Displaying publications 21 - 40 of 43 in total

Abstract:
Sort:
  1. Abbasi IA, Jan SU, Alqahtani AS, Khan AS, Algarni F
    PLoS One, 2024;19(1):e0294429.
    PMID: 38289970 DOI: 10.1371/journal.pone.0294429
    Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary can easily enter the server to access sensitive information, especially for the healthcare industry, which offers services to patients, researchers, labs, and hospitals in a flexible way with minimal operational costs. It is challenging to make it a reliable system and ensure the privacy and security of a cloud-enabled healthcare system. In this regard, numerous security mechanisms have been proposed in past decades. These protocols either suffer from replay attacks, are completed in three to four round trips or have maximum computation, which means the security doesn't balance with performance. Thus, this work uses a fuzzy extractor method to propose a robust security method for a cloud-enabled healthcare system based on Elliptic Curve Cryptography (ECC). The proposed scheme's security analysis has been examined formally with BAN logic, ROM and ProVerif and informally using pragmatic illustration and different attacks' discussions. The proposed security mechanism is analyzed in terms of communication and computation costs. Upon comparing the proposed protocol with prior work, it has been demonstrated that our scheme is 33.91% better in communication costs and 35.39% superior to its competitors in computation costs.
    Matched MeSH terms: Privacy
  2. Guangnan Z, Tao H, Rahman MA, Yao L, Al-Saffar A, Meng Q, et al.
    Work, 2021;68(3):871-879.
    PMID: 33612530 DOI: 10.3233/WOR-203421
    BACKGROUND: An isolated robot must take account of uncertainty in its world model and adapt its activities to take into account such as uncertainty. In the same way, a robot interaction with security and privacy issues (RISAPI) with people has to account for its confusion about the human internal state, as well as how this state will shift as humans respond to the robot.

    OBJECTIVES: This paper discusses RISAPI of our original work in the field, which shows how probabilistic planning and system theory algorithms in workplace robotic systems that work with people can allow for that reasoning using a security robot system. The problem is a general way as an incomplete knowledge 2-player game.

    RESULTS: In this general framework, the various hypotheses and these contribute to thrilling and complex robot behavior through real-time interaction, which transforms actual human subjects into a spectrum of production systems, robots, and care facilities.

    CONCLUSION: The models of the internal human situation, in which robots can be designed efficiently, are limited, and achieve optimal computational intractability in large, high-dimensional spaces. To achieve this, versatile, lightweight portrayals of the human inner state and modern algorithms offer great hope for reasoning.

    Matched MeSH terms: Privacy
  3. Chong EY, Palanisamy UD, Jacob SA
    Patient Prefer Adherence, 2019;13:195-207.
    PMID: 30774315 DOI: 10.2147/PPA.S182516
    Purpose: This study prepares the groundwork on the potential design and development of a mobile health (mHealth) app that will be able to bridge the communication gap between pharmacists and patients who are Deaf and Hard of Hearing (DHoH).

    Patients and methods: A focus group discussion was conducted with 12 community pharmacists. Participants were recruited using snowball sampling. Audio-recordings were transcribed verbatim, and analyzed using a thematic approach.

    Results: Three themes were apparent: 1) suggestions for app design and content, 2) perceived benefits of the app, and 3) potential challenges related to the app. Participants believed the app would be able to facilitate and improve communication, and hence relationship, between pharmacists and the DHoH. Potential challenges of the app were highlighted, such as the need for manpower to manage the app, and its cost to this group of economically disadvantaged people. There were also concerns about privacy and security.

    Conclusions: This study allowed community pharmacists, one of the end-users of the app, to provide feedback on the contents and design of the app, which would allow them to provide pharmaceutical care services to patients who are DHoH, and better serve them. Potential benefits and challenges of the app were also identified. Undoubtedly, through the mHealth app, community pharmacists will be better equipped to serve and communicate with the DHoH, and this will hopefully translate to improved health outcomes in these patients.

    Matched MeSH terms: Privacy
  4. Aldeen YA, Salleh M, Aljeroudi Y
    J Biomed Inform, 2016 08;62:107-16.
    PMID: 27369566 DOI: 10.1016/j.jbi.2016.06.011
    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation.
    Matched MeSH terms: Privacy
  5. Amin L, Hashim H, Mahadi Z, Ismail K
    BMC Med Res Methodol, 2018 12 05;18(1):163.
    PMID: 30518344 DOI: 10.1186/s12874-018-0619-2
    BACKGROUND: The demand in biobanking for the collection and maintenance of biological specimens and personal data from civilians to improve the prevention, diagnosis and treatment of diseases has increased notably. Despite the advancement, certain issues, specifically those related to privacy and data protection, have been critically discussed. The purposes of this study are to assess the willingness of stakeholders to participate in biobanking and to determine its predictors.

    METHODS: A survey of 469 respondents from various stakeholder groups in the Klang Valley region of Malaysia was carried out. Based on previous research, a multi-dimensional instrument measuring willingness to participate in biobanking, and its predictors, was constructed and validated. A single step Structural Equation Modelling was performed to analyse the measurements and structural model using the International Business Machines Corporation Software Package for Social Sciences, Analysis of Moment Structures (IBM SPSS Amos) version 20 with a maximum likelihood function.

    RESULTS: Malaysian stakeholders in the Klang Valley were found to be cautious of biobanks. Although they perceived the biobanks as moderately beneficial (mean score of 4.65) and were moderately willing to participate in biobanking (mean score of 4.10), they professed moderate concern about data and specimen protection issues (mean score of 4.33). Willingness to participate in biobanking was predominantly determined by four direct predictors: specific application-linked perceptions of their benefits (β = 0.35, p 
    Matched MeSH terms: Privacy
  6. Jamal AA, Aldawsari ST, Almufawez KA, Barri RM, Zakaria N, Tharkar S
    Int J Med Inform, 2020 09;141:104202.
    PMID: 32506051 DOI: 10.1016/j.ijmedinf.2020.104202
    BACKGROUND: The use of social media is widespread globally. It provides a quicker and faster means of efficient exchange of communications. The use of Twitter Applications to seek mental health advice is becoming popular.

    OBJECTIVES: This study aims to identify the determinants associated with Twitter use in psychiatric consultations and to assess the level of satisfaction in using the microblogging platform. In addition, the level of e-health literacy is also assessed among users.

    METHODS: The target population included Twitter users seeking psychiatric consultation. A leading psychiatrist's twitter account with 4.5 million followers was selected and consent obtained. A validated Patient Satisfaction Questionnaire was adopted to assess the level of satisfaction in Twitter use and e-health literacy. The questionnaire was tagged to the chosen Twitter account and reminders were sent until the sample size was reached. Data was analysed using SPSS version 22.0. The analysis included descriptive statistics tabulation, multi-response analysis, and cross-tabulation for satisfaction variables and the chi-square test was used to measure association between different variables.

    RESULTS: The study obtained 155 completed response sheets, of which 52 were Twitter users seeking psychiatric advice while the rest sought general health advice. Most of the study participants were females (71.6 %). Women, single status and income range between 4000-9000 Saudi riyal were found to be significantly associated with Twitter use for psychiatric consultation. Generally, most of the participants were satisfied with Twitter in seeking psychiatric consultation that reduced financial disbursement. Furthermore, concerns were expressed regarding the waiting period, word limitations and issues of privacy. The e-health literacy was higher among the participants.

    CONCLUSION: Psychiatric consultations via Twitter is more popular among women. By addressing privacy issues and reducing response time, Twitter may be used as a major platform to deliver mental health services to the population.

    Matched MeSH terms: Privacy
  7. Pius Owoh N, Mahinderjit Singh M
    Sensors (Basel), 2020 Jun 09;20(11).
    PMID: 32526843 DOI: 10.3390/s20113280
    The proliferation of mobile devices such as smartphones and tablets with embedded sensors and communication features has led to the introduction of a novel sensing paradigm called mobile crowd sensing. Despite its opportunities and advantages over traditional wireless sensor networks, mobile crowd sensing still faces security and privacy issues, among other challenges. Specifically, the security and privacy of sensitive location information of users remain lingering issues, considering the "on" and "off" state of global positioning system sensor in smartphones. To address this problem, this paper proposes "SenseCrypt", a framework that automatically annotates and signcrypts sensitive location information of mobile crowd sensing users. The framework relies on K-means algorithm and a certificateless aggregate signcryption scheme (CLASC). It incorporates spatial coding as the data compression technique and message query telemetry transport as the messaging protocol. Results presented in this paper show that the proposed framework incurs low computational cost and communication overhead. Also, the framework is robust against privileged insider attack, replay and forgery attacks. Confidentiality, integrity and non-repudiation are security services offered by the proposed framework.
    Matched MeSH terms: Privacy
  8. Al-Shareeda MA, Manickam S
    Int J Environ Res Public Health, 2022 Nov 24;19(23).
    PMID: 36497709 DOI: 10.3390/ijerph192315618
    The COVID-19 pandemic is currently having disastrous effects on every part of human life everywhere in the world. There have been terrible losses for the entire human race in all nations and areas. It is crucial to take good precautions and prevent COVID-19 because of its high infectiousness and fatality rate. One of the key spreading routes has been identified to be transportation systems. Therefore, improving infection tracking and healthcare monitoring for high-mobility transportation systems is impractical for pandemic control. In order to enhance driving enjoyment and road safety, 5G-enabled vehicular fog computing may gather and interpret pertinent vehicle data, which open the door to non-contact autonomous healthcare monitoring. Due to the urgent need to contain the automotive pandemic, this paper proposes a COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing. The proposed scheme consists of two different aspects of the special flag, SF = 0 and SF = 1, denoting normal and COVID-19 vehicles, respectively. The proposed scheme satisfies privacy and security requirements as well as achieves COVID-19 and healthcare solutions. Finally, the performance evaluation section shows that the proposed scheme is more efficient in terms of communication and computation costs as compared to most recent related works.
    Matched MeSH terms: Privacy
  9. Marret MJ, Choo WY
    J Interpers Violence, 2018 08;33(15):2352-2378.
    PMID: 26787607 DOI: 10.1177/0886260515625502
    This study aimed to determine contact and privacy risks encountered by Malaysian adolescents with access to the Internet and mobile phones and factors associated with face-to-face meetings with online acquaintances as well as to estimate the prevalence of subsequent victimization. Secondary school students from randomly selected public schools in Selangor and Kuala Lumpur responded to an anonymous self-administered questionnaire (78% response rate). Out of 3,349 Internet or mobile phone users, 51% had been invited to meet offline with an online-meeting acquaintance and 30% complied. Of the 1,005 respondents who went to offline meetings, 55% had meetings with more than six people. Male gender, Malay ethnicity, online access at an Internet café, viewing pornography on the Internet, the absence of parental restrictions on visiting certain website and chat rooms, not being explicitly forbidden to meet strangers encountered online, and disclosure of personal information were significantly associated with increased odds of face-to-face meetings with online acquaintances. Verbal, physical, or sexual assaults were reported by 5.5% of the 1,005 including 13 males and five females who reported forced sexual intercourse. Similarities as well as differences in factors associated with risk-taking behavior compared with adolescents in Western countries have important implications on policy and intervention.
    Matched MeSH terms: Privacy
  10. May, Fen Gan, Hui, Na Chua, Siew, Fan Wong, Irene, Ai Lian Tan
    MyJurnal
    With the increase of consumers’ privacy concerns and the government-enforced regulations on data protection, it is necessary for organizations to implement Privacy Enhancing Technologies (PETs) to protect consumers’ personal data. PETs refer to any protection in the form of technology. Since employees are the main stakeholders who are directly involved in the PETs implementation and execution process, it is important to understand employees’ perceptions especially those daily tasks involving the process of collecting and processing consumers’ data. Prior literature showed limited research on the effects of PETs implementation through employees’ work process and their perception on the implementation in protection personal data. Hence, the purpose of this research is to explore how PETs adoption affects employees’ work process and their perception. A qualitative single case study was adopted in a telecommunications company in Malaysia. Data were collected through in-depth interviews from nine respondents who were involved in data collecting, data processing and data controlling in their daily tasks. The results showed that employees experience difference levels of change depending on their work nature. The affected areas of change in implementing PETs are workload, communication level and data access. Employees also raised their concerns on vendors’ accountability. This research provides an insight into employees’ perception towards personal data protection based on their experience in implementing PETs. Continuous awareness, updates, monitoring and evaluating of system are perceived as the key to successful PETs implementation in protecting personal data.
    Matched MeSH terms: Privacy
  11. Sohayla M. Attalla, Jalal Ebrahim, Hassan Ads, Najibah Abdul Razak, Nabishah Mohamad
    MyJurnal
    Introduction: Recently mobile communication technology had tremendous advances and became the priority for most of the users with some opponent opinions that highlight the accountability and the privacy issues in using these messaging applications. WhatsApp is scored to be the first top used messaging application worldwide that is used in 180 countries by about 1.5 billion population. This research aims to determine the staff reflections regarding the WhatsApp usage for organizational communication. Methods: This study is implied among the staff at the medical and health life science cluster, Management and Science University (MSU), Malaysia. A questionnaire was distributed to all the staff through an online google form. Responses were analysed by the ‘Statistical Package for Social Sciences’ (SPSS) Version 24.0. Results: Results showed that all the staff responded (100%) are using WhatsApp for organizational communication with variable degrees of satisfaction; 8.1% are extremely satisfied, 61.3 % are satisfied, 12.9% are not satisfied and 16.1 % are extremely not satisfied. Their level of satisfaction is significantly affected by the respondent’s age, benefit of usage, and the time of messaging. Conclusion: To ensure effectiveness of communication through WhatsApp, it should be through official groups and the organization should put specific announced rules for the time of usage and the content of messages to be posted to all members.
    Matched MeSH terms: Privacy
  12. LIM SOK FERN, SITI ZANARIAH AHMAD ISHAK
    MyJurnal
    The aim of this study is to examine the factors that drive students’ self-disclosure on Social Networking Sites (SNSs). A total of 215 undergraduates from two public universities in East Malaysia were recruited as respondents. This study adapts self-disclosure model by Elmi, A.Iahad and Ahmed (2012), where the model proposed trust as one of the factors that complementing other existing factors in online self-disclosure. This study proved that privacy concerns (r = -.212, p < .01), perceived trust (r = .22, p < .01), perceived ease of use (r = .213, p < .01), and perceived enjoyment (r = .28, p < .01) are significantly related to students’ online self-disclosure on SNSs. In addition, as trust plays a vital role in moderating the users’ online self-disclosure behavior, this study formulated students’ trusts on SNSs based on three dimensions which are individual, institutional and online trust. Findings of study suggested that there is a significant difference between online trust based on male and female respondents.
    Matched MeSH terms: Privacy
  13. Akhtari-Zavare, M., Mohd Yunus, A., Hassan, S. T. S., Salmiah, S., Kamali, M.
    MyJurnal
    Background: Patients’ satisfaction with their nursing care is an important issue in assessing the quality
    of nursing care. In Iran, cancer patients’ satisfaction at teaching hospitals of Tehran City has not been
    investigated. Aim: A cross sectional study was conducted to determine the level and identify factors that contributed to patients’ satisfaction in nursing care provided at selected teaching hospitals in Tehran City, Islamic Republic of Iran. Method: A proportional stratified sampling method was used and data were collected via face-to-face interview based on a validated Patient Satisfaction Questionnaire (PSQ). A total of 384 cancer patients aged 14 years and above were selected. Result: The majority of respondents were males (201, 52.4%), age group 45-54 years (102, 26.4%); employed (202, 52.6%) and with a family monthly income of US$200-500 (234, 60.9%).The majority (314, 81.8%) of respondents were hospitalized between 2 to 5 days, and most (204, 54.0%) of them were admitted to teaching hospital B of The University of Medical Science.1 A majority of the respondents (318, 82.8%) was satisfied with the nursing care provided, while the others (66, 17.2%) were not. Generally, most of the respondents were satisfied with the amount of information given by the nurses (294, 76.6%), technical quality (295, 76.8%), interpersonal relationship (371, 96.6%), and physical environment (267, 69.5%). There was a positive significant relationship between patients’ satisfaction and type of hospital ( 2=4.985; df=1; p=0.026, n=384). Using the University’s hospital type was found to be the best predictor for level of satisfaction. Conclusion: Most of the respondents were satisfied with the nursing care. However, the respondents suggested several improvements such as increasing the number of doctors, improving socioenvironment factors in terms of privacy and interpersonal relationship, and improving on the existing facilities. Further research is needed to study in depth the socio-cultural and environment parameters which are relevant to patients’ satisfaction with nursing care.
    Matched MeSH terms: Privacy
  14. Htay MNN, McMonnies K, Kalua T, Ferley D, Hassanein M
    PMID: 32489996 DOI: 10.4103/jehp.jehp_321_18
    CONTEXT: In the era of technology, social networking has become a platform for the teaching-learning process. Exploring international students' perspective on using Twitter would reveal the barriers and potential for its use in higher educational activities.

    AIMS: This study aimed to explore the postgraduate students' perspective on using Twitter as a learning resource.

    SUBJECTS AND METHODS: This qualitative study was conducted as part of a postgraduate program at a university in the United Kingdom. A focus group discussion and five in-depth interviews were conducted after receiving the informed consent. The qualitative data were analyzed by R package for Qualitative Data Analysis software.

    ANALYSIS USED: Deductive content analysis was used in this study.

    RESULTS: Qualitative analysis revealed four salient themes, which were (1) background knowledge about Twitter, (2) factors influencing the usage of Twitter, (3) master's students' experiences on using Twitter for education, and (4) potential of using Twitter in the postgraduate study. The students preferred to use Twitter for sharing links and appreciated the benefit on immediate dissemination of information. Meanwhile, privacy concern, unfamiliarity, and hesitation to participate in discussion discouraged the students from using Twitter as a learning platform.

    CONCLUSIONS: Using social media platforms in education could be challenging for both the learners and the educators. Our study revealed that Twitter was mainly used for social communication among postgraduate students however most could see a benefit of using Twitter for their learning if they received adequate guidance on how to use the platform. The multiple barriers to using Twitter were mainly related to unfamiliarity which should be addressed early in the learning process.

    Matched MeSH terms: Privacy
  15. Sudha R, Thiagarajan AS, Seetharaman A
    Pak J Biol Sci, 2007 Jan 01;10(1):102-6.
    PMID: 19069993
    The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.
    Matched MeSH terms: Privacy
  16. Rahman MM, Muniyandi RC, Sahran S, Usman OL, Moniruzzaman M
    Sci Rep, 2024 Jul 09;14(1):15763.
    PMID: 38982129 DOI: 10.1038/s41598-024-66603-y
    The timely identification of autism spectrum disorder (ASD) in children is imperative to prevent potential challenges as they grow. When sharing data related to autism for an accurate diagnosis, safeguarding its security and privacy is a paramount concern to fend off unauthorized access, modification, or theft during transmission. Researchers have devised diverse security and privacy models or frameworks, most of which often leverage proprietary algorithms or adapt existing ones to address data leakage. However, conventional anonymization methods, although effective in the sanitization process, proved inadequate for the restoration process. Furthermore, despite numerous scholarly contributions aimed at refining the restoration process, the accuracy of restoration remains notably deficient. Based on the problems identified above, this paper presents a novel approach to data restoration for sanitized sensitive autism datasets with improved performance. In the prior study, we constructed an optimal key for the sanitization process utilizing the proposed Enhanced Combined PSO-GWO framework. This key was implemented to conceal sensitive autism data in the database, thus avoiding information leakage. In this research, the same key was employed during the data restoration process to enhance the accuracy of the original data recovery. Therefore, the study enhanced the restoration process for ASD data's security and privacy by utilizing an optimal key produced via the Enhanced Combined PSO-GWO framework. When compared to existing meta-heuristic algorithms, the simulation results from the autism data restoration experiments demonstrated highly competitive accuracies with 99.90%, 99.60%, 99.50%, 99.25%, and 99.70%, respectively. Among the four types of datasets used, this method outperforms other existing methods on the 30-month autism children dataset, mostly.
    Matched MeSH terms: Privacy
  17. Zolkefli Y
    Malays J Med Sci, 2021 Apr;28(2):157-160.
    PMID: 33958969 DOI: 10.21315/mjms2021.28.2.14
    People suffering from mental health conditions are often unwilling to reveal their status and this includes health professionals. They may wrestle with the pros and cons of revealing their health status to their employer in particular as they seek to reconcile personal privacy with professional duty. There is no simple, clear consensus as to whether they have a moral duty to share the information voluntarily or explicitly to share it with the employer. Additionally, there is a concern as to whether a degree of non-disclosure is justifiable to protect the privacy of health care professionals in some circumstances. Decisions surrounding the disclosure of a mental health problem are nuanced and may require that competing needs and values be reconciled. Although self-declared mental health status is an intrinsic moral good, the healthcare professional needs to feel confident and ready to come forward.
    Matched MeSH terms: Privacy
  18. Jacob SA, Chong EY, Goh SL, Palanisamy UD
    Mhealth, 2021;7:29.
    PMID: 33898598 DOI: 10.21037/mhealth.2020.01.04
    Background: Deaf and hard-of-hearing (DHH) patients have trouble communicating with community pharmacists and accessing the healthcare system. This study explored the views on a proposed mobile health (mHealth) app in terms of design and features, that will be able to bridge the communication gap between community pharmacists and DHH patients.

    Methods: A community-based participatory research method was utilized. Two focus group discussions (FGDs) were conducted in Malaysian sign language (BIM) with a total of 10 DHH individuals. Respondents were recruited using purposive sampling. Video-recordings were transcribed and analyzed using a thematic approach.

    Results: Two themes emerged: (I) challenges and scepticism of the healthcare system; and (II) features of the mHealth app. Respondents expressed fears and concerns about accessing healthcare services, and stressed on the need for sign language interpreters. There were also concerns about data privacy and security. With regard to app features, the majority preferred videos instead of text to convey information about their disease and medication, due to their lower literacy levels.

    Conclusions: For an mHealth app to be effective, app designers must ensure the app is individualised according to the cultural and linguistic diversity of the target audience. Pharmacists should also educate patients on the potential benefits of the app in terms of assisting patients with their medicine-taking.

    Matched MeSH terms: Privacy
  19. Daphne Clemente, Nurul Amiella Abdullah, ZurianahJusmin Jasmin, Muhammad Syafiq Abdullah, Helen Benedict Lasimbang, Wendy Diana Shoesmith, et al.
    MyJurnal
    Introduction: Continuous quality improvement of system is essential to improve efficiency of working environ- ment. Limited financial allocation in low resource setting results in the vicious circle of having inadequate money to purchase a new system and print paper documents that are required for the operation of clinic. A staff-initiated system improvement with the name of “PRW UMS Staff Portal” was attempted to break-free from the vicious cycle. Methods: An online system covering different aspects of routine clinical work of healthcare workers was created in Dec 2019 and implemented in Feb 2020 using Google SiteTM by the nurses of a local university community clinic, which included: submission of daily reports of nurses and assistant medical officers, submission of reports of all programmes conducted by the clinic, surveillance of health status of working staffs, announcement and request of working roster, archiving of documents, and medication inventory. The system could only be accessed using official working email for general documents while accesses to sensitive documents were restricted to relevant staffs to pro- tect privacy and confidentiality of information. Qualitative interviews were performed with all nursing staff involved. Results: Qualitative feeling of improvement in coordination of workflow was reported by all 23 staffs working in the clinic in view of the easy access of system using smartphone and computer at workstation. It also reduced the need to move away from the working station in order to access, replenish, or submit the printed documents and reports. Significant amount of paper and printing were saved monthly. Conclusions: Despite positive feedback from the staffs, the system requires further improvement in terms of function and security. Further evaluation on cost-efficiency of the system can be done to promote the system to other universities.

    Matched MeSH terms: Privacy
  20. Patricia Sator
    MyJurnal
    Introduction: Nursing is a regulated profession. Hence, the global commitment for nurses to maintain standards of practice is vital to deliver safe and competent care. Written policies will eliminate uncertainty, ambiguity, and legal issues. For this study, it focused on the importance of the nursing students to understand and practice the regulation on patient’s confidentiality in healthcare setting with the usage of technology such as social media. There is a case like nursing student infringe the privacy of patients with the information they posted on social media, such as posting a patient’s photos or videos without valid consent. Methods: This study is a quantitative, cross-sectional survey de- sign. The respondents were selected as convenience sampling of 120 nursing students from the Faculty of Medicine and Health Sciences, Universiti Malaysia Sabah (FMHS, UMS). Results: There are 7.4% nursing students intention- ally posted in social media, 18.0% maybe and 73.8% unintentionally. And for their guilty feeling after committing confidentially policy breach on patient, there are 8.2% said NO, 32.8% said MAYBE and 59% said YES. Overall, the nursing students are aware of the patient’s confidentiality but there is still a leakage in practicing full nursing standards and regulation. Further study recommended to explore more on this issue. Conclusion: As a conclusion, this study is relevant to conduct among the nursing students to gain their understanding regarding the responsibilities as a future nurse in maintaining the patient’s confidentiality as one of the most important nursing practices to ensure quality of care and continuation of professional service of nursing profession.
    Matched MeSH terms: Privacy
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links