Medical identity theft in telemedicine: solving the privacy and security issues
Medical Identity Theft (MIDT) occurs when fraudsters impersonate unsuspecting individuals to obtain medical care, buy drugs, and submit fake billings or altered medical records. The consequences can sometimes be life-threatening if wrong information ends up in the victim’s personal medical records....
| Main Authors: | Olanrewaju, Rashidah Funke, Khalifa, Othman Omran |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
IIUM Press
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/45556/ http://irep.iium.edu.my/45556/1/45556_Medical%20identity%20theft%20in%20telemedicine%20-%20Monograph.pdf |
Similar Items
ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
Privacy and identity theft recovery planning: An onion skin model
by: Alashoor, T., et al.
Published: (2016)
by: Alashoor, T., et al.
Published: (2016)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
Digital watermarking: A counterfeiting and piracy deterrence
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Design and Development of Wireless Telemedicine Systems
by: Teh, Chek Min
Published: (2011)
by: Teh, Chek Min
Published: (2011)
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
Digital audio watermarking; techniques and applications
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Network based telemedicine for fetal ECG monitoring
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Design and implementation of wireless telemedicine system-electrocardiograph(ECG)
by: Ng, Eng Hui
Published: (2011)
by: Ng, Eng Hui
Published: (2011)
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
An Improved Wavelet Digital Watermarking
Software Implementation
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Wavelet-Based Progressive Image Transmission System For Telemedicine Application
by: Kadim, Zulaikha
Published: (2005)
by: Kadim, Zulaikha
Published: (2005)
Compression Of 2-D And 3-D Signals For Telemedicine Applications
by: Shyamsunder , Regunathan
Published: (2006)
by: Shyamsunder , Regunathan
Published: (2006)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
Secure E - Medical record system
by: Law, Jennifer
Published: (2005)
by: Law, Jennifer
Published: (2005)
Security and privacy issues in medical internet of things: Overview, countermeasures, challenges and future directions
by: Elhoseny, M., et al.
Published: (2021)
by: Elhoseny, M., et al.
Published: (2021)
Video surveillance: Item monitoring against theft
by: Chong, Yiing Sheah
Published: (2023)
by: Chong, Yiing Sheah
Published: (2023)
A new automatic method of parkinson disease identification using complex-valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
by: Khalifa, Othman Omran, et al.
Published: (2015)
by: Khalifa, Othman Omran, et al.
Published: (2015)
Legal Implications On Privacy And Security Issues On The Internet
by: Veloo, Veni
Published: (2002)
by: Veloo, Veni
Published: (2002)
Telemedicine
by: Sylvester, S
Published: (2011)
by: Sylvester, S
Published: (2011)
Cost-effective handling of digital medical images in the telemedicine environment
by: Choong, Miew Keen, et al.
Published: (2007)
by: Choong, Miew Keen, et al.
Published: (2007)
Anti-theft security system using face recognition
by: Chong, Guang Yu
Published: (2018)
by: Chong, Guang Yu
Published: (2018)
Wireless technologies for telemedicine
by: Ng, H. S., et al.
Published: (2006)
by: Ng, H. S., et al.
Published: (2006)
Fear of cyber-identity theft and related fraudulent activity
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
Statistical appraisal in solving some medical problems / Lim Fong Peng
by: Lim, Fong Peng
Published: (2016)
by: Lim, Fong Peng
Published: (2016)
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Forgery detection in medical images using Complex Valued Neural Network (CVNN)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
The design of flexible telemedicine framework for healthcare big data
by: Abd Ghani, Mohd Khanapi, et al.
Published: (2018)
by: Abd Ghani, Mohd Khanapi, et al.
Published: (2018)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Theft prevention using wireless security system (WSS)
by: Ng, Chee Kyun, et al.
Published: (2008)
by: Ng, Chee Kyun, et al.
Published: (2008)
Similar Items
-
ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services
by: Olanweraju, Rashidah Funke, et al.
Published: (2013) -
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012) -
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014) -
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021) -
Privacy and identity theft recovery planning: An onion skin model
by: Alashoor, T., et al.
Published: (2016)