- Browse by Subject
Browsing by Subject "confidentiality"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item An integrative review of adolescent trust in the healthcare provider relationship(Wiley, 2021-04) Hardin, Heather K.; Bender, Anna E.; Hermann, Carla P.; Speck, Barbara J.Aim: To conduct an integrative review of empirical studies examining factors affecting trust in the healthcare provider (HCP) relationship among adolescents. Design: An integrative review was conducted. Data sources: The keywords adolescent, trust, healthcare provider and related words were searched in multiple online research databases. The results were limited to research published between 2004 and 2019. Seventeen primary sources were identified and synthesized in the final review. Review method: Guided by the Whittemore and Knafl integrative review method, a data-based convergent synthesis design was used to explore the key research question in both qualitative and quantitative research. Results: This integrative review found that health care provider behaviours, such as confidentiality, honesty, respect, and empathy, promote adolescent's trust of the HCP. Notable gaps in the literature were also identified, including a lack of diversity among adolescent samples and HCP types and underdeveloped measures of adolescent trust of HCP. Conclusion: This integrative review informed the development of a new conceptual definition of adolescent trust of HCP, which embodies the key findings of the importance of HCP confidentiality, honesty, respect, and empathy. This definition can be used to develop instruments, interventions and policies that promote HCP trust among adolescents. Future research is needed to develop instruments to measure adolescents' trust of HCPs, evaluate trust of HCPs among diverse samples of adolescents and evaluate adolescent trust of HCPs with a variety of HCP types. Impact: The new conceptual definition of adolescent trust of HCP can be used to enhance nursing practice and design behavioural interventions to improve trust of HCP. To foster adolescent trust of HCP, policies should be enacted in healthcare institutions to explain confidentiality, provide notification of reporting mandates and formalize consent, assent and dissent for adolescents seeking health care.Item Chapter 13: Intellectual Property Issues Raised by Email(2012) Hook, Sara Anne; Dossa, Aly; Smith, Michael B.Item Excerpt from Chapter 13: Intellectual Property Issues Raised by Email(2011) Hook, Sara AnneItem Internet of Things Security Using Proactive WPA/WPA2(2016-04-05) Kamoona, Mustafa; El-Sharkawy, Mohamed A.; King, Brian; Rizkalla, MaherThe Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation.Item Secure Digital Provenance: Challenges and a New Design(2014) Rangwala, Mohammed M.; Zou, Xukai, 1963-; Li, Feng; Raje, Rajeev; Fang, ShiaofenDerived from the field of art curation, digital provenance is an unforgeable record of a digital object's chain of successive custody and sequence of operations performed on the object. It plays an important role in accessing the trustworthiness of the object, verifying its reliability and conducting audit trails of its lineage. Digital provenance forms an immutable directed acyclic graph (DAG) structure. Since history of an object cannot be changed, once a provenance chain has been created it must be protected in order to guarantee its reliability. Provenance can face attacks against the integrity of records and the confidentiality of user information, making security an important trait required for digital provenance. The digital object and its associated provenance can have different security requirements, and this makes the security of provenance different from that of traditional data. Research on digital provenance has primarily focused on provenance generation, storage and management frameworks in different fields. Security of digital provenance has also gained attention in recent years, particularly as more and more data is migrated in cloud environments which are distributed and are not under the complete control of data owners. However, there still lacks a viable secure digital provenance scheme which can provide comprehensive security for digital provenance, particularly for generic and dynamic ones. In this work, we address two important aspects of secure digital provenance that have not been investigated thoroughly in existing works: 1) capturing the DAG structure of provenance and 2) supporting dynamic information sharing. We propose a scheme that uses signature-based mutual agreements between successive users to clearly delineate the transition of responsibility of the digital object as it is passed along the chain of users. In addition to preserving the properties of confidentiality, immutability and availability for a digital provenance chain, it supports the representation of DAG structures of provenance. Our scheme supports dynamic information sharing scenarios where the sequence of users who have custody of the document is not predetermined. Security analysis and empirical results indicate that our scheme improves the security of the typical secure provenance schemes with comparable performance.Item Third Year Medical Students’ Knowledge of Privacy & Security Issues Concerning Mobile Devices(http://informahealthcare.com.proxy.medlib.iupui.edu/doi/abs/10.3109/0142159X.2012.670319, 2012-04-10) Whipple, Elizabeth C.; Allgood, Kacy L.; LaRue, Elizabeth M.BACKGROUND: The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. AIMS: To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. METHODS: We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. RESULTS: The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). CONCLUSIONS: As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.