30 research outputs found

    Can HIT Work Alone? A Security and Socio-Economic Perspective of Healthcare Quality

    Get PDF
    Healthcare delivery system can immensely benefit from the use of HIT (Healthcare Information Technology). Clinical and administrative automation in hospitals can improve clinical quality through reduced mortality. Previous literature has failed to identify the impact of security technology usage and socio-economic factors on clinical quality improvement. Our paper addresses this gap through the security-HIT interaction and socio-economic impact on overall clinical quality. We used OLS based regression technique to validate our model. We combined survey data of U.S. hospitals from Dorenfest Institute and Centers for Medicare & Medicaid Services from 2011 to 2013. Results from our study will guide healthcare professionals to understand the interaction effect of security, effective technology integration in clinical and administrative automation systems. We also obtained strong evidence of socio-economic impact on mortality rate reduction

    Polycystic Ovarian Syndrome (PCOS) among young adult women: an anthropological insight

    Get PDF
    Polycystic Ovarian Syndrome (PCOS) is one of the most common endocrine disorders which affect women in a significant manner worldwide. India has witnessed an about 30% rise in PCOS cases in the last couple of years. PCOS has a strong association with many comorbidities with its long-term metabolic as well as other consequences. Thus, it has recently been recognized as a significant public health issue. This review paper is an attempt to reveal the prevalence, pathophysiology, knowledge and awareness of PCOS among the adolescents and young adult women of India. An extensive search was performed using electronic search engines such as PubMed, Scopus, and Google Scholar (from 2004 to 2023) to find the relevant research papers on the prevalence, pathophysiology, knowledge, and awareness of PCOS among the adolescents and young adult women of India. The current review summarises and highlights the prevalence, pathophysiology, knowledge, and awareness of PCOS for early identification and prevention and consequent minimation of the steady upward trend of PCOS. The results of this review could identify high-risk populations and foster the implementation of preventive lifestyle measures. It also investigates the need for intervention programmes for PCOS and its associated comorbidities in different settings at an earlier stage and to improve the quality of health

    C-R-P-M-I: A framework to model cyber risk from phishing and mitigation through insurance

    No full text
    Increasing cyber-attacks and breaches lead to financial losses in organizations. Throughout this research-in-progress study, we propose the C-R-P-M-I framework to analyze the following – (i) likelihood of an expert hacker, (ii) likelihood of phishing attack on the firm, given that it has sufficiently invested in the preventive measures, (iii) likelihood of successful detection by the firm, and (iv) procure cyber insurance from 3rd party based on the possible risk-attitude of the organization - risk-averse, risk-neutral, and constant-risk. We assume that a firm with insurance enjoys more utility than the one without it. Additionally, we consider three separate function forms to represent the risk-attitudes –linear, quadratic, and logarithmic. In this manner, we outline a novel study in information security that computes the insurance premium to be paid by the firm depending on the intensity as well as the likelihood of attack, which was ignored by extant literature

    AVICS-Eco Framework: An Approach to Attack Prediction and Vulnerability Assessment in a Cyber Ecosystem

    No full text
    In the light of recent cyber-attacks, it has become imperative for organizations to predict breaches in an accurate and comprehensive manner. In this study, we assess the impact of the external environment as well as factors internal to the organization. We propose an AVICS-Eco Framework to (i) predict cyber-attacks in organizations, (ii) assess critical vulnerabilities, (iii) aid IS managers to plan security investments, and, (iv) decide what to patch and when to patch. We validated our model using Partial Least Square Structural Equation Modelling. We have used CSI-FBI, Ponemon and Checkpoint Survey data from 1997 to 2015. As a recommendation, CTOs should be cautious with vulnerable software from specific categories. We derived that software vendors need to prioritize patches on Networks before Operating Systems. Firewalls were found to be superior in comparison to anti-viruses. Finally, we found limited support for cybersecurity legal provisions as attack inhibitors in the United States
    corecore