To see the other types of publications on this topic, follow the link: Email Misuse.

Journal articles on the topic 'Email Misuse'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Email Misuse.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chiluwa, Innocent. "Nigerian English in informal email messages." English World-Wide 31, no. 1 (2010): 40–61. http://dx.doi.org/10.1075/eww.31.1.02chi.

Full text
Abstract:
This study applies a sociolinguistic and discourse-analytical methodology to the study of features and manifestations of Nigerian English in computer-mediated communication, particularly informal emails. The data comprise 133 email samples consisting of messages received or sent within a seven-year period, i.e. between 2002 and 2009, from typical Nigerian environments, as well as by the youth, adults and the elderly. Analyses reveal that the rise of new media technologies and digital communication has provided a resource for the use and dissemination of Nigerian English alongside Nigerian cult
APA, Harvard, Vancouver, ISO, and other styles
2

Farooqi, Shehroze, Maaz Musa, Zubair Shafiq, and Fareed Zaffar. "CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 336–54. http://dx.doi.org/10.2478/popets-2020-0076.

Full text
Abstract:
AbstractOnline social networks support a vibrant ecosystem of third-party apps that get access to personal information of a large number of users. Despite several recent high-profile incidents, methods to systematically detect data misuse by third-party apps on online social networks are lacking. We propose CanaryTrap to detect misuse of data shared with third-party apps. CanaryTrap associates a honeytoken to a user account and then monitors its unrecognized use via different channels after sharing it with the third-party app. We design and implement CanaryTrap to investigate misuse of data sh
APA, Harvard, Vancouver, ISO, and other styles
3

Babeetha, Muruganantham, Modi Akash, Gehlot Eshwesh, and Botikar Abhishek. "Cloud Computing Technique Applied to Detect Cyber-Attacks on Web Application." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1498–500. https://doi.org/10.35940/ijeat.D7538.049420.

Full text
Abstract:
The targeted malignant emails (TME) for PC arrange misuse have become progressively deceptive and all the more generally common as of late. Aside from spam or phishing which is intended to fool clients into uncovering individual data, TME can misuse PC systems and accumulate touchy data which can be a major issue for the association. They can comprise of facilitated and industrious battles that can be terrible. Another email-separating procedure which depends on bowl classifier and beneficiary arranged highlights with an arbitrary backwoods classifier which performs superior to two conventiona
APA, Harvard, Vancouver, ISO, and other styles
4

Karlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.

Full text
Abstract:
Nowadays, email has become the most widely communication way in daily life. Email is a very important method of communicating across the internet. During transmission and downloads, it uses protocols which are not secure. Spammers and scammers misuse these protocols to gain access to critical data stored in the email. This triggered concerns because sometimes email is used to exchange confidential messages. To improve security and efficiency of email system, we made an email security system for Android mobile phone using Hill Cipher algorithm. Hill Cipher is a classic cryptography algorithm th
APA, Harvard, Vancouver, ISO, and other styles
5

Kameg, Brayden N., Dawn Lindsay, Heeyoung Lee, and Ann Mitchell. "Substance Use and Exposure to Adverse Childhood Experiences in Undergraduate and Graduate Nursing Students." Journal of the American Psychiatric Nurses Association 26, no. 4 (2020): 354–63. http://dx.doi.org/10.1177/1078390320905669.

Full text
Abstract:
BACKGROUND: Substance misuse remains a public health crisis and contributor to morbidity and mortality. The nursing workforce is not immune to the impacts of substance misuse as rates are thought to mirror those of the general population. Additionally, as substance misuse often begins in adolescence or early adulthood, prevalence of misuse among practicing nurses highlights the fact that students are also at risk. OBJECTIVES: The purpose of this study was to examine rates and patterns of substance use and adverse childhood experience (ACE) exposure among nursing students while also examining a
APA, Harvard, Vancouver, ISO, and other styles
6

Soma Niloy Ghosh and Jayesh V Jawade. "Comparative analysis on different phishing website detection techniques." International Journal of Frontiers in Engineering and Technology Research 8, no. 2 (2025): 055–62. https://doi.org/10.53294/ijfetr.2025.8.2.0036.

Full text
Abstract:
Phishing attack is an attempt to obtain confidential information or data, such as credit and debit card details, username, passwords, etc. by creating a fake website which is very much similar to genuine website. Because of visual similarity of website, users are not able to distinguish between a legitimate and phishing websites. Phishing attack often targets users to enter their personal information at a phishing website. Then that information is directly send to attackers. In today’s world most of the phishing attack takes place with the help of spoofed emails. The attackers first send the e
APA, Harvard, Vancouver, ISO, and other styles
7

Oktaviani, Ayu Nur, Asep Id Hadiana, and Melina Melina. "Enhancing Email Client Security with HMAC and PGP Integration to Mitigate Cyberattack Risks." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 311–17. https://doi.org/10.46336/ijqrm.v5i3.758.

Full text
Abstract:
The rapid advancement of technology in the modern era has significantly increased the risk of data breaches and misuse, particularly in email communications. Ensuring data privacy and security is crucial to preventing information theft and mitigating cyberattack risks. This research focuses on enhancing email client security through the integration of Hash-Based Message Authentication Code (HMAC) and Pretty Good Privacy (PGP). HMAC is employed as a message authentication mechanism to ensure the integrity and authenticity of email messages, while PGP is utilized to generate public and private k
APA, Harvard, Vancouver, ISO, and other styles
8

Youn, Seongwook. "SPONGY (SPam ONtoloGY): Email Classification Using Two-Level Dynamic Ontology." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/414583.

Full text
Abstract:
Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized on
APA, Harvard, Vancouver, ISO, and other styles
9

Thomas, Merly, and B. B. Meshram. "Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders." International Journal of Network Security & Its Applications 16, no. 1 (2024): 21–33. http://dx.doi.org/10.5121/ijnsa.2024.16102.

Full text
Abstract:
Electronic mail, commonly known as email, is a crucial technology that enables streamlined operations and communications in corporate environments. Empowering swift and dependable transactions, email is a driving force behind heightened productivity and organizational effectiveness. However, its versatility also renders it susceptible to misuse by cybercriminals engaging in activities such as hacking, spoofing, phishing, email bombing, whaling, and spamming. As a result, effective and efficient data analysis is important in avoiding and detecting cyber-attacks and crime on times. To overcome t
APA, Harvard, Vancouver, ISO, and other styles
10

Favre, G., N. Bausch Becker, D. Giacco, et al. "ECP09-03 - Information technologies in psychiatry." European Psychiatry 26, S2 (2011): 1807. http://dx.doi.org/10.1016/s0924-9338(11)73511-8.

Full text
Abstract:
Even if technology and information are omnipresent, they rarely meet harmoniously. Either the lack of sufficient means prevents good information to reach its target or the technology is too complex to integrate flawlessly in the daily workflow.The use and misuse of information technologies (internet, email, e-learning, social networks) has recently significantly increased among psychiatrists and patients and the changes in behavior of communication and seeking informations are real challenges.Using the European Federation of Psychiatric Trainees network, the self-questionnaires concerning the
APA, Harvard, Vancouver, ISO, and other styles
11

Norman, Ian J., Michael Bergin, Charles D. Parry, and Marie Claire Van Hout. "Best Practices and Innovations for Managing Codeine Misuse and Dependence." Journal of Pharmacy & Pharmaceutical Sciences 19, no. 3 (2016): 367. http://dx.doi.org/10.18433/j3t89k.

Full text
Abstract:
Purpose. Promoting and ensuring safe use of codeine containing medicines remains a public health issue given the rise in reporting of misuse and dependence particularly in countries where available over–the-counter (OTC). The aim of this unique study was to identify best practices in management of opioid abuse and dependence, particularly codeine, and innovations to meet challenges surrounding safe and compliant use, patient awareness-raising, reducing health harms and enhancing successful treatment of dependence. Methods. A mixed methods approach using three data points was used that included
APA, Harvard, Vancouver, ISO, and other styles
12

Ghani, Muhamad Abdul, and Hamdun Sulaiman. "Deteksi Spam Email dengan Metode Naive Bayes dan Particle Swarm Optimization (PSO)." Infotek : Jurnal Informatika dan Teknologi 6, no. 1 (2023): 11–20. http://dx.doi.org/10.29408/jit.v6i1.7049.

Full text
Abstract:
Internet-based technology has become a primary need. Based on the survey results from the Central Statistics Agency in collaboration with APJII, email sending and receiving activities have outperformed social media positions by reaching 95.75%. Very intense use of email can have both positive and negative effects. Because apart from being a communication tool, in reality not everyone uses email well and there are even so many misuses of email that have the potential to harm others. This misused email is commonly known as spam or junkmail (junk email) which contains advertisements, scams and ev
APA, Harvard, Vancouver, ISO, and other styles
13

Budiono, Budiono, Fachri Rizky Fadillah, and Novayandra Arinudin. "The Dangers of Phishing to Personal Data Security." Formosa Journal of Applied Sciences 4, no. 3 (2025): 831–44. https://doi.org/10.55927/fjas.v4i3.61.

Full text
Abstract:
Phishing is one type of cybercrime that has a method of manipulating victims, by pretending to be a trusted person or official government service or company then sending a link so that the victim believes and clicks on the link, then sends personal data to hackers and by hackers used to commit other criminal acts. The media used by hackers can be through whatsapp messages, cellphone short messages or through the victim's email. The threat of phishing to personal data security is great, as it can lead to identity theft, financial loss, and misuse of personal information for further crimes. Atta
APA, Harvard, Vancouver, ISO, and other styles
14

Rancourt, Stephen J. "Hacking, Theft, and Corporate Negligence: Making the Case for Mandatory Encryption of Personal Information." Texas Wesleyan Law Review 18, no. 2 (2011): 183–219. http://dx.doi.org/10.37419/twlr.v18.i2.2.

Full text
Abstract:
Information is being created at an astonishing rate, and the electronic storage of personal data is at the forefront of this growth. Social security numbers, home and email addresses, and financial records are almost universally stored electronically, whether on internal servers, hard drives, or portable devices, such as flash drives and diskettes. The ubiquity of this information has undoubtedly benefitted commerce, but it has not come without drawbacks. As recent evidence suggests, personal information is increasingly vulnerable to hacking and other forms of theft, putting the consumer at se
APA, Harvard, Vancouver, ISO, and other styles
15

Atkinson, Sarah, Anna R. Whelan, and Abigail Litwiller. "Provider attitudes and current practice regarding the prescription of opioid-containing pain medication for vaginal delivery." Journal of Opioid Management 19, no. 6 (2023): 515–21. http://dx.doi.org/10.5055/jom.0836.

Full text
Abstract:
Background: The epidemic of opioid misuse and abuse is rampant in the United States. A large percentage of patients who go on to misuse or abuse opioids were initially legally prescribed an opioid medication by their physician. One of the most common reasons patients of reproductive age seek medical care is for pregnancy and delivery. These patients are frequently prescribed opioids. Greater than one in 10 Medicaid-enrolled women fill an opioid prescription after vaginal delivery.
 Objective: To assess the opioid prescribing patterns of obstetric providers following vaginal deliveries.&#x
APA, Harvard, Vancouver, ISO, and other styles
16

Editorial, E. "Corrigendum: Genetic diversity and population structure analysis in Lonicera l. (Caprifoliaceae) with the use of ISSR molecular markers." Genetika 55, no. 2 (2023): 785. http://dx.doi.org/10.2298/gensr2302785e.

Full text
Abstract:
CORRIGENDUM by Snezana Mladenovic Drinic, Editor of the journal Genetika request from Alireza IRANBAKHSH to remove names Alireza IRANBAKHSH, Yones ASRI, Saeed Zaker BOSTANABAD from the paper GENETIC DIVERSITY AND POPULATION STRUCTURE ANALYSIS IN Lonicera L. (Caprifoliaceae) WITH THE USE OF ISSR MOLECULAR MARKERS Shima GARSHASBI1, Alireza IRANBAKHSH1, Yones ASRI2, Saeed Zaker BOSTANABAD3 1Department of Biology, Science and Research Branch, Islamic Azad University, Tehran, Iran 2Research Institute of Forests and Rangelands, Agricultural Research Education and Extension Organization (AREEO), Tehr
APA, Harvard, Vancouver, ISO, and other styles
17

Editorial, E. "Corrigendum: Species delimitation in Capparis (Capparaceae): Morphological and molecular." Genetika 55, no. 2 (2023): 787. http://dx.doi.org/10.2298/gensr2302786e.

Full text
Abstract:
CORRIGENDUM by Snezana Mladenovic Drinic, Editor of the journal Genetika request from Alireza IRANBAKHSH to remove names Alireza IRANBAKHSH, Mostafa ASSADI, Silvio FICI from the paper SPECIES DELIMITATION IN CAPPARIS (CAPPARACEAE): MORPHOLOGICAL AND MOLECULAR Sakine NAJAFIAN1, Iraj MEHREGAN1, Alireza IRANBAKHSH1, Mostafa ASSADI2, Silvio FICI3 1 Department of Biology, Science and Research Branch, Islamic Azad University, Tehran, Iran 2 Research Institute of Forest and Rangelands, National Botanical Garden of Iran, Tehran, Iran 3 Dipartmento di Science Agrarie e Forestali, University di Palermo,
APA, Harvard, Vancouver, ISO, and other styles
18

Supiyanto, Supiyanto, and Anastasia Sri Werdhani. "IMAGE DATA SECURITY USING VERNAM CIPHER ALGORITHM." Jurnal Teknik Informatika (Jutif) 5, no. 2 (2024): 405–13. https://doi.org/10.52436/1.jutif.2024.5.2.1864.

Full text
Abstract:
The Vernam Cipher algorithm is a symmetric key algorithm, as it uses the same key for encryption and decryption. It utilizes a binary number system with XOR operation to produce a series of bits. This study aims to implement the Vernam cipher algorithm to secure personal and confidential image data, which is at risk of misuse when shared through chat applications like Facebook, WhatsApp, and email. Therefore, developing image protection applications is crucial. The research explores whether the vernam cipher algorithm, working with single bits in block form and based on binary numbers, can eff
APA, Harvard, Vancouver, ISO, and other styles
19

Safa, Nader Sohrabi, and Hossein Abroshan. "The Effect of Organizational Factors on the Mitigation of Information Security Insider Threats." Information 16, no. 7 (2025): 538. https://doi.org/10.3390/info16070538.

Full text
Abstract:
Insider threats pose significant challenges to organizations, seriously endangering information security and privacy protection. These threats arise when employees with legitimate access to systems and databases misuse their privileges. Such individuals may alter, delete, or insert data into datasets, sell customer or client email addresses, leak strategic company plans, or transfer industrial and intellectual property information. These actions can severely damage a company’s reputation, result in revenue losses and loss of competitive advantage, and, in extreme cases, lead to bankruptcy. Thi
APA, Harvard, Vancouver, ISO, and other styles
20

Fortuna, Karen L., Stephanie Lebby, Pamela Geiger, et al. "Lived Experience–Led Research Agenda to Address Early Death in People With a Diagnosis of a Serious Mental Illness." JAMA Network Open 6, no. 5 (2023): e2315479. http://dx.doi.org/10.1001/jamanetworkopen.2023.15479.

Full text
Abstract:
ImportancePeople with serious mental illness (SMI), defined as a diagnosis of schizophrenia spectrum disorder, bipolar disorder, or disabling major depressive disorder) die approximately 10 to 25 years earlier than the general population.ObjectiveTo develop the first-ever lived experience–led research agenda to address early mortality in people with SMI.Evidence ReviewA virtual 2-day roundtable comprising 40 individuals convened on May 24 and May 26, 2022, and used a virtual Delphi method to arrive at expert group consensus. Participants responded to 6 rounds of virtual Delphi discussion via e
APA, Harvard, Vancouver, ISO, and other styles
21

Syed Zulkiplee, Syed Muzammer, Mohd Afizi Mohd Shukran, Mohd Rizal Mohd Isa, Mohammad Adib Khairuddin, Norshahriah Wahab, and Hendra Hidayat. "Examining the Impact Factors Influencing Higher Education Institution (HEI) Students’ Security Behaviours in Cyberspace Environment." JOIV : International Journal on Informatics Visualization 9, no. 1 (2025): 146. https://doi.org/10.62527/joiv.9.1.2296.

Full text
Abstract:
The Internet’s increasing connectivity through devices and systems, particularly with the Internet of Things (IoT), has expanded the threat landscape, making cybersecurity a constantly evolving field. Phishing is a common and emerging cyber-attack that attempts to deceive individuals and persuade them to disclose sensitive information, such as passwords, financial information, or personal data. Researchers have studied phishing extensively in recent years to understand its mechanisms, strategies, and potential solutions. This research examines essential factors that affect how online users beh
APA, Harvard, Vancouver, ISO, and other styles
22

Kilgore, Jacob T., Mariana M. Lanata, Brandi Holthaus, et al. "Pilot Dissemination of a Realtime, Statewide, Pediatric Outpatient Antimicrobial Stewardship Dashboard." Journal of the Pediatric Infectious Diseases Society 13, Supplement_3 (2024): S13. https://doi.org/10.1093/jpids/piae088.025.

Full text
Abstract:
Abstract No conflicts of interest. Corresponding author: Jacob T. Kilgore, MD, MPH, FAAP, Assistant Professor, Department of Pediatrics, Division of Pediatric Infectious Diseases, Marshall University Joan C. Edwards School of Medicine (MU-JCESOM), Hoops Family Children’s Hospital at Cabell Huntington Hospital, Marshall Health Network, 1600 Medical Center Drive, Suite 3500, Huntington, WV 25701-3655, Email: kilgore14@marshall.edu / Phone: 304.691.1367 (office) / 304.634.2448 (cell) Alternate Corresponding author: Mariana Lanata, MD, FAAP, Associate Professor, Department of Pediatrics, Division
APA, Harvard, Vancouver, ISO, and other styles
23

Aheed, Sayed. "CYBERCRIMES, LAW, AND CYBER FORENSICS: COMPARATIVE STUDY OF INDIAN, BRITISH, AND AMERICAN CONTEXTS." International Scientific Journal of Engineering and Management 03, no. 04 (2024): 1–9. http://dx.doi.org/10.55041/isjem01520.

Full text
Abstract:
New forms of crime have emerged with the rising prevalence of computer misuse. Some of them include the use of cutting-edge tools and methods for criminal conspiracy. From spreading fraud through email to stealing and reselling intellectual property, cybercrime covers a lot of ground. The domain of computer science known as "cyber forensics" is considered to be among the most essential subfields. It is concerned with the investigation of cybercrime. The concept of cyber forensics is broken down into its parts by the author in this paper. This paper focuses on the significance of the topic as w
APA, Harvard, Vancouver, ISO, and other styles
24

Philbrick, Ann M., Christine Danner, Abayomi Oyenuga, Chrystian Pereira, Jason Ricco, and Andrea L. Wendling. "Education and Attitudes on Medical Cannabis in Family Medicine Residency Programs." Family Medicine 52, no. 10 (2020): 730–35. http://dx.doi.org/10.22454/fammed.2020.645274.

Full text
Abstract:
Background and Objectives: Medical cannabis has become increasingly prevalent in the United States, however the extent of family medicine resident education on this topic remains unknown. The objective of this study was to ascertain the current state of medical cannabis education across this population and identify patterns in education based on state legality and program director (PD) practices. Methods: Survey questions were part of the Council of Academic Family Medicine Educational Research Alliance (CERA) omnibus survey from May 2019 to July 2019. PDs from all Accreditation Council for Gr
APA, Harvard, Vancouver, ISO, and other styles
25

Aleixandre-Benavent, Rafael, Antonio Vidal-Infer, Adolfo Alonso-Arroyo, Fernanda Peset, and Antonia Ferrer Sapena. "Research Data Sharing in Spain: Exploring Determinants, Practices, and Perceptions." Data 5, no. 2 (2020): 29. http://dx.doi.org/10.3390/data5020029.

Full text
Abstract:
This work provides an overview of a Spanish survey on research data, which was carried out within the framework of the project Datasea at the beginning of 2015. It is covered by the objectives of sustainable development (goal 9) to support the research. The purpose of the study was to identify the habits and current experiences of Spanish researchers in the health sciences in relation to the management and sharing of raw research data. Method: An electronic questionnaire composed of 40 questions divided into three blocks was designed. The three Section s contained questions on the following as
APA, Harvard, Vancouver, ISO, and other styles
26

Vivek Varadarajan. "Ethical and Adversarial Risks of Generative AI in Military Cyber Tools." Journal of Information Systems Engineering and Management 10, no. 53s (2025): 1036–48. https://doi.org/10.52783/jisem.v10i53s.11184.

Full text
Abstract:
Introduction: This paper discusses the ethical and adversarial implications of implementing generative AI in military cyber secure methods. Generative AI has been displayed in numerous applications for threat simulation and defense from threats in civilian use. Still, there are important ethical considerations in military use because of the potential misuse of generative AI. Cyber threats against military systems continue to grow more sophisticated than previously, and we hope to add data to the body of research in this area to help bridge the identified gap in understanding the risks of gener
APA, Harvard, Vancouver, ISO, and other styles
27

Anakotta, Fredrik, Nancy Silvana Haliwela, and Marselo Valentino Geovani Pariela. "Perlindungan Hukum Bagi Pengguna Jasa Internet Terhadap Kerahasiaan Data Pribadi." PATTIMURA Legal Journal 3, no. 3 (2024): 205–20. https://doi.org/10.47268/pela.v3i3.17348.

Full text
Abstract:
Introduction: In the current era of globalization, the internet plays a very important role in human life. In addition to playing an important role, there are also adverse impacts that harm internet service users such as personal data leaks. The confidentiality of personal data was leaked in 2022, including indihome customer data, as many as 26 million customer data were traded on BreachForms by Bjorka. The data is in the form of keyword search history, user info such as email, name, to Population Identification Number. Purposes of the Research: A form of legal protection for the public regard
APA, Harvard, Vancouver, ISO, and other styles
28

Colombo, Cinzia, Anna Roberto, Karmela Krleza-Jeric, Elena Parmelli, and Rita Banzi. "Sharing individual participant data from clinical studies: a cross-sectional online survey among Italian patient and citizen groups." BMJ Open 9, no. 2 (2019): e024863. http://dx.doi.org/10.1136/bmjopen-2018-024863.

Full text
Abstract:
ObjectivesTo gather knowledge on the current debate, opinions and attitudes of Italian patient and citizen groups on individual participant data (IPD) sharing from clinical studies.DesignCross-sectional online survey.Setting and participantsA 22-item online questionnaire was sent by email to 2003 contacts of patient and citizen groups in Italy. We received 311 responses, checked for duplicate respondents (16); 295 single groups responded, 280 providing questionnaires eligible for analysis (response rate 15%). Ninety (32.1%) dealt with oncology and palliative care, 175 (46.2%) operated locally
APA, Harvard, Vancouver, ISO, and other styles
29

Sharp, Marie-Louise, Margaret Jones, Ray Leal, et al. "Health and well-being of serving and ex-serving UK Armed Forces personnel: protocol for the fourth phase of a longitudinal cohort study." BMJ Open 13, no. 10 (2023): e079016. http://dx.doi.org/10.1136/bmjopen-2023-079016.

Full text
Abstract:
IntroductionThis is the fourth phase of a longitudinal cohort study (2022–2023) to investigate the health and well-being of UK serving (Regulars and Reservists) and ex-serving personnel (veterans) who served during the era of the Iraq and Afghanistan conflicts. The cohort was established in 2003 and has collected data over three previous phases including Phase 1 (2004–2006), Phase 2 (2007–2009) and Phase 3 (2014–2016).Methods and analysisParticipants are eligible to take part if they completed the King’s Centre for Military Health Research Health and Wellbeing Cohort Study at Phase 3 (2014–201
APA, Harvard, Vancouver, ISO, and other styles
30

Elavsky, Steriani, Lenka Knapova, Kamil Janiš, Richard Cimler, Jitka Kuhnova, and Tomas Cernicky. "Multiple Perspectives on the Adoption of SMART Technologies for Improving Care of Older People: Mixed Methods Study." Journal of Medical Internet Research 26 (February 7, 2024): e45492. http://dx.doi.org/10.2196/45492.

Full text
Abstract:
Background Despite the ever-increasing offering of SMART technologies (ie, computer-controlled devices acting intelligently and capable of monitoring, analyzing or reporting), a wide gap exists between the development of new technological innovations and their adoption in everyday care for older adults. Objective This study aims to explore the barriers and concerns related to the adoption of SMART technologies among different groups of stakeholders. Methods Data from 4 sources were used: semistructured in-person or internet-based interviews with professional caregivers (n=12), structured email
APA, Harvard, Vancouver, ISO, and other styles
31

Sharif, Safia, Suzanne Fergus, Amira Guirguis, Nigel Smeeton, and Fabrizio Schifano. "Assessing prevalence, knowledge and use of cognitive enhancers among university students in the United Arab Emirates: A quantitative study." PLOS ONE 17, no. 1 (2022): e0262704. http://dx.doi.org/10.1371/journal.pone.0262704.

Full text
Abstract:
Background Cognitive enhancers (CE) are often used to improve memory, alertness and cognitive capacity. These products are commercially and pharmaceutically available. Due to high academic pressure, university students are at risk of CE misuse. However, data regarding this issue are limited, especially in the United Arab Emirates (UAE). Aims To assess the prevalence of CE intake; evaluate students’ knowledge of these substances; and identify student characteristics associated with CE usage. Method A cross sectional study based on a validated online survey that was distributed using university-
APA, Harvard, Vancouver, ISO, and other styles
32

Shah, Jasmit, Cynthia Smith, Cyprian Mostert, Linda Khakali, Zul Merali, and Sayed K. Ali. "Substance use among healthcare professionals: A cross-sectional study in Kenya." PLOS Global Public Health 5, no. 3 (2025): e0003863. https://doi.org/10.1371/journal.pgph.0003863.

Full text
Abstract:
Substance use among healthcare professionals, including alcohol, tobacco, marijuana, benzodiazepines etc., is a rising concern. The immensity of substance use is not yet clear, though recently, studies conducted on medical students and physician trainees show that 10% to 15% of all healthcare professionals misuse drugs at some point in their career, and that 6% to 8% of physicians have a substance use disorder. Substance use has a direct impact on relationships, physical health, and job performance, and is associated with depression, burnout, and decreased career satisfaction. The aim of this
APA, Harvard, Vancouver, ISO, and other styles
33

Doran, P., G. Sheppard, and B. Metcalfe. "P113: Examining emergency physicians’ self-reported opioid prescribing practices for the treatment of acute pain: A Newfoundland perspective." CJEM 22, S1 (2020): S105—S106. http://dx.doi.org/10.1017/cem.2020.319.

Full text
Abstract:
Introduction: Canadians are the second largest consumers of prescription opioids per capita in the world. Emergency physicians tend to prescribe stronger and larger quantities of opioids, while family physicians write the most opioid prescriptions overall. These practices have been shown to precipitate future dependence, toxicity and the need for hospitalization. Despite this emerging evidence, there is a paucity of research on emergency physicians’ opioid prescribing practices in Canada. The objectives of this study were to describe our local emergency physicians’ opioid prescribing patterns
APA, Harvard, Vancouver, ISO, and other styles
34

Donald, L. Buresh Ph.D. Esq. "Nine Cases and Scenarios Involving Retail Financial Compliance." International Journal of Social Science and Human Research 07, no. 07 (2024): 5716–45. https://doi.org/10.5281/zenodo.13140586.

Full text
Abstract:
This article discusses retail financial compliance from the perspective of nine cases and scenarios. First, the paper defines financial compliance, a fiduciary, a fiduciary’s standard of care, and a broker/dealer. It then describes under what conditions a broker/dealer is a fiduciary. Next, the Consumer Protection Rule is explained and its application to Merrill Lynch’s misuse of customer funds, where the company did not deposit customer cash in a reserve account, thereby putting customer money at risk in the event of bankruptcy. The five Anti-Money Laundering pillars are listed, i
APA, Harvard, Vancouver, ISO, and other styles
35

Raja, Jawad, Jiann Lin Loo, Rajvinder Sambhi, and Somashekara Shivashankar. "Manualising the induction of higher trainees in psychiatry for North Wales: The CiSGC Guide (“Croeso i Seiciatreg Gogledd Cymru”)." BJPsych Open 7, S1 (2021): S214—S215. http://dx.doi.org/10.1192/bjo.2021.572.

Full text
Abstract:
AimsThere is a significant period of adjustment for new higher trainees in psychiatry given the presence of inter-trust differences in the National Health Services (NHS). It may take some time for a trainee to become familiar with the new administrative system and workflow of the new environment, which may be even longer for an international medical graduate (IMG). Although there is an existing induction system, having a written structured manual will assist the trainees to get through this process more easily. Hence, this Quality Improvement Project (QIP) outlined the creation of an induction
APA, Harvard, Vancouver, ISO, and other styles
36

Santarossa, Maressa, Christina Walk, Cara J. Joyce, and Fritzie S. Albarillo. "2036. A Quasi-Experimental Survey Study of Antimicrobial Stewardship Education for Registered Nurses." Open Forum Infectious Diseases 6, Supplement_2 (2019): S684—S685. http://dx.doi.org/10.1093/ofid/ofz360.1716.

Full text
Abstract:
Abstract Background Antimicrobial stewardship (AS) efforts have led to improved patient outcomes, reduction in unnecessary costs, and decrease in antimicrobial resistance (AR). Loyola University Medical Center (LUMC) is a quaternary care-system that has a comprehensive multidisciplinary Antimicrobial Stewardship Program (ASP). Registered nurses (RNs) have been shown to be a vital part of ASP; however their role and engagement in ASP should continue to be investigated and explored. Methods In February 2018, a voluntary online survey was created and disseminated to all RNs at LUMC to evaluate th
APA, Harvard, Vancouver, ISO, and other styles
37

Hjollund, Niels Henrik I. "Fifteen Years’ Use of Patient-Reported Outcome Measures at the Group and Patient Levels: Trend Analysis." Journal of Medical Internet Research 21, no. 9 (2019): e15856. http://dx.doi.org/10.2196/15856.

Full text
Abstract:
Background Since 2004, we have collected patient-reported outcome (PRO) data from several Danish patient populations for use at the group and patient levels. Objective The aim of this paper is to highlight trends during the last 15 years with respect to patient inclusion, the methods for collection of PRO data, the processing of the data, and the actual applications and use of the PRO measurements. Methods All PRO data have been collected using the AmbuFlex/WestChronic PRO system, which was developed by the author in 2004 and has been continuously updated since. The analysis of trends was base
APA, Harvard, Vancouver, ISO, and other styles
38

Suppan, Laurent, Mohamed Abbas, Loric Stuby, et al. "Effect of an E-Learning Module on Personal Protective Equipment Proficiency Among Prehospital Personnel: Web-Based Randomized Controlled Trial." Journal of Medical Internet Research 22, no. 8 (2020): e21265. http://dx.doi.org/10.2196/21265.

Full text
Abstract:
Background To avoid misuse of personal protective equipment (PPE), ensure health care workers’ safety, and avoid shortages, effective communication of up-to-date infection control guidelines is essential. As prehospital teams are particularly at risk of contamination given their challenging work environment, a specific gamified electronic learning (e-learning) module targeting this audience might provide significant advantages as it requires neither the presence of learners nor the repetitive use of equipment for demonstration. Objective The aim of this study was to evaluate whether a gamified
APA, Harvard, Vancouver, ISO, and other styles
39

Roguljić, Marija, Dina Šimunović, Ivan Buljan, Marija Franka Žuljević, Antonela Turić, and Ana Marušić. "Publishing Identifiable Patient Photographs in the Digital Age: Focus Group Study of Patients, Doctors, and Medical Students." Journal of Medical Internet Research 27 (March 5, 2025): e59970. https://doi.org/10.2196/59970.

Full text
Abstract:
Background The publication of patient photographs in scientific journals continues to pose challenges regarding privacy and confidentiality, despite existing ethical guidelines. Recent studies indicate that key stakeholders—including health care professionals and patients—lack sufficient awareness of the ethical considerations surrounding patient photographs, particularly in the context of digital scientific publishing. Objective This qualitative study aims to explore how different stakeholders—patients, medical students, and doctors—understand the challenges of patient privacy and confidentia
APA, Harvard, Vancouver, ISO, and other styles
40

Bendtsen, Marcus. "An Electronic Screening and Brief Intervention for Hazardous and Harmful Drinking Among Swedish University Students: Reanalysis of Findings From a Randomized Controlled Trial Using a Bayesian Framework." Journal of Medical Internet Research 21, no. 12 (2019): e14420. http://dx.doi.org/10.2196/14420.

Full text
Abstract:
Background Due to a resurgent debate on the misuse of P values, the Journal of Medical Internet Research is hosting a standing theme issue inviting the reanalysis of (primarily digital health) trial data using a Bayesian framework. This first paper in this series focuses on an electronic screening and brief intervention (eSBI), targeting harmful and hazardous alcohol consumption, which student health care centers across Sweden have routinely administerd to all students during the past decade. The second Alcohol Email Assessment and Feedback Study Dismantling Effectiveness for University Studen
APA, Harvard, Vancouver, ISO, and other styles
41

TOD-RĂILEANU, Gabriela, and Ioan BACIVAROV. "An Overview on Artificial Intelligence Applied in Offensive Cybersecurity." International Journal of Information Security and Cybercrime 12, no. 2 (2023): 23–26. http://dx.doi.org/10.19107/ijisc.2023.02.02.

Full text
Abstract:
As of the onset of 2023, ChatGPT has emerged as the predominant Artificial Intelligence (AI) tool, finding extensive application across various sectors and rapidly becoming an integral part of everyday work and domestic activities. However, the widespread adoption of ChatGPT has been accompanied by instances of misuse, wherein individuals have utilized the tool for unauthorized data access or engaged in activities deemed disruptive or malicious in nature. Consequently, a discernible trend has emerged wherein cyberattacks are increasingly being propelled by the capabilities of AI. This escalati
APA, Harvard, Vancouver, ISO, and other styles
42

Emmanuel, O. Asani, Omotosho Adebayo, A. Danquah Paul, A. Ayoola Joyce, O. Ayegba Peace, and B. Longe Olumide. "A maximum entropy classification scheme for phishing detection using parsimonious features." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 5 (2021): 1707–14. https://doi.org/10.12928/telkomnika.v19i5.15981.

Full text
Abstract:
Over the years, electronic mail (e-mail) has been the target of several malicious attacks. Phishing is one of the most recognizable forms of manipulation aimed at e-mail users and usually, employs social engineering to trick innocent users into supplying sensitive information into an imposter website. Attacks from phishing emails can result in the exposure of confidential information, financial loss, data misuse, and others. This paper presents the implementation of a maximum entropy (ME) classification method for an efficient approach to the identification of phishing emails. Our result showe
APA, Harvard, Vancouver, ISO, and other styles
43

Namrata, A. Kale, and A. Darekar Seema. "SMS FOR ANDROID APPLICATION BY USING 3D-AES, PGP AND STEGNOGRAPHY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 99–104. https://doi.org/10.5281/zenodo.1411782.

Full text
Abstract:
Today the age of information technology has transformed the ways we communicate with each other. We send emails, send SMS, send message using social networking sites and many more. The uses of computers, smart phones and clouds have become an integral part of our life for sharing information with each other. Thus introduction of all these means have also given rise to misuse of information by third party which can steal our private information. https://journalnx.com/journal-article/20150579
APA, Harvard, Vancouver, ISO, and other styles
44

Garcia Martinez, Francisco, and Maurice Dawson. "Unprotected Data: Review of Internet Enabled Psychological and Information Warfare." Land Forces Academy Review 24, no. 3 (2019): 187–98. http://dx.doi.org/10.2478/raft-2019-0022.

Full text
Abstract:
Abstract Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent. These issues brin
APA, Harvard, Vancouver, ISO, and other styles
45

Kiser, Angelina I. T., Timothy Porter, and David Vequist. "Employee Monitoring and Ethics." International Journal of Digital Literacy and Digital Competence 1, no. 4 (2010): 30–45. http://dx.doi.org/10.4018/jdldc.2010100104.

Full text
Abstract:
More advanced technologies that make it possible to monitor employees in the workplace have led to controversies on both legal and ethical grounds. Employers can now easily monitor emails, Internet usage and sites visited, and keystrokes, as well as use GPS systems to track employees’ movements throughout the day. At one end of the spectrum is the employer who claims that monitoring not only improves productivity but is a legal necessity that assists in keeping the company from becoming legally liable for employees’ misuse of technology. Employees, on the other hand, want their privacy protect
APA, Harvard, Vancouver, ISO, and other styles
46

Trivedi, Sunny, Kevin Shea, Whitney Chadwick, Shabnam Gaskari, Ellen Wang, and Thomas Caruso. "A QUALITY IMPROVEMENT PROJECT TO REDUCE THE USE OF COMBINATION OPIOID/ACETAMINOPHEN MEDICATIONS WITHIN A LARGE HEALTH SYSTEM." Orthopaedic Journal of Sports Medicine 8, no. 4_suppl3 (2020): 2325967120S0025. http://dx.doi.org/10.1177/2325967120s00258.

Full text
Abstract:
Background: Combination analgesics are among the most commonly prescribed pain medications in pediatric orthopedic patients. However, combined analgesics do not allow for individual medication titration, which can increase the risk of opioid misuse and hepatoxicity from acetaminophen. Increasingly, the risks of combined analgesics associated with opioid misuse and hepatotoxicity are recognized by the FDA and other organizations. Given these risks, consideration should be made for independent administration of acetaminophen and opioids. Hypothesis/Purpose: The primary aim was to alter the presc
APA, Harvard, Vancouver, ISO, and other styles
47

Korley, Solomon Kobina. "Social Media Misuse in Ghana: Ethical Implications and Its Influence on National Values." International Journal of Research and Innovation in Social Science IX, no. II (2025): 3947–62. https://doi.org/10.47772/ijriss.2025.9020308.

Full text
Abstract:
The study explored the ethical implications of social media misuse and its negative repercussions on national values, aiming at sanitizing and identifying pathways to reclaim digital spaces for constructive, educative, and culturally enriching purposes. A survey research design under a quantitative approach was employed for the study. Questionnaires were created using google forms, and distributed to participants through platforms such as whatsapp, telegram, and emails, ensuring broad reach across Ghana. The targeted participants were active social media users who have monetized and/or explore
APA, Harvard, Vancouver, ISO, and other styles
48

Heriyanto Heriyanto, Yulius Efendi, and Teguh Wicaksono. "Perlindungan Hak Ahli Waris terhadap Aset Digital di Indonesia." Hukum Inovatif : Jurnal Ilmu Hukum Sosial dan Humaniora 1, no. 2 (2024): 169–80. https://doi.org/10.62383/humif.v1i2.612.

Full text
Abstract:
The protection of heirs' rights to digital assets in Indonesia is becoming increasingly important as digital technology usage grows. Digital assets, including social media accounts, emails, digital files, and cryptocurrencies, present new challenges in inheritance law due to their unique nature. This article discusses how heirs' rights to digital assets can be effectively regulated within the existing legal framework. The main challenges include access and control issues, an incomplete legal framework, and rapid technological advancements. Proposed solutions include updating legal regulations,
APA, Harvard, Vancouver, ISO, and other styles
49

Sati, Devani Laras, Devina Laras Sita, and Khairunnisak Nur Isnaini. "Identifikasi Celah Kerentanan Keamanan Pada Website Dengan Metode Pengujian Penetrasi OWASP ZAP." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 3 (2024): 153–61. https://doi.org/10.31598/jurnalresistor.v7i3.1459.

Full text
Abstract:
Resepedia is a website that presents a variety of food recipes and culinary articles. In addition, resepedia also stores user data including sensitive information such as names, emails, and passwords. The existence of this information carries a potential security risk, which can cause potential leakage of user data that can make misuse of data or information. Therefore, this study uses OWASP Zed Attack Proxy (OWASP ZAP) to identify security holes and evaluate potential risks on the Resepedia website. The results identified 16 types of potential threats, with 3 categories having a Medium threat
APA, Harvard, Vancouver, ISO, and other styles
50

Lutsenko, O. "Legal security for employer monitoring of employee use of corporate email, internet resources, and computer technology in the United States of America." Uzhhorod National University Herald. Series: Law 3, no. 75 (2023): 47–54. http://dx.doi.org/10.24144/2307-3322.2022.75.3.8.

Full text
Abstract:
The article covers issues of the protection of employees’ personal data, and problems of monitoring by employers of the use of corporate e-mails, business accounts, computers and other devices of the employer.
 The author rightly notes that now almost any software allows for computer monitoring and monitoring of the workplace even without the knowledge of employees, and the current legislation does not oblige employers to notify employees before implementing such monitoring software. However, in many states, such legislation exists and case law has been developed to protect the rights of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!