information confidentiality
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 16)

H-INDEX

4
(FIVE YEARS 0)

2022 ◽  
Author(s):  
Aarcha Sunil Lekshmi

Modern healthcare systems have been dominated by virtual approaches and digital technologies. This has increased the concern for the security of healthcare devices and data due to the lack of information confidentiality and data integrity in this sector. Information category at risk and the importance of patient safety make cybersecurity unique in the field of health. Regarding the context of this problem construction of cyber resilience in healthcare organizations has become a vital task. A comprehensive solution to this problem can be obtained by the combination of human behavioral changes, technological enhancements, process modifications, and new legislations and regulations.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 88-104
Author(s):  
M. Raja ◽  
Dr.S. Dhanasekaran ◽  
Dr.V. Vasudevan

Many medical companies use cloud technology to collect, distribute and transmit medical records. Given the need for medical information, confidentiality is a key issue. In this study, we propose an encrypted scheme based on encrypted data for an electronic healthcare environment. We use hybrid Attribute based encryption and Triple DES encryption technique (ABETDES) scheme, including identity-based cryptography (IBC), to ensure data privacy through communication channels և to improve the reliability of cloud computing. There are also limited indicators of light processing and storage resources. This solves a serious maintenance problem and ensures that a private key is created where it is not blind. The introduction of a security option, a comprehensive security analysis to protect ciphertext, shows that our program is effective against many known attacks and compared to existing methods.


Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1158-1167
Author(s):  
Jagadeesan S ◽  
Mani C ◽  
Sambasivam S ◽  
Jaisankar P ◽  
Sasikala S

In the brand new technology of cutting-edge technological know-how and era is advanced day via way of means of day. The information confidentiality is danger everywhere in the global and it will increase rapidly. Steganography and cryptography are very vital strategies applied in facts safety to cowl and steady mystery messages in transmitting facts. In this we launch, put in force and check a completely sole technique that can be used as a steady and extraordinarily budget friendly technique {of facts|of knowledge|} interest in addition to information extracting (Jagadeesan, S., 2020). Some efficiency parameters are going to be thru an test received and in comparison with opportunity current approaches parameters to show the efficiency of the deliberate technique. Here we proposes a brand new method to hiding the information the use of steganography strategies primarily based totally on AES and RC5 set of rules cryptosystem. The word Steganography is the splendor of hiding mystery information in the back of the photos, videos, sound and textual content to cowl the name of the game communication. Cryptosystem is the system which given our technique extra perfection. The visible first-class of the quilt photo certainly nice, nobody can consider it how personal information are transmitted the use of this technique. This suggest technique and set of rules ability is exceedingly bendy than different posted set of rules. The AES and RC5 set of rules has no more difficulty and it looks as if thoroughly to hiding the personal information.


2021 ◽  
Vol 14 (1) ◽  
Author(s):  
Jude Emmanuel Cléophat ◽  
Michel Dorval ◽  
Zaki El Haffaf ◽  
Jocelyne Chiquette ◽  
Stephanie Collins ◽  
...  

Abstract Background Data on the modalities of disclosing genomic secondary findings (SFs) remain scarce. We explore cancer patients’ and the general public’s perspectives about disclosing genomic SFs and the modalities of such disclosure. Methods Sixty-one cancer patients (n = 29) and members of the public (n = 32) participated in eight focus groups in Montreal and Quebec City, Canada. They were asked to provide their perspectives of five fictitious vignettes related to medically actionable and non-actionable SFs. Two researchers used a codification framework to conduct a thematic content analysis of the group discussion transcripts. Results Cancer patients and members of the public were open to receive genomic SFs, considering their potential clinical and personal utility. They believed that the right to know or not and share or not such findings should remain the patient’s decision. They thought that the disclosure of SFs should be made mainly in person by the prescribing clinician. Maintaining confidentiality when so requested and preventing genetic discrimination were considered essential. Conclusion Participants in this study welcomed the prospect of disclosing genomic SFs, as long as the right to choose to know or not to know is preserved. They called for the development of policies and practice guidelines that aim to protect genetic information confidentiality as well as the autonomy, physical and psychosocial wellbeing of patients and families.


2021 ◽  
Author(s):  
Jude Emmanuel Cléophat ◽  
Michel Dorval ◽  
Zaki El Haffaf ◽  
Jocelyne Chiquette ◽  
Stephanie Collins ◽  
...  

Abstract Background:Data on the modalities of disclosing genomic secondary findings (SFs) remain scarce. We explore cancer patients’ and the general public’s perspectives about disclosing genomic SFs and the modalities of such disclosure. Methods:Sixty-one cancer patients (n=29) and members of the public (n=32) participated in eight focus groups in Montreal and Quebec City, Canada. They were asked to provide their perspectives of five fictitious vignettes related to medically actionable and non-actionable SFs. A thematic analysis of the transcripts was conducted. Results:Cancer patients and members of the public were open to receive genomic SFs, considering their potential clinical and personal utility. They believed that the right to know or not and share or not such findings should remain the patient’s decision. They thought that the disclosure of SFs should be made mainly in person by the prescribing clinician. Maintaining confidentiality when so requested and preventing genetic discrimination were considered essential. Conclusion:Participants in this study welcomed the prospect of disclosing genomic SFs, as long as the right to choose to know or not to know is preserved. Policies and practice guidelines aiming to protect genetic information confidentiality, and patients’ and families’ autonomy, physical and psychosocial wellbeing are expected.


Author(s):  
Oksana Ryabchuk ◽  
Tetiana Batrak

The article dwells upon the peculiarities of the use of outsource services in the activities of audit companies. In current economic environment, it is increasingly difficult for audit companies to stay in the audit services market. Competitive environment leads to implantation of new types of services such as outsourcing services. The article is concerned with the essence of the concept of "outsourcing" and variety of its interpretations provided by foreign and domestic scientists and experts. It was revealed practically that outsourcing is the performance of certain functions of business operations by outside service, such as an audit company or an outsourcing freelancer. The aim of outsourcing using and its main types have been specified. The authors of the article have considered the options of outsourcing services for audit companies and their advantages and disadvantages. The specific benefits and negative consequences of using outsourcing services are determined in each case: for each pair of companies and each type of outsourcing. The global outsourcing market has been reviewed and main audit companies, that are the largest providers of outsourcing services, have been identified. In Ukraine, outsourcing is used mainly in the financial, HR, IT and legal sectors. However, one of the most popular sector is accounting outsourcing services. Accounting outsourcing includes services for restoration and maintenance of financial and tax records, tax optimization, compilation report. The business losses due to the COVID-19 pandemic have been assessed from the perspective of outsourcing services using. It is revealed that in terms of the coronavirus pandemic the lifeline for entrepreneurs was outsourcing of non-core functions and business processes, and that allows staying afloat, keeping profits and fully focusing the company's core business. In terms of the coronavirus pandemic, only those companies that operate in the most efficient way, reducing operating costs while maintaining the high quality of their products and services, survive and succeed. The author is convinced that outsourcing is a novel technology of managing companies’ resources in various fields, including audit activities. The advantages that encourage entrepreneurs to use outsourcing services provided by audit companies are liability for violating the rights and obligations of the parties regarding the information confidentiality, and the fact that audit companies employ highly qualified specialists.


Symmetry ◽  
2020 ◽  
Vol 12 (11) ◽  
pp. 1840
Author(s):  
Egoshin N. S. ◽  
Konev A. A. ◽  
Shelupanov A. A.

This article covers one of the fundamental problems of information security—building a threat model. The article discusses a new method for identifying typical threats to information confidentiality based on the information flow model. The threat model is based on the description of the system. An incorrect description of the system leads to the formation of an incorrect threat model. A review of the subject area revealed several approaches used to describe the system in terms of circulating information flows. Each of these approaches has its own pros and cons. The model of information flows proposed in this work reduces the description of any information system to an eight-digit alphabet. Analysis of the structure of the elementary information flow identified four typical threats to confidentiality, the Cartesian product of a set of threats and a set of streams is a complete model of typical threats to the confidentiality of information processed in cyberspace.


2020 ◽  
Vol 28 (5) ◽  
pp. 577-605
Author(s):  
Rui Liu ◽  
Jun Song ◽  
Zhiming Huang ◽  
Jianping Pan

In recent years, with the rapid development and popularization of e-commerce, the applications of e-coupons have become a market trend. As a typical bar code technique, QR codes can be well adopted in e-coupon-based payment services. However, there are many security threats to QR codes, including the QR code tempering, forgery, privacy information leakage and so on. To address these security problems for real situations, in this paper, we introduce a novel fragment coding-based approach for QR codes using the idea of visual cryptography. Then, we propose a QR code scheme with high security by combining the fragment coding with the commitment technique. Finally, an enhanced QR code-based secure e-coupon transaction framework is presented, which has a triple-verification feature and supports both online and offline scenarios. The following properties are provided: high information confidentiality, difficult to tamper with and forge, and the ability to resist against collusion attacks. Furthermore, the performance evaluation of computing and communication overhead is given to show the efficiency of the proposed framework.


Sign in / Sign up

Export Citation Format

Share Document