Computer Science Project Topics

Electronic Health Record (Ehr) Encryption System

Electronic Health Record (Ehr) Encryption System

Advertisements

Electronic Health Record (Ehr) Encryption System

Content Structure of Electronic Health Record (Ehr) Encryption System

The abstract contains the research problem, the objectives, methodology, results, and recommendations

  • Chapter one of this thesis or project materials contains the background to the study, the research problem, the research questions, research objectives, research hypotheses, significance of the study, the scope of the study, organization of the study, and the operational definition of terms.
  • Chapter two contains relevant literature on the issue under investigation. The chapter is divided into five parts which are the conceptual review, theoretical review, empirical review, conceptual framework, and gaps in research
  • Chapter three contains the research design, study area, population, sample size and sampling technique, validity, reliability, source of data, operationalization of variables, research models, and data analysis method
  • Chapter four contains the data analysis and the discussion of the findings
  • Chapter five contains the summary of findings, conclusions, recommendations, contributions to knowledge, and recommendations for further studies.
  • References: The references are in APA
  • Questionnaire.

Abstract Of Electronic Health Record (Ehr) Encryption System

In the 21st century, every aspect of life has become digitalized, virtually everything is been done through the use of computers. In the medical sector the record system has upgraded from contemporary paper file record system to the electronic record system which most times runs on the open internet a web where cyber crime and information theft is on the increase daily. It will be of great importance to protect the privacy of patience and protect sensitive medical electronic information at different unit in the federal hospital running an online hospital management or online hospital portal. Cryptography seems to be the best way where this sensitive information can be protected by combining cryptography and the logged in credentials of the logged in user. Scrambling and making them human unreadable until the right key combination for the logged in user is been used to decrypt where the key will be managed solely by the owner of the information.

Download Chapters 1 to 5 PDF

Advertisements

Advertisements


GET THE COMPLETE PROJECT»

WeCreativez WhatsApp Support
Welcome! We are online and ready to help you via WhatsApp chat. Let us know if you need our assistance.