We analysed the content of email messages exchanged in a pilot mentoring scheme. The e-mentoring study was conducted for clinicians involved in the delivery of residential home care nursing, midwifery and allied health therapies. A classification score was assigned to each message, using an 8-point scale (1=breach of patient confidentiality to 8 = no need for either security or privacy). For 108 messages examined, the mean score was 6.3 (SD 1.1), range 3-8. The analysis showed that no patient identifiable data had been divulged during the mentoring. This suggests that email systems used in e-mentoring do not need to use encryption techniques to meet legislative or administrative requirements. However, the success of e-mentoring is enhanced ...
Employers and employees are both highly vulnerable to negative consequences which may result from e-...
With billions of emails exchanged worldwide on a daily basis, email is nowadays considered to be one...
This study determined that many, perhaps most, public relations executives do not consider real or p...
Background: The use of email and secure messaging between physicians and patients is increasing in f...
Encryption is used to convert an email message to an unreadable format thereby securing patient priv...
All staff members of a child and adolescent mental health service were invited to participate in a s...
Why do email users perceive their communications to be private when email provides virtually no safe...
Abstract: In this paper we describe an approach to information assurance in which we can prevent bre...
There is a growing realisation from the Australian government that new models of health care will ne...
Email is undoubtedly the most used communications mechanism in society today. Within business alone,...
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of suc...
The security of electronic mail sent through the Internet may be described in exactly three words: t...
Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Ma...
In March 1996, American Libraries featured a piece about a librarian at the University of California...
Abstract: There have been cases, in recent years, where customer information or other personal infor...
Employers and employees are both highly vulnerable to negative consequences which may result from e-...
With billions of emails exchanged worldwide on a daily basis, email is nowadays considered to be one...
This study determined that many, perhaps most, public relations executives do not consider real or p...
Background: The use of email and secure messaging between physicians and patients is increasing in f...
Encryption is used to convert an email message to an unreadable format thereby securing patient priv...
All staff members of a child and adolescent mental health service were invited to participate in a s...
Why do email users perceive their communications to be private when email provides virtually no safe...
Abstract: In this paper we describe an approach to information assurance in which we can prevent bre...
There is a growing realisation from the Australian government that new models of health care will ne...
Email is undoubtedly the most used communications mechanism in society today. Within business alone,...
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of suc...
The security of electronic mail sent through the Internet may be described in exactly three words: t...
Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Ma...
In March 1996, American Libraries featured a piece about a librarian at the University of California...
Abstract: There have been cases, in recent years, where customer information or other personal infor...
Employers and employees are both highly vulnerable to negative consequences which may result from e-...
With billions of emails exchanged worldwide on a daily basis, email is nowadays considered to be one...
This study determined that many, perhaps most, public relations executives do not consider real or p...