To see the other types of publications on this topic, follow the link: Medical Secret.

Journal articles on the topic 'Medical Secret'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Medical Secret.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhapparova, Almira. "Medical Secret." Medicne pravo 2017, no. 1 (2017): 20–26. http://dx.doi.org/10.25040/medicallaw2017.01.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Habib, Yahya Abdul, and Nyi Mas Gianti Bingah Erbiana. "Implementation of Legal Protection in the Field of Pharmacy in a Juridical Review of the Implementation of Law Number 30 of 2000 Concerning Trade Secrets." International Journal of Business, Law, and Education 6, no. 1 (2025): 277–87. https://doi.org/10.56442/ijble.v6i1.1014.

Full text
Abstract:
The protection of trade secrets in the pharmaceutical sector is very important. Various trade secret crimes in the pharmaceutical sector, such as theft of drug prescriptions and counterfeiting of medicines, continue to increase. Another impact of trade secret crimes in the pharmaceutical sector is the medical risk of counterfeiting drugs consumed by the public. However, on the one hand, victims who have trade secret rights in the pharmaceutical sector are still few to report allegations related to trade secret violations. In addition, law enforcement has not been optimal in responding to every
APA, Harvard, Vancouver, ISO, and other styles
3

Rogers, Rob. "Secret American Medical Association." Chest 144, no. 3 (2013): 731. http://dx.doi.org/10.1378/chest.144.3.731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Banagozar Mohammadi, Ali, and Maryam Vahabzadeh. "Medical Confidentiality: Legal and Ethical Challenges in Iran." International Journal of Medical Toxicology and Forensic Medicine 10, no. 1 (2020): 27024. http://dx.doi.org/10.32598/ijmtfm.v10i1.27024.

Full text
Abstract:
Being a matter of confidentiality, medical "secret" is an issue that physicians are aware of due to nature of their profession. Breach of confidentiality is defined as giving away a patient’s medical records by any means such as writing, telling, implying etc. According to law in Iran, medical confidentiality is one of the principles of medical profession and if anyone breaches it, they can be imprisoned up to one year. It is imperative that medical professionals make every effort to protect their patients’ secrets from being divulged even to their next of kin. Disclosure of patients' secret w
APA, Harvard, Vancouver, ISO, and other styles
5

Dhuha, Nur Syamsu. "TINJAUAN HUKUM KETERBUKAAN RAHASIA KEDOKTERAN DAN IDENTITAS PASIEN PADA SITUASI WABAH PANDEMI COVID-19." Jurnal Magister Hukum Perspektif 11, no. 1 (2022): 1–10. http://dx.doi.org/10.37303/magister.v11i1.48.

Full text
Abstract:
The Covid-19 pandemic is still ongoing in Indonesia. The accumulation of Covid-19 cases is still increasing even though efforts to prevent its spread have been made. The implementation of handling caused several polemics in the community, one of which was about the openness of patient data. The secret disclosure of medicine in the condition of the outbreak (including name, address, diagnosis, family history, and so on) without the patient's consent may pose a risk to the patient concerned. Patients can receive negative stigmatization or discrimination if the medical secrets are spread in the g
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Ruoying. "A review of research on secret sharing." Applied and Computational Engineering 88, no. 1 (2024): 207–13. http://dx.doi.org/10.54254/2755-2721/88/20241746.

Full text
Abstract:
This article explores the importance and challenges of secret sharing technology in the context of rapid advancements in information technology. With increasing attention on data security and privacy protection, secret sharing serves as a key cryptographic technique that ensures secure data transmission, storage, and multi-party computation by dividing secrets into multiple shares. However, existing solutions encounter performance bottlenecks when dealing with large-scale datasets, managing share updates in dynamic environments, and facing quantum computing threats. This article systematically
APA, Harvard, Vancouver, ISO, and other styles
7

Rohrer, James E. "The secret of medical management." Health Care Management Review 14, no. 3 (1989): 7–13. http://dx.doi.org/10.1097/00004010-198901430-00002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rohrer, James E. "The secret of medical management." Health Care Management Review 14, no. 3 (1989): 7–14. http://dx.doi.org/10.1097/00004010-198922000-00002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Demon, Paul F. "‘Medical records... secret or not’." Nursing Standard 4, no. 1 (1989): 47. http://dx.doi.org/10.7748/ns.4.1.47.s50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Jun, and Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme." Applied Mechanics and Materials 411-414 (September 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.

Full text
Abstract:
The Internet of things is widespread concerned by the whole society now. As an important component of the Internet of things, wireless sensor network has wide application prospect in various fields such as medical and health, military defense. The traditional data privacy protection technology of PKI system used in the WSN networks has its own weakness. This paper presents the secret key sharing mechanism to protect data privacy. The secret key, remote node and base station used to communicate, was divided into multiple secrets. The multiple secrets were distributed in the nodes which connect
APA, Harvard, Vancouver, ISO, and other styles
11

ZIEGLER, JOHN M. "The Secret." Pediatrics 84, no. 6 (1989): 1108–9. http://dx.doi.org/10.1542/peds.84.6.1108.

Full text
Abstract:
On Mother's Day 1975, just as I returned home from my second year in college, my mother told me that she was scheduled to have a lump removed from her breast and that it was thought likely to be cancerous. I told her I loved her, and we hugged each other. The biology major understood the implications and potential outcomes. The sensitive son felt a vague sense of uneasiness. The mass was indeed malignant, and a modified radical mastectomy was performed. All node biopsies were negative. After a 2½-year disease-free interval, and now widowed, she saw an internist for an unrelated problem. The fr
APA, Harvard, Vancouver, ISO, and other styles
12

Denić, Dragana. "Medical Secret as a Basis of Medical Confidence in Relation Doctor-Patient – a View from Healthcare System of the Republic of Serbia." JAHR 9, no. 2 (2018): 205–22. http://dx.doi.org/10.21860/j.9.2.4.

Full text
Abstract:
The medical secret is one of the foundations of medical ethics and medical employees’ moral obligations, and it refers to the principle of not disclosing confidential information about the patient. Hippocrates considered the obligation to keep a medical secret to be the “sacred duty” of a physician. The medical secret was initially cultivated as ‘the know-how to remain silent’ (ars muta), while in the 18th century it becomes a legal duty that would be sanctioned according to the criminal law. Divulging a medical secret could thus lead to a criminal conviction, the obligation of compensation, a
APA, Harvard, Vancouver, ISO, and other styles
13

Ronaldo, David, and Sudaryat Sudaryat. "Customer List Protection in Avoiding Unfair Business Competition Based on Law Number 30 of 2000 concerning Trade Secrets and Law Number 5 of 1999 concerning Prohibition of Monopoly Practices and Unfair Business Competition." Jurnal Indonesia Sosial Sains 4, no. 03 (2023): 219–28. http://dx.doi.org/10.59141/jiss.v4i03.793.

Full text
Abstract:
Trade secrets are part of intellectual property, because the information contains economic value, however, the Trade Secret Act does not specifically state what can be classified as information with economic value, such as customer lists. Customer lists can be classified as information that can be protected by trade secret laws in Indonesia. Therefore, legal efforts are needed to protect this confidential information from acts of violation that can lead to unfair business competition
APA, Harvard, Vancouver, ISO, and other styles
14

Slipchenko, Tetiana. "Medical secret – legal basis of protection." Aktual’ni problemi pravoznavstva 1, no. 2 (2021): 91–96. http://dx.doi.org/10.35774/app2021.02.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cote, Deborah. "America's Secret Pandemic: Preventable Medical Errors." AORN Journal 93, no. 4 (2011): 512. http://dx.doi.org/10.1016/j.aorn.2010.12.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mishra, Badrinarayan. "Secret to Success in Medical Research: A Concise Directive." Journal of Advanced Research in Medical Science & Technology 07, no. 04 (2020): 8–12. http://dx.doi.org/10.24321/2394.6539.202016.

Full text
Abstract:
Starting from philosophy to medicine - research is the fundament to their growth and enrichment. Over the years varied disciplines have not only contributed to the development of research as a speciality but also to the jargons that surround it. This article focuses on finetuning medical research under ten sections/ commandments and the way to achieve core competency using accepted abbreviations and acronyms applicable trans domain so that it becomes users friendly. They are the SMARTER guideline, FINER criteria and PICOTS format along with variants.
APA, Harvard, Vancouver, ISO, and other styles
17

Szantiło, Emilia. "Tajna działalność Wydziału Lekarskiego Uniwersytetu Warszawskiego w latach 1939–1945." Kwartalnik Pedagogiczny 62 (October 16, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.5304.

Full text
Abstract:
During the Second World War Nazi occupying forces closed down the University of Warsaw and other Polish academies. Secondary and higher level education was forbidden. In spite of interdictions and death penalty threat many professors were teaching in private apartments. That activity created a structure of secret studies, which became part of the Polish resistance. The Medical Faculty was the most active department of the University of Warsaw. Many young people wanted to start or continue medical studies, therefore the Medical Faculty Council decided to establish a secret two-year Medical Coll
APA, Harvard, Vancouver, ISO, and other styles
18

Tjatur Raharso, Alphonsus, and Antonius Barak. "Marriage in Secret According to Islam and Catholic: A Comparative Study on Religious Laws." Religió Jurnal Studi Agama-agama 12, no. 2 (2022): 145–69. http://dx.doi.org/10.15642/religio.v12i2.1817.

Full text
Abstract:
This article discusses secret marriage from another perspective, namely in the form of a comparative study of religious law between Islam and Catholicism. This research aims to find similarities and differences between the two religions in assessing and regulating secret marriages. This study found that both religions recognize secret marriage as an uncommon and not ideal marriage. Both religions see the disadvantages and harms of secret marriage. This study found some key differences. In Islam, sirri marriage is not created by religious doctrine, but are practices carried out by several peopl
APA, Harvard, Vancouver, ISO, and other styles
19

Abdulkadhim Hameedi, Balsam, Muna Majeed Laftah, and Anwar Abbas Hattab. "Data Hiding in 3D-Medical Image." International Journal of Online and Biomedical Engineering (iJOE) 18, no. 03 (2022): 72–88. http://dx.doi.org/10.3991/ijoe.v18i03.28007.

Full text
Abstract:
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet T
APA, Harvard, Vancouver, ISO, and other styles
20

Jo, Dongsik, and Jin-Ho Chung. "Design and Application of Secret Codes for Learning Medical Data." Applied Sciences 12, no. 3 (2022): 1709. http://dx.doi.org/10.3390/app12031709.

Full text
Abstract:
In distributed learning for data requiring privacy preservation, such as medical data, the distribution of secret information is an important problem. In this paper, we propose a framework for secret codes in application to distributed systems. Then, we provide new methods to construct such codes using the synthesis or decomposition of previously known minimal codes. The numerical results show that new constructions can generate codes with more flexible parameters than original constructions in the sense of the number of possible weights and the range of weights. Thus, the secret codes from ne
APA, Harvard, Vancouver, ISO, and other styles
21

Bennett, Rita. "The secret of successful treatment: medical histories." Dental Nursing 2, no. 1 (2006): 43–44. http://dx.doi.org/10.12968/denn.2006.2.1.29788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dichko, H. O., O. H. Aleksieiev, M. A. Anishchenko, and L. S. Hamburh. "MEDICAL SECRET AND CASES OF MEDICAL INFORMATION LEGAL DISCLOSURE CHARACTERISTIC." Comparative-analytical law 3 (2019): 126–30. http://dx.doi.org/10.32782/2524-0390/2019.3.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Poduzova, E. B. "Protection of Information Constituting the Medical Secret in the Field of Application of «Artificial Intelligence» Technologies in Digital Medicine." Actual Problems of Russian Law 18, no. 6 (2022): 68–74. http://dx.doi.org/10.17803/1994-1471.2023.151.6.068-074.

Full text
Abstract:
Artificial intelligence technologies have found wide application in digital medicine, in particular, they are used to process information that makes up the medical secrecy of patients. This information refers to the big data information element. One of the key problems of the application of the legislation on medical secrecy is the problem of legality of disclosure of the confidential information. Thus, judicial practice ambiguously interprets the procedure for posthumous disclosure of medical secrets to certain categories of persons. There is no uniform approach to determining the minimum age
APA, Harvard, Vancouver, ISO, and other styles
24

Ma, Bin, Bing Li, Xiao-Yu Wang, Chun-Peng Wang, Jian Li, and Yun-Qing Shi. "Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image." Security and Communication Networks 2019 (January 17, 2019): 1–9. http://dx.doi.org/10.1155/2019/4732632.

Full text
Abstract:
In this paper, a new reversible data hiding (RDH) scheme based on Code Division Multiplexing (CDM) and machine learning algorithms for medical image is proposed. The original medical image is firstly converted into frequency domain with integer-to-integer wavelet transform (IWT) algorithm, and then the secret data are embedded into the medium frequency subbands of medical image robustly with CDM and machine learning algorithms. According to the orthogonality of different spreading sequences employed in CDM algorithm, the secret data are embedded repeatedly, most of the elements of spreading se
APA, Harvard, Vancouver, ISO, and other styles
25

Berte, Lucia M. "The Secret Ingredient." Laboratory Medicine 39, no. 11 (2008): 655. http://dx.doi.org/10.1309/lmr8r3sv3lcwwxhi.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cook, Constance A. "The Tricks of Jing (Jing jue 荆決): The Beginnings of jue 決/訣 as an Epistemic Genre". International Journal of Divination and Prognostication 5, № 2 (2024): 163–87. http://dx.doi.org/10.1163/25899201-bja10015.

Full text
Abstract:
Abstract The Chinese genre of text named jue 訣 dates back to the Han dynasty. It encompassed esoteric Daoist manuals and medical handbooks, translated as “tricks,” “methods,” “instructions,” “secret instructions,” and “rhymes.” This essay translates “tricks” and “secrets” for its early use, referring to “writings” (shu 書) linked to privately transmitted technical information, such as divination tricks, alchemical techniques, or medical recipes. Initially, these writings relied on oral instructions and implicit knowledge (“orally transmitted secrets,” koujue 口訣). By the medieval period, as seen
APA, Harvard, Vancouver, ISO, and other styles
27

JUNG, Chaho, and Eunji LEE. "Protection of Medical Method Inventions as Trade Secret." Journal of Intellectual Property 8, no. 1 (2013): 71–97. http://dx.doi.org/10.34122/jip.2013.03.8.1.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

KODAMA, Hironori. "Medical Errors Would Love to Live in Secret." Journal of the Institute of Electrical Engineers of Japan 135, no. 9 (2015): 607. http://dx.doi.org/10.1541/ieejjournal.135.607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dyer, Owen. "Southall faces further hearing—on secret medical records." BMJ 333, no. 7573 (2006): 822.2. http://dx.doi.org/10.1136/bmj.333.7573.822-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Serebryakov, A. A. "ADMISSIBILITY OF PROVIDING INFORMATION CONSTITUTING MEDICAL CONFIDENTIALITY IN THE PUBLIC INTEREST." Russian-Asian Legal Journal, no. 1 (April 18, 2020): 28–32. http://dx.doi.org/10.14258/ralj(2020)1.7.

Full text
Abstract:
The article is devoted to this type of confidential information about a citizen, as information constitutinga medical secret. The legal regime of medical confidentiality is considered in the context of its relationshipwith personal secrecy and the right to privacy. The author concludes that initially information about thehealth of a citizen is protected under the regime of personal secrets. Herewith, the regime of medicalconfidentiality is called upon to provide additional guarantees to ensure the citizen’s right to confidentialinformation regarding his health. It has been established that res
APA, Harvard, Vancouver, ISO, and other styles
31

Narmatha, C., P. Manimegalai, and S. Manimurugan. "A Grayscale Image Hiding Encode Scheme for Secure Transmission." Current Signal Transduction Therapy 14, no. 2 (2019): 146–51. http://dx.doi.org/10.2174/1574362413666180802124040.

Full text
Abstract:
Background: To transmit the secret data are in a secure manner or to prevent the intruder/ third party activities while transmitting secret data’s through the public networks are challenging task now. In order to deal with these situations, this paper presents an encryption/encoding technique of MSI (Modified Steganography for Image) for secret data before transmitting over the network. Methods: The MSI technique is classified into two phases, one is stegano image creation by encode process and another one is reconstructing the secret data from the stegano image by decode process. In encode pr
APA, Harvard, Vancouver, ISO, and other styles
32

Bauer, Joan. "Is it really a secret?" Journal of PeriAnesthesia Nursing 12, no. 1 (1997): 67–68. http://dx.doi.org/10.1016/s1089-9472(97)80075-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.

Full text
Abstract:
Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has le
APA, Harvard, Vancouver, ISO, and other styles
34

Das, Subhajit, and Manas Kumar Sanyal. "A Hyper-chaotic Medical Image Encryption with Optimized Key Value." International Journal of Intelligent Systems and Applications 16, no. 3 (2024): 18–34. http://dx.doi.org/10.5815/ijisa.2024.03.02.

Full text
Abstract:
This article delves into a medical image encryption/decryption method based on hyper chaotic dynamics and genetic algorithms. The proposed algorithm boasts simplicity in implementation, featuring straightforward operations that render it well-suited for real-time applications while elevating its security measures. Leveraging the sensitivity of chaotic behaviour to initial conditions, a genetic algorithm is employed to select optimal initial conditions for the 5D multi-wing hyper-chaotic system. Initially, a secret key generation method based on the input image is applied, followed by stages of
APA, Harvard, Vancouver, ISO, and other styles
35

Ganzha, Natal'ya V., and Yekaterina V. Varentsova. "The secrecy of adoption: problems and ways to improve." Vestnik of Kostroma State University, no. 4 (2019): 175–79. http://dx.doi.org/10.34216/1998-0817-2019-25-4-175-179.

Full text
Abstract:
The article deals with the problems of legal regulation of the Institute of secrecy of adoption in the development of information space and medical and genetic aspects. The authors give a generalised description of modern scientific approaches to the relationship of the concepts of family secret, personal secret, secret of adoption from the point of view of various branches of law. The ways of improving the rules on the secrecy of adoption in Russia are suggested.
APA, Harvard, Vancouver, ISO, and other styles
36

Jain, Jaishree, and Arpit Jain. "Securing E-Healthcare Images Using an Efficient Image Encryption Model." Scientific Programming 2022 (March 8, 2022): 1–11. http://dx.doi.org/10.1155/2022/6438331.

Full text
Abstract:
With the advancements in e-healthcare services, it is possible to provide remote medical services to patients and swifter first aid. Medical images play an essential role in e-healthcare applications for providing quick and better remote diagnosis and treatment to patients. Medical images generally comprise secret details about the patients and are therefore prone to various security threats during their transmission over public networks. Thus, it is required to secure these images prior to their communication over public networks. But due to distinctive properties of medical images, like high
APA, Harvard, Vancouver, ISO, and other styles
37

Dyer, Clare. "Murderer loses attempt to keep his medical records secret." BMJ 333, no. 7560 (2006): 167.1. http://dx.doi.org/10.1136/bmj.333.7560.167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kanso, A., and M. Ghebleh. "An efficient lossless secret sharing scheme for medical images." Journal of Visual Communication and Image Representation 56 (October 2018): 245–55. http://dx.doi.org/10.1016/j.jvcir.2018.09.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chhabra, Sahil, Neeraj Kumar Jain, and Vipin Tomar. "PVO-Based Multiple Message Segment Reversible Data Hiding." International Journal of Distributed Artificial Intelligence 11, no. 1 (2019): 25–33. http://dx.doi.org/10.4018/ijdai.2019010103.

Full text
Abstract:
In this article, a reversible data hiding technique is proposed to embed multiple segments of a single message into a single cover image. This multiple message segment technique uses a pixel value ordering approach to embed the secret message. The splitting and randomization of the original secret message provides security from an attacker There are many digital formats for data hiding, like images, audio, and video, of which the digital image is the simplest format. Data hiding in image processing refers to inserting the secret message into digital images. Reversible data hiding (RDH) is a lo
APA, Harvard, Vancouver, ISO, and other styles
40

Konyar, Mehmet Zeki, and Sıtkı Öztürk. "Reed Solomon Coding-Based Medical Image Data Hiding Method against Salt and Pepper Noise." Symmetry 12, no. 6 (2020): 899. http://dx.doi.org/10.3390/sym12060899.

Full text
Abstract:
Medical data hiding is used to hide patient information inside medical images to protect patient privacy. Patient information in the image should be protected when sending medical images to other specialists or hospitals over the communication network. However, the images are exposed to various unwanted disruptive signals in the communication channel. One of these signals is salt and pepper noise. A pixel exposed to salt and pepper noise becomes completely black or completely white. In pixel-based data hiding methods, it is not possible to extract the secret message in the pixel exposed to thi
APA, Harvard, Vancouver, ISO, and other styles
41

Feldman, Robin. "Trade Secrets in Biologic Medicine." Science and Technology Law Review 24, no. 1 (2023): 1–54. http://dx.doi.org/10.52214/stlr.v24i1.10455.

Full text
Abstract:
Can something be both open and secret? That is the conundrum facing society as trade secret rights chafe against patent rights in cutting-edge, biologic medicine. The conflict is unsurprising. Trade secret has emerged as a relatively late bloomer among the family of intellectual property rights and only recently has begun to establish the boundaries of its own space, a process in which it will inevitably knock against other intellectual property doctrines already occupying their own domains. Nor is it surprising that the clash would arise in a fast-moving area of medical science. From insulin
APA, Harvard, Vancouver, ISO, and other styles
42

Shevchuk, Oleksandr, Mykola Kucheryavenko, Svitlana Davydenko, and Oleksandra Babaieva. "Implementation of the patient's right to obtain information in the concept “health and human rights”." Revista Amazonia Investiga 9, no. 29 (2020): 288–96. http://dx.doi.org/10.34069/ai/2020.29.05.33.

Full text
Abstract:
The article explores the features of legal regulation of patient’s right to access information in the medical activity field. The reasons for violation of saving of information about patient’s health are the lack of knowledge of law and no understanding the harm that caused if patient’s confidentiality is violated. The analysis of medical confidentiality content, lawful disclosure cases, the conditions and procedure for its legal support. Subjects who received information constituting a medical secret don`t have right to disclose it, legal liability is provided for such norms violation. The me
APA, Harvard, Vancouver, ISO, and other styles
43

Olayiwola, Adedayo, John Oladosu, Christopher Oyeleye, and Oluwaseun Alade. "A Two-Level Security Layer for Medical Data." FUOYE Journal of Engineering and Technology 9, no. 1 (2024): 38–42. http://dx.doi.org/10.4314/fuoyejet.v9i1.6.

Full text
Abstract:
Implementing a two-level security approach comprising cryptography and steganography in Electronic Health Record (EHR) systems ensures comprehensive protection of sensitive patient information. Cryptography encryption methods alone may not provide adequate protection, as they can be susceptible to attacks and also, steganography, has the visual quality issues after embedding. The combination of RSA cryptography and DWT steganography will offers a comprehensive solution for securing medical data, ensuring confidentiality, integrity, and compliance with privacy regulations, while DWT steganograp
APA, Harvard, Vancouver, ISO, and other styles
44

Nalini Bodasingi, Et al. "Applications of Difital Image Stegnographic Techniques in Medical Image Analysis." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 596–604. http://dx.doi.org/10.17762/ijritcc.v11i9.8849.

Full text
Abstract:
In this digitized world maintaining the security of the secret information is a challenging task. While, sending secret information through the internet draws the attention of hackers. The highly authenticated information can be hidden by using Steganography. Image processing plays a very important role in such stenographic techniques. The advantage of stenography can be enhanced to medical images and creation of database for a particular patient under one authentication with security. Steganography techniques used in bio-medical field to hide the person medical data like prescription, X-ray,
APA, Harvard, Vancouver, ISO, and other styles
45

Staberg, Jakob. "Irmas injektioner." Tidskrift för litteraturvetenskap 43, no. 3-4 (2013): 91–105. http://dx.doi.org/10.54797/tfl.v43i3-4.10810.

Full text
Abstract:
Irma’s Injections. Psychiatric Power and Female Resistance in Patriarchal Wienna 1900
 Die Traumdeutung (1900) contains the first dream that Sigmund Freud devoted a full analysis to, using the new method of dream interpretation. In the psychoanalytic tradition it is known as the dream of Irma’s injections. In this article I propose a reading of the dream as a vignette from the turn of the century medical environment characterized by a patriarchal order, that is expressed through the relationship between a female patient and male physicians. Freud presents the dream as containing a secret,
APA, Harvard, Vancouver, ISO, and other styles
46

Marakumbi, Prakash, and Satish Bhairannawar. "Efficient reconfigurable architecture to enhance medical image security." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 3 (2023): 1516. http://dx.doi.org/10.11591/ijeecs.v30.i3.pp1516-1524.

Full text
Abstract:
Medical images are one of the most critical and sensitive types of data in information systems. For the secure storage and transfer of medical images, confidentiality is the most important aspect. This paper presents efficient embedding technique to enhance medical image security. The Gaussian filters are used as preprocessing to remove high frequency components and then applied to cumulative distribution function (CDF) 5/3 wavelet to obtain LL band features. Similarly, the LL band features of cover image are obtained. The alpha bending technique combines both the LL band features of cover and
APA, Harvard, Vancouver, ISO, and other styles
47

Prakash, Marakumbi, and Bhairannawar Satish. "Efficient reconfigurable architecture to enhance medical image security." Efficient reconfigurable architecture to enhance medical image security 30, no. 3 (2023): 1516–24. https://doi.org/10.11591/ijeecs.v30.i3.pp1516-1524.

Full text
Abstract:
Medical images are one of the most critical and sensitive types of data in information systems. For the secure storage and transfer of medical images, confidentiality is the most important aspect. This paper presents efficient embedding technique to enhance medical image security. The Gaussian filters are used as preprocessing to remove high frequency components and then applied to cumulative distribution function (CDF) 5/3 wavelet to obtain LL band features. Similarly, the LL band features of cover image are obtained. The alpha bending technique combines both the LL band features of cover and
APA, Harvard, Vancouver, ISO, and other styles
48

Responsibility. "The Open Secret: Torture and the Medical Profession in Chile." Human Rights Quarterly 10, no. 4 (1988): 562. http://dx.doi.org/10.2307/761925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Downing, L. "The Secret Vice: Masturbation in Victorian Fiction and Medical Culture." Social History of Medicine 22, no. 3 (2009): 639–40. http://dx.doi.org/10.1093/shm/hkp079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Downing, Laura. "Human Medical Experimentation: From Smallpox Vaccines to Secret Government Programs." Reference Reviews 32, no. 1 (2018): 19–20. http://dx.doi.org/10.1108/rr-07-2017-0171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!