We use our mobile phones daily, and many of don't give consideration to whether or not those devices are tracking or monitoring our activities. At the root of this cybersecurity issue is, most frequently, the permissions given to one or more applications on the device to access one or more sensors contained in the device. The lackadaisical attitude of the average user towards the cybersecurity of their mobile device can be attributed to a variety of aspects, including poor education regarding smartphone use, low public awareness, and ignorance due to developers' stealthy or "permission hungry" methodologies. Mehrnezhad and Toreini discuss these issues and more at length in this 2019 paper published in Informatics, concluding that while "teaching about general aspects of sensors might not immediately improve people’s ability to perceive the risks," over time users may "successfully identify over-privileged apps" and make more informed decisions about "modifying the app permissions, uninstalling, or keeping it as-is."
In this 2019 review paper published in Frontiers in Oncology, Bhattacharya et al. describe the state of collaborative, artificial-intelligence-based computational cancer research within various agencies and departments of the United States. The researchers point to three major initiatives that aim "to push the frontiers of computing technologies in specific areas of cancer research" at the cellular, molecular, and population levels. They present details concerning the three initiatives, enacted as pilot programs with specific goals: Pilot One "to develop predictive capabilities of drug response in pre-clinical models of cancer," Pilot Two "on delivering a validated multiscale model of Ras biology on a cell membrane," and Pilot Three "to leverage high-performance computing and artificial intelligence to meet the emerging needs of cancer surveillance." Additionally, emerging opportunities and challenges that continue to arise out of these pilots are also addressed, before concluding that "opportunities for extreme-scale computing in AI and cancer research extend well beyond these pilots."
The People Pod - Manchester, UK, United Kingdom M1 4PY
Senior LIMS Developer(SQL, J Script, .NET, VB)Is this you?A Senior LIMS developer. (SQL, J Script, .NET, VB), a graduate in a computer related subject or...
This is a University of Washington-created course that is released on the edX platform. The self-paced four-week course is designed to help learners to better understand the "type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their 'toolkits'—a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving." The course is free to take, with a Verified Certificate of completion available for $99. The course requires on average two to five hours a week of effort. Access to the class begins October 21, 2019.