Blockchain technologies adoption in healthcare: Overcoming barriers amid the hype cycle to enhance patient care
Technological Forecasting and Social Change,
Journal Year:
2025,
Volume and Issue:
213, P. 124031 - 124031
Published: Feb. 12, 2025
Language: Английский
Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data
Heliyon,
Journal Year:
2024,
Volume and Issue:
10(10), P. e31406 - e31406
Published: May 1, 2024
As
healthcare
systems
transition
into
an
era
dominated
by
quantum
technologies,
the
need
to
fortify
cybersecurity
measures
protect
sensitive
medical
data
becomes
increasingly
imperative.
This
paper
navigates
intricate
landscape
of
post-quantum
cryptographic
approaches
and
emerging
threats
specific
sector.
Delving
encryption
protocols
such
as
lattice-based,
code-based,
hash-based,
multivariate
polynomial
cryptography,
addresses
challenges
in
adoption
compatibility
within
systems.
The
exploration
potential
posed
attacks
vulnerabilities
existing
standards
underscores
urgency
a
change
basic
assumptions
security.
provides
detailed
roadmap
for
implementing
solutions,
considering
unique
faced
organizations,
including
integration
issues,
budget
constraints,
specialized
training.
Finally,
abstract
concludes
with
emphasis
on
importance
timely
strategies
ensure
resilience
face
evolving
threats.
not
only
offers
practical
insights
securing
but
also
serves
guide
future
directions
dynamic
cybersecurity.
Language: Английский
Tools of Emancipation as Global Web and its Digital Ecosystem
Published: Feb. 25, 2025
Language: Английский
Evaluating password security compliance in a Phuket private hospital: A UTAUT-based analysis
Multidisciplinary Reviews,
Journal Year:
2025,
Volume and Issue:
8(7), P. 2025195 - 2025195
Published: Feb. 5, 2025
The
study
presented
focuses
on
evaluating
password
security
compliance
within
a
private
hospital
in
Phuket,
employing
the
Unified
Theory
of
Acceptance
and
Use
Technology
(UTAUT)
framework.
Descriptive
statistics
reveal
that
416
healthcare
professionals
participated
survey,
with
55%
female.
Age
analysis
showed
nearly
half
(48.6%)
participants
were
under
30,
85.3%
held
bachelor's
degree.
Most
respondents
adhered
to
recommended
practices,
including
using
passwords
8-10
characters
incorporating
numbers,
uppercase
letters,
special
characters.
However,
significant
vulnerability
was
observed
as
83.41%
used
same
across
multiple
accounts.
Statistical
Structural
Equation
Modeling
(SEM)
indicated
performance
expectancy
(PE),
effort
(EE),
social
influence
(SI)
significantly
influenced
behavioral
intention
(BI)
comply
practices.
PE
had
highest
impact
(β
=
0.56,
p
<
0.001),
followed
by
EE
0.26,
SI
0.21,
0.002).
Facilitating
conditions
(FC)
affected
actual
usage
(USE)
moderate
0.12,
0.036).
experience
moderated
relationships
between
these
constructs,
suggesting
younger
less
experienced
employees
more
ease
use
expectations,
while
older
staff
relied
facilitating
conditions.
This
contributes
understanding
how
various
factors
healthcare,
emphasizing
need
for
tailored
interventions
based
demographic
differences
enhance
practices
effectively.
Language: Английский
Fintech-Enabled Telemedicine
Advances in finance, accounting, and economics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 313 - 330
Published: Feb. 7, 2024
This
chapter
examines
the
transformative
collaboration
between
financial
technology
(Fintech)
and
telemedicine,
highlighting
their
combined
potential
to
enhance
global
healthcare
accessibility,
affordability,
efficiency.
Addressing
regulatory,
privacy,
ethical
considerations,
explores
how
Fintech
contributes
overcoming
challenges
proposes
secure
frameworks
for
a
Fintech-enabled
telemedicine
ecosystem.
It
also
investigates
role
of
digital
currencies
blockchain
in
facilitating
cross-border
transactions.
The
concludes
with
recommendations
policymakers,
professionals,
innovators
harness
this
collaboration's
full
potential,
aiming
shape
more
accessible
advanced
future
healthcare.
Language: Английский
Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks
Bandr Fakiha
No information about this author
Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications,
Journal Year:
2024,
Volume and Issue:
15(1), P. 104 - 114
Published: March 29, 2024
As
critical
infrastructure
networks
become
more
interconnected
and
digitalized,
they
confront
increased
cyber
threats
fueled
by
the
growing
adoption
of
digitalized
working
general
operation
methods
around
world.
This
research
delves
into
complex
topic
network
security
examining
hidden
challenges
best
forensic
techniques
used
to
safeguard
these
crucial
systems.
The
study
utilizes
a
comprehensive
data
collection
approach
that
integrates
an
experiment
case
provide
in-depth
understanding
this
essential
subject.
It
assesses
efficacy
various
digital
procedures
customized
for
protection
using
meticulously
designed
experiments
within
controlled
simulated
environments.
findings
highlight
wide
range
organizations
tasked
with
maintaining
securing
encounter.
illuminates
how
practices
can
be
in
incident
response
recovery
situations.
results
significance
diversified
safeguarding
networks.
They
emphasize
need
modern
practices,
such
as
blockchain
technology
Artificial
intelligence,
analyzing
from
study.
Language: Английский
CYBER FRAUD AS A THREAT TO THE SUSTAINABLE DEVELOPMENT OF THE HEALTH CARE SYSTEM: A SYSTEMATIC BIBLIOMETRIC ANALYSIS
Сталий розвиток економіки,
Journal Year:
2023,
Volume and Issue:
2(47), P. 50 - 57
Published: Dec. 29, 2023
There
is
a
growing
wave
of
cyber
fraud
in
the
healthcare
industry.
Cases
breaches
confidentiality
and
security,
leakage,
theft
breach
medical
confidential
data,
fraudsters
gaining
access
to
machines
networks
institutions
have
become
more
frequent.
The
main
purpose
study
retrospective
current
systematic
bibliometric
analysis
scientific
research
field
as
threat
sustainable
development
health
care
system
based
on
Scopus,
VOS
Viewer,
Statista.
relevance
solving
this
problem
lies
conducting
not
traditional,
but
comprehensive
innovative
industry,
identifying
priority
dynamic,
geographical
inter-sectoral
links
directions,
problematic
aspects.
was
carried
out
following
logical
sequence:
determining
criteria
for
selecting
publications
system;
dynamics
articles
area;
analyzing
distribution
research;
studying
subject
areas
under
study;
forming
clusters
by
key
terms;
building
an
evolutionary
temporal
map
relationships
studied
categories
with
other
concepts
dynamics.
Scopus
platform,
Viewer
software,
Statista
statistical
database
were
used
analytical
tools
study.
theoretically
proves
existence
close
relationship
between
fraud.
results
proposed
model
industry
will
allow
timely
identification
aspects
terms
cybersecurity,
improve
protection
patients,
patient
hospital
security
management,
strengthen
devices,
minimize
risks
losses
system,
organize
ensure
good
people.
Language: Английский