Innovation in information and communication technology has a great potential to create large impact on modern healthcare. However, for the new technologies to be adopted, the innovations have to be meaningful and timely, taking into account user needs and addressing societal and ethical concerns. In this paper, we focus on ICT innovations related to home healthcare domain, in which patient safety and security, but also trust and privacy are of utmost importance. To ensure the adoption of new healthcare services, the new innovative technologies need to be complemented with new methods that can help patients to establish trust in healthcare service providers in terms of privacy, reliability, integrity of the data chain and techniques that hel...
Due to the development of information technology (IT), it has been applied to various fields such as...
eHealth characterizes not only a technical development, but also a state-of-mind, a way of thinking,...
Theoretical thesis.Bibliography: leaves 81-85.1. Introduction -- 2. Security and privacy requirement...
Innovation in information and communication technology has a great potential to create large impact ...
It is well recognised that adoption of information communication and technology (ICT) in healthcare ...
The introduction of e-Health and extramural applications in the personal healthcare domain has raise...
E-Health Systems today has its own challenges in terms of data security and data protection. The ove...
ICT (Information and Communication Technology) may be powerful source of the innovation in health ca...
Advances in Information and Communication Technologies have the potential to improve many facets of ...
Advances in Information and Communication Technologies have the potential to improve many facets of ...
Notwithstanding the obvious potential advantages of information and communications technology (ICT) ...
Using Information and Communication Technologies (ICT) in the health sector (eHealth) is a natural p...
This study examines issues pertinent to the rapidly evolving use of information as a currency of mod...
Trust is receiving increasing attention nowadays, particularly since new technology enables communic...
This paper identifies and discusses recent information privacy violations or weaknesses which have b...
Due to the development of information technology (IT), it has been applied to various fields such as...
eHealth characterizes not only a technical development, but also a state-of-mind, a way of thinking,...
Theoretical thesis.Bibliography: leaves 81-85.1. Introduction -- 2. Security and privacy requirement...
Innovation in information and communication technology has a great potential to create large impact ...
It is well recognised that adoption of information communication and technology (ICT) in healthcare ...
The introduction of e-Health and extramural applications in the personal healthcare domain has raise...
E-Health Systems today has its own challenges in terms of data security and data protection. The ove...
ICT (Information and Communication Technology) may be powerful source of the innovation in health ca...
Advances in Information and Communication Technologies have the potential to improve many facets of ...
Advances in Information and Communication Technologies have the potential to improve many facets of ...
Notwithstanding the obvious potential advantages of information and communications technology (ICT) ...
Using Information and Communication Technologies (ICT) in the health sector (eHealth) is a natural p...
This study examines issues pertinent to the rapidly evolving use of information as a currency of mod...
Trust is receiving increasing attention nowadays, particularly since new technology enables communic...
This paper identifies and discusses recent information privacy violations or weaknesses which have b...
Due to the development of information technology (IT), it has been applied to various fields such as...
eHealth characterizes not only a technical development, but also a state-of-mind, a way of thinking,...
Theoretical thesis.Bibliography: leaves 81-85.1. Introduction -- 2. Security and privacy requirement...