To see the other types of publications on this topic, follow the link: Secure email.

Journal articles on the topic 'Secure email'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secure email.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Masone, Chris, and Sean Smith. "Towards usefully secure email." IEEE Technology and Society Magazine 26, no. 1 (2007): 25–34. http://dx.doi.org/10.1109/mtas.2007.335563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bradbury, Danny. "Can we make email secure?" Network Security 2014, no. 3 (March 2014): 13–16. http://dx.doi.org/10.1016/s1353-4858(14)70032-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ruoti, Scott, and Kent Seamons. "Johnny's Journey Toward Usable Secure Email." IEEE Security & Privacy 17, no. 6 (November 2019): 72–76. http://dx.doi.org/10.1109/msec.2019.2933683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

saxena, Komal, and Anjan Saxena. "A Preventive Measure to Secure Your Email on Cloud." Global Journal For Research Analysis 3, no. 3 (June 15, 2012): 15–16. http://dx.doi.org/10.15373/22778160/mar2014/6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

AlSabah, Mashael, Alin Tomescu, Ilia Lebedev, Dimitrios Serpanos, and Srini Devadas. "PriviPK: Certificate-less and secure email communication." Computers & Security 70 (September 2017): 1–15. http://dx.doi.org/10.1016/j.cose.2017.04.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Salhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (October 2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.

Full text
Abstract:
One of the most interesting fields nowadays is forensics. This field is based on the works of scientists who study evidence to help the police solve crimes. In the domain of computer science, the crimes within computer forensics are usually network attacks, and most attacks are over the email (the case of this study). Email has become a daily means of communication which is mainly accessible via internet. People receive thousands of emails in their inboxes and mail servers (in which people can find emails in those lists). The aim of this study is to secure email users by building an automatic checking and detecting system on servers to filter the bad emails from the good ones. In this paper, the authors will do a study based on a new method of emails clustering to extract the bad and good ones. The authors use the gain information technique like an algorithm of clustering, whose principle is to calculate the importance of each attribute (in this study, the authors talk about the attributes that constitute the email) to draw the importance tree and at the end extract the clusters.
APA, Harvard, Vancouver, ISO, and other styles
7

Kapadia, Apu. "A Case (Study) For Usability in Secure Email Communication." IEEE Security and Privacy Magazine 5, no. 2 (March 2007): 80–84. http://dx.doi.org/10.1109/msp.2007.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (March 13, 2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.

Full text
Abstract:
Nowadays, email has become the most widely communication way in daily life. Email is a very important method of communicating across the internet. During transmission and downloads, it uses protocols which are not secure. Spammers and scammers misuse these protocols to gain access to critical data stored in the email. This triggered concerns because sometimes email is used to exchange confidential messages. To improve security and efficiency of email system, we made an email security system for Android mobile phone using Hill Cipher algorithm. Hill Cipher is a classic cryptography algorithm that uses matrix inverse and matrix multiplication operations to hide the message. The initial stage of the encryption process is forming ciphertext by multiplying the key matrix with plaintext matrix. The contents of encrypted messages only can be read by legitimate recipient who has the key. Converting the ciphertext into plaintext is done by multiplying the ciphertext matrix with the inverse key matrix. The email content can be a plain message or a message with an attached file.
APA, Harvard, Vancouver, ISO, and other styles
9

Gu, Chun Ying, and Rui Ying Fang. "Email Security and PGP Technical Analysis." Advanced Materials Research 546-547 (July 2012): 1075–79. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1075.

Full text
Abstract:
Currently, Email is one of the most popular applications in people’s life. A secure email requires that the email system can provide encryption and digital signature, PGP is a popular email encryption and transmission method, the paper gives a brief overview of email security, details the PGP algorithm, function, encryption and decryption process and public/private key pair generation process, and analysis’s Security of PGP.
APA, Harvard, Vancouver, ISO, and other styles
10

Heisey-Grove, Dawn M., and Henry J. Carretta. "Disparities in Secure Messaging Uptake Between Patients and Physicians: Longitudinal Analysis of Two National Cross-Sectional Surveys." Journal of Medical Internet Research 22, no. 5 (May 1, 2020): e12611. http://dx.doi.org/10.2196/12611.

Full text
Abstract:
Background Emails securely exchanged between patients and clinicians offer the promise of improved access to care and indirectly improved health outcomes. Yet research to date is mixed on who—among both patients and clinicians—is using secure messaging. Objective Using data from two large nationally representative cross-sectional surveys, this study aimed to compare the prevalence of secure messaging use among patients and their access to the functionality through their physicians, and to explore the clinical practice and physician characteristics and patient sociodemographic characteristics associated with the use of secure messaging. Methods We conducted regression analyses to identity statistical associations between self-reported secure messaging use and access, and the patient, practice, and physician characteristics from the National Health Interview Survey (NHIS) and the National Ambulatory Medical Care Survey (NAMCS). The NHIS data collected between 2013 and 2018, with approximately 150,000 adult individuals, were used to evaluate patient characteristics associated with email communication with clinicians. The NAMCS data included 7340 physicians who reported on secure messaging use between 2013 and 2016 and provided context on physician specialty, use of certified health information technology (IT), and practice size and ownership associated with secure messaging access and use. Results By 2016, two-thirds of ambulatory care visits were conducted by a physician who reported using secure messaging, up from 40.70% in 2013. The percentage of US residents who reported sending an email to their clinician, however, only increased from 7.22% to 16.67% between 2013 and 2018. We observed a strong positive association between certified health IT use and secure messaging use (odds ratio [OR] 11.46, 95% CI 7.55-17.39). Individuals who were black, had lower levels of education, had Medicaid or other public payer insurance, or those who were uninsured had reduced odds for using email to communicate with clinicians. No differences were observed in secure messaging use based on physician specialty, but significant differences were observed by practice size (OR 0.46, 95% CI 0.35-0.60 in solo practices vs nonsolo practices) and practice ownership (P<.001 for the different categories). Conclusions This study is the first to use two large nationally representative surveys to produce longitudinal estimates on the access and use of patient-clinician email communication in the United States. The survey findings complement each other: one provides the patient perspective of their use and the other indicates potential patient access to secure messaging based on the use of the functionality by the physicians providing treatment. This study provides nationally representative data on the characteristics of patients and physicians who have access to and are using secure messaging. This information can be used to target interventions to promote adoption and use of secure messaging.
APA, Harvard, Vancouver, ISO, and other styles
11

Thiago Moecke, Cristian, and Melanie Volkamer. "Usable secure email communications: criteria and evaluation of existing approaches." Information Management & Computer Security 21, no. 1 (March 15, 2013): 41–52. http://dx.doi.org/10.1108/09685221311314419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

SOBHY, MOHAMED I., and ALAA-EL-DIN SHEHATA. "SECURE COMPUTER COMMUNICATION USING CHAOTIC ALGORITHMS." International Journal of Bifurcation and Chaos 10, no. 12 (December 2000): 2831–39. http://dx.doi.org/10.1142/s021812740000181x.

Full text
Abstract:
In this paper the application of chaotic algorithms in sending computer messages is described. The communication is achieved through email. Other transmission media can also be used. The algorithm has a degree of security many orders of magnitude higher than systems based on physical electronic circuitry. Both text, image or recorded voice messages can be transmitted. The algorithm can be used for computer communication and for secure databases.
APA, Harvard, Vancouver, ISO, and other styles
13

Subpratatsavee, Puchong, Chanchira Chintho, and Suchai Tanaiadehawoot. "A Security of Circular Email in Manufacturing." Applied Mechanics and Materials 752-753 (April 2015): 1296–300. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1296.

Full text
Abstract:
In present, manufacturing organizations in some countries will have to submitinformation to both internal and external to the organization, called circular mail to report newswithin the organization or external relations. Administrative officer is responsibility about to senda circular mail for each organization and will be responsible for receiving letters in paper form orpublication or media message. Then the administrative officer will be read and extracted the letterand send a message in the form of emails to receivers as indicated on the letter. In mailings sendsuch potential attacks from disgruntled individuals; such as a change of email messages duringtransmission or identity thieves use a fake email address to send officials to the other party. If anattack occurs, the organization will make a loss. In terms of stability credibility and security in theuse of corporate email. This paper presents a model and how to send an email or letter online ina format that is more stable and secure by the applied technology of public key cryptography andhash function to encrypt the message to provide stability and security in the mail's circulars online.
APA, Harvard, Vancouver, ISO, and other styles
14

Ojha, Vibha, and Ravinder Singh. "Cryptography for Secure E-mail Communication." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 2 (February 28, 2019): 67–71. http://dx.doi.org/10.17762/ijritcc.v7i2.5341.

Full text
Abstract:
Users share private information on the web through a variety of applications, suchas email, instant messaging, social media, and document sharing. Unfortunately, recentrevelations have shown that not only is users' data at risk from hackers and malicious insiders,but also from government surveillance. This state of affairs motivates the need for users tobe able to encrypt their online data specifically the e-mail communication. This paper shows the use of cryptographic algorithms for secure e-mail communication.
APA, Harvard, Vancouver, ISO, and other styles
15

Combest, Travis M., Allison Howell, Harjinder Kumar, Samer Koutoubi, Karen Cieslewicz, and Joetta Khan. "Effect of Using an Exercise and Nutrition Secure Email Message on the Implementation of Health Promotion in a Large Health Care System." Californian Journal of Health Promotion 17, no. 2 (December 23, 2019): 62–66. http://dx.doi.org/10.32398/cjhp.v17i2.2290.

Full text
Abstract:
Background and Program: Secure email messaging is used to provide timely communication between healthcare providers and patients with medical information and education. There have been increasing rates of overweight and obesity among military healthcare patients. To address this issue, we utilized a secure email messaging system that is primarily used for medication refills. This commentary demonstrates the extent to which the message was viewed and how much the message was liked. Preliminary Results: Of the 16,020 individuals emailed, 7,011 participants (43.8%) opened the email, and 1,023 patients (14.6% of those who opened it) completed the survey. Satisfaction rate for the health promotion message was 77.2%. Participants reported an intent to eat more fruit and vegetables (49.6%), decrease portion sizes (38.8%), and increase physical activity (51.1%), while 33.6% reported having no intent to change. Conclusion: The majority were satisfied with the health promotion message. This email method enables a single provider to have increased contact with patients. It is unknown if this message reached higher risk or harder to reach participants, a patient subset that could benefit most from this type of communication. This study is unique in that to our knowledge it is the first one to use secure email messaging in the military healthcare system for health promotion.
APA, Harvard, Vancouver, ISO, and other styles
16

Piedrahita Castillo, Diego, Francisco Machío Regidor, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "A New Mail System for Secure Data Transmission in Cyber Physical Systems." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 28, Supp02 (December 2020): 23–48. http://dx.doi.org/10.1142/s0218488520400127.

Full text
Abstract:
This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed and the evolution of security requirements. This paper also analyzes email vulnerabilities and the reasons that have motivated the exploitation of them. The threats and solutions of the most used email protocols today are detailed, such as Simple Mail Transfer Protocol, Post office Protocol, Internet Message Access Protocol protocols, among others. An analysis of the main security solutions proposed in recent years is carried out and how these threats are solved, as well as a comparison of each of them. The result of this work leads us to conclude that it is necessary to make an integral change in the protocols used in the electronic mail in order to have a secure message exchange system that meets all the security requirements demanded today. We are working on a proposal based on blockchain that solves the security problems identified in this work.
APA, Harvard, Vancouver, ISO, and other styles
17

Rutland, Jonathan, Catherine Marie, and Benjamin Rutland. "A system for telephone and secure email consultations, with automatic billing." Journal of Telemedicine and Telecare 10, no. 1_suppl (November 2004): 88–91. http://dx.doi.org/10.1258/1357633042614285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ruoti, Scott, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'neill, Ken Reese, et al. "A Usability Study of Four Secure Email Tools Using Paired Participants." ACM Transactions on Privacy and Security 22, no. 2 (April 10, 2019): 1–33. http://dx.doi.org/10.1145/3313761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Hodong, Hyundo Yoon, Youngjoo Shin, and Junbeom Hur. "On the Security of Practical Mail User Agents against Cache Side-Channel Attacks." Applied Sciences 10, no. 11 (May 29, 2020): 3770. http://dx.doi.org/10.3390/app10113770.

Full text
Abstract:
Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption standards such as OpenPGP or S/MIME, mostly implemented using GnuPG. Despite their widespread deployment, there has been insufficient research on their software structure and the security dependencies among the software components of MUA programs. In order to understand the security implications of the structures and analyze any possible vulnerabilities of MUA programs, we investigated a number of MUAs that support email encryption. As a result, we found severe vulnerabilities in a number of MUAs that allow cache side-channel attacks in virtualized desktop environments. Our analysis reveals that the root cause originates from the lack of verification and control over the third-party cryptographic libraries that they adopt. In order to demonstrate this, we implemented a cache side-channel attack on RSA in GnuPG and then conducted an evaluation of the vulnerability of 13 MUAs that support email encryption in Ubuntu 14.04, 16.04 and 18.04. Based on our experiment, we found that 10 of these MUA programs (representing approximately 77% of existing MUA programs) allow the installation of a vulnerable version of GnuPG, even when the latest version of GnuPG, which is secure against most cache side-channel attacks, is in use. In order to substantiate the importance of the vulnerability we discovered, we conducted a FLUSH+RELOAD attack on these MUA programs and demonstrated that the attack restored 92% of the bits of the 2048-bit RSA private key when the recipients read a single encrypted email.
APA, Harvard, Vancouver, ISO, and other styles
20

Lei, Ming Yue, Zheng Huang, Qiao Yan Wen, and Chun Ye Hu. "A Secure Cloud Computing Scaling Model." Applied Mechanics and Materials 411-414 (September 2013): 60–66. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.60.

Full text
Abstract:
Since many Internet enterprises employ the computing resources provided by Cloud Service Provider (CSP), how to dynamically adjust the number of rented servers and improve service quality becomes a crucial subject. A lot of efforts have been made to achieve intelligent energy saving capacity adjustment but scarcely any of them takes the security issue of cloud data into account. In this paper, we focus on the cloud storage security in the cloud computing capacity scaling. We design the security part of the whole model based on the idea of Proofs of Retrievability (POR). In the scaling part of the model, we determine the scaling strategy according to email server instances CPU utilization. With simulation and performance evaluation, we conclude that the designed model is able to enable verifier to check the integrity of the information in the cloud storage and maintain satisfied response time target within Service Level Agreement (SLA).
APA, Harvard, Vancouver, ISO, and other styles
21

Palen, Ted E., Di Meng, and Terhilda Garrido. "Categorizing Patient-Provider Secure Email Communications to Measure Substitutionary Effect on In-Person Services." Journal of Patient-Centered Research and Reviews 2, no. 2 (April 30, 2015): 115. http://dx.doi.org/10.17294/2330-0698.1139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Al-Dwairi, M. O., A. Y. Hendi, and Z. A. AlQadi. "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images." Engineering, Technology & Applied Science Research 9, no. 3 (June 8, 2019): 4165–68. http://dx.doi.org/10.48084/etasr.2525.

Full text
Abstract:
Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
23

Larkin, James, Ivana Pericin, Brian O'Mahoney, Karina Hull, and Claire Collins. "An Evaluation of a Secure Email Service (Healthmail): A Cross-sectional Survey of Irish GPs." Universal Journal of Public Health 6, no. 5 (September 2018): 284–97. http://dx.doi.org/10.13189/ujph.2018.060507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Wooldridge, Abigail R., Pascale Carayon, Peter Hoonakker, Albert Musa, and Philip Bain. "Technology-Mediated Communication between Patients and Primary Care Clinicians and Staff." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 556–60. http://dx.doi.org/10.1177/1541931213601128.

Full text
Abstract:
Health information technology, i.e. secure messaging, can support high-quality, efficient care. Secure messaging – encrypted communication between patient and clinician or staff, similar to email – can facilitate patient-reported information and communication, but its fit with clinical workflow is not understood. Fifteen primary care clinicians and staff were interviewed and observed over 35 hours to understand the impact of secure messaging on ambiguity within the care delivery workflow. We developed a general workflow diagram for secure messaging, and identified three types of ambiguity relating to workflow, content of communication, and multiple points of data entry. While the use of secure messaging can help to clarify and document patient information, it can also increase ambiguity, particularly relating to the organization of work and workflow. Understanding how to design and implement technology to support multiple stakeholders, including patients, while considering the work system is a major area for future research.
APA, Harvard, Vancouver, ISO, and other styles
25

K M, Meghana, and Manjunath C R. "SURVEY ON DESIGN OF PATIENT BLOOD PRESSURE MONITORING SYSTEM USING SECURE IOT." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 86–90. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3359.

Full text
Abstract:
Blood Pressure Monitoring using sensor and cloud technology, Personal biological readings such as blood pressure are collected by sensor networks device from patients at homes and will be transmitted to cloud and get treated accordingly. It is very important that privacy of patient’s medical condition is protected while data are being transmitted over the public network as well as when they are stored in servers. In this paper, a unique Cryptography technique has been used, Cryptography allows privacy of data that is transmitted. This will ensure that it is implemented for small foot print using IOT for secure data transmission. While data is transmitting to cloud Doctor will get email/message notification and Doctor can also view the Patient Blood Pressure Record stored in cloud.
APA, Harvard, Vancouver, ISO, and other styles
26

Osliak, Oleksii, Andrea Saracino, and Fabio Martinelli. "A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing." Information & Computer Security 27, no. 5 (November 11, 2019): 687–710. http://dx.doi.org/10.1108/ics-01-2019-0011.

Full text
Abstract:
Purpose This paper aims to propose a structured threat information expression (STIX)-based data representation for privacy-preserving data analysis to report format and semantics of specific data types and to represent sticky policies in the format of embedded human-readable data sharing agreements (DSAs). More specifically, the authors exploit and extend the STIX standard to represent in a structured way analysis-ready pieces of data and the attached privacy policies. Design/methodology/approach The whole scheme is designed to be completely compatible with the STIX 2.0 standard for cyber-threat intelligence (CTI) representation. The proposed scheme will be implemented in this work by defining the complete scheme for representing an email, which is more expressive than the standard one defined for STIX, designed specifically for spam email analysis. Findings Moreover, the paper provides a new scheme for general DSA representation that has been practically applied for the process of encoding specific attributes in different CTI reports. Research limitations/implications Because of the chosen approach, the research results may have limitations. Specifically, current practice for entity recognition has the limitation that was discovered during the research. However, its effect on process time was minimized and the way for improvement was proposed. Originality/value This paper has covered the existing gap including the lack of generality in DSA representation for privacy-preserving analysis of structured CTI. Therefore, the new model for DSA representation was introduced, as well as its practical implementation.
APA, Harvard, Vancouver, ISO, and other styles
27

Nurani, Dwi. "Perancangan Aplikasi Email Menggunakan Algoritma Caesar CIPHER dan Base64." JISKA (Jurnal Informatika Sunan Kalijaga) 2, no. 3 (March 22, 2018): 175. http://dx.doi.org/10.14421/jiska.2018.23-07.

Full text
Abstract:
Send news or documents into individual or group communication media. The nature of news or documents are also used to be very secret. Increasingly sophisticated technology makes it increasingly easy to send a message or document. For example, in the advancement of the internet many parties that provide email management services, from sending or receiving also in terms of archiving. Convenience offered technology is not no risk. News or documents sent over the Internet are vulnerable to crime. In order for news or document can be up to the recipient safely and intact then takes the role of cryptography. Cryptography is the science to encrypt a message to make it more secure. In this study, using algorithms and Base64 Cipher Caesar. Caesar algorithm is an algorithm that is old and easily. While Base64 using ASCII format. So that the two algorithms can be used as it is complex. As a result, the security level is higher than not using cryptography. The encryption process and decryption not complicated and does not require a long time. If there are those who are not responsible to know the content of news or documents then he should know the key to reading and ensured key that only the sender and receiver know.
APA, Harvard, Vancouver, ISO, and other styles
28

Johar, Md Gapar Md, Zairina Ibrahim, and Nur Farhana Mohd Hamidi. "Secure Quick Response Based on Dynamic Quick Response Code." Journal of Computational and Theoretical Nanoscience 17, no. 2 (February 1, 2020): 1090–98. http://dx.doi.org/10.1166/jctn.2020.8772.

Full text
Abstract:
This paper aims to explain the nature of quick response (QR) codes and their possible applications in attendance monitoring system at several universities. The aim of this research was to avoid QR code scanning for students who do not attend classes. A QR Code is a two dimensional barcode that is capable of storing a lots of information and various types of information. QR codes have a wide range of uses, including easy storage and transmission of data including web link URLs (Uniform Resource Locators), plain text, email addresses, contact information, SMS or MMS, calendar entries, Wireless network login and more. Based on research and observation, there are many students who like to take a picture of the code and send it to their friends who do not attend the class. There will be an injustice between students attending classes and not attending classes with this problem. Therefore, this research has developed an application of QR code scanner that can scan the QR code whether it is original or copy. In addition, the research has also developed a system of QR code generator and the system will generate the code to become Dynamic QR Code.
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Joy L., Sydney M. Dy, Steven J. Kravet, Bimal H. Ashar, Todd Nesson, and Albert W. Wu. "Patient satisfaction and provider use of electronic communication: A cross-sectional analysis." European Journal for Person Centered Healthcare 5, no. 4 (December 29, 2017): 441. http://dx.doi.org/10.5750/ejpch.v5i4.1352.

Full text
Abstract:
Background: The way patients and providers communicate with one another outside of the clinic is changing. However, little is known about primary care provider perspectives and experiences of these changes and whether these provider behaviors correlate with patient satisfaction. This study examines provider patterns of communication with patients outside of the clinic setting via cellphone, email and text messaging and the relationship between communication behaviors and patient satisfaction. Method: Cross-sectional analysis of the association between patient satisfaction scores and a 16-question community survey of 149 Mid-Atlantic primary care providers in community practice was conducted in the year prior to clinic implementation of a new electronic health record system with secure patient-messaging capabilities.Results: Providers who gave patients their email addresses were more likely to communicate with their patients electronically than those who did not. Providers who made their email addresses available to patients also had significantly higher overall satisfaction scores than those who did not, although there were no statistically significant differences in individual satisfaction domains. The use of these cellphone, email and text-messaging were also not found to be associated with patient satisfaction domains. Conclusions: Provider provision of their email addresses may be an indicator of a stronger relationship with certain patients. This study elucidates the relationship between provider communication behaviors and patient satisfaction. A better understanding of the role of the patient-provider relationship and its role in patient satisfaction may help practices and providers improve their patients’ experience of primary care.
APA, Harvard, Vancouver, ISO, and other styles
30

Bolsin, Stephen N., Tom Faunce, and Mark Colson. "Using portable digital technology for clinical care and critical incidents: a new model." Australian Health Review 29, no. 3 (2005): 297. http://dx.doi.org/10.1071/ah050297.

Full text
Abstract:
The number of patients suffering adverse incidents during treatment in hospitals is not declining. The cost of this poor safety record in Australia is $1 billion to $4.7 billion each year. Quality and safety initiatives focus on promoting adverse event reporting. Major problems include poor reporting of adverse events and lack of clinician involvement. We propose a model for clinician-led reporting based on secure transmission of encrypted data from a programmed personal digital assistant (PDA) to a secure database, leading to automated analysis of clinician-performance data. The programmed PDA also facilitates the reporting of critical incidents. All critical incidents are automatically fed back by email to the organisational quality managers.
APA, Harvard, Vancouver, ISO, and other styles
31

Bennett, Wendy L., Carolyn T. Bramante, Scott D. Rothenberger, Jennifer L. Kraschnewski, Sharon J. Herring, Michelle R. Lent, Jeanne M. Clark, et al. "Patient Recruitment Into a Multicenter Clinical Cohort Linking Electronic Health Records From 5 Health Systems: Cross-sectional Analysis." Journal of Medical Internet Research 23, no. 5 (May 27, 2021): e24003. http://dx.doi.org/10.2196/24003.

Full text
Abstract:
Background There is growing interest in identifying and recruiting research participants from health systems using electronic health records (EHRs). However, few studies have described the practical aspects of the recruitment process or compared electronic recruitment methods to in-person recruitment, particularly across health systems. Objective The objective of this study was to describe the steps and efficiency of the recruitment process and participant characteristics by recruitment strategy. Methods EHR-based eligibility criteria included being an adult patient engaged in outpatient primary or bariatric surgery care at one of 5 health systems in the PaTH Clinical Research Network and having ≥2 weight measurements and 1 height measurement recorded in their EHR within the last 5 years. Recruitment strategies varied by site and included one or more of the following methods: (1) in-person recruitment by study staff from clinical sites, (2) US postal mail recruitment letters, (3) secure email, and (4) direct EHR recruitment through secure patient web portals. We used descriptive statistics to evaluate participant characteristics and proportion of patients recruited (ie, efficiency) by modality. Results The total number of eligible patients from the 5 health systems was 5,051,187. Of these, 40,048 (0.8%) were invited to enter an EHR-based cohort study and 1085 were enrolled. Recruitment efficiency was highest for in-person recruitment (33.5%), followed by electronic messaging (2.9%), including email (2.9%) and EHR patient portal messages (2.9%). Overall, 779 (65.7%) patients were enrolled through electronic messaging, which also showed greater rates of recruitment of Black patients compared with the other strategies. Conclusions We recruited a total of 1085 patients from primary care and bariatric surgery settings using 4 recruitment strategies. The recruitment efficiency was 2.9% for email and EHR patient portals, with the majority of participants recruited electronically. This study can inform the design of future research studies using EHR-based recruitment.
APA, Harvard, Vancouver, ISO, and other styles
32

Song, Mingqiu, Penghua Wang, and Peng Yang. "Promotion of secure software development assimilation: stimulating individual motivation." Chinese Management Studies 12, no. 1 (April 3, 2018): 164–83. http://dx.doi.org/10.1108/cms-01-2017-0005.

Full text
Abstract:
Purpose The purpose of this study was to establish a Technology-Organization-Personality model of secure software development (SSD) innovation assimilation at the level of individual motivation. The model identifies individual psychological motivation, which influences innovation assimilation intention and behavior. It constitutes an organizational management view of SSD innovation assimilation from individual psychological motivation perspective. Design/methodology/approach An empirical study was employed to verify the assumption model. Semi-structured user interviews were conducted with some security experts to consult their advice and obtain the measurement scales. And questionnaires were circulated at a focus group meeting and among some software security professionals by email. Of 230 questionnaires that were answered, 215 could be used. IBM SPSS 19.0 and AMOS 17.0 were used alternately to analyze the data. Structural equation model was employed to verify the hypotheses of the model. Findings Results reveal that two types of individual motivation can influence SSD innovation assimilation, namely, potential organization support and individual needs. Furthermore, absorption capability was found to play a regulated function in the transition of SSD assimilation intention to behavior. Originality/value The findings reveal how individual motivation plays an important role in promoting complex innovation assimilation. It fills the gap of the research on organizational assimilation behavior and individual motivation in the context of SSD complex innovation, and provides management of software development organization with empirically based conceptualization to guide their personnel incentive policymaking.
APA, Harvard, Vancouver, ISO, and other styles
33

Shahani, Shaun, Pearl Korenblit, Pauline Thomas, Marian R. Passannante, Richard Carr, and Lynn Davis. "Targeted Secure Messages to Facilitate Access to Tobacco Treatment Counseling for Veterans: Feasibility Study." JMIR Mental Health 5, no. 1 (March 5, 2018): e18. http://dx.doi.org/10.2196/mental.7957.

Full text
Abstract:
Background Studies show that combining nicotine replacement therapy (NRT) with tobacco treatment counseling is most effective for smoking cessation. However, tobacco treatment counseling has been underutilized across the nation. A secure email message sent to patients already taking NRT was hypothesized to increase the utilization of tobacco treatment counseling among Veterans in New Jersey. Secure messaging for communication between patients and providers was implemented through a web-based password-protected, secure messaging account, where Veterans get notified through their personal email when they have a message awaiting them. Objective The main objective of this project was to determine if there was a significant increase in adoption of tobacco treatment counseling among Veterans who received a secure message describing the options for tobacco treatment counseling available to them. Secondary objectives were to demographically characterize Veterans who were and were not enrolled in secure messaging, as well as those who opened or did not open a message. Finally, because the language and content of the messages were changed across project phases, this project also sought to determine (by analysis of response rates) the type of language that was most effective at eliciting a response. Methods Over two phases, messages were sent to two samples of Veterans prescribed NRT within the prior 90 days of each phase. In phase 1, one message was sent in December 2015 (message 1). In phase 2, one message was sent in July 2016 (message 2) and the same message (message 3) was resent in August 2016 to persons who did not open message 2. Messages 2 and 3 were more directive than message 1. Response rates to message 1 versus message 2 were compared. A logistic regression analysis determined effect of age and gender on enrollment in secure messaging across both phases. The effectiveness of each phase at increasing tobacco treatment counseling was analyzed using a McNemar test. Results Message 2, sent to 423 Veterans, had a significantly higher response rate than message 1, sent to 348 Veterans (18%, 17/93 vs 8%, 6/78, P=.04). Phase 2 (ie, messages 2 and 3) significantly increased utilization of tobacco treatment counseling (net increase of six tobacco treatment counseling adopters, P=.04), whereas phase 1 (ie, message 1) did not (net increase of two tobacco treatment counseling adopters, P=.48). Women (odds ratio [OR] 1.6, 95% CI 1.1-2.3) and those aged 30 to 49 years (compared to other age groups) were more likely to be enrolled in secure messaging. Gender and age were not significant predictors of opening or replying to either message. Conclusions Although the effect was small, secure messaging was a useful modality to increase tobacco treatment counseling. Directive content with a follow-up message appeared useful. Female Veterans and/or Veterans aged between 30 and 49 years are more likely to use secure messaging.
APA, Harvard, Vancouver, ISO, and other styles
34

G Rooney, Alasdair, William Hewins, Amie Walker, Lisa Withington, Mairi Mackinnon, Sara Robson, Aimee Green, et al. "INNV-27. BT-LIFE (BRAIN TUMOURS, LIFESTYLE INTERVENTIONS, AND FATIGUE EVALUATION): LESSONS LEARNED FROM RUNNING A NOVEL MULTI-SECTORAL RESEARCH TRIAL." Neuro-Oncology 22, Supplement_2 (November 2020): ii122. http://dx.doi.org/10.1093/neuonc/noaa215.510.

Full text
Abstract:
Abstract BACKGROUND BT-LIFE is a multi-centre RCT of novel lifestyle coaching treatments for fatigued brain tumour patients. To our knowledge it is also the first example of ‘multi-sectoral research’ to combine healthcare, private, and charity sectors in this population. To maximise learning, the trial team devised a structured reflection opportunity to ask, “What went well and what would we do differently next time?” METHOD After trial closedown we convened a six-hour ‘focus group’ for management, principle investigators, research assistants, interventionists, qualitative researchers, trial statisticians, and the funder. Discussion was structured using a ‘timeline’ wall-chart which attendees freely populated with post-it notes summarising learning points from the trial. Minutes were taken in duplicate. RESULTS In total n=19 team members contributed. Many points were study-specific and will be used internally to plan a larger trial. Among points of wider interest, examples of success included: using regular teleconferences to co-ordinate a cohesive and highly collaborative team; obtaining secure nhs.net email addresses to facilitate multi-sectoral communication; and the clear value of employing one part-time research assistant per centre instead of relying on busy clinical staff to recruit. General future learning points included: speak to the prospective sponsor and ethical committees when writing the grant application to avoid pitfalls and facilitate faster opening if funding is secured; consider preceding emails with a phone call to ‘lay the ground’ in time-sensitive situations; identify staff training requirements as early as possible and cascade aggressively; and be sensitive to the fact that inter-sectoral attitudes and practices may vary widely and need actively monitored and managed. Therefore frequent and secure communication, pro-active problem-spotting, and inter-sectoral value alignment appear critical for success. CONCLUSION BT-LIFE provides many useful lessons for anyone interested in running multi-sectoral research.
APA, Harvard, Vancouver, ISO, and other styles
35

Meng, D., and T. Garrido. "C3-4: Primary Care Physician Efficiency in Handling Patient Secure Email and the Impact on Patient Communication and Access." Clinical Medicine & Research 11, no. 3 (September 1, 2013): 150. http://dx.doi.org/10.3121/cmr.2013.1176.c3-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Faruq, Amrul, Khaeruddin Khaeruddin, and Merinda Lestandy. "Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 3 (May 22, 2020): 493. http://dx.doi.org/10.25126/jtiik.2020731869.

Full text
Abstract:
<p class="Abstrak">Surat elektronik atau <em>email</em> merupakan media komunikasi yang sangat populer. Untuk mengirim dan menerima email, diperlukan sebuah penyedia <em>(server)</em> yang di dalamnya terdapat layanan <em>email</em>. <em>Zimbra Collaboration Suite (ZCS)</em> merupakan salah satu aplikasi <em>mail server powerfull</em> yang dapat dipergunakan sebagai aplikasi <em>mail</em> <em>server</em> dalam jumlah user puluhan hingga ribuan. Pada penelitian ini, sistem enkripsi pada Zimbra <em>multiple-mail</em> <em>server</em> menggunakan metode OpenPGP diimplementasikan untuk mengamankan isi <em>email</em> yang dikirim maupun yang diterima, yaitu dengan memanfaatkan <em>public key</em> dan <em>private key</em>. Hasil pengujian menunjukkan metode <em>OpenPGP </em> mampu bekerja dengan baik untuk keamanan sistem pengiriman dan atau penerimaan <em>email</em> pada <em>multi mail server</em>.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Electronic mail or e-mail is a very popular communication medium. To send and receive e-mails, a provider (server) is needed in which there is an e-mail service. Zimbra Collaboration Suite (ZCS) is one powerful mail server application that can be used as a mail server application in the number of users from tens to thousands. In this study, the encryption system on the Zimbra multiple-mail server uses the OpenPGP method to be implemented to secure the contents of e-mails sent and received, namely by using the public key and private key. The test results show that the OpenPGP method works well for the security of the email sending/receiving system on a multi-mail server.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
37

Anandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.

Full text
Abstract:
Today, Email Spam has become a major problem, with Rapid increament of internet users, Email spams is also increasing. People are using email spam for illegal and unethical conducts, phishing and fraud. Sending malicious link through spam emails which can damage the system and can also seek in into your system. Spammer creates a fake profile and email account which is easier for them. These spammers target those peoples who are not aware about frauds. So there is a need to identify the fraud in terms of spam emails. In this paper we will identify the spam by using machine learning algorithms.
APA, Harvard, Vancouver, ISO, and other styles
38

Rahardja, Untung, Eka Purnama Harahap, and Sarah Pratiwi. "Pemanfaatan Mailchimp Sebagai Trend Penyebaran Informasi Pembayaran Bagi Mahasiswa Di Perguruan Tinggi." Technomedia Journal 2, no. 2 (April 22, 2018): 41–54. http://dx.doi.org/10.33050/tmj.v2i2.323.

Full text
Abstract:
Teknologi informasi berkembang makin pesat dan semakin banyak orang yang menggunakan untuk menyelesaikan suatu pekerjaan atau mendapatkan informasi penting, namun masih banyak yang belum dapat merasakan keuntungan dari penggunaan teknologi informasi karena penyebaran informasi belum tercakup baik. Penyebaran informasi biasanya masih dilakukan secara konvensional pasti akan memerlukan banyak kertas dan biaya hanya untuk memberikan informasi tertentu. Saat ini mayoritas pengguna gadget pasti memiliki email, email adalah media yang paling aman dan sangat mudah untuk saling bertukar file data atau hal pribadi lainnya, semestinya kita harus bisa memaksimalkan penggunaan fasilitas yang sudah ada salah satunya yaitu MAILCHIMP. Mailchimp merupakan tool digital marketing yang bisa menjadi trend baru dalam penyebaran informasi yang dapat menyebarkan informasi secara akurat, efektif dan efisien bagi semua kalangan. Dengan adanya Mailchimp sebagai media informasi online akan memudahkan mahasiswa dalam mendapatkan informasi yang diinginkan dan menjadi suatu trend baru di kalangan IT. Sehubungan dengan permasalahan yang ada peneliti menggunakan 2 (dua) metode penelitian yaitu Metode observasi dan metode studi kasus. Diharapkan dengan adanya metode penelitian ini, masalah yang ada dapat terselesaikan dengan baik dan menghasilkan implementasi yang bermanfaat bagi mahasiswa di Perguruan tinggi maupun kalangan luas. Kata kunci : Informasi, Mailchimp, Trend Information technology is expanding rapidly and more and more people are using to complete a job or get important information, but many still can't feel the benefits of using information technology because information dissemination hasn't been covered well. Dissemination of information is usually still done conventionally it will require a lot of paper and cost just to provide certain information. Currently the majority of gadget users must have email, email is the most secure media and very easy to exchange data files or other personal things, we should be able to maximize the use of existing facilities one of which is MAILCHIMP. Mailchimp is a digital marketing tool that can be a new trend in the dissemination of information that can disseminate information accurately, effectively and efficiently for all circles. With Mailchimp as an online information media will facilitate students in getting the desired information and become a new trend among IT. In relation to existing problems, the researcher uses 2 (two) research methods that are observation method and case study method. It is expected that with this research method, the existing problems can be solved well and produce a useful implementation for students in universities and the wider community. Keywords: Information, Mailchimp, Trend
APA, Harvard, Vancouver, ISO, and other styles
39

Alexander, Anu Sara, and L. C. Manikandan. "A Study on Steganography Concealing Data." European Journal of Engineering Research and Science 4, no. 5 (May 23, 2019): 115–18. http://dx.doi.org/10.24018/ejers.2019.4.5.1337.

Full text
Abstract:
Steganography is a process of hiding or concealing confidential information from unauthorized access. Steganography used in various fields such as military, aerospace and industrial applications. Steganography techniques are used for secure transmission of data from sender to receiver. The computer programmers, begins applying steganography techniques to video as well as audio files. This time multimedia data like image, audio, video are used as a cover media by steganography systems because public often send digital pictures in email and other Internet communication. The purpose of this review is to bring the idea of Steganography for young researchers.
APA, Harvard, Vancouver, ISO, and other styles
40

Meng, D., T. E. Palen, J. Tsai, M. McLeod, T. Garrido, and H. Qian. "Association between secure patient-clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study." BMJ Open 5, no. 11 (November 9, 2015): e009557-e009557. http://dx.doi.org/10.1136/bmjopen-2015-009557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mambelli, Marco, Mirica Yancey, and Thomas Hein. "Archival, anonymization and presentation of HTCondor logs with GlideinMonitor." EPJ Web of Conferences 251 (2021): 02012. http://dx.doi.org/10.1051/epjconf/202125102012.

Full text
Abstract:
GlideinWMS is a pilot framework to provide uniform and reliable HTCondor clusters using heterogeneous resources. The Glideins are pilot jobs that are sent to the selected nodes, test them, set them up as desired by the user jobs, and ultimately start an HTCondor schedd to join an elastic pool. These Glideins collect information that is very useful to evaluate the health and efficiency of the worker nodes and invaluable to troubleshoot when something goes wrong. This data, including local stats, the results of all the tests, and the HTCondor log files, is packed and sent to the GlideinWMS Factory. To access this information, developers and troubleshooters must exchange emails with Factory operators and dig manually into files. Furthermore, these files contain also information like email and IP addresses, and user IDs, that we want to protect and limit access to. GlideinMonitor is a Web application to make these logs more accessible and useful: it organizes the logs in an efficient compressed archive; it allows to search, unpack, and inspect them, all in a convenient and secure Web interface; via plugins like the log anonymizer, it can redact protected information preserving the parts useful for troubleshooting.
APA, Harvard, Vancouver, ISO, and other styles
42

Schillinger, Dean, Danielle McNamara, Scott Crossley, Courtney Lyles, Howard H. Moffet, Urmimala Sarkar, Nicholas Duran, et al. "The Next Frontier in Communication and the ECLIPPSE Study: Bridging the Linguistic Divide in Secure Messaging." Journal of Diabetes Research 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1348242.

Full text
Abstract:
Health systems are heavily promoting patient portals. However, limited health literacy (HL) can restrict online communication via secure messaging (SM) because patients’ literacy skills must be sufficient to convey and comprehend content while clinicians must encourage and elicit communication from patients and match patients’ literacy level. This paper describes the Employing Computational Linguistics to Improve Patient-Provider Secure Email (ECLIPPSE) study, an interdisciplinary effort bringing together scientists in communication, computational linguistics, and health services to employ computational linguistic methods to (1) create a novel Linguistic Complexity Profile (LCP) to characterize communications of patients and clinicians and demonstrate its validity and (2) examine whether providers accommodate communication needs of patients with limited HL by tailoring their SM responses. We will study >5 million SMs generated by >150,000 ethnically diverse type 2 diabetes patients and >9000 clinicians from two settings: an integrated delivery system and a public (safety net) system. Finally, we will then create an LCP-based automated aid that delivers real-time feedback to clinicians to reduce the linguistic complexity of their SMs. This research will support health systems’ journeys to become health literate healthcare organizations and reduce HL-related disparities in diabetes care.
APA, Harvard, Vancouver, ISO, and other styles
43

Alamri, Sultan. "An Efficient Approach for Exchanging Exam Contents in E-Learning Institutions." International Journal of Emerging Technologies in Learning (iJET) 12, no. 11 (November 16, 2017): 83. http://dx.doi.org/10.3991/ijet.v12i11.7180.

Full text
Abstract:
In some e-learning and blended-learning institutions, such as the Saudi Electronic University (SEU) in Saudi Arabia, prior to the students undertaking exams, the exam questions are distributed to and shared among faculty members. This is done by email which poses a high security risk. Moreover, there is the issue of latency and problems associated with the organization of the exams. Therefore, this paper presents a system to secure the digital content of exam questions and their transmission in e-learning institutions, enabling the control of access to content with suitable management features for security, auditing, and archiving using leading technology solutions for content management and security.
APA, Harvard, Vancouver, ISO, and other styles
44

S, Murali, Manimaran A, Selvakumar K, and Dinesh Kumar S. "Hashing based Hybrid Online Voting Using Amazon Web Services." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 295. http://dx.doi.org/10.14419/ijet.v7i4.10.20915.

Full text
Abstract:
The secured web-based voting framework is the need of the present time. We propose another secure authentication for the online voting framework by utilizing face recognition and hashing algorithm. A simple verification process is accomplished during the initial registration process via email and phone. The voter is asked to give a unique identification number (UIN) provided by the election authority and face image at the time of main registration. This UIN is converted into a secret key using the SHA algorithm. The face image that is saved in the Amazon web service (AWS) acts as an authentication mechanism which enables people to cast their vote secretly. The voters, who cast numerous votes amid the way toward voting is guaranteed to be counteracted by encrypted UIN. The election organizers can see the election parallelly as the voting is saved in the real-time database. The privacy of the voter is maintained as the details are converted into the key. In this system, an individual can vote from outside of his/her allocated constituency.
APA, Harvard, Vancouver, ISO, and other styles
45

Baghramyan, R. "An Application of Grice’s Cooperative Principle to the Analysis of a Written Business Negotiation Model." Science and Education a New Dimension IX(253), no. 45 (June 25, 2021): 66–69. http://dx.doi.org/10.31174/send-hs2021-253ix45-02.

Full text
Abstract:
This article focuses on institutional discourse pragmatics, highlighting its salient features in a business to customer negotiation model, based on an authentic business correspondence (email), through a prism of H. Grice’s Theory of Cooperative Principle. The central thrust of this theory is the application of the maxims of Quantity, Quality, Relation and Manner to speech acts to secure identification of participants’ intentions and sentence meaning, excluding irrelevancies throughout the communication process. Any kind of interaction in our life is accompanied by diverse tangible and intangible components. The role, function and impact of these aggregate components on the natural flow of communication irrespective of the form (oral/written) are the concern of pragmatics.
APA, Harvard, Vancouver, ISO, and other styles
46

Joshi, Sanjaya. "HIPAA, HIPAA, Hooray?: Current Challenges and Initiatives in Health Informatics in the United States." Biomedical Informatics Insights 1 (January 2008): BII.S2007. http://dx.doi.org/10.4137/bii.s2007.

Full text
Abstract:
A review of the current challenges, trends and initiatives around the various regulations as related to Health Informatics in the United States is presented. A summary of the functions in a workflow-based approach organized into the process and compliance for HIPAA, secure email and fax communications interfaces, e-prescriptions and patient safety and the health information technology savings claims versus costs follows: • HIPAA compliance is complex; data interoperability and integration remains difficult. • Email and faxing is possible with current over-the-shelf technologies within the purview of the HIPAA Security and Privacy rule. • Integration of e-prescribing and NPI data is an area where health informatics can make a real difference. • Medical errors remain high. • There are no real savings yet from the usage of health information technologies; the costs for implementation remain high, and the business model has not evolved to meet the needs. • Health Information Technology (Health IT) projects continue to have a significant failure rate; Open Source technologies are a viable alternative both for cost reduction and scalability. A discussion on the macro view of health informatics is also presented within the context of healthcare models and a comparison of the U.S. system against other countries.
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Shuai, and Nicholas Hopper. "Mailet: Instant Social Networking under Censorship." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (April 1, 2016): 175–92. http://dx.doi.org/10.1515/popets-2016-0011.

Full text
Abstract:
Abstract Social media websites are blocked in many regimes where Internet censorship is applied. In this paper, we introduce Mailet, an unobservable transport proxy which enables the users to access social websites by email applications. Without assuming the Mailet servers are trustworthy, Mailet can support the services requiring privileges without having the complete credential. Particularly, the credential is split and distributed in two Mailet servers, and neither of them can recover the credential alone. To recover the credential in a TLS record message, we propose a highly efficient Galois/ Counter Mode(GCM) based secure computation, which can enable the two servers to conceal their separate credential copies in the computation. We implemented a prototype for Twitter.com to demonstrate the usability and security of Mailet.
APA, Harvard, Vancouver, ISO, and other styles
48

Campling, Hannah, and Dominic Aubrey-Jones. "On-call handover ‘– if it isn't documented then it didn't happen’." BJPsych Open 7, S1 (June 2021): S177—S178. http://dx.doi.org/10.1192/bjo.2021.483.

Full text
Abstract:
Aims1. To standardise the doctor handovers for on-call duties2. To ensure there is documented evidence of handover taking place at the end of each shiftBackgroundSince the introduction of the European working time directive the amount of hours that doctors are allowed to work has been reduced, resulting in increased handovers between teams. The National Patient Safety Committee and General Medical Council have recognised that this means we need to ensure handovers are as safe and robust as possible to ensure that patient safety is not compromised. A recent serious investigation report carried out at Chase Farm Hospital, London identified a lack of formalised handover between doctors as a contributing factor leading to patient harm. One of the recommendations of the report was for a Quality Improvement Project to be carried out in order to formalise handover.The handover procedure at Chase Farm Hospital for core trainee doctors 'on-call' prior to this QIP was not standardised and consisted of an informal, verbal handover. Frustrations had been raised by doctors and other staff members that this current method of handover was unreliable and unsafe.MethodWe sent out a questionnaire about handover to all doctors on the on-call rota to help establish what intervention would be appropriate.We then performed a retrospective collection of documented handovers within a two month time period.Our intervention was to introduce an email handover procedure.Following a two month trial of this intervention, we resent the questionnaire and performed a second retrospective collection of handover documentation.ResultPrior to this QIP we found that 0% of on call handovers were being formally documented. After the introduction of our handover email 88% of handovers were being formally documented using the handover email.Satisfaction with the handover procedure went from 0% being very satisfied and only 33% being satisfied to 50% being satisfied and 50% being very satisfied.ConclusionA standardised and documented handover procedure is crucial for patient safety and to allow doctors to communicate jobs effectively with each other.A secure email for handover is a successful way of formalising the handover process.Limitations include:Access to the handover email for new staff or locum staff.Ensuring that doctors who aren't on the on-call rota know how to use it to handover their ward jobs.
APA, Harvard, Vancouver, ISO, and other styles
49

Arin, Ikrar Adinata, and J. Rolles Herwin Sihombing. "Perancangan Sistem Informasi Rekonsiliasi Transaksi (Bank Xyz)." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 311. http://dx.doi.org/10.21512/comtech.v5i1.2627.

Full text
Abstract:
Banking world wants to help companies accelerate transaction receipts and disbursements, of the money they save in the bank. Bank account is a means to save money and transact safely and practically. If there is a large payment to the supplier, the company does not need to carry a lot of cash to the suppliers place, simply by giving a check to the supplier, and vice versa. E-Reconciliation is a service from XYZ Bank in the form of a delivery payment transaction data to the customer server periodically. Data delivery, safe and secure, to customers is an important factor in the process of reconciliation, one safe and secure way is to send the reconciliation report via encrypted email facility. With the delivery of the payment transaction data, customers can automatically reconcile the data. E-Reconciliation including new services in banking and is expected to add value to XYZ Bank among other competitors. In addition, it is expected to be many dealers and sub-dealer/reseller of customers who are interested in using E-Reconciliation services, so as to improve the balance of CASA.
APA, Harvard, Vancouver, ISO, and other styles
50

Tually, Peter, Johan Janssen, Simon Cowell, and John Walker. "A preliminary assessment of Internet-based nuclear telecardiology to support the clinical management of cardiac disease in a remote community." Journal of Telemedicine and Telecare 9, no. 1_suppl (June 2003): 69–71. http://dx.doi.org/10.1258/135763303322196411.

Full text
Abstract:
summary A portable nuclear medicine (NM) processing system was established in Kalgoorlie and an acute myocardial perfusion scintigraphy (MPS) service was provided for the local regional hospital. After scanning the patient, the data were processed on a laptop computer and JPEG images were transmitted to a secure Web server. A secure email message, with the URL link enclosed and a provisional indication of normal or abnormal findings, was sent to the referring clinician from the NM facility. Use of the Internet allowed for a group consultation between the NM technician, the referrer and the cardiologist in Perth. During a three-month study period, 42 patients were referred for exclusion of acute coronary syndrome. Of these, 21 (50%) demonstrated abnormal perfusion studies, two of which were classified as requiring urgent medical intervention. Seventeen studies were normal (41%) and four (10%) were designated equivocal. There was an alteration in the treatment plan for 32 patients (76%), including four for whom admission or further investigation was deemed unwarranted. The results suggest that MPS findings, distributed via the Internet, allow for earlier risk stratification and have a direct affect on clinical decision making.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography