Strategic Approach towards Clinical Information Security

Author(s):  
Sangseo Park ◽  
Jane Moon

Information security in the health information system has been technology-centric and no strategy has been put forward to meet the demands of the rapid adoption of e-Health in the health industry. The implementation of security requires a good understanding of the stake holders involved and requires the technical aspect of clinical information security, including security requirements, access control and disclosure control. However, since technology-centric security is prone to failure, a stringent strategic approach is quintessential. This chapter discusses the ways to safeguard medical information assets from the strategy point of view. This study shows that most of the existing clinical information security literature and practice has been focused on tactical prevention at a technical level. This understanding of the current status of clinical information security not only suggests the need for a shift from the technical approach to the strategic approach but also raises the necessity for the employment of multiple strategies working in a harmonised way.

2017 ◽  
pp. 1141-1171
Author(s):  
Sangseo Park ◽  
Jane Moon

Information security in the health information system has been technology-centric and no strategy has been put forward to meet the demands of the rapid adoption of e-Health in the health industry. The implementation of security requires a good understanding of the stake holders involved and requires the technical aspect of clinical information security, including security requirements, access control and disclosure control. However, since technology-centric security is prone to failure, a stringent strategic approach is quintessential. This chapter discusses the ways to safeguard medical information assets from the strategy point of view. This study shows that most of the existing clinical information security literature and practice has been focused on tactical prevention at a technical level. This understanding of the current status of clinical information security not only suggests the need for a shift from the technical approach to the strategic approach but also raises the necessity for the employment of multiple strategies working in a harmonised way.


1970 ◽  
Vol 09 (03) ◽  
pp. 149-160 ◽  
Author(s):  
E. Van Brunt ◽  
L. S. Davis ◽  
J. F. Terdiman ◽  
S. Singer ◽  
E. Besag ◽  
...  

A pilot medical information system is being implemented and currently is providing services for limited categories of patient data. In one year, physicians’ diagnoses for 500,000 office visits, 300,000 drug prescriptions for outpatients, one million clinical laboratory tests, and 60,000 multiphasic screening examinations are being stored in and retrieved from integrated, direct access, patient computer medical records.This medical information system is a part of a long-term research and development program. Its major objective is the development of a multifacility computer-based system which will support eventually the medical data requirements of a population of one million persons and one thousand physicians. The strategy employed provides for modular development. The central system, the computer-stored medical records which are therein maintained, and a satellite pilot medical data system in one medical facility are described.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


2017 ◽  
Vol 5 (1) ◽  
pp. 122
Author(s):  
Assist. Prof. Dr. Demokaan DEMİREL

The distinctive quality of the new social structure is that information becomes the only factor of production. In today's organizations, public administrators are directly responsible for applying information to administrative processes. In addition to his managerial responsibilities, a knowledge based organization requires every employee to take responsibility for achieving efficiency. This has increased the importance of information systems in the decision-making process. Information systems consist of computer and communication technology, data base management and model management and include activity processing system, management information system, decision support systems, senior management information system, expert systems and office automation systems. Information systems in the health sector aim at the management and provision of preventive and curative health services. The use of information systems in healthcare has the benefits of increasing service quality, shortening treatment processes, maximizing efficiency of the time, labour and medical devices. The use of information systems for clinical decision making and reducing medical errors in the healthcare industry dates back to the 1960s. Clinical information systems involve processing, storing and re-accessing information that supports patient care in a hospital. Clinical information systems are systems that are directly or indirectly related to patient care. These systems include electronic health/patient records, clinical decision support systems, nurse information systems, patient tracking systems, tele-medicine, case mix and smart card applications. Diagnosis-treatment systems are information-based systems used in the diagnosis and treatment of diseases. It consists of laboratory information systems, picture archiving and communication system, pharmacy information system, radiology information system, nuclear medicine information system. This study aims to evaluate the effectiveness of health information system applications in Turkey. The first part of the study focuses on the concept of information systems and the types of information systems in organization structures. In the second part, clinical information systems and applications for diagnosis-treatment systems in Turkey are examined. Finally, the study evaluates applications in the health sector qualitatively from the new organizational structure, which is formed by information systems.


Author(s):  
O. Semenenko ◽  
Y. Dobrovolsky ◽  
V. Koverga ◽  
O. Sechenev

Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction in order to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine. The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media. Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


2020 ◽  
Author(s):  
Ke Zeng ◽  
Weiguo Zhu ◽  
Caiyou Wang ◽  
Liyan Zhu

BACKGROUND The rapid spread of COVID-19 has created a severe challenge to China’s healthcare system. Hospitals across the country reacted quickly under the leadership of the Chinese government and implemented a range of informatization measures to effectively respond to the COVID-19. OBJECTIVE To understand the impact of the pandemic on the medical business of Chinese hospitals and the difficulties faced by hospital informatization construction. To discuss the application of hospital informatization measures during the COVID-19 pandemic. To summarize the practical experience of hospitals using information technology to fight the pandemic. METHODS Performing a cross-sectional on-line questionnaire survey in Chinese hospitals, of which the participants are invited including hospital information staff, hospital administrators, medical staff, etc. Statistical analyzing the collected data by using SPSS version 24. RESULTS A total of 804 valid questionnaires (88.45%) are collected in this study from 30 provinces in mainland China, of which 731 (90.92%) were filled out by hospital information staff. 473 (58.83%) hospitals are tertiary hospitals while the remaining 331 (41.17%) are secondary hospitals. The majority hospitals (82.46%) had a drop in their business volume during the pandemic and a more substantial drop is found in tertiary hospitals. 70.40% (n=566) of hospitals have upgraded or modified their information systems in response to the epidemic. The proportion of tertiary hospitals that upgraded or modified systems is significantly higher than that of secondary hospitals. Internet hospital consultation (70.52%), pre-check and triage (62.56%), telemedicine (60.32%), health QR code (57.71%), and telecommuting (50.87%) are the most used informatization anti-pandemic measures. There are obvious differences in the application of information measures between tertiary hospitals and secondary hospitals. Among these measures, most of them (41.17%) are aiming at serving patients and most of them (62.38%) are universal which continue to be used after pandemic. The informatization measures are mostly used to control the source of infection (48.19%), such as health QR Code, etc. During the pandemic, the main difficulties faced by the hospital information department are “information construction projects are hindered” (58.96%) and “increased difficulty in ensuring network information security” (58.58%). There are significant differences in this issue between tertiary hospitals and secondary hospitals. The shortcomings of hospital informatization that should be made up for are “shorten patient consultation time and optimize consultation process” (72.51%), “Ensure network information security” (72.14%) and “build internet hospital consultations platform” (59.95%). CONCLUSIONS A significant number of innovative medical information technology have been used and played a significant role in all phases of COVID-19 prevention and control in China. Since the COVID-19 brought many challenges and difficulties for informatization work, hospitals need to constantly improve their own information technology skills to respond to public health emergencies that arise at any moment.


2018 ◽  
Vol 11 (4) ◽  
pp. 87-98
Author(s):  
Abdullah Alamri

Healthcare systems have evolved to become more patient-centric. Many efforts have been made to transform paper-based patient data to automated medical information by developing electronic healthcare records (EHRs). Several international EHRs standards have been enabling healthcare interoperability and communication among a wide variety of medical centres. It is a dual-model methodology which comprises a reference information model and an archetype model. The archetype is responsible for the definition of clinical concepts which has limitations in terms of supporting complex reasoning and knowledge discovery requirements. The objective of this article is to propose a semantic-mediation architecture to support semantic interoperability among healthcare organizations. It provides an intermediate semantic layer to exploit clinical information based on richer ontological representations to create a “model of meaning” for enabling semantic mediation. The proposed model also provides secure mechanisms to allow interoperable sharing of patient data between healthcare organizations.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
V A Sironi ◽  
M A Riva

Abstract The recent epidemic caused by the Covid-19 virus, which originated in China and then spread rapidly, can rightly be defined as the real 'first' epidemic in the social era. In an increasingly globalized world other recent epidemics (but more circumscribed, even if severely more lethal, such as Ebola and Sars) have been experienced with less media and emotional involvement, while the recent epidemic due to the new coronavirus has generated deserving reactions of analysis from an anthropological and social point of view, rather than on a health aspect. In Italy the epidemic event provoked sometimes excessive and irrational psychological reactions (from an unjustified panic to an irresponsible underestimation) and a cognitive distortion on anthropological level (wrong perspective perception of the pathological event). It has also generated disproportionate social repercussions at national level (refusal of stay for subjects coming from the lands in which diseased people are present) and at international level (foreclosure of landing of Italian tourists in some foreign countries). There was also incorrect medical information (confusion between infected - asymptomatic and/or non-hospitalized paucisymptomatic -, real patients with important symptoms - hospitalized - and sometimes in need of intensive care, subjects - the elderly and carriers of other serious diseases - died not for but with the Covid-19 infection) generated and amplified also by the pounding informative role of the mass media and by the news (often inaccurate and generating fake-news) spread in real time through social media. Key messages Irrational reactions must be avoided. Correct medical information are indispensable.


Sign in / Sign up

Export Citation Format

Share Document