In Malaysia, the number of Musculoskeletal Disorder (MSD) cases is increasing . Rapid Upper Limb Assessment
(RULA) is carried out in a physical paper form which is cumbersome and based on the complex nature and it should
consider human error. This project aims to create the RULA application for mobile devices featuring the android system
for this move will cut down the process time by more than half, create a more structured system and eliminate human
error wholly. The application will be designed on the App Inventor website which features a lot of handy tutorials
and takes the initiative to create a RULA mobile app for Android phones. The RULA mobile app for Android phones
is intended to make it easier and much more efficient to conduct a RULA analysis. Additionally, the analyses can be
conducted by minimally trained users, eliminating the need for highly trained technicians. RULA test is performed to
achieve accurate results and the mathematical processes will be programmed into the app so that the user will have a
friendly interface and will only be asked to tick boxes.
The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients' privacy be protected. As a result of this, there is a need for medical image watermarking (MIW). However, MIW needs to be performed with special care for two reasons. Firstly, the watermarking procedure cannot compromise the quality of the image. Secondly, confidential patient information embedded within the image should be flawlessly retrievable without risk of error after image decompressing. Despite extensive research undertaken in this area, there is still no method available to fulfill all the requirements of MIW. This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
The concept of informed consent specific to medical research and treatment is still alien to many medical researchers and practitioners and to millions of Indians. The doctor-patient relationship in India is governed more by trust where the doctor is the authoritative person. Therefore, the benefit of informed consent does not reach all patients in day-to-day medical practice. To complicate the issue, the Indian law is not specific about the age at which a person can give valid consent. The Indian Penal Code is silent about the legal validity of consent given by persons between 12 and 18 years of age. Similarly, the age at which the 'Right to Confidentiality' begins is yet to be defined either by the statute or by the courts. Hence, there is a need for a clear statutory provision to remove the anomalies and ambiguities regarding the age of consent to undergo invasive therapeutic or investigative procedures, participate in clinical trials, as well as define the age at which a person's right to medical confidentiality begins.
This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.
Wearable health tech provides doctors with the ability to remotely supervise their patients' wellness. It also makes it much easier to authorize someone else to take appropriate actions to ensure the person's wellness than ever before. Information Technology may soon change the way medicine is practiced, improving the performance, while reducing the price of healthcare. We analyzed the secrecy demands of wearable devices, including Smartphone, smart watch and their computing techniques, that can soon change the way healthcare is provided. However, before this is adopted in practice, all devices must be equipped with sufficient privacy capabilities related to healthcare service. In this paper, we formulated a new improved conceptual framework for wearable healthcare systems. This framework consists of ten principles and nine checklists, capable of providing complete privacy protection package to wearable device owners. We constructed this framework based on the analysis of existing mobile technology, the results of which are combined with the existing security standards. The approach also incorporates the market share percentage level of every app and its respective OS. This framework is evaluated based on the stringent CIA and HIPAA principles for information security. This evaluation is followed by testing the capability to revoke rights of subjects to access objects and ability to determine the set of available permissions for a particular subject for all models Finally, as the last step, we examine the complexity of the required initial setup.
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
Student-generated videos provide an authentic learning experience for students, enhance motivation and engagement, improve communication skills, and improve collaborative learning skills. This article describes the development and implementation of a student-generated video activity as part of a knowledge, observation, simulation, and experience (KOSE) program at the School of Dentistry, International Medical University, Kuala Lumpur, Malaysia. It also reports the students' perceptions of an activity that introduced first-year dental students (n=44) to clinical scenarios involving patients and dental team aiming to improve professional behavior and communication skills. The learning activity was divided into three phases: preparatory phase, video production phase, and video-watching. Students were organized into five groups and were instructed to generate videos addressing given clinical scenarios. Following the activity, students' perceptions were assessed with a questionnaire. The results showed that 86 percent and 88 percent, respectively, of the students agreed that preparation of the activity enhanced their understanding of the role of dentists in provision of health care and the role of enhanced teamwork. In addition, 86 percent and 75 percent, respectively, agreed that the activity improved their communication and project management skills. Overall, the dental students perceived that the student-generated video activity was a positive experience and enabled them to play the major role in driving their learning process.
In many workplaces, employment is conditional on a successful pre-employment medical examination. This examination is usually conducted by a general practitioner on the employers' panel of approved clinics or by an in-house company doctor.
We describe the findings from a survey assessing the beliefs regarding testing, confidentiality, disclosure, and environment of care and attitudes towards care of people with HIV/AIDS (PLHWA), in 1020, 4th and 5th year medical students, from public and private medical universities in Malaysia. A self-administered validated questionnaire based on the UNAIDS Model Questionnaire with a 5-point Likert scale (5, strongly disagree; 4, disagree; 3, neutral; 2, agree; 1, strongly agree) was used as a survey tool. The survey included demographic data and data on undergraduate training received on HIV/AIDS. Statistical significance in the demographic data and training received by respondents was evaluated using the chi-square test while the independent Student's t-test was used for comparison of means between public and private universities. A P value of <0.05 was considered statistically significant with 95% confidence interval. Our study revealed less than 20% of medical students received adequate training to care for PLHWA. They had prevalent negative beliefs regarding testing, confidentiality, disclosure and environment of care towards PLHWA although in giving care to PLHWA, their attitudes were largely positive and nondiscriminatory.
Study site: 7 public and private universities in Malaysia
In this paper, we presented a new key exchange method based on decomposition problem for elliptic curve cryptography. We showed that our key exchange method was not only an alternative method for designing keys in cryptography, but it also has improved security condition from the previous key exchange based on decomposition problem over noncommutative groups. We proposed elliptic an curve cryptography to be the new platform for our key exchange protocol and showed how it was implemented. The security of our protocol was based on discrete logarithm problem, which was not infeasible and strictly difficult to retrieve in elliptic curve cryptography without any prior knowledge.
Community-based HIV voluntary counseling and testing (VCT) services is an effective alternative for mapping the local demographics of at-risk populations for HIV as well as provide an acceptable and reliable means of early detection of HIV. We describe the profiles of men-who-have-sex-with-men (MSM) who sought VCT services in a community based centre in Kuala Lumpur.
Medical ethics issues encountered in rehabilitation medicine differ from those in an acute care setting due to the complex relationships among the parties involved in rehabilitative care. The study examined the attitudes of Malaysian rehabilitation doctors toward medical ethics issues commonly encountered during patient care.
This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open-source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
This survey set out to describe patient registries available in the country, to determine their security features, data confidentiality, extent of outputs produced and data quality of the registries.
Optimal patient care varies considerably from place to place and is influenced by scientific as well as social developments. The purpose of this study was to investigate awareness and pertinent issues regarding informed consent among hospitalised patients and to determine lapses, in order to improve the standard of care.
Good Clinical Practice (GCP) is an international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses and reporting of clinical trials. It also serves to protect the rights, integrity and confidentiality of trial subjects. It is very important to understand the background of the formation of the ICH-GCP guidelines as this, in itself, explains the reasons and the need for doing so. In this paper, we address the historical background and the events that led up to the formation of these guidelines. Today, the ICH-GCP guidelines are used in clinical trials throughout the globe with the main aim of protecting and preserving human rights.
Background: Without any doubt, the combo of user ID and password are the most used authentication method in the computing and internet environment. However, due to the enormous number of accounts that require password authentication, users tend to develop bad habits in their password practices which in turn will put their account security at risk. With the increasing use of computing in health-care settings and the use of EMR in hospitals, such practices are a cause for concern.
Methods: This is a cross-sectional study using self-administered questionnaires, investigating the practice of the respondents in keeping their passwords secure. Respondents in this survey are the undergraduate students of Faculty of Medicine, Universiti Kebangsaan Malaysia.
Results: Among the findings are that 87.4% of the respondents used the same password for more than one account. If a user used the same password for several accounts, it might trigger a domino effect if any of the account passwords were compromised. A total of 98.9% of the respondents memorised their password only in their mind, without writing down the password anywhere. This may lead to using easily guessable passwords which may introduce additional security risk to their accounts. The majority of the respondents (96.6%) never or rarely change their passwords. The study also showed that 82.7% of the respondents used passwords which are 6-8 characters in length. Longer passwords are usually safer but harder to remember. The questionnaire also explored the users’ password combination style, whether they used numbers only or combination of numbers and alphabets or some other pattern. A total of 39.1% used letters only but 27.6% used combination of numbers only which is less secure. About 77% of the respondents used personal information such as their birthday date or a person’s name as part of their password.
Conclusions: This habit may make their password guessable to people who are close to them. In conclusion, most medical students are not practising safe password conduct and they should be educated on this. If not, patients’ data confidentiality may be compromised in the future due to such practices.