Examining the risks of social networking adoption in the Bhutanese healthcare system
Social networking studies have largely focused on opportunities of using it; this study examines the risks of adopting social networking (SN) in the healthcare system in Bhutan. Based on the current literature review, SN use will enhance communication, collaboration, connection, coordination and kno...
| Main Authors: | Peldon, P., Issa, Tomayess |
|---|---|
| Format: | Journal Article |
| Published: |
Inderscience Publishers
2015
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/32551 |
Similar Items
Entangled between tradition and modernity: the experiences of Bhutanese working women
by: Dayaram, Kandy, et al.
Published: (2012)
by: Dayaram, Kandy, et al.
Published: (2012)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Estimating the healthcare costs of children born to pregnant smokers in England: cohort study using primary and secondary healthcare data
by: Vaz, Luis R., et al.
Published: (2018)
by: Vaz, Luis R., et al.
Published: (2018)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Participatory governmentality: social network transitions in Malaysia’s mental healthcare
by: Teoh, Sing Fei
Published: (2022)
by: Teoh, Sing Fei
Published: (2022)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Inter-social-networking: accounting for multiple identities
by: Price, Dominic, et al.
Published: (2015)
by: Price, Dominic, et al.
Published: (2015)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Healthcare-transition risk assessment for emerging adults with diabetes type 1
by: Kaye, J., et al.
Published: (2013)
by: Kaye, J., et al.
Published: (2013)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006)
by: Lin, K., et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
"This has to be the cats": personal data legibility in networked sensing systems
by: Tolmie, Peter, et al.
Published: (2016)
by: Tolmie, Peter, et al.
Published: (2016)
A Study of Security Limitations in Virtual Local Area Network Implementation
by: Balasundaram, Arumugam
Published: (2003)
by: Balasundaram, Arumugam
Published: (2003)
Toward a Revolution in Australian Children’s Data and Privacy
by: Leaver, Tama, et al.
Published: (2023)
by: Leaver, Tama, et al.
Published: (2023)
Small fish in a big pond: an architectural approach to users privacy, rights and security in the age of big data
by: Angelopoulos, Spyros, et al.
Published: (2016)
by: Angelopoulos, Spyros, et al.
Published: (2016)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
Risks and opportunities of integrating social networking sites in the Australian and Portuguese workplace/communities: an exploratory study
by: Issa, Tomayess, et al.
Published: (2014)
by: Issa, Tomayess, et al.
Published: (2014)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014)
by: Randall, Sean, et al.
Published: (2014)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Novel heuristic and metaheuristic approaches to the automated scheduling of healthcare personnel
by: Curtois, Timothy
Published: (2008)
by: Curtois, Timothy
Published: (2008)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Understanding the challenges of using personal data in media experiences
by: Sailaja, Neelima
Published: (2020)
by: Sailaja, Neelima
Published: (2020)
Understanding smartphone users' awareness of security and privacy in downloading third-party applications - A survey in UK and Japan
by: Kawakubo, Noriko
Published: (2013)
by: Kawakubo, Noriko
Published: (2013)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Reconceptualising professional role reconfiguration in healthcare: institutional work and influences around professional hierarchy, accountability and risk
by: Bergin, Nicola
Published: (2016)
by: Bergin, Nicola
Published: (2016)
Researching the transparency of personal data sharing: designing a concert receipt
by: Styliari, Tatiana C., et al.
Published: (2016)
by: Styliari, Tatiana C., et al.
Published: (2016)
Organizational risk using network analysis
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
Similar Items
-
Entangled between tradition and modernity: the experiences of Bhutanese working women
by: Dayaram, Kandy, et al.
Published: (2012) -
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009) -
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006) -
Estimating the healthcare costs of children born to pregnant smokers in England: cohort study using primary and secondary healthcare data
by: Vaz, Luis R., et al.
Published: (2018) -
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)