E-Health Project Implementation

Author(s):  
Konstantinos Siassiakos ◽  
Athina Lazakidou

Privacy includes the right of individuals and organizations to determine for themselves when, how and to what extent information about them is communicated to others. The growing need of managing large amounts of medical data raises important legal and ethical challenges. E-Health systems must be capable of adhering to clearly defined security policies based upon legal requirements, regulations and standards while catering for dynamic healthcare and professional needs. Such security policies, incorporating enterprise level principles of privacy, integrity and availability, coupled with appropriate audit and control processes, must be able to be clearly defined by enterprise management with the understanding that such policy will be reliably and continuously enforced. This chapter addresses the issue of identifying and fulfilling security requirements for critical applications in the e-health domain. In this chapter the authors describe the main privacy and security measures that may be taken by the implementation of e-health projects.

Author(s):  
Daniel L. Ruggles

Multiple levels of potential security risk affect all the elements of an e-commerce site. Truly complete security protects three areas: (1) internal network and application services, (2) perimeter network access and application services, and (3) external network and services. To minimize security risks in these areas as well as to raise overall confidence in the e-commerce service, businesses must address problems with practical solutions involving privacy and security. Establishing an e-commerce trust infrastructure encompasses confidentiality, data integrity, non-repudiation and authentication. Striking the right balance between functionality and accessibility in e-commerce demands technical security measures. It also requires management vigilance with non-technical measures such as routine assessments of vulnerabilities, policies, education and a focus on making processes and policies easy to understand and simple to implement and monitor compliance.


Author(s):  
Chelsea Leigh Horne

There is incredible and intrinsic, though hidden, power in technology settings, including those set by online platforms. The hidden levers of control embedded within the default settings influence users’ overall experience on platforms and with technology, especially in regard to issues of privacy and security. This paper examines the embedded assumptions and implications of technology and technical design on society. To this end, this study addresses the role and power of social media platforms in developing and applying privacy and security policies and norms for their users. The privacy and security choices by social media platforms affect billions of users worldwide. Further, this study will consider how platforms’ public-facing rhetoric aligns or differs with the actual implementation of privacy policies and privacy and security user settings. The implications of this research may have profound impact in the governance, policy, and regulation of platforms.


Author(s):  
Deepti Parachuri ◽  
Sudeep Mallick

Security is of fundamental concern in computing systems. This chapter covers the role of security policies in Web services. First, it examines the importance of policies in web services and explains the WS-Policy standard. It also highlights the relation of WS-Policy with other WS-* specifications. Next, it covers different facets of security requirements in SOA implementations. Later, it examines the importance of security policies in web services. It also presents the basic concepts of WS-Security policy language. WS-Security policy specification specifies a standard way to define and publish security requirements in an extensible and interoperable way. A service provider makes use of security policy to publish the security measures implemented to protect the service. Security policies can also be made customizable to meet the security preferences of different consumers. Towards the end, it discusses about the governance of security polices and also future trends in security policies for web services.


Author(s):  
Robert A. Schultz

Privacy and security are the first topics involving the interface of the individual with information technology. The two topics of privacy and security are connected, because security is required to make privacy possible in an online world and privacy needs drive security requirements. I will first discuss ethical issues connected with privacy and then with security. The questions raised concerning privacy are these: First, what is the ethical basis for the right to privacy? Second, in what way does IT impact or change the right to privacy? Some concerns about security are these: First, what are the ethical implications for security of the answers to these questions about privacy? At a minimum, we are surely ethically required to maintain security to meet the individual’s right to privacy. Additionally, there are ethical requirements involving security that have bases other than privacy, for example, protection of underage children against exploitation on the Internet.1


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2575 ◽  
Author(s):  
Alfonso Panarello ◽  
Nachiket Tapas ◽  
Giovanni Merlino ◽  
Francesco Longo ◽  
Antonio Puliafito

The Internet of Things (IoT) refers to the interconnection of smart devices to collect data and make intelligent decisions. However, a lack of intrinsic security measures makes IoT vulnerable to privacy and security threats. With its “security by design,” Blockchain (BC) can help in addressing major security requirements in IoT. BC capabilities like immutability, transparency, auditability, data encryption and operational resilience can help solve most architectural shortcomings of IoT. This article presents a comprehensive survey on BC and IoT integration. The objective of this paper is to analyze the current research trends on the usage of BC-related approaches and technologies in an IoT context. This paper presents the following novelties, with respect to related work: (i) it covers different application domains, organizing the available literature according to this categorization, (ii) it introduces two usage patterns, i.e., device manipulation and data management (open marketplace solution), and (iii) it reports on the development level of some of the presented solutions. We also analyze the main challenges faced by the research community in the smooth integration of BC and IoT, and point out the main open issues and future research directions. Last but not least, we also present a survey about novel uses of BC in the machine economy.


Sensi Journal ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 236-246
Author(s):  
Ilamsyah Ilamsyah ◽  
Yulianto Yulianto ◽  
Tri Vita Febriani

The right and appropriate system of receiving and transferring goods is needed by the company. In the process of receiving and transferring goods from the central warehouse to the branch warehouse at PDAM Tirta Kerta Raharja, Tangerang Regency, which is currently done manually is still ineffective and inaccurate because the Head of Subdivision uses receipt documents, namely PPBP and mutation of goods, namely MPPW in the form of paper as a submission media. The Head of Subdivision enters the data of receipt and mutation of goods manually and requires a relatively long time because at the time of demand for the transfer of goods the Head of Subdivision must check the inventory of goods in the central warehouse first. Therefore, it is necessary to hold a design of information systems for the receipt and transfer of goods from the central warehouse to a web-based branch warehouse that is already database so that it is more effective, efficient and accurate. With the web-based system of receiving and transferring goods that are already datatabed, it can facilitate the Head of Subdivision in inputing data on the receipt and transfer of goods and control of stock inventory so that the Sub Head of Subdivision can do it periodically to make it more effective, efficient and accurate. The method of data collection is done by observing, interviewing and studying literature from various previous studies, while the system analysis method uses the Waterfall method which aims to solve a problem and uses design methods with visual modeling that is object oriented with UML while programming using PHP and MySQL as a database.


2013 ◽  
Vol 19 (1) ◽  
pp. 28
Author(s):  
Hamda Situmorang ◽  
Manihar Situmorang

Abstract Implementation of demonstration method in the teaching of chemistry is assigned as the right strategy to improve students’ achievement as it is proved that the method can bring an abstract concept to reality in the class. The study is conducted to vocational high school students in SMKN1 Pargetteng getteng Sengkut Pakfak Barat at accademic year 2013. The teaching has been carried out three cycles on the teaching of chemistry topic of colloid system. In the study, the class is divided into two class, experiment class and control class. The demontration method is used to teach students in experimental class while the teaching in control class is conducted with lecture method. Both are evaluated by using multiple choise tests before and after the teaching procedures, and the ability of students to answer the problems are assigned as students’ achievements. The results showed that demonstration method improved students’ achievement in chemistry. The students in experimental class who are taughed with demonstration method (M=19.08±0.74) have higher achievements compare with control class (M=12.91±2.52), and both are significantly different (tcalculation 22.85 > ttable 1.66). The effectivity of demostration method in experimental class (97%) is found higer compare to conventional method in control class (91%).


2020 ◽  
Author(s):  
Isra Revenia

This article is made to know the destinantion and the administrasi functions of the school in order to assist the leader of an organazation in making decisions and doing the right thing, recording of such statements in addition to the information needs also pertains to the function of accountabilitty and control functions. Administrative administration is the activity of recording for everything that happens in the organization to be used as information for leaders. While the definition of administration is all processing activities that start from collecting (receiving), recording, processing, duplicating, minimizing and storing all the information of correspondence needed by the organization. Administration is as an activity to determine everything that happens in the organization, to be used as material for information by the leadership, which includes all activities ranging from manufacturing, managing, structuring to all the preparation of information needed by the organization.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2019 ◽  
Vol 8 (4) ◽  
pp. 9538-9542

In vision of searching for the right Unmanned Aerial System (UAS) for a specific mission, there are multiple factors to be considered by the operator such as mission, endurance, type of payload and range of the telemetry and control. This research is focusing on extending control range of the UAS by using 4G-LTE network to enable beyond-line-of-sight flying for the commercial UAS. Major UAS such Global Hawk, Predator MQ-1 are able to fly thousands of kilometers by the use of satellite communication. However, the satellite communication annual license subscription can be very expensive. With this situation in mind, a new type of flight controller with 4G-LTE communication has been developed and tested. Throughout the research, blended-wing-body (BWB) Baseline B2S is used as the platform for technology demonstrator. Result from this analysis has proven that the proposed system is capable to control a UAS from as far as United Kingdom, with a latency less than 881 ms in average. The new added capability can potentially give the commercial UAS community a new horizon to be able to control their UAS from anywhere around the world with the availability of 4G-LTE connection


Sign in / Sign up

Export Citation Format

Share Document