Chapter 5: Discussion & Conclusion
|
|
|
- Lindsey Hodges
- 10 years ago
- Views:
Transcription
1 Chapter 5: Discussion & Conclusion
2 5.1 INTRODUCTION The outcome of this research is analyzed to check if it meets the objectives outlined in chapter one. In chapter one, for each objective, a set of research questions was formulated to help in achieving the stipulated objectives. In this chapter, the questions will be revisited to check if they have been answered. There would be scenarios where the question was eliminated; the justification of this elimination would be presented in the upcoming discussion. One of the research outcomes is to produce a prototype application to show the viability of this research topic. The pitfalls in the development processes will be discussed as the problems and limitations faced in this dissertation; however some recommendations for future enhancement of the prototype application will be outlined at the end to conclude this research. 5.2 RESEARCH OUTCOMES & DISCUSSION Two outcomes have been achieved at the end of this research. Firstly a prototype is developed to demonstrate the implementation of secure medical record using smartcard technology. The next outcome is the review of the study in two major subject domains of the research, Electronic Medical Record (EMR) and Smartcard Technology. Although the main expected research outcome stated in this chapter has been achieved, the validity and limitation of the achieved outcomes would only be considered successful if the research 145
3 questions to achieve the objectives are clearly answered. The discussion below attempts to measure the achievement of the research in accordance to the research questions for each objective Objective 1: To evaluate the significance of Electronic Medical Record (EMR) in healthcare institutions The outcome of this objective is to be able to understand the significance of EMR and to implement the concept in this research. To achieve this objective a literature review was carried out. The outcome of the study on what is an EMR, the different terminologies in EMR study, the importance and the emergence of the field, the adoption of EMR in healthcare industry and the issues and concerns of records security have been summarized as EMR is one of most fast growing bioinformatics field and more and more countries and healthcare organizations are moving towards implementing it to improve their service level to their patients. EMR also reduces operational cost in healthcare organization. The research questions formulated earlier for this objective are as follows: What are the different terms and definitions of EMR in healthcare? What are the strengths and limitations of an EMR based system? What are major concerns of EMR adoption? What are the threats to EMR? What are the EMR security concerns? There were many different definitions for electronic medical records by different authors and from different type of information it carries, however the definition stated in the 146
4 literature review is best described to suit the scope of the project. Although EMR offers many benefits and strength, the major concern of EMR implementation is the threats it poses from various parts of the system. Patient s concern over security, privacy and confidentiality of their EMR were also identified as the major barrier in adopting EMR systems. The acceptance level of EMR in most parts of the world is still low and this clearly reflected by the total number of implementations and the adoption rate of EMR among the healthcare service providers. All five questions were addressed in detail in the literature review study and this certainly implies that this research has managed to achieve its first objective successfully Objective 2: To study how the smartcard technology is used to secure electronic medical information The next study objective in the literature review is about the smartcard technology and its capabilities to support the implementation of a secure medical record. The conclusion from the study is that smartcards contain the technical ability to hold medical records and its best suited with all required technical architecture to protect the EMR. However, there is still the gap of implementing EMR on smartcards. Research questions for this objective as stated earlier are as follows: What is the architecture and components of a smartcard? What are the different types of smartcards adopted currently? What are the international and industrial standards used for smartcards? How smartcard is being utilized in healthcare industry? How smartcard can be used to secure health information? 147
5 In conclusion from the study done in the literature review, smartcards have the full capability to hold electronic medical records securely by adopting some standards and other security measures efficiently Objective 3: To develop a prototype application to support secure implementation of EMR using smartcard Chapter 3 explains in detail what the security concerns of EMR are and how a secure implementation of EMR can be achieved using smartcard technology. File System API commands and Security API commands where implemented to provide the entire system architecture a 4-level security option. The outcome of this objective was the successful implementation of the 4-level security model using smartcard. As stated in 1.7.3, the research question for objective three are: What are the smartcard protocols and standards to be adopted? What are the technical measures taken to secure the EMR on the smartcard? What is the software development methodology to be used for the implementation? Does the prototype application demonstrate sufficient security measures for the medical records on a smartcard? Do the general security test, compliance test and performance evaluation results of the developed prototype validate the secure implementation of EMR Smartcard? 148
6 In Chapter 3, first three questions were answered and with the technical measures and methodological approaches clearly defined. An object-oriented approach was adopted, in the form of UML methodology, for the analysis and design part. Chapter 4 answers the last two questions by justifying the development platform and gives a detailed and systematic test procedure to analyze the results of the secure medical record smartcard prototype. The expected research outcome and the final research outcome do vary in different degrees based on the objective itself. As a result of not having questionnaires for the study analysis, the outcomes only depict the compilation of other research work done in the similar area. However, the study conducted in the literature review provided all the information required for the two technical fields involved, the EMR and smartcard technology. The limitation and the challenges faced to reach the outcome will be discussed in the next section SUMMARY OF ACHIEVEMENTS The achievements in this research are as below: Thorough understanding of the different definitions of electronic medical records Thorough understanding of the distinct difference between smartcard technologies and how they can be implied in software applications. Successful in using the unified software development methodology to design and develop the tool. A 4-level security model was successfully created and tested for EMR smartcard application. 149
7 Successfully developed the clinic management system with secure electronic medical record prototype implemented. Successfully compared the results from various test procedures to justify the success of the Secure EMR implementation using smartcard technology. 5.3 CHALLENGES The challenges faced in this research are mostly from two sources. Firstly, the research done in the area of smartcard-based electronic medical record is scarce. Although there are number of researches done on the field of electronic medical record, not many implementations have the smartcard component as a topic. Most of researches are focusing on implementation of EMR using database-related or web-based system architecture. This restricts the availability of study material to gain more information on the related topics. Secondly, the development of smartcard applications is made complicated with choice of smartcard platforms or frameworks available. There are many smartcard operating systems available in the market, but every smartcard manufacturer has implemented the Security API in different ways although the final outcome would be similar. The familiarization process with the smartcard technology requires quite substantial amount time, which restricts from analyzing all available smartcard operating systems for comparison. A long duration of time was spent in understanding the methods, functions and how the prototype application works for the integration. Some built-in classes could not be understood, and 150
8 hence, an alternative method was taken to design and implement classes to support the features mentioned as in the user requirement. 5.4 LIMITATION Limitation of this research will be explained in two sections. Firstly the limitation will be addressing the lack of information on the study of EMR adoption in Malaysia. Initially this research intended to provide significant information and analyzing the implementation of EMR in Malaysia. However due to limitation of resources of published information on the Telehealth project, this section was only narrated on what and how it was implemented currently in a very small scope. Further explanation and implementation methodology of this national project was not available for public access, therefore this research could only present the information and study based on available information published in yearly reports and newspaper articles. This has also made the comparison of implementation on EMR systems impossible to be presented. The second area of limitation is more towards the architecture and study of the smartcard technology. There were many smartcard technology available in the market, however analysis the characteristic, strength and limitations was impossible within the short time span. Moreover, the scope of this research was to enhance the security aspect therefore the concentration of the study on smartcard was on the architecture details. Apart from this the other constraint is the limitation of the architecture of the card. The memory and storage limitation limit the idea of having large amount of health information stored within the 151
9 card. Therefore what is to be stored in the smartcard will be determined by the memory allocation of the card and this makes it quite impossible for health cards to have historical information. 5.5 FUTURE ENHANCEMENTS The implementation of a smartcard-based secure medical record can be further improved by applying more features of the smartcard technology to improve the following areas: Memory management: A well-defined memory mapping of the card EEPROM will significantly improve the memory efficiency. Windows-like folder architecture with suitable file type can be adopted for this purpose. In the current research, a Variable Length Record File was used to store medical records. By adopting Dynamic Length Record File, memory usage will be reduced and more data can be stored. Use of Public Key Infrastructure (PKI): The current implementation of 4-level security model relies on internal and external key management architecture and encryption of data using industrial standard triple DES algorithm. Using PKI, a more robust, efficient and secure key handling method can be implemented with the use of a more sophisticated cryptography technology. All records in the current EMR smartcard is written in an encrypted format, but have not been compressed. This was not a part of the current research, but would 152
10 definitely improve other aspects of a smartcard application, i.e transmission time, memory management and data retrieval process, if implemented wisely. Adopting Open Source card architecture such as JavaCard (OpenCard Framework) would give more space for manufacturer-independent development environment. The current research utilizes PC/SC standards for smartcard from Microsoft and ACOS, a vendor-specific card operating system. Healthcare industry-specific standard (HL7) incorporation on the EMR Smartcard records. On the other hand, another recommendation for future work would be a localized survey and study of the EMR in Malaysian environment. As the government envisions implementing the national Telehealth Plan, it would be greatly beneficial if a localized study conducted with more detailed medical records retrieved from our available Total Hospital Information System. 5.6 SUMMARY Patients in the modern world are more concerned about the use of their medical records to receive better healthcare anywhere they go. The emergence of the need to keep and carry such highly confidential data is significantly rising over the past decade. As the infusion of 153
11 information technology is growing in fast phase, more and more hospitals or medical institutions are moving forward to implement a complete hospital information system. Although such systems provide a mechanism for the care providers to share the medical records among them, the real need of the patient to hold their own records in the wallet is not being achieved. Patients want their medical records stored in a media that they can easily and securely access as and when they need. Smartcard technology promises a secure means for such data, but the issues and concerns surrounding the technology have to be address effectively. This research has clearly outlined the significance of the two major components, EMR and smartcard technology, and has derived a method for the implementation of secure medical record using the smartcard technology. As conclusion in this study, an in-depth understanding of the related fields and concepts in securing electronic medical record were achieved. To illustrate the research idea, a prototype application was developed and tested. The user testing of application shows the aim of the research has been fulfilled. However, with the limitation of the implementation, the flaws of smartcard security handling are to be noted for further improvement. 154
IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY
IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY JOTHI PRAKASH A/L MURUGAN DISSERTATION SUBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF COMPUTER SCIENCE FACULTY
Chapter 1: Introduction
Chapter 1: Introduction 1.1 BACKGROUND AND MOTIVATION The infusion of Information Technology (IT) has triggered rapid changes in the healthcare sector in various ways. IT infusion is the degree to which
1. Introduction to ehealth:
1. Introduction to ehealth: E-Health is one of the fastest growing areas within the health sector. The scope of e- Health involves application of the knowledge, skills and tools, which enable information
360 Takes Transcription to the Next Level... 2 Web-Based Services... 3 Traditional Services... 4 Best of Both Worlds 360 s EHR Solution...
Table of Contents 360 Takes Transcription to the Next Level... 2 Web-Based Services... 3 Traditional Services... 4 Best of Both Worlds 360 s EHR Solution... 5 Corporate Office 14977 King Road, Danvers,
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Background The command over cloud computing infrastructure is increasing with the growing demands of IT infrastructure during the changed business scenario of the 21 st Century.
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Introduction to Enterprise Project Management
001_0672329212_Intro.qxd 10/1/07 9:42 AM Page 1 Introduction to Enterprise Project Management Throughout this book, you will see that Enterprise Project Management (EPM; also called Enterprise Portfolio
G R E E N W I C H S C H O O L O F M A N A G E M E N T. management. programmes
G R E E N W I C H S C H O O L O F M A N A G E M E N T L O N D O N executive management programmes contents Personal Message from the Director of the GSM Executive Programmes 3 The Executive Master of
Project estimation with Use Case Points using Enterprise Architect (EA)
Project estimation with Use Case Points using Enterprise Architect (EA) Step by Step Guide: How to use Enterprise Architect (EA) as a CASE tool to facilitate calculating Use Case Points for software projects
CTI Higher Certificate in Information Systems (Engineering)
CTI Higher Certificate in Information Systems (Engineering) Module Descriptions 2015 CTI is part of Pearson, the world s leading learning company. Pearson is the corporate owner, not a registered provider
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Overview Cloud computing has emerged as a business IT solution that provides a new way to manage and deliver automated computing services to consumers via the Internet (Shawish
Telecommunication (120 ЕCTS)
Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING A report submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Science (Computer Systems & Networking)
A Case Study on Model-Driven and Conventional Software Development: The Palladio Editor
A Case Study on Model-Driven and Conventional Software Development: The Palladio Editor Klaus Krogmann, Steffen Becker University of Karlsruhe (TH) {krogmann, sbecker}@ipd.uka.de Abstract: The actual benefits
INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0
INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0 Document Code: ST_UT_MB_MSO_2.0_18042012 The data and information contained in this document cannot be altered without the express written permission of SecuTech
Chapter 3 Research Methodology
Chapter 3 Research Methodology Over the last decade, there has been a constant increase in the number of software engineering researchers exploring a faster and efficient way of developing mobile applications.
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007
5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007 Course Number: 5053A Course Length: 3 Days Course Overview This three-day instructor-led course provides students with the
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015
City University of Hong Kong Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015 Part I Course Title: Mobile Application Programming Course Code:
A Proven Approach for Successful Systems Integration
FIS POSITION PAPER A Proven Approach for Successful Systems Integration David Luttig FIS Consulting Services 1 800 822 6758 Introduction System integration involves integrating existing (often disparate)
Table of Contents. Preface... 1. 1 CPSA Position... 2. 1.1 How EMRs and Alberta Netcare are Changing Practice... 2. 2 Evolving Standards of Care...
March 2015 Table of Contents Preface... 1 1 CPSA Position... 2 1.1 How EMRs and Alberta Netcare are Changing Practice... 2 2 Evolving Standards of Care... 4 2.1 The Medical Record... 4 2.2 Shared Medical
Bachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Common Questions and Concerns About Documentum at NEF
LES/NEF 220 W Broadway Suite B Hobbs, NM 88240 Documentum FAQ Common Questions and Concerns About Documentum at NEF Introduction...2 What is Documentum?...2 How does Documentum work?...2 How do I access
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
Building Secure Cloud Applications. On the Microsoft Windows Azure platform
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
Protecting systems and patient privacy
Protecting systems and patient privacy Philips Remote Services Security Remote services deliver the benefi ts of faster, easier problem resolution and less system downtime during troubleshooting and clinical
Master s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
10972B: Administering the Web Server (IIS) Role of Windows Server
10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate
m Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
HIT Workflow & Redesign Specialist: Curriculum Overview
HIT Workflow & Redesign Specialist: Curriculum Overview Component - Description Units - Description Appx. Time 1: Introduction to Health Care and Public Health in the U.S. Survey of how healthcare and
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
SYSTEMS APPROACH FOR BETTER EDUCATION RESULTS SABER. August 2014. Education Management Information Systems Data Collection Instrument Training Manual
SYSTEMS APPROACH FOR BETTER EDUCATION RESULTS SABER August 2014 Education Management Information Systems Data Collection Instrument Training Manual Contents Introduction... 2 Overview of the SABER... 3
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
A Mind Map Based Framework for Automated Software Log File Analysis
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake
All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME
All Rights Reserved Index No No. of Pages - 09 No of Questions - 07 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME END SEMESTER EXAMINATION OCTOBER 2015
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Microsoft Solutions for Security. Delivering the Windows Server 2003 Security Guide
Microsoft Solutions for Security Delivering the Windows Server 2003 Security Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice.
USE OF INFORMATION SOURCES AMONGST POSTGRADUATE STUDENTS IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING A CITATION ANALYSIS YIP SUMIN
USE OF INFORMATION SOURCES AMONGST POSTGRADUATE STUDENTS IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING A CITATION ANALYSIS YIP SUMIN A dissertation submitted in partial fulfillment of requirements for the
Design with Reuse. Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1
Design with Reuse Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1 Objectives To explain the benefits of software reuse and some reuse
Using Web-based Tools to Enhance Student Learning and Practice in Data Structures Course
Using Web-based Tools to Enhance Student Learning and Practice in Data Structures Course 1. Introduction Chao Chen January 2014 The purpose of this project is to enhance student learning and practice in
- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
11 Tips to make the requirements definition process more effective and results more usable
1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to
Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC)
Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC) Preamble These CTAC are applicable to programs having titles involving Information
Study Plan for the Bachelor Degree in Computer Information Systems
Study Plan for the Bachelor Degree in Computer Information Systems The Bachelor Degree in Computer Information Systems/Faculty of Information Technology and Computer Sciences is granted upon the completion
Agile Master Data Management A Better Approach than Trial and Error
Agile Master Data Management A Better Approach than Trial and Error A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary Market leading corporations are
Agent vs. Agent-less auditing
Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE
INTRODUCTION TO JAVA PROGRAMMING LANGUAGE Today Java programming language is one of the most popular programming language which is used in critical applications like stock market trading system on BSE,
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Outline How do you protect your critical confidential data?
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Course Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
Contact Center Security: Moving to the True Cloud
White Paper Contact Center Security: Moving to the True Cloud Today, Cloud is one of the most talked about trends in the IT industry. It s a paradigm many believe will have a widespread business impact.
JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
SOFTWARE ENGINEERING TRACK JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
A Pluggable Security Framework for Message Oriented Middleware
A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.
Baltimore UniCERT. www.baltimore.com. the world s leading PKI. global e security
TM the world s leading PKI www.baltimore.com global e security Bringing Real Business On-Line The Internet is now forming a key part of organizations operating strategy. Although most companies accept
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
Table of Contents. CHAPTER 1 Web-Based Systems 1. CHAPTER 2 Web Engineering 12. CHAPTER 3 A Web Engineering Process 24
Table of Contents CHAPTER 1 Web-Based Systems 1 The Web 1 Web Applications 2 Let s Introduce a Case Study 3 Are WebApps Really Computer Software? 4 Are the Attributes of WebApps Different from the Attributes
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS)
CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS) Prescriptive Process Model Defines a distinct set of activities, actions, tasks, milestones, and work products that are required to engineer high quality
Generating Aspect Code from UML Models
Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany [email protected] Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
Issues in Smart Card Development
Middleware Issues in Smart Card Development Simplifying Smart Card Access under Windows a White Paper Abstract In todays business environment there is an increased awarness of security, which is driving
On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma [email protected] CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma [email protected] CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
DATA COLLECTION TECHNIQUES
DATA COLLECTION TECHNIQUES Kongmany Chaleunvong GFMER - WHO - UNFPA - LAO PDR Training Course in Reproductive Health Research Vientiane, 25 September 2009 1 OBJECTIVES At the end of this session you should
