scholarly journals Towards Design Principles for Pharmacist-Patient Health Information Systems

Author(s):  
Dirk Volland ◽  
Klaus Korak ◽  
David Brückner ◽  
Tobias Kowatsch
2018 ◽  
Vol 119 (7/8) ◽  
pp. 358-376
Author(s):  
Cathrine Tambudzai Nengomasha ◽  
Ruth Abankwah ◽  
Wilhelm Uutoni ◽  
Lilian Pazvakawambwa

Purpose This paper aims to report some findings of a study that investigated health information systems (HISs) in Namibia with a view of establishing the nature of these systems and coming up with recommendations on how these could be enhanced. Design/methodology/approach This study applied a mixed methods research approach, using interviews and survey questionnaire to collect data. Survey data were analysed for descriptive statistics using SPSS and data from interviews were analysed applying content analysis for data analysis. Findings The findings of this study indicate fragmented HISs resulting in duplication of diagnosis, tests and treatment. The findings show that there were errors in capturing data into the systems, which could compromise the reliability of the data and compromise service delivery. Research limitations/implications This study was limited to two (Khomas and Oshana) of the fourteen regions in Namibia; therefore, further studies could look at other regions, as the study findings cannot be generalised to the entire country. Practical implications The findings and recommendations, particularly those relating to the public health sector, could inform policies and procedures, especially those relating to the patient health passport (card), and the way health information is shared within and across health sectors. Originality/value This study focused on health information sharing, whereas a previous study on HISs concentrated on quality of healthcare.


1996 ◽  
Vol 26 (4) ◽  
pp. 197-201 ◽  
Author(s):  
Tina Magennis ◽  
Jennifer Mitchell

As electronic patient health information systems become more fully developed and widespread, there are persistent concerns about the privacy and confidentiality of the personal health data being stored and disseminated. Standards Australia has released two Standards which provide useful guidelines for the organisational, technological and human behaviour solutions required to protect privacy and confidentiality in health care organisations. The major requirements of these Standards are outlined and the implications of the Standards for health information managers are discussed.


1998 ◽  
Vol 37 (04/05) ◽  
pp. 518-526 ◽  
Author(s):  
D. Sauquet ◽  
M.-C. Jaulent ◽  
E. Zapletal ◽  
M. Lavril ◽  
P. Degoulet

AbstractRapid development of community health information networks raises the issue of semantic interoperability between distributed and heterogeneous systems. Indeed, operational health information systems originate from heterogeneous teams of independent developers and have to cooperate in order to exchange data and services. A good cooperation is based on a good understanding of the messages exchanged between the systems. The main issue of semantic interoperability is to ensure that the exchange is not only possible but also meaningful. The main objective of this paper is to analyze semantic interoperability from a software engineering point of view. It describes the principles for the design of a semantic mediator (SM) in the framework of a distributed object manager (DOM). The mediator is itself a component that should allow the exchange of messages independently of languages and platforms. The functional architecture of such a SM is detailed. These principles have been partly applied in the context of the HEllOS object-oriented software engineering environment. The resulting service components are presented with their current state of achievement.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Sign in / Sign up

Export Citation Format

Share Document