Utilization of TETRA Networks for Health Information Transfer

Author(s):  
Konstantinos M. Siassiakos ◽  
Konstantinos Ioannou ◽  
Athina A. Lazakidou

Rapid advances in information technology and wireless communications are leading to the emergence of a new type of information infrastructure that has the potential of supporting an array of advanced services for healthcare. Today’s healthcare professionals need to be connected to the network always. Continuous connectivity is the watchword of these demanding users, who need to communicate over the network seamlessly and stay connected everywhere in emergency cases. TETRA technology provides several ways of protecting the privacy and security of communication, such as authentication, air interface encryption and end-to-end encryption. Using a TETRA network can benefit not only ambulance crews, but also medical personnel at remote locations. Even though doctors are rarely present in ambulances, they can use the transmitted medical data to make a formal diagnosis, enabling treatment to be started and saving several critical minutes before arrival at the hospital. The objective of this chapter is to study how simply can a healthcare professional collect physiological data from mobile and/or remote patients and how securely and reliably health information can be transferred from emergency places to hospitals through a TETRA network.

Author(s):  
Konstantinos M. Siassiakos ◽  
Athina A. Lazakidou

Cost reduction pressures and the need for shortened in-patient stays are promoting the use of wireless patient monitoring systems in hospitals. Their contribution to better process management, superior flexibility and increased efficiency within hospitals is further underlining the appeal of wireless networking options for patient monitoring systems. Wireless connectivity has encouraged an overall rise in productivity through improved workflow and data management. Wireless patient monitors have also supported enhanced flexibility within the hospital environment by enabling remote monitoring of patients. TETRA technology provides several ways of protecting the privacy and security of communication, such as authentication, air interface encryption and end-to-end encryption. The objective of this chapter is to study how simply can a healthcare professional collect physiological data from mobile and/or remote patients and how securely and reliably health information can be transferred from emergency places to hospitals through a TETRA network.


Author(s):  
Mike Gregory ◽  
Cynthia Roberts

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was initially enacted as an administrative simplification to standardize electronic transmission of common administrative and financial transactions. The program also calls for implementation specifications regarding privacy and security standards to protect the confidentiality and integrity of individually identifiable health information or protected health information. The Affordable Care Act further expanded many of the protective provisions set forth by HIPAA. Since its implementation, healthcare organizations around the nation have invested billions of dollars and have cycled through numerous program attempts aimed at meeting these standards. This chapter reviews the process taken by one organization to review the privacy policy in place utilizing a maturity model, identify deficiencies, and lead change in order to heighten the maturity of the system. The authors conclude with reflection related to effectiveness of the process as well as implications for practice.


Author(s):  
Milica Milutinovic ◽  
Koen Decroix ◽  
Vincent Naessens ◽  
Bart De Decker

In this chapter, the authors describe the software architecture of a commercially run home assistance system that allows patients or elderly people to stay longer at home. Since such systems often have to handle sensitive medical information, the protection of the privacy is a major concern. In addition, legislation often restricts access to health information to qualified persons (i.e. medical personnel), who are not always available in a commercial setting. The home assistance system can offer several services, ranging from scheduling necessary tasks and following up their execution, to monitoring the patient's health status and responding promptly to requests for help or in case of emergency situations, and all this without the need to maintain personal medical data or identifying information about patients and caregivers in the home assistance centre.


Author(s):  
Mike Gregory ◽  
Cynthia Roberts

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was initially enacted as an administrative simplification to standardize electronic transmission of common administrative and financial transactions. The program also calls for implementation specifications regarding privacy and security standards to protect the confidentiality and integrity of individually identifiable health information or protected health information. The Affordable Care Act further expanded many of the protective provisions set forth by HIPAA. Since its implementation, healthcare organizations around the nation have invested billions of dollars and have cycled through numerous program attempts aimed at meeting these standards. This chapter reviews the process taken by one organization to review the privacy policy in place utilizing a maturity model, identify deficiencies, and lead change in order to heighten the maturity of the system. The authors conclude with reflection related to effectiveness of the process as well as implications for practice.


Author(s):  
A. Lazakidou ◽  
A. Ioannou ◽  
K. Ioannou ◽  
F. Kitsios

Telecommunications have been evolved dramatically during the last ten years, laying solid foundation for the next generation of Web Technologies and ultimate automated information cyberspace. As a result of this evolution and the users' demands, the current efforts of the researchers, in the areas of Health Information Transfer in Crisis Situations, promotes formation of inter-disciplinary international teams of experts, in order to create a new generation of technologies which will facilitate the future health information systems. The TETRA network can enable existing information and resources to be extended out to the point of care, helping medical professionals deliver top medical care in a more timely and efficient manner. In medicine, time savings equals hospital savings. The objective of this paper is to study how simply a medical specialist can collect physiological data from mobile-remote patients and how reliably health information can be transferred from emergency places to hospitals through TETRA.


2017 ◽  
Vol 9 (1) ◽  
pp. 3-14
Author(s):  
Harold Takyi ◽  
Valerie Watzlaf ◽  
Judith Talbot Matthews ◽  
Leming Zhou ◽  
Dilhari DeAlmeida

Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) has gotten stricter and penalties have become more severe in response to a significant increase in computer-related information breaches in recent years. With health information said to be worth twice as much as other forms of information on the underground market, making preservation of privacy and security an integral part of health technology development, rather than an afterthought, not only mitigates risks but also helps to ensure HIPAA and HITECH compliance. This paper provides a guide, based on the Office for Civil Rights (OCR) audit protocol, for creating and maintaining an audit checklist for multi-user health kiosks. Implementation of selected audit elements for a multi-user health kiosk designed for use by community-residing older adults illustrates how the guide can be applied. 


2012 ◽  
Vol 03 (04) ◽  
pp. 448-461 ◽  
Author(s):  
E. Joost ◽  
M.J. Gongora-Ferraez ◽  
S.H. Fenton

SummaryObjective: To evaluate the health information technology (HIT) workforce knowledge and skills needed by HIT employers.Methods: Statewide face-to-face and online focus groups of identified HIT employer groups in Austin, Brownsville, College Station, Dallas, El Paso, Houston, Lubbock, San Antonio, and webinars for rural health and nursing informatics.Results: HIT employers reported needing an HIT workforce with diverse knowledge and skills ranging from basic to advanced, while covering information technology, privacy and security, clinical practice, needs assessment, contract negotiation, and many other areas. Consistent themes were that employees needed to be able to learn on the job and must possess the ability to think critically and problem solve. Many employers wanted persons with technical skills, yet also the knowledge and understanding of healthcare operations.Conclusion: The HIT employer focus groups provided valuable insight into employee skills needed in this fast-growing field. Additionally, this information will be utilized to develop a statewide HIT workforce needs assessment survey.Citation: S.H. Fenton; E. Joost; M.J. Gongora-Ferraez. Health Information Technology knowledge and skills needed by HIT employers. Appl Clin Inf 2012; 3: 448–461http://dx.doi.org/10.4338/ACI-2012-09-RA-0035


Sign in / Sign up

Export Citation Format

Share Document