Results 261 to 270 of about 114,269 (316)

Acceptability of Telehealth as the Default Modality for Multiple Sclerosis Care in Switzerland: Cross-Sectional Study.

open access: yesJMIR Mhealth Uhealth
Ekongefeyin SNN   +12 more
europepmc   +1 more source

Secure medical digital libraries

International Journal of Medical Informatics, 2001
In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical
I, Papadakis   +2 more
openaire   +2 more sources

Digital Security, Part I

Science, 1999
By now, you have probably bought into the idea of using the Internet for e-mail, database searching, and surfing the World Wide Web. You may have even purchased items online and may subscribe to a journal or two in digital form. But is the Internet secure? If you don't know about security technology, the answer is no.
Robert Sikorski, Richard Peters
openaire   +1 more source

Maritime Cyber Security - Securing the Digital Seaways

Engineering & Technology Reference, 2013
Maritime transport is critical to the global economy. In a competitive environment, the industry is constantly seeking economies of scale and efficiencies. This has led to the introduction of larger vessels and an increasing use of information technology to achieve greater automation, both in ports and at sea.
openaire   +1 more source

Digital Security Strategy

2022
This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs.
openaire   +1 more source

Digital Steganography Security

2020
Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information ...
Parkavi R., Anitha S., Gayathri R.
openaire   +1 more source

Playing Digital Security

International Journal of Game-Based Learning, 2017
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception.
Conceição Costa   +3 more
openaire   +1 more source

Digital security governance

2023
With the growing digitalization of businesses, digital security governance (DSG) is becoming central to organizational survival strategies. However, many organizations fail to establish successful DSG practices and, consequently, fail to understand how DSG can lower the severity of cybersecurity failures.
Schinagl, Stef   +3 more
openaire   +1 more source

Digital healthcare security

2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2017
Healthcare is an essential part of the national critical infrastructure network. Of the four critical infrastructures (safety, mission, business and security), hospital infrastructures are a mission-critical infrastructure. Damage to network communications and the loss of patient data would have a detrimental impact on the health provision ...
openaire   +1 more source

Home - About - Disclaimer - Privacy