scholarly journals Enterprise Data Protection : Meeting Requirements with Efficient and Cost Effective Methods

Author(s):  
Khaled Aldossari
2002 ◽  
Vol 8 (6) ◽  
pp. 319-324 ◽  
Author(s):  
Pekka T Jaatinen ◽  
Jari Forsström ◽  
Pekka Loula

A literature survey was carried out to identify papers describing teleconsulting applications. From 1259 potentially relevant articles identified through Medline, 128 articles were selected for review. The majority of these had been published in the Journal of Telemedicine and Telecare (50 articles, or 39%). We analysed different user groups, equipment and implementation issues, and the type of connections. In 101 studies (79%) the teleconsultations were between doctors, in 11 they were between patient and doctor, in seven between patient and nurse, and in nine between nurse and doctor. Studies of consultations between patients and health-care professionals were thus quite rare. Surgery was the most common specialty in which teleconsultation was described. The teleconsultations were realtime or mainly realtime in 72% of articles. In 39% of studies the primary focus was on videoconferencing. The most common means of connection was by ISDN digital lines (38%). There were very few mentions of how to ensure data protection or to maintain patient confidentiality. We conclude that, for the majority of teleconsultation needs, asynchronous communication is the most flexible and cost-effective approach. Realtime videoconferencing can be justified only in particular circumstances.


2016 ◽  
Vol 14 (1) ◽  
pp. 49-69 ◽  
Author(s):  
Milica Milutinovic ◽  
Bart De Decker

Purpose – The medical advances and historical fluctuations in the demographics are contributing to the rise of the average age. These changes are increasing the pressure to organize adequate care to a growing number of individuals. As a way to provide efficient and cost-effective care, eHealth systems are gaining importance. However, this trend is creating new ethical concerns. Major issues are privacy and patients’ control over their data. To deploy these systems on a large scale, they need to offer strict privacy protection. Even though many research proposals focus on eHealth systems and related ethical requirements, there is an evident lack of practical solutions for protecting users’ personal information. The purpose of this study is to explore the ethical considerations related to these systems and extract the privacy requirements. This paper also aims to put forth a system design which ensures appropriate privacy protection. Design/methodology/approach – This paper investigates the existing work in the area of eHealth systems and the related ethical considerations, which establish privacy as one of the main requirements. It lists the ethical requirements and data protection standards that a system needs to fulfil and uses them as a guideline for creating the proposed design. Findings – Even though privacy is considered to be a paramount aspect of the eHealth systems, the existing proposals do not tackle this issue from the outset of the design. Consequently, introducing privacy at the final stages of the system deployment imposes significant limitations and the provided data protection is not always to the standards expected by the users. Originality/value – This paper motivates the need for addressing ethical concerns in the eHealth domain with special focus on establishing strict privacy protection. It lists the privacy requirements and offers practical solutions for developing a privacy-friendly system and takes the approach of privacy-by-design. Additionally, the proposed design is evaluated against ethical principles as proposed in the existing literature. The aim is to show that technological advances can be used to improve quality and efficiency of care, while the usually raised concerns can be avoided.


Author(s):  
Rajesh Keshavrao Sadavarte ◽  
G. D. Kurundkar

Cloud computing changed the world of Internet. With the help of cloud computing user can easily share, store and retrieve their data from anywhere. Cloud computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. Cloud computing provides hardware, software and infrastructural storage to many users at a time Most of the times cloud users don’t know the exact location of their data or the sources of data stored with their data. In spite of various benefits that are provided by the cloud computing services, its users are very much afraid about the security of their data once it is over the cloud under the control of third-party vendors. Therefore, many data security and integrity concerns like access control, searchable encryption techniques, key management, ownership proofs and remote integrity check arise. This paper discusses the security and integrity of data in cloud computing. It is a study of aspects related to data security. The paper will go in to details of few data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Going ahead the paper also discuss different techniques used for secured data storage on cloud.


Author(s):  
Lawrence M. Roth

The female reproductive tract may be the site of a wide variety of benign and malignant tumors, as well as non-neoplastic tumor-like conditions, most of which can be diagnosed by light microscopic examination including special stains and more recently immunoperoxidase techniques. Nevertheless there are situations where ultrastructural examination can contribute substantially to an accurate and specific diagnosis. It is my opinion that electron microscopy can be of greatest benefit and is most cost effective when applied in conjunction with other methodologies. Thus, I have developed an approach which has proved useful for me and may have benefit for others. In cases where it is deemed of potential value, glutaraldehyde-fixed material is obtained at the time of frozen section or otherwise at operation. Coordination with the gynecologic oncologist is required in the latter situation. This material is processed and blocked and is available if a future need arises.


Author(s):  
James F. Mancuso

IBM PC compatible computers are widely used in microscopy for applications ranging from control to image acquisition and analysis. The choice of IBM-PC based systems over competing computer platforms can be based on technical merit alone or on a number of factors relating to economics, availability of peripherals, management dictum, or simple personal preference.IBM-PC got a strong “head start” by first dominating clerical, document processing and financial applications. The use of these computers spilled into the laboratory where the DOS based IBM-PC replaced mini-computers. Compared to minicomputer, the PC provided a more for cost-effective platform for applications in numerical analysis, engineering and design, instrument control, image acquisition and image processing. In addition, the sitewide use of a common PC platform could reduce the cost of training and support services relative to cases where many different computer platforms were used. This could be especially true for the microscopists who must use computers in both the laboratory and the office.


2012 ◽  
Vol 21 (2) ◽  
pp. 60-71 ◽  
Author(s):  
Ashley Alliano ◽  
Kimberly Herriger ◽  
Anthony D. Koutsoftas ◽  
Theresa E. Bartolotta

Abstract Using the iPad tablet for Augmentative and Alternative Communication (AAC) purposes can facilitate many communicative needs, is cost-effective, and is socially acceptable. Many individuals with communication difficulties can use iPad applications (apps) to augment communication, provide an alternative form of communication, or target receptive and expressive language goals. In this paper, we will review a collection of iPad apps that can be used to address a variety of receptive and expressive communication needs. Based on recommendations from Gosnell, Costello, and Shane (2011), we describe the features of 21 apps that can serve as a reference guide for speech-language pathologists. We systematically identified 21 apps that use symbols only, symbols and text-to-speech, and text-to-speech only. We provide descriptions of the purpose of each app, along with the following feature descriptions: speech settings, representation, display, feedback features, rate enhancement, access, motor competencies, and cost. In this review, we describe these apps and how individuals with complex communication needs can use them for a variety of communication purposes and to target a variety of treatment goals. We present information in a user-friendly table format that clinicians can use as a reference guide.


2014 ◽  
Vol 4 (1) ◽  
pp. 23-29
Author(s):  
Constance Hilory Tomberlin

There are a multitude of reasons that a teletinnitus program can be beneficial, not only to the patients, but also within the hospital and audiology department. The ability to use technology for the purpose of tinnitus management allows for improved appointment access for all patients, especially those who live at a distance, has been shown to be more cost effective when the patients travel is otherwise monetarily compensated, and allows for multiple patient's to be seen in the same time slots, allowing for greater access to the clinic for the patients wishing to be seen in-house. There is also the patient's excitement in being part of a new technology-based program. The Gulf Coast Veterans Health Care System (GCVHCS) saw the potential benefits of incorporating a teletinnitus program and began implementation in 2013. There were a few hurdles to work through during the beginning organizational process and the initial execution of the program. Since the establishment of the Teletinnitus program, the GCVHCS has seen an enhancement in patient care, reduction in travel compensation, improvement in clinic utilization, clinic availability, the genuine excitement of the use of a new healthcare media amongst staff and patients, and overall patient satisfaction.


Sign in / Sign up

Export Citation Format

Share Document