Six senior computer science educators answer questions about the current state of computer science education, software engineering, and licensing software engineers.
View Article and Find Full Text PDFWe describe the initial process of eliciting requirements for an Internet of Things (IoT) application involving a hospital emergency room. First, we discuss the process of modeling IoT systems through Rich Pictures and Use Cases. Then, we demonstrate how these can be used to model emergency room systems.
View Article and Find Full Text PDFThe Internet of Things (IoT) created opportunities for enhancing human lives. A recent undergraduate nursing disaster simulation experience prompted a thought as to whether IoT technologies could further enhance the educational experience of undergraduate nursing students in future disaster simulations.
View Article and Find Full Text PDFThe nature of healthcare and the computational and physical technologies and constraints present a number of challenges to systems designers and implementers. In spite of the challenges, there is a significant market for systems and products to support caregivers in their tasks as the number of people needing assistance grows substantially. In this paper we present a structured approach for describing Internet of Things for healthcare systems.
View Article and Find Full Text PDFSecurity diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA) - diagnostics offer the possibility of securer IVA ecosystems.
View Article and Find Full Text PDFTesting is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security-related functionality and behavior. As demonstrated by the effectiveness of MT in detecting previously unknown bugs in real-world critical applications such as compilers and code obfuscators, we conclude that software testing of security-related features should be conducted from diverse perspectives in order to achieve greater cybersecurity.
View Article and Find Full Text PDF