Search results

1 – 10 of over 10000
Article
Publication date: 9 January 2020

Opeoluwa Ore Akinsanya, Maria Papadaki and Lingfen Sun

The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care…

Abstract

Purpose

The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature.

Design/methodology/approach

The intended use of the proposed model was demonstrated using the evaluation method – “construct validity test” as the paper’s aim was to assess the final model and the output of the valuation. The study involved a literature-based case study of a national health-care foundation trust with an overall view because the model is assessed for the entire organisation. The data were complemented by examination of hospitals’ cyber security internal processes through web-accessible documents, and identified relevant literature.

Findings

The paper provides awareness about how organisational-related challenges have been identified as a main inhibiting factor for the adoption of cloud computing in health care. Regardless of the remunerations of cloud computing, its security maturity and levels of adoption varies, especially in health care. Maturity models provide a structure towards improving an organisation’s capabilities. It suggests that although several cyber security maturity models and standards resolving specific threats exist, there is a lack of maturity models for cloud-based health-care security.

Research limitations/implications

Due to the selected research method, the research results may lack generalizability. Therefore, future research studies can investigate the propositions further. Another is that the current thresholds were determined empirically, although it worked for the case study assessment. However, to establish more realistic threshold levels, there is a need for more validation of the model using more case studies.

Practical implications

The paper includes maturity model for the assessment management and improvement of the security posture of a health-care organisation actively using cloud. For executives, it provides a detailed security assessment of the eHealth cloud to aid in decision making. For security experts, its quantitative metrics support proactive and reactive processes.

Originality/value

The paper fulfils a recognised requirement for security maturity model focussed on health-care cloud. It could be extended to resolve evolving cyber settings.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 18 January 2021

Nisrein Jamal Abu-Darwish, Mohammed Mufaddy Al-Kasasbeh and Mohammad Mansour Al-Khasawneh

This study aims to identify the relationship between talent management and competitive advantages through cloud computing as a mediating factor in the private health sector in…

Abstract

Purpose

This study aims to identify the relationship between talent management and competitive advantages through cloud computing as a mediating factor in the private health sector in Jordan.

Design/methodology/approach

To achieve the study, a questionnaire was developed as the main tool for data collection, which consisted of (39) paragraphs. Sequentially, the population of the study consisted of (200) outpatient clinics for private hospitals, therapeutic and diagnostic centers in the private health sector in Jordan. While (150) questionnaires were distributed to a random sample from the study population, (136) questionnaires were retrieved, (134) of them were valid for statistical analysis. Therefore, the percentage of return and valid questionnaires is (89.3%) out of the total distributed questionnaires.

Findings

Consequently, the results showed there is a statistically significant impact of talent management on the competitive advantages through cloud computing in the private health sector in Jordan.

Research limitations/implications

Based on the results reached, the study included some implications such as, enhancing the awareness of the importance of talent management in the private health sector and direct them toward the application of its practices because its role in achieving competitive advantages, increase its ability to survive and continue in the competitive environment.

Practical implications

Decision-makers of the private health sector are advised to prepare comprehensive plans that allow private health organizations to benefit more from cloud computing and the services it provides.

Originality/value

The importance of this study derives from linking important factors such as talent management, competitive advantages and cloud computing in one of the most vital sectors in Jordan, which is considered one of the critical tributaries of the Jordanian economy.

Details

Competitiveness Review: An International Business Journal , vol. 32 no. 2
Type: Research Article
ISSN: 1059-5422

Keywords

Article
Publication date: 16 July 2019

Erhan Pişirir, Erkan Uçar, Oumout Chouseinoglou and Cüneyt Sevgi

This study aims to examine the current state of literature on structural equation modeling (SEM) studies in “cloud computing” domain with respect to study domains of research…

Abstract

Purpose

This study aims to examine the current state of literature on structural equation modeling (SEM) studies in “cloud computing” domain with respect to study domains of research studies, theories and frameworks they use and SEM models they design.

Design/methodology/approach

Systematic literature review (SLR) protocol is followed. In total, 96 cloud computing studies from 2009 to June 2018 that used SEM obtained from four databases are selected, and relevant data are extracted to answer the research questions.

Findings

A trend of increasing SEM usage over years in cloud studies is observed, where technology adoption studies are found to be more common than the use studies. Articles appear under four main domains, namely, business, personal use, education and health care. Technology acceptance model (TAM) is found to be the most commonly used theory. Adoption, intention to use and actual usage are the most common selections for dependent variables in SEM models, whereas security and privacy concerns, costs, ease of use, risks and usefulness are the most common selections for causal factors.

Originality/value

Previous cloud computing SLR studies did not focus on statistical analysis method used in primary studies. This review will display the current state of SEM studies in cloud domain for all future academics and practical professionals.

Case study
Publication date: 26 November 2015

Roma Puri

Marketing, Innovation, Strategy, Digital Marketing and E-Business.

Abstract

Subject area

Marketing, Innovation, Strategy, Digital Marketing and E-Business.

Study level/applicability

Master's level and Executive Program.

Case overview

MocDoc is a young Indian online health-care company that has achieved success in early years of establishment, and is looking forward to expand the customer base. The founder, Senthil Peelikkampatti, along with his friends decided to design a service that can bridge the gap between doctor and patients. However, initially, Senthil lost the trust in his idea due to the unacceptance of the idea by health-care experts. It took a little long for the team to gain visibility after launch of the service. Senthil and the team brainstormed to gain recognition online through different techniques of search engine optimization (SEO) and social media networking through Facebook Web site. MocDoc case is designed to stimulate discussion of a broad array of entrepreneurial issues related to online start-ups. In particular, it deals with strategy and marketing of service in the online arena. At the same time, it gives detailed overview of marketing techniques online as fuel to the business. The company is moving under strong leadership skills of CEO but fails to gain momentum in terms of gaining online customers. This case deals with decision-making capabilities to bring more number of registered customers in the online space.

Expected learning outcomes

The expected learning outcomes are as follows: to animate online business environment and challenges faced by virtual enterprises in the cyber space; to illustrate opportunity for students to speculate the start-up business environment; to illustrate opportunity to introduce cloud computing as a viable business option for the health-care industry; to develop understanding among students for designing effective marketing strategy for online business; to identify business opportunities and gaining competitive edge by offering bouquet of services; and to stimulate business environment for understanding innovation and strategy building.

Supplementary materials

Teaching Notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.

Details

Emerald Emerging Markets Case Studies, vol. 5 no. 8
Type: Case Study
ISSN: 2045-0621

Keywords

Article
Publication date: 7 February 2020

Yung-Ming Cheng

The purpose of this study is to propose an integrated model based on expectation-confirmation model (ECM) and technology acceptance model (TAM) to examine whether environmental…

Abstract

Purpose

The purpose of this study is to propose an integrated model based on expectation-confirmation model (ECM) and technology acceptance model (TAM) to examine whether environmental, human, organizational and technology factors as the antecedents to physicians’ beliefs can affect their satisfaction and continuance intention of the cloud-based hospital information system (HIS).

Design/methodology/approach

Sample data for this study were collected from physicians at six hospitals in Taiwan. A total of 600 questionnaires were distributed, and 471 (78.5 per cent) usable questionnaires were analyzed using structural equation modeling in this study.

Findings

This study proposes a solid research model that is based on ECM and TAM, four types of factors, environmental factor, human factor, organizational factors and technology factors, as antecedents to physicians’ continuance intention of the cloud-based HIS have been examined. This study’s results strongly support the research model with all hypothesized links being significant, and control variables have no confounding effects on physicians’ continuance intention of the cloud-based HIS.

Originality/value

This study contributes to physicians’ continuance intention toward the cloud-based HIS based on ECM, TAM, technology-organization-environment framework and human-organization-technology fit framework, and reveals deep insights into the evaluation of determinants in the field of physicians’ continuance intention of the cloud-based HIS. Accordingly, it is particularly worth mentioning that IS and non-IS determinants are simultaneously evaluated and taken into consideration in this study’s theoretical development of physicians’ continuance intention of the cloud-based HIS to acquire a more comprehensive and robust analysis.

Article
Publication date: 3 December 2020

Shanying Zhu, Vijayalakshmi Saravanan and BalaAnand Muthu

Currently, in the health-care sector, information security and privacy are increasingly important issues. The improvement in information security is highlighted in adopting…

2053

Abstract

Purpose

Currently, in the health-care sector, information security and privacy are increasingly important issues. The improvement in information security is highlighted in adopting digital patient records based on regulation, providers’ consolidation, and the growing need to exchange information among patients, providers, and payers.

Design/methodology/approach

Big data on health care are likely to improve patient outcomes, predict epidemic outbreaks, gain valuable insights, prevent diseases, reduce health-care costs and improve analysis of the quality of life.

Findings

In this paper, the big data analytics-based cybersecurity framework has been proposed for security and privacy across health-care applications. It is vital to identify the limitations of existing solutions for future research to ensure a trustworthy big data environment. Furthermore, electronic health records (EHR) could potentially be shared by various users to increase the quality of health-care services. This leads to significant issues of privacy that need to be addressed to implement the EHR.

Originality/value

This framework combines several technical mechanisms and environmental controls and is shown to be enough to adequately pay attention to common threats to network security.

Details

The Electronic Library , vol. 38 no. 5/6
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6450

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 March 2022

Nidhi Raghav and Anoop Kumar Bhola

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a…

Abstract

Purpose

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a modern decentralized blockchain, safe and easy-to-use health-care technology application in the cloud.

Findings

On observing the graph, the convergence analysis of proposed Levy Flight-integrated moth flame optimization method at 80th iteration was 4.59%, 2.80%, 3.316%, 8.92% and 2.55% higher than the traditional models MFO, artificial bee colony (ABC), particle swarm optimization (PSO), moth search algorithm (MSA) and glow worm swarm optimization (GWSO), respectively, for Hungarian data set. Particularly, in best case scenario, the adopted method attains low cost value (5.672671) when compared to all other traditional models such as MFO (5.727314), ABC (5.711577), PSO (5.706499), MSA (5.764517) and GWSO (5.723353).

Originality/value

The proposed method achieved effective performance in terms of key sensitivity, sanitization effectiveness, restoration effectiveness, etc.

Details

Journal of Engineering, Design and Technology, vol. 22 no. 2
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 7 June 2013

Umar Sheraz, Sohail Inayatullah and Ali Shah

The purpose of this paper is to delineate alternative e‐health futures for public health policymaking in Bangladesh.

1157

Abstract

Purpose

The purpose of this paper is to delineate alternative e‐health futures for public health policymaking in Bangladesh.

Design/methodology/approach

The methodology used in the paper is the Six Pillars approach to explore alternative and preferred futures for the establishment of a health information system and e‐health provision in Bangladesh.

Findings

There is a great deal of potential for encouraging participatory engagement between various stakeholders in Bangladesh's public health policymaking. The Six Pillars approach is used not only to enhance this participatory approach but also to examine various discourses and different stakeholder voices to create four alternative futures for e‐health delivery in Bangladesh: first, leap‐frog 2025; second, e‐health car 2025; third, health cloud 2025; and fourth, e‐health political party aimed at optimizing the use of information and communication technologies (ICTs) on one hand and ensuring widened access and participation on the other.

Practical implications

The alternative scenarios identify four possible ways of bringing together society, government and business to achieve positive public health outcomes by creating an open, trust‐based and efficient e‐health system, not only in Bangladesh but also in other developing countries. The scenarios challenge health business as usual and used futures.

Social implications

The paper aims to communicate a humane public approach to the issue of health which envisages using modern ICTs to maximize democratic access to the public health system and reduce health marginalization in Bangladesh.

Originality/value

The paper is a pioneering attempt to use Six Pillars for public health policymaking in Bangladesh. It is based on the first e‐health workshop in Bangladesh.

1 – 10 of over 10000