Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs

N Jerry-Egemba - Healthcare Management Forum, 2024 - journals.sagepub.com
This article emphasizes the importance of comprehensive cybersecurity education programs
in the healthcare industry. The rapid development of technology in healthcare has brought …

Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study

T Yesmin, MW Carter - International journal of medical informatics, 2020 - Elsevier
Objective We aim to 1) design an evaluation framework to examine the accuracy of
automatic privacy auditing tools, 2) apply the evaluation method at a hospital to validate the …

We may Still not be Ready for Newer Healthcare Technologies: An Ethical Perspective of Privacy Concerns

D Appiah, J Majeed - Available at SSRN 4880035, 2024 - papers.ssrn.com
As healthcare technologies rapidly progress, a paramount concern arises: are individuals
adequately prepared for the current challenges accompanying these advancements …

Decentralizing Philippine Driver's License Application and Identity Management for Transparency, Efficiency, and Security: A Design Proposal

HDQ Lorico, ADP Zamuco, JDL Caro… - Novel & Intelligent Digital …, 2024 - Springer
Blockchain is a developing and promising field in transaction and identity management.
Recent efforts have been underway to address issues of data insecurity and inefficiency …

Smart Hospital Applications

T Yesmin - 2022 - search.proquest.com
Recent technological advancements (ie, internet of things [IoT]), radio-frequency
identification technology, electronic medical records/electronic health records) and new …

[PDF][PDF] CYBER CRIMES, ONLINE HEALTH CARE SYSTEMS AND MORALITY

SF Bokhari, M Jawwad, A Abdulghafar - Journal of the Research Society …, 2022 - pu.edu.pk
Modern scientific inventions have shown their effects in every field of human life. The
developments in cyber technology in the form of various software for chatting, mailing and …

Understanding the Individual Level and Macro Level Causes of Economic Cybercrime Victimisation in the UK: A Contextual Vulnerabilities Approach to Examine …

N Akdemir - 2019 - etheses.dur.ac.uk
This thesis applying a mixed methods research paradigm discerns the individual and macro
level factors facilitating economic cybercrime victimisation in the UK. Understanding and …

[PDF][PDF] Strategic Dimensions of Information Security Risk Management

A Gupta - pdfs.semanticscholar.org
Information security is thus a big threat to the survival of enterprises. In all context and forms,
it is an imperative to provide adequate safeguards and measures to management the risk …

Exploring occurrences of patient breaches: Protected health information privacy within acute care hospitals

MP Bean - 2016 - search.proquest.com
A phenomenological qualitative approach was used to identify and analyze compliance
professionals' lived experiences of patient breaches within acute care hospitals. Their …

Liability, information, and anti-fraud investment in a layered retail payment structure

KS Yoon, J Jun - Bank of Korea WP, 2016 - papers.ssrn.com
Motivated by recently introduced retail payment schemes using information technology,
often called “FinTech,” we examine the effects of fraud liability regime and information …