{"response":{"docs":[{"system_create_dtsi":"2019-07-22T14:45:19Z","system_modified_dtsi":"2021-01-30T04:02:26Z","has_model_ssim":["Article"],"id":"3197xn19c","accessControl_ssim":["65a68c4c-cd73-4291-9631-809d39b81af4"],"hasRelatedMediaFragment_ssim":["6t053h23g"],"hasRelatedImage_ssim":["6t053h23g"],"depositor_ssim":["ajmerahu@mail.uc.edu"],"depositor_tesim":["ajmerahu@mail.uc.edu"],"title_tesim":["Virtual Reality in Healthcare"],"date_uploaded_dtsi":"2019-07-22T14:45:19Z","date_modified_dtsi":"2021-01-30T04:02:04Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/93y7-t513"],"alternate_title_tesim":["VR in Healthcare"],"geo_subject_tesim":["Cincinnati, Ohio"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Ajmera, Himanshu","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["AR vs VR ","Immersion Breaking points","Healthcare","Virtual Reality"],"language_tesim":["English"],"description_tesim":["This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application. \r\nThe resources (infrastructure) to complete this study are provided by the University of Cincinnati’s Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-05-08"],"thumbnail_path_ss":"/downloads/6t053h23g?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6t053h23g"],"file_set_ids_ssim":["6t053h23g"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL REALITY IN HEALTHCARE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"read_access_person_ssim":["gonenbl@ucmail.uc.edu"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ajmerahu@mail.uc.edu"],"nesting_collection__pathnames_ssim":["3197xn19c"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697123083066802176,"timestamp":"2021-04-15T16:04:56.101Z","score":0.00049999997},{"system_create_dtsi":"2018-10-10T01:04:25Z","system_modified_dtsi":"2019-06-06T15:04:11Z","has_model_ssim":["Article"],"id":"d217qq50s","accessControl_ssim":["99478a1c-f46e-43b5-958e-4b1d284d5bfe"],"hasRelatedMediaFragment_ssim":["w6634486f"],"hasRelatedImage_ssim":["w6634486f"],"depositor_ssim":["angelwr@mail.uc.edu"],"depositor_tesim":["angelwr@mail.uc.edu"],"title_tesim":["The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry"],"date_uploaded_dtsi":"2018-10-10T01:04:25Z","date_modified_dtsi":"2018-10-10T01:11:06Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2VT4X"],"alternate_title_tesim":["The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry"],"time_period_tesim":["21st Century"],"required_software_tesim":[""],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"note_tesim":[""],"creator_tesim":["Angel, William"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Dark Web","Black Market","Cyber Security","Healthcare","Information Technology"],"language_tesim":["English"],"description_tesim":["In this paper, I study how medical records are being used by cyber-criminal for financial gain and patient manipulation. I studied what kind of criminal organizations may be involved in these operations and confirmed incidents from the black market. I conducted a literature review which generated several sources from online databases. I determined five major criminal factions that are most likely to use compromised medical records, determined possible motivations and looked at several cases of medical records being sold on the black market. The healthcare industry’s digitization efforts have left it tremendously ill-equip to combat emerging threats. It is evident that the healthcare industry must take extreme measures in order to counteract the evolving threat landscape. It is my hope that the findings of paper will being to shed light on these issues and help healthcare professionals understand what kind of threats the industry is facing."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-23"],"thumbnail_path_ss":"/downloads/w6634486f?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["w6634486f"],"file_set_ids_ssim":["w6634486f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PULSE OF A NATION A STUDY ON THE CYBERSECURITY ISSUES PLAGUING THE HEALTHCARE INDUSTRY","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["angelwr@mail.uc.edu"],"nesting_collection__pathnames_ssim":["d217qq50s"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697076415246106624,"timestamp":"2021-04-15T03:43:10.199Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":2,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Ajmera, Himanshu","hits":1,"label":"Ajmera, Himanshu"},{"value":"Angel, William","hits":1,"label":"Angel, William"},{"value":"Gonen, Bilal","hits":1,"label":"Gonen, Bilal"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Healthcare","hits":2,"label":"Healthcare"},{"value":"AR vs VR ","hits":1,"label":"AR vs VR "},{"value":"Black Market","hits":1,"label":"Black Market"},{"value":"Cyber Security","hits":1,"label":"Cyber Security"},{"value":"Dark Web","hits":1,"label":"Dark Web"},{"value":"Immersion Breaking points","hits":1,"label":"Immersion Breaking points"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":2,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"School of Information Technology","hits":2,"label":"School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":2,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":2,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2018-04-23","hits":1,"label":"2018-04-23"},{"value":"2019-05-08","hits":1,"label":"2019-05-08"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":2,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":2,"first_page?":true,"last_page?":true}}}