Displaying publications 41 - 60 of 64 in total

Abstract:
Sort:
  1. Yusof Kadikon, Imran Mohd Shafek, M. Maarof Bahurdin
    MyJurnal
    In Malaysia, the number of Musculoskeletal Disorder (MSD) cases is increasing . Rapid Upper Limb Assessment
    (RULA) is carried out in a physical paper form which is cumbersome and based on the complex nature and it should
    consider human error. This project aims to create the RULA application for mobile devices featuring the android system
    for this move will cut down the process time by more than half, create a more structured system and eliminate human
    error wholly. The application will be designed on the App Inventor website which features a lot of handy tutorials
    and takes the initiative to create a RULA mobile app for Android phones. The RULA mobile app for Android phones
    is intended to make it easier and much more efficient to conduct a RULA analysis. Additionally, the analyses can be
    conducted by minimally trained users, eliminating the need for highly trained technicians. RULA test is performed to
    achieve accurate results and the mathematical processes will be programmed into the app so that the user will have a
    friendly interface and will only be asked to tick boxes.
    Matched MeSH terms: Confidentiality
  2. Mousavi SM, Naghsh A, Abu-Bakar SA
    J Digit Imaging, 2014 Dec;27(6):714-29.
    PMID: 24871349 DOI: 10.1007/s10278-014-9700-5
    The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients' privacy be protected. As a result of this, there is a need for medical image watermarking (MIW). However, MIW needs to be performed with special care for two reasons. Firstly, the watermarking procedure cannot compromise the quality of the image. Secondly, confidential patient information embedded within the image should be flawlessly retrievable without risk of error after image decompressing. Despite extensive research undertaken in this area, there is still no method available to fulfill all the requirements of MIW. This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
    Matched MeSH terms: Confidentiality/standards*
  3. Mat Kiah ML, Al-Bakri SH, Zaidan AA, Zaidan BB, Hussain M
    J Med Syst, 2014 Oct;38(10):133.
    PMID: 25199651 DOI: 10.1007/s10916-014-0133-y
    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
    Matched MeSH terms: Confidentiality
  4. Mathiharan K
    Natl Med J India, 2014 Jan-Feb;27(1):39-42.
    PMID: 25403126
    The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.
    Matched MeSH terms: Confidentiality/legislation & jurisprudence*
  5. Tayan O, Kabir MN, Alginahi YM
    ScientificWorldJournal, 2014;2014:514652.
    PMID: 25254247 DOI: 10.1155/2014/514652
    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.
    Matched MeSH terms: Confidentiality/standards*
  6. Safavi S, Shukur Z
    PLoS One, 2014;9(12):e114306.
    PMID: 25478915 DOI: 10.1371/journal.pone.0114306
    Wearable health tech provides doctors with the ability to remotely supervise their patients' wellness. It also makes it much easier to authorize someone else to take appropriate actions to ensure the person's wellness than ever before. Information Technology may soon change the way medicine is practiced, improving the performance, while reducing the price of healthcare. We analyzed the secrecy demands of wearable devices, including Smartphone, smart watch and their computing techniques, that can soon change the way healthcare is provided. However, before this is adopted in practice, all devices must be equipped with sufficient privacy capabilities related to healthcare service. In this paper, we formulated a new improved conceptual framework for wearable healthcare systems. This framework consists of ten principles and nine checklists, capable of providing complete privacy protection package to wearable device owners. We constructed this framework based on the analysis of existing mobile technology, the results of which are combined with the existing security standards. The approach also incorporates the market share percentage level of every app and its respective OS. This framework is evaluated based on the stringent CIA and HIPAA principles for information security. This evaluation is followed by testing the capability to revoke rights of subjects to access objects and ability to determine the set of available permissions for a particular subject for all models Finally, as the last step, we examine the complexity of the required initial setup.
    Matched MeSH terms: Confidentiality*
  7. Yau WC, Phan RC
    J Med Syst, 2013 Dec;37(6):9993.
    PMID: 24194093 DOI: 10.1007/s10916-013-9993-9
    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
    Matched MeSH terms: Confidentiality/standards*
  8. Kiah ML, Nabi MS, Zaidan BB, Zaidan AA
    J Med Syst, 2013 Oct;37(5):9971.
    PMID: 24037086 DOI: 10.1007/s10916-013-9971-2
    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
    Matched MeSH terms: Confidentiality
  9. Omar H, Khan SA, Toh CG
    J Dent Educ, 2013 May;77(5):640-7.
    PMID: 23658411
    Student-generated videos provide an authentic learning experience for students, enhance motivation and engagement, improve communication skills, and improve collaborative learning skills. This article describes the development and implementation of a student-generated video activity as part of a knowledge, observation, simulation, and experience (KOSE) program at the School of Dentistry, International Medical University, Kuala Lumpur, Malaysia. It also reports the students' perceptions of an activity that introduced first-year dental students (n=44) to clinical scenarios involving patients and dental team aiming to improve professional behavior and communication skills. The learning activity was divided into three phases: preparatory phase, video production phase, and video-watching. Students were organized into five groups and were instructed to generate videos addressing given clinical scenarios. Following the activity, students' perceptions were assessed with a questionnaire. The results showed that 86 percent and 88 percent, respectively, of the students agreed that preparation of the activity enhanced their understanding of the role of dentists in provision of health care and the role of enhanced teamwork. In addition, 86 percent and 75 percent, respectively, agreed that the activity improved their communication and project management skills. Overall, the dental students perceived that the student-generated video activity was a positive experience and enabled them to play the major role in driving their learning process.
    Matched MeSH terms: Confidentiality
  10. Thuraisingham C, Nalliah S
    Aust Fam Physician, 2013 Apr;42(4):249-51.
    PMID: 23550254
    In many workplaces, employment is conditional on a successful pre-employment medical examination. This examination is usually conducted by a general practitioner on the employers' panel of approved clinics or by an in-house company doctor.
    Matched MeSH terms: Confidentiality/ethics
  11. Koh KC, Teh JR, Khan SA
    ScientificWorldJournal, 2013;2013:462826.
    PMID: 24285935 DOI: 10.1155/2013/462826
    We describe the findings from a survey assessing the beliefs regarding testing, confidentiality, disclosure, and environment of care and attitudes towards care of people with HIV/AIDS (PLHWA), in 1020, 4th and 5th year medical students, from public and private medical universities in Malaysia. A self-administered validated questionnaire based on the UNAIDS Model Questionnaire with a 5-point Likert scale (5, strongly disagree; 4, disagree; 3, neutral; 2, agree; 1, strongly agree) was used as a survey tool. The survey included demographic data and data on undergraduate training received on HIV/AIDS. Statistical significance in the demographic data and training received by respondents was evaluated using the chi-square test while the independent Student's t-test was used for comparison of means between public and private universities. A P value of <0.05 was considered statistically significant with 95% confidence interval. Our study revealed less than 20% of medical students received adequate training to care for PLHWA. They had prevalent negative beliefs regarding testing, confidentiality, disclosure and environment of care towards PLHWA although in giving care to PLHWA, their attitudes were largely positive and nondiscriminatory.
    Study site: 7 public and private universities in Malaysia
    Matched MeSH terms: Confidentiality/psychology
  12. Hilyatihanina Zazali, Wan Ainun Mior Othman
    Sains Malaysiana, 2012;41:907-910.
    In this paper, we presented a new key exchange method based on decomposition problem for elliptic curve cryptography. We showed that our key exchange method was not only an alternative method for designing keys in cryptography, but it also has improved security condition from the previous key exchange based on decomposition problem over noncommutative groups. We proposed elliptic an curve cryptography to be the new platform for our key exchange protocol and showed how it was implemented. The security of our protocol was based on discrete logarithm problem, which was not infeasible and strictly difficult to retrieve in elliptic curve cryptography without any prior knowledge.
    Matched MeSH terms: Confidentiality
  13. Koh KC, Kamarulzaman A
    Med J Malaysia, 2011 Dec;66(5):491-4.
    PMID: 22390108 MyJurnal
    Community-based HIV voluntary counseling and testing (VCT) services is an effective alternative for mapping the local demographics of at-risk populations for HIV as well as provide an acceptable and reliable means of early detection of HIV. We describe the profiles of men-who-have-sex-with-men (MSM) who sought VCT services in a community based centre in Kuala Lumpur.
    Matched MeSH terms: Confidentiality
  14. Mazlina M, Julia PE
    Singapore Med J, 2011 Jun;52(6):421-7.
    PMID: 21731994
    Medical ethics issues encountered in rehabilitation medicine differ from those in an acute care setting due to the complex relationships among the parties involved in rehabilitative care. The study examined the attitudes of Malaysian rehabilitation doctors toward medical ethics issues commonly encountered during patient care.
    Matched MeSH terms: Confidentiality
  15. Syed-Mohamad SM, Ali SH, Mat-Husin MN
    Health Inf Manag, 2010 Mar;39(1):30-35.
    PMID: 28683624 DOI: 10.1177/183335831003900105
    This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open-source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
    Matched MeSH terms: Confidentiality
  16. Sharmini S, Jamaiyah H, Jaya Purany SP
    Malays Fam Physician, 2010;5(1):13-8.
    PMID: 25606180 MyJurnal
    This survey set out to describe patient registries available in the country, to determine their security features, data confidentiality, extent of outputs produced and data quality of the registries.
    Matched MeSH terms: Confidentiality
  17. Yousuf RM, Fauzi AR, How SH, Akter SF, Shah A
    Singapore Med J, 2009 May;50(5):494-9.
    PMID: 19495519
    Optimal patient care varies considerably from place to place and is influenced by scientific as well as social developments. The purpose of this study was to investigate awareness and pertinent issues regarding informed consent among hospitalised patients and to determine lapses, in order to improve the standard of care.
    Matched MeSH terms: Confidentiality/legislation & jurisprudence*
  18. Vijayananthan A, Nawawi O
    Biomed Imaging Interv J, 2008 Jan;4(1):e5.
    PMID: 21614316 MyJurnal DOI: 10.2349/biij.4.1.e5
    Good Clinical Practice (GCP) is an international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses and reporting of clinical trials. It also serves to protect the rights, integrity and confidentiality of trial subjects. It is very important to understand the background of the formation of the ICH-GCP guidelines as this, in itself, explains the reasons and the need for doing so. In this paper, we address the historical background and the events that led up to the formation of these guidelines. Today, the ICH-GCP guidelines are used in clinical trials throughout the globe with the main aim of protecting and preserving human rights.
    Matched MeSH terms: Confidentiality
  19. Azmi, M.T., Emran, M.T.
    MyJurnal
    Background: Without any doubt, the combo of user ID and password are the most used authentication method in the computing and internet environment. However, due to the enormous number of accounts that require password authentication, users tend to develop bad habits in their password practices which in turn will put their account security at risk. With the increasing use of computing in health-care settings and the use of EMR in hospitals, such practices are a cause for concern.
    Methods: This is a cross-sectional study using self-administered questionnaires, investigating the practice of the respondents in keeping their passwords secure. Respondents in this survey are the undergraduate students of Faculty of Medicine, Universiti Kebangsaan Malaysia.
    Results: Among the findings are that 87.4% of the respondents used the same password for more than one account. If a user used the same password for several accounts, it might trigger a domino effect if any of the account passwords were compromised. A total of 98.9% of the respondents memorised their password only in their mind, without writing down the password anywhere. This may lead to using easily guessable passwords which may introduce additional security risk to their accounts. The majority of the respondents (96.6%) never or rarely change their passwords. The study also showed that 82.7% of the respondents used passwords which are 6-8 characters in length. Longer passwords are usually safer but harder to remember. The questionnaire also explored the users’ password combination style, whether they used numbers only or combination of numbers and alphabets or some other pattern. A total of 39.1% used letters only but 27.6% used combination of numbers only which is less secure. About 77% of the respondents used personal information such as their birthday date or a person’s name as part of their password.
    Conclusions: This habit may make their password guessable to people who are close to them. In conclusion, most medical students are not practising safe password conduct and they should be educated on this. If not, patients’ data confidentiality may be compromised in the future due to such practices.
    Matched MeSH terms: Confidentiality
  20. Cyranoski D
    Nature, 2003 Jul 10;424(6945):118.
    PMID: 12853917
    Matched MeSH terms: Confidentiality
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links