Displaying publications 21 - 40 of 64 in total

Abstract:
Sort:
  1. Koh KC, Kamarulzaman A
    Med J Malaysia, 2011 Dec;66(5):491-4.
    PMID: 22390108 MyJurnal
    Community-based HIV voluntary counseling and testing (VCT) services is an effective alternative for mapping the local demographics of at-risk populations for HIV as well as provide an acceptable and reliable means of early detection of HIV. We describe the profiles of men-who-have-sex-with-men (MSM) who sought VCT services in a community based centre in Kuala Lumpur.
    Matched MeSH terms: Confidentiality
  2. Syed-Mohamad SM, Ali SH, Mat-Husin MN
    Health Inf Manag, 2010 Mar;39(1):30-35.
    PMID: 28683624 DOI: 10.1177/183335831003900105
    This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open-source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
    Matched MeSH terms: Confidentiality
  3. Alnajrani HM, Norman AA, Ahmed BH
    PLoS One, 2020;15(6):e0234312.
    PMID: 32525944 DOI: 10.1371/journal.pone.0234312
    As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of the existing studies in privacy and data protection. In addition, there are no particular exploration highlights trends and open issues in the domain. Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the present data privacy threats, attacks, and solutions were identified. Also, the ongoing trends of data privacy exercise were observed. Moreover, the most utilized measures, research type, and contribution type facets were emphasized. Additionally, the current open research issues in privacy and data protection in MCC were highlighted. Furthermore, the results demonstrate the current state-of-the-art of privacy and data protection in MCC, and the conclusion will help to identify research trends and open issues in MCC for researchers and offer useful information in MCC for practitioners.
    Matched MeSH terms: Confidentiality
  4. Ranak MSAN, Azad S, Nor NNHBM, Zamli KZ
    PLoS One, 2017;12(10):e0186940.
    PMID: 29084262 DOI: 10.1371/journal.pone.0186940
    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
    Matched MeSH terms: Confidentiality
  5. Zakaria N, Ramli R
    Neuropsychiatr Dis Treat, 2018;14:117-128.
    PMID: 29343963 DOI: 10.2147/NDT.S115261
    Background: Psychiatric patients have privacy concerns when it comes to technology intervention in the hospital setting. In this paper, we present scenarios for psychiatric behavioral monitoring systems to be placed in psychiatric wards to understand patients' perception regarding privacy. Psychiatric behavioral monitoring refers to systems that are deemed useful in measuring clinical outcomes, but little research has been done on how these systems will impact patients' privacy.

    Methods: We conducted a case study in one teaching hospital in Malaysia. We investigated the physical factors that influence patients' perceived privacy with respect to a psychiatric monitoring system. The eight physical factors identified from the information system development privacy model, a comprehensive model for designing a privacy-sensitive information system, were adapted in this research. Scenario-based interviews were conducted with 25 patients in a psychiatric ward for 3 months.

    Results: Psychiatric patients were able to share how physical factors influence their perception of privacy. Results show how patients responded to each of these dimensions in the context of a psychiatric behavioral monitoring system.

    Conclusion: Some subfactors under physical privacy are modified to reflect the data obtained in the interviews. We were able to capture the different physical factors that influence patient privacy.

    Matched MeSH terms: Confidentiality
  6. Liau QY, Leow CY, Ding Z
    Sensors (Basel), 2016 Jun 09;16(6).
    PMID: 27294924 DOI: 10.3390/s16060846
    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.
    Matched MeSH terms: Confidentiality
  7. Patricia Sator
    MyJurnal
    Introduction: Nursing is a regulated profession. Hence, the global commitment for nurses to maintain standards of practice is vital to deliver safe and competent care. Written policies will eliminate uncertainty, ambiguity, and legal issues. For this study, it focused on the importance of the nursing students to understand and practice the regulation on patient’s confidentiality in healthcare setting with the usage of technology such as social media. There is a case like nursing student infringe the privacy of patients with the information they posted on social media, such as posting a patient’s photos or videos without valid consent. Methods: This study is a quantitative, cross-sectional survey de- sign. The respondents were selected as convenience sampling of 120 nursing students from the Faculty of Medicine and Health Sciences, Universiti Malaysia Sabah (FMHS, UMS). Results: There are 7.4% nursing students intention- ally posted in social media, 18.0% maybe and 73.8% unintentionally. And for their guilty feeling after committing confidentially policy breach on patient, there are 8.2% said NO, 32.8% said MAYBE and 59% said YES. Overall, the nursing students are aware of the patient’s confidentiality but there is still a leakage in practicing full nursing standards and regulation. Further study recommended to explore more on this issue. Conclusion: As a conclusion, this study is relevant to conduct among the nursing students to gain their understanding regarding the responsibilities as a future nurse in maintaining the patient’s confidentiality as one of the most important nursing practices to ensure quality of care and continuation of professional service of nursing profession.
    Matched MeSH terms: Confidentiality
  8. Yadav H, Lin WY
    Asia Pac J Public Health, 2001;13 Suppl:S36-8.
    PMID: 12109246
    Telemedicine is fast becoming popular in many countries in the world. It has several advantages such as being cost saving and providing better access to health care in the remote areas in many parts of the world. However, it has some disadvantages as well. One of the major problems is the problem of patients' rights and confidentiality in the use of telemedicine. There are no standard guidelines and procedures in the practice of telemedicine as yet. Both the patient and the physician are unsure of the standard of practice and how to maintain confidentiality. The patient is uncertain as to how to protect her/his rights in the use of telemedicine. The issue of litigation is also unclear as to where the physician is practicing when he/she uses telemedicine. Is she/he practicing in the country where the patient is or is the physician practicing in the country of her/his origin? These issues need to be addressed urgently so that telemedicine will have standards of ethical practice and the patient's rights and confidentiality will be protected.
    Matched MeSH terms: Confidentiality*
  9. Chung Su Chin, Pauline Stitt
    MyJurnal
    Introduction: During resuscitation efforts, patients’ families are routinely barred from the resuscitation area. Even there is an increased in demand from the family members requesting to be present during resuscitation of their loved one, health care providers not always offer the option for family presence. The major concerns of health care providers who are opposed to family presence during resuscitation (FPDR) were fear of psychological trauma to family members who witnessed the resuscitation. This study aimed to examine the critical care nurses’ perception and attitudes towards the presence of patients’ family members during resuscitation in adult critical care units. Methods: Study papers included were narrowed to primary study, published within 2003-2014, describing nurses’ perceptions and attitudes on an adult inpatient family witnessed resuscitation in critical care units. Results: Seven studies included, and four main themes emerged mainly samples population, nurses’ experiences of FPDR, nurses’ responses toward FPDR and factor predicting nurses’ attitudes toward FPDR. 20% - 42.2% of nurses had experienced FPDR. Only 4% - 6% of study participants working in hospital with established policy and 95% - 100% had not invited family members to witnessed resuscitation. Nurses would consider the option if family members are accompanied by trained staff. Nurses concern included difficult to concentrate, negatively affecting their per- formance, increased rate of legal action, inadequate staff and limited space. Concerns on family members included too distressing event, negative psychological impact argue and interfere with staff. Concerns on patient would be breach of confidentiality. Conclusion: Adult critical care nurses demonstrated negative perceptions and attitudes towards FPDR. Study participants in this review are not familiar with the concept of FPDR. There is a need for policy development and education on FPDR.
    Matched MeSH terms: Confidentiality
  10. Nur Azien Yazid, Kamilah Abdullah, Suhaila Abd Halim
    ESTEEM Academic Journal, 2019;15(1):44-55.
    MyJurnal
    Image watermarking embeds identifying information in an image in such a manner that it cannot easily be removed. For the past several years, image digital watermarking has become a necessary element used for hiding secret image and enabling secured communication such as
    privacy, confidentiality, authentication and data integrity. Although numerous watermarking schemes are present in grayscale images, the present work focuses on the RGB color image. This study proposed a new hybrid method that would satisfy the essential needs of modern image watermarking. The color image watermarking is based on the 2D Discrete Cosine Transform and Elgamal cryptosystem. The 2D Discrete Cosine Transform depends on the matrix products, while the Elgamal cryptosystem depends on the discrete logarithm problem. The cryptosystem is combined with existing Arnold transform in watermarking algorithm to enhance the security of secret image. Value of Peak Signal to Noise Ratio was taken as performance evaluation parameters. On the whole, the performance evaluation shows that combining the two algorithms improved the performance of image watermarking.
    Matched MeSH terms: Confidentiality
  11. Alanazi HO, Zaidan AA, Zaidan BB, Kiah ML, Al-Bakri SH
    J Med Syst, 2015 Jan;39(1):165.
    PMID: 25481568 DOI: 10.1007/s10916-014-0165-3
    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.
    Matched MeSH terms: Confidentiality*
  12. Cyranoski D
    Nature, 2003 Jul 10;424(6945):118.
    PMID: 12853917
    Matched MeSH terms: Confidentiality
  13. Sim JH, Vadivelu J, Lee SS
    Med Educ, 2016 Nov;50(11):1145.
    PMID: 27762037 DOI: 10.1111/medu.13188
    Matched MeSH terms: Confidentiality/legislation & jurisprudence
  14. Mathiharan K
    Natl Med J India, 2014 Jan-Feb;27(1):39-42.
    PMID: 25403126
    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.
    Matched MeSH terms: Confidentiality/legislation & jurisprudence*
  15. Almazroi AA, Alqarni MA, Al-Shareeda MA, Manickam S
    PLoS One, 2023;18(10):e0292690.
    PMID: 37889892 DOI: 10.1371/journal.pone.0292690
    The role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The use of wireless technology within a vehicle raises issues of confidentiality and safety. Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods. However, current CPPA-based systems face a challenge when subjected to attacks from quantum computers. Because of the need for security and anti-piracy features in fog computing when using a 5G-enabled vehicle system, the L-CPPA scheme is proposed in this article. Using a fog server, secret keys are generated and transmitted to each registered car via a 5G-Base Station (5G-BS) in the proposed L-CPPA system. In the proposed L-CPPA method, the trusted authority, rather than the vehicle's Onboard Unit (OBU), stores the vehicle's master secret data to each fog server. Finally, the computation cost of the suggested L-CPPA system regards message signing, single verification and batch verification is 694.161 ms, 60.118 ms, and 1348.218 ms, respectively. Meanwhile, the communication cost is 7757 bytes.
    Matched MeSH terms: Confidentiality
  16. Hilyatihanina Zazali, Wan Ainun Mior Othman
    Sains Malaysiana, 2012;41:907-910.
    In this paper, we presented a new key exchange method based on decomposition problem for elliptic curve cryptography. We showed that our key exchange method was not only an alternative method for designing keys in cryptography, but it also has improved security condition from the previous key exchange based on decomposition problem over noncommutative groups. We proposed elliptic an curve cryptography to be the new platform for our key exchange protocol and showed how it was implemented. The security of our protocol was based on discrete logarithm problem, which was not infeasible and strictly difficult to retrieve in elliptic curve cryptography without any prior knowledge.
    Matched MeSH terms: Confidentiality
  17. Yousuf RM, Fauzi AR, How SH, Akter SF, Shah A
    Singapore Med J, 2009 May;50(5):494-9.
    PMID: 19495519
    Optimal patient care varies considerably from place to place and is influenced by scientific as well as social developments. The purpose of this study was to investigate awareness and pertinent issues regarding informed consent among hospitalised patients and to determine lapses, in order to improve the standard of care.
    Matched MeSH terms: Confidentiality/legislation & jurisprudence*
  18. Kumar V, Kumar S, AlShboul R, Aggarwal G, Kaiwartya O, Khasawneh AM, et al.
    Sensors (Basel), 2021 Jun 08;21(12).
    PMID: 34201100 DOI: 10.3390/s21123948
    Recently, green computing has received significant attention for Internet of Things (IoT) environments due to the growing computing demands under tiny sensor enabled smart services. The related literature on green computing majorly focuses on a cover set approach that works efficiently for target coverage, but it is not applicable in case of area coverage. In this paper, we present a new variant of a cover set approach called a grouping and sponsoring aware IoT framework (GS-IoT) that is suitable for area coverage. We achieve non-overlapping coverage for an entire sensing region employing sectorial sensing. Non-overlapping coverage not only guarantees a sufficiently good coverage in case of large number of sensors deployed randomly, but also maximizes the life span of the whole network with appropriate scheduling of sensors. A deployment model for distribution of sensors is developed to ensure a minimum threshold density of sensors in the sensing region. In particular, a fast converging grouping (FCG) algorithm is developed to group sensors in order to ensure minimal overlapping. A sponsoring aware sectorial coverage (SSC) algorithm is developed to set off redundant sensors and to balance the overall network energy consumption. GS-IoT framework effectively combines both the algorithms for smart services. The simulation experimental results attest to the benefit of the proposed framework as compared to the state-of-the-art techniques in terms of various metrics for smart IoT environments including rate of overlapping, response time, coverage, active sensors, and life span of the overall network.
    Matched MeSH terms: Confidentiality
  19. Cheung ML, Chau KY, Lam MHS, Tse G, Ho KY, Flint SW, et al.
    Int J Environ Res Public Health, 2019 Jun 26;16(13).
    PMID: 31247962 DOI: 10.3390/ijerph16132257
    With the advancement of information technology, wearable healthcare technology has emerged as one of the promising technologies to improve the wellbeing of individuals. However, the adoption of wearable healthcare technology has lagged when compared to other well-established durable technology products, such as smartphones and tablets, because of the inadequate knowledge of the antecedents of adoption intention. The aim of this paper is to address an identified gap in the literature by empirically testing a theoretical model for examining the impact of consumers' health beliefs, health information accuracy, and the privacy protection of wearable healthcare technology on perceived usefulness. Importantly, this study also examines the influences of perceived usefulness, consumer innovativeness, and reference group influence on the adoption intention of wearable healthcare technology. The model seeks to enhance understanding of the influential factors in adopting wearable healthcare technology. Finally, suggestions for future research for the empirical investigation of the model are provided.
    Matched MeSH terms: Confidentiality
  20. Marzo RR, Bhattacharya S, Ravichandran S, Lakshmanan P, Jeffery VR, Moralitheran P, et al.
    PMID: 32002422 DOI: 10.4103/jehp.jehp_192_19
    INTRODUCTION: Smoking is one of the leading factors of mortality in Malaysia. Most youngsters start at adolescence, fascinated by the concept of smoking. Interventions that harness the broad availability of mobile phones, as well as adolescents' interest in their appearance, may be an innovative way to advance school-based prevention. This study aims to determine the perceptions of facial-aging apps among secondary school students.

    METHODOLOGY: For this research, descriptive cross-sectional study using simple random sampling method was used. Population sampling was targeted toward three government schools. The total number of respondents is 383, with all of them aged between 13 and- 16 years of age. Legal considerations were taken to maintain the confidentiality of respondents. The specific objectives are: 1. To determine the level of change of intention on smoking, 2. To know the perceived reactions of the peer groups on the appearances of students as nonsmokers, 3. To determine whether the students learned new benefits of nonsmokingand, 4. To measure the impact of a facial-aging app among students.

    RESULTS: The number of respondents who smoke was 40 (10.4%), while the number of respondents who do not smoke was 343 (89.6%). About 89% of the respondents agree that their three-dimensional selfie image motivates them not to smoke. In addition, 87.8% of respondents admit that the perceived reactions of their classmates make them think that they look better as nonsmokers. After learning the effects of smoking, about 86.4% of the respondents acknowledged that they would educate their peer groups. Furthermore, 85.9% of the respondents found this "Smokerface" app enjoyable.

    CONCLUSION: The facial-aging intervention was effective in motivating Malaysian pupils to stay away from tobacco use. Thus, the analysis on the study of facial app usage in smoking prevention among youngsters concludes that most of the adolescents concur that the "Smokerface" app helps in the prevention of smoking among youths.

    Matched MeSH terms: Confidentiality
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links