Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Data Breaches

Blockchain and IoT Approaches for Secure Electronic Health Records (EHR)
Unauthorized access to sensitive or confidential data, leading to its exposure, theft, or misuse.
Published in Chapter:
Guardians of Health Data: Empowering Secure Electronic Health Records With IoMT and Blockchain
C. V. Suresh Babu (Hindustan Institute of Technolgy and Science, India), A. Karthick (Hindustan Institute of Technology and Science, India), S. Lakshmipathy (Hindustan Institute of Technology and Science, India), C. Arun Shanu (Hindustan Institute of Technology and Science, India), and S. Anush Gokkul (Hindustan Institute of Technology and Science, India)
DOI: 10.4018/979-8-3693-1662-7.ch001
Abstract
This chapter aims to explore the synergistic potential of the internet of medical things (IoMT) and blockchain technology within the context of secure electronic health records (EHR). IoMT is revolutionizing healthcare by enabling real-time patient monitoring and data collection. However, concerns over data security are paramount. Blockchain, known for its robust data security capabilities, holds the promise of addressing these concerns. This chapter will discuss the IoMT's significance, applications, and challenges, while delving into the crucial role of blockchain in securing patient data. The chapter will also offer insights into the potential benefits, emerging trends, and ethical considerations in the IoMT and blockchain healthcare landscape.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Curation of Your Online Persona Through Self-Care and Responsible Citizenship: Participatory Digital Citizenship for Secondary Education
A breach of data is a violation of confidentiality between the company that has your information and your rights as a user of their digital services. Customer data should be kept secure. When a breach occurs, this means the company’s information security protocols failed.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Security: Implementing Biometrics to Help Secure the Cloud
Identified as an intentional or unintentional release of secure information to an untrusted environment.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR