Jason King

Learn More
Without adequate audit mechanisms, electronic health record (EHR) systems remain vulnerable to undetected misuse. Users could modify or delete protected health information without these actions being traceable. The objective of this paper is to assess electronic health record audit mechanisms to determine the current degree of auditing for non-repudiation(More)
Software engineers often implement logging mechanisms to debug software and diagnose faults. As modern software manages increasingly sensitive data, logging mechanisms also need to capture detailed traces of user activity to enable forensics and hold users accountable. Existing techniques for identifying what events to log are often subjective and produce(More)
Accurate pre-operative localization and removal of disc material are important for minimizing morbidity in dogs with thoracolumbar disc extrusions. Computed tomography (CT) is an established technique for localizing disc extrusions in dogs, however the effect of multi-planar reformatting (MPR) on surgeon diagnostic performance has not been previously(More)
Sporadic inclusion body myositis (sIBM) is the most common myopathy in people over the age of 50 years. While immune-mediated inflammatory myopathies are well documented in dogs, sIBM has not been described. An 11-year-old dog with chronic and progressive neuromuscular dysfunction was evaluated for evidence of sIBM using current pathologic,(More)
Ideally, software engineering courses should adequately reflect real-world software development so that students obtain a better understanding and experience with practices and techniques used in industry. <i>Our objective is to improve software engineering courses by incorporating best practices for automated software engineering and facilitating rapid(More)
User activity logs should capture evidence to help answer who, what, when, where, why, and how a security or privacy breach occurred. However, software engineers often implement logging mechanisms that inadequately record mandatory log events (MLEs), user activities that must be logged to enable forensics. The objective of this study is to support security(More)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security Discoverer (SD) process automatically identifies security implications of individual requirements sentences and suggests applicable(More)
To help establish a more scientific basis for security science, which will enable the development of fundamental theories and move the field from being primarily reactive to primarily proactive, it is important for research results to be reported in a scientifically rigorous manner. Such reporting will allow for the standard pillars of science, namely(More)