Information Assurance in E-Healthcare

2011 ◽  
pp. 1703-1713
Author(s):  
Sherrie D. Cannoy

There is growing concern that the healthcare industry has not adopted IT systems as widely and effectively as other industries. Healthcare technological advances generally emerge from the clinical and medical areas rather than clerical and administrative. The healthcare industry is perceived to be 10 to 15 years behind other industries in its use of information technology (Raghupathi & Tan, 1997). Incorporating new technology into the healthcare organization’s processes is risky because of the potential for patient information being disclosed. The purpose of this study is to investigate the information assurance factors involved with security regulations and electronic medical record initiatives—a first necessary step in making the healthcare industry more efficient. Noncompliance of a healthcare organization’s employees with security and privacy policies (i.e., information assurance) can result in legal and financial difficulties, as well as irreparable damage to an organization’s reputation. To implement electronic medical initiatives, it is vital that an organization has compliance with security and privacy policies. E-health technology is a relatively current phenomenon. There are two types of distance-related healthcare that are technology driven. Telehealth is known for involving telemedicine—medicine practiced over a distance, with the impetus of control being in the physician’s hands (Maheu, 2000). E-health involves the patient or physician actively searching for information or a service, usually via the Internet (Maheu). Electronic medical records fall into the e-health category because the physician, healthcare partners, and patient would be able to access the information through an Internet connection.

Author(s):  
Sherrie D. Cannoy ◽  
A. F. Salam

There is growing concern that the healthcare industry has not adopted IT systems as widely and effectively as other industries. Healthcare technological advances generally emerge from the clinical and medical areas rather than clerical and administrative. The healthcare industry is perceived to be 10 to 15 years behind other industries in its use of information technology (Raghupathi & Tan, 1997). Incorporating new technology into the healthcare organization’s processes is risky because of the potential for patient information being disclosed. The purpose of this study is to investigate the information assurance factors involved with security regulations and electronic medical record initiatives—a first necessary step in making the healthcare industry more efficient. Noncompliance of a healthcare organization’s employees with security and privacy policies (i.e., information assurance) can result in legal and financial difficulties, as well as irreparable damage to an organization’s reputation. To implement electronic medical initiatives, it is vital that an organization has compliance with security and privacy policies. E-health technology is a relatively current phenomenon. There are two types of distance-related healthcare that are technology driven. Telehealth is known for involving telemedicine—medicine practiced over a distance, with the impetus of control being in the physician’s hands (Maheu, 2000). E-health involves the patient or physician actively searching for information or a service, usually via the Internet (Maheu). Electronic medical records fall into the e-health category because the physician, healthcare partners, and patient would be able to access the information through an Internet connection. Security and information assurance are critical factors in implementing e-health technologies. There is a lack of a well-developed theoretical framework in which to understand information assurance factors in e-healthcare. The theory of reasoned action (TRA) and technology acceptance model (TAM) enable a conceptual model of information assurance and compliance to be formed in the context of healthcare security and privacy policy. The relationship between behavior and intentions, attitudes, beliefs, and external factors has been supported in previous research and will provide a framework for ensuring compliance to security and privacy policies in healthcare organizations so that HIPAA (Health Insurance Portability and Accountability Act) regulations are enforced and electronic medical records (EMRs) can be securely implemented. Traditionally, records in the healthcare industry have been paper based, enabling strict accessibility to records. This allowed for confidentiality of information to be practically ensured. The uniqueness of healthcare records and the sensitive information they contain is specific to the industry. Over the many years that medical records have been kept, those involved in the field have undertaken a self-imposed rule of stringently protecting the patient information while providing quality care. The patient’s expectation for confidentiality of personally identifiable medical records is also critical. According to Rindfleisch (1997, pp. 95-96), in his study of healthcare IT privacy, the threats to patient information confidentiality are inside the patient-care institution; from within secondary user settings which may exploit data; or from outsider intrusion into medical information. Rindfleisch (1997) examined specific disclosures which could release sensitive information such as emotional problems, fertility and abortions, sexually transmitted diseases, substance abuse, genetic predispositions to disease—all of which could cause embarrassment and could affect insurability, child custody cases, and employment. The process of healthcare treatment includes not only the patient and physician but also nurses, office staff who send out bills and insurance claims, the insurance company, billing clearinghouses, pharmacies, and any other companies to which these processes can be outsourced. There is an estimate that states as many as 400 people may have access to your personal medical information throughout the typical care process (Mercuri, 2004). The government is also a partner in national health concerns, and also maintains databases containing information on contagious diseases, cancer registries, organ donations, and other healthcare information of national interest. (See http://www.fedstats.gov/programs/health.html for a listing of the databases.) With the advent of government mandates such as EMRs and HIPAA regulations, the increased accessibility of sensitive records requires intense effort to create policies that limit access for those who are authorized. Although there is an area of information economics which views information as an asset that can be numerically valued for its benefit, the same perspective has not been adopted in healthcare. Especially in the United States, clinical information and patient care are considered proprietary (Hagland, 2004). There is no specific associated cost with one’s medical information—what damage is done when one’s medical information has been utilized improperly? Even though damages are ill-defined, there are regulations and standards for emerging technology in healthcare. The two most current important security and privacy issues involve HIPAA regulation and the government mandate for EMRs.


2020 ◽  
Author(s):  
Pranav C

UNSTRUCTURED The word blockchain elicits thoughts of cryptocurrency much of the time, which does disservice to this disruptive new technology. Agreed, bitcoin launched in 2011 was the first large scale implementation of blockchain technology. Also, Bitcoin’s success has triggered the establishment of nearly 1000 new cryptocurrencies. This again lead to the delusion that the only application of blockchain technology is for the creation of cryptocurrency. However, the blockchain technology is capable of a lot more than just cryptocurrency creation and may support such things as transactions that require personal identification, peer review, elections and other types of democratic decision-making and audit trails. Blockchain exists with real world implementations beyond cryptocurrencies and these solutions deliver powerful benefits to healthcare organizations, bankers, retailers and consumers among others. One of the areas where blockchain technology can be used effectively is healthcare industry. Proper application of this technology in healthcare will not only save billions of money but also will contribute to the growth in research. This review paper briefly defines blockchain and deals in detail the applications of blockchain in various areas particularly in healthcare industry.


2021 ◽  
Vol 3 (2) ◽  
pp. 28-45
Author(s):  
Young B. Choi ◽  
Christopher E. Williams

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Arvind Chhabra ◽  
Mehak Munjal ◽  
Prabhu Chandra Mishra ◽  
Kritika Singh ◽  
Debjanee Das ◽  
...  

PurposeThe novel coronavirus has not only caused significant illness and loss of life, it has caused major disruption at local, national and global levels. While the healthcare industry is experiencing growth during the pandemic, disruption to travel has affected medical tourism. This article considers the short-term factors affecting medical tourism and how they could be mitigated by incorporating technological advances to secure long-term growth.Design/methodology/approachThe study examines data provided by the Indian government as well as from non-government sources available in the public domain to review the impact of coronavirus disease 2019 (COVID-19) on medical tourism. The authors also examine data on technological advances in the healthcare industry that could help to reduce the impact of the pandemic.FindingsThis study’s findings show that while in-person services have been seriously impacted in the short term, technological adaptation of medical services to facilitate remote medical consultation has significantly increased. This has enlarged the business opportunities available to hospitals and general practitioners, and it could be leveraged to enhance medical tourism.Originality/valueThe article provides an analysis of the impact of the pandemic on medical tourism and how technology could be used to overcome short-term negative impacts and support longer-term development.


Author(s):  
John Lindström ◽  
Claas Hanken

Wearable computing is gaining more and more interest as new “wearables,” intended for both work and leisure, are introduced. This trend brings benefits and challenges; for instance, the potential to improve work processes and issues related to IT management and privacy. The introduction and use of wearable computing provides opportunities to improve and reengineer work processes in organizations but can at the same time introduce alignment problems, as users in organizations may adopt the new technology before organizations are prepared. Further, alignment problems posed by the emerging trend, “Bring Your Own Device” (BYOD), are discussed. In addition, as in the cloud computing area, needed and necessary supportive legal frameworks have not yet fully addressed the new wearable computing technology. In the light of recent developments regarding global intelligence gathering, security and privacy concerns must be given careful consideration. Different alignment concepts for managing security challenges and legal aspects related to wearable computing, such as cultivation, care, hospitality, and care with hospitality, are discussed in the chapter.


2019 ◽  
pp. 744-759 ◽  
Author(s):  
Ruchika Asija ◽  
Rajarathnam Nallusamy

Cloud computing is a major technology enabler for providing efficient services at affordable costs by reducing the costs of traditional software and hardware licensing models. As it continues to evolve, it is widely being adopted by healthcare organisations. But hosting healthcare solutions on cloud is challenging in terms of security and privacy of health data. To address these challenges and to provide security and privacy to health data on the cloud, the authors present a Software-as-a-Service (SaaS) application with a data model with built-in security and privacy. This data model enhances security and privacy of the data by attaching security levels in the data itself expressed in the form of XML instead of relying entirely on application level access controls. They also present the performance evaluation of their application using this data model with different scaling indicators. To further investigate the adoption of IT and cloud computing in Indian healthcare industry they have done a survey of some major hospitals in India.


Author(s):  
Gerardo Reyes Ruiz ◽  
Samuel Olmos Peña ◽  
Marisol Hernández Hernández

New technologies have changed the way today's own label products are being offered. Today the Internet and even more the so-called social networks have played key roles in dispersing any particular product in a more efficient and dynamic sense. Also, having a smartphone and a wireless high-speed network are no longer a luxury or a temporary fad, but rather a necessity for the new generations. These technological advances and new marketing trends have not gone unnoticed by the medium and large stores. The augmented reality applied to interactive catalogs is a new technology that supports the adding of virtual reality to a real environment which in turn makes it a tool for discovering new uses, forms, and in this case, spending habits. The challenge for companies with their private labels in achieving their business objectives, is providing customers with products and services of the highest quality, thus promoting the efficient and streamlined use of all resources that are accounted for and at the same time promoting the use of new information technologies as a strategic competitive.


Author(s):  
John McGaha

The United States congress and the past several administrations have dedicated considerable funding for incentives focused on accelerating the adoption by the healthcare industry of Health Information Technology (HIT) solutions. The most recent effort towards these objectives includes a focus on the creation of a National Health Information Network that will support large scale exchange of health information. This chapter explores the technical, security and privacy implications of the advent of such an integrated network and the steps towards its successful completion.


Author(s):  
V. Jeevika Tharini ◽  
S. Vijayarani

One of the best-known features of IoT is automation. Because of this, IoT is a much-needed field for many applications, namely emergency and healthcare domains. IoT has made many revolutionary changes in the healthcare industry. IoT paves the way to numerous advancements for healthcare. The possibilities of IoT have reached their peak in the commercial industry and health sector. In recent years, serious concerns have been raised over the control and access of one's individual information. Privacy and security of the IoT devices can be compromised by intruders. Apart from the numerous benefits of IoTs, there are several security and privacy concerns to consider. A brief overview of different kinds of security attacks, solution for the attacks, privacy and security issues are discussed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document