User-centered evaluation of privacy models for protecting personal medical information
Privacy has always been a crucial element in the management of personal medical information. It warrants a comprehensive model during the designing stage of the management system in order to conserve the security of the information. One of the key success factors in protecting the privacy of informa...
| Main Authors: | Samsuri, Suhaila, Ismail, Zuraini, Ahmad, Rabiah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
Springer Berlin Heidelberg
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/36455/ http://irep.iium.edu.my/36455/4/chp%253A10.1007%252F978-3-642-25327-0_26.pdf |
Similar Items
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Privacy and personal data protection in electronic voting: factors and measures
by: Lubis, Muharman, et al.
Published: (2017)
by: Lubis, Muharman, et al.
Published: (2017)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Bioinformatics and genetic privacy: the impact of the Personal Data Protection Act 2010
by: Abdul Ghani Azmi, Ida Madieha
Published: (2011)
by: Abdul Ghani Azmi, Ida Madieha
Published: (2011)
Security and density: A paradox of public protection at the expense of personal privacy
by: Jonescu, Emil
Published: (2017)
by: Jonescu, Emil
Published: (2017)
Impact of ICT on privacy and personal data protection in two Malaysian academic libraries
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
Impact of ICT on privacy and personal data protection in two Malaysian academic libraries
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
Recommender systems: The Effect of Information Privacy Concerns and User Trust on Information Disclosure Intentions
by: Al abdullateef, Hafsa
Published: (2016)
by: Al abdullateef, Hafsa
Published: (2016)
Privasi vs data peribadi (Privacy To Personal Data Protection: Conceptual and Contextual Landscape)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Privacy policy in Indonesia and Malaysia: from digital economy to personal data protection laws
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by: Kim, J., et al.
Published: (2018)
by: Kim, J., et al.
Published: (2018)
Cognitive privacy for personal clouds
by: Radenkovic, Milena
Published: (2016)
by: Radenkovic, Milena
Published: (2016)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
A hybrid protection method to enhance data utility while preserving the privacy of medical patients data publishing
by: Jeba, Shermina, et al.
Published: (2022)
by: Jeba, Shermina, et al.
Published: (2022)
Personalizing radiation protection in medical imaging: an Islamic approach
by: Zainuddin, Zainul Ibrahim
Published: (2018)
by: Zainuddin, Zainul Ibrahim
Published: (2018)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Gathering of information in internet environment: Balancing the right to discovery and right to protect the privacy under the laws
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
Gathering of information in Internet environment: balancing the right to discovery and right to protect the privacy under the laws
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
UCOSAIS: A framework for user-centered online service advertising information search
by: Dong, Hai, et al.
Published: (2013)
by: Dong, Hai, et al.
Published: (2013)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Privacy under threats: an analysis on the online risks and legal measures in protecting privacy of children online
by: Abd. Jalil, Juriah
Published: (2014)
by: Abd. Jalil, Juriah
Published: (2014)
User-centered design and evaluation of e-heritage: a virtual reality prototype for learning architectural heritage in informal education
by: Abu Bakar, Juliana Aida, et al.
Published: (2010)
by: Abu Bakar, Juliana Aida, et al.
Published: (2010)
Fundamental to medical data centers
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Authentication groups with privacy-protection of machine in LTE/LTE-A networks
by: Ismail, Haqi Khalid, et al.
Published: (2017)
by: Ismail, Haqi Khalid, et al.
Published: (2017)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Similar Items
-
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011) -
Protecting personal medical information: Asian perspectives
by: Samsuri, Suhaila, et al.
Published: (2013) -
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013) -
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011) -
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)