Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Science and Technology Studies

Security Pitfalls Of An Efficient Threshold Proxy Signature Scheme For Mobile Agents, Yong Yu, Yi Mu, Willy Susilo, Man Ho Au Mar 2014

Security Pitfalls Of An Efficient Threshold Proxy Signature Scheme For Mobile Agents, Yong Yu, Yi Mu, Willy Susilo, Man Ho Au

Professor Willy Susilo

A (t,n) threashold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected , meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can be used …


Laptops On Trolleys: Lessons From A Mobile-Wireless Hospital Ward, Stephen Weeding, Linda Dawson Jan 2014

Laptops On Trolleys: Lessons From A Mobile-Wireless Hospital Ward, Stephen Weeding, Linda Dawson

Associate Professor Linda Dawson

Most hospital-based staff can be considered to be mobile but many hospital information systems (HIS) are based on fixed desk top computers. Wireless networks allow HIS to be brought to the point of care using mobile devices such as laptops on trolleys thus providing data which can aid in clinical decision-making. The research objective of this project focusses on the collaborative design of a laptop solution for providing data at the point of care. The research approach was based on a combination of action research and design science. Action research techniques including participant observation and informal oneto- one discussions were …


Action Research In Emerging Technologies In Health Information Systems: Creating A Mobile Information Environment In A Hospital Ward, Linda Dawson, Julie Fisher, Stephen Weeding, Liza Heslop, Andrew Howard Jan 2014

Action Research In Emerging Technologies In Health Information Systems: Creating A Mobile Information Environment In A Hospital Ward, Linda Dawson, Julie Fisher, Stephen Weeding, Liza Heslop, Andrew Howard

Associate Professor Linda Dawson

Wireless networks, mobile devices and associated applications are key emerging technologies ideal for nomadic workers such as clinicians in hospital ward settings. These mobile information environments can potentially enhance clinicians' use of patient management and clinical systems by providing decision support and clinical information at the bedside or point of care. Such technologies need to be critically assessed in a hospital environment for their wider potential and application for delivery of information at the point of care. This paper describes the use of action research methods in a project which analysed an existing clinical Information Communication Technology (ICT) environment in …


Towards A Framework For Mobile Information Environments: A Hospital-Based Example, Linda Dawson, Sea Ling, Maria Indrawan, Stephen Weeding, Juanita Femando Jan 2014

Towards A Framework For Mobile Information Environments: A Hospital-Based Example, Linda Dawson, Sea Ling, Maria Indrawan, Stephen Weeding, Juanita Femando

Associate Professor Linda Dawson

We propose a conceptual framework to describe and understand mobile information environments. In our proposal, such an environment can be categorised into different abstraction levels or communities: user level, workflow level, device level and architecture level. A hospital-based example is then used as an illustration for the proposed framework.