the Computer Vision Laboratory, which address the issue of safety. First, we present the Internet Video Server (IVS) monitoring system [5] that sends live video stream over the Internet and enables remote ...
Batagelj, Borut +2 more
core
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David +2 more
core +1 more source
Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core +4 more sources
Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles +4 more
wiley +1 more source
Patterns of information security postures for socio-technical systems and systems-of-systems [PDF]
This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems.
Glisson, W., Renaud, K., Storer, T.
core
Reactive Rules for Emergency Management [PDF]
The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for ...
Brodt, Simon +2 more
core +1 more source

