Publications by authors named "Katsikas S"

Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant security issues arise, including compromised nodes by insiders that disrupt the normal network operation.

View Article and Find Full Text PDF

Objective: The current study assessed the effects of statin and CoQ supplement use on changes in cognitive functioning in the Wisconsin Registry for Alzheimer's Prevention study.

Methods: 1,573 subjects were administered medical histories, the Mini-Mental State Examination (MMSE), Rey Auditory Verbal Learning Test (RAVLT), Wechsler Memory Scale, Logical Memory subtest, and the Trail Making Test, Parts A (TMT-A) and B (TMT-B) 3-4 times over 5-10 years.

Results: Linear mixed models did not yield significant effects for statin or CoQ supplement use on changes in mental status, learning and memory, psychomotor speed, and cognitive flexibility.

View Article and Find Full Text PDF

The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other to form systems-of-systems. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. The complexity of the resulting systems-of-systems in many cases leads to difficulty in analyzing cyber risk.

View Article and Find Full Text PDF

Contemporary Critical Infrastructures (CIs), such as the power grid, comprise cyber physical systems that are tightly coupled, to form a complex system of interconnected components with interacting dependencies. Modelling methodologies have been suggested as proper tools to provide better insight into the dependencies and behavioural characteristics of these complex systems. In order to facilitate the study of interconnections in and among critical infrastructures, and to provide a clear view of the interdependencies among their cyber and physical components, this paper proposes a novel method, based on a graphical model called Modified Dependency Structure Matrix (MDSM).

View Article and Find Full Text PDF

Objectives: The purpose of the study was to test the hypothesis that anticholinergic drug exposure is associated with cognitive decline in the Wisconsin Registry for Alzheimer's Prevention (WRAP) study. Secondary aims were to assess if the effects of anticholinergic drugs on different domains of cognitive functioning varied for the entire sample and by apolipoprotein ε4 status.

Methods: The WRAP study includes a sample of 1,573 subjects who self-reported medication use and were administered several cognitive tests four times over a decade.

View Article and Find Full Text PDF

Objective: The current study investigated the effects of proton pump inhibitor use and apolipoprotein ε4 carrier status on changes in neuropsychological functioning in healthy adults with familial risk factors for dementia.

Methods: As part of the Wisconsin Registry for Alzheimer's Prevention study, 1,573 subjects were administered questionnaires on their medical history, gave blood samples, and were administered neuropsychological assessments during four visits over a 10-15 year period. Linear mixed models assessed if non-users, subjects who stopped, started, or consistently used proton pump inhibitors differed in changes in working memory, verbal memory, psychomotor speed, and cognitive flexibility.

View Article and Find Full Text PDF

Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common security attack vectors. However, healthcare-oriented blockchain solutions can provide a decentralized, anonymous and secure EHR handling approach.

View Article and Find Full Text PDF

This editorial gives an overview of the papers included in the Special Issue on "Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things" of . The context of the special issue theme is first briefly described. This is then followed by an outline of each paper that provides information on the problem addressed; the proposed solution/approach; and, where relevant, the results of the evaluation of the proposed solution.

View Article and Find Full Text PDF

Environmentally robust chemical sensors for monitoring industrial processes or infrastructures are lately becoming important devices in industry. Low complexity and wireless enabled characteristics can offer the required flexibility for sensor deployment in adaptable sensing networks for continuous monitoring and management of industrial assets. Here are presented the design, development and operation of a class of low cost photonic sensors for monitoring the ageing process and the operational characteristics of coolant fluids used in an industrial heavy machinery infrastructure.

View Article and Find Full Text PDF

Psychedelic drugs have historically been used for ritualistic purposes and to help individuals gain insight. Ibogaine, a naturally occurring psychoactive substance, has been reported to have anti-addictive properties that aid in the treatment of substance use disorders. An online survey obtained retrospective data from individuals who used ibogaine in the past.

View Article and Find Full Text PDF

The aim of this study was to identify factors contributing to clinician time spent in non-reimbursable activity on an inpatient pediatric consultation-liaison (C-L) service. A retrospective study was conducted using inpatient C-L service data on 1,246 consecutive referrals. For this patient population, the strongest predictor of level of non-reimbursable clinical activity was illness chronicity and the number of contacts with C-L service clinicians during their hospital stay.

View Article and Find Full Text PDF

The health care sector is quickly exploiting Information and Communication Technologies towards the provision of e-health services. According to recent surveys, one of the most severe restraining factors for the proliferation of e-health is the (lack of) security measures required to assure both service providers and patients that their relationship and transactions will be carried out in privacy, correctly, and timely. A large number of individuals are not willing to engage in e-health (or are only participating at a reduced level) simply because they do not trust the e-health service providers' sites and the underlying information and communication technologies to be secure enough.

View Article and Find Full Text PDF

Health Care Establishments (HCE) are today highly dependent upon Information and Communications Technologies (ICT). This increasing reliance upon ICT has stressed the need to foster security in Healthcare Information Systems (HIS). Security policies may have a significant contribution to this effort, but they could become the cause of portability and interoperability problems.

View Article and Find Full Text PDF

The intense need for Healthcare information exchange has revealed a lack of interoperability of systems and applications. Security controls, usually based on proprietary methods and techniques, aggravate the current situation. However, timely development of HIS security standards may improve the interoperability and enable the integration of systems.

View Article and Find Full Text PDF

This chapter presents the benefits resulting from standardisation in the field of Security in Healthcare Information Systems (HIS). Especially in the EU, standardisation appears as a key element for the effectiveness of the Single Market and the competitiveness of European industry.

View Article and Find Full Text PDF

Healthcare Establishments (HCE) have are today highly dependent upon Information and Communications Technologies (ICT). This increasing reliance upon ICT has stressed the need to foster security in Healthcare Information Systems (HIS). Security policies may have a significant contribution to this effort, but they could become the cause of portability and interoperability problems.

View Article and Find Full Text PDF

In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is to provide all the basic guidelines towards the development of a quality system for a TTP as an organisation, which could be mapped directly to the requirements of ISO-9000 standards. The important results of the implementation of a quality system, are the enhanced trustworthiness of the TTP and the confidence of the medical society in the provided services.

View Article and Find Full Text PDF

In this paper, a methodology for determining the training needs of personnel classes within health care establishments (HCEs) with respect to information systems security is discussed. This methodology, in way of an example, is applied to a particular class of HCE personnel, namely managers, whose training needs are derived. Further, the ISHTAR training course on information systems security for HCE managers is evaluated against these requirements and improvements to it are proposed.

View Article and Find Full Text PDF

This paper considers the increasing requirement for security in healthcare IT systems and, in particular, identifies the need for appropriate means by which healthcare establishments (HCEs) may respond to incidents. The main discussion focuses upon two significant initiatives that have been established in order to improve understanding and awareness of healthcare security issues. The first is the establishment of a dedicated Incident Reporting Scheme (IRS) for HCEs, enabling the level and types of security incidents faced within the healthcare community to be monitored and advice appropriately targeted.

View Article and Find Full Text PDF

The EUROMED-ETS pilot system offers a number of security functionalities using off-the-shelf available products, in order to protect Web-based medical applications. The basic concept used by the proposed security architecture is the Trusted Third Party (TTP). A TTP is used in order to generate, distribute and revoke digital certificates to medical practitioners and healthcare organizations that wish to communicate securely.

View Article and Find Full Text PDF

This paper reports on the results obtained by the pilot operation of Trusted Third Parties (TTP) for secure telemedical applications over the WWW. The work reported on herein was carried out within the context of EUROMED-ETS, a R&D project funded by the INFOSEC office of Directorate General XIII of the European Union. The paper discusses the platform used, the security needs of the specific application, the TTP solution provided, the steps taken in order to implement the solution at a pilot scale and the results of the pilot operation; it is compiled using material included in the project deliverables.

View Article and Find Full Text PDF