Background: Interest in digital medical information has increased because it allows doctors to easily access a patient's medical records and provide appropriate medical care. Blockchain technology ensures data safety, reliability, integrity, and transparency by distributing medical data to all users over a peer-to-peer network. This study attempted to assess pediatricians' thoughts and attitudes toward introducing blockchain technology into the medical field.
Methods: This study used a questionnaire survey to examine the thoughts and attitudes of 30- to 60-year-old pediatricians regarding the introduction of blockchain technology into the medical field. Responses to each item were recorded on a scale ranging from 1 (never agree) to 7 (completely agree).
Results: The scores for the intentions and expectations of using blockchain technology were 4.0 to 4.6. Pediatricians from tertiary hospitals responded more positively (4.5-4.9) to the idea of using blockchain technology for hospital work relative to the general population (4.3-4.7). However, pediatricians working in primary and secondary hospitals had a slightly negative view of the application of blockchain technology to hospital work (p=0.018).
Conclusion: When introducing the medical records of related pediatric and adolescent patients using blockchain technology in the future, it would be better to conduct a pilot project that prioritizes pediatricians in tertiary hospitals. The cost, policy, and market participants' perceptions are essential factors to consider when introducing technology in the medical field.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10076916 | PMC |
http://dx.doi.org/10.12701/jyms.2022.00241 | DOI Listing |
Sci Rep
January 2025
Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.
Sensors (Basel)
January 2025
Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.
View Article and Find Full Text PDFSensors (Basel)
December 2024
College of Cryptography Engineering, Engineering University of PAP, Xi'an 710086, China.
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.
View Article and Find Full Text PDFSensors (Basel)
December 2024
School of Artificial Intelligence and Computer Science, Jiangnan University, Wuxi 214122, China.
With the rapid development of blockchain technology, fraudulent activities have significantly increased, posing a major threat to the personal assets of blockchain users. The blockchain transaction network formed during user transactions can be represented as a graph consisting of nodes and edges, making it suitable for a graph data structure. Fraudulent nodes in the transaction network are referred to as anomalous nodes.
View Article and Find Full Text PDFSci Rep
January 2025
PRINCE Laboratory Research, ISITcom, Hammam Sousse, University of Sousse, Sousse, Tunisia.
With the advancement of this digital era and the emergence of DApps and Blockchain, secure, robust and transparent network transaction has become invaluable today. These traditional methods of securing the transactions and maintaining transparency have encountered many challenges. It includes some such issues as follows: data privacy, centralized vulnerability, inefficiency in fraud detection and much more.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!