Entity

Time filter

Source Type

United Kingdom

Shoniregun C.A.,Infonomics Society | Dube K.,Massey University | Mtenzi F.,Dublin Institute of Technology
Advances in Information Security | Year: 2010

The e-Healthcare information offers unique security, privacy and confidentiality challenges that require a fresh examination of the mainstream concepts and approaches to information security. The significance of security and privacy in e-Healthcare information raised the issues of individual consent, confidentiality and privacy, which are the main determinants in adopting and successful utilising the e-Healthcare information. Current trends in the domain of e-Healthcare information management point to the need for comprehensive incorporation of security, privacy and confidentiality safeguards within the review of e-Healthcare information management frameworks and approaches. This raises major challenges that demands holistic approaches spanning a wide variety of legal, ethical, psychological, information and security engineering. This introductory chapter explores information security and challenges facing e-Healthcare information management. © Springer Science+Business Media, LLC 2010. Source


Ayodele T.,Infonetmedia Research Laboratory | Shoniregun C.A.,Infonomics Society | Zhou S.,University of Portsmouth
International Conference on Information Society, i-Society 2011 | Year: 2011

The email urgency reply prediction (EURP) is a way of handling, and determining em ails that require imperative reply with respect to time. Over the past few years, email has become the preferred medium of communication for many businesses and individuals. As a growing portion of our lives is captured over email exchanges, the phenomenon of the overcrowded and unmanaged inbox is becoming an increasingly serious impediment to communications and productivity. This research work focuses on the broader goal of providing users with effective applications to determine mails that require urgent replies-the task of urgency reply prediction has a sustainable economic benefits to both private and public sectors. © 2011 IEEE. Source


Savage N.,University of Portsmouth | El Assad S.,University of Nantes | Shoniregun C.A.,Infonomics Society
2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012 | Year: 2012

Welcome to the International Conference for Internet Technology and Secured Transactions. The steering committee will like to thank Khalifa University (Abu Dhabi) for hosting ICITST in 2011. © 2012 Infonomics Society. Source


Ayodele T.,Infonetmedia Research Laboratory | Shoniregun C.A.,Infonomics Society | Akmayeva G.,Dublin Institute of Technology
World Congress on Internet Security, WorldCIS-2012 | Year: 2012

This paper presents machine learning anti-phishing technique (MLAPT) - a machine learning framework that applies knowledge intensive approach to detect and prevent phishing attacks on email systems. Preventions, detections and a higher level of prevention measure can be guaranteed. The system is evaluated against a database of human-judged phishing scenarios, reaching satisfactory level of performance. © 2012 Infonomics Society. Source


Shoniregun C.A.,Infonomics Society | Dube K.,Massey University | Mtenzi F.,Dublin Institute of Technology
Advances in Information Security | Year: 2010

The domain of security engineering has developed some agreed core concepts but it lacks comprehensive framework. This could be seen to be particularly the case for e-Healthcare information systems. Evaluation deals with how other people can be convinced that security and privacy protection measures that have been put in place will work. Anderson has defined evaluation of systems as the process of assembling evidence that a system meets, or fails to meet, a prescribed assurance target and identifies two main purposes, which are: to convince one's superiors that work has been done and completed in compliance with standards and laws and to reassure people who will rely on a product or system. Evaluation is a function of the question of whether the system will actually work, which is termed assurance (Anderson and Cardell, 2008). Thus, the lower the likelihood, the higher the assurance there can be and the higher the likelihood, the less the assurance there can be. This chapter explores the solutions and technologies currently available for evaluating security and privacy problems in e-Healthcare information systems. © Springer Science+Business Media, LLC 2010. Source

Discover hidden collaborations