Academic literature on the topic 'Heath security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Heath security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Heath security":
Alam, Uzma, Juliet Nabyonga-Orem, Abdulaziz Mohammed, Deborah R. Malac, John N. Nkengasong, and Matshidiso R. Moeti. "Redesigning health systems for global heath security." Lancet Global Health 9, no. 4 (April 2021): e393-e394. http://dx.doi.org/10.1016/s2214-109x(20)30545-3.
Ramji-Nogales, Jaya. "Race in Security." AJIL Unbound 116 (2022): 242–47. http://dx.doi.org/10.1017/aju.2022.38.
Chandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." International Journal of Ambient Computing and Intelligence 10, no. 1 (January 2019): 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.
Rodiles, Alejandro. "Making Sense of Violent Extremism." AJIL Unbound 116 (2022): 230–35. http://dx.doi.org/10.1017/aju.2022.41.
Martin, Craig. "Climate Change and Global Security: Framing an Existential Threat." AJIL Unbound 116 (2022): 248–53. http://dx.doi.org/10.1017/aju.2022.39.
Muka, Romina, Sule Yildrim-Yayilgan, and Kozeta Sevrani. "Security Analysis of Wireless BAN in e-Health." Spring 2017 5, no. 2 (May 1, 2017): 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.
Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Nandan Sharma. "Indian Healthcare Segment: A Challenge to Human Security in 21st Century." Legal Research Development: An International Refereed e-Journal 2, no. I (September 30, 2017): 63–70. http://dx.doi.org/10.53724/lrd/v2n1.06.
Srivastava, Mahendra P. "Plant Clinic Towards Plant Health and Food Security." International Journal of Phytopathology 2, no. 3 (December 30, 2013): 193–203. http://dx.doi.org/10.33687/phytopath.002.03.0327.
Heath, J. Benton, Ina Popova, Justin Jacinto, Samaa Haridi, Tafadzwa Pasipanodya, and Sabina Sacco. "Litigating Health and Security Exceptions in Investment Treaties: A Simulation." Proceedings of the ASIL Annual Meeting 115 (2021): 151–54. http://dx.doi.org/10.1017/amp.2021.138.
Dissertations / Theses on the topic "Heath security":
Daza, Aramayo Lourdes Gabriela. "Sociální zabezpečení v některých státech Latinské ameriky." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4472.
Minarcine, Scott. "Health Security Intelligence : Assessing the Nascent Public Health Capability." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6836.
This thesis explores the current state of public healths (HS) intelligence capability across State, Local, Tribal and Territorial (SLTT) jurisdictions through qualitative analysis of current public health jurisdiction plans for the collection, analysis, product creation, dissemination and programmatic oversight related to public health inputs into the homeland security intelligence apparatus. An assessment was conducted using an online Plan Assessment Tool, or PLAT, that allowed jurisdictional public health leadership to provide de-identified responses. This assessment of 25 of the 62 federally funded SLTT public health preparedness programs indicates one impediment to the continued maturation of this new intelligence capability is the lack of codified plans. The results also suggest that while public health programs at the SLTT level do indeed have much room for improvement, there is a burgeoning intelligence capability within public health. However, to sustain and improve this emergent capability will require a national effort to create mission focus and centralized guidance.
Singh, Kalvinder. "Security for Mobile Health Care Systems." Thesis, Griffith University, 2013. http://hdl.handle.net/10072/367683.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Fryer, Huw. "The public health analogy in Web security." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/412399/.
Iwaya, Leonardo Horn. "A security framework for mobile health data collection." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-23122014-143956/.
Saúde Móvel (mHealth) pode ser definida como a prática médica e a saúde pública suportadas por tecnologias de computação móvel, como: telefones celulares, PDAs, tablets, sensores e outros dispositivos sem fio. Particularmente no caso dos celulares, há um aumento expressivo no número de linhas, aparelhos, e na infraestrutura de rede em países de média e baixa renda (Low- Middle- Income Countries, LMIC), permitindo a adoção de sistemas mHealth de maneira eficiente. Existem, hoje, vários casos de sistemas de coleta de dados voltadas à atenção primária, vigilância (em saúde) e pesquisas epidemiológicas adotados nesses países. Tais sistemas fornecem aos gestores de saúde uma informação de melhor qualidade em menor tempo, que por sua vez melhoram a capacidade de planejamento e resposta a emergências. Contudo, nota-se um relaxamento no cumprimento de requisitos de segurança nestes sistemas. Com base nisso, foi feito um levantamento de aplicações e iniciativas de pesquisa em mHealth no Brasil, no qual se constatou que um número razoável de trabalhos mencionam fracamente (13%) ou não menciona (40%) os requisitos de segurança. Este levantamento também discute sobre o estado atual das pesquisas de mHealth no Brasil, os principais tipos de aplicações, os grupos de usuários, os dispositivos utilizados e as barreiras de pesquisa identificadas. Em seguida, este trabalho apresenta o SecourHealth, um framework de segurança voltado ao desenvolvimento de aplicações de mhealth para coleta de dados. O SecourHealth foi projetado com base em seis requisitos principais de segurança: suportar o registro e a autenticação do usuário; tratar a desconexão e os atrasos na rede; prover o armazenamento seguro de dados prevendo possibilidades de furto ou perda dos aparelhos; fazer transmissão segura de dados entre o aparelho e o servidor; permitir o compartilhamento de dispositivos entre os usuários (e.g., agentes de saúde); e considerar opções de compromisso entre segurança, desempenho e usabilidade. O trabalho também descreve com detalhes as etapas de modelagem e desenvolvimento do framework - que foi integrado a uma aplicação para a plataforma Android. Finalmente, é feita uma análise do desempenho dos algoritmos criptográficos implementados, considerando o overhead pelo simples uso do protocolo HTTPS.
Toms, Anders. "Information Security when Integrating Actors in Health Care Processes." Thesis, University of Skövde, Department of Computer Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-825.
There is a growing interest within organisations today to focus on the core processes, i.e. the processes that create value for the intended customer, in order to stay compatible within the ever-fiercer competition. To have full control of the key processes may be a great step forward towards a more lean and effective organisation, not only for profit seeking companies but also for public welfare institutions like health care. Software aimed at supporting a process focus is continuously being developed and one such family of programs is commonly referred to as process managers.
A process manager lets the people in an organisation who have complete knowledge of the processes model these without requiring them to have expert knowledge of computers and programming. Once a process has been defined graphically according to a predefined modelling language, it can be deployed and monitored. The process manager software takes care of the routing of messages between actors, both human as well as non-human (e.g. other applications), and it drives the individual errand forward according to how the process flow has been defined in the model. However, applying a process manager approach in health care processes requires a certain amount of caution. Messages sent between actors in health care organisations are often of a delicate nature since they may contain sensitive information, such as illness, mental state, family situation and similar, that is related to an identifiable individual. There are also other aspects of security that need to be addressed besides the confidentiality aspect. For example, it must be guaranteed that the information is correct and not altered during transfer, the information must be available when needed and it should be possible to trace a message to its sender, among other things.
This work identifies a set of security requirements from the literature that need to be fulfilled in health care organisations when applying a process manager approach. With these requirements as a basis, a process manager system is evaluated with regards to security and the conclusion is that future versions need improvement on some points. Future work is also suggested that could help to explore the area further.
Thomson, Steven Michael. "A standards-based security model for health information systems." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.
Raedeke, Maurine A. "Food security, nutrition and health of food pantry participants." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4839.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on October 9, 2007) Vita. Includes bibliographical references.
Coghlan, Christopher. "Towards food security with nutritional health : multi-scale approaches." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:faec7323-edbd-440b-9a60-01cc84532b68.
Alawaji, Ahmed S. "Privacy and security risks for national health records systems." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118558.
Page 104 blank. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 101-103).
A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security considerations. The aims of this study were to explore how governments can design secure national health records systems. To do that systematically, we developed a framework to analyze NEHR systems. We then applied the framework to investigate the privacy and security risks in these systems. The studied systems demonstrate that getting privacy and security right have a considerable impact on the success of NEHR projects. Also, our study reveals that the healthcare system structure has a substantial impact on the adoption and usage rates of the system. The studied cases uncover many opportunities for improving privacy and security measures in future projects. The framework demonstrates the utility of applying it to the three cases.
by Ahmed S. Alawaji.
S.M. in Engineering and Management
Books on the topic "Heath security":
United States. Government Accountablity Office. Mail security: Incidents at DOD mail facilities exposed problems that require further actions : report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: GAO, 2006.
Fund, United Nations Population, ed. Reproductive health essentials: Securing the supply : global strategy for reproductive health commodity security. New York: United Nations Population Fund, 2002.
Goodman, Michael S., James M. Wilson, and Filippa Lentzos. Health Security Intelligence. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003245483.
Masys, Anthony J., Ricardo Izurieta, and Miguel Reina Ortiz, eds. Global Health Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-23491-1.
Kamradt-Scott, Adam. Managing Global Health Security. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137520166.
Canada. Citizenship and Immigration Canada., ed. Health and income security. [Ottawa]: Citizenship and Immigration Canada, 1998.
Myriam, Dunn Cavelty, and Kristensen Kristian Søby, eds. Securing 'the homeland': Critical infrastructure, risk and (in)security. London: Routledge, 2008.
United States. Executive Office of the President., ed. Health security: The President's health care plan. [Washington, D.C.?: Executive Office of the President, 1993.
Kalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi: International Planned Parenthood Federation, 2008.
Kalaule, Ezekiel B. Reproductive health commodity security strategy. Nairobi: International Planned Parenthood Federation, 2008.
Book chapters on the topic "Heath security":
Riad, A. B. M. Kamrul Islam, Hossain Shahriar, Chi Zhang, and Farhat Lamia Barsha. "Heath Device Security and Privacy." In Data Protection and Privacy in Healthcare, 91–108. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848-6.
Davidson, Ruth. "Social Security Policy." In Policies and Politics Under Prime Minister Edward Heath, 141–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53673-2_7.
Levine, Marissa J. "Health Security." In Handbook of Security Science, 1–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-51761-2_25-1.
Marton, Péter. "Health Security." In The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_539-1.
Marton, Péter. "Health Security." In The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-74336-3_539-2.
Rushton, Simon. "Health Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach, 174–92. 1 Oliver’s Yard, 55 City Road London EC1Y 1SP: SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n10.
Levine, Marissa J. "Health Security." In Handbook of Security Science, 635–59. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_25.
Reveron, Derek S., and Kathleen A. Mahoney-Norris. "Health Security." In Human and National Security, 163–80. Second edition. | New York : Routledge, 2018. | First edition published: Human security in a borderless world. Philadelphia, PA : Westview Press, c2011.: Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-8.
Porcelain, Sherri L. "Health Security." In Public Health and Beyond in Latin America and the Caribbean, 153–85. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003007401-7.
Marton, Péter. "Health Security." In The Palgrave Encyclopedia of Global Security Studies, 697–704. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_539.
Conference papers on the topic "Heath security":
Nagy, Robertbela, and Florin Popentiu vladicescu. "EXPLORING THE POTENTIAL OF INTERNET OF THINGS SYSTEMS IN HEATH CARE CONTEXT." In eLSE 2018. Carol I National Defence University Publishing House, 2018. http://dx.doi.org/10.12753/2066-026x-18-210.
Bashar, Md Khayrul. "Event-Driven Time Series Analysis and the Comparison of Public Reactions on Covid-19." In 9th International Conference of Security, Privacy and Trust Management (SPTM 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110507.
KUSTRON, KAMILA. "A NEW METHOD IN CONCEPTUAL DESIGN OF THE SHM AIRFRAME USING ROUGH SETS." In Structural Health Monitoring 2021. Destech Publications, Inc., 2022. http://dx.doi.org/10.12783/shm2021/36354.
Mancini, F., K. A. Mughal, S. H. Gejibo, and J. Klungsoyr. "Adding security to mobile data collection." In 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services (Healthcom 2011). IEEE, 2011. http://dx.doi.org/10.1109/health.2011.6026793.
Yu, Weider D., and Vijayalakshmi Jothiram. "Security in Wireless Mobile Technology for Healthcare Systems." In 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381659.
Vieira, Marcos Alves, Gislainy Crisostomo Velasco, and Sergio T. Carvalho. "A Decentralized Health Data Repository for Remote Patient Monitoring Using Blockchain and FHIR." In Workshop em Blockchain: Teoria, Tecnologias e Aplicações. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/wblockchain.2023.723.
Shen, Tsu-Wang. "A u-Health Security Structure by Using 2D Barcodes." In 2007 9th International Conference on e-Health Networking, Application and Services. IEEE, 2007. http://dx.doi.org/10.1109/health.2007.381661.
Fragopoulos, A. G., J. Gialelis, and D. Serpanos. "Imposing holistic privacy and data security on person centric ehealth monitoring infrastructures." In 2010 12th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom 2010). IEEE, 2010. http://dx.doi.org/10.1109/health.2010.5556580.
Dharsni, Thanga, Hanifa Zakir, Pradeep Naik, Mallikarjuna, and Raghu. "Soldier Security and Health Monitoring." In 2018 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C). IEEE, 2018. http://dx.doi.org/10.1109/icdi3c.2018.00016.
Samy, Ganthan Narayana, Rabiah Ahmad, and Zuraini Ismail. "Threats to Health Information Security." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.312.
Reports on the topic "Heath security":
Vu, Jonathan, Benjamin Kaplan, Shomesh Chaudhuri, Monique Mansoura, and Andrew Lo. Financing Vaccines for Global Health Security. Cambridge, MA: National Bureau of Economic Research, May 2020. http://dx.doi.org/10.3386/w27212.
Uecker, Norma J., and Michael J. Schwartz. Office of Health, Safety and Security, Office of Security Policy FY 2013 Accomplishments. Office of Scientific and Technical Information (OSTI), October 2013. http://dx.doi.org/10.2172/1105101.
Wolmuth-Gordon, Hannah, and Natasha Mutebi. Public health and climate change: a One Health approach. Parliamentary Office of Science and Technology, UK Parliament, July 2023. http://dx.doi.org/10.58248/pn701.
Falzarano, A. Annotated Bibliography - Economic Sanctions: Implications for Health Security. Office of Scientific and Technical Information (OSTI), December 2019. http://dx.doi.org/10.2172/1635787.
Sung, Jane, and Olivia Dean. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, December 2020. http://dx.doi.org/10.26419/ppi.00114.001.
Sung, Jane, Olivia Dean, Robert C. Saunders, Asha Saavoss, and Lane Koenig. How Unaffordability of Nongroup Health Insurance Threatens the Health Security of Older Adults. AARP Public Policy Institute, December 2020. http://dx.doi.org/10.26419/ppi.00099.003.
Bohorquez, Camilo. Subsidized Health Care and Food Security: Evidence from Colombia. Banco de la República de Colombia, February 2020. http://dx.doi.org/10.32468/be.1103.
Scholl, Matthew, Kevin Stine, Kenneth Lin, and Daniel Steinberg. Security architecture design process for health information exchanges (HIEs). Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7497.
Osewe, Patrick L. Health Security Interventions for COVID-19 Response: Guidance Note. Asian Development Bank, September 2022. http://dx.doi.org/10.22617/spr220224.
Lamas, Jorge, Laura Bocalandro, Tara Lisa Persaud, Alejandro Cruz Fano, and Rafael Villa. South-South Cooperation and Capacity Development in Action: Regional Public Entrepreneurship in Latin America and the Caribbean. Inter-American Development Bank, March 2010. http://dx.doi.org/10.18235/0008843.