Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 55

Full-Text Articles in Medicine and Health Sciences

A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong Dec 2023

A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong

Research Collection School Of Computing and Information Systems

Digital microfluidic, as an emerging and potential technology, diversifies the biochemical applications platform, such as protein dilution sewage detection. At present, a vast majority of universal cyberphysical digital microfluidic biochips (DMFBs) transmit data through wires via personal computers and microcontrollers (like Arduino), consequently, susceptible to various security threats and with the popularity of wireless devices, losing competitiveness gradually. On the premise that security be ensured first and foremost, calls for wireless portable, safe, and economical DMFBs are imperative to expand their application fields, engage more users, and cater to the trend of future wireless communication. To this end, a new …


Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G Nov 2023

Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G

Faculty Scholarship

Blockchain as a digital ledger for keeping records of digital transactions and other information, it is secure and decentralized technology. The globally growing number of digital population every day possesses a significant threat to online data including the medical and patients’ data. After bitcoin, blockchain technology has emerged into a general-purpose technology with applications in medical industries and healthcare. Blockchain can promote highly configurable openness while retaining the highest security standards for critical data of medical patients. Referred to as distributed record keeping for healthcare systems which makes digital assets unalterable and transparent via a cryptographic hash and decentralized network. …


J Mich Dent Assoc August 2023 Aug 2023

J Mich Dent Assoc August 2023

The Journal of the Michigan Dental Association

Every month, The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!

In this issue, the reader will find the following original content:

  • A cover story on new dentist’s perceptions of professionalism.
  • A feature on legal considerations when addressing employee wellness.
  • A feature on the meaning of wellness by ADA Trustee Dr. Brett Kessler.
  • Practice guidance on conducting a HIPAA security risk analysis.
  • Commentary “The New Golden Age of Dentistry.”
  • Editorial and regular department articles on MDA Foundation …


An Efficient Lightweight Provably Secure Authentication Protocol For Patient Monitoring Using Wireless Medical Sensor Networks, Garima Thakur, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Sachin Shetty Jan 2023

An Efficient Lightweight Provably Secure Authentication Protocol For Patient Monitoring Using Wireless Medical Sensor Networks, Garima Thakur, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The refurbishing of conventional medical network with the wireless medical sensor network has not only amplified the efficiency of the network but concurrently posed different security threats. Previously, Servati and Safkhani had suggested an Internet of Things (IoT) based authentication scheme for the healthcare environment promulgating a secure protocol in resistance to several attacks. However, the analysis demonstrates that the protocol could not withstand user, server, and gateway node impersonation attacks. Further, the protocol fails to resist offline password guessing, ephemeral secret leakage, and gateway-by-passing attacks. To address the security weaknesses, we furnish a lightweight three-factor authentication framework employing the …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …


Reliable Machine Learning Model For Iiot Botnet Detection, Fatma Taher, Mahmoud Abdel-Salam, Mohamed Elhoseny, Ibrahim M. El-Hasnony Jan 2023

Reliable Machine Learning Model For Iiot Botnet Detection, Fatma Taher, Mahmoud Abdel-Salam, Mohamed Elhoseny, Ibrahim M. El-Hasnony

All Works

Due to the growing number of Internet of Things (IoT) devices, network attacks like denial of service (DoS) and floods are rising for security and reliability issues. As a result of these attacks, IoT devices suffer from denial of service and network disruption. Researchers have implemented different techniques to identify attacks aimed at vulnerable Internet of Things (IoT) devices. In this study, we propose a novel features selection algorithm FGOA-kNN based on a hybrid filter and wrapper selection approaches to select the most relevant features. The novel approach integrated with clustering rank the features and then applies the Grasshopper algorithm …


Shining A Light On Marginal Food Insecurity In An Understudied Population Comment, Angela D. Liese May 2022

Shining A Light On Marginal Food Insecurity In An Understudied Population Comment, Angela D. Liese

Faculty Publications

No abstract provided.


Ascp-Iomt: Ai-Enabled Lightweight Secure Communication Protocol For Internet Of Medical Things, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J.P.C. Rodrigues Jan 2022

Ascp-Iomt: Ai-Enabled Lightweight Secure Communication Protocol For Internet Of Medical Things, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J.P.C. Rodrigues

VMASC Publications

The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary hospital visits and the burden on healthcare systems by connecting the patients to their healthcare experts (i.e., doctors) and allows secure transmission of healthcare data over an insecure channel (e.g., the Internet). Since Artificial Intelligence (AI) has a great impact on the performance and usability of an information system, it is important to include its modules in a healthcare information system, which will be …


Response And Rebuttal To "Comment On: Risk Factors For Workplace Encounters With Weapons By Hospital Employees" In Public Health In Practice; 3 (2022) 100256 By Chidinma Okani And Carmen Black, James D. Blando, Chalsie Paul, Mariana Szklo-Coxe Jan 2022

Response And Rebuttal To "Comment On: Risk Factors For Workplace Encounters With Weapons By Hospital Employees" In Public Health In Practice; 3 (2022) 100256 By Chidinma Okani And Carmen Black, James D. Blando, Chalsie Paul, Mariana Szklo-Coxe

Community & Environmental Health Faculty Publications

No abstract provided.


Occupational Injuries Associated With Workplace Violence In An Academic Medical Center, Rebecca J. Bonacci Dec 2021

Occupational Injuries Associated With Workplace Violence In An Academic Medical Center, Rebecca J. Bonacci

Capstone Experience

Violence is a major source of workplace injury in the medical profession. Peer reviewed literature is lacking for workers that have injuries through violence from clients who have intellectual disabilities. Literature for hospital security is also lacking. In this study of workplace violence, we compared injuries among the occupational groups at an academic medical center from 2017-2020. We hypothesized that violence will be similar across the years. Occupational injury and illness data was obtained from an academic medical center. The number of violence cases was divided by the total number of injury cases and reported as a percentage. We found …


Hospital Security. A Vision Of Multidimensional Security, Augusto Figueroa Uribe, Julia Hernández Ramírez Mar 2021

Hospital Security. A Vision Of Multidimensional Security, Augusto Figueroa Uribe, Julia Hernández Ramírez

Revista de la Facultad de Medicina Humana

The risks during the performance of work is an inherent situation to any human activity. Hospital Safety is defined as: “the condition that guarantees that the workers, patients, visitors, infrastructure and equipment within a health care center are free of risk or danger of accidents”. The construction of the prevention culture starts from the knowledge of the risks, the safety culture is directly related to the quality of care of the service provided, which is why these terms are of special interest in health institutions. Talking about comprehensive risk management, either, involves determining all the risks that could cause considerable …


Employment Security In Egypt In Light Of The Covid-19 Pandemic: Rethinking Policies And Practices, Heba M. Khalil, Kareem Megahed Jan 2021

Employment Security In Egypt In Light Of The Covid-19 Pandemic: Rethinking Policies And Practices, Heba M. Khalil, Kareem Megahed

Faculty Journal Articles

Crises such as COVID-19’s have inequitable impacts on different countries, various population groups and diverse sectors of society and the economy. Areas of work and employment were met with a lot of challenges worldwide, and in particular in countries like Egypt with a large sector of vulnerable and precarious workers. This policy paper addresses the question of employment security both in response to crises such as COVID-19, and on the long term. To do so, the research maps ‘vulnerable work’, including informal labor, labor in the gig economy, self-employed and other types of precarious work. It then assesses Egypt’s policy …


Thaw Publications, Carl Landwehr, David Kotz Dec 2020

Thaw Publications, Carl Landwehr, David Kotz

Computer Science Technical Reports

In 2013, the National Science Foundation's Secure and Trustworthy Cyberspace program awarded a Frontier grant to a consortium of four institutions, led by Dartmouth College, to enable trustworthy cybersystems for health and wellness. As of this writing, the Trustworthy Health and Wellness (THaW) project's bibliography includes more than 130 significant publications produced with support from the THaW grant; these publications document the progress made on many fronts by the THaW research team. The collection includes dissertations, theses, journal papers, conference papers, workshop contributions and more. The bibliography is organized as a Zotero library, which provides ready access to citation materials …


Towards Development Of A Remote Charting System For Connected Healthcare, Alex Bodurka Dec 2020

Towards Development Of A Remote Charting System For Connected Healthcare, Alex Bodurka

Masters Theses

Health Care Providers play a crucial role in a patients well-being. While their primary role is to treat the patient, it is also vital to ensure that they can spend adequate time with the patient to create a unique treatment plan and build a personal relationship with their patients to help them feel comfortable during their treatment. Health Care Providers are frequently required to manually record patient data to track their healthcare progress during their hospital stay. However, with hospitals continuously trying to optimize their workflows, this crucial one-on-one time with the patient is often not practical.

As a solution, …


Risk Factors For Workplace Encounters With Weapons By Hospital Employees, James Blando, Chalsie Paul, Mariana Szklo-Coxe Jan 2020

Risk Factors For Workplace Encounters With Weapons By Hospital Employees, James Blando, Chalsie Paul, Mariana Szklo-Coxe

Community & Environmental Health Faculty Publications

Objective:The specific aim of this study was to determine which risk factors were associated with frequent weapons confiscation in a healthcare facility. This study investigated the hypothesis that hospital-related factors impact the frequency of weapons confiscation.

Study design:Cross-sectional.

Methods:A cross-sectional survey was administered on-line to hospital security directors and assessed the associations of organizational factors with the frequency of weapons confiscation.

Results:It was found that hospitals with metal detectors were more than 5 times as likely to frequently confiscate weapons, suggesting this intervention is effective. It was also found that hospitals with psychiatric units were more likely to have frequent …


The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir Apr 2019

The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the …


Secure Smart Health With Privacy-Aware Aggregate Authentication And Access Control In Internet Of Things, Yinghui Zhang, Robert H. Deng, Gang Han, Dong Zheng Dec 2018

Secure Smart Health With Privacy-Aware Aggregate Authentication And Access Control In Internet Of Things, Yinghui Zhang, Robert H. Deng, Gang Han, Dong Zheng

Research Collection School Of Computing and Information Systems

With the rapid technological advancements in the Internet of Things (IoT), wireless communication and cloud computing, smart health is expected to enable comprehensive and qualified healthcare services. It is important to ensure security and efficiency in smart health. However, existing smart health systems still have challenging issues, such as aggregate authentication, fine-grained access control and privacy protection. In this paper, we address these issues by introducing SSH, a Secure Smart Health system with privacy-aware aggregate authentication and access control in IoT. In SSH, privacy-aware aggregate authentication is enabled by an anonymous certificateless aggregate signature scheme, in which users' identity information …


Workshop On Emerging Technology And Data Analytics For Behavioral Health, David Kotz, Sarah E. Lord, A. James O'Malley, Luke Stark, Lisa Marsch Jun 2018

Workshop On Emerging Technology And Data Analytics For Behavioral Health, David Kotz, Sarah E. Lord, A. James O'Malley, Luke Stark, Lisa Marsch

Dartmouth Scholarship

Wearable and portable digital devices can support self-monitoring for patients with chronic medical conditions, individuals seeking to reduce stress, and people seeking to modify health-related behaviors such as substance use or overeating. The resulting data may be used directly by a consumer, or shared with a clinician for treatment, a caregiver for assistance, or a health coach for support. The data can also be used by researchers to develop and evaluate just-in-time interventions that leverage mobile technology to help individuals manage their symptoms and behavior in real time and as needed. Such wearable systems have huge potential for promoting delivery …


Health Information Security And Privacy: A Social Science Exploration Of Nurses' Knowledge And Risk Behaviors With Security And Privacy Issues Focusing On Mobile Device Usage, Keith Richard Weiner May 2018

Health Information Security And Privacy: A Social Science Exploration Of Nurses' Knowledge And Risk Behaviors With Security And Privacy Issues Focusing On Mobile Device Usage, Keith Richard Weiner

Theses & Dissertations

Background. Health information system security and privacy are critical issues that impact the wide use of the Electronic Health Record (EHR) in healthcare including hospitals, providers and health systems (Breaches Affecting 500 or More Individuals, 2017). These issues have been researched from a technology standpoint in this era of accelerated electronic health record adoption, but less has been done related to the EHR users in the United States. Most of the literature related to security and privacy explores research topics, peripheral and direct, regarding policy adherence mechanisms. Yet to be studied is a social science exploration of nurses’ risk knowledge …


Stress Reduction Strategies For Improving Private Security Officer Performance, Khalil Ibrahim Al-Mulla Jan 2018

Stress Reduction Strategies For Improving Private Security Officer Performance, Khalil Ibrahim Al-Mulla

Walden Dissertations and Doctoral Studies

The impact of occupational stress on employees' health and work performance costs U.S. companies $300 billion annually; work-related stress is an issue for private security organizations all over the world. The purpose of this single case study was to explore strategies private security organizational leaders used to mitigate private security officers' occupational stress. The study participants were 4 leaders of a private security organization in Bahrain who had a minimum of 5 years of experience in the private security field and had addressed occupational stress successfully. The human capital theory was the conceptual framework used for this study. Data were …


A Literature Review On The Current State Of Security And Privacy Of Medical Devices And Sensors With Bluetooth Low Energy, Todd O. Arney Jan 2018

A Literature Review On The Current State Of Security And Privacy Of Medical Devices And Sensors With Bluetooth Low Energy, Todd O. Arney

Dissertations, Master's Theses and Master's Reports

Technology use in healthcare is an integral part of diagnosis and treatment. The use of technology in medical devices and sensors is growing. These devices include implantable medical devices, and consumer health and fitness tracking devices and applications. Bluetooth Low Energy (BLE) is the most commonly used communication method in medical devices and sensors. Security and privacy are important, especially in healthcare technologies that can impact morbidity. There is an increasing need to evaluate the security and privacy of healthcare technology, especially with devices and sensors that use Bluetooth Low Energy due to the increasing prevalence and use of medical …


Combating Workplace Violence: An Evidence Based Initiative, Diana L. Giordano May 2017

Combating Workplace Violence: An Evidence Based Initiative, Diana L. Giordano

Evidence-Based Practice Project Reports

Patient/visitor violence against healthcare (HC) employees is a type of workplace violence (WPV) and considered a dangerous hazard within HC occupations (Bureau of Labor Statistics, 2015). Lack of recognition of the true incidence and underreporting of WPV may contribute to a false sense of security within a HC facility (HCF). Therefore, fully addressing the problem may be met with administrative resistance, resulting in poor employee perceptions of support and commitment for a zero-violence environment. A retrospective analysis was conducted on the HCF’s online incident reports, security request calls, and data from a previously deployed WPV employee survey. The emergency department …


Exploring Security, Privacy, And Reliability Strategies To Enable The Adoption Of Iot, Daud Alyas Kamin Jan 2017

Exploring Security, Privacy, And Reliability Strategies To Enable The Adoption Of Iot, Daud Alyas Kamin

Walden Dissertations and Doctoral Studies

The Internet of things (IoT) is a technology that will enable machine-to-machine communication and eventually set the stage for self-driving cars, smart cities, and remote care for patients. However, some barriers that organizations face prevent them from the adoption of IoT. The purpose of this qualitative exploratory case study was to explore strategies that organization information technology (IT) leaders use for security, privacy, and reliability to enable the adoption of IoT devices. The study population included organization IT leaders who had knowledge or perceptions of security, privacy, and reliability strategies to adopt IoT at an organization in the eastern region …


Is Cloud Computing In Healthcare Providing A Safe Environment For Storing Protected Health Information? A Systematic Review And Meta-Analysis, Ashley N. Hayes Nov 2016

Is Cloud Computing In Healthcare Providing A Safe Environment For Storing Protected Health Information? A Systematic Review And Meta-Analysis, Ashley N. Hayes

Applied Research Projects

Over the past several years, cloud computing has become increasingly more popular for the use of storing, accessing, and maintaining electronic health records (EHRs). In comparison to conventional EHR management tools, such as installed software, cloud computing offers more capabilities for medical facilities and their patients. Experts claim that in addition to changing the face of health information technology, it will also advance healthcare services, and benefit medical research. As the use of cloud computing has increased, so has the amount of healthcare data breaches. This study is proposing that there is a correlation between the increase in cloud computing …


Privacy And Security In Mobile Health – A Research Agenda, David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner Jun 2016

Privacy And Security In Mobile Health – A Research Agenda, David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner

Dartmouth Scholarship

Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges.


Handling Human Hacking: Creating A Comprehensive Defensive Strategy Against Modern Social Engineering, Charles Snyder Apr 2015

Handling Human Hacking: Creating A Comprehensive Defensive Strategy Against Modern Social Engineering, Charles Snyder

Senior Honors Theses

Social engineering is one of the most devastating threats to any company or business. Rather than relying upon technical flaws in order to break into computer networks, social engineers utilize a suave personality in order to deceive individuals through clever conversation. These devious conversations frequently provide the attacker with sufficient information to compromise the company’s computer network. Unlike common technical attacks, social engineering attacks cannot be prevented by security tools and software. Instead of attacking a network directly, a social engineer exploits human psychology in order to coerce the victim to inadvertently divulge sensitive information. Further complicating the issue, the …


Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward Jan 2015

Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward

Research outputs 2014 to 2021

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This …


Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw Dec 2014

Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw

Australian eHealth Informatics and Security Conference

Medical systems are designed for a range of end users from different professional skill groups and people who carry the devices in and on their bodies. Open, accurate, and efficient communication is the priority for medical systems and consequently strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorise ways to mitigate wireless security vulnerabilities. The benefits of wireless medical services are great in terms of efficiencies, mobility, and information management. These benefits may be realised by treating the vulnerabilities and …


Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo Dec 2014

Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo

Australian eHealth Informatics and Security Conference

This paper presents a case study of security issues related to the operationalization of smart-care, an electronic medical record (EMR) used to manage Human Immunodeficiency Virus (HIV) health information in Zambia. The aim of the smart-care program is to link up services and improve access to health information, by providing a reliable way to collect, store, retrieve and analyse health data in a secure way. As health professionals gain improved access to patient health information electronically, there is need to ensure this information is secured, and that patient privacy and confidentiality is maintained. During the initial stages of the program …


Securing Information Technology In Healthcare, Denise Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andrés Molina-Markham, Karen M. Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson Dec 2013

Securing Information Technology In Healthcare, Denise Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andrés Molina-Markham, Karen M. Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson

Dartmouth Scholarship

Information technology (IT) has great potential to improve healthcare quality while also improving efficiency, and thus has been a major focus of recent healthcare reform efforts. However, developing, deploying and using IT that is both secure and genuinely effective in the complex clinical, organizational and economic environment of healthcare is a significant challenge. Further, it is imperative that we better understand the privacy concerns of patients and providers, as well as the ability of current technologies, policies, and laws to adequately protect privacy. The Securing Information Technology in Healthcare (SITH) workshops were created to provide a forum to discuss security …