Results 51 to 60 of about 247,400 (347)
One-Step, Three-Factor Passthought Authentication With Custom-Fit, In-Ear EEG
In-ear EEG offers a promising path toward usable, discreet brain-computer interfaces (BCIs) for both healthy individuals and persons with disabilities. To test the promise of this modality, we produced a brain-based authentication system using custom-fit
Nick Merrill +3 more
doaj +1 more source
Privacy and Usability of Image and Text Based Challenge Questions Authentication in Online Examination [PDF]
In many online examinations, physical invigilation is often replaced with traditional authentication approaches for student identification. Secure and usable authentication approaches are important for high stake online examinations.
Barker, Trevor +3 more
core +1 more source
Usability of Security Administration vs. Usability of End-user Security
Having recently received increasing attention, usable security is implicitly all about the end user who employs a computer system to accomplish security-unrelated business or personal goals. However, there is another aspect to usable security. Security administrators have to deal with the order of magnitude more difficult problem of administering large-
Zurko, Mary Ellen +3 more
openaire +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Public Evidence from Secret Ballots
Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct ...
A Kiayias +32 more
core +1 more source
Security and Usability: Analysis and Evaluation [PDF]
The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving ...
Kainda, R, Flechais, I, Roscoe, A, IEEE
openaire +5 more sources
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source
The tension of usable safety, security and privacy
Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the Russo-Ukrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and ...
Kaufhold Marc-André +3 more
doaj +1 more source
Usable security and privacy in public services are critical considerations in today’s digital age, where governments increasingly rely on technology to deliver services efficiently while safeguarding sensitive information.
Saqib Saeed
doaj +1 more source
Vertical Farming—Current Practices and Its Future
The depletion of usable agricultural lands has brought up a scenario of vertical farming. This type of farming is mostly considered soil-less farming in the vertical direction.
Syed Muhammad Zaigham Abbas Naqvi +6 more
doaj +1 more source

