Displaying publications 1 - 20 of 64 in total

Abstract:
Sort:
  1. Wolffers I
    Lancet, 1996 Mar 02;347(9001):620.
    PMID: 8596348
    Matched MeSH terms: Confidentiality*
  2. Ong BB, Kaur S
    Malays J Pathol, 1997 Dec;19(2):111-4.
    PMID: 10879250
    The duty of confidentiality in the normal doctor-patient relationship is well recognized. However, the duty of confidentiality between the pathologist who performs the autopsy and the requesting authorities and the next-of-kin is not as clearly spelt out. This article discusses the problems faced by the pathologist with regards to hospital and medico-legal autopsies in Malaysia. A proposed ethical guideline is included on how to deal with peculiar issues regarding confidentiality and the pathologist.
    Matched MeSH terms: Confidentiality*
  3. Yadav H, Lin WY
    Asia Pac J Public Health, 2001;13 Suppl:S36-8.
    PMID: 12109246
    Telemedicine is fast becoming popular in many countries in the world. It has several advantages such as being cost saving and providing better access to health care in the remote areas in many parts of the world. However, it has some disadvantages as well. One of the major problems is the problem of patients' rights and confidentiality in the use of telemedicine. There are no standard guidelines and procedures in the practice of telemedicine as yet. Both the patient and the physician are unsure of the standard of practice and how to maintain confidentiality. The patient is uncertain as to how to protect her/his rights in the use of telemedicine. The issue of litigation is also unclear as to where the physician is practicing when he/she uses telemedicine. Is she/he practicing in the country where the patient is or is the physician practicing in the country of her/his origin? These issues need to be addressed urgently so that telemedicine will have standards of ethical practice and the patient's rights and confidentiality will be protected.
    Matched MeSH terms: Confidentiality*
  4. Hassan N, A. Rahman K, Aris Kasah M, Jusoh M
    MyJurnal
    A qualitative research was carried out in Besut and Kuala Terengganu to identyy adolescents’ health problems and needs jiom adolescent perspective, and to establish a priority area in the development of Adolescent Health Clinic in the district. A total of 61 adolescents were selected and divided into four groups and stratified according to age, 13-15 years old and 16 - 17 years old. Generally all participants wished to live in an environment free hom negative health risk factors. The obstacles they perceived were mainly related to lack of care or too much control by their parents. Some of them perceived that their parents in general had inadequate knowledge and skills on parenting. Among local behavioural problems mentioned were loafing, running away from home, vandalism, school absenteeism, aggressive behaviour, substance abuse, pre-marital sexual activities, "bohsia", “bohjan" and even involvement in crimes. More than hah' agreed that counselling service is important for adolescents, and it should be made available in the community preferably outside the schools. They perceived an adolescent friendly health clinic concept as an important concept that should be introduced. To them adolescent friendly health clinic is a clinic run by professionals who are knowledgeable, caring, good listeners, non—judgemental, and who exercise confidentiality. The clinic preferably should be situated in a location which is away from the present health facilities to avoid the image of a place for sick people. Clinic hours preferably during weekends, should provide appropriate technologies and situated in a comfortable ambience. Adolescent participation in the clinic was also mentioned as an important entity for adolescent friendly health services.
    Matched MeSH terms: Confidentiality
  5. Cyranoski D
    Nature, 2003 Jul 10;424(6945):118.
    PMID: 12853917
    Matched MeSH terms: Confidentiality
  6. Azmi, M.T., Emran, M.T.
    MyJurnal
    Background: Without any doubt, the combo of user ID and password are the most used authentication method in the computing and internet environment. However, due to the enormous number of accounts that require password authentication, users tend to develop bad habits in their password practices which in turn will put their account security at risk. With the increasing use of computing in health-care settings and the use of EMR in hospitals, such practices are a cause for concern.
    Methods: This is a cross-sectional study using self-administered questionnaires, investigating the practice of the respondents in keeping their passwords secure. Respondents in this survey are the undergraduate students of Faculty of Medicine, Universiti Kebangsaan Malaysia.
    Results: Among the findings are that 87.4% of the respondents used the same password for more than one account. If a user used the same password for several accounts, it might trigger a domino effect if any of the account passwords were compromised. A total of 98.9% of the respondents memorised their password only in their mind, without writing down the password anywhere. This may lead to using easily guessable passwords which may introduce additional security risk to their accounts. The majority of the respondents (96.6%) never or rarely change their passwords. The study also showed that 82.7% of the respondents used passwords which are 6-8 characters in length. Longer passwords are usually safer but harder to remember. The questionnaire also explored the users’ password combination style, whether they used numbers only or combination of numbers and alphabets or some other pattern. A total of 39.1% used letters only but 27.6% used combination of numbers only which is less secure. About 77% of the respondents used personal information such as their birthday date or a person’s name as part of their password.
    Conclusions: This habit may make their password guessable to people who are close to them. In conclusion, most medical students are not practising safe password conduct and they should be educated on this. If not, patients’ data confidentiality may be compromised in the future due to such practices.
    Matched MeSH terms: Confidentiality
  7. Vijayananthan A, Nawawi O
    Biomed Imaging Interv J, 2008 Jan;4(1):e5.
    PMID: 21614316 MyJurnal DOI: 10.2349/biij.4.1.e5
    Good Clinical Practice (GCP) is an international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses and reporting of clinical trials. It also serves to protect the rights, integrity and confidentiality of trial subjects. It is very important to understand the background of the formation of the ICH-GCP guidelines as this, in itself, explains the reasons and the need for doing so. In this paper, we address the historical background and the events that led up to the formation of these guidelines. Today, the ICH-GCP guidelines are used in clinical trials throughout the globe with the main aim of protecting and preserving human rights.
    Matched MeSH terms: Confidentiality
  8. Yousuf RM, Fauzi AR, How SH, Akter SF, Shah A
    Singapore Med J, 2009 May;50(5):494-9.
    PMID: 19495519
    Optimal patient care varies considerably from place to place and is influenced by scientific as well as social developments. The purpose of this study was to investigate awareness and pertinent issues regarding informed consent among hospitalised patients and to determine lapses, in order to improve the standard of care.
    Matched MeSH terms: Confidentiality/legislation & jurisprudence*
  9. Syed-Mohamad SM, Ali SH, Mat-Husin MN
    Health Inf Manag, 2010 Mar;39(1):30-35.
    PMID: 28683624 DOI: 10.1177/183335831003900105
    This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open-source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
    Matched MeSH terms: Confidentiality
  10. Sharmini S, Jamaiyah H, Jaya Purany SP
    Malays Fam Physician, 2010;5(1):13-8.
    PMID: 25606180 MyJurnal
    This survey set out to describe patient registries available in the country, to determine their security features, data confidentiality, extent of outputs produced and data quality of the registries.
    Matched MeSH terms: Confidentiality
  11. Mazlina M, Julia PE
    Singapore Med J, 2011 Jun;52(6):421-7.
    PMID: 21731994
    Medical ethics issues encountered in rehabilitation medicine differ from those in an acute care setting due to the complex relationships among the parties involved in rehabilitative care. The study examined the attitudes of Malaysian rehabilitation doctors toward medical ethics issues commonly encountered during patient care.
    Matched MeSH terms: Confidentiality
  12. Koh KC, Kamarulzaman A
    Med J Malaysia, 2011 Dec;66(5):491-4.
    PMID: 22390108 MyJurnal
    Community-based HIV voluntary counseling and testing (VCT) services is an effective alternative for mapping the local demographics of at-risk populations for HIV as well as provide an acceptable and reliable means of early detection of HIV. We describe the profiles of men-who-have-sex-with-men (MSM) who sought VCT services in a community based centre in Kuala Lumpur.
    Matched MeSH terms: Confidentiality
  13. Hilyatihanina Zazali, Wan Ainun Mior Othman
    Sains Malaysiana, 2012;41:907-910.
    In this paper, we presented a new key exchange method based on decomposition problem for elliptic curve cryptography. We showed that our key exchange method was not only an alternative method for designing keys in cryptography, but it also has improved security condition from the previous key exchange based on decomposition problem over noncommutative groups. We proposed elliptic an curve cryptography to be the new platform for our key exchange protocol and showed how it was implemented. The security of our protocol was based on discrete logarithm problem, which was not infeasible and strictly difficult to retrieve in elliptic curve cryptography without any prior knowledge.
    Matched MeSH terms: Confidentiality
  14. Thuraisingham C, Nalliah S
    Aust Fam Physician, 2013 Apr;42(4):249-51.
    PMID: 23550254
    In many workplaces, employment is conditional on a successful pre-employment medical examination. This examination is usually conducted by a general practitioner on the employers' panel of approved clinics or by an in-house company doctor.
    Matched MeSH terms: Confidentiality/ethics
  15. Omar H, Khan SA, Toh CG
    J Dent Educ, 2013 May;77(5):640-7.
    PMID: 23658411
    Student-generated videos provide an authentic learning experience for students, enhance motivation and engagement, improve communication skills, and improve collaborative learning skills. This article describes the development and implementation of a student-generated video activity as part of a knowledge, observation, simulation, and experience (KOSE) program at the School of Dentistry, International Medical University, Kuala Lumpur, Malaysia. It also reports the students' perceptions of an activity that introduced first-year dental students (n=44) to clinical scenarios involving patients and dental team aiming to improve professional behavior and communication skills. The learning activity was divided into three phases: preparatory phase, video production phase, and video-watching. Students were organized into five groups and were instructed to generate videos addressing given clinical scenarios. Following the activity, students' perceptions were assessed with a questionnaire. The results showed that 86 percent and 88 percent, respectively, of the students agreed that preparation of the activity enhanced their understanding of the role of dentists in provision of health care and the role of enhanced teamwork. In addition, 86 percent and 75 percent, respectively, agreed that the activity improved their communication and project management skills. Overall, the dental students perceived that the student-generated video activity was a positive experience and enabled them to play the major role in driving their learning process.
    Matched MeSH terms: Confidentiality
  16. Kiah ML, Nabi MS, Zaidan BB, Zaidan AA
    J Med Syst, 2013 Oct;37(5):9971.
    PMID: 24037086 DOI: 10.1007/s10916-013-9971-2
    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
    Matched MeSH terms: Confidentiality
  17. Yau WC, Phan RC
    J Med Syst, 2013 Dec;37(6):9993.
    PMID: 24194093 DOI: 10.1007/s10916-013-9993-9
    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
    Matched MeSH terms: Confidentiality/standards*
  18. Koh KC, Teh JR, Khan SA
    ScientificWorldJournal, 2013;2013:462826.
    PMID: 24285935 DOI: 10.1155/2013/462826
    We describe the findings from a survey assessing the beliefs regarding testing, confidentiality, disclosure, and environment of care and attitudes towards care of people with HIV/AIDS (PLHWA), in 1020, 4th and 5th year medical students, from public and private medical universities in Malaysia. A self-administered validated questionnaire based on the UNAIDS Model Questionnaire with a 5-point Likert scale (5, strongly disagree; 4, disagree; 3, neutral; 2, agree; 1, strongly agree) was used as a survey tool. The survey included demographic data and data on undergraduate training received on HIV/AIDS. Statistical significance in the demographic data and training received by respondents was evaluated using the chi-square test while the independent Student's t-test was used for comparison of means between public and private universities. A P value of <0.05 was considered statistically significant with 95% confidence interval. Our study revealed less than 20% of medical students received adequate training to care for PLHWA. They had prevalent negative beliefs regarding testing, confidentiality, disclosure and environment of care towards PLHWA although in giving care to PLHWA, their attitudes were largely positive and nondiscriminatory.
    Study site: 7 public and private universities in Malaysia
    Matched MeSH terms: Confidentiality/psychology
  19. Mat Kiah ML, Al-Bakri SH, Zaidan AA, Zaidan BB, Hussain M
    J Med Syst, 2014 Oct;38(10):133.
    PMID: 25199651 DOI: 10.1007/s10916-014-0133-y
    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
    Matched MeSH terms: Confidentiality
  20. Mousavi SM, Naghsh A, Abu-Bakar SA
    J Digit Imaging, 2014 Dec;27(6):714-29.
    PMID: 24871349 DOI: 10.1007/s10278-014-9700-5
    The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients' privacy be protected. As a result of this, there is a need for medical image watermarking (MIW). However, MIW needs to be performed with special care for two reasons. Firstly, the watermarking procedure cannot compromise the quality of the image. Secondly, confidential patient information embedded within the image should be flawlessly retrievable without risk of error after image decompressing. Despite extensive research undertaken in this area, there is still no method available to fulfill all the requirements of MIW. This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
    Matched MeSH terms: Confidentiality/standards*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links