ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services
An Advancement in telecommunication combined with improved information infrastructures has opened up new dimensions in e-health environment. Such technologies make readily available to access, store, manipulate and replicate medical information and images. These technologies help reduce the time and...
| Main Authors: | Olanweraju, Rashidah Funke, Ali, Nor'ashikin Bte, Khalifa, Othman Omran, AbdManaf, Azizah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
http://ejcsit.uniten.edu.my/
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/30643/ http://irep.iium.edu.my/30643/7/ICT_in_Telemedicine_Conquering_Privacy_and_Security_Issues_In_Health_Care.pdf |
Similar Items
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Computational intelligence: application in digital watermarking
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Digital audio watermarking; techniques and applications
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Application of privacy, security and ethics in Islamic concerned ICT
by: Noordin, Mohamad Fauzan
Published: (2013)
by: Noordin, Mohamad Fauzan
Published: (2013)
UTS conquers 'remote' world
Published: (2010)
Published: (2010)
She stooped to conquer space
by: Abd Razak, Dzulkifli
Published: (2008)
by: Abd Razak, Dzulkifli
Published: (2008)
Legal Implications On Privacy And Security Issues On The Internet
by: Veloo, Veni
Published: (2002)
by: Veloo, Veni
Published: (2002)
Telemedicine
by: Sylvester, S
Published: (2011)
by: Sylvester, S
Published: (2011)
UMPSA prepares to conquer Mount Kinabalu
by: Mimi Rabita, Abd Wahit
Published: (2023)
by: Mimi Rabita, Abd Wahit
Published: (2023)
Water quality issues in food processing and production: good quality water is very essential in the production of safe food
by: Muyibi, Suleyman Aremu, et al.
Published: (2011)
by: Muyibi, Suleyman Aremu, et al.
Published: (2011)
ICT omnipresence and the rights to privacy
by: Abdulkadir, Abdulkadir Bolaji, et al.
Published: (2023)
by: Abdulkadir, Abdulkadir Bolaji, et al.
Published: (2023)
20 UMP staff conquered Mount Kinabalu
by: Mohd Shahrul, Azuar
Published: (2019)
by: Mohd Shahrul, Azuar
Published: (2019)
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Wireless technologies for telemedicine
by: Ng, H. S., et al.
Published: (2006)
by: Ng, H. S., et al.
Published: (2006)
Conquering Pedaphobia: A Case Study of Counselling Interventions
by: Aina Razlin, Mohammad Roose
Published: (2015)
by: Aina Razlin, Mohammad Roose
Published: (2015)
Enhanced divide-and-conquer algorithm with 2-block policy
by: Mat Deris, Mustafa, et al.
Published: (2000)
by: Mat Deris, Mustafa, et al.
Published: (2000)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
TracLocatEngine: a system for tracking and locating technical personnel using Radio Frequency Identification (RFID)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
How to conquer tax research: Making the most of online resources
by: Fong, Colin
Published: (2004)
by: Fong, Colin
Published: (2004)
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives
by: Faisal, Ammy Amelia, et al.
Published: (2013)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
A review on security and privacy issues in E-learning and the MapReduce aproach
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Data stream clustering by divide and conquer approach based on vector model
by: Khalilian, Madjid, et al.
Published: (2016)
by: Khalilian, Madjid, et al.
Published: (2016)
Telemedicine in Malaysia: ethical aspects on utilising teleconsultation for patient care / Muhamad Zaid Muuti
by: Muuti, Muhamad Zaid
Published: (2019)
by: Muuti, Muhamad Zaid
Published: (2019)
Security and privacy issues in medical internet of things: Overview, countermeasures, challenges and future directions
by: Elhoseny, M., et al.
Published: (2021)
by: Elhoseny, M., et al.
Published: (2021)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
TCP/IP based networking for telemedicine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2013)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2013)
Telepointer Technology in Telemedicine : A Review
by: Rohana, Abdul Karim, et al.
Published: (2013)
by: Rohana, Abdul Karim, et al.
Published: (2013)
Design and Development of Wireless Telemedicine Systems
by: Teh, Chek Min
Published: (2011)
by: Teh, Chek Min
Published: (2011)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
The adequacy of telemedicine act relating to liability of telemedicine practitioners in Malaysia: a comparative study with telemedicine law of California, Usa / Nurul Fatihah Norull Bahri Saiful Abadiā¦[et al.].
by: Norull Saiful Abadi, Nurul Fatihah, et al.
Published: (2012)
by: Norull Saiful Abadi, Nurul Fatihah, et al.
Published: (2012)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Privacy and technology: implications and challenges
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
Privacy and technology: implications and challenges
by: Shuriye, Abdi Omar, et al.
Published: (2008)
by: Shuriye, Abdi Omar, et al.
Published: (2008)
Similar Items
-
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012) -
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015) -
Computational intelligence: application in digital watermarking
by: Olanweraju, Rashidah Funke, et al.
Published: (2012) -
Digital audio watermarking; techniques and applications
by: Olanweraju, Rashidah Funke, et al.
Published: (2012) -
Application of privacy, security and ethics in Islamic concerned ICT
by: Noordin, Mohamad Fauzan
Published: (2013)