scholarly journals Information Sharing and Privacy Protection of Electronic Nursing Record Management System

2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Qiong Li ◽  
Hui Yu ◽  
Wei Li

The traditional centralized storage of traditional electronic medical records (EMRs) faces problems like data leakage, data loss, and EMR misplacement. The current protection measures for patients’ privacy in EMRs cannot withstand the fast-developing password cracking technologies and frequency cyberattacks. This paper intends to innovate the information sharing and privacy protection of electronic nursing records (ENRs) management system. Specifically, the signature interception technology was introduced to EMRs, the different phases of certificateless signature interception scheme were depicted, and the validation procedures of the scheme were designed. Then, the six phases of ENR information sharing protocol based on alliance blockchain were described in detail. Finally, an end-to-end memory neural network was constructed for ENR classification. The proposed management scheme was proved effective through experiments.

Author(s):  
Tomoaki Sato ◽  
Kazuhisa Yao ◽  
Yasuhiro Kawakami ◽  
Noriaki Sadakane ◽  
Satoru Miyake ◽  
...  

Author(s):  
Ming-Ling Sher ◽  
Paul C. Talley ◽  
Ching-Wen Yang ◽  
Kuang-Ming Kuo

The employment of Electronic Medical Records is expected to better enhance health care quality and to relieve increased financial pressure. Electronic Medical Records are, however, potentially vulnerable to security breaches that may result in a rise of patients’ privacy concerns. The purpose of our study was to explore the factors that motivate hospital information technology staff’s compliance with Electronic Medical Records privacy policy from the theoretical lenses of protection motivation theory and the theory of reasoned action. The study collected data using survey methodology. A total of 310 responses from information technology staff of 7 medical centers in Taiwan was analyzed using the Structural Equation Modeling technique. The results revealed that perceived vulnerability and perceived severity of threats from Electronic Medical Records breaches may be used to predict the information technology staff’s fear arousal level. And factors including fear arousal, response efficacy, self-efficacy, and subjective norm, in their turn, significantly predicted IT staff’s behavioral intention to comply with privacy policy. Response cost was not found to have any relationship with behavioral intention. Based on the findings, we suggest that hospitals could plan and design effective strategies such as initiating privacy-protection awareness and skills training programs to improve information technology staff member’s adherence to privacy policy. Furthermore, enhancing the privacy-protection climate in hospitals is also a viable means to the end. Further practical and research implications are also discussed.


2013 ◽  
Vol 1 (12) ◽  
pp. 514-517
Author(s):  
Shaosheng Su ◽  
Yaocheng Yang ◽  
Yuanyuan He ◽  
Yong Yang ◽  
Shujuan Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document