Social Credential-Based Role Recommendation and Patient Privacy Control in Medical Emergency

Author(s):  
Soon Ae Chun ◽  
Joon Hee Kwon ◽  
Haesung Lee

Emerging Health Information Technologies (HIT), such as Electronic Health Records (EHR) and Personal Health Records (PHR) systems, facilitate access to and sharing of patients’ medical data in a distributed environment. The privacy protection of medical information is a pressing issue with the use of these medical technologies. In this paper, the authors present a Patient-controlled Privacy Protection Framework, which allows a patient to specify his or her own privacy policies on their own medical data no matter where they are stored. In addition, the authors extend this basic framework to medical emergency situations, where roles and users may not be limited to an organizational boundary. To enforce patient’s privacy policies even in emergency situations, the authors propose the Situation Role-based Privacy Control model and a social network-based user credential discovery method to recommend a situation role to candidate users. The authors present a mobile prototype system and two experiments to show the feasibility of our approach.

Author(s):  
Soon Ae Chun ◽  
Joon Hee Kwon ◽  
Haesung Lee

Emerging Health Information Technologies (HIT), such as Electronic Health Records (EHR) and Personal Health Records (PHR) systems, facilitate access to and sharing of patients’ medical data in a distributed environment. The privacy protection of medical information is a pressing issue with the use of these medical technologies. In this paper, the authors present a Patient-controlled Privacy Protection Framework, which allows a patient to specify his or her own privacy policies on their own medical data no matter where they are stored. In addition, the authors extend this basic framework to medical emergency situations, where roles and users may not be limited to an organizational boundary. To enforce patient’s privacy policies even in emergency situations, the authors propose the Situation Role-based Privacy Control model and a social network-based user credential discovery method to recommend a situation role to candidate users. The authors present a mobile prototype system and two experiments to show the feasibility of our approach.


2013 ◽  
Vol 15 (4) ◽  
pp. 45-62 ◽  
Author(s):  
Xiaoming Zeng ◽  
Elizabeth J. Forrestal ◽  
Leigh W. Cellucci ◽  
Michael H. Kennedy ◽  
Doug Smith

The organization Community Partners HealthNet (CPH), Inc. is a so-called Health-Center-Controlled Networks (HCCNs) that provide health information technologies, in particular Electronic Health Records and Data Warehouse, to participating community health centers (CHC) and rural health clinics (RHC). All 16 member organizations (CHCs and RHCs) in CPH are non-profit health care organizations providing primary health care to individuals in medically underserved areas. To provide quality and accessible health care to those medically needed, CPH and member organization rely heavily on funding from federal and state governments as well as charitable foundations. The investment in system-wide Health Information Technologies has been financially limited given the nature of the organizations. CPH and member organizations, through visionary leadership and cost-effective execution, have been able to adopt and implement advanced information technologies like EHR and data warehouse since early 1990s. There has been software updates and EHR upgrades, but the original design of the system still serve the information needs of the organization. This case study describes CPH in the health care environment, discusses the collaboration of six original individual CHCs to create CPH, the EHR and Data Warehouse projects at CPH, and then explains CPH’s on-going operations and new challenges in the context of meaningful use and big data movement.


2018 ◽  
Vol 12 (1) ◽  
pp. 1-10 ◽  
Author(s):  
Morteza Hemmat ◽  
Haleh Ayatollahi ◽  
Mohammadreza Maleki ◽  
Fatemeh Saghafi

Background and Objective:Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025.Methods:This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software.Results:The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome.Conclusion:In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yingwen Chen ◽  
Linghang Meng ◽  
Huan Zhou ◽  
Guangtao Xue

The rapid development of wearable sensors and the 5G network empowers traditional medical treatment with the ability to collect patients’ information remotely for monitoring and diagnosing purposes. Meanwhile, the health-related mobile apps and devices also generate a large amount of medical data, which is critical for promoting disease research and diagnosis. However, medical data is too sensitive to share, which is also a common issue for IoT (Internet of Things) data. The traditional centralized cloud-based medical data sharing schemes have to rely on a single trusted third party. Therefore, the schemes suffer from single-point failure and lack of privacy protection and access control for the data. Blockchain is an emerging technique to provide an approach for managing data in a decentralized manner. Especially, the blockchain-based smart contract technique enables the programmability for participants to access the data. All the interactions are authenticated and recorded by the other participants of the blockchain network, which is tamper resistant. In this paper, we leverage the K-anonymity and searchable encryption techniques and propose a blockchain-based privacy-preserving scheme for medical data sharing among medical institutions and data users. To be specific, the consortium blockchain, Hyperledger Fabric, is adopted to allow data users to search for encrypted medical data records. The smart contract, i.e., the chaincode, implements the attribute-based access control mechanisms to guarantee that the data can only be accessed by the user with proper attributes. The K-anonymity and searchable encryption ensure that the medical data is shared without privacy leaking, i.e., figuring out an individual patient from queries. We implement a prototype system using the chaincode of Hyperledger Fabric. From the functional perspective, security analysis shows that the proposed scheme satisfies security goals and precedes others. From the performance perspective, we conduct experiments by simulating different numbers of medical institutions. The experimental results demonstrate that the scalability and performance of our scheme are practical.


Author(s):  
Risald Risald ◽  
Suyoto Suyoto ◽  
Albertus Joko Santoso

<p>Deaf or hearing loss is a condition of inability to hear something, either totally or partially. Hearing loss greatly affects the life of a person in communicating with the people around him. Deaf people will be very difficult when in a medical emergency, this is because the medical emergency situation requires fast action.</p><p>          The Healthy Phone application is a mobile medical emergency call application that can help people with hearing impaired when in emergency situations. With the Healthy Phone application, the user only needs to select an icon that suits the situation encountered in touchscreen mobile device then the message will be sent to the nearest hospital.</p>                To search for icons corresponding to emergencies, the User Centered Design (UCD) method is used. This application is very helpful for deaf people because this application does not require audio communication and user location is also sent automatically to the nearest hospital. The results were analyzed using four emergency event scenarios with a total score of 87% and an average user time of less than 0:42 sec indicating that the study was successful in designing a mobile medical emergency call application according to user requirements.


2015 ◽  
Vol 24 (01) ◽  
pp. 119-124 ◽  
Author(s):  
V. Koutkias ◽  
J. Bouaud ◽  

Summary Objective: To summarize recent research and propose a selection of best papers published in 2014 in the field of computerized clinical decision support for the Decision Support section of the IMIA yearbook.Method: A literature review was performed by searching two bibliographic databases for papers related to clinical decision support systems (CDSSs) and computerized provider order entry systems in order to select a list of candidate best papers to be then peer-reviewed by external reviewers. A consensus meeting between the two section editors and the editorial team was finally organized to conclude on the selection of best papers. Results: Among the 1,254 returned papers published in 2014, the full review process selected four best papers. The first one is an experimental contribution to a better understanding of unintended uses of CDSSs. The second paper describes the effective use of previously collected data to tailor and adapt a CDSS. The third paper presents an innovative application that uses pharmacogenomic information to support personalized medicine. The fourth paper reports on the long-term effect of the routine use of a CDSS for antibiotic therapy. Conclusions: As health information technologies spread more and more meaningfully, CDSSs are improving to answer users’ needs more accurately. The exploitation of previously collected data and the use of genomic data for decision support has started to materialize. However, more work is still needed to address issues related to the correct usage of such technologies, and to assess their effective impact in the long term.


Sign in / Sign up

Export Citation Format

Share Document