Background: Interest in digital medical information has increased because it allows doctors to easily access a patient's medical records and provide appropriate medical care. Blockchain technology ensures data safety, reliability, integrity, and transparency by distributing medical data to all users over a peer-to-peer network. This study attempted to assess pediatricians' thoughts and attitudes toward introducing blockchain technology into the medical field.

Methods: This study used a questionnaire survey to examine the thoughts and attitudes of 30- to 60-year-old pediatricians regarding the introduction of blockchain technology into the medical field. Responses to each item were recorded on a scale ranging from 1 (never agree) to 7 (completely agree).

Results: The scores for the intentions and expectations of using blockchain technology were 4.0 to 4.6. Pediatricians from tertiary hospitals responded more positively (4.5-4.9) to the idea of using blockchain technology for hospital work relative to the general population (4.3-4.7). However, pediatricians working in primary and secondary hospitals had a slightly negative view of the application of blockchain technology to hospital work (p=0.018).

Conclusion: When introducing the medical records of related pediatric and adolescent patients using blockchain technology in the future, it would be better to conduct a pilot project that prioritizes pediatricians in tertiary hospitals. The cost, policy, and market participants' perceptions are essential factors to consider when introducing technology in the medical field.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10076916PMC
http://dx.doi.org/10.12701/jyms.2022.00241DOI Listing

Publication Analysis

Top Keywords

blockchain technology
32
technology medical
12
technology
9
blockchain
8
application blockchain
8
questionnaire survey
8
medical
8
medical records
8
thoughts attitudes
8
medical field
8

Similar Publications

Secure IoT data dissemination with blockchain and transfer learning techniques.

Sci Rep

January 2025

Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.

Article Synopsis
  • Streaming IoT data is crucial for building trust in sustainable IoT solutions, but current systems often face issues with reliability, security, and transparency due to their centralized structures.
  • The research introduces TraVel, a framework that uses blockchain and transfer learning to improve the security of IoT data management, utilizing decentralized IPFS for data storage and a private Ethereum blockchain for enhanced data integrity.
  • TraVel implements self-executing smart contracts for access control and uses an adversarial domain adaptation model to filter out malicious data, ensuring only validated data is stored, with successful performance shown in simulations.
View Article and Find Full Text PDF

Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.

Sensors (Basel)

January 2025

Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.

This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.

View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

Anomalous Node Detection in Blockchain Networks Based on Graph Neural Networks.

Sensors (Basel)

December 2024

School of Artificial Intelligence and Computer Science, Jiangnan University, Wuxi 214122, China.

With the rapid development of blockchain technology, fraudulent activities have significantly increased, posing a major threat to the personal assets of blockchain users. The blockchain transaction network formed during user transactions can be represented as a graph consisting of nodes and edges, making it suitable for a graph data structure. Fraudulent nodes in the transaction network are referred to as anomalous nodes.

View Article and Find Full Text PDF

With the advancement of this digital era and the emergence of DApps and Blockchain, secure, robust and transparent network transaction has become invaluable today. These traditional methods of securing the transactions and maintaining transparency have encountered many challenges. It includes some such issues as follows: data privacy, centralized vulnerability, inefficiency in fraud detection and much more.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!