medical information systems
Recently Published Documents


TOTAL DOCUMENTS

365
(FIVE YEARS 79)

H-INDEX

22
(FIVE YEARS 2)

2022 ◽  
pp. 9-18
Author(s):  
OLEKSANDR PANASIUK ◽  
VALENTYNA PLESKACH ◽  
VOLODYMYR STATSENKO ◽  
VICTORIA KHOMAZIUK

Purpose. Development of a web application with a functional module for conducting prescriptions according to the ICPC2 standard for primary care facilities.Methodology. The C # 8.0 language and the ASP.Net Core 5.0 framework were chosen to implement a server application with the RESTful architecture. The MySql database is selected as the database. HTML5 SASS, JavaScript, React and Redux were used to develop the client part.Findings. Theoretical bases and business processes of medical information systems are investigated. The basic principles of building a modern information system are studied. A medical information system with a high rate of reliability and speed has been designed and implemented. Developed a web application with a client-server architectureOriginality. Features of modern applied medical information systems are revealed. Possibilities of medical information as the main means of medical data storage are considered. The process of conducting medical reception according to the ICPC2 standard for primary care facilities has been worked out. Theoretical bases of construction of software information system for polyclinic and outpatient clinic are investigated.Practical value. A medical information system with a high level of reliability and speed, an interface understandable for all age groups of users has been designed and implemented. Developed a web application with client-server architecture.


Author(s):  
Владимир Павлович Гулов ◽  
Виктор Анатольевич Хвостов ◽  
Айжана Михайловна Каднова ◽  
Галина Владимировна Сыч

На основе анализа практических аспектов защиты персональных данных при автоматизированной обработке в организациях здравоохранения определен круг проблем, касающихся потребительского качества систем защиты информации. Одной из главных проблем защиты персональных данных в медицинских информационных системах является обеспечение своевременной настройки систем защиты информации администратором в соответствии с установленной политикой в организации. При этом ключевой проблемой является формирование условий работы администратора обеспечивающих стопроцентную гарантию реакции администратора на поступление заявок по настройке систем защиты информации, управлению пользователями, правами доступа, парированию угроз различной природы. В условиях отсутствия в настоящее время методических подходов к оценке временных (вероятностных) параметров деятельности администратора безопасности медицинских информационных систем, известных как операционные характеристики систем защиты информации, обеспечить стопроцентное соответствие настроек систем защиты информации текущей политике проблематично. В статье предложен вероятностный показатель для оценки операционных характеристик систем защиты информации. Разработана методика его оценки на основе эксперимента по фиксации движения курсора мыши при выполнении основных действий администратором и распределения его внимания (тепловой карты) по элементам интерфейса системы защиты информации. Представлены результаты оценок операционных характеристик системы защиты информации «Страж NT 3.0», выполненные с использованием предложенной экспериментальной методики Based on the analysis of the practical aspects of personal data protection (PD) during automated processing in healthcare organizations, a range of problems related to the consumer quality of information protection systems (ISS) has been identified. One of the main problems of PD protection in medical information systems (MIS) is to ensure the timely configuration of the information security system by the administrator in accordance with the established policy in the organization. At the same time, the key problem is the formation of the administrator's working conditions that provide one hundred percent guarantee of the administrator's reaction to the receipt of requests for setting up the information security system, managing users, access rights, and countering threats of various nature. In the absence of methodological approaches to assessing the temporal (probabilistic) parameters of the MIS security administrator's activities, known as the operational characteristics of the ISS, it is problematic to ensure that the ISS settings are 100% consistent with the current policy. The article proposes a probabilistic indicator for assessing the operational characteristics of the information security system. A methodology for its assessment was developed on the basis of an experiment on fixing the movement of the mouse cursor when performing basic actions by the administrator and distributing his attention (heat map) among the elements of the information security interface. The results of evaluations of the operational characteristics of the SZI "Ctrazh NT 3.0" carried out using the proposed experimental method are presented


2021 ◽  
Vol 2 (4) ◽  
pp. 30-32
Author(s):  
D. A. Sychev

Currently, the development and implementation of computerized medical decision support systems (CMDSS) is an effective tool aimed at optimizing drug therapy in clinical practice. It has been proven in clinical studies their use can increase the efficacy and safety of pharmacotherapy for a number of socially significant diseases. An active integration of CMDSS into medical information systems of medical organizations is required.


2021 ◽  
Author(s):  
Svetlana Evdokimova ◽  
D. Bubenin ◽  
R. Lopatin

Modern medical information systems are designed to automate the management of medical institutions and provide patients with electronic access to various services. The paper analyzes the capabilities of such medical information systems as «Infoklinika», Medwork, and Medesk.


2021 ◽  
Vol 2089 (1) ◽  
pp. 012074
Author(s):  
Shaik Sumi Anju ◽  
BSN Sravani ◽  
Srinivasa Rao Madala

Abstract As data processing advances, decentralized media has been widely recognized for its ability to store large amounts of data. By comparing a revisited content to a dispersed repository, a cloud provider may verify the document’s integrity without having to retrieve it. A reconsidered examining strategy is offered to lead the customer to reconsider the significant assessing task to third sector inspector, taking into consideration the important computing cost brought up by the checking process (TPA). TPA may be deterred by the primary revisited evaluating strategy, but the second plan gives the harmful organization the right of inspection over the readdressed data of users, which poses a significant risk to patient privacy. Human Emphasis for reconsidered inspection is presented in this work, which emphasizes that the service user can be overwhelmed by her own data. Based on user-centered design, our suggested methodology not only prevents patient’s data from leaking to TPA without depending on cryptographic algorithms, but can also avoid the use of additional free unpredictable supply that is impossible to fulfill on a daily basis. Also, we start to make our approach work with continuous changes. Our recommended scheme is both verifiably safe and essentially productive, as shown by the privacy analysis and test evaluations.


2021 ◽  
Vol 85 (5) ◽  
pp. 1-13
Author(s):  
Vitalij V. Lapinskyi ◽  
Pavlo V. Mykytenko ◽  
Oleksander V. Halytskyi

The publication considers the relevance and purpose of medical information systems, as well as the tasks that should be solved by medical workers with their help. Functional capabilities and main modules of medical information systems were inspected. A list of the most powerful information systems is given, according to the recommendations of the Ministry of Health of Ukraine, for use in medical institutions. Since each medical information system has different modules with a unique interface, this requires certain skills to work with the system, understand the properties and principles of designing the user interface. The concept of the user interface is investigated, and its properties are specified. The main principles of the user interface design and quantitative methods of assessing its usability are described. Based on the result of the analysis, the strengths and weaknesses of methods for assessing the convenience of the user interface were identified. In particular, the complexity analysis method gives the possibility to investigate the actions and use of the system from the user's point of view, as well as the parameters that are responsible for the functionality of the system. It has been found that increasing the complexity of the interface leads to an increase in the number of operations that can be carried out in the medical information system. In turn, the use of the GOMS method makes it possible to evaluate the performance of the information system and step by step investigate its effectiveness, predicting the usability of the interface. On the one hand, a correct assessment of the interface complexity will make it possible to rationally adjust the process of the development of medical information systems on the basis of the user’s previous skills. On the other hand, knowledge of the principles of designing the user interface and its properties will make it possible to effectively and fully use their functional capabilities in professional activities.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6253
Author(s):  
Tuan Anh Nguyen ◽  
Iure Fe ◽  
Carlos Brito ◽  
Vishnu Kumar Kaliappan ◽  
Eunmi Choi ◽  
...  

The aggressive waves of ongoing world-wide virus pandemics urge us to conduct further studies on the performability of local computing infrastructures at hospitals/medical centers to provide a high level of assurance and trustworthiness of medical services and treatment to patients, and to help diminish the burden and chaos of medical management and operations. Previous studies contributed tremendous progress on the dependability quantification of existing computing paradigms (e.g., cloud, grid computing) at remote data centers, while a few works investigated the performance of provided medical services under the constraints of operational availability of devices and systems at local medical centers. Therefore, it is critical to rapidly develop appropriate models to quantify the operational metrics of medical services provided and sustained by medical information systems (MIS) even before practical implementation. In this paper, we propose a comprehensive performability SRN model of an edge/fog based MIS for the performability quantification of medical data transaction and services in local hospitals or medical centers. The model elaborates different failure modes of fog nodes and their VMs under the implementation of fail-over mechanisms. Sophisticated behaviors and dependencies between the performance and availability of data transactions are elaborated in a comprehensive manner when adopting three main load-balancing techniques including: (i) probability-based, (ii) random-based and (iii) shortest queue-based approaches for medical data distribution from edge to fog layers along with/without fail-over mechanisms in the cases of component failures at two levels of fog nodes and fog virtual machines (VMs). Different performability metrics of interest are analyzed including (i) recover token rate, (ii) mean response time, (iii) drop probability, (iv) throughput, (v) queue utilization of network devices and fog nodes to assimilate the impact of load-balancing techniques and fail-over mechanisms. Discrete-event simulation results highlight the effectiveness of the combination of these for enhancing the performability of medical services provided by an MIS. Particularly, performability metrics of medical service continuity and quality are improved with fail-over mechanisms in the MIS while load balancing techniques help to enhance system performance metrics. The implementation of both load balancing techniques along with fail-over mechanisms provide better performability metrics compared to the separate cases. The harmony of the integrated strategies eventually provides the trustworthiness of medical services at a high level of performability. This study can help improve the design of MIS systems integrated with different load-balancing techniques and fail-over mechanisms to maintain continuous performance under the availability constraints of medical services with heavy computing workloads in local hospitals/medical centers, to combat with new waves of virus pandemics.


2021 ◽  
Vol 100 (8) ◽  
pp. 812-817
Author(s):  
Dmitry N. Borisov ◽  
Vladimir V. Sevryukov ◽  
Gennady B. Eremin ◽  
Denis N. Petryakhin

Introduction. At the present stage of developing domestic health care, active processes of informatization of the clinical diagnostic process are taking place. In most regions of the Russian Federation, various medical information systems are actively exploited in medical organizations, digital medical devices and devices are being introduced, which determines the relevance of the formation of a methodology for the use of information technologies in the health care system of military personnel. Materials and methods. The materials of literary sources, bibliographic databases, regulatory documents, research and development work data, materials of military-scientific support of military-medical information systems have been studied. The historical, literary and structural-logical approach, system analysis methods, comparison, composition, and decomposition were used. Results. This study proposes approaches to managing the health of servicemen and a system of its assessment using information technologies. Within the framework of the entire system of medical support for troops at the sectoral level, the ultimate goal of informatization is to construct a single information space for the medical service of the RF Armed Forces. It should be based on the use of unified personal electronic cards of military personnel, a single protected intradepartmental telecommunication network, and medical information systems for various purposes, depending on the level of a medical organization, unit or subdivision. In the informatization of the medical service, it is necessary to distinguish three primary levels, each of which develops its technologies and means of automation: personal (the level of an individual soldier); the level of medical organizations; the systemic level that determines the activities of the entire medical service. A personal electronic card of a serviceman should be used as an individual carrier of passport and medical information in military medical information systems. To decide on the medical and evacuation purpose of a particular patient at the admission and triage department of a medical company, it is necessary to ensure the formation of a protocol of medical and evacuation measures, which includes information from the electronic medical archive, vital activity sensors and medical care accounting systems. Conclusion. The capabilities of information technologies, vital activity sensors, electronic medical archives and communication channels should ensure the collection of relevant information about an individual patient for the needs of the treatment and diagnostic process, even when military medical organizations are deployed at the stages of medical evacuation. The integration of all information systems in the health care system of servicemen into a single information space must be carried out, taking into account the requirements of regional medical information systems and a unified state information system in the field of health.


Author(s):  
Владимир Павлович Гулов ◽  
Владимир Петрович Косолапов ◽  
Галина Владимировна Сыч ◽  
Виктор Анатольевич Хвостов

На основе анализа применения моделей управления доступом с использованием тематических иерархических классификаторов в медицинских информационных системах с применением мобильных систем в качестве элементов предложены методы формирования доверительных прав на доступ к объектам. При использовании традиционных тематически иерархических моделей управления доступа логическая информационная архитектура ресурсов медицинских информационных систем формирует собой тематический иерархический классификатор (рубрикатор). Диаграмма Хассе вводит отношения порядка в тематическом классификаторе на решетке безопасности для формирования доверительно - тематических полномочий пользователей медицинских информационных систем. Построение диаграмм Хассе на решетке безопасности включающей несколько уровней безопасности достаточно сложная алгоритмическая задача. При построении доверительно - тематических полномочий пользователей для избегания неопределенности при неполноте построенной диаграммы Хассе и завышения предоставленных полномочий при формировании прав доступа предлагается использовать семантическую близость запроса на доступ пользователя и тематической рубрики иерархического классификатора. Анализ существующих подходов к формированию метрик семантической близости показал, что в качестве наилучшей метрики для задания доверительных полномочий пользователя может использоваться меры близости, основанные на иерархии понятий Based on the analysis of the application of access control models using thematically hierarchical classifiers in medical information systems using mobile technologies (MS), methods of forming access rights to objects are proposed. When using traditional thematically hierarchical access control models, the logical information architecture of the medical information systems resources forms a thematic hierarchical classifier (rubricator). The Hasse diagram introduces order relations into the thematic classifier on the security grid to form the trust-thematic powers of the medical information systems users. The construction of Hasse diagrams on a security grid that includes several security levels is a rather complex algorithmic task. When constructing trust-thematic user powers to avoid ambiguity in the case of incompleteness of the constructed Hasse diagram and overestimation of the granted powers when forming access rights, it is proposed to use the semantic proximity of the user's access request and the thematic heading of the hierarchical classifier. An analysis of existing approaches to the formation of semantic proximity metrics showed that proximity measures based on a hierarchy of concepts can be used as the best metric for setting the user's trust authority


Sign in / Sign up

Export Citation Format

Share Document