[HTML][HTML] Vulnerability to cyberattacks and sociotechnical solutions for health care systems: systematic review

P Ewoh, T Vartiainen - Journal of medical internet research, 2024 - jmir.org
Background Health care organizations worldwide are faced with an increasing number of
cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant …

[HTML][HTML] Using machine learning for dynamic authentication in telehealth: A tutorial

M Hazratifard, F Gebali, M Mamun - Sensors, 2022 - mdpi.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

Leveraging human factors in cybersecurity: an integrated methodological approach

A Pollini, TC Callari, A Tedeschi, D Ruscio… - Cognition, Technology & …, 2022 - Springer
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …

A principlist framework for cybersecurity ethics

P Formosa, M Wilson, D Richards - Computers & Security, 2021 - Elsevier
The ethical issues raised by cybersecurity practices and technologies are of critical
importance. However, there is disagreement about what is the best ethical framework for …

The AI carbon footprint and responsibilities of AI scientists

G Tamburrini - Philosophies, 2022 - mdpi.com
This article examines ethical implications of the growing AI carbon footprint, focusing on the
fair distribution of prospective responsibilities among groups of involved actors. First, major …

[HTML][HTML] An intelligent opportunistic routing algorithm for wireless sensor networks and its application towards e-healthcare

DK Bangotra, Y Singh, A Selwal, N Kumar, PK Singh… - Sensors, 2020 - mdpi.com
The lifetime of a node in wireless sensor networks (WSN) is directly responsible for the
longevity of the wireless network. The routing of packets is the most energy-consuming …

Designing Accessible Obfuscation Support for Blind Individuals' Visual Privacy Management

L Zhang, A Stangl, T Sharma, YY Tseng, I Xu… - Proceedings of the …, 2024 - dl.acm.org
Blind individuals commonly share photos in everyday life. Despite substantial interest from
the blind community in being able to independently obfuscate private information in photos …

Explainable AI for cybersecurity

SR Sindiramutty, CE Tan, SP Lau… - … in Explainable AI …, 2024 - igi-global.com
In recent years, the utilization of AI in the field of cybersecurity has become more
widespread. Black-box AI models pose a significant challenge in terms of interpretability and …

[HTML][HTML] Ethical principles sha** values-based cybersecurity decision-making

J Fenech, D Richards, P Formosa - Computers & Security, 2024 - Elsevier
The human factor in information systems is a large vulnerability when implementing
cybersecurity, and many approaches, including technical and policy driven solutions, seek …

“How technical do you get? I'm an English teacher”: Teaching and Learning Cybersecurity and AI Ethics in High School

Z Kilhoffer, Z Zhou, F Wang, F Tamton… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Today's cybersecurity and AI technologies are often fraught with ethical challenges. One
promising direction is to teach cybersecurity and AI ethics to today's youth. However, we …