Patient data security in the DICOM standard

2004 ◽  
Vol 51 (3) ◽  
pp. 286-289 ◽  
Author(s):  
B Schütze ◽  
M Kroll ◽  
T Geisbe ◽  
T.J Filler
Author(s):  
Tafheem Ahmad Wani ◽  
Antonette Mendoza ◽  
Kathleen Gray

Background: Healthcare is among the leading industries which drives the use of personal devices for work purposes (BYOD). However, allowing BYOD for healthcare workers comes at a cost, as it puts sensitive information assets such as patient data residing on personal devices at risk of potential data breaches. Objective: Previous review of the literature has highlighted the dearth of empirical studies in hospital settings regarding BYOD usage. As such, this paper aims to report BYOD usage trends in Australian hospitals through a national survey, first of its kind in Australia. Methods: An anonymous survey was conducted online among health IT personnel, asking them about their experiences about BYOD usage in their hospitals. 28 responses were collected based on public Australian hospitals, which included 21 hospital groups and 7 standalone hospitals, likely to represent more than 100 hospitals in total. Survey responses were quantitatively analysed through descriptive statistical analysis and cross tabulation. Results: BYOD is allowed in majority of the hospitals, and among all major staff groups, with doctors being the leading group. Participants ranked reasons for allowing BYOD, and most of them were related to improvement in clinical productivity, efficiency and mobility for clinical staff. Challenges were generally related to data security such as patient data breaches and compliance with data security laws, according to them. More than two thirds of hospitals had a cybersecurity officer employed, and CIOs were the most dominant group who held responsibility for managing BYOD within the hospital. Conclusion: This paper provides a starting point for better understanding of BYOD usage in a complex healthcare environment based on empirical evidence, one which highlights the security-usability conundrum, confirming previous literature themes.


2019 ◽  
Vol 8 (4) ◽  
pp. 6112-6118

Sleep is a mandatory biological requirement for humans that require appropriate proportions and quality. The assessment method in determining the best sleep quality and the medical gold standard is to use a Polysomnography device. The advantages of the Internet of Things can significantly increase the usefulness of Polysomnography in suburban areas. The target location of this framework makes our consideration adhere to the Offline-First Internet of Things method to overcome the limitations of the internet at that location. Unfortunately, there are still problems coming from the concept of the Internet of Things itself, and the problem is in data security. So we propose a framework for Polysomnography devices that connects the Internet of Things with a focus on the security and confidentiality of patient data called Offline-First Sleep Assessment (OFFSA). We enumerate patient medical data and archive encryption to improve patient data security. The confidentiality of our patient data is achieved by encryption on every medical data exchange and is only open on the Graphic User Interface application on the device that has been registered.


Author(s):  
Nuniek Fahriani ◽  
Indah Kurniawati

At HOTSPODT (Hospital Ship for Covid Disaster) there are no stages regarding the application of the use of information technology systems, especially for securing patient data which includes personal data and patient medical records. Confidential patient data collected during the current pandemic, including the patient’s name, address, diagnosis, family history and medical records without the patient’s consent, may pose a risk to the individual concerned. The concept of patient data security is adjusted to the user’s position on the importance of data. Access to patient data authorization is one of the security gaps that the security system needs to pay attention to and guard against. So, in this case applied a data security algorithm in the form of cryptography. The algorithm used is the Blowfish Algorithm. The test results of the scenario in the application prove that it can be successfully processed from the encrypted file to ciphertext until it is returned as the original file.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Abolfazl Mehbodniya ◽  
Rahul Neware ◽  
Sonali Vyas ◽  
M. Ranjith Kumar ◽  
Peter Ngulube ◽  
...  

Internet of Medical Things (IoMT) has emerged as an integral part of the smart health monitoring system in the present world. The smart health monitoring deals with not only for emergency and hospital services but also for maintaining a healthy lifestyle. The industry 5.0 and 5/6G has allowed the development of cost-efficient sensors and devices which can collect a wide range of human biological data and transfer it through wireless network communication in real time. This led to real-time monitoring of patient data through multiple IoMT devices from remote locations. The IoMT network registers a large number of patients and devices every day, along with the generation of huge amount of big data or health data. This patient data should retain data privacy and data security on the IoMT network to avoid any misuse. To attain such data security and privacy of the patient and IoMT devices, a three-level/tier network integrated with blockchain and interplanetary file system (IPFS) has been proposed. The proposed network is making the best use of IPFS and blockchain technology for security and data exchange in a three-level healthcare network. The present framework has been evaluated for various network activities for validating the scalability of the network. The network was found to be efficient in handling complex data with the capability of scalability.


2021 ◽  
Author(s):  
akuwan saleh

The technology of using finger vein patterns is a biometric system that has a high level of security. By using the identification of blood vessels found on the human finger, when this data is needed it can be accessed immediately, and there is no possibility of being lost or forgotten. The condition of the blood vessels in the human body, precisely in the fat tissue, also makes it difficult for data to be stolen. A person's health data is quite crucial data. So we need a good security system. By using this blood vessel authentication, the data can only be accessed by the person concerned. With a finger vein pattern that is not easy to duplicate so it is suitable for creating a security system. In this research, we take advantage of the advantages of the finished vein pattern to create a patient data security system in the hospital. The system is made by utilizing one of the algorithms of an artificial neural network. This algorithm is oriented towards changing the value of weights and biases in the training process. From the training process, a model of an artificial neural network system is generated. The best labeling is for one finger vein identity, one label. The average time required for image recognition is 2.4 seconds. The best rejection result is 100% and the best acceptance is 81.67%.


2011 ◽  
Vol 18 (2) ◽  
pp. 191-204 ◽  
Author(s):  
Sjef Gevers ◽  
Corrette Ploem

AbstractThe electronic patient record (EPR) is a major technological development within the healthcare sector. Many hospitals across Europe already use institution-based electronic patient records, which allow not only for electronic exchange of patient data within the hospital, but potentially also for sharing medical data with external healthcare providers, involved in the patient’s care, such as general practitioners or pharmacists. In this article, we discuss the attempt made by the Dutch government to introduce a nationwide electronic patient record (n-EPR). Describing and analyzing the new legislation that is currently being developed to establish the infrastructure for the n-EPR and the related legal issues, we conclude that the introduction of a n-EPR give rise to some substantial concerns. These vary from technical and quality issues such as the reliability of patient data and sufficient standardization and interoperability of the systems used, to issues in the field of data security and confidentiality. For a successful introduction of the n-EPR within the healthcare sector, a condicio sine qua non is that the related legislation provides sufficient safeguards and clarity with respect to the responsibilities and liabilities of its main users: the healthcare professionals.


2009 ◽  
Vol 42 (21) ◽  
pp. 1-2
Author(s):  
ERIK L. GOLDMAN
Keyword(s):  

1997 ◽  
Vol 36 (02) ◽  
pp. 79-81
Author(s):  
V. Leroy ◽  
S. Maurice-Tison ◽  
B. Le Blanc ◽  
R. Salamon

Abstract:The increased use of computers is a response to the considerable growth in information in all fields of activities. Related to this, in the field of medicine a new component appeared about 40 years ago: Medical Informatics. Its goals are to assist health care professionals in the choice of data to manage and in the choice of applications of such data. These possibilities for data management must be well understood and, related to this, two major dangers must be emphasized. One concerns data security, and the other concerns the processing of these data. This paper discusses these items and warns of the inappropriate use of medical informatics.


Sign in / Sign up

Export Citation Format

Share Document