Open Access. Powered by Scholars. Published by Universities.®
- Publication
- File Type
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Towards Better Remote Healthcare Experiences: An Mhealth Video Conferencing System For Improving Healthcare Outcomes, El Sayed Mahmoud, Edward Sykes, Blake Eram, Sandy Schwenger, Jimmy Poulin, Mark Cheers
Towards Better Remote Healthcare Experiences: An Mhealth Video Conferencing System For Improving Healthcare Outcomes, El Sayed Mahmoud, Edward Sykes, Blake Eram, Sandy Schwenger, Jimmy Poulin, Mark Cheers
Publications and Scholarship
This work investigated how to combine mobile cloud computing, video conferencing and user interface design principles to promote the effectiveness and the ease of using online healthcare appointment platforms. The Jitsi Meet video conference technology was selected from amongst 27 competing systems based on efficiency and security criteria. This platform was used as the foundation on which we designed, developed and evaluated of our video conferencing system specially designed for improving doctor-patient interaction and experiences. Nine doctor- patient functions were developed in order to facilitate efficient and effective online healthcare appointments, such as providing the doctor with the ability to …
Shaping The Future Of Trusted Digital Identity: The Idef Registry With Health Information Use Cases, Noreen Y. Whysel
Shaping The Future Of Trusted Digital Identity: The Idef Registry With Health Information Use Cases, Noreen Y. Whysel
Publications and Research
No abstract provided.
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Management Faculty Research
Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …