Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Leveraging Next-Gen Technology For Supply Chain Security, Thomas Drape, Reginald P. Parker Dec 2022

Leveraging Next-Gen Technology For Supply Chain Security, Thomas Drape, Reginald P. Parker

Journal of Vincentian Social Action

Global supply chain disruptions continue as part of both a national and global discussion. There is a need for a greater focus on supply chain security as part of this discussion as there is an increasing amount of counterfeit parts and goods within global supply chains. While counterfeit activity is an economic burden to companies and the global market, there are also legitimate concerns on consumer safety, consumer trust and company brand management.

The aim for this paper is to identify the concern and extent of the counterfeit problem and identify the use of next-gen technologies to provide brand protection …


Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro Jan 2022

Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro

Graduate School of Business Publications

The use of electronic medical records (EMRs) plays a crucial role in the successful implementation of the Universal Healthcare Law which promises quality and affordable healthcare to all Filipinos. Consequently, the current adoption of EMRs should be studied from the perspective of the healthcare provider. As most studies look into use of EMRs by doctors or patients, there are very few that extend studies to look at possible interaction of doctor and patient in the same EMR environment. Understanding this interaction paves the way for possible incentives that will increase the use and adoption of the EMR. This study uses …


Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong Jan 2018

Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong

Articles by Maurer Faculty

Cybersecurity, including the security of information technology (IT), is a critical requirement in ensuring society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government's campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140-million Americans' credit reports, mitigating cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and …