Privacy preservation and information security protection for patients’ portable electronic health records

2009 ◽  
Vol 39 (9) ◽  
pp. 743-750 ◽  
Author(s):  
Lu-Chou Huang ◽  
Huei-Chung Chu ◽  
Chung-Yueh Lien ◽  
Chia-Hung Hsiao ◽  
Tsair Kao
2005 ◽  
Vol 34 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Khin Than Win

The objective of this study is to answer the research question, ‘Are current information security technologies adequate for electronic health records (EHRs)?’ In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.


2020 ◽  
Vol 6 ◽  
pp. e323
Author(s):  
Fahad F. Alruwaili

Background Application of Artificial Intelligence (AI) and the use of agent-based systems in the healthcare system have attracted various researchers to improve the efficiency and utility in the Electronic Health Records (EHR). Nowadays, one of the most important and creative developments is the integration of AI and Blockchain that is, Distributed Ledger Technology (DLT) to enable better and decentralized governance. Privacy and security is a critical piece in EHR implementation and/or adoption. Health records are updated every time a patient visits a doctor as they contain important information about the health and wellbeing of the patient and describes the history of care received during the past and to date. Therefore, such records are critical to research, hospitals, emergency rooms, healthcare laboratories, and even health insurance providers. Methods In this article, a platform employing the AI and the use of multi-agent based systems along with the DLT technology for privacy preservation is proposed. The emphasis of security and privacy is highlighted during the process of collecting, managing and distributing EHR data. Results This article aims to ensure privacy, integrity and security metrics of the electronic health records are met when such copies are not only immutable but also distributed. The findings of this work will help guide the development of further techniques using the combination of AI and multi-agent based systems backed by DLT technology for secure and effective handling EHR data. This proposed architecture uses various AI-based intelligent based agents and blockchain for providing privacy and security in EHR. Future enhancement in this work can be the addition of the biometric based systems for improved security.


2018 ◽  
Vol 48 (3) ◽  
pp. 144-151
Author(s):  
Antti Vikström ◽  
Hans Moen ◽  
Sanaz Rahimi Moosavi ◽  
Tapio Salakoski ◽  
Sanna Salanterä

Background: The potential for the secondary use of electronic health records (EHRs) is underused due to restrictions in national legislation. For privacy purposes, legislative restrictions limit the availability and content of EHR data provided to secondary users. These limitations do not encourage healthcare organisations to develop procedures to promote the secondary use of EHRs. Objective: The objective of this study is to identify factors that restrict the secondary use of unstructured EHRs in academic research in Finland and Sweden. Method: A study was conducted to identify these availability-restricting issues that pertain to the academic secondary use of unstructured EHRs. Using semi-structured interviews, 14 domain experts in science, hospital management and business were interviewed to evaluate the efficiency of procedures and technologies that are implemented in secondary use processes. Results: The results demonstrate three aspects that restrict the availability of unstructured EHRs for secondary purposes: (i) the management and (ii) privacy preservation of such data as well as (iii) potential secondary users. Conclusion: Based on these categories, two approaches for the secondary use of unstructured EHRs are identified: the protected processing environment and altered data. Implications: The protected processing environment ensures patient privacy by providing unstructured EHRs for exclusive user groups that have preferred use intentions. Compared to the use of such processing environments, data alteration enables the secondary use of unstructured EHRs for a larger user group with various use intentions but that yield less valuable content.


Sign in / Sign up

Export Citation Format

Share Document