Browsing by Author "Revett, Kenneth"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
- Enhancing elderly mobility through IoT using textiles: a reviewPublication . Magalhães, M. J.; Magalhães, Sérgio Tenreiro de; Revett, KennethThe aging of population worldwide and the increasing of average life expectancy of the world population become a social and economic problem for society. It's necessary to provide solutions which can maintain the independency of elderly and their mobility, along more time, avoiding the unnecessary perma-nence in hospitals and institutions for the elderly. The use of IoT using textiles is a very interesting approach because of the proximity of people to these materials. This work reviews the development on IoT using textiles to increase the mobility of elderly people and concludes that this is a field of growing interest. Although, there is few investigation, especially in what concerns studies focusing on the im-portance of improving the mobility of the elderly. There are studies that lead to the possibility of promoting this physical capability but have not been designed for that purpose, but we believe that approach of the problem of mobility of elderly people using the IoT based on clothes should be treated with specificity, because the consequences of this not happening, will affect not only the elderly but the whole society.
- Internet of things for the hotel industry: a reviewPublication . Magalhães, Sérgio Tenreiro de; Magalhães, M. J.; Revett, KennethThe Internet of Things (IoT) represents an opportunity for the hotel in-dustry to increase customer satisfaction while simultaneously reducing operational costs. This paper analyses the existing knowledge on this subject, through a re-view of the relevant publications indexed by Scopus and/or ISI Web of Science, concluding that, despite the existence of many relevant patents, registered in the past few years, the published research is very limited on this topic. The restriction to publication prior to the conclusion of the patent registration process may be a justification for this fact, and, if so, the near future will bring many novelties that will help the development of the hotel industry. It is also possible to conclude from this work that the potential of IoT is not yet well explored in the hotel indus-Try, once authors frequently theorize on the use of IoT for applications that could easily be of interest for the hotel industry, but fail to identify that opportunity as a major market.
- Keystroke Dynamic and Graphical Authentication SystemsPublication . Tenreiro De Magalhaes, Sérgio; Santos, Leonel; Revett, Kenneth; Santos, HenriqueIn information systems, authentication involves, traditionally, sharing a secret with the authenticating entity and presenting it whenever a confirmation of the user’s identity is needed. In the digital era, that secret is commonly a user name and password pair and/or, sometimes, a biometric feature. Both present difficulties of different kinds once the traditional user name and password are no longer enough to protect these infrastructures, the privacy of those who use it, and the confidentiality of the information, having known vulnerabilities, and the second has many issues related to ethical and social implications of its use. This chapter discusses two behavior biometric technologies.
- Using technology to overcome the password's contradictionPublication . Tenreiro De Magalhaes, Sérgio; Revett, Kenneth; Santos, Henrique; Santos, Leonel; Oliveira, André; Ariza, CésarThe traditional approach to security has been the use of passwords. They provide the system with a barrier to access what was quite safe in the analogical world. The digital era provided the means to easily try thousands of passwords in a short period of time and now the password schema is no longer safe. Now it suffers of the password’s contradiction: the fact that it requires both simplicity and complexity to be usable and safe. Being so, new technologies are required that can preserve the easiness of use, but can provide stronger authentication processes. This chapter presents the latest advances in three technologies that can be used, unaided or together, to improve the safety of user/password schemas without significant changes in the protected information system architecture, despite the human factors that traditionally reduce the security of those systems. The presented technologies are Keystroke Dynamics, Graphical Authentication and Pointer Dynamic.
