Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis
暂无分享,去创建一个
B. B. Zaidan | A. A. Zaidan | O. S. Albahri | A. S. Albahri | Odai Enaizan | M. A. Alsalem | N. H. M Alwi | B. Zaidan | O. Enaizan | O. Albahri | A. Albahri | M. Alsalem | N. H. Alwi
[1] S. Kurnia,et al. The Impact of Two-Factor Authentication Technology on the Adoption of Internet Banking , 2010, PACIS.
[2] B. B. Zaidan,et al. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.
[3] B. B. Zaidan,et al. An Automated Anti-Pornography System using a Skin Detector Based on Artificial Intelligence: a Review , 2013, Int. J. Pattern Recognit. Artif. Intell..
[4] David Chan,et al. Open-source health information technology: A case study of electronic medical records , 2015 .
[5] A. A. Zaidan,et al. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .
[6] Parand Mansouri-Rad,et al. Culture Matters: Factors Affecting the Adoption of Telemedicine , 2013, 2013 46th Hawaii International Conference on System Sciences.
[7] Wan-Tzu Wong,et al. The Effects of E-Learning System Service Quality and Users' Acceptance on Organizational Learning , 2011 .
[8] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[9] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[10] B. B. Zaidan,et al. Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects , 2018, Journal of Medical Systems.
[11] Abdul Rahman Ahlan,et al. User Acceptance of Health Information Technology (HIT) in Developing Countries: A Conceptual Model , 2014 .
[12] B. B. Zaidan,et al. Conceptual framework for the security of mobile health applications on Android platform , 2018, Telematics Informatics.
[13] Zhiping Walter,et al. Physician acceptance of information technologies: Role of perceived threat to professional autonomy , 2008, Decis. Support Syst..
[14] Napaporn Kripanont,et al. Using a Technology Acceptance Model to Investigate Academic Acceptance of the Internet , 2014 .
[15] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[16] B. B. Zaidan,et al. Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects , 2018, Journal of Medical Systems.
[17] Tiago Oliveira,et al. Electronic Health Record Portals adoption: Empirical model based on UTAUT2 , 2018, Informatics for health & social care.
[18] Nor Badrul Anuar,et al. The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations , 2015, Comput. Methods Programs Biomed..
[19] Margarita Pavlova,et al. TVET as an important factor in country’s economic development , 2014, SpringerPlus.
[20] B. B. Zaidan,et al. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.
[21] Mun Y. Yi,et al. Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..
[22] Fazidah Othman,et al. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .
[23] Paul H. P. Yeow,et al. AIS Electronic , 2022 .
[24] Susan Hilary Nielsen,et al. The View from the Trenches: Satisfaction with eHealth systems by a group of health professionals , 2012, ACIS.
[25] Mijin Noh,et al. User Acceptance Model of Electronic Medical Record , 2016 .
[26] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[27] Ahmed Wathik Naji,et al. Optimizing security and flexibility by designing a high security system for e-government servers , 2009 .
[28] E. B. Steen,et al. The Computer-Based Patient Record: An Essential Technology for Health Care , 1992, Annals of Internal Medicine.
[29] L. Gostin,et al. Privacy and security of personal information in a new health care system. , 1993, JAMA.
[30] A. A. Zaidan,et al. An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users , 2011 .
[31] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[32] B. B. Zaidan,et al. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture , 2014, Journal of Medical Systems.
[33] M Reis,et al. The funding system and incentives in Portuguese hospitals , 2010, BMC Health Services Research.
[34] B. B. Zaidan,et al. Challenges, Alternatives, and Paths to Sustainability: Better Public Health Promotion Using Social Networking Pages as Key Tools , 2015, Journal of Medical Systems.
[35] Norm Archer,et al. Importance of Mobile Technology in Successful Adoption and Sustainability of a Chronic Disease Support System , 2014 .
[36] B. B. Zaidan,et al. Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.
[37] Maryam Ahmadi,et al. The effects of organizational contextual factors on physicians' attitude toward adoption of Electronic Medical Records , 2015, J. Biomed. Informatics.
[38] A. A. Zaidan,et al. "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[39] Rozana Zakaria,et al. Ranking the Macro-Level Critical Success Factors of Electronic Medical Record Adoption Using Fuzzy AHP Method , 2014 .
[40] B. B. Zaidan,et al. Computerized Algorithm for Fetal Heart Rate Baseline and Baseline Variability Estimation based on Distance Between Signal Average and a Value , 2011 .
[41] Miss Laiha Mat Kiah. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .
[42] Hong Cheong Looi,et al. E-Commerce Adoption in Brunei Darussalam: A Quantitative Analysis of Factors Influencing Its Adoption , 2005, Commun. Assoc. Inf. Syst..
[43] A. A. Zaidan,et al. Securing peer-to-peer mobile communications using public key cryptography: New security strategy , 2011 .
[44] A. A. Zaidan,et al. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .
[45] B Taute. DST-funded information security centre of competence , 2009 .
[46] James A. Pappas. A Revitalized Information Assurance Training Approach and Information Assurance Best Practice Rule Set , 2008 .
[47] B. B. Zaidan,et al. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing , 2014, Journal of Medical Systems.
[48] B. B. Zaidan,et al. A survey on communication components for IoT-based technologies in smart homes , 2018, Telecommunication Systems.
[49] Sally Okun,et al. Core Principles & Values of Effective Team-Based Health Care , 2012 .
[50] R. V. Krejcie,et al. Determining Sample Size for Research Activities , 1970 .
[51] E. Vance Wilson,et al. Modeling patients' acceptance of provider-delivered e-health. , 2004, Journal of the American Medical Informatics Association : JAMIA.
[52] Thomas K. Burch,et al. Demography in a new key: A theory of population theory , 2003 .
[53] Alvaro Arenas,et al. Developing Secure Chemical Programs with Aspects , 2007 .
[54] Shuk Ying Ho,et al. The Effects of Location Personalization on Integrity Trust and Integrity Distrust in Mobile Merchants , 2013, Int. J. Electron. Commer..
[55] Fauziah Baharom,et al. Developing an extended technology acceptance model: Doctor's acceptance of electronic medical records in Jordan , 2011 .
[56] Xiaojun Zhang,et al. 'Just What the Doctor Ordered': A Revised UTAUT for EMR System Adoption and Use by Doctors , 2011, 2011 44th Hawaii International Conference on System Sciences.
[57] B. B. Zaidan,et al. Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..
[58] Otieno George Ochieng,et al. Factors Influencing Diffusion of Electronic Medical Records: A Case Study in Three Healthcare Institutions in Japan , 2006, Health information management : journal of the Health Information Management Association of Australia.
[59] A. A. Zaidan,et al. A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution , 2018, Health and Technology.
[60] B. B. Zaidan,et al. Towards on Develop a Framework for the Evaluation and Benchmarking of Skin Detectors Based on Artificial Intelligent Models Using Multi-Criteria Decision-Making Techniques , 2017, Int. J. Pattern Recognit. Artif. Intell..
[61] B. B. Zaidan,et al. Novel Methodology for Triage and Prioritizing Using "Big Data" Patients with Chronic Heart Diseases Through Telemedicine Environmental , 2017, Int. J. Inf. Technol. Decis. Mak..
[62] Pi-Jung Hsieh,et al. Physicians' acceptance of electronic medical records exchange: An extension of the decomposed TPB model with institutional trust and perceived risk , 2015, Int. J. Medical Informatics.
[63] A. A. Zaidan,et al. A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .
[64] Bilal Zaidan,et al. Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.
[65] Miss Laiha Mat Kiah,et al. Suitability of using SOAP protocol to secure electronic medical record databases transmission , 2010 .
[66] J. Phelps,et al. Direct marketing and the use of individual-level consumer information: Determining how and when “privacy” matters , 1997 .
[67] Bilal Ali Yaseen Al-Nassar,et al. Healthcare professionals use Electronic Medical Records System (EMRs) in Jordan Hospitals , 2011 .
[68] AnuarNor Badrul,et al. The landscape of research on smartphone medical apps , 2015 .
[69] K. Andriole. Security of electronic medical information and patient privacy: what you need to know. , 2014, Journal of the American College of Radiology : JACR.
[70] A. A. Zaidan,et al. StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .
[71] B. B. Zaidan,et al. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.
[72] Kavoos Dindarloo,et al. Physicians’ perception and attitude toward electronic medical record , 2014, SpringerPlus.
[73] L. B. Harman,et al. Electronic health records: privacy, confidentiality, and security. , 2012, The virtual mentor : VM.
[74] B. B. Zaidan,et al. A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..
[75] A. A. Zaidan,et al. A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations , 2018, Artificial Intelligence Review.
[76] Zarinah Mohd Kasirun,et al. On the capacity and security of steganography approaches: An overview , 2010 .
[77] B. B. Zaidan,et al. A Systematic Review for Human EEG Brain Signals Based Emotion Classification, Feature Extraction, Brain Condition, Group Comparison , 2018, Journal of Medical Systems.
[78] Robert Ho,et al. Handbook of Univariate and Multivariate Data Analysis and Interpretation with SPSS , 2006 .
[79] Zarinah Mohd Kasirun,et al. On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .
[80] Y. Don,et al. Preservice Teachers' Acceptance of Learning Management Software: An Application of the UTAUT2 Model. , 2013 .
[81] B. B. Zaidan,et al. Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review , 2018, Journal of Medical Systems.
[82] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[83] B. B. Zaidan,et al. MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network , 2014, Journal of Medical Systems.
[84] Prodromos D. Chatzoglou,et al. Using a modified technology acceptance model in hospitals , 2009, Int. J. Medical Informatics.
[85] B. B. Zaidan,et al. Technique for order performance by similarity to ideal solution for solving complex situations in multi-criteria optimization of the tracking channels of GPS baseband telecommunication receivers , 2017, Telecommunication Systems.
[86] Mehrbakhsh Nilashi,et al. Evaluating the Factors Affecting Adoption of Hospital Information System Using Analytic Hierarchy Process , 2015 .
[87] A. A. Zaidan,et al. Review of mobile short message service security issues and techniques towards the solution , 2011 .
[88] B. B. Zaidan,et al. Image skin segmentation based on multi-agent learning Bayesian and neural network , 2014, Eng. Appl. Artif. Intell..
[89] Madhu C. Reddy,et al. Evaluating collaborative features of critical care systems: A methodological study of information technology in surgical intensive care units , 2008, J. Biomed. Informatics.
[90] A. A. Zaidan,et al. A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on ‘large‐scale data’ , 2017, Softw. Pract. Exp..
[91] B. B. Zaidan,et al. Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations , 2018, Journal of Medical Systems.
[92] Jamil Bojei,et al. The effects of trust on online Malaysian students buying behavior , 2011 .
[93] Omar Zakaria,et al. An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography , 2011 .
[94] David Nzuki,et al. Determinants of Electronic Health in Developing Countries , 2014 .
[95] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[96] B. B. Zaidan,et al. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review , 2018, Journal of Medical Systems.
[97] Othman Omran Khalifa,et al. A review on multimedia communications cryptography , 2011 .
[98] Mojtaba Alizadeh,et al. Evaluating the Critical Factors for Electronic Medical Record Adoption Using Fuzzy Approaches , 2014 .
[99] Sooyoung Yoo,et al. Analysis of the factors influencing healthcare professionals’ adoption of mobile electronic medical record (EMR) using the unified theory of acceptance and use of technology (UTAUT) in a tertiary hospital , 2015, BMC Medical Informatics and Decision Making.
[100] B. B. Zaidan,et al. Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[101] Fong-Lin Jang,et al. Patients’ Acceptance towards a Web-Based Personal Health Record System: An Empirical Study in Taiwan , 2013, International journal of environmental research and public health.
[102] Abdullah Gani. Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .
[103] Rolph E. Anderson,et al. Multivariate Data Analysis (7th ed. , 2009 .
[104] A. A. Zaidan,et al. An evaluation and selection problems of OSS-LMS packages , 2016, SpringerPlus.
[105] Fazida Othman,et al. Stego-Image vs Stego-Analysis System , 2009 .
[106] Fan-Yun Pai,et al. Applying the Technology Acceptance Model to the introduction of healthcare information systems , 2011 .
[107] A. Boonstra,et al. Barriers to the acceptance of electronic medical records by physicians from systematic review to taxonomy and interventions , 2010, BMC health services research.
[108] B. B. Zaidan,et al. Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related "Big Data" Using Body Sensors information and Communication Technology , 2018, Journal of Medical Systems.
[109] Junseok Hwang,et al. Information Security Policy Decision Making: An Analytic Hierarchy Process Approach , 2009, Asia International Conference on Modelling and Simulation.
[110] A. A. Zaidan,et al. New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .
[111] J. Hair. Multivariate data analysis : a global perspective , 2010 .
[112] I-Chiu Chang,et al. Physicians' acceptance of pharmacokinetics-based clinical decision support systems , 2007, Expert Syst. Appl..
[113] Dibyendu Aich. Secure Query Processing by Blocking SQL Injection , 2009 .
[114] B. B. Zaidan,et al. Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization “Large Scales Data” Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology , 2018, Journal of Medical Systems.
[115] Mihyar Hesson,et al. Online security evaluation process for new e-services , 2007, Bus. Process. Manag. J..
[116] Sri Hartati,et al. Development of user acceptance model for electronic medical record system , 2015, 2015 International Conference on Information Technology Systems and Innovation (ICITSI).
[117] Kuang-Ming Kuo,et al. How Do Patients Respond to Violation of Their Information Privacy? , 2014, Health information management : journal of the Health Information Management Association of Australia.
[118] A. A. Zaidan,et al. A methodology for football players selection problem based on multi-measurements criteria analysis , 2017 .
[119] Fazida Othman,et al. An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture , 2009, 2009 International Conference on Future Computer and Communication.
[120] Nor Badrul Anuar,et al. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks , 2016, Pervasive Mob. Comput..
[121] Alla Keselman,et al. Developing informatics tools and strategies for consumer-centered health communication. , 2008, Journal of the American Medical Informatics Association : JAMIA.
[122] B. B. Zaidan,et al. A review of disability EEG based wheelchair control system: Coherent taxonomy, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..
[123] Mehrbakhsh Nilashi,et al. Ranking the Micro Level Critical Factors of Electronic Medical Records Adoption Using Topsis Method , 2013 .
[124] R. Jayawardena,et al. Validity of a food frequency questionnaire to assess nutritional intake among Sri Lankan adults , 2016, SpringerPlus.
[125] B. B. Zaidan,et al. Intrusion Detection System: Overview , 2010, ArXiv.
[126] Kok Wei Khong,et al. Integrating Health Belief Model and Technology Acceptance Model: An Investigation of Health-Related Internet Use , 2015, Journal of medical Internet research.
[127] Richard D. Johnson,et al. Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..
[128] A. A. Zaidan,et al. High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .
[129] Janita F. J. Vos,et al. Implementing electronic health records in hospitals: a systematic literature review , 2014, BMC Health Services Research.
[130] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[131] Bakheet Aldosari,et al. Nurses' attitude, acceptance and use of Electronic Medical Records (EMR) in King AbdulAziz Medical City (KAMC) in Riyadh, Saudi Arabia , 2014 .
[132] B. B. Zaidan,et al. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients , 2018, Health and Technology.
[133] K. Sheehan,et al. Dimensions of Privacy Concern among Online Consumers , 2000 .
[134] Sharon S. Choi,et al. Implementing electronic medical record systems in developing countries. , 2005, Informatics in primary care.
[135] HaiqiAhmed. Open source EMR software , 2014 .
[136] H. AHMADI,et al. Ranking the Meso Level Critical Factors of Electronic Medical Records Adoption Using Fuzzy Topsis Method , 2016, Current health sciences journal.
[137] Li-Min Lin,et al. Testing the technology acceptance model for evaluating healthcare professionals' intention to use an adverse event reporting system. , 2007, International journal for quality in health care : journal of the International Society for Quality in Health Care.
[138] Evangelos Triantaphyllou,et al. Multi-Criteria Decision Making: An Operations Research Approach , 1998 .
[139] Dennis Lupiana,et al. Challenges to E-healthcare adoption in developing countries: A case study of Tanzania , 2009, 2009 First International Conference on Networked Digital Technologies.
[140] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[141] A. A. Zaidan,et al. A review of audio based steganography and digital watermarking , 2011 .
[142] A. A. Zaidan,et al. Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review , 2013 .
[143] Mihail Cocosila,et al. Adoption of mobile ICT for health promotion: an empirical investigation , 2010, Electron. Mark..
[144] B. B. Zaidan,et al. Open source EMR software: Profiling, insights and hands-on analysis , 2014, Comput. Methods Programs Biomed..
[145] A. Zarrad,et al. A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records , 2014 .
[146] A. A. Zaidan,et al. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .
[147] Tiago Oliveira,et al. Electronic Health Record Patient Portal Adoption by Health Care Consumers: An Acceptance Model and Survey , 2016, Journal of medical Internet research.
[148] R. Haynes,et al. Effects of computer-based clinical decision support systems on physician performance and patient outcomes: a systematic review. , 1998, JAMA.
[149] Martina Ziefle,et al. Perception of privacy and security for acceptance of E-health technologies: Exploratory analysis for diverse user groups , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.
[150] Vichita Vathanophas,et al. Information Technology Acceptance in healthcare service: The study of Electronic Medical Record (EMR) in Thailand , 2010, PICMET 2010 TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH.
[151] Nor Hazana Abdullah,et al. Implementation and acceptance of hospital information system , 2013 .
[152] Syed Wafa,et al. The Effect of Perceived Risk on the Intention to Use E-commerce: The Case of Algeria , 2009 .
[153] Randy V. Bradley,et al. Global Diffusion of the Internet X: The Diffusion of Telemedicine in Ethiopia: Potential Benefits, Present Challenges, and Potential Factors , 2006, Commun. Assoc. Inf. Syst..
[154] B. B. Zaidan,et al. A distributed framework for health information exchange using smartphone technologies , 2017, J. Biomed. Informatics.
[155] Jerome Kabakyenga,et al. Drugs for some but not all: inequity within community health worker teams during introduction of integrated community case management , 2014, BMC Health Services Research.
[156] A. A. Zaidan,et al. A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .
[157] B. B. Zaidan,et al. Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects , 2018, Journal of Medical Systems.
[158] B. B. Zaidan,et al. A Systematic Review on Smartphone Skin Cancer Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations, and New Research Direction , 2017, J. Circuits Syst. Comput..
[159] Hamid A. Jalab,et al. A new system for hidden data within header space for EXE-File using object oriented technique , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[160] Omar F. El-Gayar,et al. EXAMINING HEALTHCARE PROFESSIONALS' ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT , 2008 .
[161] B. B. Zaidan,et al. Multi-criteria analysis for OS-EMR software selection problem: A comparative study , 2015, Decis. Support Syst..
[162] A. A. Zaidan,et al. Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .
[163] O. M. Enaizan,et al. Privacy and Security Concern for Electronic Medical Record Acceptance and Use: State of the Art , 2017 .
[164] A. A. Zaidan,et al. Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques , 2018 .
[165] A. A. Zaidan,et al. High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain , 2018, Multimedia Tools and Applications.
[166] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[167] K. Lohr,et al. Health Data in the Information Age , 1994 .
[168] Ali Garavand,et al. Factors Affecting in Adoption and Use of Electronic Medical Record Based on Unified Theory of Acceptance and Use of Technology in Iran , 2017 .
[169] V. Venkatesh,et al. Unified Theory of Acceptance and Use of Technology: U.S. Vs. China , 2010 .
[170] T. Saaty,et al. Why the magic number seven plus or minus two , 2003 .
[171] Y. S. Feruza,et al. IT Security Review: Privacy, Protection, Access Control, Assurance and System Security , 2007 .
[172] A. A. Zaidan,et al. Security improvement of credit card online purchasing system , 2011 .
[173] A. A. Zaidan,et al. Study on open source learning management systems: A survey, profile, and taxonomy , 2015 .
[174] Guy Paré,et al. Determinants of Internet use as a preferred source of information on personal health , 2008, Int. J. Medical Informatics.
[175] K. Selvi,et al. FAST SVMS FOR POWER QUALITY DATA MINING , 2009 .
[176] Md Rafiqul Islam,et al. "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[177] B. B. Zaidan,et al. Secure Topology for Electronic Medical Record Transmissions , 2010 .
[178] B. B. Zaidan,et al. Optimization Digital Image Watermarking Technique for Patent Protection , 2010, ArXiv.
[179] Tiago Oliveira,et al. Electronic Health Record Portal Adoption by Health Care Consumers - Proposal of a New Adoption Model , 2014, WEBIST.
[180] Rainu Kaushal,et al. Physicians and electronic health records: a statewide survey. , 2007, Archives of internal medicine.
[181] Othman Omran Khalifa,et al. Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .
[182] Randolph C. Barrows,et al. Review: Privacy, Confidentiality, and Electronic Medical Records , 1996, J. Am. Medical Informatics Assoc..
[183] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[184] B. B. Zaidan,et al. MOGSABAT: a metaheuristic hybrid algorithm for solving multi-objective optimisation problems , 2018, Neural Computing and Applications.
[185] Aduwati Sali,et al. Multi-complex attributes analysis for optimum GPS baseband receiver tracking channels selection , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).
[186] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..
[187] Dário Elias,et al. a new marketing archetype for the information age, applied to the adoption of oral contraceptives and other drugs by end-users" , 2013 .
[188] B. B. Zaidan,et al. New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.
[189] B. B. Zaidan,et al. A security framework for mHealth apps on Android platform , 2018, Comput. Secur..
[190] F. M. Jumaah,et al. Decision-making solution based multi-measurement design parameter for optimization of GPS receiver tracking channels in static and dynamic real-time positioning multipath environment , 2018 .
[191] U. Sekaran,et al. Research Methods for Business : A Skill Building Approach (5th Edition) , 1992 .
[192] A. A. Zaidan,et al. Investigate the Capability of Applying Hidden Data in Text File: An Overview , 2010 .
[193] B. B. Zaidan,et al. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1 , 2013, Journal of Medical Systems.
[194] Mansooreh Mollaghasemi,et al. Technical Briefing: Making Multiple-Objective Decisions , 1996 .
[195] Hsin-Ginn Hwang,et al. The Differing Privacy Concerns Regarding Exchanging Electronic Medical Records of Internet Users in Taiwan , 2012, Journal of Medical Systems.
[196] Mikko T. Siponen,et al. Integrating Habit into UTAUT: The Chinese eBay Case , 2011, Pac. Asia J. Assoc. Inf. Syst..
[197] Jinsheng Roan,et al. Barriers to Physicians’ Adoption of Healthcare Information Technology: An Empirical Study on Multiple Hospitals , 2012, Journal of Medical Systems.
[198] A. A. Zaidan,et al. Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions , 2018 .
[199] B. B. Zaidan,et al. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).
[200] Pradeep Kumar Ray,et al. A taxonomy of antecedents to user adoption of health information systems: A synthesis of thirty years of research , 2015, J. Assoc. Inf. Sci. Technol..