{"response":{"docs":[{"system_create_dtsi":"2020-05-15T23:02:12Z","system_modified_dtsi":"2020-05-15T23:02:18Z","has_model_ssim":["Article"],"id":"qv33rz232","accessControl_ssim":["7f04e6fb-3493-481e-be74-061e8c6b5fbc"],"hasRelatedMediaFragment_ssim":["m039k605q"],"hasRelatedImage_ssim":["m039k605q"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes"],"date_uploaded_dtsi":"2020-05-15T23:02:12Z","date_modified_dtsi":"2020-05-15T23:02:12Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g4dj-bj96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Ponnakanti, Hari Priya","Ozer, Murat","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a notable research on underlying blockchain technology which offers distributed governance, immutable audit trail, provenance of data, robustness and privacy, we contrasted blockchain innovations and identified prominent applications of it in historically decentralized healthcare sectors. As the healthcare industry faces many challenges like unauthorised data sharing, lack of data transparency, ransomware, data breaches and cyber crimes, blockchain is one of the best ways to enhance data sharing and to mitigate prominent cyber crimes. By proper designing of a decentralized and immutable blockchain network where the data is dispersed among credentialed social insurance experts guarantees that cybercriminals cannot touch single patient’s confidential data, which facilitates encryption or cryptography of personal data where no patient’s emergency data is at extreme hazard. Blockchain trust-worthy cloud is one of the most powerful and secure ways of storing high confidential data. After analysing Blockchain implementations and identifying its potential in healthcare, we conclude with several promising directions for future research."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/2"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/m039k605q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["m039k605q"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["m039k605q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RELATIVE IMPORTANCE OF BLOCKCHAIN IN HEALTH CARE ENHANCING DATA SHARING AND MITIGATING CYBER SECURITY CRIMES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/qv33rz232"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086685715628032,"timestamp":"2021-04-15T06:26:24.882Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":1,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Gonen, Bilal","hits":1,"label":"Gonen, Bilal"},{"value":"Ozer, Murat","hits":1,"label":"Ozer, Murat"},{"value":"Ponnakanti, Hari Priya","hits":1,"label":"Ponnakanti, Hari Priya"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information Technology","hits":1,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":1,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- School of Information Technology","hits":1,"label":"- School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04-14","hits":1,"label":"2020-04-14"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"ws859g993","hits":1,"label":"ws859g993"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":1,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":1,"first_page?":true,"last_page?":true}}}