Filters








84,748 Hits in 4.8 sec

HEALTHCARE IT: IS YOUR INFORMATION AT RISK?

Kimmarie Donahue, Syed (Shawon) M. Rahman
2019 Zenodo  
of individuals it also provides the criminal element more opportunities to access sensitive information, such as patient protected health information (PHI) and Personal identification Information (PII  ...  Having an Information Assurance (IA) programallows for the protection of information and information systems andensures the organization is in compliance with all requires regulations, laws and directive  ...  their jobs and over half admitted they downloaded sensitive data in order to try to use it at their next position [6] .  ... 
doi:10.5281/zenodo.3582602 fatcat:hbeovrrui5ggpp2oclyr7qzxxq

Secure Mobile E-Business Applications

Hala A. Alrumaih
2015 Zenodo  
It reviews and compares two different frameworks for security assurance in mobile e-business applications.  ...  The security risks associated with mobile devices and applications are very significant.  ...  [26] proposed a security approach and a prototype solution that aims to secure the transmission and access to personal and financial data over different networks through mobile devices anywhere and  ... 
doi:10.5281/zenodo.1099034 fatcat:pb7bkjkrxbfp3oq2xrla74tz7m

A Decentralized Personal Data Store based on Ethereum: Towards GDPR Compliance

Marco Alessi, Alessio Camillò, Enza Giangreco, Marco Matera, Stefano Pino, Davide Storelli
2019 Journal of Communications Software and Systems  
The problem becomes even more complicate if we try to consider the devices around us: how to share devices we own, so that we can receive pervasive services, based on our contexts and device functionalities  ...  In this paper we describe our decentralized approach in sharing personal data in the era of smart devices, being those considered sensitive data as well.  ...  and sensitive data.  ... 
doi:10.24138/jcomss.v15i2.696 fatcat:lkvamnizefdmxod4526qzcxsom

HOW TO BE RISK-FREE IN DOING ONLINE TRANSACTIONS

Mark Stephen A. Guevara, Irene J. Rivera
2020 Zenodo  
This also discussed what risk of fraud is when transacting online and the different types of fraud one might possibly experience.  ...  Further, some financial institutions and e-wallet in the Philippines who have been practicing Data Privacy have been cited.  ...  Security of the Personal Information Personal information acquired must treated accordingly and used properly to assure the data subject that its in responsible hands.  ... 
doi:10.5281/zenodo.3709051 fatcat:dr2zemi6zfg2xgfywndyt6zh3m

A security architecture for transient trust

Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen
2008 Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08  
Interaction among subjects in different partitions is controlled by a high assurance separation kernel, and efficient use of devices is achieved through the application of a three-part device model.  ...  sources, gathering and maintaining the data needed, and completing and reviewing the collection of information.  ...  through communication devices or other objects, is controlled completely by the separation kernel, with kernel assurance.  ... 
doi:10.1145/1456508.1456510 dblp:conf/ccs/IrvineLCN08 fatcat:yqjtytmbkjdgdnh5yysg7dd3ta

Use of On-Site Testing for Drugs of Abuse

Stephen George, Robin A Braithwaite
2002 Clinical Chemistry  
data and may yield false-positive or -negative results.  ...  Conclusions: Near-patient testing devices for drugs of abuse could be an expensive and potentially inaccurate means to monitor patient treatment and drug abuse status.  ...  quality-control and quality-assurance policies.  ... 
doi:10.1093/clinchem/48.10.1639 fatcat:mszbx3k5pjexdgv6lryrscplem

A study on the development method for trust-based activation in internet of things

Kyong-jin Kim, Seng-phil Hong
2014 Contemporary Engineerng Sciences  
The IoT is to connect a variety of things between the physical world and the digital one. Such environment has raised concerns about security challenges in the IoT, though.  ...  Namely, the foundation of IoT applications is sensitive data provided by users and their devices.  ...  devices and platforms, and so on.  ... 
doi:10.12988/ces.2014.411230 fatcat:giqpiqc6b5cdpbd5mjawkaxysq

Protecting clinical data on Web client computers: the PCASSO approach

D R Masys, D B Baker
1998 Proceedings. AMIA Symposium  
The Patient Centered Access to Secure Systems Online (PCASSO) project extends the protections for person-identifiable health data on Web client computers.  ...  PCASSO uses several approaches, including physical protection of authentication information, execution containment, graphical displays, and monitoring the client system for intrusions and co-existing programs  ...  PCASSO employs a client-server model, consisting of a high-assurance secure server running on Data General's B2 DG/UX OS and a client running on Windows 95 and accessed through a Netscape or Microsoft  ... 
pmid:9929243 pmcid:PMC2232202 fatcat:vbnp4nen4ve67efs5sd7xc3tpq

Patient Privacy Decision Making in the Health Big Data Era

Jieun Shin
2017 International Conference on Information Systems  
Specifically, this paper establishes a new link between QS (Quantified-Self) data and online healthcare data, based on privacy sharing decisions.  ...  The rapidly growing use of healthcare wearable devices has spurred the increased supply of personal health information.  ...  the impact of information sharing on a precision medication and health management.  ... 
dblp:conf/icis/Shin17 fatcat:s3vmkxdtvvcsxm2jmxm5bn3stu

Privacy in the clouds

Ann Cavoukian
2008 Identity in the Information Society  
Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others.  ...  Identity data is increasingly being generated, used and stored entirely in the networked "Cloud", where it is under control of third parties.  ...  Acknowledgements The author would like to acknowledge and thank IBM Research Systems & Software experts, in particular, Dr. Jan Camenisch, Anthony Nadalin, Michael R. Nelson and Dr.  ... 
doi:10.1007/s12394-008-0005-z fatcat:axlydx6e3vaqjm2dluraqd32g4

Learning Internet-of-Things Security "Hands-On"

Constantinos Kolias, Angelos Stavrou, Jeffrey Voas, Irena Bojanova, Richard Kuhn
2016 IEEE Security and Privacy  
The fast productization of IoT technologies is leaving users vulnerable to security and privacy risks.  ...  Disclaimer Certain products are identified in this document to describe the work conducted, but identification doesn't imply that the National Institute of Standards and Technology recommends or endorses  ...  A breach of one service might result in loss of sensitive user information (such as health data and sleep habits) and remote control of home appliances. Insecure network services.  ... 
doi:10.1109/msp.2016.4 fatcat:wppiq3itgneczbjganoqmyu564

Department of Defense Trusted Computer System Evaluation Criteria [chapter]

1985 The 'Orange Book' Series  
Lee, Sperry UNIVAC, who as original architects formulated and articulated the technical issues and solutions presented in this document;  ...  Acknowledgment is also given for the contributions of: Grace Hammonds and Peter S. Tasker, the MITRE Corp., Daniel J. Edwards, Col. Roger R. Schell, Marvin Schaefer, DoDCSC, and Theodore M. P.  ...  Single-Level Device -A device that is used to process data of a single security level at any one time.  ... 
doi:10.1007/978-1-349-12020-8_1 fatcat:nudeck4dp5ek5gkcflpbmsmgqq

Non-human Account Management (v3)

Graham Williamson, André Koot, Gloria Lee
2022 IDPro Body of Knowledge  
The management of non-human account control should be consistent with user-based account management, and controls placed on user account access to high-assurance applications should also be applied to  ...  While IAM professionals concern themselves with managing identities, authentication, RBAC, ABAC, governance, and auditing of user accounts, other IT staff are deploying devices and services that are given  ...  -The Controller (to which the devices are connected). If sensor device data is aggregated by a device controller that maps each sensor or actuator to its control 1 Bormann, C., Ersue, M., and A.  ... 
doi:10.55621/idpro.52 fatcat:ykzk6yyog5cp5epb2vgtzvkfhm

The Need for a Privacy Standard for Medical Devices That Transmit Protected Health Information Used in the Precision Medicine Initiative for Diabetes and Other Diseases

David C. Klonoff, W. Nicholson Price
2016 Journal of Diabetes Science and Technology  
This sensitive personal information is intended to be used only for specified research purposes.  ...  Public willingness to participate will depend on the public's level of trust that their information will be protected and kept private. Medical devices may constantly provide information.  ...  for Insulet, LifeCare, and Voluntis.  ... 
doi:10.1177/1932296816680006 pmid:27920271 pmcid:PMC5478037 fatcat:ivfz3cujkbfv7orm522ucsv7wi

Poster session 20: User friendliness, risk management and hospital technology

Lars Bölecke, Johannes Freckmann, Daniel Laqua, Peter Husar
2017 Biomedical Engineering  
As outcome, non-personal data will be collected on the wristbands memory during the work shift.  ...  This data will contain the information wether the personal has sanitized hands after leaving the contaminated area.  ...  Inconsistent national standards, small data base and missing experience in that field require looking over the plate rim and learning from other disciplines like nuclear power, reliability or aerospace  ... 
doi:10.1515/bmt-2017-5065 fatcat:ccy536xzdbcbvfpso6tr7js3hq
« Previous Showing results 1 — 15 out of 84,748 results