Results 11 to 20 of about 73,868 (305)

Blockchain-Based Supply Chain Management Ensuring Transparency and Traceability in Logistics Operations [PDF]

open access: yesITM Web of Conferences
Blockchain Logistics: A Guided Investigation of Operations Management Solutions and Applications is a perfect starting point for professionals working in supply chain management—defeating speculation, risk and uncertainty: the authors encourage readers ...
Chinthamu Narender   +5 more
doaj   +1 more source

A Logical Method for Policy Enforcement over Evolving Audit Logs [PDF]

open access: yes, 2011
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule. The logic has three features that raise challenges for enforcement -
Datta, Anupam, Garg, Deepak, Jia, Limin
core   +2 more sources

Measuring the impact of spatial perturbations on the relationship between data privacy and validity of descriptive statistics

open access: yesInternational Journal of Health Geographics, 2021
Background Like many scientific fields, epidemiology is addressing issues of research reproducibility. Spatial epidemiology, which often uses the inherently identifiable variable of participant address, must balance reproducibility with participant ...
Kelly Broen, Rob Trangucci, Jon Zelner
doaj   +1 more source

Pragmatic, Interdisciplinary Perspectives on Blockchain and Distributed Ledger Technology: Paving the Future for Healthcare

open access: yesBlockchain in Healthcare Today, 2018
Background: Blockchain and distributed ledger technology is a disruptive force in healthcare. Methods: This article provides a globally relevant, interdisciplinary perspective intended to aid disparate group of actors, participants, and users that ...
Ron Ribitzky   +8 more
doaj   +1 more source

The medical science DMZ: a network design pattern for data-intensive medical science [PDF]

open access: yes, 2017
: Objective We describe a detailed solution for maintaining high-capacity, data-intensive network flows (eg, 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods
Balas, Edward   +8 more
core   +1 more source

User Control of Personal mHealth Data Using a Mobile Blockchain App: Design Science Perspective

open access: yesJMIR mHealth and uHealth, 2022
BackgroundIntegrating pervasive computing with blockchain’s ability to store privacy-protected mobile health (mHealth) data while providing Health Insurance Portability and Accountability Act (HIPAA) compliance is a challenge ...
Arijit Sengupta, Hemang Subramanian
doaj   +1 more source

Privacy and security of patient data in the pathology laboratory

open access: yesJournal of Pathology Informatics, 2013
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data.
Ioan C Cucoranu   +8 more
doaj   +1 more source

Changes in the office for civil rights enforcement policy on telehealth remote communications in response to COVID-19

open access: yesJournal of Pediatric Rehabilitation Medicine, 2020
The novel coronavirus, the cause of COVID-19, has sent shockwaves throughout the world, shuttered many businesses essentially overnight, and has left billions living worldwide in quarantine.
Thomas J. Mortell, Austin T. Strobel
doaj   +1 more source

Admissions Interview Day HIPAA TBL

open access: yesMedEdPORTAL, 2013
This resource serves as an experiential introduction to team-based learning (TBL) on admissions interview day for applicants to health care profession schools that use this active-learning modality in their curriculum.
Richard Sabina   +4 more
doaj   +1 more source

IoT medical device risks: Data security, privacy, confidentiality and compliance with HIPAA and COBIT 2019

open access: yesSouth African Journal of Business Management
Purpose: This study aimed to develop a comprehensive framework to enable the identification of risks pertaining to data security, privacy and confidentiality when using medical Internet of Things (IoT) devices. Design/methodology/approach: A qualitative,
Na-ella Khan, Riaan J. Rudman
doaj   +1 more source

Home - About - Disclaimer - Privacy