Sep 4, 2016 | Research library
The pervasiveness of mobile devices such as smart phones, apps, remote monitoring devices, and wearable sensors is enabling growth of Patient Generated Health Data (PGHD) through which people are capturing their vital signs outside the clinical settings. Tracking...
Aug 13, 2016 | Research library
Paper highlighting how constant interrupting messages and updates from computers and phones can impair cognitive functioning due to an effect called dual-task interference (DTI). DTI suggests that 2 tasks can only be performed in unison if there is a loss in overall...
Aug 11, 2016 | Research library
Technology integration is becoming an impetus to everyday lives. This new interconnected world can be found from our most private spaces to the public ones. Smart homes, which is the use of Internet of Things (IoT) within a home, has become the utmost concern in the...
Aug 10, 2016 | Research library
This paper, by application security platform Veracode, addresses the four main causes of vulnerabilities in software today. The authors investigate: insecure coding practises; the ever-shifting threat landscape; the reuse of vulnerable components and code; and...
Jul 11, 2016 | Research library
In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance...
Jul 10, 2016 | Research library
This article outlines the importance of human behaviour when it comes to cyber security and offers some recommendations to help create a stronger ‘human firewall’.