scholarly journals Health Information Systems in the Digital Health Ecosystem—Problems and Solutions for Ethics, Trust and Privacy

Author(s):  
Pekka Ruotsalainen ◽  
Bernd Blobel

Digital health information systems (DHIS) are increasingly members of ecosystems, collecting, using and sharing a huge amount of personal health information (PHI), frequently without control and authorization through the data subject. From the data subject’s perspective, there is frequently no guarantee and therefore no trust that PHI is processed ethically in Digital Health Ecosystems. This results in new ethical, privacy and trust challenges to be solved. The authors’ objective is to find a combination of ethical principles, privacy and trust models, together enabling design, implementation of DHIS acting ethically, being trustworthy, and supporting the user’s privacy needs. Research published in journals, conference proceedings, and standards documents is analyzed from the viewpoint of ethics, privacy and trust. In that context, systems theory and systems engineering approaches together with heuristic analysis are deployed. The ethical model proposed is a combination of consequentialism, professional medical ethics and utilitarianism. Privacy enforcement can be facilitated by defining it as health information specific contextual intellectual property right, where a service user can express their own privacy needs using computer-understandable policies. Thereby, privacy as a dynamic, indeterminate concept, and computational trust, deploys linguistic values and fuzzy mathematics. The proposed solution, combining ethical principles, privacy as intellectual property and computational trust models, shows a new way to achieve ethically acceptable, trustworthy and privacy-enabling DHIS and Digital Health Ecosystems.

With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of shared web applications, low infrastructure cost, utility and distributed computing, cluster computing as well as reliable IT architecture. In the area of health, Cloud Health Information Systems (CHIS) play a key role not only on the healthcare businesses but patients as well. On the patient side, CHIS aid in sharing of medical data and health information, timely access of critical patient information and coordination of clinical services. Patients, who continue to demand for instantaneous and quality healthcare services are now able to access the services from experts even when they are not necessarily in the same physical location. This is being aided by proliferation of telemedicine through hosted cloud architecture. From the business perspective, CC has helped to cut down operational expenses by way of cost-effective clinical information system infrastructure through the implementation of a distributed platform. The platform has therefore saved businesses millions of dollars that would have gone to infrastructural and human resource investment. Even with these immense opportunities, cloud computing uptake has been serious inhibited by the privacy and security concerns. Due to the sensitivity of personal health information, businesses and individuals are apprehensive when it comes to adopting the technology or releasing the data to the cloud. This study is a results discussion of an enhanced model for attainment of data privacy on the cloud through use of multi factor authentication.


2013 ◽  
Vol 7 (4) ◽  
pp. 22-36 ◽  
Author(s):  
Francis Akowuah ◽  
Xiaohong Yuan ◽  
Jinsheng Xu ◽  
Hong Wang

The information maintained by Health Information Systems (HIS) is often faced with security threats from a wide range of sources. Some government's regulations require healthcare organizations and custodians of personal health information to take practical steps to address the security and privacy needs of personal health information. Standards help to ensure an adequate level of security is attained, resources are used efficiently and the best security practices are adopted. In this paper, the authors survey security standards applicable to healthcare industry including Control OBjective for Information and related Technology (COBIT), ISO/IEC 27002:2005, ISO/IEC 27001:2005, NIST Special Publication 800-53, ISO 27799:2008, HITRUST Common Security Framework (CSF), ISO 17090:2008, ISO/TS 25237:2008, etc. This survey informs the audience currently available standards that can guide the implementation of information security programs in healthcare organizations, and provides a starting point for IT management in healthcare organizations to select a standard suitable for their organizations.


Sign in / Sign up

Export Citation Format

Share Document