Security of Electronic Medical Records

Author(s):  
Ana Ferreira ◽  
Ricardo Cruz-Correia ◽  
Luís Antunes ◽  
David Chadwick

This chapter reports the authors’ experiences regarding security of the electronic medical record (EMR). Although the EMR objectives are to support shared care and healthcare professionals’ workflow, there are some barriers that prevent its successful use. These barriers comprise not only costs, regarding resources and time, but also patient / health professional relations, ICT (information and communication technologies) education as well as security issues. It is very difficult to evaluate EMR systems; however some studies already made show problems regarding usability and proper healthcare workflow modeling. Legislation to guide the protection of health information systems is also very difficult to implement in practice. This chapter shows that access control, as a part of an EMR, can be a key to minimize some of its barriers, if the means to design, develop and evaluate access control are closer to users’ needs and workflow complexity.

2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Somesh Nigam

No abstract available. Editor’s Note: This is the second in a series of articles by Dr. Nigam on the use of digital information and communication technologies, commonly referred to as telehealth and telemedicine. In this article the author discusses clinical practice issues and the challenges of regulation and security of digital health information facing society today.


2018 ◽  
Vol 35 (4) ◽  
pp. 524-534 ◽  
Author(s):  
Ngozi B Ukachi ◽  
Stella NI Anasi

Maternal and child mortality pose a great challenge in developing nations notwithstanding the robust initiatives instituted at both the global and national levels to ameliorate it. This study is aimed at ascertaining women’s perception of the impact of information and communication technologies on access to maternal and child health information and its implication on sustainable development. The descriptive research design was adopted for the study. Purposive sampling technique was used in selecting University of Lagos Teaching Hospital and subsequently, the three clinics (Obstetrics and Gynaecology, Paediatrics Outpatient, and Antenatal clinics) where the needed groups could be seen. Questionnaire was the instrument used for data collection while SPSS statistical package was used for data analysis. The study revealed that the women perceive information and communication technologies to have a positive impact on their access to maternal and child health information while the key technological facilities used by the respondents in accessing maternal and child health information were mobile phones and social media tools such as Facebook, YouTube, blogs and Twitter. It was also found that irregular power supply, poor Internet access, and ignorance of the media that transmit maternal and child health information were the key factors that militate against effective access to maternal and child health information using communication technologies. The implication of this result on sustainable development is discussed and recommendations made.


Author(s):  
Shadi A. Aljawarneh

The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and credit facilities. One of the security concerns is a lack of data validation. Data that is not validated or not properly validated is the main issue for serious security vulnerabilities affecting online banking applications. In this chapter, the influences of security issues on world banks will be discussed. A number of data validation methods will be also reviewed to date to provide a systematic summary to banking environment. Based on the advantages and disadvantages of each method, the IT developer will decide which is best suited to develop the systematic online banking application. From this analysis, a global view of the current and future tendencies of data validation will be obtained and therefore provision of possible recommendations for solving the security and privacy issues for the online banking services.


Author(s):  
Maryna V. Andryiashka

The phenomenon of security since the time of Plato, who identified it as one of the human needs, belongs to that rare group of phenomena that will remain in demand forever, regardless of the change of ideologies and eras. Only technologies and mechanisms for ensuring security are changing, which is facilitated by the tech-nological singularity, the accelerated progress of information and communication technologies. Nevertheless, the question remains open of what comes first: the security of human or state. Even in the Modern Era, after the terrible world wars, terrorist attacks, man-made disasters, the approaches to answering this question have changed many times. In connection with the above, the purpose of this work is to trace the development of philosophical thought on security issues, as well as to de-termine approaches to the modern understanding of this phenomenon, prob-lems of meanings and values. Through the use of general logical, empirical and theoretical methods, an idea of new trends in the field of security is formed, which testify to the formation of the concept of human security.


Author(s):  
Nadine C Wathen ◽  
Roma Harris

Various models of community health information delivery exist in Canada. Spiraling health care costs have many governments seeking to promote more judicious (and presumably more cost-effective) use of health care by consumers. One such method is through centralized, government-run health information services that rely heavily on information and communication technologies.


2019 ◽  
Vol 34 (1) ◽  
pp. 2-21 ◽  
Author(s):  
Roopa Raman ◽  
Laura McClelland

In this article, we assert that compassion-driven approaches are the sustainable way for information and communication technologies to contribute to economic value. We urge future information systems research to emphasize, with equal vigor, the joint goals of compassion and financial gains from information and communication technologies. We present a broad agenda for future information systems research based on this premise. We also discuss how certain core assumptions underlying traditional information systems research—so far, driven primarily by economic value as outcome—would need to change in order to support this new agenda emphasizing compassion and economic value as complementary and synergistic outcomes. We provide a brief concrete illustration of this proposed agenda, and its underlying revised assumptions, by drawing on the example of a prominent field of study in information systems research, namely health information systems research.


2011 ◽  
pp. 1403-1418
Author(s):  
Candace J. Gibson ◽  
H. Dominic Covvey

The introduction and use of information and communication technologies (ICT) in health care, particularly the electronic health record (EHR), may be seriously hampered or delayed by the lack of available human resources with the necessary skills and competencies in e-health. A number of different types of professionals are needed, and an appropriate mix of skills and workers who can complement one another in the final deployment of the EHR and in the appropriate and best use and management of the health information it contains. These include health informatics (HI) professionals or health informaticians, health information management (HIM) professionals, and others, with not only knowledge of ICT, but also knowledge of the health system, data standards, and interoperability across platforms; privacy and security of health records; human factors and process engineering; project management and technology adoption; and user-supporting mechanisms. A human resources strategy is needed to address the current shortage of skilled workers and to develop a long term strategy for education and training of e-health personnel necessary to ensure the continued quality of health data collected, its security and confidentiality, and to manage and maintain the systems and data in the future.


Author(s):  
Rajkumar Rajaseskaran ◽  
Rishabh Jain ◽  
Sruthi M.

The objective of IoT in healthcare is to empower people to live healthy lives by wearing connected equipment. The healthcare industry has perpetually been in the forefront in the adoption and utilization of information and communication technologies (ICT) for the efficient healthcare administration). Detection of atrial fibrillation is done by checking the variations in the period of the heart rate. If a patient has atrial fibrillation, the period between each heartbeat will vary. A gas sensor is used to check the quality of air and a MEMS sensor to detect the fall of the body. The MEMS sensor is a compact device that collects comprehensive physical information and uses the gateway and cloud to analyze and store information.


Sign in / Sign up

Export Citation Format

Share Document