Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-6504-9
{"title":"Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention","authors":"","doi":"10.4018/978-1-7998-6504-9","DOIUrl":"https://doi.org/10.4018/978-1-7998-6504-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122523399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-5839-3.CH012
M. Gohil, S. Maduskar, Vikrant Gajria, Ramchandra S. Mangrulkar
Growing organizations, institutions, and SMEs demand for transformation in all the aspects of their businesses along with the progression in time and technology. When it comes to healthcare, the growth should be heightened to higher levels with necessity. The need of providing quality of service (QoS) in healthcare is taking significant place, allowing health institutions and medical compliances to develop an ecosystem with cutting-edge technology with the same reliability but better productivity and performance. Moreover, the healthcare systems are aiming for a more patient-centric strategy. Healthcare systems work on complicated and traditional methods, oftentimes administered via teams of professionals who manage data and supportive mechanisms of the system. Blockchain could streamline and automate those methods, conserving weeks of effort in the company's production line to increase the overall revenue and discover new opportunities. This chapter aims to illustrate blockchain technology along with its state-of-the-art applications in healthcare.
{"title":"Blockchain and Its Applications in Healthcare","authors":"M. Gohil, S. Maduskar, Vikrant Gajria, Ramchandra S. Mangrulkar","doi":"10.4018/978-1-7998-5839-3.CH012","DOIUrl":"https://doi.org/10.4018/978-1-7998-5839-3.CH012","url":null,"abstract":"Growing organizations, institutions, and SMEs demand for transformation in all the aspects of their businesses along with the progression in time and technology. When it comes to healthcare, the growth should be heightened to higher levels with necessity. The need of providing quality of service (QoS) in healthcare is taking significant place, allowing health institutions and medical compliances to develop an ecosystem with cutting-edge technology with the same reliability but better productivity and performance. Moreover, the healthcare systems are aiming for a more patient-centric strategy. Healthcare systems work on complicated and traditional methods, oftentimes administered via teams of professionals who manage data and supportive mechanisms of the system. Blockchain could streamline and automate those methods, conserving weeks of effort in the company's production line to increase the overall revenue and discover new opportunities. This chapter aims to illustrate blockchain technology along with its state-of-the-art applications in healthcare.","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-2795-5
{"title":"Advancements in Security and Privacy Initiatives for Multimedia Images","authors":"","doi":"10.4018/978-1-7998-2795-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-2795-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121115285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-8641-9
{"title":"Handbook of Research on Cyber Law, Data Protection, and Privacy","authors":"","doi":"10.4018/978-1-7998-8641-9","DOIUrl":"https://doi.org/10.4018/978-1-7998-8641-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129937341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3277-5
{"title":"Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems","authors":"","doi":"10.4018/978-1-7998-3277-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-3277-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122296567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-2701-6
{"title":"Handbook of Research on Multimedia Cyber Security","authors":"","doi":"10.4018/978-1-7998-2701-6","DOIUrl":"https://doi.org/10.4018/978-1-7998-2701-6","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-2367-4
{"title":"Impact of Digital Transformation on Security Policies and Standards","authors":"","doi":"10.4018/978-1-7998-2367-4","DOIUrl":"https://doi.org/10.4018/978-1-7998-2367-4","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-9489-5
{"title":"Personal Data Protection and Legal Developments in the European Union","authors":"","doi":"10.4018/978-1-5225-9489-5","DOIUrl":"https://doi.org/10.4018/978-1-5225-9489-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116992115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3130-3
{"title":"Legal Regulations, Implications, and Issues Surrounding Digital Data","authors":"","doi":"10.4018/978-1-7998-3130-3","DOIUrl":"https://doi.org/10.4018/978-1-7998-3130-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3059-7
{"title":"Safety and Security Issues in Technical Infrastructures","authors":"","doi":"10.4018/978-1-7998-3059-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-3059-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}