Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
Information Technology is reaching all angles of the healthcare sector in the form of electronic diagnosis, surgery consultation and medical records. With the current trends in information and communication technology in healthcare system, such as the cloud computing and ubiquitous computing, where...
| Main Authors: | Olanrewaju, Rashidah Funke, yahuza, Mukhtar, Ali, Nor'ashikin Bte |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/38930/ http://irep.iium.edu.my/38930/1/MDT_statistics_n_effects.pdf |
Similar Items
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Fear of cyber-identity theft and related fraudulent activity
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
Privacy and identity theft recovery planning: An onion skin model
by: Alashoor, T., et al.
Published: (2016)
by: Alashoor, T., et al.
Published: (2016)
An empirical study of the evolution of PHP MVC framework
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
Workplace fraud and theft in SMEs: evidence from the mobile telephone sector in Nigeria
by: Yekini, Kemi C., et al.
Published: (2017)
by: Yekini, Kemi C., et al.
Published: (2017)
Statistical analysis of vehicle theft crime in Peninsular Malaysia
using negative binomial regression model
by: Malina Zulkifli,, et al.
Published: (2015)
by: Malina Zulkifli,, et al.
Published: (2015)
Living with virus only way out
by: Daim, Nuradzimmah, et al.
Published: (2021)
by: Daim, Nuradzimmah, et al.
Published: (2021)
İnternet hırsızlığı=Internet theft
by: Kayadibi, Saim
Published: (2017)
by: Kayadibi, Saim
Published: (2017)
Theft prevention in brothers Mahallahs
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
GRID anti-theft system
by: Neer Pandi, Rhuban
Published: (2012)
by: Neer Pandi, Rhuban
Published: (2012)
Portable anti-theft device
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
Smart theft alarm with image
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
Efficiency of medical technology in measuring service quality in the Nigerian healthcare sector
by: Taofeeq D., Moshood, et al.
Published: (2022)
by: Taofeeq D., Moshood, et al.
Published: (2022)
ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Automotive anti-theft system using fuzzy logic method
by: Kahtan, Hasan, et al.
Published: (2017)
by: Kahtan, Hasan, et al.
Published: (2017)
Way Out West: Mapping Western Australia
by: Stratton, Jon, et al.
Published: (2016)
by: Stratton, Jon, et al.
Published: (2016)
MY SAY: The Nokia way out of depression
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
State-of-the-art application of artificial neural networks in digital watermarking and the way forward
by: Olanrewaju, Rashidah Funke, et al.
Published: (2009)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2009)
Ecological disturbance and prevalence of dengue in Malaysia: way out
by: Ajibola, Lamidi-Sarumoh Alaba, et al.
Published: (2016)
by: Ajibola, Lamidi-Sarumoh Alaba, et al.
Published: (2016)
Homeless in Kuala Lumpur: a way out of the street
by: Hamdan, Nur Syuhadah, et al.
Published: (2020)
by: Hamdan, Nur Syuhadah, et al.
Published: (2020)
Factors affecting the increasing of online identity theft : a study in Kota Bharu Kelantan / Noor Ain Mohd Ariffin
by: Mohd Ariffin, Noor Ain
Published: (2012)
by: Mohd Ariffin, Noor Ain
Published: (2012)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
Anti theft design of car seat (mechanical)
by: Nurul Husna, Mohamad Shariff
Published: (2009)
by: Nurul Husna, Mohamad Shariff
Published: (2009)
Design And Development Of Library Anti-Theft System
by: Selvamani, Sathish Kumar, et al.
Published: (2016)
by: Selvamani, Sathish Kumar, et al.
Published: (2016)
Video surveillance: Item monitoring against theft
by: Chong, Yiing Sheah
Published: (2023)
by: Chong, Yiing Sheah
Published: (2023)
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
by: Kahtan, Hasan, et al.
Published: (2018)
by: Kahtan, Hasan, et al.
Published: (2018)
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
by: Khalifa, Othman Omran, et al.
Published: (2015)
by: Khalifa, Othman Omran, et al.
Published: (2015)
Discourse and professional identities in healthcare communication
by: Emerson, Tristan
Published: (2021)
by: Emerson, Tristan
Published: (2021)
Commodity murabahah deposits in Islamic banking: an easy way out
by: Mastura Mohd Shafie,, et al.
Published: (2020)
by: Mastura Mohd Shafie,, et al.
Published: (2020)
No way back: Marina says Komalam is out of the Sea games
by: Singh, Devinder
Published: (2017)
by: Singh, Devinder
Published: (2017)
New consumer load prototype for electricity theft monitoring
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
Similar Items
-
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015) -
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009) -
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014) -
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015) -
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012)