Displaying publications 1 - 20 of 41 in total

Abstract:
Sort:
  1. Khan AS, Balan K, Javed Y, Tarmizi S, Abdullah J
    Sensors (Basel), 2019 Nov 14;19(22).
    PMID: 31739437 DOI: 10.3390/s19224954
    Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) to improve road safety and enhance the efficiency of traffic flow. Due to its open wireless boundary and high mobility, VANET is vulnerable to malicious nodes that could gain access into the network and carry out serious medium access control (MAC) layer threats, such as denial of service (DoS) attacks, data modification attacks, impersonation attacks, Sybil attacks, and replay attacks. This could affect the network security and privacy, causing harm to the information exchange within the network by genuine nodes and increase fatal impacts on the road. Therefore, a novel secure trust-based architecture that utilizes blockchain technology has been proposed to increase security and privacy to mitigate the aforementioned MAC layer attacks. A series of experiment has been conducted using the Veins simulation tool to assess the performance of the proposed solution in the terms of packet delivery ratio (PDR), end-to-end delay, packet loss, transmission overhead, and computational cost.
    Matched MeSH terms: Privacy
  2. Alnajrani HM, Norman AA, Ahmed BH
    PLoS One, 2020;15(6):e0234312.
    PMID: 32525944 DOI: 10.1371/journal.pone.0234312
    As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of the existing studies in privacy and data protection. In addition, there are no particular exploration highlights trends and open issues in the domain. Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the present data privacy threats, attacks, and solutions were identified. Also, the ongoing trends of data privacy exercise were observed. Moreover, the most utilized measures, research type, and contribution type facets were emphasized. Additionally, the current open research issues in privacy and data protection in MCC were highlighted. Furthermore, the results demonstrate the current state-of-the-art of privacy and data protection in MCC, and the conclusion will help to identify research trends and open issues in MCC for researchers and offer useful information in MCC for practitioners.
    Matched MeSH terms: Privacy*
  3. Gupta R, Kanungo P, Dagdee N, Madhu G, Sahoo KS, Jhanjhi NZ, et al.
    Sensors (Basel), 2023 Feb 27;23(5).
    PMID: 36904822 DOI: 10.3390/s23052617
    With continuous advancements in Internet technology and the increased use of cryptographic techniques, the cloud has become the obvious choice for data sharing. Generally, the data are outsourced to cloud storage servers in encrypted form. Access control methods can be used on encrypted outsourced data to facilitate and regulate access. Multi-authority attribute-based encryption is a propitious technique to control who can access encrypted data in inter-domain applications such as sharing data between organizations, sharing data in healthcare, etc. The data owner may require the flexibility to share the data with known and unknown users. The known or closed-domain users may be internal employees of the organization, and unknown or open-domain users may be outside agencies, third-party users, etc. In the case of closed-domain users, the data owner becomes the key issuing authority, and in the case of open-domain users, various established attribute authorities perform the task of key issuance. Privacy preservation is also a crucial requirement in cloud-based data-sharing systems. This work proposes the SP-MAACS scheme, a secure and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing. Both open and closed domain users are considered, and policy privacy is ensured by only disclosing the names of policy attributes. The values of the attributes are kept hidden. Characteristic comparison with similar existing schemes shows that our scheme simultaneously provides features such as multi-authority setting, expressive and flexible access policy structure, privacy preservation, and scalability. The performance analysis carried out by us shows that the decryption cost is reasonable enough. Furthermore, the scheme is demonstrated to be adaptively secure under the standard model.
    Matched MeSH terms: Privacy*
  4. Nassiri Abrishamchi MA, Zainal A, Ghaleb FA, Qasem SN, Albarrak AM
    Sensors (Basel), 2022 Nov 07;22(21).
    PMID: 36366261 DOI: 10.3390/s22218564
    Smart home technologies have attracted more users in recent years due to significant advancements in their underlying enabler components, such as sensors, actuators, and processors, which are spreading in various domains and have become more affordable. However, these IoT-based solutions are prone to data leakage; this privacy issue has motivated researchers to seek a secure solution to overcome this challenge. In this regard, wireless signal eavesdropping is one of the most severe threats that enables attackers to obtain residents' sensitive information. Even if the system encrypts all communications, some cyber attacks can still steal information by interpreting the contextual data related to the transmitted signals. For example, a "fingerprint and timing-based snooping (FATS)" attack is a side-channel attack (SCA) developed to infer in-home activities passively from a remote location near the targeted house. An SCA is a sort of cyber attack that extracts valuable information from smart systems without accessing the content of data packets. This paper reviews the SCAs associated with cyber-physical systems, focusing on the proposed solutions to protect the privacy of smart homes against FATS attacks in detail. Moreover, this work clarifies shortcomings and future opportunities by analyzing the existing gaps in the reviewed methods.
    Matched MeSH terms: Privacy*
  5. Abbasi IA, Jan SU, Alqahtani AS, Khan AS, Algarni F
    PLoS One, 2024;19(1):e0294429.
    PMID: 38289970 DOI: 10.1371/journal.pone.0294429
    Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary can easily enter the server to access sensitive information, especially for the healthcare industry, which offers services to patients, researchers, labs, and hospitals in a flexible way with minimal operational costs. It is challenging to make it a reliable system and ensure the privacy and security of a cloud-enabled healthcare system. In this regard, numerous security mechanisms have been proposed in past decades. These protocols either suffer from replay attacks, are completed in three to four round trips or have maximum computation, which means the security doesn't balance with performance. Thus, this work uses a fuzzy extractor method to propose a robust security method for a cloud-enabled healthcare system based on Elliptic Curve Cryptography (ECC). The proposed scheme's security analysis has been examined formally with BAN logic, ROM and ProVerif and informally using pragmatic illustration and different attacks' discussions. The proposed security mechanism is analyzed in terms of communication and computation costs. Upon comparing the proposed protocol with prior work, it has been demonstrated that our scheme is 33.91% better in communication costs and 35.39% superior to its competitors in computation costs.
    Matched MeSH terms: Privacy
  6. Aldeen YA, Salleh M, Aljeroudi Y
    J Biomed Inform, 2016 08;62:107-16.
    PMID: 27369566 DOI: 10.1016/j.jbi.2016.06.011
    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation.
    Matched MeSH terms: Privacy
  7. Ali A, Al-Rimy BAS, Alsubaei FS, Almazroi AA, Almazroi AA
    Sensors (Basel), 2023 Jul 28;23(15).
    PMID: 37571545 DOI: 10.3390/s23156762
    The swift advancement of the Internet of Things (IoT), coupled with the growing application of healthcare software in this area, has given rise to significant worries about the protection and confidentiality of critical health data. To address these challenges, blockchain technology has emerged as a promising solution, providing decentralized and immutable data storage and transparent transaction records. However, traditional blockchain systems still face limitations in terms of preserving data privacy. This paper proposes a novel approach to enhancing privacy preservation in IoT-based healthcare applications using homomorphic encryption techniques combined with blockchain technology. Homomorphic encryption facilitates the performance of calculations on encrypted data without requiring decryption, thus safeguarding the data's privacy throughout the computational process. The encrypted data can be processed and analyzed by authorized parties without revealing the actual contents, thereby protecting patient privacy. Furthermore, our approach incorporates smart contracts within the blockchain network to enforce access control and to define data-sharing policies. These smart contracts provide fine-grained permission settings, which ensure that only authorized entities can access and utilize the encrypted data. These settings protect the data from being viewed by unauthorized parties. In addition, our system generates an audit record of all data transactions, which improves both accountability and transparency. We have provided a comparative evaluation with the standard models, taking into account factors such as communication expense, transaction volume, and security. The findings of our experiments suggest that our strategy protects the confidentiality of the data while at the same time enabling effective data processing and analysis. In conclusion, the combination of homomorphic encryption and blockchain technology presents a solution that is both resilient and protective of users' privacy for healthcare applications integrated with IoT. This strategy offers a safe and open setting for the management and exchange of sensitive patient medical data, while simultaneously preserving the confidentiality of the patients involved.
    Matched MeSH terms: Privacy
  8. Zabedah, B., Badrul Hisham, A.S.
    MyJurnal
    Introduction : Human displacement during disaster would cause women and their dependent children to be particularly vulnerable. Yet, women failed to make their voices heard. Thus their needs, priorities and perceptions would not be identified which in turn could hinder an effective emergency response and a full recovery process.
    Objective : This paper provides a general overview of problems and issues experienced by women and their dependent children during the Johore flood disaster. With this information, relevant agencies shall focus, among other considerations, on the special needs of women and children in planning and carrying out emergency responses in the future.
    Methodology : This paper was written based on data and information obtained from the Johore Flood Disaster Report and observations made by the health teams on the flood victims throughout the flood period.
    Findings and Discussions : Pregnant mothers with 36 weeks of gestation or more were evacuated from their homes to the health centres or hospitals when the Johore flood disaster struck. Regular maternal and child health (MCH) services were conducted at the flood relief centres. Despite the efforts by health care providers, we observed women facing some unique issues and problems. These include: 1) Effects of loss of security and protection; 2) Disruption of social relations and privacy; 3) Inadequate supply of basic items and; and 4) Economic disruption. Recommendations for future relief work are: i) Predisaster planning for emergency response must engage and involve women representatives. Women must also be recruited as emergency and relief workers; ii) Assessment of predetermined capacity of identified relief centres with gender consideration for evacuees must be done; iii) All relief centres shall have physical partition between families. Breast feeding room with access to clean water should also be provided; iv) Gender, cultural and religious sensitivity with regards to social protection and relations shall be observed at all times; v) Women should engage and be made occupied with suitable activities to encourage healthy social interaction thus avoiding feelings of boredom and helplessness; vi) Basic personal items for women and adolescent girls, such as sanitary towel and undergarments, and places to wash and hang them in privacy must be provided; vii) Elderly women may have to temporarily stay at unaffected relatives’ or old folk homes throughout the disaster period, and; viii) No smoking policy shall be enforced at all times in flood relief centres.
    Conclusion : Women and their dependent children have been recognised as one of the vulnerable groups during disasters. Thus, women shall be empowered as partners in formulating any emergency response plan so that together they would be able to complement all disaster mitigation, relief and recovery efforts in amore effective manner.
    Matched MeSH terms: Privacy
  9. Marret MJ, Choo WY
    J Interpers Violence, 2018 08;33(15):2352-2378.
    PMID: 26787607 DOI: 10.1177/0886260515625502
    This study aimed to determine contact and privacy risks encountered by Malaysian adolescents with access to the Internet and mobile phones and factors associated with face-to-face meetings with online acquaintances as well as to estimate the prevalence of subsequent victimization. Secondary school students from randomly selected public schools in Selangor and Kuala Lumpur responded to an anonymous self-administered questionnaire (78% response rate). Out of 3,349 Internet or mobile phone users, 51% had been invited to meet offline with an online-meeting acquaintance and 30% complied. Of the 1,005 respondents who went to offline meetings, 55% had meetings with more than six people. Male gender, Malay ethnicity, online access at an Internet café, viewing pornography on the Internet, the absence of parental restrictions on visiting certain website and chat rooms, not being explicitly forbidden to meet strangers encountered online, and disclosure of personal information were significantly associated with increased odds of face-to-face meetings with online acquaintances. Verbal, physical, or sexual assaults were reported by 5.5% of the 1,005 including 13 males and five females who reported forced sexual intercourse. Similarities as well as differences in factors associated with risk-taking behavior compared with adolescents in Western countries have important implications on policy and intervention.
    Matched MeSH terms: Privacy
  10. Chamoso P, González-Briones A, Rivas A, Bueno De Mata F, Corchado JM
    Sensors (Basel), 2018 May 03;18(5).
    PMID: 29751554 DOI: 10.3390/s18051416
    Rapid advances in technology make it necessary to prepare our society in every aspect. Some of the most significant technological developments of the last decade are the UAVs (Unnamed Aerial Vehicles) or drones. UAVs provide a wide range of new possibilities and have become a tool that we now use on a daily basis. However, if their use is not controlled, it could entail several risks, which make it necessary to legislate and monitor UAV flights to ensure, inter alia, the security and privacy of all citizens. As a result of this problem, several laws have been passed which seek to regulate their use; however, no proposals have been made with regards to the control of airspace from a technological point of view. This is exactly what we propose in this article: a platform with different modes designed to control UAVs and monitor their status. The features of the proposed platform provide multiple advantages that make the use of UAVs more secure, such as prohibiting UAVs’ access to restricted areas or avoiding collisions between vehicles. The platform has been successfully tested in Salamanca, Spain.
    Matched MeSH terms: Privacy
  11. Honar Pajooh H, Rashid M, Alam F, Demidenko S
    Sensors (Basel), 2021 Jan 07;21(2).
    PMID: 33430274 DOI: 10.3390/s21020359
    Providing security and privacy to the Internet of Things (IoT) networks while achieving it with minimum performance requirements is an open research challenge. Blockchain technology, as a distributed and decentralized ledger, is a potential solution to tackle the limitations of the current peer-to-peer IoT networks. This paper presents the development of an integrated IoT system implementing the permissioned blockchain Hyperledger Fabric (HLF) to secure the edge computing devices by employing a local authentication process. In addition, the proposed model provides traceability for the data generated by the IoT devices. The presented solution also addresses the IoT systems' scalability challenges, the processing power and storage issues of the IoT edge devices in the blockchain network. A set of built-in queries is leveraged by smart-contracts technology to define the rules and conditions. The paper validates the performance of the proposed model with practical implementation by measuring performance metrics such as transaction throughput and latency, resource consumption, and network use. The results show that the proposed platform with the HLF implementation is promising for the security of resource-constrained IoT devices and is scalable for deployment in various IoT scenarios.
    Matched MeSH terms: Privacy
  12. Esther Omolara A, Jantan A, Abiodun OI, Arshad H, Dada KV, Emmanuel E
    Health Informatics J, 2020 09;26(3):2083-2104.
    PMID: 31957538 DOI: 10.1177/1460458219894479
    Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient's account to steal the patient's personal, medical or genetic details. This threat is amplified given that an individual's genetic content is connected to their family, thus leading to security risks for their family members as well. Several cases of patient's data theft have been reported where cybercriminals authenticated into the patient's account, stole the patient's medical data and assumed the identity of the patients. In some cases, the stolen data were used to access the patient's accounts on other platforms and in other cases, to make fraudulent health insurance claims. Several measures have been suggested to address the security issues in electronic health record systems. Nevertheless, we emphasize that current measures proffer security in the short-term. This work studies the feasibility of using a decoy-based system named HoneyDetails in the security of the electronic health record system. HoneyDetails will serve fictitious medical data to the adversary during his hacking attempt to steal the patient's data. However, the adversary will remain oblivious to the deceit due to the realistic structure of the data. Our findings indicate that the proposed system may serve as a potential measure for safeguarding against patient's information theft.
    Matched MeSH terms: Privacy
  13. Noor Hafizah Hassan, Fiza Abdul Rahim
    MyJurnal
    The increasing adoption of social media is a viable means in crowdsourcing. It can facilitate the connectivity of collaboration between different organisations, people and society to produce innovative and cost-effective solutions to many problems. Social media have opened up unprecedented new possibilities of engaging the public in meaningful ways through crowdsourcing. However, the growing number of security and privacy issues in social media may weaken the efficacy of crowdsourcing. This study aims to provide a basic understanding of security and privacy issues in line with the growth of crowdsourcing using social media platforms. This study also illustrates how crowdsourcing and social media data can lead to security and privacy issues in different environments. Lastly, this study proposes future works that may serve as direction for scholars to explore security and privacy in crowdsourcing through social media platforms. Secondary sources obtained from journals, conference papers, industry reports and books were reviewed to gather information.
    Matched MeSH terms: Privacy
  14. Schröder M, Muller SHA, Vradi E, Mielke J, Lim YMF, Couvelard F, et al.
    Big Data, 2023 Dec;11(6):399-407.
    PMID: 37889577 DOI: 10.1089/big.2022.0178
    Sharing individual patient data (IPD) is a simple concept but complex to achieve due to data privacy and data security concerns, underdeveloped guidelines, and legal barriers. Sharing IPD is additionally difficult in big data-driven collaborations such as Bigdata@Heart in the Innovative Medicines Initiative, due to competing interests between diverse consortium members. One project within BigData@Heart, case study 1, needed to pool data from seven heterogeneous data sets: five randomized controlled trials from three different industry partners, and two disease registries. Sharing IPD was not considered feasible due to legal requirements and the sensitive medical nature of these data. In addition, harmonizing the data sets for a federated data analysis was difficult due to capacity constraints and the heterogeneity of the data sets. An alternative option was to share summary statistics through contingency tables. Here it is demonstrated that this method along with anonymization methods to ensure patient anonymity had minimal loss of information. Although sharing IPD should continue to be encouraged and strived for, our approach achieved a good balance between data transparency while protecting patient privacy. It also allowed a successful collaboration between industry and academia.
    Matched MeSH terms: Privacy
  15. Htay MNN, McMonnies K, Kalua T, Ferley D, Hassanein M
    PMID: 32489996 DOI: 10.4103/jehp.jehp_321_18
    CONTEXT: In the era of technology, social networking has become a platform for the teaching-learning process. Exploring international students' perspective on using Twitter would reveal the barriers and potential for its use in higher educational activities.

    AIMS: This study aimed to explore the postgraduate students' perspective on using Twitter as a learning resource.

    SUBJECTS AND METHODS: This qualitative study was conducted as part of a postgraduate program at a university in the United Kingdom. A focus group discussion and five in-depth interviews were conducted after receiving the informed consent. The qualitative data were analyzed by R package for Qualitative Data Analysis software.

    ANALYSIS USED: Deductive content analysis was used in this study.

    RESULTS: Qualitative analysis revealed four salient themes, which were (1) background knowledge about Twitter, (2) factors influencing the usage of Twitter, (3) master's students' experiences on using Twitter for education, and (4) potential of using Twitter in the postgraduate study. The students preferred to use Twitter for sharing links and appreciated the benefit on immediate dissemination of information. Meanwhile, privacy concern, unfamiliarity, and hesitation to participate in discussion discouraged the students from using Twitter as a learning platform.

    CONCLUSIONS: Using social media platforms in education could be challenging for both the learners and the educators. Our study revealed that Twitter was mainly used for social communication among postgraduate students however most could see a benefit of using Twitter for their learning if they received adequate guidance on how to use the platform. The multiple barriers to using Twitter were mainly related to unfamiliarity which should be addressed early in the learning process.

    Matched MeSH terms: Privacy
  16. Sulaiman Z, Mohamad N, Ismail TA, Johari N, Hussain NH
    Asia Pac J Clin Nutr, 2016;25(3):625-30.
    PMID: 27440698 DOI: 10.6133/apjcn.092015.08
    The flood that hit Kelantan in December 2014 was the worst in Malaysian history. Women and their infants accounted for a large proportion of the people at risk who were badly affected, as almost half of the population in Kelantan was in the reproductive age group. This report serves to raise awareness that breastfeeding mothers and infants are a special population with unique needs during a disaster. Four of their concerns were identified during this massive flood: first, the negative impact of flood on infant nutritional status and their health; second, open space and lack of privacy for the mothers to breastfeed their babies comfortably at temporary shelters for flood victims; third, uncontrolled donations of infant formula, teats, and feeding bottles that are often received from many sources to promote formula feeding; and lastly, misconceptions related to breastfeeding production and quality that may be affected by the disaster. The susceptibility of women and their infant in a natural disaster enhances the benefits of promoting the breastfeeding rights of women. Women have the right to be supported which enables them to breastfeed. These can be achieved through monitoring the distribution of formula feeding, providing water, electricity and medical care for breastfeeding mothers and their infants. A multifaceted rescue mission team involving various agencies comprising of local government, including the health and nutrition departments, private or non-governmental organizations and individual volunteers have the potential to improve a satisfactory condition of women and infants affected by floods and other potential natural disasters.
    Matched MeSH terms: Privacy
  17. May, Fen Gan, Hui, Na Chua, Siew, Fan Wong, Irene, Ai Lian Tan
    MyJurnal
    With the increase of consumers’ privacy concerns and the government-enforced regulations on data protection, it is necessary for organizations to implement Privacy Enhancing Technologies (PETs) to protect consumers’ personal data. PETs refer to any protection in the form of technology. Since employees are the main stakeholders who are directly involved in the PETs implementation and execution process, it is important to understand employees’ perceptions especially those daily tasks involving the process of collecting and processing consumers’ data. Prior literature showed limited research on the effects of PETs implementation through employees’ work process and their perception on the implementation in protection personal data. Hence, the purpose of this research is to explore how PETs adoption affects employees’ work process and their perception. A qualitative single case study was adopted in a telecommunications company in Malaysia. Data were collected through in-depth interviews from nine respondents who were involved in data collecting, data processing and data controlling in their daily tasks. The results showed that employees experience difference levels of change depending on their work nature. The affected areas of change in implementing PETs are workload, communication level and data access. Employees also raised their concerns on vendors’ accountability. This research provides an insight into employees’ perception towards personal data protection based on their experience in implementing PETs. Continuous awareness, updates, monitoring and evaluating of system are perceived as the key to successful PETs implementation in protecting personal data.
    Matched MeSH terms: Privacy
  18. Amin L, Hashim H, Mahadi Z, Ismail K
    BMC Med Res Methodol, 2018 12 05;18(1):163.
    PMID: 30518344 DOI: 10.1186/s12874-018-0619-2
    BACKGROUND: The demand in biobanking for the collection and maintenance of biological specimens and personal data from civilians to improve the prevention, diagnosis and treatment of diseases has increased notably. Despite the advancement, certain issues, specifically those related to privacy and data protection, have been critically discussed. The purposes of this study are to assess the willingness of stakeholders to participate in biobanking and to determine its predictors.

    METHODS: A survey of 469 respondents from various stakeholder groups in the Klang Valley region of Malaysia was carried out. Based on previous research, a multi-dimensional instrument measuring willingness to participate in biobanking, and its predictors, was constructed and validated. A single step Structural Equation Modelling was performed to analyse the measurements and structural model using the International Business Machines Corporation Software Package for Social Sciences, Analysis of Moment Structures (IBM SPSS Amos) version 20 with a maximum likelihood function.

    RESULTS: Malaysian stakeholders in the Klang Valley were found to be cautious of biobanks. Although they perceived the biobanks as moderately beneficial (mean score of 4.65) and were moderately willing to participate in biobanking (mean score of 4.10), they professed moderate concern about data and specimen protection issues (mean score of 4.33). Willingness to participate in biobanking was predominantly determined by four direct predictors: specific application-linked perceptions of their benefits (β = 0.35, p 
    Matched MeSH terms: Privacy
  19. Mohamed Shakeel P, Baskar S, Sarma Dhulipala VR, Mishra S, Jaber MM
    J Med Syst, 2018 Aug 31;42(10):186.
    PMID: 30171378 DOI: 10.1007/s10916-018-1045-z
    In the recent past, Internet of Things (IoT) plays a significant role in different applications such as health care, industrial sector, defense and research etc.… It provides effective framework in maintaining the security, privacy and reliability of the information in internet environment. Among various applications as mentioned health care place a major role, because security, privacy and reliability of the medical information is maintained in an effective way. Even though, IoT provides the effective protocols for maintaining the information, several intermediate attacks and intruders trying to access the health information which in turn reduce the privacy, security and reliability of the entire health care system in internet environment. As a result and to solve the issues, in this research Learning based Deep-Q-Networks has been introduced for reducing the malware attacks while managing the health information. This method examines the medical information in different layers according to the Q-learning concept which helps to minimize the intermediate attacks with less complexity. The efficiency of the system has been evaluated with the help of experimental results and discussions.
    Matched MeSH terms: Privacy*
  20. Chong EY, Palanisamy UD, Jacob SA
    Patient Prefer Adherence, 2019;13:195-207.
    PMID: 30774315 DOI: 10.2147/PPA.S182516
    Purpose: This study prepares the groundwork on the potential design and development of a mobile health (mHealth) app that will be able to bridge the communication gap between pharmacists and patients who are Deaf and Hard of Hearing (DHoH).

    Patients and methods: A focus group discussion was conducted with 12 community pharmacists. Participants were recruited using snowball sampling. Audio-recordings were transcribed verbatim, and analyzed using a thematic approach.

    Results: Three themes were apparent: 1) suggestions for app design and content, 2) perceived benefits of the app, and 3) potential challenges related to the app. Participants believed the app would be able to facilitate and improve communication, and hence relationship, between pharmacists and the DHoH. Potential challenges of the app were highlighted, such as the need for manpower to manage the app, and its cost to this group of economically disadvantaged people. There were also concerns about privacy and security.

    Conclusions: This study allowed community pharmacists, one of the end-users of the app, to provide feedback on the contents and design of the app, which would allow them to provide pharmaceutical care services to patients who are DHoH, and better serve them. Potential benefits and challenges of the app were also identified. Undoubtedly, through the mHealth app, community pharmacists will be better equipped to serve and communicate with the DHoH, and this will hopefully translate to improved health outcomes in these patients.

    Matched MeSH terms: Privacy
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links