Displaying publications 61 - 64 of 64 in total

Abstract:
Sort:
  1. Alanazi HO, Zaidan AA, Zaidan BB, Kiah ML, Al-Bakri SH
    J Med Syst, 2015 Jan;39(1):165.
    PMID: 25481568 DOI: 10.1007/s10916-014-0165-3
    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.
    Matched MeSH terms: Confidentiality*
  2. Ahmed Tharbe IH, Kamaruddin MKA, Sumari M, Chong IM
    Data Brief, 2021 Apr;35:106804.
    PMID: 33604426 DOI: 10.1016/j.dib.2021.106804
    The data presented in this article examine the relationship between the subcomponents of emotional intelligence (emotional perception and expression, emotional facilitation of thinking, emotional understanding and emotional management) and the stages of change (pre-contemplation, contemplation, action and maintenance). The final data were obtained from 429 Malaysian inmates (374 male and 55 female) recruited from eight Malaysian prisons in four different zones. The two instruments used were the Self-Rated Malaysian Emotional Intelligence Scale (SRMEIS) and the University Rhodes Island Change Assessment Scale (URICA). Both instruments underwent expert validation through construct and test-retest validity. The researcher randomly distributed a total of 550 questionnaires, of which 429 were accepted and 121 were rejected due to missing data and outliers, resulting in 78% of participants providing data that could be used in the analyses. All participants were informed of the confidentiality of their data, and their participation was voluntary. SPSS and Excel files are provided as supplementary material.
    Matched MeSH terms: Confidentiality
  3. Adenuga KI, Iahad NA, Miskon S
    Int J Med Inform, 2017 08;104:84-96.
    PMID: 28599820 DOI: 10.1016/j.ijmedinf.2017.05.008
    Telemedicine systems have been considered as a necessary measure to alleviate the shortfall in skilled medical specialists in developing countries. However, the obvious challenge is whether clinicians are willing to use this technological innovation, which has aided medical practice globally. One factor which has received little academic attention is the provision of suitable encouragement for clinicians to adopt telemedicine, in the form of rewards, motivation or incentives. A further consideration for telemedicine usage in developing countries, especially sub-Saharan Africa and Nigeria in particular, are to the severe shortage of available practising clinicians. The researchers therefore explore the need to positively reinforce the adoption of telemedicine amongst clinicians in Nigeria, and also offer a rationale for this using the UTAUT model. Data were collected using a structured paper-based questionnaire, with 252 physicians and nurses from six government hospitals in Ondo state, Nigeria. The study applied SmartPLS 2.0 for analysis to determine the relationship between six variables. Demographic moderating variables, age, gender and profession, were included. The results indicate that performance expectancy (p<0.05), effort expectancy (p<0.05), facilitating condition (p<0.01) and reinforcement factor (p<0.001) have significant effects on clinicians' behavioural intention to use telemedicine systems, as predicted using the extended UTAUT model. Our results showed that the use of telemedicine by clinicians in the Nigerian context is perceived as a dual responsibility which requires suitable reinforcement. In addition, performance expectancy, effort expectancy, facilitating condition and reinforcement determinants are influential factors in the use of telemedicine services for remote-patient clinical diagnosis and management by the Nigerian clinicians.
    Matched MeSH terms: Confidentiality
  4. Abbasi IA, Jan SU, Alqahtani AS, Khan AS, Algarni F
    PLoS One, 2024;19(1):e0294429.
    PMID: 38289970 DOI: 10.1371/journal.pone.0294429
    Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary can easily enter the server to access sensitive information, especially for the healthcare industry, which offers services to patients, researchers, labs, and hospitals in a flexible way with minimal operational costs. It is challenging to make it a reliable system and ensure the privacy and security of a cloud-enabled healthcare system. In this regard, numerous security mechanisms have been proposed in past decades. These protocols either suffer from replay attacks, are completed in three to four round trips or have maximum computation, which means the security doesn't balance with performance. Thus, this work uses a fuzzy extractor method to propose a robust security method for a cloud-enabled healthcare system based on Elliptic Curve Cryptography (ECC). The proposed scheme's security analysis has been examined formally with BAN logic, ROM and ProVerif and informally using pragmatic illustration and different attacks' discussions. The proposed security mechanism is analyzed in terms of communication and computation costs. Upon comparing the proposed protocol with prior work, it has been demonstrated that our scheme is 33.91% better in communication costs and 35.39% superior to its competitors in computation costs.
    Matched MeSH terms: Confidentiality*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links