The notation and environment in conceptual modelling transform developers' initial perception about a system to a concrete model. Any usability constraints that the notation and environment impose on the modeling ...
详细信息
The purpose of this paper is to identify the threats that exist in Healthcare informationsystems (HIS). The study has been carried out in three different departments namely, informationtechnology Department (ITD), M...
详细信息
ISBN:
(纸本)9781424451012
The purpose of this paper is to identify the threats that exist in Healthcare informationsystems (HIS). The study has been carried out in three different departments namely, informationtechnology Department (ITD), Medical Record Department (MRD) and X-Ray Department in one of the leading government supported hospital in Malaysia. The hospital was equipped with Total Hospital information System (THIS) environment. The data were collected using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows the most critical threat for the THIS is the power failure. In addition, acts of human error or failure threat also show high frequency of occurrence. The contribution of the paper will be categorization of threats in HIS and can be used to design and implement effective security systems and policies in healthcare setting.
作者:
Runyao DuanYuan FengMingsheng YingState Key Laboratory of Intelligent Technology and Systems
Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China and Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney New South Wales 2007 Australia
We provide a feasible necessary and sufficient condition for when an unknown quantum operation (quantum device) secretly selected from a set of known quantum operations can be identified perfectly within a finite numb...
We provide a feasible necessary and sufficient condition for when an unknown quantum operation (quantum device) secretly selected from a set of known quantum operations can be identified perfectly within a finite number of queries, and thus complete the characterization of the perfect distinguishability of quantum operations. We further design an optimal protocol which can achieve the perfect discrimination between two quantum operations by a minimal number of queries. Interestingly, we find that an optimal perfect discrimination between two isometries is always achievable without auxiliary systems or entanglement.
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in...
详细信息
ISBN:
(纸本)9781424451012
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.
Introduction: Simultaneous recording of electrical potentials from multiple cells may be useful for physiological and pharmacological research. The present study aimed to establish an in vitro cardiac hypoxia experime...
详细信息
This research is concerned with plagiarism in software design. Specifically, the focus is on database design. Generally, producing plagiarized software may be done through illegal use of someone else's source code...
详细信息
This research is concerned with plagiarism in software design. Specifically, the focus is on database design. Generally, producing plagiarized software may be done through illegal use of someone else's source code or database design. Since it is hard to steal source code from the original author(s), the database schema is usually easier to be viewed, studied and hence plagiarized. Efficient design of a database schema requires an understanding of the application area, the data usage patterns, and the underlying database management system. Stealing the effort of this step may be rewarding to some. The main contribution of this paper is the suggestion of a software tool for detecting plagiarized database schemas using structural fingerprints of database tables.
Most software engineering methods presume that requirements are explicitly and completely stated; however, experience shows that requirements are rarely complete and usually contain implicit requirements. The failure ...
详细信息
Most software engineering methods presume that requirements are explicitly and completely stated; however, experience shows that requirements are rarely complete and usually contain implicit requirements. The failure or success of a software system depends on the quality of the requirements. The quality of the requirements is influenced by the techniques employed during requirements elicitation. Requirements elicitation is most critical part of the software development because errors at this beginning stage propagate through the development process and the hardest to repair later. In this paper we have proposed an algorithmic approach to elicit the software requirements and its prioritization of the requirements using analytic hierarchy process (AHP).
Operator training without a process model is necessary in certain plant manufacturing industry's applications because the process models from the control theory perspective are still not available. This paper desc...
详细信息
Operator training without a process model is necessary in certain plant manufacturing industry's applications because the process models from the control theory perspective are still not available. This paper describes an experiment that analyzed the benefits of 3D data visualization integrated in HMI for process control in combination with different types of operator training to obtain process knowledge. The benefits of interactive 3D slider training in identifying errors during operation could be proven.
In this paper,we prove the optimality of disturbance-affine control policies in the context of onedimensional,box-constrained,multi-stage robust *** results cover the finite horizon case,with minimax(worstcase) object...
详细信息
In this paper,we prove the optimality of disturbance-affine control policies in the context of onedimensional,box-constrained,multi-stage robust *** results cover the finite horizon case,with minimax(worstcase) objective,and convex state costs plus linear control *** proof methodology,based on techniques from polyhedral geometry,is elegant and conceptually simple,and entails efficient algorithms for the case of piecewise affine state costs,when computing the optimal affine policies can be done by solving a single linear program.
Methods for testing from finite state machine-based specifications often require the existence of a preset distinguishing sequence for constructing checking sequences. It has been shown that an adaptive distinguishing...
详细信息
Methods for testing from finite state machine-based specifications often require the existence of a preset distinguishing sequence for constructing checking sequences. It has been shown that an adaptive distinguishing sequence is sufficient for these methods. This result is significant because adaptive distinguishing sequences are strictly more common and up to exponentially shorter than preset ones. However, there has been no study on the actual effect of using adaptive distinguishing sequences on the length of checking sequences. This paper describes experiments that show that checking sequences constructed using adaptive distinguishing sequences are almost consistently shorter than those based on preset distinguishing sequences. This is investigated for three different checking sequence generation methods and the results obtained from an extensive experimental study are given.
暂无评论