NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Halder, Basudev; Mitra, Sucharita; Mitra, Madhuchhanda – International Journal of Web-Based Learning and Teaching Technologies, 2020
This paper illustrates the cloud-based telemonitoring framework that implements healthcare automation system for myocardial infarction (MI) disease classification. For this purpose, the pathological feature of ECG signal such as elevated ST segment, inverted T wave, and pathological Q wave are extracted, and MI disease is detected by the…
Descriptors: Access to Health Care, Automation, Information Storage, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott – Science Teacher, 2017
The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…
Descriptors: Crime, Telecommunications, Handheld Devices, Science Instruction
Bele, Julija Lapuh; Dimc, Maja; Rozman, David; Jemec, Andreja Sladoje – International Association for Development of the Information Society, 2014
The widespread use of mobile devices that enable Internet access increases the exposure of both individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers. The primary tool for such prevention is…
Descriptors: Consciousness Raising, Internet, Crime, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Lum, Lydia – CURRENTS, 2012
At the end of 2010, for the first time ever, smartphones outsold PCs. Mobile device adoption rates continue to rise rapidly around the world. A recent forecast by Cisco found that global mobile data traffic more than doubled last year, and by the end of 2012, the number of mobile devices in use will outnumber the world's population. In the United…
Descriptors: Foreign Countries, Higher Education, Community Colleges, Institutional Advancement