메뉴 건너뛰기




Volumn 7, Issue 3, 2011, Pages 382-387

Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns

Author keywords

E healfh; Health informatics; M healfh; Patient records; Privacy; Security; Telemedicine

Indexed keywords

ATTITUDE TO HEALTH; BIOMETRY; COMPUTER SECURITY; COMPUTER SYSTEM; CONFIDENTIALITY; COST EFFECTIVENESS ANALYSIS; CRYPTOGRAPHIC TECHNOLOGY; DEMOGRAPHY; DOCTOR PATIENT RELATION; ELECTRONIC HEALTH SYSTEM; ELECTRONIC MEDICAL RECORD; ENCRYPTION METHOD; GRAPHIC PASSWORD; HEALTH CARE ACCESS; HEALTH CARE DELIVERY; HEALTH CARE MANAGEMENT; HEALTH CARE PLANNING; HEALTH CARE SYSTEM; HEALTH PRACTITIONER; HUMAN; INFORMATION PROCESSING; INFORMATION TECHNOLOGY; INFORMED CONSENT; INTERNET; LEGAL ASPECT; MEDICAL ETHICS; MEDICAL INFORMATION; MEDICAL INFORMATION SYSTEM; MEDICAL RESEARCH; MOBILE HEALTH SYSTEM; PRIVACY; PROCESS DEVELOPMENT; PROFESSIONAL SECRECY; REVIEW; SMART CARD; SOCIAL NETWORK; SOCIAL SECURITY; TELEMEDICINE; THREAT; VALIDATION PROCESS;

EID: 79957791790     PISSN: 18117775     EISSN: 18125700     Source Type: Journal    
DOI: 10.3923/ijp.2011.382.387     Document Type: Review
Times cited : (60)

References (45)
  • 2
    • 78049301707 scopus 로고    scopus 로고
    • Evaluating the vulnerability and the security of public organizations websites in Jordan
    • Abu Ali, A.N., A.K. Alnaimat and H.Y. Abu-Addose, 2010. Evaluating the vulnerability and the security of public organizations websites in Jordan. J. Applied Sci., 10: 2447-2453.
    • (2010) J. Applied Sci. , vol.10 , pp. 2447-2453
    • Abu Ali, A.N.1    Alnaimat, A.K.2    Abu-Addose, H.Y.3
  • 3
    • 74349117323 scopus 로고    scopus 로고
    • A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
    • Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
    • (2010) J. Applied Sci. , vol.10 , pp. 59-64
    • Ahmed, M.A.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4
  • 4
    • 77649155870 scopus 로고    scopus 로고
    • Arabic text steganography using kashida extensions with huffman code
    • Al-Azawi, A.F. and MA. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    • (2010) J. Applied Sci. , vol.10 , pp. 436-439
    • Al-Azawi, A.F.1    Fadhil, M.A.2
  • 5
    • 78951479954 scopus 로고    scopus 로고
    • Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
    • Alain, G.M., M.L.M. Kiah, B.B. Zaidan, AA. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
    • (2010) Sci. Res. Essays. , vol.5 , pp. 3254-3260
    • Alain, G.M.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4    Alanazi, H.O.5
  • 7
    • 78049468900 scopus 로고    scopus 로고
    • Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
    • Alanazi, H.O., HA. Jalab, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010b. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
    • (2010) J. Med. Plants Res. , vol.4 , pp. 2059-2074
    • Alanazi, H.O.1    Jalab, H.A.2    Alam, G.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 8
    • 77649295235 scopus 로고    scopus 로고
    • A study of neural network and its properties of training and adaptability in enhancing accuracy in a multimodal biometrics scenario
    • Alsaade, F., 2010. A study of neural network and its properties of training and adaptability in enhancing accuracy in a multimodal biometrics scenario. Inform. Technol. J., 9: 188-191.
    • (2010) Inform. Technol. J. , vol.9 , pp. 188-191
    • Alsaade, F.1
  • 10
    • 75949107726 scopus 로고    scopus 로고
    • A novel hybrid protection technique of privacy-preserving data mining and anti-data mining
    • Chen, T.S., J. Chen and Y.H. Kao, 2010. A novel hybrid protection technique of privacy-preserving data mining and anti-data mining. Inform. Technol. J., 9: 500-505.
    • (2010) Inform. Technol. J. , vol.9 , pp. 500-505
    • Chen, T.S.1    Chen, J.2    Kao, Y.H.3
  • 11
    • 79953076040 scopus 로고    scopus 로고
    • How strong are passwords used to protect personal health information in clinical trials
    • El-Emam, K, K. Moreau and E. Jonker, 2011. How strong are passwords used to protect personal health information in clinical trials. J. Med. Internet Res., 13: el8-el8.
    • (2011) J. Med. Internet Res. , vol.13
    • El-Emam, K.1    Moreau, K.2    Jonker, E.3
  • 12
    • 77954825170 scopus 로고    scopus 로고
    • Technoscience in crime detection and control: Areview
    • Eneh, O.C., 2010. Technoscience in crime detection and control: Areview. J. Applied Sci., 10: 1873-1884.
    • (2010) J. Applied Sci. , vol.10 , pp. 1873-1884
    • Eneh, O.C.1
  • 14
    • 79953076038 scopus 로고    scopus 로고
    • Review of extracting information from the social web for health personalization
    • Fernandez-Luque, L., R. Karlsen and J. Bonander, 2011. Review of extracting information from the social web for health personalization. J. Med. Internet Res., 13: el5-el5.
    • (2011) J. Med. Internet Res. , vol.13
    • Fernandez-Luque, L.1    Karlsen, R.2    Bonander, J.3
  • 15
    • 67649447229 scopus 로고    scopus 로고
    • Issues of E-banking transaction: An empirical investigation on malaysian customers perception
    • Haque, A., A. Zaki-Hj-Ismail and A.H. Daraz, 2009. Issues of E-banking transaction: An empirical investigation on malaysian customers perception. J. Applied Sci., 10: 1870-1879.
    • (2009) J. Applied Sci. , vol.10 , pp. 1870-1879
    • Haque, A.1    Zaki-Hj-Ismail, A.2    Daraz, A.H.3
  • 16
    • 77649311367 scopus 로고    scopus 로고
    • Improving speaker verification in noisy environments using adaptive filtering and hybrid classification technique
    • Ilyas, M.Z., SA. Samad, A. Hussain and KA. Ishak, 2010. Improving speaker verification in noisy environments using adaptive filtering and hybrid classification technique. Inform. Technol. J., 9: 107-115.
    • (2010) Inform. Technol. J. , vol.9 , pp. 107-115
    • Ilyas, M.Z.1    Samad, S.A.2    Hussain, A.3    Ishak, K.A.4
  • 17
    • 34249818187 scopus 로고    scopus 로고
    • E-data privacy and the personal data protection bill of Malaysia
    • Jawahitha, S., M. Ishak and M. Mazahir, 2007. E-data privacy and the personal data protection bill of Malaysia. J. Applied Sci., 7: 732-742.
    • (2007) J. Applied Sci. , vol.7 , pp. 732-742
    • Jawahitha, S.1    Ishak, M.2    Mazahir, M.3
  • 18
    • 78049441050 scopus 로고    scopus 로고
    • Government to E-government to E-society
    • Jayashree, S. and G. Marthandan, 2010. Government to E-government to E-society. J. Applied Sci., 10: 2205-2210.
    • (2010) J. Applied Sci. , vol.10 , pp. 2205-2210
    • Jayashree, S.1    Marthandan, G.2
  • 19
    • 79953117817 scopus 로고    scopus 로고
    • Using metrics to describe the participative stances of members within discussion forums
    • Jones, R, S. Sharkey, J. Smifhson, T. Ford and T. Emmens et al, 2011. Using metrics to describe the participative stances of members within discussion forums. J. Med. Internet Res., 13: e3-e3.
    • (2011) J. Med. Internet Res. , vol.13
    • Jones, R.1    Sharkey, S.2    Smifhson, J.3    Ford, T.4    Emmensx, T.5
  • 20
    • 62749135544 scopus 로고    scopus 로고
    • Feasibility and critical success factors in implementing telemedicine
    • Judi, H.M., A. A. Razak, N. Shaari and H. Mohamed, 2009. Feasibility and critical success factors in implementing telemedicine. Inform. Technol. J., 8: 326-332.
    • (2009) Inform. Technol. J. , vol.8 , pp. 326-332
    • Judi, H.M.1    Razak, A.A.2    Shaari, N.3    Mohamed, H.4
  • 21
    • 75949130126 scopus 로고    scopus 로고
    • A security routing optimization scheme for multi-hop wireless networks
    • Jun, D. and L.W. Hua, 2010. A security routing optimization scheme for multi-hop wireless networks. Inform. Technol. J., 9: 506-511.
    • (2010) Inform. Technol. J. , vol.9 , pp. 506-511
    • Jun, D.1    Hua, L.W.2
  • 22
    • 78149334915 scopus 로고    scopus 로고
    • A fuzzy inference system for diagnosis of hypothyroidism
    • Khanale, P.B. and R.P. Ambilwade, 2011. A fuzzy inference system for diagnosis of hypothyroidism. J. Artificial Intel., 4: 45-54.
    • (2011) J. Artificial Intel. , vol.4 , pp. 45-54
    • Khanale, P.B.1    Ambilwade, R.P.2
  • 24
    • 70349667572 scopus 로고    scopus 로고
    • The security snalysis and enhancement of photographic authentication
    • Liao, H.C., C.H. Hsieh, C.W. Chen and W.C. Chen, 2009. The security snalysis and enhancement of photographic authentication. Inform. Technol. J., 8: 1170-1179.
    • (2009) Inform. Technol. J. , vol.8 , pp. 1170-1179
    • Liao, H.C.1    Hsieh, C.H.2    Chen, C.W.3    Chen, W.C.4
  • 26
    • 78651376869 scopus 로고    scopus 로고
    • Joint secret sharing and data hiding for block truncation coding compressed image transmission
    • Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
    • (2011) Inform. Technol. J. , vol.10 , pp. 681-685
    • Luo, H.1    Zhao, Z.2    Lu, Z.M.3
  • 27
    • 62749124406 scopus 로고    scopus 로고
    • A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on
    • Meng, B., 2009a. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8: 302-309.
    • (2009) Internet Voting Protocol. Inform. Technol. J. , vol.8 , pp. 302-309
    • Meng, B.1
  • 28
    • 67651065167 scopus 로고    scopus 로고
    • Formalizing deniability
    • Meng, B., 2009b. Formalizing deniability. Inform. Technol. J., 8: 625-642.
    • (2009) Inform. Technol. J. , vol.8 , pp. 625-642
    • Meng, B.1
  • 29
    • 72449173949 scopus 로고    scopus 로고
    • Internet banking service adoption: Private bank versus governmental bank
    • Mirza, A.P., A. Wallstrom, M.T.H. Beheshti and O.P. Mirza, 2009. Internet banking service adoption: Private bank versus governmental bank. J. Applied Sci., 9: 4206-4214.
    • (2009) J. Applied Sci. , vol.9 , pp. 4206-4214
    • Mirza, A.P.1    Wallstrom, A.2    Beheshti, M.T.H.3    Mirza, O.P.4
  • 30
    • 78651373987 scopus 로고    scopus 로고
    • Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model
    • Meng, B. and F. Shao, 2010. Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model. Inform. Technol. J., 10: 611-625.
    • (2010) Inform. Technol. J. , vol.10 , pp. 611-625
    • Meng, B.1    Shao, F.2
  • 32
    • 77954777652 scopus 로고    scopus 로고
    • Online hand signature verification: A review
    • Sayeed, S., A. Samraj, R. Besar and J. Hossen, 2010. Online hand signature verification: A review. J. Applied Sci., 10: 1632-1643.
    • (2010) J. Applied Sci. , vol.10 , pp. 1632-1643
    • Sayeed, S.1    Samraj, A.2    Besar, R.3    Hossen, J.4
  • 33
    • 77955817289 scopus 로고    scopus 로고
    • The changing role of accounting in the health care industry
    • Seetharaman, A., J.R. Raj and A.S. Saravanan, 2010. The changing role of accounting in the health care industry. Res. J. Bus. Manage., 4: 91-102.
    • (2010) Res. J. Bus. Manage. , vol.4 , pp. 91-102
    • Seetharaman, A.1    Raj, J.R.2    Saravanan, A.S.3
  • 35
    • 67649607300 scopus 로고    scopus 로고
    • An elliptic curve-based signcryption scheme with forward secrecy
    • Toorani, M. and A. A. Beheshti Shirazi, 2009. An elliptic curve-based signcryption scheme with forward secrecy. J. Applied Sci., 9: 1025-1035.
    • (2009) J. Applied Sci. , vol.9 , pp. 1025-1035
    • Toorani, M.1    Beheshti Shirazi, A.A.2
  • 36
    • 38949208244 scopus 로고    scopus 로고
    • Performance evaluation of mobile ad hoc network based communications for future mobile tele-emergency system
    • Viswacheda, D.V., L. Barukang, M.Y. Hamid and M.S. Arifianto, 2007. Performance evaluation of mobile ad hoc network based communications for future mobile tele-emergency system. J. Applied Sci., 7: 2111-2119.
    • (2007) J. Applied Sci. , vol.7 , pp. 2111-2119
    • Viswacheda, D.V.1    Barukang, L.2    Hamid, M.Y.3    Arifianto, M.S.4
  • 37
    • 79957856706 scopus 로고    scopus 로고
    • Unconditional security of cryptosystem: A review and outlook
    • Wang, Y., 2011. Unconditional security of cryptosystem: A review and outlook. Trends Applied Sci. Res., 6: 554-562.
    • (2011) Trends Applied Sci. Res. , vol.6 , pp. 554-562
    • Wang, Y.1
  • 38
    • 77953842860 scopus 로고    scopus 로고
    • Sharing medical data for health research: The early personal health record experience
    • Weitzman, E.R., L. Kaci and K.D. Mandl, 2010. Sharing medical data for health research: The early personal health record experience. J. Med. Internet Res., 12: el4-el4.
    • (2010) J. Med. Internet Res. , vol.12
    • Weitzman, E.R.1    Kaci, L.2    Mandl, K.D.3
  • 40
    • 77954826595 scopus 로고    scopus 로고
    • Investigate the capability of applying hidden data in text file: An overview
    • Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and HA. Jalab, 2010a. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
    • (2010) J. Applied Sci. , vol.10 , pp. 1916-1922
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Fraja, A.K.3    Jalab, H.A.4
  • 41
    • 77954833269 scopus 로고    scopus 로고
    • An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael
    • Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and HA. Jalab, 2010b. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
    • (2010) J. Applied Sci. , vol.10 , pp. 2161-2167
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Frajat, A.K.3    Jalab, H.A.4
  • 42
    • 78649273195 scopus 로고    scopus 로고
    • Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem
    • Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, K.M.S. Mustafa, G.M. Alam and HA. Jalab, 2010c. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1992-2000.
    • (2010) Int. J. Phys. Sci. , vol.5 , pp. 1992-2000
    • Zaidan, A.A.1    Zaidan, B.B.2    Taqa, A.Y.3    Mustafa, K.M.S.4    Alam, G.M.5    Jalab, H.A.6
  • 43
    • 77957325769 scopus 로고    scopus 로고
    • Novel approach for high (Secure and rate) data hidden within triplex space for non multimedia file
    • Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010d. Novel approach for high (Secure and rate) data hidden within triplex space for non multimedia file. Sci. Res. Essays, 5: 1965-1977.
    • (2010) Sci. Res. Essays. , vol.5 , pp. 1965-1977
    • Zaidan, A.A.1    Zaidan, B.B.2    Alanazi, H.O.3    Gani, A.4    Zakaria, O.5    Alam, G.M.6
  • 44
    • 78649299082 scopus 로고    scopus 로고
    • StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
    • Zaidan, B.B., AA. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and HA. Jalab, 2010e. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci., 5: 1796-1806.
    • (2010) Int. J. Phys. Sci. , vol.5 , pp. 1796-1806
    • Zaidan, B.B.1    Zaidan, A.A.2    Taqa, A.3    Alam, G.M.4    Kiah, M.L.M.5    Jalab, H.A.6
  • 45
    • 77954783981 scopus 로고    scopus 로고
    • On the differences between hiding information and cryptography techniques: An overview
    • Zaidan, B.B., AA. Zaidan, A.K. Al-Frajat and HA. Jalab, 2010f. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    • (2010) J. Applied Sci. , vol.10 , pp. 1650-1655
    • Zaidan, B.B.1    Zaidan, A.A.2    Al-Frajat, A.K.3    Jalab, H.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.