Leveraging Cloud Technology for Rural Healthcare in India

Author(s):  
Girish Suryanarayana ◽  
Roshan Joseph ◽  
Sabishaw Bhaskaran ◽  
Amarnath Basu

Cloud technology is used for a variety of purposes in order to handle large volumes of data. This chapter explores a rural healthcare project in India in which cloud technology was introduced in order to store and share large volumes of data. This project benefits from cloud technology because of the ability to store patients’ full health history on the cloud and access them wherever services are provided. The impetus for this project originated with the fact that many hospitals maintained their proprietary information systems, and thus, patient history was unavailable to physicians outside of that system. The search engine used in this project is called Indexer, which can search a vast collection of records stored in the cloud and help with the diagnosis. The solution developed supports multi-tenancy of data and uses the Azure platform. The project has taken adequate precautions to protect the data. This project is not focused on privacy protection per se but on saving lives.

2015 ◽  
pp. 600-618
Author(s):  
Girish Suryanarayana ◽  
Roshan Joseph ◽  
Sabishaw Bhaskaran ◽  
Amarnath Basu

Cloud technology is used for a variety of purposes in order to handle large volumes of data. This chapter explores a rural healthcare project in India in which cloud technology was introduced in order to store and share large volumes of data. This project benefits from cloud technology because of the ability to store patients' full health history on the cloud and access them wherever services are provided. The impetus for this project originated with the fact that many hospitals maintained their proprietary information systems, and thus, patient history was unavailable to physicians outside of that system. The search engine used in this project is called Indexer, which can search a vast collection of records stored in the cloud and help with the diagnosis. The solution developed supports multi-tenancy of data and uses the Azure platform. The project has taken adequate precautions to protect the data. This project is not focused on privacy protection per se but on saving lives.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 78551-78558 ◽  
Author(s):  
Guibing Guo ◽  
Tianzhi Yang ◽  
Yuan Liu

Author(s):  
Maria N. Koukovini ◽  
Eugenia I. Papagiannakopoulou ◽  
Georgios V. Lioudakis ◽  
Nikolaos L. Dellas ◽  
Dimitra I. Kaklamani ◽  
...  

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.


2014 ◽  
Vol 55 (1) ◽  
pp. 32-36 ◽  
Author(s):  
Roy Wendler

Das Ziel dieses Beitrags war, ein Verständnis über Reifegradmodelle zu erarbeiten und Potenziale sowie Grenzen der Anwendung in betriebswirtschaftlichen Bereichen aufzuzeigen. Dazu wurde der Begriff des Reifegradmodells von drei Perspektiven beleuchtet sowie eine Auswahl von Einsatzgebieten skizziert und mit Beispielen belegt. Im Ergebnis des Beitrags wurde deutlich, dass Reifegradmodelle per se sehr variabel verwendbare Instrumente sind, welche in nahezu allen denkbaren Bereichen im Unternehmen eingesetzt werden können und eine Reihe von Vorteilen mit sich bringen. Es wurde jedoch auch hervorgehoben, dass der Einsatz von Reifegradmodellen überlegt erfolgen muss, um die genannten Vorteile zu erlangen. Maturity models are management tools, which are mainly applied in Information Systems and Informatics. However, their roots are to be found in Business Administration, particularly in Quality Management. Therefore, the following article aims at introducing the concept of maturity models from a linguistic, an application-based, and a structural perspective prior to exemplarily presenting potential application domains in management and business administration. Keywords: supply chain management, qualitätskriterien, linguistische perspektive


2020 ◽  
Vol 35 (4) ◽  
pp. 361-375
Author(s):  
Antony Bryant ◽  
Frank Land

The ‘conversation’ offers an important contribution to the archaeology of information systems, both in practice as an academic domain or discipline, and a focus on the genealogy of the field, including some of the accidents and deviations that marked later developments. It is derived from a series of conversations and later exchanges that I arranged with Frank Land. The substantive aspects date from the late 2017 and were then developed in a series of exchanges in 2018; although in effect he and I have been developing this conversation over many years, during which he has been continually challenging, expansive and forthcoming. Comments forthcoming from readers of earlier drafts indicated some perplexity regarding the genre and the objectives of our contribution, so it is important to note that the term ‘conversation’ is something of a conceit. It is not an interview per se, nor is it a biographical account. The core of what follows developed from our verbatim exchanges both face-to-face, and later via email. Some sections, however, have been reworked and enhanced to clarify and augment the issues raised. In addition, we have sought to provide a good deal of background and narrative to guide readers through the text, offering pointers to further resources. The overall contribution is intended to provide an informed and, we hope, informative contribution to people’s understanding of key social and technical issues of our time.


Author(s):  
Lilian Mitrou ◽  
Maria Karyda

This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organizations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organizational life, including communications, desktop and physical monitoring, collecting employees’ personal data, and locating employees through active badges. The application of these technologies raises privacy protection concerns. Throughout this chapter, we describe different approaches to privacy protection followed by different jurisdictions. We also highlight privacy issues with regard to new trends and practices, such as teleworking and use of RFID technology for identifying the location of employees. Emphasis is also placed on the reorganization of work facilitated by information technology, since frontiers between the private and the public sphere are becoming blurred. The aim of this chapter is twofold: we discuss privacy concerns and the implications of implementing employee surveillance technologies and we suggest a framework of fair practices which can be used for bridging the gap between the need to provide adequate protection for information systems, while preserving employees’ rights to privacy.


Sign in / Sign up

Export Citation Format

Share Document