scholarly journals Secure Access Control for Health Information Sharing Systems

Author(s):  
Suhair Alshehri ◽  
Rajendra K. Raj
2020 ◽  
pp. 109019812098476
Author(s):  
Linqi Lu ◽  
Jiawei Liu ◽  
Y. Connie Yuan ◽  
Kelli S. Burns ◽  
Enze Lu ◽  
...  

Health information sharing has become especially important during the COVID-19 (coronavirus disease 2019) pandemic because people need to learn about the disease and then act accordingly. This study examines the perceived trust of different COVID-19 information sources (health professionals, academic institutions, government agencies, news media, social media, family, and friends) and sharing of COVID-19 information in China. Specifically, it investigates how beliefs about sharing and emotions mediate the effects of perceived source trust on source-specific information sharing intentions. Results suggest that health professionals, academic institutions, and government agencies are trusted sources of information and that people share information from these sources because they think doing so will increase disease awareness and promote disease prevention. People may also choose to share COVID-19 information from news media, social media, and family as they cope with anxiety, anger, and fear. Taken together, a better understanding of the distinct psychological mechanisms underlying health information sharing from different sources can help contribute to more effective sharing of information about COVID-19 prevention and to manage negative emotion contagion during the pandemic.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Chiao-Chieh Chen ◽  
Yu-Ping Chiu

PurposeSocial media have become famous platform to search and share the COVID-19-related information. The objective of this research is to bridge the gap by proposing the effects of network cluster and transmitter activity on information sharing process.Design/methodology/approachData were collected by using Facebook application, which was available for 14 days (May 1–14) in 2020. These data were analyzed to determine the influence of the network cluster and transmitter activity.FindingsThe results showed that network cluster is positively related to transmitter activity on social media. In addition, transmitter activity partially mediated the effect of network cluster on the extent of information liked and shared. That is, transmitter activity can affect COVID-19-related information sharing on Facebook, and the activity effect is plausible and should become stronger as social network become denser.Originality/valueThis study has contributed to the knowledge of health information sharing in social media and has generated new opportunities for research into the role of network cluster. As social media is firmly entrenched in society, researches that improve the experience or quality for users is potentially impactful.


2018 ◽  
Vol 3 (2) ◽  
pp. 139
Author(s):  
Ragil Tri Atmi

Cervical cancer is the second highest cause of death for women in Indonesia, despite a deadly illness, patients with cervical cancer are not desperate to survive. Instead, they are motivated to undertake positive actions, one of which is to do health informtion sharing or share information on environmental health tersekatnya. This study aims to look at how the patterns of behavior of sharing health information on cervical cancer patients, as well as the motive behind their actions the health information sharing. This study uses the method of qualitative research grounded approach. Location of the study conducted in Surabaya, while the search for informants researchers used snowball sampling. The results from this study is there are different behavior patterns of health information sharing among cervical cancer patients who have been diagnosed with advanced cervical cancer with cervical cancer at an early stage level.


Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Jianfeng Ma ◽  
Ruixiao Wang ◽  
Wenbo Shi

Author(s):  
Jameson Mbale ◽  
Manish Wadhwa

Routers interconnect networks of various enterprises, and the more secure the entry or exit points are made, the more robust the security of these enterprises is. These routers become the first direct targets and are vulnerable to security attacks. If these routers are not tightly protected, the attackers get an edge to intrude the system. In order to ensure the security of these routers, Secure Access Control Lists (ACLs) Filtering-Based Enterprise Networks (SAFE-Nets) are proposed in this chapter. In this scheme, routers are configured with Access Control Lists (ACL) that are used to filter in the intended packets and filter out the dangerous malicious packets from network traffic. This consolidates security deployment over the entire network on top of anti-virus software, weak passwords, latent software vulnerabilities, and other related secure measures. This can help network technicians working for various enterprises manage security at low costs.


Sign in / Sign up

Export Citation Format

Share Document