Technological Issues for Body Information Monitoring

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ethical Issues in Technological Disaster: A Systematic Review of Literature

Ethical issues in Technological disaster: A systematic review of literature Introduction: Industrialization could bring risk of Technological Disaster (TD) such as happened in Chernobyl, Bhopal and Fukushima crisis. little has been discussed about its related ethical issues. In this study, we aimed to investigate ethical issues have been stated for technological disasters. Material and Methods:...

متن کامل

Using Card Sorts for Understanding Website Information Architectures: Technological, Methodological and Cultural Issues

The card sort technique has many uses in HCI research and practice. Card sorts have traditionally been conducted with physical cards but now programs are available for this task. It is unclear if results from an online version of this technique are as reliable as the “oncard” version. This paper presents a study comparing oncard and online versions of the card sort technique for card set reflec...

متن کامل

Issues in Informing Science and Information Technology Discipline Formation in Information Management: Case Study of Scientific and Technological Information Services

Discipline formation in information management is investigated through a case study of the origination and development of information services for scientific and technical information in Australia. Particular reference is made to a case of AESIS, a national geoscience, minerals and petroleum reference database coordinated by the Australian Mineral Foundation. This study provided a model for con...

متن کامل

Cognitive Hacking: Technological and Legal Issues

In this paper, we define a category of computer security exploits called "cognitive hacks." Loosely speaking, cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences

سال: 2013

ISSN: 1226-4717

DOI: 10.7840/kics.2013.38b.2.105