Taiwan's perspective on electronic medical records’ security and privacy protection: Lessons learned from HIPAA

2006 ◽  
Vol 82 (3) ◽  
pp. 277-282 ◽  
Author(s):  
Che-Ming Yang ◽  
Herng-Ching Lin ◽  
Polun Chang ◽  
Wen-Shan Jian

2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Qiong Li ◽  
Hui Yu ◽  
Wei Li

The traditional centralized storage of traditional electronic medical records (EMRs) faces problems like data leakage, data loss, and EMR misplacement. The current protection measures for patients’ privacy in EMRs cannot withstand the fast-developing password cracking technologies and frequency cyberattacks. This paper intends to innovate the information sharing and privacy protection of electronic nursing records (ENRs) management system. Specifically, the signature interception technology was introduced to EMRs, the different phases of certificateless signature interception scheme were depicted, and the validation procedures of the scheme were designed. Then, the six phases of ENR information sharing protocol based on alliance blockchain were described in detail. Finally, an end-to-end memory neural network was constructed for ENR classification. The proposed management scheme was proved effective through experiments.



Author(s):  
Harshali Kulwal ◽  
Pallavi Badhe ◽  
Sneha Ingole ◽  
Monika Madhure ◽  
Archana. K

Existing Health Management Systems are faced with various security and privacy issues such as unauthorized Access to Patient Records, internet security issues, etc. The proposed system mainly focuses on the security of Electronic Medical Records . The purpose of the project entitled “A SECURE eHealth SYSTEM” is to develop software which is user-friendly, fast, and cost-effective. It deals with the collection of patient’s information, Doctor details, Medical information. Traditionally, it was done manually. The main function of the system is to register and store patient details, add symptom and doctor details and retrieve these details as and when required, and also to manipulate these details meaningfully. System input contains patient details, doctor details while system output is to appoint a doctor for the patient, display these details on the screen, securely generated electronic medical records, forward prescriptions to the medical store. The eHealth system can be entered using a unique ID generated during registration and password. It is accessible either by a doctor, patient, pharmacist. Only registered members add data into a database. The data can be retrieved easily. The data is well protected and the data processing becomes very fast.



F1000Research ◽  
2016 ◽  
Vol 5 ◽  
pp. 1477
Author(s):  
Kiran Jobanputra ◽  
Jane Greig ◽  
Ganesh Shankar ◽  
Eric Perakslis ◽  
Ronald Kremer ◽  
...  

By November 2015, the West Africa Ebola epidemic had caused 28598 infections and 11299 deaths in the three countries most affected. The outbreak required rapid innovation and adaptation. Médecins sans Frontières (MSF) scaled up its usual 20-30 bed Ebola management centres (EMCs) to 100-300 beds with over 300 workers in some settings. This brought challenges in patient and clinical data management resulting from the difficulties of working safely with high numbers of Ebola patients. We describe a project MSF established with software developers and the Google Social Impact Team to develop context-adapted tools to address the challenges of recording Ebola clinical information. We share the outcomes and key lessons learned in innovating rapidly under pressure in difficult environmental conditions. Information on adoption, maintenance, and data quality was gathered through review of project documentation, discussions with field staff and key project stakeholders, and analysis of tablet data. In March 2015, a full prototype was deployed in Magburaka EMC, Sierra Leone. Inpatient data were captured on 204 clinical interactions with 34 patients from 5 March until 10 April 2015. Data continued to also be recorded on paper charts, creating theoretically identical record “pairs” on paper and tablet. 85 record pairs for 32 patients with 26 data items (temperature and symptoms) per pair were analysed. The average agreement between sources was 85%, ranging from 69% to 95% for individual variables. The time taken to deliver the product was more than that anticipated by MSF (7 months versus 6 weeks). Deployment of the tablet coincided with a dramatic drop in patient numbers and thus had little impact on patient care. We have identified lessons specific to humanitarian-technology collaborative projects and propose a framework for emergency humanitarian innovation. Time and effort is required to bridge differences in organisational culture between the technology and humanitarian worlds. This investment is essential for establishing a shared vision on deliverables, urgency, and ownership of product.



Author(s):  
Ming-Ling Sher ◽  
Paul C. Talley ◽  
Ching-Wen Yang ◽  
Kuang-Ming Kuo

The employment of Electronic Medical Records is expected to better enhance health care quality and to relieve increased financial pressure. Electronic Medical Records are, however, potentially vulnerable to security breaches that may result in a rise of patients’ privacy concerns. The purpose of our study was to explore the factors that motivate hospital information technology staff’s compliance with Electronic Medical Records privacy policy from the theoretical lenses of protection motivation theory and the theory of reasoned action. The study collected data using survey methodology. A total of 310 responses from information technology staff of 7 medical centers in Taiwan was analyzed using the Structural Equation Modeling technique. The results revealed that perceived vulnerability and perceived severity of threats from Electronic Medical Records breaches may be used to predict the information technology staff’s fear arousal level. And factors including fear arousal, response efficacy, self-efficacy, and subjective norm, in their turn, significantly predicted IT staff’s behavioral intention to comply with privacy policy. Response cost was not found to have any relationship with behavioral intention. Based on the findings, we suggest that hospitals could plan and design effective strategies such as initiating privacy-protection awareness and skills training programs to improve information technology staff member’s adherence to privacy policy. Furthermore, enhancing the privacy-protection climate in hospitals is also a viable means to the end. Further practical and research implications are also discussed.





2009 ◽  
Vol 55 (7) ◽  
pp. 1077-1093 ◽  
Author(s):  
Amalia R. Miller ◽  
Catherine Tucker






Sign in / Sign up

Export Citation Format

Share Document