Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Justice, Emuoyibofarhe"'
Publikováno v:
CISDI 3:3 9-18
The process of electronic approach to writing and sending medical prescription promises to improve patient safety, health outcomes, maintaining patients privacy, promoting clinician acceptance and prescription security when compared with the customar
Externí odkaz:
http://arxiv.org/abs/1503.08158
Autor:
Justice Emuoyibofarhe, Daniel Ajisafe
Publikováno v:
International Journal of Information Engineering and Electronic Business. 12:21-27
Publikováno v:
Engineering, Technology & Applied Science Research, Vol 9, Iss 5 (2019)
The Picture Archiving and Communication System (PACS) used in electronic health, is computationally enhanced by the migration into the cloud, which reduces the cost of storage space and equipment. However, cloud-PACS technology is susceptible to thre
Publikováno v:
Journal of Advances in Mathematics and Computer Science. 29:1-15
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030691424
ICTA
ICTA
Security is an important aspect of technology and it requires continuous attention, but the user agent plays a crucial role in cyber risks that sensitive data are exposed to. Users’ mistakes and nonchalant behavior have been found to be responsible
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::88c60d4944c343866de62b3adb5a484e
https://doi.org/10.1007/978-3-030-69143-1_31
https://doi.org/10.1007/978-3-030-69143-1_31
Publikováno v:
Journal of Applied Security Research. 12:463-477
Patients want the assurance that the confidentiality of their records accessed through Electronic Health Records (EHR) are safe. With increasing implementation of EHR for health care, privacy conce...
Publikováno v:
Journal of Applied Security Research. 12:447-461
Drug prescription is among the health care process that usually makes references to the patients’ medical and insurance information among other personal data, because this information is very vital and delicate, it should be adequately protected fr
Publikováno v:
Journal of Applied Security Research. 10:543-557
Cryptographic keys used in encryption algorithms face the disadvantages of difficulty in key management especially when it comes to keys generation, sharing, and storage. In this article, using gray level co-occurrence matrix, a textured image is par
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0764b43cfb744e1cff1b76175a90f153
http://arxiv.org/abs/1708.01643
http://arxiv.org/abs/1708.01643
Publikováno v:
International Journal of Online and Biomedical Engineering, Vol 15, Iss 08, Pp 91-107 (2019)
Electronic health is one of the most popular applications of information and communication technologies and it has contributed immensely to health delivery through the provision of quality health service and ubiquitous access at a lower cost. Even th