Privacy and security problems in using health information application in Smart National Identity Card (SNIC)
This study discovers privacy and security problems in using health information application in SNIC. Many countries introduced smart national identity card with various applications such as health information application embedded inside it. The need for avoiding a long queue at hospitals, airports an...
| Main Authors: | Hassan, Ismail Bile, Azmi Murad, Masrah Azrifah |
|---|---|
| Format: | Article |
| Published: |
IDOSI Publications
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/35058/ |
Similar Items
Extending the UTAUT2 model with a privacy calculus model to enhance the adoption of a health information application in Malaysia
by: Hassan, Ismail Bile, et al.
Published: (2022)
by: Hassan, Ismail Bile, et al.
Published: (2022)
Malaysian's acceptance towards the multipurpose smart national identity card and driving license
by: Yeow, , Paul H. P, et al.
Published: (2006)
by: Yeow, , Paul H. P, et al.
Published: (2006)
Security failures in EMV smart card payment systems
by: Ahmad, Zubair, et al.
Published: (2016)
by: Ahmad, Zubair, et al.
Published: (2016)
An Ergonomics study of Malaysian Multipurpose Smart Identity Card 'MYKAD'
by: Loo, Wee Hong
Published: (2008)
by: Loo, Wee Hong
Published: (2008)
Accepting Multipurpose “Smart” Identity Cards in a Developing Country
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
Online information seeking: a review of the literature in the health domain
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2018)
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2018)
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor
by: Ayad, Mustafa Abdsalam
Published: (2002)
by: Ayad, Mustafa Abdsalam
Published: (2002)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Privacy and the Access of Information in a Smart House Environment
by: Moncrieff, Simon, et al.
Published: (2007)
by: Moncrieff, Simon, et al.
Published: (2007)
Research in progress - evaluation of smart card acceptance : security, technology and usage
by: Taherdoost, Hamed, et al.
Published: (2009)
by: Taherdoost, Hamed, et al.
Published: (2009)
Online health information seeking and information quality: a preliminary contemplation
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2019)
by: Azmi Murad, Masrah Azrifah, et al.
Published: (2019)
Information Behavior Model of e-Health Literacy for online health information-seeking effectiveness
by: Wang, Xuewen, et al.
Published: (2024)
by: Wang, Xuewen, et al.
Published: (2024)
Smart Card Implementation Model
by: Lee, Chin Huat
Published: (2000)
by: Lee, Chin Huat
Published: (2000)
Electronic surveillance, privacy and national security: concepts, analysis - in a nutshell
by: Khan, Md. Zubair Kasem, et al.
Published: (2014)
by: Khan, Md. Zubair Kasem, et al.
Published: (2014)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Exploratory factor analysis of the items for measuring consumers' online health information seeking
by: Engku Alwi, Sharifah Sumayyah, et al.
Published: (2023)
by: Engku Alwi, Sharifah Sumayyah, et al.
Published: (2023)
Enhance Luhn algorithm for validation of identity card numbers (ID card)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Smart Card Analysis: Malaysian Perspectives
by: Mohd Hatta, Kasuma Nurhazwani
Published: (2009)
by: Mohd Hatta, Kasuma Nurhazwani
Published: (2009)
Door access using smart card
by: Foo, T.Y
Published: (2004)
by: Foo, T.Y
Published: (2004)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Security framework of cloud data storage based on multi agent.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Management of Bangladesh's national security problems
by: Hossain, Ishtiaq
Published: (1991)
by: Hossain, Ishtiaq
Published: (1991)
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives
by: Faisal, Ammy Amelia, et al.
Published: (2013)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
A framework of multi-agent system to facilitate security of cloud data storage
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Using smart card to purchase text information from digital library / Ng Han Teck
by: Ng , Han Teck
Published: (2002)
by: Ng , Han Teck
Published: (2002)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Smart card : usability, transaction and problem at UiTM cafeteria (E-Cafe) / Siti Aishah Sahir
by: Sahir, Siti Aishah
Published: (2006)
by: Sahir, Siti Aishah
Published: (2006)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Automatic smart card purchasing system for express kiosk
by: Toha, Siti Fauziah, et al.
Published: (2011)
by: Toha, Siti Fauziah, et al.
Published: (2011)
Multi agent system architecture oriented Prometheus methodology design to facilitate security of cloud data storage
by: Mohamed Talib, Amir, et al.
Published: (2011)
by: Mohamed Talib, Amir, et al.
Published: (2011)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Similar Items
-
Extending the UTAUT2 model with a privacy calculus model to enhance the adoption of a health information application in Malaysia
by: Hassan, Ismail Bile, et al.
Published: (2022) -
Malaysian's acceptance towards the multipurpose smart national identity card and driving license
by: Yeow, , Paul H. P, et al.
Published: (2006) -
Security failures in EMV smart card payment systems
by: Ahmad, Zubair, et al.
Published: (2016) -
An Ergonomics study of Malaysian Multipurpose Smart Identity Card 'MYKAD'
by: Loo, Wee Hong
Published: (2008) -
Accepting Multipurpose “Smart” Identity Cards in a Developing Country
by: Heng, Paul Ping Yeow, et al.
Published: (2007)