Loading...
  • Home
  • Search Results
415-416 of 4327 Papers

DIABETES MANAGEMENT FOR UNDER SERVED POPULATIONS: A MOBILE TECHNOLOGY SOLUTION

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): BANDER ALKHUDAIRI

Abstract: In the Kingdom of Saudi Arabia (“KSA”), geographic isolation, culture, and a unequal distribution of healthcare resources have created severe shortages in healthcare access. A large part of KSA\'s rural population, including women and children, expatriate workers and those with disabilities lacks access to any institutional care, lack information about healthy behaviors, and lack finances to pay for care. These factors have combined to produce an alarming growth in chronic disease among these populations in the KSA, particularly Type II Diabetes. In emerging markets like the KSA that have poorly distributed healthcare resources, but DO have widespread mobile connectivity and high mobile device penetration, an immediate solution to this challenge is mobile health. The principal aim of this study is to explore the potential for “mHealth” to impact chronic disease (diabetes) for patients in Saudi Arabia. This paper examines the role of an mHealth diabetes management app in addressing the

  • Publication Date: 13-Oct-2013
  • DOI: 10.15224/978-981-07-7965-8-12
  • Views: 0
  • Downloads: 0

DATA LEAK PREVENTION USING A NEW HYBRID SECURITY MODE

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): KAMRAN MOROVATI , SANJAY KADAM

Abstract: This paper introduces a new security model which reduces the risk of unauthorized data disclosure in an organization’s network. This model will protect confidential information against unauthorized disclosure. The model is effective at preventing intentional and/or unintentional data propagation (e.g. by a disgruntled employee or by means of malware, etc.). The proposed model is a combination of traditional cryptographic-based security methods and Meta-data embedding. The model uses the public key infrastructure cryptosystem and document watermarking technique to attach auxiliary security features (e.g. hash value) into the sensitive documents in order to prevent users from disclosing them without authorization.

  • Publication Date: 13-Oct-2013
  • DOI: 10.15224/978-981-07-7965-8-14
  • Views: 0
  • Downloads: 0