Technical considerations when implementing online research

Author(s):  
William C. Schmidt

This article introduces some of the rudimentary underlying concepts of how the Internet works and points out a number of caveats that can influence the quality of collected data. Topics covered include Internet basics, technical problems, programming for the lowest common technology, client configuration issues, server side and data security issues, and the limits of precision. It is hoped that after becoming familiar with the information herein, researchers will be capable of determining whether the research application they are interested in pursuing is fit for the Internet medium, or whether technical issues will pose problems which threaten the validity of the work.

2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


Healthcare ◽  
2021 ◽  
Vol 9 (9) ◽  
pp. 1192
Author(s):  
Maria Helena da Fonseca ◽  
Fanny Kovaleski ◽  
Claudia Tania Picinin ◽  
Bruno Pedroso ◽  
Priscila Rubbo

E-health can be defined as a set of technologies applied with the help of the internet, in which healthcare services are provided to improve quality of life and facilitate healthcare delivery. As there is a lack of similar studies on the topic, this analysis uses a systematic literature review of articles published from 2014 to 2019 to identify the most common e-health practices used worldwide, as well as the main services provided, diseases treated, and the associated technologies that assist in e-health practices. Some of the key results were the identification of the four most common practices used (mhealth or mobile health; telehealth or telemedicine; technology; and others) and the most widely used technologies associated with e-health (IoT, cloud computing, Big Data, security, and systems).


2022 ◽  
Vol 12 (1) ◽  
pp. 0-0

As open standards like OPC UA were introduced to facilitate the interoperability of devices, safety and security standards were only gradually incorporated into Industry 4.0 designs. Hence, safety and security issues have eventually emerged with the growing complexity of such systems, and they need to expand outside of their premises to be integrated into larger set-ups. Typical examples thereof are power grids, whose dependability was guarded for long times by strict rules and restrictive communication protocols. Once they were exposed on the Internet, however, their vulnerability has increased to a point where their safety could be compromised. Hence, there is an urgent need to implement effective safety and security mechanisms into OPC UA to provide systems with appropriate levels of functional safety as well as data security. With increasing levels of integration, e.g. with Industry 5.0, these standards need to evolve to provide for sustainability in a globally interconnected world.


2015 ◽  
Author(s):  
Andy T Woods ◽  
Carlos Velasco ◽  
Carmel A. Levitan ◽  
Xiaong Wan ◽  
Charles Spence

This article provides an overview of the literature on the use of internet-based testing to address questions in perception research. Internet-based testing has several advantages over in-lab research, including the ability to reach a relatively broad set of participants and to quickly and inexpensively collect large amounts of empirical data. In many cases, the quality of online data appears to match that collected in laboratory research. Generally speaking, online participants tend to be more representative of the population at large than laboratory based participants. There are, though, some important caveats, when it comes to collecting data online. It is obviously much more difficult to control the exact parameters of stimulus presentation (such as display characteristics) in online research. There are also some thorny ethical considerations that need to be considered by experimenters. Strengths and weaknesses of the online approach, relative to others, are highlighted, and recommendations made for those researchers who might be thinking about conducting their own studies using this increasingly-popular approach to research in the psychological sciences.


Author(s):  
Marcus Tanque

Converging Cloud computing with Internet of Things transformed organizations' traditional technologies. This chapter examines the intersection of cloud computing and internet of things in consort with how these solutions often interact on the internet. Vendors develop CloudIoT capabilities to support organizations' day-to-day operations. IoT is a combined platform encompassing physical and virtual nodes. IoT objects comprise device-to-device data sharing, machine-to-machine provisioning, sensors, actuators, and processors. These systems may be deployed as hardware components and applications software. This chapter also emphasizes data security, reliability, resource provisioning, service-level agreement, quality of service, IoT, privacy, and device integration. This chapter also highlights operational benefits and/or security issues affecting CC and IoT technologies.


Cloud computing (CC) is the expertise over which every person is capable of sharing the reserves, amenities, and evidence amongst the individuals as a result of harnessing the internet in link. Subsequently, protection is a key concern on the facts pooled by means of the internet. In CC a numerous security issues prone to occur that includes confidentiality, integrity, authentication and/or thin well-honed edit control (TWHEC). In this research an innovative security replica has been aforethought. The design stipulates an approach across which secure communication besides data hiding from unauthorized punters can be got hold of. The security resolved with all categories of CC aspects similar to Platform as a Service (aaS), and Process aaS (PaaS), Software aaS, Storage aaS and Security aaS (SaaS), Network aaS (NaaS), Functions aaS (FaaS), Infrastructure aaS, Information aaS, and Integration aaS (IaaS), Database aaS (DBaaS), Application as a Service aaS and API aaS (AaaS), Management aaS (MaaS), Testing aaS (TaaS), etc., This anticipated system yield thin well-honed, mutable and ascendable statistics editing control by means of the manipulation of complex traits of Hierarchical (Ranked/Ordered) attribute-set-based encryption (HASBE). This multifarious qualities of blend of HASBE and Rivest–Shamir–Adleman (RSA) algorithm too. For instance, cyber individual healthiness record (IHR) aids sick persons to deal with his/her personal medicinal archives into a unified means that is to a great extent vital in storing, editing and partaking of the individual healthiness data. Further down encryption, it is impeding in accomplishing the TWHEC to CIHR data in an ascendable and effectual technique by using HASBE. Prevailing RSA encryption does not endow the data with high security in health. To fulfill ascendable, elastic, and thin well-honed edit control of subcontracted statistics in cloud. In this archetypal instigated a mish-mash RSA encryption with HASBE. Cyber IHR dispenses with patients to get along medical archives in a secure way, in which very significant concerns are the storing, access and distribution of individual wellness information. This composite process is responsible for three mode precautions, i.e. data precautions, certification and corroboration. In this report, the HASBE encryption algorithm has been put forward in realizing TWHEC to IHR data in an ascendable and effectual way


2020 ◽  
Author(s):  
Miguel D'Haeseleer ◽  
Piet Eelen ◽  
Nima Sadeghi ◽  
Marie Béatrice D'Hooghe ◽  
Jeroen Van Schependom ◽  
...  

BACKGROUND Telemedicine is currently flourishing in rural and emergency settings but its routine implementation in chronic neurological disorders develops more hesitatingly. OBJECTIVE To demonstrate the feasibility of planned real-time audiovisual teleconsultation over the internet in patients with multiple sclerosis (MS). METHODS Twenty subjects with MS presenting at a specialized MS center in Belgium were recruited for this study. One teleconsultation was scheduled in each participant. The approach was considered feasible if at least 80% of the planned visits could be completed at the foreseen moment. Patient satisfaction was evaluated by means of 5-point Likert scales containing the categories very unsatisfied, unsatisfied, neutral, satisfied and highly satisfied. RESULTS Seventeen out of twenty teleconsultations were successfully completed (85%). Failures were due to patients not responding (2/20) and technical issues (1/20). Rates of patients declaring themselves satisfied or highy satisfied were 17/17 for technical quality, 15/17 for convenience and 16/17 for overall quality of care. CONCLUSIONS Planned real-time audiovisual teleconsultation over the internet is feasibile and highly appreciated in patients with MS.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

The rise of the Internet of Things (IoT) has driven mobile applications development. As a result, in the consumer IoT (CIoT) space, any product usually comes with a smartphone application to either control, programme, or just view what is happening with the product. The IoT brings with it opportunities and challenges to consumers. For example, IoT technology makes it possible to connect all of a person’s devices to create a smart eco-system or assemblage. However, the biggest threat in CIoT is personal data security. This study utilized a qualitative narrative inquiry and Delphi technique to explore data security issues that come with CIoT assemblages and associated mobile applications in South Africa. The study established that consumers enjoy the convenience and benefits that IoT technology brings. It is concluded that for CIoT to thrive, safety is crucial, and all the stakeholders in the IoT assemblage need to ensure the protection of consumers.


2018 ◽  
Vol 8 (9) ◽  
pp. 1114 ◽  
Author(s):  
Amel Jassim Khalaf

This study aimed at investigating the effectiveness of internet in learning English through testing TEFL courses outcomes. The main data was collected by both an interview with the TEFL tutors and a questionnaire with the students taking TEFL courses in Kuwait. The sample of this study included 5 TEFL trainers and 150 students in Kuwait. The questionnaire and interview contained four main sections (advantages of using the internet, disadvantages of using the internet, most effective internet-related tools that are used in TEFL courses and the recommendations that can be followed to enhance the quality of the internet in TEFL courses). The results revealed that using internet has a positive impact on the effectiveness of learning English and TEFL courses, it also showed that the speed, availability, affordability, easiness and other factors are some of the advantages of the internet. However, cheating, lack of communication, technical problems and unreliable information are some of the disadvantages of using the internet. Moreover, this study concluded that YouTube is the most effective internet tool that is used to teach TEFL and EduBuncee is the weakest one. This study recommended improving the role of social media in TEFL courses by creating more interactive methods.


2021 ◽  
Vol 13 (6) ◽  
pp. 123-132
Author(s):  
Adanma Cecilia Eberendu ◽  
Titus Ifeanyi Chinebu

The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.


Sign in / Sign up

Export Citation Format

Share Document