Towards Implementing a Privacy Policy: An Observation on Existing Practices in Hospital Information System
In order to safeguard the confidentiality and sensitivity of personal health information belongs to individual, a privacy law is needed to be in place. There are numerous cases of unauthorised intrusions of personal health information occurred but no legal action can be exerted due to the absence...
| Main Author: | Ahmad , R. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IBIMA Publishing library
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/347/ http://eprints.utem.edu.my/id/eprint/347/1/PrivacyinHealth.pdf |
Similar Items
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Social network sites: information disclosure, perceived vulnerability, privacy concerns and perceived benefits
by: Salleh, Norsaremah, et al.
Published: (2012)
by: Salleh, Norsaremah, et al.
Published: (2012)
The challenges of human factors for implementation of information systems in the healthcare
by: Ab Aziz, Nur Faizah, et al.
Published: (2015)
by: Ab Aziz, Nur Faizah, et al.
Published: (2015)
Customers’ confidence and trust towards privacy policy: a conceptual research of hotel revenue management
by: Michael, Tinggi, et al.
Published: (2011)
by: Michael, Tinggi, et al.
Published: (2011)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Some Restrictions on the Existence of Second Order Limit Language
by: Muhammad Azrin, Ahmad, et al.
Published: (2015)
by: Muhammad Azrin, Ahmad, et al.
Published: (2015)
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives
by: Faisal, Ammy Amelia, et al.
Published: (2013)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
Confirming the effect of demographic characteristics on information privacy concerns
by: Lee, Hwansoo, et al.
Published: (2016)
by: Lee, Hwansoo, et al.
Published: (2016)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
An empirical investigation on internet privacy on social network sites among Malaysian youths
by: Salleh, Norsaremah, et al.
Published: (2012)
by: Salleh, Norsaremah, et al.
Published: (2012)
Privacy concern on social network sites: the role of protection motivation, trust and risk
by: Salleh, Norsaremah, et al.
Published: (2012)
by: Salleh, Norsaremah, et al.
Published: (2012)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Littoral environmental observation
by: Saad, Shahbudin
Published: (2011)
by: Saad, Shahbudin
Published: (2011)
Policy paper on the improvement of the existing housing policy in the state of Perak.
by: Mohamed Osman, Mariana, et al.
Published: (2015)
by: Mohamed Osman, Mariana, et al.
Published: (2015)
Implementation of Identity Based Encryption in e-Voting System
by: Selamat, S. R., et al.
Published: (2007)
by: Selamat, S. R., et al.
Published: (2007)
Ancient Divergence Time Estimates In Eutropis Rugifera Support The Existence Of Pleistocene Barriers On The Exposed Sunda Shelf
by: Karin, B.R, et al.
Published: (2017)
by: Karin, B.R, et al.
Published: (2017)
Implementation of FHIR SATUSEHAT API in Hospital Information System
Applications
by: Hafiizh Asrofil, Al Banna, et al.
Published: (2023)
by: Hafiizh Asrofil, Al Banna, et al.
Published: (2023)
Recommender systems: The Effect of Information Privacy Concerns and User Trust on Information Disclosure Intentions
by: Al abdullateef, Hafsa
Published: (2016)
by: Al abdullateef, Hafsa
Published: (2016)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Customers' confidence and trust towards privacy policy: A conceptual research of hotel revenue management
by: Tinggi, M., et al.
Published: (2011)
by: Tinggi, M., et al.
Published: (2011)
Observation of t t H production
by: Sirunyan, A. M., et al.
Published: (2018)
by: Sirunyan, A. M., et al.
Published: (2018)
Towards Enabling Service-Oriented Architecture Implementation Initiative
by: Sulong, Muhammad Suhaizan, et al.
Published: (2011)
by: Sulong, Muhammad Suhaizan, et al.
Published: (2011)
Information Quality Activities within the Industry Initiative of Service-Oriented Architecture Implementation
by: Sulong, Muhammad Suhaizan, et al.
Published: (2011)
by: Sulong, Muhammad Suhaizan, et al.
Published: (2011)
Hospital information systems implementation framework: critical success factors for Malaysian public hospitals
by: Abdullah, Zainatul Shima
Published: (2013)
by: Abdullah, Zainatul Shima
Published: (2013)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
Information and communication privacy in wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
ICT in Telemedicine: Conquering Privacy and Security Issues In Health Care Services
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
On existence of phase transition for one dimensional P-Adic countable state Potts model
by: Mukhamedov, Farrukh
Published: (2011)
by: Mukhamedov, Farrukh
Published: (2011)
Similar Items
-
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011) -
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018) -
Social network sites: information disclosure, perceived vulnerability, privacy concerns and perceived benefits
by: Salleh, Norsaremah, et al.
Published: (2012) -
The challenges of human factors for implementation of information systems in the healthcare
by: Ab Aziz, Nur Faizah, et al.
Published: (2015) -
Customers’ confidence and trust towards privacy policy: a conceptual research of hotel revenue management
by: Michael, Tinggi, et al.
Published: (2011)