We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Exploring the potential of Easy Language for enhancing website sustainability

    Sustainable design principles have become increasingly important in website development, mainly focusing on reducing carbon emissions and energy...

    Mariona González-Sordé in Universal Access in the Information Society
    Article Open access 11 July 2024
  2. Correction: ChatGPT is bullshit

    Michael Townsen Hicks, James Humphries, Joe Slater in Ethics and Information Technology
    Article Open access 11 July 2024
  3. MyBioethics: How Ed-Tech Enables Discovery-Driven Empirical Bioethics Research

    Digital tools have granted new opportunities to engage people with bioethical discussion and rehearsed decision-making. The ongoing development of...

    Joel Janhonen, Mikko Värttö, Heikki Saxén in Digital Society
    Article Open access 10 July 2024
  4. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  5. Impact of linkage level on inferences from big data analyses in health and medical research: an empirical study

    Background

    Linkage errors that occur according to linkage levels can adversely affect the accuracy and reliability of analysis results. This study...

    Bora Lee, Young-Kyun Lee, ... Jean-Kyung Bak in BMC Medical Informatics and Decision Making
    Article Open access 09 July 2024
  6. Improve the efficiency and accuracy of ophthalmologists’ clinical decision-making based on AI technology

    Background

    As global aging intensifies, the prevalence of ocular fundus diseases continues to rise. In China, the tense doctor-patient ratio poses...

    Yingxuan Guo, Changke Huang, ... Yiqi Chen in BMC Medical Informatics and Decision Making
    Article Open access 09 July 2024
  7. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  8. Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model

    In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...

    Stephen McCarthy, Titiana Ertiö, ... Nina Kahma in Information Systems Frontiers
    Article Open access 08 July 2024
  9. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  10. Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse

    There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...

    Nannan **, Juan Chen, ... Juho Hamari in Information Systems Frontiers
    Article Open access 08 July 2024
  11. Optimization of vision transformer-based detection of lung diseases from chest X-ray images

    Background

    Recent advances in Vision Transformer (ViT)-based deep learning have significantly improved the accuracy of lung disease prediction from...

    **sol Ko, Soyeon Park, Hyun Goo Woo in BMC Medical Informatics and Decision Making
    Article Open access 08 July 2024
  12. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  13. A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes

    Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...

    Shabnam FakhrHosseini, Chaiwoo Lee, ... Joseph Coughlin in Information Systems Frontiers
    Article Open access 08 July 2024
  14. Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset

    As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as...

    Klein Galit, Assadi Djamchid, Zwilling Moti in Information Systems Frontiers
    Article 06 July 2024
  15. Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering

    We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality...

    Niels Bylois, Frank Neven, Stijn Vansummeren in Information Systems Frontiers
    Article 05 July 2024
  16. AI Ethics, the Neuralink Enigma, and Statistical Inference as the Anticlimax of Machiavelli’s Prince

    Elon Musk’s Neuralink, one more company hopes to dominate the brain-computer interface (BCI) market, has implanted a brain-reading device into a...

    Antonio Araújo in Digital Society
    Article 05 July 2024
  17. Effect of the data-informed platform for health intervention on the culture of data use for decision-making among district health office staff in North Shewa Zone, Ethiopia: a cluster-randomised controlled trial

    Background

    Similar to other low and middle-income countries, Ethiopia faces limitations in using local health data for decision-making.We aimed to...

    Girum Taye Zeleke, Bilal Iqbal Avan, ... Joanna Schellenberg in BMC Medical Informatics and Decision Making
    Article Open access 05 July 2024
  18. Measuring electronic health literacy in the context of diabetes care: psychometric evaluation of a Persian version of the condition-specific eHealth literacy scale for diabetes

    Background

    The rise of the internet and social media has led to increased interest among diabetes patients in using technology for information...

    Maryam Peimani, Mozhgan Tanhapour, ... Afshin Ostovar in BMC Medical Informatics and Decision Making
    Article Open access 05 July 2024
  19. Trust management in the internet of vehicles: a systematic literature review of blockchain integration

    The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...

    Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani in International Journal of Information Security
    Article 05 July 2024
  20. How intervention studies measure the effectiveness of medication safety-related clinical decision support systems in primary and long-term care: a systematic review

    Background

    Medication errors and associated adverse drug events (ADE) are a major cause of morbidity and mortality worldwide. In recent years, the...

    David Lampe, John Grosser, ... Wolfgang Greiner in BMC Medical Informatics and Decision Making
    Article Open access 04 July 2024
Did you find what you were looking for? Share feedback.