首页 > 最新文献

信息安全(英文)最新文献

英文 中文
A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks 车辆网络中可信且隐私保护的拼车匹配方案
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.131001
Hongliang Sun, Linfeng Wei, Libo Wang, J. Yin, W. Ma
{"title":"A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks","authors":"Hongliang Sun, Linfeng Wei, Libo Wang, J. Yin, W. Ma","doi":"10.4236/jis.2022.131001","DOIUrl":"https://doi.org/10.4236/jis.2022.131001","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Role of Social Engineering in Cybersecurity and Its Impact 社会工程在网络安全中的作用及其影响
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134020
Bandar S. Almutairi, Abdurahman Alghamdi
{"title":"The Role of Social Engineering in Cybersecurity and Its Impact","authors":"Bandar S. Almutairi, Abdurahman Alghamdi","doi":"10.4236/jis.2022.134020","DOIUrl":"https://doi.org/10.4236/jis.2022.134020","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue Hadoop分布式文件系统的安全挑战及未授权访问问题的检查
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.132002
Wahid Rajeh
{"title":"Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue","authors":"Wahid Rajeh","doi":"10.4236/jis.2022.132002","DOIUrl":"https://doi.org/10.4236/jis.2022.132002","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Blockchain Based Redistricting with Public Participation 基于b区块链的公众参与选区划分
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133009
M. Ramkumar, Naresh Adhikari
Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness of the solution. Achieving public consensus on the fairness of proposed redistricting plans is highly desirable. Unfortunately, fair redistricting is an NP hard optimization problem. The complexity of the process makes it even more challenging to convince the public of the fairness of the proposed solution. This paper pro-poses a completely transparent blockchain based strategy to promote public participation in the redistricting process, to increase public confidence in the outcome of the process. The proposed approach is based on the fact that one does not have to worry about how the NP hard problem was solved, as long as it is possible for anyone to compute a “goodness” metric for the proposed plan. In the proposed approach, anyone can submit a plan along with the ex-pected metric. Only the plan with the best claimed metric needs to be eva-luated in a blockchain network.
重新划分选区是将一个地区内的所有人口普查街区分组,形成更大的分区或地区的过程。这个过程通常受制于一些硬规则和一些(软)偏好,以提高解决方案的公平性。就拟议的重新划分计划的公平性达成公众共识是非常可取的。不幸的是,公平重划是一个NP困难的优化问题。这一过程的复杂性使得让公众相信拟议解决方案的公正性更具挑战性。本文提出了一个完全透明的区块链策略,以促进公众参与重划过程,增加公众对过程结果的信心。所提出的方法是基于这样一个事实,即人们不必担心NP困难问题是如何解决的,只要任何人都可以为所提议的计划计算一个“好”度量。在建议的方法中,任何人都可以提交一个计划以及预期的度量。在b区块链网络中,只需要评估具有最佳声明度量的计划。
{"title":"Blockchain Based Redistricting with Public Participation","authors":"M. Ramkumar, Naresh Adhikari","doi":"10.4236/jis.2022.133009","DOIUrl":"https://doi.org/10.4236/jis.2022.133009","url":null,"abstract":"Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness of the solution. Achieving public consensus on the fairness of proposed redistricting plans is highly desirable. Unfortunately, fair redistricting is an NP hard optimization problem. The complexity of the process makes it even more challenging to convince the public of the fairness of the proposed solution. This paper pro-poses a completely transparent blockchain based strategy to promote public participation in the redistricting process, to increase public confidence in the outcome of the process. The proposed approach is based on the fact that one does not have to worry about how the NP hard problem was solved, as long as it is possible for anyone to compute a “goodness” metric for the proposed plan. In the proposed approach, anyone can submit a plan along with the ex-pected metric. Only the plan with the best claimed metric needs to be eva-luated in a blockchain network.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity: Identifying the Vulnerability Intensity Function (VIF) and Vulnerability Index Indicator (VII) of a Computer Operating System 网络安全:识别计算机操作系统的漏洞强度函数(VIF)和漏洞指数指标(VII)
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134019
Ranju Karki, C. Tsokos
{"title":"Cybersecurity: Identifying the Vulnerability Intensity Function (<i>VIF</i>) and Vulnerability Index Indicator (<i>VII</i>) of a Computer Operating System","authors":"Ranju Karki, C. Tsokos","doi":"10.4236/jis.2022.134019","DOIUrl":"https://doi.org/10.4236/jis.2022.134019","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach 尼日利亚恐怖主义的法医调查:Apriori算法方法
Pub Date : 2021-09-09 DOI: 10.4236/jis.2021.124015
A. Iorliam, Raymond U. Dugeri, B. O. Akumba, S. Otor
Investigations towards studying terrorist activities have recently attracted a great amount of research interest. In this paper, we investigate the use of the Apriori algorithm on the Global Terrorism Database (GTD) for forensic investigation purposes. Recently, the Apriori algorithm, which could be considered a forensic tool, has been used to study terrorist activities and patterns across the world. As such, our motivation is to utilise the Apriori algorithm approach on the GTD to study terrorist activities and the areas/states in Nigeria with high frequencies of terrorist activities. We observe that the most preferred method of terrorist attacks in Nigeria is through armed assault. Again, our experiment shows that attacks in Nigeria are mostly successful. Also, we observe from our investigations that most terrorists in Nigeria are not suicidal. The main application of this work can be used by forensic experts to assist law enforcement agencies in decision making when handling terrorist attacks in Nigeria.
最近,对恐怖活动的研究引起了极大的研究兴趣。在本文中,我们研究了在全球恐怖主义数据库(GTD)上使用Apriori算法进行法医调查的目的。最近,可以被认为是法医工具的Apriori算法被用于研究世界各地的恐怖活动和模式。因此,我们的动机是利用GTD上的Apriori算法方法来研究恐怖活动以及尼日利亚恐怖活动频繁的地区/州。我们注意到,武装袭击是尼日利亚恐怖袭击的首选方式。我们的实验再次表明,尼日利亚的袭击大多是成功的。此外,我们从调查中观察到,尼日利亚的大多数恐怖分子并没有自杀倾向。这项工作的主要应用可以被法医专家用来协助执法机构在处理尼日利亚的恐怖袭击时做出决策。
{"title":"A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach","authors":"A. Iorliam, Raymond U. Dugeri, B. O. Akumba, S. Otor","doi":"10.4236/jis.2021.124015","DOIUrl":"https://doi.org/10.4236/jis.2021.124015","url":null,"abstract":"Investigations towards studying terrorist activities \u0000have recently attracted a great amount of research interest. In this paper, we \u0000investigate the use of the Apriori algorithm on the Global Terrorism Database \u0000(GTD) for forensic investigation purposes. Recently, the Apriori algorithm, \u0000which could be considered a forensic tool, has been used to study terrorist activities and \u0000patterns across the world. As such, our motivation is to utilise the Apriori \u0000algorithm approach on the GTD to study terrorist activities and the areas/states \u0000in Nigeria with high frequencies of terrorist activities. We observe that the \u0000most preferred method of terrorist attacks in Nigeria is through armed assault. \u0000Again, our experiment shows that attacks in Nigeria are mostly successful. \u0000Also, we observe from our investigations that most terrorists in Nigeria are \u0000not suicidal. The main application of this work can be used by forensic experts \u0000to assist law enforcement agencies in decision making when handling terrorist \u0000attacks in Nigeria.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47676930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Relevance of Cybersecurity Education at Pedagogy Levels in Schools 网络安全教育在学校教育学层面的相关性
Pub Date : 2021-09-09 DOI: 10.4236/jis.2021.124013
Eric Amankwa
Today, the internet extensively impacts people’s lives through improved communications, interactions, and the exchange of information. Despite all these positive effects, it also causes in significant negative issues. Over the recent years, cases of online fraud, cyber-bullying, racial abuse, gambling, and pornography have increased due to the lack of self-control and overall awareness among internet users. Therefore, there is a need to create awareness and training on cybersecurity in schools to protect students from cyber-bullying, online fraud, and being targets of prejudice. Research reveals that the level of self-control and awareness among internet users is still moderate and low. To ensure cybersecurity awareness and knowledge among internet users, young people need to get educated on how to operate safely in cyberspace. This education will guarantee that they understand how to protect themselves from cybercrimes. To this extent, this research paper will explore the essence of cybersecurity education in schools and provide strategies that educators can utilize to promote cybersecurity education across learning institutions. This paper will thus conclude how cybersecurity training can be implemented in a learning institution.
如今,互联网通过改善通信、互动和信息交流,广泛影响着人们的生活。尽管有这些积极影响,但它也会引发重大的负面问题。近年来,由于互联网用户缺乏自制力和整体意识,网络欺诈、网络欺凌、种族虐待、赌博和色情案件有所增加。因此,有必要在学校培养网络安全意识和培训,以保护学生免受网络欺凌、网络欺诈和成为偏见的目标。研究表明,互联网用户的自我控制和意识水平仍然是中等和较低的。为了确保互联网用户的网络安全意识和知识,年轻人需要接受如何在网络空间安全操作的教育。这种教育将保证他们了解如何保护自己免受网络犯罪的侵害。在这种程度上,本文将探索学校网络安全教育的本质,并提供教育工作者可以用来促进整个学习机构网络安全教育。因此,本文将总结如何在学习机构中实施网络安全培训。
{"title":"Relevance of Cybersecurity Education at Pedagogy Levels in Schools","authors":"Eric Amankwa","doi":"10.4236/jis.2021.124013","DOIUrl":"https://doi.org/10.4236/jis.2021.124013","url":null,"abstract":"Today, the internet extensively impacts people’s \u0000lives through improved communications, interactions, and the \u0000exchange of information. Despite all these positive effects, it also causes in \u0000significant negative issues. Over the recent years, cases of online fraud, \u0000cyber-bullying, racial abuse, gambling, and pornography have increased due to \u0000the lack of self-control and overall awareness among internet users. Therefore, \u0000there is a need to create awareness and training on cybersecurity in schools to \u0000protect students from cyber-bullying, online fraud, and being targets of \u0000prejudice. Research reveals that the level of self-control and awareness among \u0000internet users is still moderate and low. To ensure cybersecurity awareness and \u0000knowledge among internet users, young people need to get educated on how to operate \u0000safely in cyberspace. This education will guarantee that they understand how to \u0000protect themselves from cybercrimes. To this extent, this research paper will \u0000explore the essence of cybersecurity education in schools and provide \u0000strategies that educators can utilize to promote cybersecurity education across \u0000learning institutions. This paper will thus conclude how cybersecurity training \u0000can be implemented in a learning institution.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49462723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey 基于欺骗的入侵检测系统的前沿趋势综述
Pub Date : 2021-09-09 DOI: 10.4236/jis.2021.124014
O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo
Cyber criminals have become a formidable treat in today’s world. This present reality has placed cloud computing platforms under constant treats of cyber-attacks at all levels, with an ever-evolving treat landscape. It has been observed that the number of threats faced in cloud computing is rising exponentially mainly due to its widespread adoption, rapid expansion and a vast attack surface. One of the front-line tools employed in defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In recent times, an increasing number of researchers and cyber security practitioners alike have advocated the use of deception-based techniques in IDS and other cyber security defenses as against the use of traditional methods. This paper presents an extensive overview of the deception technology environment, as well as a review of current trends and implementation models in deception-based Intrusion Detection Systems. Issues mitigating the implementation of deception based cyber security defenses are also investigated.
网络犯罪已经成为当今世界的一大威胁。当前的现实使云计算平台不断受到各级网络攻击的攻击,并且受到不断发展的攻击。据观察,云计算面临的威胁数量呈指数级增长,主要是由于云计算的广泛采用、快速扩展和巨大的攻击面。入侵检测系统(ids)是防御网络攻击的一线工具之一。近年来,越来越多的研究人员和网络安全从业者都主张在入侵检测和其他网络安全防御中使用基于欺骗的技术,而不是使用传统方法。本文对欺骗技术环境进行了广泛的概述,并对基于欺骗的入侵检测系统的当前趋势和实现模型进行了回顾。还研究了减轻基于欺骗的网络安全防御实施的问题。
{"title":"Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey","authors":"O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo","doi":"10.4236/jis.2021.124014","DOIUrl":"https://doi.org/10.4236/jis.2021.124014","url":null,"abstract":"Cyber criminals have become a formidable treat in \u0000today’s world. This present reality has placed cloud computing platforms under \u0000constant treats of cyber-attacks at all levels, with an ever-evolving treat \u0000landscape. It has been observed that the number of threats faced in cloud \u0000computing is rising exponentially mainly due to its widespread adoption, rapid \u0000expansion and a vast attack surface. One of the front-line tools employed in \u0000defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In \u0000recent times, an increasing number of researchers and cyber security practitioners \u0000alike have advocated the use of deception-based techniques in IDS and other \u0000cyber security defenses as against the use of traditional methods. This paper \u0000presents an extensive overview of the deception technology environment, as well \u0000as a review of current trends and implementation models in deception-based \u0000Intrusion Detection Systems. Issues mitigating the implementation of deception \u0000based cyber security defenses are also investigated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46248386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 功能逻辑在电子商务系统中应用的安全保障技术过程
Pub Date : 2021-05-13 DOI: 10.4236/JIS.2021.123010
Faisal Nabi, Muhammad Saqib Malhi, Muhammad Farhan, Umar Mahmood
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual assumptions bugs, etc. Most existing security practices in e-Commerce are dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but also fail to find vulnerabilities, which have been established in compliance with application logic. In this paper, we will investigate the problem of business logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for component-based e-commerce application, based on security requirement of e-business process and security assurance logical component behaviour specification approach to formulize and design a solution for business logic vulnerability phenomena.
安全实践,如审计,通常侧重于渗透测试,以发现某些类型的漏洞和使用工具的缺陷,这些工具已经被定制,以解决基于代码错误,代码概念假设错误等的某些风险。电子商务中大多数现有的安全实践都是作为审计活动处理的。它们可能有安全策略,这些策略由审计人员执行,审计人员允许审查一组特定的项目,但也无法发现漏洞,这些漏洞是根据应用程序逻辑建立的。本文研究了在重用组件设计规范的情况下,基于组件的电子商务应用快速开发中的业务逻辑漏洞问题。提出了基于组件的电子商务应用的安全应用功能处理逻辑安全技术,基于电子商务流程的安全需求和安全保障逻辑组件行为规范方法,对业务逻辑漏洞现象进行了形式化设计解决方案。
{"title":"Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems","authors":"Faisal Nabi, Muhammad Saqib Malhi, Muhammad Farhan, Umar Mahmood","doi":"10.4236/JIS.2021.123010","DOIUrl":"https://doi.org/10.4236/JIS.2021.123010","url":null,"abstract":"Security \u0000practices such as Audits that often focus on penetration testing are performed \u0000to find flaws in some types of vulnerability & use tools, which have been \u0000tailored to resolve certain risks based on code errors, code conceptual assumptions bugs, etc. Most existing security practices in e-Commerce \u0000are dealt with as an auditing activity. They may have \u0000policies of security, which are enforced by auditors who enable a particular \u0000set of items to be reviewed, but also fail \u0000to find vulnerabilities, which have been established in compliance with application logic. In this paper, we will \u0000investigate the problem of business logic vulnerability in the \u0000component-based rapid development of e-commerce applications while reusing \u0000design specification of component. We propose secure application functional \u0000processing Logic Security technique for component-based \u0000e-commerce application, based on security requirement of e-business process and security assurance logical component \u0000behaviour specification approach to \u0000formulize and design a solution for business logic vulnerability phenomena.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"12 1","pages":"189-211"},"PeriodicalIF":0.0,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44294765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain Implications in the Management of Patient Complaints in Healthcare 区块链在医疗保健患者投诉管理中的意义
Pub Date : 2021-05-13 DOI: 10.4236/JIS.2021.123011
Yazan M. Alkhateeb
Blockchain is an emerging technology that has recently been the focus for many researchers who have highlighted its diverse applications including healthcare. Transparency in managing unsolicited patient complaints is important in healthcare for both patients and healthcare providers; in addition, patient complaints analysis is significant to the continued quality improvement. Accordingly, the purpose of this study is to understand the nature of patient complaints management in the healthcare settings, explore the implications of blockchain on the management of patient complaints, and identify limitations in the usage of blockchain. Structured qualitative review and content analysis of the literature methods were used through multiple inclusion and exclusion phases for the scope of this research. Blockchain technology characteristics have been analyzed and approximated with desired features in the patients’ complaint management. Patient complaints provide valuable information to drive continuous improvements in healthcare. Blockchain is described as transparent, decentralized, immutable and anonymous. Results of this research found that a complaint Management system that is built on blockchain technology might have desired features that involve data integrity, security and transparency. Blockchain does have certain limitations that involve cybersecurity, scalability, confidentiality, readiness to adopt it, and is uncertainty about its impact. As a conclusion, implementing a system to manage patient complaints that is based on blockchain technology is promising, due to its desired possible features.
区块链是一项新兴技术,最近一直是许多研究人员关注的焦点,他们强调了其多样的应用,包括医疗保健。管理未经请求的患者投诉的透明度对患者和医疗保健提供者的医疗保健都很重要;此外,对患者投诉的分析对持续改进质量具有重要意义。因此,本研究的目的是了解医疗环境中患者投诉管理的性质,探索区块链对患者投诉管理中的影响,并确定区块链使用的局限性。在本研究的范围内,通过多个纳入和排除阶段使用了结构化的定性审查和文献内容分析方法。区块链技术的特点已经在患者投诉管理中进行了分析和近似,并具有所需的特征。患者投诉为推动医疗保健的持续改进提供了宝贵的信息。区块链被描述为透明、去中心化、不可变和匿名。这项研究的结果发现,基于区块链技术的投诉管理系统可能具有所需的功能,包括数据完整性、安全性和透明度。区块链确实有一些局限性,包括网络安全、可扩展性、保密性、采用它的准备程度,以及其影响的不确定性。总之,实现一个基于区块链技术的患者投诉管理系统是有前景的,因为它具有所需的可能功能。
{"title":"Blockchain Implications in the Management of Patient Complaints in Healthcare","authors":"Yazan M. Alkhateeb","doi":"10.4236/JIS.2021.123011","DOIUrl":"https://doi.org/10.4236/JIS.2021.123011","url":null,"abstract":"Blockchain is an emerging technology that has recently been the focus for many researchers who have highlighted its \u0000diverse applications including healthcare. Transparency in managing \u0000unsolicited patient complaints is important in healthcare for both patients and \u0000healthcare providers; in addition, patient complaints analysis is significant \u0000to the continued quality improvement. Accordingly, the purpose of this study is \u0000to understand the nature of patient complaints management in the healthcare \u0000settings, explore the implications of blockchain on the management of patient \u0000complaints, and identify limitations in the usage of blockchain. Structured \u0000qualitative review and content analysis of the literature methods were used \u0000through multiple inclusion and exclusion phases for the scope of this research. \u0000Blockchain technology characteristics have been analyzed and approximated with \u0000desired features in the patients’ complaint management. Patient complaints \u0000provide valuable information to drive continuous improvements in healthcare. Blockchain is described as transparent, decentralized, immutable and anonymous. \u0000Results of this research found that a complaint Management system that is built \u0000on blockchain technology might have desired features that involve data \u0000integrity, security and transparency. Blockchain does have certain limitations \u0000that involve cybersecurity, scalability, confidentiality, readiness to adopt \u0000it, and is uncertainty about its impact. As a conclusion, implementing a system to manage patient complaints that is based \u0000on blockchain technology is promising, due to its desired possible features.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48874949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1