Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Towards Better Remote Healthcare Experiences: An Mhealth Video Conferencing System For Improving Healthcare Outcomes, El Sayed Mahmoud, Edward Sykes, Blake Eram, Sandy Schwenger, Jimmy Poulin, Mark Cheers Nov 2020

Towards Better Remote Healthcare Experiences: An Mhealth Video Conferencing System For Improving Healthcare Outcomes, El Sayed Mahmoud, Edward Sykes, Blake Eram, Sandy Schwenger, Jimmy Poulin, Mark Cheers

Publications and Scholarship

This work investigated how to combine mobile cloud computing, video conferencing and user interface design principles to promote the effectiveness and the ease of using online healthcare appointment platforms. The Jitsi Meet video conference technology was selected from amongst 27 competing systems based on efficiency and security criteria. This platform was used as the foundation on which we designed, developed and evaluated of our video conferencing system specially designed for improving doctor-patient interaction and experiences. Nine doctor- patient functions were developed in order to facilitate efficient and effective online healthcare appointments, such as providing the doctor with the ability to …


Shaping The Future Of Trusted Digital Identity: The Idef Registry With Health Information Use Cases, Noreen Y. Whysel Jan 2019

Shaping The Future Of Trusted Digital Identity: The Idef Registry With Health Information Use Cases, Noreen Y. Whysel

Publications and Research

No abstract provided.


Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse Oct 2017

Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse

Management Faculty Research

Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …