scholarly journals Neurosecurity: security and privacy for neural devices

2009 ◽  
Vol 27 (1) ◽  
pp. E7 ◽  
Author(s):  
Tamara Denning ◽  
Yoky Matsuoka ◽  
Tadayoshi Kohno

An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved—and in some cases entirely new—forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define “neurosecurity”—a version of computer science security principles and methods applied to neural engineering—and discuss why neurosecurity should be a critical consideration in the design of future neural devices.

Author(s):  
Abraham Pouliakis ◽  
Stavros Archondakis ◽  
Efrossyni Karakitsou ◽  
Petros Karakitsos

Cloud computing is changing the way enterprises, institutions, and people understand, perceive, and use current software systems. Cloud computing is an innovative concept of creating a computer grid using the Internet facilities aiming at the shared use of resources such as computer software and hardware. Cloud-based system architectures provide many advantages in terms of scalability, maintainability, and massive data processing. By means of cloud computing technology, cytopathologists can efficiently manage imaging units by using the latest software and hardware available without having to pay for it at non-affordable prices. Cloud computing systems used by cytopathology departments can function on public, private, hybrid, or community models. Using cloud applications, infrastructure, storage services, and processing power, cytopathology laboratories can avoid huge spending on maintenance of costly applications and on image storage and sharing. Cloud computing allows imaging flexibility and may be used for creating a virtual mobile office. Security and privacy issues have to be addressed in order to ensure Cloud computing wide implementation in the near future. Nowadays, cloud computing is not widely used for the various tasks related to cytopathology; however, there are numerous fields for which it can be applied. The envisioned advantages for the everyday practice in laboratories' workflow and eventually for the patients are significant. This is explored in this chapter.


Author(s):  
Siddharth M. Nair ◽  
Varsha Ramesh ◽  
Amit Kumar Tyagi

The major issues and challenges in blockchain over internet of things are security, privacy, and usability. Confidentiality, authentication, and control are the challenges faced in security issue. Hence, this chapter will discuss the challenges and opportunities from the prospective of security and privacy of data in blockchain (with respect to security and privacy community point of view). Furthermore, the authors will provide some future trends that blockchain technology may adapt in the near future (in brief).


1991 ◽  
Vol 2 (3) ◽  
pp. 488-499
Author(s):  
Richard G. Smith ◽  
Marilyn Cleavinger

An overview of currently available circulatory assist devices (CADs) is presented with discussion of each system’s optimal use and limitations. Successful application of CAD technology for bridge to transplant or pending recovery of the natural heart requires understanding issues involving team readiness, patient selection, device limitations, patient management, and complications. Currently, many of these devices are in clinical trials with the Food and Drug Administration (FDA). The FDA and the National Institutes of Health play major roles in the ongoing development of this technology. In the near future the learning curve continues as totally implantable systems are used. The ultimate goal is to maintain patients with heart failure on implantable devices with a good quality of life at a reasonable cost


Author(s):  
Luppicini Rocci

A major struggle within our evolving knowledge society is that increasingly potent scientific and technological growth is forcing individuals to re-examine how technology is viewed. This is especially salient in the pure and applied sciences where technological developments offer ways to surpass current human capacities and affect life in ways that were not imaginable fifty years ago. New breakthroughs in medicine, information and communication technology, transportation and industry are juxtaposed with growing needs to deal with moral and ethical dilemmas associated with new technological developments. Increased reliance on new technology creates fundamental challenges revolving around security and privacy issues, access issues to education and health care, legal issues in online fraud and theft, employer and government surveillance, policies issues in creating and implementing ethical guidelines and professional codes of conduct, along with ethical dilemmas in a number of vital areas of research and development.


Author(s):  
Keng Siau ◽  
Shane Meakim

What would you do if I told you that I could read your mind? Given that I am not a psychic, but a Web site administrator, you would probably not believe me. There are organizations that maintain databases of almost every consumer in the United States and even the world. One organization claims to have a database that encompasses 90% of all US consumers. Once an organization was given the name of a man and was told he lived in the US. In less than 48 hours they found where he worked, where he lived, who he was married to, how many times he was married, the contents of his financial portfolio, what credit cards he had, and what he bought at grocery stores. Amazingly, this information was obtained legally from various Web sites. The fact that you use a computer at home does not ensure your anonymity. You are being tracked in more ways than you could possibly think. As you surf the Net, facts are compiled about you. These pieces of information can range from the places or sites you visit and how long you stayed there to where you come from. These issues concerning trust, security, and privacy in cyberspace must be addressed in the near future and are critical to the growth of electronic business (Siau & Whitacre, 2001; Keen et al., 2000; Turban et al., 2000; Fingar et al., 2000; Kaufman et al., 1995; Ford & Baum, 1997).


Sananjalka ◽  
2018 ◽  
Vol 60 (60.) ◽  
pp. 204-216
Author(s):  
Maria Laakso

Coming of age and classification of adolescents In Salla Simukka’s YA-dystopias Jäljellä and Toisaalla Finnish YA-author Salla Simukka takes a current societal problem into the center of her novel pair Jäljellä (Left Over, not translated, 2012) and Toisaalla (Elsewhere, not translated, 2012). These novels criticize the current system, where even young children are forced to choose specialized studies and make decisions that affect their whole future. This is a consequence on a modern western information society, where branches of knowledge are differentiated. These theme Simukka’s novels handle with the methods off dystopic fiction. Both novels depict a dystopic world, where adolescents are classified into groups based on their personality and their talents. Both novels depict a world very much like our own, but the time of the story lies in the near future. As usual to the dystopic fiction the author pics up some existing progressions from the reality and then extends those conditions into a future, and this way the flaws of the current conditions are revealed. In my article I claim, that Simukka’s novels take under critical consideration the whole Western concept of coming of age. Especially crucial is the idea of growth as being something controllable. In western cultures the growing up of an individual is standardized and regulated by institutions and fields of science such us daycare, school, medicine, and psychology. In Simukka’s novels this idea is exaggerated but still recognizable.       The motif of classifications or sorting the adolescents has lately been popular in YA-fantasy and YA-dystopia. Simukka’s novels borrow from two bestsellers: J.K. Rowling’s Harry Potter -series (1997–2007), and Veronica Roth’s Divergent-series (2011–2013). These examples seem to prove, that the idea of adolescents of being sorted or being classified is important in contemporary genre fiction targeting young audiences.  Sorting or classification as motifs seem to be connected to the contemporary understanding of youth and growing up. In this article I consider the classification motif in Simukka’s novel. I consentrate especially to the connections between the motif and the wider theme of growing up. I examine the motif beside the Western ideas of growth and coming of age. Besides that I also study the different genre frames Simukka’s novels use to discuss of growing up in contemporary society. These genre traditions include dystopic fiction, YA-literature and fairytale. In this article I propose, that the classification motif allegorizes the demands set to adolescents in contemporary society but also appeals to the young readers as a fantasy of belonging to the group.  


Author(s):  
Luppicini Rocci

A major struggle within our evolving knowledge society is that increasingly potent scientific and technological growth is forcing individuals to re-examine how technology is viewed. This is especially salient in the pure and applied sciences where technological developments offer ways to surpass current human capacities and affect life in ways that were not imaginable fifty years ago. New breakthroughs in medicine, information and communication technology, transportation and industry are juxtaposed with growing needs to deal with moral and ethical dilemmas associated with new technological developments. Increased reliance on new technology creates fundamental challenges revolving around security and privacy issues, access issues to education and health care, legal issues in online fraud and theft, employer and government surveillance, policies issues in creating and implementing ethical guidelines and professional codes of conduct, along with ethical dilemmas in a number of vital areas of research and development.


2002 ◽  
Vol 7 (1) ◽  
pp. 218-221 ◽  
Author(s):  
Ross Coomber

This brief commentary discusses the problematic incursion of Research Ethics Committees on social research, particularly on those groups who wish (and/or indeed it is vital for their safety) to remain anonymous. It is argued that REC's, often ignorant of social science methodology, commonly attempt to impose restrictions on research and researchers that contradict their own ethical guidelines and expose them to unreasonable risk. It is further pointed out that REC's are as yet not fully established within all UK institutions but fear of litigation will mean that those who do not already have them fully in place either have some form of REC in embryonic structure or are looking to implement REC's in the near future. It is in this context that it is argued we as social scientists should be helping to actively shape the workings of incumbent and emerging REC's in order to protect research, researchers, research participants and the integrity of what REC's actually do.


2019 ◽  
Vol 268 ◽  
pp. 02007
Author(s):  
Piyanart Sommani ◽  
Anchaleeporn Waritswat Lothongkum ◽  
Panuwat Jumpasri ◽  
Nichit Hongbin ◽  
Wasana Kowhakul

Process safety management (PSM) has been a critical consideration in the plants that handle highly hazardous chemicals (HHCs), flammable gases and liquids. This article introduces PSM standard by OSHA's 29 CFR 1910.119. Further, it highlights an effective PSM for HHCs and provides PSM practices of the industries in Thailand. Effective PSM can prevent or mitigate catastrophic releases of HHCs which can cause health problems, fires, explosions, and fatalities. It is a disciplined framework for managing the integrity of operating systems, safety critical equipment (SCE) and safe work practices. Effective implementation and audits of PSM system and the continual improvement are important. It requires the industries to execute suitable leading and lagging process safety metrics. The inclusive and integrated PSM intents, human factors, good design principles, recognized and generally accepted good engineering practices (RAGAGEPs), engineering and administrative controls, and integrity of operating and maintenance practices are substantial key roles. It is important that the PSM system should be risk-based under the ALARP concept because hazards and risks are not equal, and there are multiple risks and consequences to consider. In summary, the PSM effectiveness depends on, for example, process safety metrics, management review, audit findings and particularly workforce involvement.


2012 ◽  
Vol 2 (2) ◽  
pp. 48-58 ◽  
Author(s):  
Vanessa Ratten

Cloud computing is an emerging service technology that has ethical and entrepreneurial implications. Due to technological innovations increasing the attention placed on cloud computing services, more people are focusing on the security and privacy issues determined by ethical guidelines and how the technology is evolving as an entrepreneurial service innovation. This paper presents a theoretical perspective on how a person adopts cloud computing. The literature on technology innovation and adoption behaviour is examined with a focus on social cognitive theory. A theoretical framework is then presented, which indicates a number of propositions to describe the intention of a person to adopt cloud computing services. The role of technology marketing capability, sustained learning and outcome expectancy are included in helping to understand the role of cloud computing applications. Suggestions for future research and practical implications are stated.


Sign in / Sign up

Export Citation Format

Share Document