U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks
Conference Proceeding
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016)
U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). , (562-567). https://doi.org/10.1109/HealthCom.2016.7749518
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...
A critique of the implementation of crime and intelligence computing in three British Police forces 1976-1986
Thesis
Naylor, A. S. R. A critique of the implementation of crime and intelligence computing in three British Police forces 1976-1986. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2648
The study will examine the introduction of the computerisation of crime and intelligence recording in three police forces in the United Kingdom in the decade 1976-1986. The ...
You are where you have been.
Conference Proceeding
Clarke, R. A., & Wigan, M. (2008)
You are where you have been. In K. Michael, & M. Michael (Eds.), Australia and the new technologies: Evidence based policy on public administration. [Proceedings of the] Third RSNA Workshop on the Social Implications of National Security: Evidence based policy on public administration, 23-24 July 2008, 100-113
Location is a critical aspect of both privacy and surveillance. A detailed record of locations allows all sorts of other information to be linked together, adding to informati...