Displaying publications 1 - 20 of 64 in total

Abstract:
Sort:
  1. Zakaria N, Ramli R
    Neuropsychiatr Dis Treat, 2018;14:117-128.
    PMID: 29343963 DOI: 10.2147/NDT.S115261
    Background: Psychiatric patients have privacy concerns when it comes to technology intervention in the hospital setting. In this paper, we present scenarios for psychiatric behavioral monitoring systems to be placed in psychiatric wards to understand patients' perception regarding privacy. Psychiatric behavioral monitoring refers to systems that are deemed useful in measuring clinical outcomes, but little research has been done on how these systems will impact patients' privacy.

    Methods: We conducted a case study in one teaching hospital in Malaysia. We investigated the physical factors that influence patients' perceived privacy with respect to a psychiatric monitoring system. The eight physical factors identified from the information system development privacy model, a comprehensive model for designing a privacy-sensitive information system, were adapted in this research. Scenario-based interviews were conducted with 25 patients in a psychiatric ward for 3 months.

    Results: Psychiatric patients were able to share how physical factors influence their perception of privacy. Results show how patients responded to each of these dimensions in the context of a psychiatric behavioral monitoring system.

    Conclusion: Some subfactors under physical privacy are modified to reflect the data obtained in the interviews. We were able to capture the different physical factors that influence patient privacy.

    Matched MeSH terms: Confidentiality
  2. Zailani S, Iranmanesh M, Nikbin D, Beng JK
    J Med Syst, 2015 Jan;39(1):172.
    PMID: 25503418 DOI: 10.1007/s10916-014-0172-4
    With today's highly competitive market in the healthcare industry, Radio Frequency Identification (RFID) is a technology that can be applied by hospitals to improve operational efficiency and to gain a competitive advantage over their competitors. The purpose of this study is to investigate the factors that may effect RFID adoption in Malaysia's healthcare industry. In addition, the moderating role of occupational level was tested. Data was collected from 223 managers as well as healthcare and supporting staffs. This data was analyzed using the partial least squares technique. The results show that perceived ease of use and usefulness, government policy, top management support, and security and privacy concerns have an effect on the intent to adopt RFID in hospitals. There is a wide gap between managers and healthcare staff in terms of the factors that influence RFID adoption. The results of this study will help decision makers as well as managers in the healthcare industry to better understand the determinants of RFID adoption. Additionally, it will assist in the process of RFID adoption, and therefore, spread the usage of RFID technology in more hospitals.
    Matched MeSH terms: Confidentiality
  3. Zaidan BB, Haiqi A, Zaidan AA, Abdulnabi M, Kiah ML, Muzamel H
    J Med Syst, 2015 May;39(5):51.
    PMID: 25732083 DOI: 10.1007/s10916-015-0235-1
    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.
    Matched MeSH terms: Confidentiality
  4. Zaidan AA, Zaidan BB, Kadhem Z, Larbani M, Lakulu MB, Hashim M
    J Med Syst, 2015 Feb;39(2):7.
    PMID: 25631841 DOI: 10.1007/s10916-015-0201-y
    This paper discusses the possibility of promoting public health and implementing educational health services using Facebook. We discuss the challenges and strengths of using such a platform as a tool for public health care systems from two different perspectives, namely, the view of IT developers and that of physicians. We present a new way of evaluating user interactivity in health care systems from tools provided by Facebook that measure statistical traffic in the Internet. Findings show that Facebook is a very promising tool in promoting e-health services in Web 2.0. Results from statistical traffic show that a Facebook page is more efficient than other pages in promoting public health.
    Matched MeSH terms: Confidentiality
  5. Yusof Kadikon, Imran Mohd Shafek, M. Maarof Bahurdin
    MyJurnal
    In Malaysia, the number of Musculoskeletal Disorder (MSD) cases is increasing . Rapid Upper Limb Assessment
    (RULA) is carried out in a physical paper form which is cumbersome and based on the complex nature and it should
    consider human error. This project aims to create the RULA application for mobile devices featuring the android system
    for this move will cut down the process time by more than half, create a more structured system and eliminate human
    error wholly. The application will be designed on the App Inventor website which features a lot of handy tutorials
    and takes the initiative to create a RULA mobile app for Android phones. The RULA mobile app for Android phones
    is intended to make it easier and much more efficient to conduct a RULA analysis. Additionally, the analyses can be
    conducted by minimally trained users, eliminating the need for highly trained technicians. RULA test is performed to
    achieve accurate results and the mathematical processes will be programmed into the app so that the user will have a
    friendly interface and will only be asked to tick boxes.
    Matched MeSH terms: Confidentiality
  6. Yousuf RM, Fauzi AR, How SH, Akter SF, Shah A
    Singapore Med J, 2009 May;50(5):494-9.
    PMID: 19495519
    Optimal patient care varies considerably from place to place and is influenced by scientific as well as social developments. The purpose of this study was to investigate awareness and pertinent issues regarding informed consent among hospitalised patients and to determine lapses, in order to improve the standard of care.
    Matched MeSH terms: Confidentiality/legislation & jurisprudence*
  7. Yau WC, Phan RC
    J Med Syst, 2013 Dec;37(6):9993.
    PMID: 24194093 DOI: 10.1007/s10916-013-9993-9
    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
    Matched MeSH terms: Confidentiality/standards*
  8. Yadav H, Lin WY
    Asia Pac J Public Health, 2001;13 Suppl:S36-8.
    PMID: 12109246
    Telemedicine is fast becoming popular in many countries in the world. It has several advantages such as being cost saving and providing better access to health care in the remote areas in many parts of the world. However, it has some disadvantages as well. One of the major problems is the problem of patients' rights and confidentiality in the use of telemedicine. There are no standard guidelines and procedures in the practice of telemedicine as yet. Both the patient and the physician are unsure of the standard of practice and how to maintain confidentiality. The patient is uncertain as to how to protect her/his rights in the use of telemedicine. The issue of litigation is also unclear as to where the physician is practicing when he/she uses telemedicine. Is she/he practicing in the country where the patient is or is the physician practicing in the country of her/his origin? These issues need to be addressed urgently so that telemedicine will have standards of ethical practice and the patient's rights and confidentiality will be protected.
    Matched MeSH terms: Confidentiality*
  9. Wolffers I
    Lancet, 1996 Mar 02;347(9001):620.
    PMID: 8596348
    Matched MeSH terms: Confidentiality*
  10. Vijayananthan A, Nawawi O
    Biomed Imaging Interv J, 2008 Jan;4(1):e5.
    PMID: 21614316 MyJurnal DOI: 10.2349/biij.4.1.e5
    Good Clinical Practice (GCP) is an international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses and reporting of clinical trials. It also serves to protect the rights, integrity and confidentiality of trial subjects. It is very important to understand the background of the formation of the ICH-GCP guidelines as this, in itself, explains the reasons and the need for doing so. In this paper, we address the historical background and the events that led up to the formation of these guidelines. Today, the ICH-GCP guidelines are used in clinical trials throughout the globe with the main aim of protecting and preserving human rights.
    Matched MeSH terms: Confidentiality
  11. Thuraisingham C, Nalliah S
    Aust Fam Physician, 2013 Apr;42(4):249-51.
    PMID: 23550254
    In many workplaces, employment is conditional on a successful pre-employment medical examination. This examination is usually conducted by a general practitioner on the employers' panel of approved clinics or by an in-house company doctor.
    Matched MeSH terms: Confidentiality/ethics
  12. Tayan O, Kabir MN, Alginahi YM
    ScientificWorldJournal, 2014;2014:514652.
    PMID: 25254247 DOI: 10.1155/2014/514652
    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.
    Matched MeSH terms: Confidentiality/standards*
  13. Talal M, Zaidan AA, Zaidan BB, Albahri AS, Alamoodi AH, Albahri OS, et al.
    J Med Syst, 2019 Jan 15;43(3):42.
    PMID: 30648217 DOI: 10.1007/s10916-019-1158-z
    The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users' entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher's interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
    Matched MeSH terms: Confidentiality
  14. Syed-Mohamad SM, Ali SH, Mat-Husin MN
    Health Inf Manag, 2010 Mar;39(1):30-35.
    PMID: 28683624 DOI: 10.1177/183335831003900105
    This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open-source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
    Matched MeSH terms: Confidentiality
  15. Sim JH, Vadivelu J, Lee SS
    Med Educ, 2016 Nov;50(11):1145.
    PMID: 27762037 DOI: 10.1111/medu.13188
    Matched MeSH terms: Confidentiality/legislation & jurisprudence
  16. Shuwandy ML, Zaidan BB, Zaidan AA, Albahri AS
    J Med Syst, 2019 Jan 06;43(2):33.
    PMID: 30612191 DOI: 10.1007/s10916-018-1149-5
    The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included 'other' articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
    Matched MeSH terms: Confidentiality
  17. Sharmini S, Jamaiyah H, Jaya Purany SP
    Malays Fam Physician, 2010;5(1):13-8.
    PMID: 25606180 MyJurnal
    This survey set out to describe patient registries available in the country, to determine their security features, data confidentiality, extent of outputs produced and data quality of the registries.
    Matched MeSH terms: Confidentiality
  18. Shahri AB, Ismail Z, Mohanna S
    J Med Syst, 2016 Nov;40(11):241.
    PMID: 27681101
    The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.
    Matched MeSH terms: Confidentiality
  19. Schröder M, Muller SHA, Vradi E, Mielke J, Lim YMF, Couvelard F, et al.
    Big Data, 2023 Dec;11(6):399-407.
    PMID: 37889577 DOI: 10.1089/big.2022.0178
    Sharing individual patient data (IPD) is a simple concept but complex to achieve due to data privacy and data security concerns, underdeveloped guidelines, and legal barriers. Sharing IPD is additionally difficult in big data-driven collaborations such as Bigdata@Heart in the Innovative Medicines Initiative, due to competing interests between diverse consortium members. One project within BigData@Heart, case study 1, needed to pool data from seven heterogeneous data sets: five randomized controlled trials from three different industry partners, and two disease registries. Sharing IPD was not considered feasible due to legal requirements and the sensitive medical nature of these data. In addition, harmonizing the data sets for a federated data analysis was difficult due to capacity constraints and the heterogeneity of the data sets. An alternative option was to share summary statistics through contingency tables. Here it is demonstrated that this method along with anonymization methods to ensure patient anonymity had minimal loss of information. Although sharing IPD should continue to be encouraged and strived for, our approach achieved a good balance between data transparency while protecting patient privacy. It also allowed a successful collaboration between industry and academia.
    Matched MeSH terms: Confidentiality*
  20. Safavi S, Shukur Z
    PLoS One, 2014;9(12):e114306.
    PMID: 25478915 DOI: 10.1371/journal.pone.0114306
    Wearable health tech provides doctors with the ability to remotely supervise their patients' wellness. It also makes it much easier to authorize someone else to take appropriate actions to ensure the person's wellness than ever before. Information Technology may soon change the way medicine is practiced, improving the performance, while reducing the price of healthcare. We analyzed the secrecy demands of wearable devices, including Smartphone, smart watch and their computing techniques, that can soon change the way healthcare is provided. However, before this is adopted in practice, all devices must be equipped with sufficient privacy capabilities related to healthcare service. In this paper, we formulated a new improved conceptual framework for wearable healthcare systems. This framework consists of ten principles and nine checklists, capable of providing complete privacy protection package to wearable device owners. We constructed this framework based on the analysis of existing mobile technology, the results of which are combined with the existing security standards. The approach also incorporates the market share percentage level of every app and its respective OS. This framework is evaluated based on the stringent CIA and HIPAA principles for information security. This evaluation is followed by testing the capability to revoke rights of subjects to access objects and ability to determine the set of available permissions for a particular subject for all models Finally, as the last step, we examine the complexity of the required initial setup.
    Matched MeSH terms: Confidentiality*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links