Search Articles

View query in Help articles search

Search Results (1 to 10 of 71 Results)

Download search results: CSV END BibTex RIS


Smart Contracts and Shared Platforms in Sustainable Health Care: Systematic Review

Smart Contracts and Shared Platforms in Sustainable Health Care: Systematic Review

In this new technological landscape, recent studies have highlighted that blockchain technology with smart contracts (SCs) provides the most reliable data security, cryptographic capacities, and decentralized storage and can lead to a low-cost ecosystem and sustainability in the medical setting [4,5]. The health care value chain is another research area where SCs have consistently shown effectiveness in avoiding counterfeiting and ensuring product security and safety.

Carlos Antonio Marino, Claudia Diaz Paz

JMIR Med Inform 2025;13:e58575

Regulation and Compliance in Telemedicine: Viewpoint

Regulation and Compliance in Telemedicine: Viewpoint

HIPAA—known for its privacy and security rules establishing national standards for protecting personal health information (PHI)—mandates providers use telemedicine platforms that provide privacy and security by not storing or having sufficient ways to prevent breaches of PHI [9]. The PHE flexibilities waived the need to use HIPAA-compliant telemedicine platforms. This flexibility eased the rapid, large-scale transition to telemedicine use during COVID-19 [9,10].

Julia Ivanova, Mollie R Cummins, Triton Ong, Hiral Soni, Janelle Barrera, Hattie Wilczewski, Brandon Welch, Brian Bunnell

J Med Internet Res 2025;27:e53558

The Role of the Organization in Promoting Information Security–Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study

The Role of the Organization in Promoting Information Security–Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study

Several researchers have found that in addition to the technological equipment of the organization to ensure information security, it is also necessary for the employees to follow security policies and consciously use information technology (compliance), because noncompliance can lead to security breaches with far-reaching consequences for the organization.

Judith Kraushaar, Sabine Bohnet-Joschko

J Med Internet Res 2025;27:e46257

Mental Health Benefits of Listening to Music During COVID-19 Quarantine: Cross-Sectional Study

Mental Health Benefits of Listening to Music During COVID-19 Quarantine: Cross-Sectional Study

During COVID-19 quarantine, individuals may fear becoming unwell or being unable to cope with unexpected events, thus giving them a low sense of security. A sense of security is shaped by experiences, and the feeling of insecurity is often associated with the experience of being in a risky environment [37].

Xuechang Xian, Xiaoran Zhang, Danhe Zheng, Yanlin Wang

JMIR Form Res 2024;8:e46497

Cybersecurity Interventions in Health Care Organizations in Low- and Middle-Income Countries: Scoping Review

Cybersecurity Interventions in Health Care Organizations in Low- and Middle-Income Countries: Scoping Review

The incidents led the Thai National Cyber Security Agency to announce 3 subordinate laws under the Cybersecurity Act to develop stronger cybersecurity. Among these laws was a mandate to provide cybersecurity training and conduct risk assessments for those dealing with critical information [16].

Kaede Hasegawa, Niki O'Brien, Mabel Prendergast, Chris Agape Ajah, Ana Luisa Neves, Saira Ghafur

J Med Internet Res 2024;26:e47311

Data Ownership in the AI-Powered Integrative Health Care Landscape

Data Ownership in the AI-Powered Integrative Health Care Landscape

This model addresses critical concerns related to privacy and security in health care data. By allowing entities to control access to their data through mechanisms such as role-based access control or attribute-based access control, the DAC model aims to safeguard sensitive patient information.

Shuimei Liu, L Raymond Guo

JMIR Med Inform 2024;12:e57754

Attitudes of Health Professionals Toward Digital Health Data Security in Northwest Ethiopia: Cross-Sectional Study

Attitudes of Health Professionals Toward Digital Health Data Security in Northwest Ethiopia: Cross-Sectional Study

As studies elucidated, the attitudes of health professionals toward digital health data security were prominent factors in determining the consequences of adopting digital technology to secure health care data [3]. According to studies, these attitudes influence people’s comprehension of and use of data-security measures [10,11]. Henceforth, digital health data users desire to know more about security measures [12]. However, human error is the main driving force behind security problems.

Ayenew Sisay Gebeyew, Zegeye Regasa Wordofa, Ayana Alebachew Muluneh, Adamu Ambachew Shibabaw, Agmasie Damtew Walle, Sefefe Birhanu Tizie, Muluken Belachew Mengistie, Mitiku Kassaw Takillo, Bayou Tilahun Assaye, Adualem Fentahun Senishaw, Gizaw Hailye, Aynadis Worku Shimie, Fikadu Wake Butta

Online J Public Health Inform 2024;16:e57764

Patient Health Record Protection Beyond the Health Insurance Portability and Accountability Act: Mixed Methods Study

Patient Health Record Protection Beyond the Health Insurance Portability and Accountability Act: Mixed Methods Study

In HIPAA, Privacy and Security Rules work together to protect the privacy and security of individuals’ PHR information. The Privacy Rule focuses on limiting how PHR can be used and disclosed, while the Security Rule focuses on protecting the confidentiality, integrity, and availability of electronic protected health information through technical and administrative safeguards.

Hemang Subramanian, Arijit Sengupta, Yilin Xu

J Med Internet Res 2024;26:e59674