Security issues with health care information technology
Nowadays data become one of most important and expensive things in our life. Whereas life became a huge database, content all information in it. However it is not necessary that data be relate to financial area to be expensive and important. While now and in last period, the healthcare sector has be...
| Main Authors: | Mahmoud, Ahmed Mohamed, Zeki, Akram M. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Science and Research
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/47392/ http://irep.iium.edu.my/47392/1/NOV152161.pdf |
Similar Items
Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students
by: Hamid, Habiba, et al.
Published: (2015)
by: Hamid, Habiba, et al.
Published: (2015)
The most principle security issues in e-Commerce
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
ICT readiness and information security policies in OIC Countries
by: Abd Hadi, Nurafiqah Hanis, et al.
Published: (2016)
by: Abd Hadi, Nurafiqah Hanis, et al.
Published: (2016)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Human capital business partner information technology & network technology manpower model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
The influence of students’ knowledge on security towards their behavior with security risks within the context of Saudi Arabia
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
by: Ahmed, Aldossary Alia, et al.
Published: (2014)
ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Multimedia security and the internet
by: Zeki, Akram M., et al.
Published: (2015)
by: Zeki, Akram M., et al.
Published: (2015)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Attitude of students towards information access issues: The case of International Islamic University Malaysia
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Information technology usage in the Islamic perspective: a systematic literature review
by: Al-Rahmi, Waleed Mugahed, et al.
Published: (2017)
by: Al-Rahmi, Waleed Mugahed, et al.
Published: (2017)
Sensor enhanced health information systems: issues and challenges
by: Adam, Abubakar, et al.
Published: (2019)
by: Adam, Abubakar, et al.
Published: (2019)
Information security and data protection: Selected issues
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
How technology affected our privacy
by: Sehnaz, Ahmetoglu, et al.
Published: (2015)
by: Sehnaz, Ahmetoglu, et al.
Published: (2015)
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Smart Information Center for Wearable Device (Health-Care)
by: Yap, Chun Yen
Published: (2016)
by: Yap, Chun Yen
Published: (2016)
Human capital business partner information technology and network technology manpower model
by: A. Halim, Siti Sarah, et al.
Published: (2011)
by: A. Halim, Siti Sarah, et al.
Published: (2011)
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Security failures in EMV smart card payment systems
by: Ahmad, Zubair, et al.
Published: (2016)
by: Ahmad, Zubair, et al.
Published: (2016)
Persuasive technology for improving information security awareness and behavior: literature review
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014)
by: Qudaih, Hani A., et al.
Published: (2014)
Information security and mutual trust as determining factors for information technology outsourcing success
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
Automatic interactive security monitoring system
by: Zeki, Akram M., et al.
Published: (2013)
by: Zeki, Akram M., et al.
Published: (2013)
Ethical issues in e-learning.
by: Zeki, Ahmed M., et al.
Published: (2011)
by: Zeki, Ahmed M., et al.
Published: (2011)
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
Information technology issues in China
by: Yu, Jie, et al.
Published: (2020)
by: Yu, Jie, et al.
Published: (2020)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
Delivering and securing health care in challenging times
by: Adams, Elisabeth
Published: (2011)
by: Adams, Elisabeth
Published: (2011)
Security risk of ATM systems, case of study
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Information technology issues and applications in Malaysia : a collection of articles.
Published: (2011)
Published: (2011)
Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2012)
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2012)
Similar Items
-
Users' awareness of and perception on information security issues: a case study of kulliyyah of ICT postgraduate students
by: Hamid, Habiba, et al.
Published: (2015) -
The most principle security issues in e-Commerce
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016) -
Evaluation of users' awareness and their reaction on information security
by: Zeki, Akram M., et al.
Published: (2016) -
ICT readiness and information security policies in OIC Countries
by: Abd Hadi, Nurafiqah Hanis, et al.
Published: (2016) -
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)