Factors for Medical Information Protection of Patients in Medical Manpower

2010 ◽  
Vol 12 ◽  
pp. 51 ◽  
Author(s):  
Jong-In Kim ◽  
Da-Um Lee
2020 ◽  
pp. 1674-1682
Author(s):  
Hyeon-Cheol Jeong

The purpose of this article is to investigate the perception of medical information protection. The subjects were 281 students from 2 nursing students from September 1, 2015 to October 20, 2015. A total of 28 self - administered questionnaires were used. As a result, the perception of medical information protection behavior was 3.39 ± 0.51. In the fourth grade, the 'privacy protection' category was low (p = .007) and the 'communication' category was high (p = .045). In case of having experience in practice, 'privacy protection' category (p = .010) and ‘medical information management' category (p = .041) were low and 'communication' (p = .021) was high. In the 'communication' category, the perception score was high when the medical information protection law (p = .001) and the nurses' code of ethics (p = .040) were known. When the subject completed 'medical security education' (p = .004), the perception was high. In conclusion, it is necessary for schools and medical institutions to develop nursing education programs for their educational environment and role.


Actuators ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 284
Author(s):  
Cheng-Hsiung Yang ◽  
Che-Lun Chang ◽  
Shih-Yu Li

Chaotic behavior is complicated, sensitive, and has the feature of great variety, which are the most potential signals to be applied in data encryption, secure communication, medical information protection, etc. As a consequence, in this paper, we try to propose three different ways to show our data generating results step by step, which means it can be proved effectively and used in practice: (1) Chaotic solutions simulated by MATLAB, (2) chaotic motion drawn via electronic circuits software Multisim, and (3) chaotic signal implemented on real electronic circuits with breadboard. In advance, following the same design principal, the adaptive chaotic signal is also designed and presented in the end of this article for further study, which provides a more flexible and variable chaotic signal to enhance the encryption effectiveness. The experimental results are extremely close to the two simulation results and can definitely be technically transferred to real encryption application.


Sign in / Sign up

Export Citation Format

Share Document