To see the other types of publications on this topic, follow the link: Privacy-Enhancing Technology.

Journal articles on the topic 'Privacy-Enhancing Technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privacy-Enhancing Technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wolfe, Henry B. "Privacy enhancing technology." Computer Fraud & Security 1997, no. 10 (October 1997): 11–15. http://dx.doi.org/10.1016/s1361-3723(97)89951-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pelkola, David. "A Framework for Managing Privacy-Enhancing Technology." IEEE Software 29, no. 3 (May 2012): 45–49. http://dx.doi.org/10.1109/ms.2012.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Javed, Ibrahim Tariq, Fares Alharbi, Tiziana Margaria, Noel Crespi, and Kashif Naseer Qureshi. "PETchain: A Blockchain-Based Privacy Enhancing Technology." IEEE Access 9 (2021): 41129–43. http://dx.doi.org/10.1109/access.2021.3064896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Hsiao-Ying, and Masooda Bashir. "The onion router: Understanding a privacy enhancing technology community." Proceedings of the Association for Information Science and Technology 53, no. 1 (2016): 1–10. http://dx.doi.org/10.1002/pra2.2016.14505301034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kosta, Eleni, Jan Zibuschka, Tobias Scherner, and Jos Dumortier. "Legal considerations on privacy-enhancing Location Based Services using PRIME technology." Computer Law & Security Review 24, no. 2 (January 2008): 139–46. http://dx.doi.org/10.1016/j.clsr.2008.01.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Namara, Moses, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. "Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 83–102. http://dx.doi.org/10.2478/popets-2020-0006.

Full text
Abstract:
AbstractVirtual Private Networks (VPNs) can help people protect their privacy. Despite this, VPNs are not widely used among the public. In this survey study about the adoption and usage of VPNs, we investigate people’s motivation to use VPNs and the barriers they encounter in adopting them. Using data from 90 technologically savvy participants, we find that while nearly all (98%; 88) of the participants have knowledge about what VPNs are, less than half (42%; 37) have ever used VPNs primarily as a privacy-enhancing technology. Of these, 18% (7) abandoned using VPNs while 81% (30) continue to use them to protect their privacy online. In a qualitative analysis of survey responses, we find that people who adopt and continue to use VPNs for privacy purposes are primarily motivated by emotional considerations, including the strong desire to protect their privacy online, wide fear of surveillance and data tracking not only from Internet service providers (ISPs) but also governments and Internet corporations such as Facebook and Google. In contrast, people who are mainly motivated by practical considerations are more likely to abandon VPNs, especially once their practical need no longer exists. These people cite their access to alternative technologies and the effort required to use a VPN as reasons for abandonment. We discuss implications of these findings and provide suggestions on how to maximize adoption of privacy-enhancing technologies such as VPNs, focusing on how to align them with people’s interests and privacy risk evaluation.
APA, Harvard, Vancouver, ISO, and other styles
7

Peltsverger, Svetlana, and Guangzhi Zheng. "Enhancing Privacy Education with a Technical Emphasis in IT Curriculum." Journal of Information Technology Education: Innovations in Practice 15 (2016): 001–17. http://dx.doi.org/10.28945/2330.

Full text
Abstract:
The paper describes the development of four learning modules that focus on technical details of how a person’s privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning modules raised students’ awareness of potential breaches of privacy as a user as well as a developer. The demonstration of a privacy breach in action helped students to design, configure, and implement technical solutions to prevent privacy violations. The assessment results demonstrate the strength of the technical approach.
APA, Harvard, Vancouver, ISO, and other styles
8

Furnell, Steven, Rossouw von Solms, and Andy Phippen. "Preventative Actions for Enhancing Online Protection and Privacy." International Journal of Information Technologies and Systems Approach 4, no. 2 (July 2011): 1–11. http://dx.doi.org/10.4018/jitsa.2011070101.

Full text
Abstract:
Many citizens rely upon online services, and it is certain that this reliance will increase in the future. However, they frequently lack a solid appreciation of the related safety and security issues, and can be missing out on an essential aspect of awareness in everyday life. Indeed, users are often concerned about online threats, but it would be stretching the point to claim that they are fully aware of the problems. Thus, rather than actually protecting themselves, many will simply accept that they are taking a risk. This paper examines the problem of establishing end-user eSafety awareness, and proposes means by which related issues can be investigated and addressed. Recognising that long-term attitudes and practices will be shaped by early experiences with the technology, it is particularly important to address the issue early and improve awareness amongst young people. However, the problem is unlikely to be addressed via the approaches that would traditionally be applied with adult users. As such, the paper examines information gathering and awareness-raising strategies drawing from qualitative methodologies in the social sciences, whose pluralistic approach can be effectively applied within school contexts.
APA, Harvard, Vancouver, ISO, and other styles
9

Lahlou, Saadi. "Identity, social status, privacy and face-keeping in digital society." Social Science Information 47, no. 3 (September 2008): 299–330. http://dx.doi.org/10.1177/0539018408092575.

Full text
Abstract:
Digitization of society raises concerns about privacy. This article first describes privacy threats of life-logging. It gives the technically novice reader a quick overview of what information and communication technology (ICT) is currently preparing for society, based on state-of-the art research in the industry laboratories: ubiquitous computing, aware environments, the Internet of Things, and so on. We explain how geolocation systems work and how they can provide detailed accounts of personal activity that will deeply affect privacy. At present, system designers rarely implement privacy-enhancing technologies — we explain why, based on empirical research. On the other hand, users, while expressing concern, do not protect themselves in practice — we list reasons for this. The problem is complex because the very nature of identity and social relations works against protecting personal data; this is the privacy dilemma. At least two key mechanisms in the production of good interaction and in the construction of social status are based on personal data disclosure. Then we discuss the nature of privacy, based on field observation. Privacy loss can be seen as `losing face'. We detail this notion, based on a discussion of the notion of face, and especially the Asian social construct of `Chemyon'. We then propose a new, positive, definition of privacy as `keeping face'. This positive notion can be used to build constructive guidelines for enhancing privacy in systems design, compatible with the way designers perceive their role. These guidelines are presented in an annex, after a short conclusion that advocates a constructive — perhaps risky — role for social science in the construction of future information and communication technology. 1
APA, Harvard, Vancouver, ISO, and other styles
10

Perez, Alfredo, Sherali Zeadally, Luis Matos Garcia, Jaouad Mouloud, and Scott Griffith. "FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of Things." Electronics 7, no. 12 (December 3, 2018): 379. http://dx.doi.org/10.3390/electronics7120379.

Full text
Abstract:
Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the bystanders’ trust in these systems to protect his/her facial privacy. To address these limitations, we propose FacePET (Facial Privacy Enhancing Technology), a wearable system worn by bystanders and designed to enhance facial privacy. We present the design, implementation, and evaluation of the FacePET and discuss some open research issues.
APA, Harvard, Vancouver, ISO, and other styles
11

Claerhout, B., and G. J. E. De Moor. "Privacy Protection for HealthGrid Applications." Methods of Information in Medicine 44, no. 02 (2005): 140–43. http://dx.doi.org/10.1055/s-0038-1633934.

Full text
Abstract:
Summary Objectives: This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Methods: Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. Results: While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Conclusion: Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.
APA, Harvard, Vancouver, ISO, and other styles
12

Tyan, Inessa, Mariemma I. Yagüe, and Antonio Guevara-Plaza. "Blockchain Technology for Smart Tourism Destinations." Sustainability 12, no. 22 (November 21, 2020): 9715. http://dx.doi.org/10.3390/su12229715.

Full text
Abstract:
This conceptual paper discusses the potential of blockchain technology for Smart Tourism Destinations. The main focus is placed on Smart Tourism Destinations’ four major goals that can be achieved by using blockchain technology, namely: enhancing tourism experience, rewarding sustainable behaviour, ensuring benefits for local communities, and reducing privacy concerns. The paper also outlines the major challenges that need to be overcome to successfully implement this innovative technology. This paper attempts to further advance the current knowledge about the possible implications of blockchain technology within the smart tourism domain, and especially Smart Tourism Destinations.
APA, Harvard, Vancouver, ISO, and other styles
13

Sher, Ming-Ling, Paul C. Talley, Ching-Wen Yang, and Kuang-Ming Kuo. "Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 54 (January 1, 2017): 004695801771175. http://dx.doi.org/10.1177/0046958017711759.

Full text
Abstract:
The employment of Electronic Medical Records is expected to better enhance health care quality and to relieve increased financial pressure. Electronic Medical Records are, however, potentially vulnerable to security breaches that may result in a rise of patients’ privacy concerns. The purpose of our study was to explore the factors that motivate hospital information technology staff’s compliance with Electronic Medical Records privacy policy from the theoretical lenses of protection motivation theory and the theory of reasoned action. The study collected data using survey methodology. A total of 310 responses from information technology staff of 7 medical centers in Taiwan was analyzed using the Structural Equation Modeling technique. The results revealed that perceived vulnerability and perceived severity of threats from Electronic Medical Records breaches may be used to predict the information technology staff’s fear arousal level. And factors including fear arousal, response efficacy, self-efficacy, and subjective norm, in their turn, significantly predicted IT staff’s behavioral intention to comply with privacy policy. Response cost was not found to have any relationship with behavioral intention. Based on the findings, we suggest that hospitals could plan and design effective strategies such as initiating privacy-protection awareness and skills training programs to improve information technology staff member’s adherence to privacy policy. Furthermore, enhancing the privacy-protection climate in hospitals is also a viable means to the end. Further practical and research implications are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
14

Perkins, David B., and Tomas C. Mijares. "Right to Privacy Issues in the Context of Crisis Negotiations and Sensory Enhancing Technology." Journal of Police Crisis Negotiations 4, no. 1 (February 23, 2004): 111–14. http://dx.doi.org/10.1300/j173v04n01_08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Li, Yifang, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. "Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos." Proceedings of the ACM on Human-Computer Interaction 1, CSCW (December 6, 2017): 1–24. http://dx.doi.org/10.1145/3134702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Luo, Huiwen, Haoming Zhang, Shigong Long, and Yi Lin. "Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability." Multimedia Tools and Applications 80, no. 14 (March 20, 2021): 21823–41. http://dx.doi.org/10.1007/s11042-021-10789-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Yifang, Nishant Vishwamitra, Hongxin Hu, Bart P. Knijnenburg, and Kelly Caine. "Effectiveness and Users’ Experience of Face Blurring as a Privacy Protection for Sharing Photos via Online Social Networks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 803–7. http://dx.doi.org/10.1177/1541931213601694.

Full text
Abstract:
Photo sharing on online social networks (OSNs) can cause privacy issues. Face blurring is one strategy to increase privacy while still allowing users to share photos. To explore the potential blurring has as a privacy-enhancing technology for OSN photos, we conducted an online experiment with 47 participants to evaluate the effectiveness of face blurring compared to the original photo (as-is), and users’ experience (satisfaction, information sufficiency, enjoyment, social presence, and filter likeability). Users’ experience ratings for face blurring were positive, indicating blurring may be an acceptable way to modify photos from the users’ perspective. However, from a privacy-enhancement perspective, while face blurring may be useful in some situations, such as those where the person in the photo is unknown to the viewer, in other cases, such as in an OSN where the person in the image is known to the viewer, face blurring does not provide privacy protection.
APA, Harvard, Vancouver, ISO, and other styles
18

Barr, Neil G., Glen E. Randall, Norman P. Archer, and David M. Musson. "Physician communication via Internet-enabled technology: A systematic review." Health Informatics Journal 25, no. 3 (October 9, 2017): 919–34. http://dx.doi.org/10.1177/1460458217733122.

Full text
Abstract:
The use of Internet-enabled technology (information and communication technology such as smartphone applications) may enrich information exchange among providers and, consequently, improve health care delivery. The purpose of this systematic review was to gain a greater understanding of the role that Internet-enabled technology plays in enhancing communication among physicians. Studies were identified through a search in three electronic platforms: the Association for Computing Machinery Digital Library, ProQuest, and Web of Science. The search identified 5140 articles; of these, 21 met all inclusion criteria. In general, physicians were satisfied with Internet-enabled technology, but consensus was lacking regarding whether Internet-enabled technology improved efficiency or made a difference to clinical decision-making. Internet-enabled technology can play an important role in enhancing communication among physicians, but the extent of that benefit is influenced by (1) the impact of Internet-enabled technology on existing work practices, (2) the availability of adequate resources, and (3) the nature of institutional elements, such as privacy legislation.
APA, Harvard, Vancouver, ISO, and other styles
19

Harborth, David, Sebastian Pape, and Kai Rannenberg. "Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 111–28. http://dx.doi.org/10.2478/popets-2020-0020.

Full text
Abstract:
AbstractToday’s environment of data-driven business models relies heavily on collecting as much personal data as possible. Besides being protected by governmental regulation, internet users can also try to protect their privacy on an individual basis. One of the most famous ways to accomplish this, is to use privacy-enhancing technologies (PETs). However, the number of users is particularly important for the anonymity set of the service. The more users use the service, the more difficult it will be to trace an individual user. There is a lot of research determining the technical properties of PETs like Tor or JonDonym, but the use behavior of the users is rarely considered, although it is a decisive factor for the acceptance of a PET. Therefore, it is an important driver for increasing the user base.We undertake a first step towards understanding the use behavior of PETs employing a mixed-method approach. We conducted an online survey with 265 users of the anonymity services Tor and JonDonym (124 users of Tor and 141 users of JonDonym). We use the technology acceptance model as a theoretical starting point and extend it with the constructs perceived anonymity and trust in the service in order to take account for the specific nature of PETs. Our model explains almost half of the variance of the behavioral intention to use the two PETs. The results indicate that both newly added variables are highly relevant factors in the path model. We augment these insights with a qualitative analysis of answers to open questions about the users’ concerns, the circumstances under which they would pay money and choose a paid premium tariff (only for JonDonym), features they would like to have and why they would or would not recommend Tor/JonDonym. Thereby, we provide additional insights about the users’ attitudes and perceptions of the services and propose new use factors not covered by our model for future research.
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Haibing, Rubén González Crespo, and Oscar Sanjuán Martínez. "Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts." Healthcare 8, no. 3 (July 29, 2020): 243. http://dx.doi.org/10.3390/healthcare8030243.

Full text
Abstract:
Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services. Besides, the blockchain can be described in a decentralized manner as an immutable ledger for recording data entries. Furthermore, this new technology has been developed to interrupt a variety of data-driven fields, including the health sector. However, blockchain refers to the distributed ledger technology, which constitutes an innovation in the information recording and sharing without a trusted third party. In this paper, blockchain and Distributed Ledger-based Improved Biomedical Security system (BDL-IBS) has been proposed to enhance the privacy and data security across healthcare applications. Further, our goal is to make it possible for patients to use the data to support their care and to provide strong consent systems for sharing data among different organizations and applications, since this includes managing and accessing a high amount of medical information, and this technology can maintain data to ensure reliability. Finally, results show that new blockchain-based digital platforms allow for fast, easy, and seamless interactions between data suppliers to enhance privacy and data security, including for patients themselves.
APA, Harvard, Vancouver, ISO, and other styles
21

Braun, Sven, and Anne-Marie Oostveen. "Encryption for the masses? An analysis of PGP key usage." Mediatization Studies 2 (June 26, 2019): 69. http://dx.doi.org/10.17951/ms.2018.2.69-84.

Full text
Abstract:
<p>Despite the rise of alternatives, email remains integral to technology-mediated communication. To protect email privacy the encryption software Pretty Good Privacy (PGP) has been considered the first choice for individuals since 1991. However, there is little scholarly insight into the characteristics and motivations for the people using PGP. We seek to shed light on social aspects of PGP: who is using PGP for encrypted email communication, how and why? By understanding those using the technology, questions on the motivations, usability, and the political dimension of communication encryption can be contextualized and cautiously generalized to provide input for the design of privacy-enhancing technologies. We have greatly extended the scale and scope of existing research by conducting a PGP key analysis on 4.27 million PGP public keys complemented by a survey filled out by former and current PGP users (N = 3,727). We show that a relatively small homogeneous population of mainly western, technically skilled, and moderately politically active males is using PGP for privacy self-management. Additionally, findings from existing research identifying poor usability and a lack of understanding of the underlying mechanisms of PGP can be confirmed.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Katzan, Jr., Harry. "Dynamic Access Control For Information Technology Service Management." Journal of Service Science (JSS) 7, no. 1 (November 3, 2014): 23–28. http://dx.doi.org/10.19030/jss.v7i1.8887.

Full text
Abstract:
Prominent services in the operational portfolio of enterprise information systems are facilities designed to promote information sharing while maintaining control over the integrity and privacy of information. Many organizations employ identity management and authentication for access, and then partition the application domain so that a separate access facility is required for each system. Simple access control lists are used for access control, so flexibility and information sharing is cumbersome and inefficient, often leading to a state where design objectives are easily compromised. A new and groundbreaking service is on the horizon. With dynamic access control employing the new Attribute Based Access Control (ABAC) system, a highly effective means of information sharing, based on the use of attributes, can be achieved, while enhancing efficiency and efficacy among enterprise agencies. This paper provides an introduction to this important service as it applies to federal and non-federal organizational structures.
APA, Harvard, Vancouver, ISO, and other styles
23

Boritz, J. Efrim, and Won Gyun No. "E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery." Journal of Information Systems 25, no. 2 (November 1, 2011): 11–45. http://dx.doi.org/10.2308/isys-10090.

Full text
Abstract:
ABSTRACT Electronic commerce (e-commerce) has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction and the risk of negative consequences from providing such information. This requirement and the increased sophistication of companies' personal information gathering have made e-commerce privacy a critical issue and have spawned a broad research literature that is reviewed in this paper. Key research issues and findings are organized, using a framework defined by four key stakeholder groups—companies, customers, privacy solution providers (PSPs), and governments—as well as the interactions among them. The review indicates that the published research on e-commerce privacy peaked in the early 2000s; thus, it has not addressed many of the technological advances and other relevant developments of the past decade. Potential research opportunities for researchers in Management Information Systems (MIS) and Accounting Information Systems (AIS) include: company privacy strategies, operations, disclosures, and compliance practices; customer privacy concerns arising from company practices such as Internet activity tracking, physical location tracking, personal information gathering by social networks, and information exchanges in cloud computing environments; privacy-enhancing technologies, controls, and assurance practices developed by PSPs; and privacy regulations relating to various industries, countries, and cultures. More use of experimental and archival research is encouraged.
APA, Harvard, Vancouver, ISO, and other styles
24

Mathew, Alex. "Edge Computing and Its Convergence with Blockchain in 6G: Security Challenges." International Journal of Computer Science and Mobile Computing 10, no. 8 (August 30, 2021): 8–14. http://dx.doi.org/10.47760/ijcsmc.2021.v10i08.002.

Full text
Abstract:
Even though the wireless network of 5G has not been investigated exhaustively, the sixth generation (6G) echo systems’ visionaries are already being debated. Therefore, to solidify and consolidate privacy and security within 6G networks, this paper examines edge computing and its convergence with blockchain in 6G: security challenges. Moreover, the paper examines how security might affect the wireless systems of the 6G, potential obstacles characterizing various 6G technologies, alongside possible remedies. This paper unveils the 6G security vision alongside key indicators of performance with tentative landscape threat premised upon predicted sixth generation infrastructure. Furthermore, a discussion of the privacy and security challenges that might emerge from the existing sixth generation applications and demands is presented. Additionally, the paper sheds light into the research-level projects and standardization efforts. Specific attention is accorded to discussion on the security consideration with 6G enhancing technologies, including quantum computing, visible light communication (VLC), distributed ML/AI, physical layer security, and distributed ledger technology (DLT). Overall, this paper seeks to guide the subsequent investigation of sixth generation privacy and security in the early stage of envisioning to practicality.
APA, Harvard, Vancouver, ISO, and other styles
25

Regueiro, Cristina, Iñaki Seco, Santiago de Diego, Oscar Lage, and Leire Etxebarria. "Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption." Information Processing & Management 58, no. 6 (November 2021): 102745. http://dx.doi.org/10.1016/j.ipm.2021.102745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Idrees, Sheikh Mohammad, Mariusz Nowostawski, Roshan Jameel, and Ashish Kumar Mourya. "Security Aspects of Blockchain Technology Intended for Industrial Applications." Electronics 10, no. 8 (April 16, 2021): 951. http://dx.doi.org/10.3390/electronics10080951.

Full text
Abstract:
Blockchain technology plays a significant role in the industrial development. Many industries can potentially benefit from the innovations blockchain decentralization technology and privacy protocols offer with regard to securing, data access, auditing and managing transactions within digital platforms. Blockchain is based on distributed and secure decentralized protocols in which there is no single authority, and no single point of control; the data blocks are generated, added, and validated by the nodes of the network themselves. This article provides insights into the current developments within blockchain technology and explores its ability to revolutionize the multiple industrial application areas such as supply chain industry, Internet of Things (IoT), healthcare, governance, finance and manufacturing. It investigates and provides insights into the security issues and threats related to the blockchain implementations by assessing the research through a systematic literature review. This article proposes possible solutions in detail for enhancing the security of the blockchain for industrial applications along with significant directions for future explorations. The study further suggests how in recent years the adoption of blockchain technology by multiple industrial sectors has gained momentum while in the finance sector it is touching new heights day by day.
APA, Harvard, Vancouver, ISO, and other styles
27

Alaqra, Ala Sarah, Bridget Kane, and Simone Fischer-Hübner. "Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives." JMIR Human Factors 8, no. 3 (September 16, 2021): e21810. http://dx.doi.org/10.2196/21810.

Full text
Abstract:
Background Third-party cloud-based data analysis applications are proliferating in electronic health (eHealth) because of the expertise offered and their monetary advantage. However, privacy and security are critical concerns when handling sensitive medical data in the cloud. Technical advances based on “crypto magic” in privacy-preserving machine learning (ML) enable data analysis in encrypted form for maintaining confidentiality. Such privacy-enhancing technologies (PETs) could be counterintuitive to relevant stakeholders in eHealth, which could in turn hinder adoption; thus, more attention is needed on human factors for establishing trust and transparency. Objective The aim of this study was to analyze eHealth expert stakeholders’ perspectives and the perceived tradeoffs in regard to data analysis on encrypted medical data in the cloud, and to derive user requirements for development of a privacy-preserving data analysis tool. Methods We used semistructured interviews and report on 14 interviews with individuals having medical, technical, or research expertise in eHealth. We used thematic analysis for analyzing interview data. In addition, we conducted a workshop for eliciting requirements. Results Our results show differences in the understanding of and in trusting the technology; caution is advised by technical experts, whereas patient safety assurances are required by medical experts. Themes were identified with general perspectives on data privacy and practices (eg, acceptance of using external services), as well as themes highlighting specific perspectives (eg, data protection drawbacks and concerns of the data analysis on encrypted data). The latter themes result in requiring assurances and conformance testing for trusting tools such as the proposed ML-based tool. Communicating privacy, and utility benefits and tradeoffs with stakeholders is essential for trust. Furthermore, stakeholders and their organizations share accountability of patient data. Finally, stakeholders stressed the importance of informing patients about the privacy of their data. Conclusions Understanding the benefits and risks of using eHealth PETs is crucial, and collaboration among diverse stakeholders is essential. Assurances of the tool’s privacy, accuracy, and patient safety should be in place for establishing trust of ML-based PETs, especially if used in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
28

Goodell, Geoffrey, Hazem Danny Al-Nakib, and Paolo Tasca. "A Digital Currency Architecture for Privacy and Owner-Custodianship." Future Internet 13, no. 5 (May 14, 2021): 130. http://dx.doi.org/10.3390/fi13050130.

Full text
Abstract:
In recent years, electronic retail payment mechanisms, especially e-commerce and card payments at the point of sale, have increasingly replaced cash in many developed countries. As a result, societies are losing a critical public retail payment option, and retail consumers are losing important rights associated with using cash. To address this concern, we propose an approach to digital currency that would allow people without banking relationships to transact electronically and privately, including both e-commerce purchases and point-of-sale purchases that are required to be cashless. Our proposal introduces a government-backed, privately-operated digital currency infrastructure to ensure that every transaction is registered by a bank or money services business, and it relies upon non-custodial wallets backed by privacy-enhancing technology, such as blind signatures or zero-knowledge proofs, to ensure that transaction counterparties are not revealed. Our approach to digital currency can also facilitate more efficient and transparent clearing, settlement, and management of systemic risk. We argue that our system can restore and preserve the salient features of cash, including privacy, owner-custodianship, fungibility, and accessibility, while also preserving fractional reserve banking and the existing two-tiered banking system. We also show that it is possible to introduce regulation of digital currency transactions involving non-custodial wallets that unconditionally protect the privacy of end-users.
APA, Harvard, Vancouver, ISO, and other styles
29

Fritsch, Lothar. "Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 3 (December 1, 2007): 1–17. http://dx.doi.org/10.3390/jtaer2030018.

Full text
Abstract:
This article presents an approach for the design of location-based information systems that support privacy functionality. Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed. This has been done without usage of available PET, although they are favored by data protection experts. Designers of locationbased services (LBS) create infrastructures for business or application specific purposes. They have profitoriented views on the rationale for PET deployment. Finally, users have requirements that might be neither on the PET community’s nor on the business people's agenda. Many disciplines provide knowledge about the construction of community-spanning information systems. The challenge for designers of infrastructures and applications is to find a consensus that models all stakeholders’ interests – and takes advantage all involved community’s knowledge. This paper groups LBS stakeholders into a framework based onto a sociological knowledge construct called “boundary object”. For this purpose, a taxonomical analysis of publications in the stakeholder communities is performed. Then the paper proposes a socio-technical approach. Its goal is to find a suitable privacy design for a LBS infrastructure based on the boundary object. Topics for further interdisciplinary research efforts are identified and proposed for discussion.
APA, Harvard, Vancouver, ISO, and other styles
30

ElMamy, Sidi Boubacar, Hichem Mrabet, Hassen Gharbi, Abderrazak Jemai, and Damien Trentesaux. "A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0." Sustainability 12, no. 21 (November 4, 2020): 9179. http://dx.doi.org/10.3390/su12219179.

Full text
Abstract:
A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.
APA, Harvard, Vancouver, ISO, and other styles
31

Stott, Tonia C., Ann MacEachron, and Nora Gustavsson. "Social Media and Child Welfare: Policy, Training, and the Risks and Benefits From the Administrator’s Perspective." Advances in Social Work 17, no. 2 (January 30, 2017): 221–34. http://dx.doi.org/10.18060/21263.

Full text
Abstract:
The field of public child welfare faces special challenges as it interweaves the use of social media into practice. Social media can assist agencies in meeting demands of practice such as communication, preservation of important family connections, identification of kin, and service coordination with caretakers and community partners. It also presents risks with respect to privacy, confidentiality, and safety. To look at the role of social media in child welfare practice, we began by examining the literature on social media use and how agencies are responding to the risks and benefits of this technology. We then report the findings from an exploratory national survey of training administrators (n=14) that suggests states vary in both policy development and training with respect to social media in child welfare work. We further report on state training administrators’ views of the perceived risks vs. benefits of the use of social media in various case management tasks and in enhancing the well-being of youth in out-of-home care. Agencies would reduce their liability risks and at the same time benefit their staff and clients by developing policies that offer guidelines to protect agency and staff privacy and safety, as well as client privacy and safety. Agencies may also promote the well-being of youth in out-of-home care by providing adequate information to staff and care-givers regarding the safe use of social media to create and maintain appropriate connections.
APA, Harvard, Vancouver, ISO, and other styles
32

van Boekel, Leonieke, Eveline Wouters, Bea Grimberg, Nardo van der Meer, and Katrien Luijkx. "Perspectives of Stakeholders on Technology Use in the Care of Community-Living Older Adults with Dementia: A Systematic Literature Review." Healthcare 7, no. 2 (May 28, 2019): 73. http://dx.doi.org/10.3390/healthcare7020073.

Full text
Abstract:
Although technology has the potential to promote aging in place, the use of technology remains scarce among community-living older adults with dementia. A reason might be that many stakeholders are involved who all have a different perspective on technology use (i.e., needs, wishes, attitudes, possibilities, and difficulties). We systematically searched the literature in order to provide an overview of perspectives of different stakeholders on technology use among community-living older adults with dementia. After selection, 46 studies were included. We mainly found perspectives of informal caregivers and, to a lesser extent, of persons with dementia and formal caregivers. Perspectives of suppliers of technology were not present. Shared perspectives among persons with dementia and informal and formal caregivers were, among other things, ease of use, stability and flexibility of technology, importance of privacy, and confidentiality. We also found that among older persons, fun and pleasure, in addition to enhancing freedom and independence, facilitates technology use. Informal caregivers’ peace of mind and relief of burden also appeared to be important in using technologies. Formal caregivers value the potential of technologies to improve monitoring and communication. Insight in shared, and conflicting perspectives of stakeholders are essential to enhance the use of technology.
APA, Harvard, Vancouver, ISO, and other styles
33

Kadhim, Thair A. "Development a Teaching Methods using a Cloud ‎Computing Technology in Iraqi Schools ‎." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 4 (February 1, 2018): 18–26. http://dx.doi.org/10.29196/jub.v26i4.680.

Full text
Abstract:
The current state of education is mostly electronic. Factors such as servers, storage space, and software are more prominent than ever before. Cloud Computing is defined as an Internet-based computing space that allows its users to share resources, software and information. In the context of Iraq, increased educational spending has not translated into improved learning environments. This work intends to increase the efficiency of education in Iraq through reviewing the characteristics associated with cloud computing providers, such as Microsoft, Google and Amazon, in the context of enhancing the advantages to students, teachers, and other stakeholders. The work will also try to determine approaches that offered rich and affordable services and tools through posing a suitable Cloud Computing Model for Iraqi Schools (CCIS). This particular model is made up of three major parts; preparation, implementation and monitoring, and evaluating and reviewing. The CCIS model combines public and private clouds in the provision of multiple services to the students and enables the formation of links outside of schools. Problems associated with security and data privacy are quite low and under control in this model, as they are defended beyond firewalls alongside remote services, scalability, low costs, efficiency, and functional plug and play options. This study will also decrease the challenges faced by the model internally and externally via constant appraisals and review.
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Jing, Zhenjing Li, Rong Tan, and Cong Liu. "Design and Application of Electronic Rehabilitation Medical Record (ERMR) Sharing Scheme Based on Blockchain Technology." BioMed Research International 2021 (August 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/3540830.

Full text
Abstract:
As the value of blockchain has been widely recognized, more and more industries are proposing their blockchain solutions, including the rehabilitation medical industry. Blockchain can play a powerful role in the field of rehabilitation medicine, bringing a new research idea to the management of rehabilitation medical data. The electronic rehabilitation medical record (ERMR) contains rich data dimensions, which can provide comprehensive and accurate information for assessing the health of patients, thereby enhancing the effect of rehabilitation treatment. This paper analyzed the data characteristics of ERMR and the application requirements of blockchain in rehabilitation medicine. Based on the basic principles of blockchain, the technical advantages of blockchain used in ERMR sharing have been studied. In addition, this paper designed a blockchain-based ERMR sharing scheme in detail, using the specific technologies of blockchain such as hybrid P2P network, block-chain data structure, asymmetric encryption algorithm, digital signature, and Raft consensus algorithm to achieve distributed storage, data security, privacy protection, data consistency, data traceability, and data ownership in the process of ERMR sharing. The research results of this paper have important practical significance for realizing the safe and efficient sharing of ERMR, and can provide important technical references for the management of rehabilitation medical data with broad application prospects
APA, Harvard, Vancouver, ISO, and other styles
35

Wirth, Felix Nikolaus, Marco Johns, Thierry Meurers, and Fabian Prasser. "Citizen-Centered Mobile Health Apps Collecting Individual-Level Spatial Data for Infectious Disease Management: Scoping Review." JMIR mHealth and uHealth 8, no. 11 (November 10, 2020): e22594. http://dx.doi.org/10.2196/22594.

Full text
Abstract:
Background The novel coronavirus SARS-CoV-2 rapidly spread around the world, causing the disease COVID-19. To contain the virus, much hope is placed on participatory surveillance using mobile apps, such as automated digital contact tracing, but broad adoption is an important prerequisite for associated interventions to be effective. Data protection aspects are a critical factor for adoption, and privacy risks of solutions developed often need to be balanced against their functionalities. This is reflected by an intensive discussion in the public and the scientific community about privacy-preserving approaches. Objective Our aim is to inform the current discussions and to support the development of solutions providing an optimal balance between privacy protection and pandemic control. To this end, we present a systematic analysis of existing literature on citizen-centered surveillance solutions collecting individual-level spatial data. Our main hypothesis is that there are dependencies between the following dimensions: the use cases supported, the technology used to collect spatial data, the specific diseases focused on, and data protection measures implemented. Methods We searched PubMed and IEEE Xplore with a search string combining terms from the area of infectious disease management with terms describing spatial surveillance technologies to identify studies published between 2010 and 2020. After a two-step eligibility assessment process, 27 articles were selected for the final analysis. We collected data on the four dimensions described as well as metadata, which we then analyzed by calculating univariate and bivariate frequency distributions. Results We identified four different use cases, which focused on individual surveillance and public health (most common: digital contact tracing). We found that the solutions described were highly specialized, with 89% (24/27) of the articles covering one use case only. Moreover, we identified eight different technologies used for collecting spatial data (most common: GPS receivers) and five different diseases covered (most common: COVID-19). Finally, we also identified six different data protection measures (most common: pseudonymization). As hypothesized, we identified relationships between the dimensions. We found that for highly infectious diseases such as COVID-19 the most common use case was contact tracing, typically based on Bluetooth technology. For managing vector-borne diseases, use cases require absolute positions, which are typically measured using GPS. Absolute spatial locations are also important for further use cases relevant to the management of other infectious diseases. Conclusions We see a large potential for future solutions supporting multiple use cases by combining different technologies (eg, Bluetooth and GPS). For this to be successful, however, adequate privacy-protection measures must be implemented. Technologies currently used in this context can probably not offer enough protection. We, therefore, recommend that future solutions should consider the use of modern privacy-enhancing techniques (eg, from the area of secure multiparty computing and differential privacy).
APA, Harvard, Vancouver, ISO, and other styles
36

Makin, David A., and Leanna Ireland. "The secret life of PETs." Policing: An International Journal 43, no. 1 (December 18, 2019): 121–36. http://dx.doi.org/10.1108/pijpsm-07-2019-0124.

Full text
Abstract:
Purpose The purpose of this paper is to explore to what extent the legal environment influences a user’s choice to employ privacy-enhancing technologies (PETs). Drawing upon existing theoretical frames specific to arbitrariness and uncertainty, this research examines whether interest in PETs is influenced by the legal environment of a country. Design/methodology/approach Using data from Google Trends, the International Property Rights Index, Freedom House and the Organization for Economic Cooperation and Development, the research analyzes interest in Tor, VPN technology and pretty good privacy (PGP) in 153 countries between 2012 and 2016. Findings Findings suggest both countries with both higher and lower arbitrariness and uncertainty of law are associated with an increased interest in Tor and PGP. However, interest in VPN technology does not appear influenced by the legal environment and, instead, is influenced by freedom within the press. Research limitations/implications The dual use nature of Tor and PGP is influenced by law enforcement and judiciary effectiveness and transparency and arbitrariness contributing to the public’s interest in decentralized technological protections. Practical implications Law enforcement should continue to police via the technologies rather than shutting them down to protect the identities of those needing to use these technologies for legitimate purposes. Only by embracing the technologies, as opposed to seeing them as hurdles to be banned, may law enforcement agencies remain vigilant to the threats posted by nefarious actors. Originality/value In this study, the authors introduce a more robust measure of interest in PETs, and do so with a larger, more substantive sample. By situating this interest within the context of policing, the authors can document the dual use nature of the technology, which can be useful in guiding future research, specifically in the area of policy development and officer training.
APA, Harvard, Vancouver, ISO, and other styles
37

Chattu, Vijay Kumar, Anjali Nanda, Soosanna Kumary Chattu, Syed Manzoor Kadri, and Andy W. Knight. "The Emerging Role of Blockchain Technology Applications in Routine Disease Surveillance Systems to Strengthen Global Health Security." Big Data and Cognitive Computing 3, no. 2 (May 8, 2019): 25. http://dx.doi.org/10.3390/bdcc3020025.

Full text
Abstract:
Blockchain technology has an enormous scope to revamp the healthcare system in many ways as it improves the quality of healthcare by data sharing among all the participants, selective privacy and ensuring data safety. This paper explores the basics of blockchain, its applications, quality of experience and advantages in disease surveillance over the other widely used real-time and machine learning techniques. The other real-time surveillance systems lack scalability, security, interoperability, thus making blockchain as a choice for surveillance. Blockchain offers the capability of enhancing global health security and also can ensure the anonymity of patient data thereby aiding in healthcare research. The recent epidemics of re-emerging infections such as Ebola and Zika have raised many concerns regarding health security which resulted in strengthening the surveillance systems. We also discuss how blockchains can help in identifying the threats early and reporting them to health authorities for taking early preventive measures. Since the Global Health Security Agenda addresses global public health threats (both infectious and NCDs); strengthen the workforce and the systems; detect and respond rapidly and effectively to the disease threats; and elevate global health security as a priority. The blockchain has enormous potential to disrupt many current practices in traditional disease surveillance and health care research.
APA, Harvard, Vancouver, ISO, and other styles
38

Tsohou, Aggeliki, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, and Beatriz Gallego-Nicasio Crespo. "Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform." Information & Computer Security 28, no. 4 (April 16, 2020): 531–53. http://dx.doi.org/10.1108/ics-01-2020-0002.

Full text
Abstract:
Purpose General data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform. Design/methodology/approach The platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors. Findings The findings provide the process for the DEFeND platform requirements’ elicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements. Practical implications The proposed software engineering methodology and data collection tools (i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry. Social implications It is reported repeatedly that data controllers face difficulties in complying with the GDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR, thus, offering a significant boost toward the European personal data protection objectives. Originality/value This is the first paper, according to the best of the authors’ knowledge, to provide software requirements for a GDPR compliance platform, including multiple perspectives.
APA, Harvard, Vancouver, ISO, and other styles
39

Kowalczuk, Pascal. "Consumer acceptance of smart speakers: a mixed methods approach." Journal of Research in Interactive Marketing 12, no. 4 (October 8, 2018): 418–31. http://dx.doi.org/10.1108/jrim-01-2018-0022.

Full text
Abstract:
PurposeVoice-activated smart speakers such as Amazon Echo and Google Home were recently developed and are gaining popularity. Understanding and theorizing the underlying mechanisms that encourage or impede consumers to use smart speakers is fundamental for enhancing acceptance and future development of these new devices. Therefore, building on technology acceptance research, this study aims to develop and test an acceptance model for investigating consumers’ intention to use smart speakers.Design/methodology/approachFirst, antecedents that may significantly affect the usage intention of smart speakers were identified through an explorative approach by a netnographic analysis of customer reviews (N= 2,186) and Twitter data (N= 899). Afterward, these results and contemporary literature were used to develop and validate an acceptance model for smart speakers. Structural equation modeling (SEM) was used to test the proposed hypotheses on data collected from 293 participants of an online survey.FindingsBesides perceived ease of use and perceived usefulness, the quality and diversity of a system, its enjoyment, consumer’s technology optimism and risk (surveillance anxiety and security/privacy risk) strongly affect the acceptance of smart speakers. Among these variables, enjoyment had the strongest effect on behavioral intention to use smart speakers.Originality/valueThis is the first study that incorporates netnography and SEM for investigating technology acceptance and applies it to the field of interactive smart devices.
APA, Harvard, Vancouver, ISO, and other styles
40

Liza, Farhana Yasmin. "Factors Influencing the Adoption of Mobile Banking: Perspective Bangladesh." Global Disclosure of Economics and Business 3, no. 2 (December 31, 2014): 199–220. http://dx.doi.org/10.18034/gdeb.v3i2.164.

Full text
Abstract:
With the convergence of banking services and mobile technologies, users are able to conduct banking services at any place and at any time through mobile banking. This research examines the factors influencing the adoption of mobile banking in Bangladesh, with a special focus on trust, perceived cost and perceived risk including the facets of perceived risks: performance risk, security/privacy risk, time risk, social risk and financial risk. The research model includes the original variables of extended technology acceptance model (TAM2). Data for this study was collected through a structured questionnaire survey in townships around Dhaka. The research has found that customers will consider adopting mobile banking as long as it is perceived to be useful and easy to use. But the most critical factor for the customer is cost; the service should be affordable. Trust was found to be significantly negatively correlated to perceived risk. Thus, trust plays a role in risk mitigation and in enhancing customer loyalty.
APA, Harvard, Vancouver, ISO, and other styles
41

Henriksen, Kerm, Marilyn Sue Bogner, Pascale Carayon, Richard I. Cook, Matthew B. Weinger, and Yan Xiao. "Human Factors Research in Patient Safety: A Candid Assessment." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 46, no. 16 (September 2002): 1462–66. http://dx.doi.org/10.1177/154193120204601612.

Full text
Abstract:
Five panelists, playing active research roles in the Agency for Healthcare Research and Quality's patient safety research initiative, present their views on challenges to human factors research for enhancing patient safety. Bogner advocates a systems structure for linking the findings of various research projects so that the missing pieces of the patient safety puzzle can serve as fruitful targets for subsequent research. Carayon adopts a macroergonomic framework for designing interventions to clinical work systems while Cook focuses on the complexity that underlies configurable clinical devices. With respect to anesthesia and critical care, Weinger cites the successful use of task analysis, workload assessment, and video analysis, yet notes challenges regarding concerns about patient privacy, disruption of patient care, and cultural barriers. Xiao cites impressive HF/E work on team coordination and performance shaping factors and sees the need for greater use of video and information technology to improve institutional learning and coordination of patient care.
APA, Harvard, Vancouver, ISO, and other styles
42

Xu, He, Xin Chen, Feng Zhu, and Peng Li. "A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems." Wireless Communications and Mobile Computing 2021 (July 23, 2021): 1–14. http://dx.doi.org/10.1155/2021/8844178.

Full text
Abstract:
The Radio Frequency Identification (RFID) technology has been integrated into healthcare systems for the purpose of improving healthcare management. However, people have concerns about the security and privacy of this kind of RFID systems. In order to solve the security problems faced by RFID-based healthcare systems, a novel security authentication protocol based on Physical Unclonable Function (PUF) and Advanced Encryption Standard (AES) encryption algorithm is designed. The protocol uses PUF technology to output unique and random responses to different excitation inputs, encrypts the authentication information sent by the tag, and uses the AES encryption algorithm to encrypt the authentication information between the cloud database and the reader. At the same time, in the authentication process, once the communicating entity completes the identity authentication of the other two entities, it immediately starts to update the key. The security analysis and formal analysis of BAN (proposed by Burrows et al.) logic prove the security and correctness of the protocol. Analysis results show that the computation cost and security performance of the proposed protocol are better than the compared protocols. Our findings will contribute to further enhancing the security for RFID healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
43

Naik, Shalini S., Narayana Manjunatha, Channaveerachari Naveen Kumar, Suresh Bada Math, and Sydney Moirangthem. "Patient’s Perspectives of Telepsychiatry: The Past, Present and Future." Indian Journal of Psychological Medicine 42, no. 5_suppl (October 2020): 102S—107S. http://dx.doi.org/10.1177/0253717620963341.

Full text
Abstract:
Access to mental health care has significant disparities due to treatment gap, more so particularly for the remotely residing, physically vulnerable, aging populations. Adoption of technology will enable more people to receive specialty care addressing distance, transportation and cost-related barriers to treatment engagement from the comfort of home. Telemedicine has been regarded as “electronic personal protective equipment” by reducing the number of physical contacts and risk contamination for patients during COVID-19 crisis. This review aimed to give a broad view of patients’ perception of the use of telepsychiatry in terms of clinical outcome, cost-effectiveness, and solutions to address patients’ challenges with the adoption of technology. Over the years, telepsychiatry, both in synchronous and asynchronous modalities, had shown to improve patients’ adherence to treatment, follow-up rates, and clinical symptoms, overcome stigma and discrimination, and save cost expenses accessing health care with better satisfaction and usability outcomes. Its utility is widespread such as in delivering care emergency evaluation, crisis intervention, conducting neuropsychological assessments, psychotherapy, promoting lifestyle modification, enhancing self-efficacy, and overcoming patients’ linguistic and cultural barriers to care. However, patients’ privacy and confidentiality and psychiatrists’ legal liability remain as matter of major concern in digital platform. To keep up with the pace of technology and patients’ expectations, a more agile approach is essential to develop, improve, and evaluate telepsychiatric interventions.
APA, Harvard, Vancouver, ISO, and other styles
44

Sheikh, Aziz, Harpreet S. Sood, and David W. Bates. "Leveraging health information technology to achieve the “triple aim” of healthcare reform." Journal of the American Medical Informatics Association 22, no. 4 (April 16, 2015): 849–56. http://dx.doi.org/10.1093/jamia/ocv022.

Full text
Abstract:
Abstract Objective To investigate experiences with leveraging health information technology (HIT) to improve patient care and population health, and reduce healthcare expenditures. Materials and methods In-depth qualitative interviews with federal government employees, health policy, HIT and medico-legal experts, health providers, physicians, purchasers, payers, patient advocates, and vendors from across the United States. Results The authors undertook 47 interviews. There was a widely shared belief that Health Information Technology for Economic and Clinical Health (HITECH) had catalyzed the creation of a digital infrastructure, which was being used in innovative ways to improve quality of care and curtail costs. There were however major concerns about the poor usability of electronic health records (EHRs), their limited ability to support multi-disciplinary care, and major difficulties with health information exchange, which undermined efforts to deliver integrated patient-centered care. Proposed strategies for enhancing the benefits of HIT included federal stimulation of competition by mandating vendors to open-up their application program interfaces, incenting development of low-cost consumer informatics tools, and promoting Congressional review of the The Health Insurance Portability and Accountability Act (HIPPA) to optimize the balance between data privacy and reuse. Many underscored the need to “kick the legs from underneath the fee-for-service model” and replace it with a data-driven reimbursement system that rewards high quality care. Conclusions The HITECH Act has stimulated unprecedented, multi-stakeholder interest in HIT. Early experiences indicate that the resulting digital infrastructure is being used to improve quality of care and curtail costs. Reform efforts are however severely limited by problems with usability, limited interoperability and the persistence of the fee-for-service paradigm—addressing these issues therefore needs to be the federal government’s main policy target.
APA, Harvard, Vancouver, ISO, and other styles
45

Hang, Lei, BumHwi Kim, KyuHyung Kim, and DoHyeun Kim. "A Permissioned Blockchain-Based Clinical Trial Service Platform to Improve Trial Data Transparency." BioMed Research International 2021 (July 29, 2021): 1–22. http://dx.doi.org/10.1155/2021/5554487.

Full text
Abstract:
The clinical research faces numerous challenges, from patient enrollment to data privacy concerns and regulatory requirements to spiraling costs. Blockchain technology has the potential to overcome these challenges, thus making clinical trials transparent and enhancing public trust in a fair and open process with all stakeholders because of its distinct features such as data immutability and transparency. This paper proposes a permissioned blockchain platform to ensure clinical data transparency and provides secure clinical trial-related solutions. We explore the core functionalities of blockchain applied to clinical trials and illustrate its general principle concretely. These clinical trial operations are automated using the smart contract, which ensures traceability, prevents a posteriori reconstruction, and securely automates the clinical trial. A web-based user interface is also implemented to visualize the data from the blockchain and ease the interaction with the blockchain network. A proof of concept is implemented on Hyperledger Fabric in the case study of clinical management for multiple clinical trials to demonstrate the designed approach’s feasibility. Lastly, the experiment results demonstrate the efficiency and usability of the proposed platform.
APA, Harvard, Vancouver, ISO, and other styles
46

Paluch, Stefanie, and Sven Tuzovic. "Persuaded self-tracking with wearable technology: carrot or stick?" Journal of Services Marketing 33, no. 4 (August 12, 2019): 436–48. http://dx.doi.org/10.1108/jsm-03-2018-0091.

Full text
Abstract:
Purpose Commercial entities (e.g. health and life insurance, airlines and supermarkets) in different countries have recently begun to introduce wearable technology as part of the consumer journey and as a means of enhancing the business value chain. While a firm’s decision to adopt such new technologies as wearable devices is often based on financial factors such as return on investment, costs and impact on profits, consumers may hold a different attitude toward the value of using smart wearables and sharing their personal data as part of their business-client relationships. The purpose of this paper is to investigate consumer perceptions of and reactions to persuaded self-tracking (PST) – a practice in which businesses actively encourage consumers to monitor, collect and share personal biometric data through wearable technologies in exchange for personalized incentives and rewards. Design/methodology/approach Using a qualitative research approach and a purposeful sampling method, the authors conducted personal in-depth interviews with 24 consumers (both users and non-users of wearable devices). Interviews were recorded and transcribed, resulting in 600 pages of transcripts comprising more than 203,000 words. Data coding and analysis were facilitated by using NVivo. Findings Consumers’ assessment of PST is based on perceived value-in-use, privacy/security concerns and perceived fairness/justice, resulting in four types of reactions to adopt or use PST (embracing, considering, debating and avoiding). Specifically, the authors identified two individual determinants (intrinsic motivation and extrinsic motivation) and four firm-related determinants (design of wearable device, assurance, transparency and controllability) that influence consumer perceptions of PST. Research limitations/implications Results of this study have implications for both vendors of wearable devices and firms trying to leverage smart wearables in their value chains. Identifying consumers’ perceptions, as well as barriers and enablers of acceptance, will help firms to more effectively design and develop wearable device-based services, thus gaining consumer support for using fitness trackers. The primary limitation of the study is that using a thematic analysis method diminishes the generalizability of our findings. Originality/value This study addresses an under-researched area: the integration of wearable technologies in a firm’s value chain through the lens of the consumers. This study is one of the first, according to authors’ knowledge, to investigate consumer perceptions of PST.
APA, Harvard, Vancouver, ISO, and other styles
47

Ong, Shawn Y., Lisa Stump, Matthew Zawalich, Lisa Edwards, Glynn Stanton, Michael Matthews, and Allen L. Hsiao. "Inpatient Telehealth Tools to Enhance Communication and Decrease Personal Protective Equipment Consumption during Disaster Situations: A Case Study during the COVID-19 Pandemic." Applied Clinical Informatics 11, no. 05 (October 2020): 733–41. http://dx.doi.org/10.1055/s-0040-1719180.

Full text
Abstract:
Abstract Background As the coronavirus disease 2019 pandemic exerts unprecedented stress on hospitals, health care systems have quickly deployed innovative technology solutions to decrease personal protective equipment (PPE) use and augment patient care capabilities. Telehealth technology use is established in the ambulatory setting, but not yet widely deployed at scale for inpatient care. Objectives This article presents and describes our experience with evaluating and implementing inpatient telehealth technologies in a large health care system with the goals of reducing use of PPE while enhancing communication for health care workers and patients. Methods We discovered use cases for inpatient telehealth revealed as a result of an immense patient surge requiring large volumes of PPE. In response, we assessed various consumer products to address the use cases for our health system. Results We identified 13 use cases and eight device options. During device setup and implementation, challenges and solutions were identified in five areas: security/privacy, device availability and setup, device functionality, physical setup, and workflow and device usage. This enabled deployment of more than 1,800 devices for inpatient telehealth across seven hospitals with positive feedback from health care staff. Conclusion Large-scale setup and distribution of consumer devices is feasible for inpatient telehealth use cases. Our experience highlights operational barriers and potential solutions for health systems looking to preserve PPE and enhance vital communication.
APA, Harvard, Vancouver, ISO, and other styles
48

Hassankhani, Mahnoosh, Mehdi Alidadi, Ayyoob Sharifi, and Abolghasem Azhdari. "Smart City and Crisis Management: Lessons for the COVID-19 Pandemic." International Journal of Environmental Research and Public Health 18, no. 15 (July 21, 2021): 7736. http://dx.doi.org/10.3390/ijerph18157736.

Full text
Abstract:
COVID-19 shocked cities around the world and revealed the vulnerability of urban lives and functions. Most cities experienced a catastrophic disturbance that has lasted for a long time. Planning plays a critical role in responding efficiently to this crisis and enabling rapid functional recovery in the post-disaster era. Cities that have implemented digitalization initiatives and programs are likely to have more capacity to react appropriately. Specifically, digitalized cities could ensure the well-being of their residents and maintain continuity of urban functions. This research aims to analyze the role of technology in crisis management in the last two decades and provide appropriate policy recommendations for dealing with the COVID-19 pandemic. Systematic literature review and subjective content analysis are employed to investigate the effects of technology on community well-being and making cities more resilient in past crises. This study shows that different technology-driven policies and actions enable crisis management, enhance community well-being, and increase urban resilience. Technology has enhanced coping and recovery capacities by increasing participation and social connectedness, enhancing physical and mental health and maintaining the functionality of education and economic systems. These have been achieved through various solutions and technologies such as social media, telehealth, tracking and monitoring systems, sensors and locational applications, teleworking systems, etc. These solutions and technologies have also been used during the COVID-19 pandemic to enhance community well-being and sustain urban functions. However, technology deployment might have adverse effects such as social exclusion, digital divide, privacy and confidentiality violation, political bias and misinformation dissemination, and inefficient remote working and education. It is suggested that to mitigate these side effects, policymakers should liberate the process of digitalization, increase the accessibility to digital services, and enhance digital literacy.
APA, Harvard, Vancouver, ISO, and other styles
49

Alam, Tanweer, Baha Rababah, Arshad Ali, and Shamimul Qamar. "Distributed Intelligence at the Edge on IoT Networks." Annals of Emerging Technologies in Computing 4, no. 5 (December 20, 2020): 1–18. http://dx.doi.org/10.33166/aetic.2020.05.001.

Full text
Abstract:
The Internet of Things (IoT) has revolutionized innovation to collect and store the information received from physical objects or sensors. The smart devices are linked to a repository that stores intelligent information executed by sensors on IoT-based smart objects. Now, the IoT is shifted from knowledge-based technologies to operational-based technologies. The IoT integrates sensors, smart devices, and a smart grid of implementations to deliver smart strategies. Nowadays, the IoT has been pondered to be an essential technology. The transmission of information to or from the cloud has recently been found to cause many network problems to include latency, power usage, security, privacy, etc. The distributed intelligence enables IoT to help the correct communication available at the correct time and correct place. Distributed Intelligence could strengthen the IoT in a variety of ways, including evaluating the integration of different big data or enhancing efficiency and distribution in huge IoT operations. While evaluating distributed intelligence in the IoT paradigm, the implementation of distributed intelligence services should take into consideration the transmission delay and bandwidth requirements of the network. In this article, the distributed intelligence at the Edge on IoT Networks, applications, opportunities, challenges and future scopes have been presented.
APA, Harvard, Vancouver, ISO, and other styles
50

Kelly, Jaimon T., Katrina L. Campbell, Enying Gong, and Paul Scuffham. "The Internet of Things: Impact and Implications for Health Care Delivery." Journal of Medical Internet Research 22, no. 11 (November 10, 2020): e20135. http://dx.doi.org/10.2196/20135.

Full text
Abstract:
The Internet of Things (IoT) is a system of wireless, interrelated, and connected digital devices that can collect, send, and store data over a network without requiring human-to-human or human-to-computer interaction. The IoT promises many benefits to streamlining and enhancing health care delivery to proactively predict health issues and diagnose, treat, and monitor patients both in and out of the hospital. Worldwide, government leaders and decision makers are implementing policies to deliver health care services using technology and more so in response to the novel COVID-19 pandemic. It is now becoming increasingly important to understand how established and emerging IoT technologies can support health systems to deliver safe and effective care. The aim of this viewpoint paper is to provide an overview of the current IoT technology in health care, outline how IoT devices are improving health service delivery, and outline how IoT technology can affect and disrupt global health care in the next decade. The potential of IoT-based health care is expanded upon to theorize how IoT can improve the accessibility of preventative public health services and transition our current secondary and tertiary health care to be a more proactive, continuous, and coordinated system. Finally, this paper will deal with the potential issues that IoT-based health care generates, barriers to market adoption from health care professionals and patients alike, confidence and acceptability, privacy and security, interoperability, standardization and remuneration, data storage, and control and ownership. Corresponding enablers of IoT in current health care will rely on policy support, cybersecurity-focused guidelines, careful strategic planning, and transparent policies within health care organizations. IoT-based health care has great potential to improve the efficiency of the health system and improve population health.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography