The editorial by Ira Byock (1) commenting on the report from van den Block et al (2) correctly says that only 22 cases of euthanasia or physician-assisted suicide (PAS) occurred (1.3% of all 1690 non-sudden deaths), suggesting that this means these actions ‘occur relatively infrequently’. However, there were a further 26 cases of 'life ending drugs without patient request'. Readers should know that this latter category consists of doctors who answered the same question in the same way as the doctors who are counted as having provided euthanasia or PAS, except that in a subsequent question the doctors indicated that the patient had not asked for euthanasia at the time.
December 16, 2021
Professor Lesley Gourlay, University College London, Dr Carlo Perrotta, Monash University, Professor Paul Prinsloo, University of South Africa Chair: Dr Ibrar Bhatt, Queen's University Belfast
Adrian Pohl arbeitet seit 2008 im Hochschulbibliothekszentrum des Landes Nordrhein-Westfalen (hbz). Seit Juni 2010 ist er Koordinator der Arbeitsgruppe der Open Knowledge Foundation zu Open Bibliographic Data. Im Interview berichtet Pohl über die Zusammenarbeit mit anderen Aktiven aus Wissenschaft und Bibliothekswelt.
R. Amorim, J. Castro, J. da Silva, und C. Ribeiro. New Contributions in Information Systems and Technologies, Seite 101--111. Springer International Publishing, (2015)
J. Eggermont, A. Eiben, und J. van
Hemert. Advances in Intelligent Data Analysis, Third
International Symposium, IDA-99, Volume 1642 von LNCS, Seite 281--290. Amsterdam, The Netherlands, Springer-Verlag, (9--11 August 1999)
J. Eggermont, A. Eiben, und J. van Hemert. Proceedings of the Eleventh Belgium/Netherlands
Conference on Artificial Intelligence (BNAIC'99), Seite 253--254. Kasteel Vaeshartelt, Maastricht, Holland, (3-4 November 1999)
S. Jablonski, B. Volz, und M. Rehman. CIMS '07: Proceedings of the ACM first workshop on CyberInfrastructure:
information management in eScience, Seite 23--30. New York, NY, USA, ACM, (2007)
G. Pei, P. Samama, M. Lohse, M. Wang, J. Codina, und R. Lefkowitz. Proc Natl Acad Sci U S A, 91 (7):
2699-702(März 1994)Pei, G Samama, P Lohse, M Wang, M Codina, J Lefkowitz, R J HL16037/HL/NHLBI
NIH HHS/United States Research Support, U.S. Gov't, P.H.S. United
states Proceedings of the National Academy of Sciences of the United
States of America Proc Natl Acad Sci U S A. 1994 Mar 29;91(7):2699-702..
D. Iyobor, B. Ola, und E. Sarkodie. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII):
69-75(August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
M. Carey, D. DeWitt, und S. Vandenberg. Proceedings of the 13th Annual ACM Conference on
the Management of Data, Seite 413--423. Chicago, Illinois, (Juni 1988)
D. Chitty. GECCO '07: Proceedings of the 9th annual conference on
Genetic and evolutionary computation, 2, Seite 1566--1573. London, ACM Press, (7-11 July 2007)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), Seite 402--407. AAAI Press, (2009)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), accepted, Seite 372-377. AAAI Press, (2009)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), Seite 402--407. AAAI Press, (2009)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), accepted, Seite 372-377. AAAI Press, (2009)
A. Mavrommatis, A. Artikis, A. Skarlatidis, und G. Paliouras. Proceedings of the 2nd Workshop on Artificial Intelligence and Internet of Things (AI-IoT 2016), The Hague, Netherlands, Volume 1724 von CEUR Workshop Proceedings, Seite 31--37. RWTH Aachen, Sun SITE Central Europe, (2016)
A. Di Ciaccio, und G. Bove. Fifth international symposium on data analysis and informatics, Vol. 2., Seite 137--145. Versailles, France, (Date unknown 1987)
R. Zgheib, A. Nicola, M. Villani, E. Conchon, und R. Bastide. 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Seite 284-289. (Juni 2017)
C. Ellul, L. Francis, und M. Haklay. Browse Conference Publications > e-Science Workshops (eScience ... Page HelpA Flexible Database-Centric Platform for Citizen Science Data CaptureThis paper appears in:e-Science Workshops (, Seite 39 -44. (2011)
P. Kluegl, M. Atzmueller, und F. Puppe. Proc. LWA 2009, Knowledge Discovery and Machine Learning Track, Darmstadt, Germany, University of Darmstadt, (2009)
P. Kluegl, M. Atzmueller, und F. Puppe. Proc. LWA 2009, Knowledge Discovery and Machine Learning Track, Darmstadt, Germany, University of Darmstadt, (2009)
J. Carroll, und A. Chaturvedi. Geometric representations of perceptual phenomena: Papers in honor of Tarow Indow on his 70th birthday., Erlbaum, Mahwah, NJ, (1995)