2. Privacy and Security

2021 ◽  
pp. 46-68
Keyword(s):  
Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


10.29007/jlq6 ◽  
2019 ◽  
Author(s):  
Thabang Mofokeng

The technology devices introduced in recent years are not only vulnerable to Internet risks but are also unable to elevate the growth of B2C e-commerce. These concerns are particularly relevant today, as the world transitions into the Fourth Industrial Revolution. To date, existing research has largely focused on obstacles to customer loyalty. Studies have tested e-commerce models guided by the establishment of trusting, satisfied and loyal consumers in various international contexts. In South Africa, however, as an emerging market, there has been limited research on the success factors of online shopping.This study examines the influence of security and privacy on trust, seen as a moderator of customer satisfaction, which in turn, has an effect on loyalty towards websites. Based on an exhaustive review of literature, a conceptual model is proposed on the relationships between security and privacy on the one hand, and customer trust, satisfaction and loyalty on the other. A total of 250 structured, self-administered questionnaires was distributed to a purposively selected sample of respondents using face-to-face surveys in Johannesburg, South Africa. A multivariate data analysis technique was used to draw inferences from the data. With an 80.1% response rate, the findings showed that privacy and security do influence customer trust; security strongly influences customer trust and weakly influences satisfaction. In South Africa, customer loyalty towards websites is strongly determined by satisfaction and weakly determined by trust. Trust significantly moderates the effect of customer satisfaction on loyalty. The study implications and limitations are presented and future research directions are suggested.


2020 ◽  
Author(s):  
Hikari Takashina ◽  
Kengo Yokomitsu

There are thousands of mobile apps delivering information and offering support and intervention in situations of daily life. The aim of this study was to identify the current state of apps for depressive symptoms or prevention of depression within the official Android and iOS app stores in Japan. The 47 apps for depression available for download from the app stores were evaluated by the App Evaluation Model regarding background information, risk/ privacy and security, evidence, ease of use, and interoperability. Also, we evaluated their primary purpose, technology components, and cognitive-behavioral therapy components. The results suggest that in general few apps have been developed that are evidence-based, secure, and provide the services that users expect. In the future, it will be necessary to develop a framework for developing and disseminating more effective apps. This study is the first review of apps for depression available in Japan and seeks to help create a framework for such apps.


2020 ◽  
Author(s):  
Zahra Zandesh

BACKGROUND The complicated nature of cloud computing encompassing internet-based technologies and service models for delivering IT applications, processing capability, storage, and memory space and some notable features motivate organizations to migrate their core businesses to the cloud. Consequently, healthcare organizations are much interested to migrate to this new paradigm despite challenges about security, privacy and compliances issues. OBJECTIVE The present study was conducted to investigate all related cloud compliances in health domain in order to find gaps in this context. METHODS All works on cloud compliance issues were surveyed after 2013 in health domain in PubMed, Scopus, Web of Science, and IEEE Digital Library databases. RESULTS Totally, 36 compliances had been found in this domain used in different countries for a variety of purposes. Initially, all founded compliances were divided into three parts as well as five standards, twenty-eight legislations and three policies and guidelines each of which is presented here by in detail. CONCLUSIONS Then, some main headlines like compliance management, data management, data governance, information security services, medical ethics, and patients' rights were recommended in terms of any compliance or frameworks and their corresponding patterns which should be involved in this domain.


2021 ◽  
Vol 20 (2) ◽  
pp. 1-24
Author(s):  
Stef Verreydt ◽  
Koen Yskout ◽  
Wouter Joosen

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.


2021 ◽  
Vol 13 (11) ◽  
pp. 5889
Author(s):  
Faiza Hashim ◽  
Khaled Shuaib ◽  
Farag Sallabi

Electronic health records (EHRs) are important assets of the healthcare system and should be shared among medical practitioners to improve the accuracy and efficiency of diagnosis. Blockchain technology has been investigated and adopted in healthcare as a solution for EHR sharing while preserving privacy and security. Blockchain can revolutionize the healthcare system by providing a decentralized, distributed, immutable, and secure architecture. However, scalability has always been a bottleneck in blockchain networks due to the consensus mechanism and ledger replication to all network participants. Sharding helps address this issue by artificially partitioning the network into small groups termed shards and processing transactions parallelly while running consensus within each shard with a subset of blockchain nodes. Although this technique helps resolve issues related to scalability, cross-shard communication overhead can degrade network performance. This study proposes a transaction-based sharding technique wherein shards are formed on the basis of a patient’s previously visited health entities. Simulation results show that the proposed technique outperforms standard-based healthcare blockchain techniques in terms of the number of appointments processed, consensus latency, and throughput. The proposed technique eliminates cross-shard communication by forming complete shards based on “the need to participate” nodes per patient.


Sign in / Sign up

Export Citation Format

Share Document