-
21
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01“…This rapid expansion brings heightened risks, including data breaches, fraud, and difficulties in safeguarding sensitive policyholder information. …”
Get full text
Article -
22
Development of a Solar-Powered Edge Processing Perimeter Alert System with AI and LoRa/LoRaWAN Integration for Drone Detection and Enhanced Security
Published 2025-01-01“…This technique is particularly relevant for security applications where there is a need to reduce the probability of intrusion or data breaches and to decentralize alert systems. Although drone detection has received great research attention, the ability to identify helicopters expands the spectrum of aerial threats that can be detected. …”
Get full text
Article -
23
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Published 2025-02-01“…Strong security measures are required to protect against unauthorized access, data breaches, and cyberattacks as these smart devices gather, transfer, and save sensitive information. …”
Get full text
Article -
24
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
Published 2025-02-01“…Currently, digital security breaches are becoming more common. Healthcare data breaches have compromised over 50 million medical records per year. …”
Get full text
Article -
25
Googling Patients
Published 2022-11-01“…For example, the FTC Act creates an obligation to maintain appropriate security of health data and requires entities to keep promises they make about privacy.[13] The Health Breach Notification Rule contains notice requirements for data breaches involving certain health information.[14] Additionally, the doctor-patient privilege protects confidential information from disclosure, and the exact confines of the privilege depend on the applicable statutes.[15] As these examples demonstrate, there are many different legal requirements that concern privacy and confidentiality in the health sphere. …”
Get full text
Article