Healthcare Information Technology

2021 ◽  
Vol 13 (4) ◽  
pp. 77-87
Author(s):  
Maja Baretić ◽  
Nikola Protrka

The term “health information technology” (health IT) refers to the electronic systems that store, share, analyze, and protect electronic health records. It includes also electronic prescribing, knowledge sharing, patient support tools, and mobile health technology together with decision-making algorithms. The privacy, security, and ethics of health information are priority for both patients and healthcare providers. The health IT is a target for cyber-criminals; stolen health information, or blackmailing via different kind of cryptolockers, is good on the black market. While the healthcare industry relies more on technology, cyber-attacks are threatening health IT. This article argues health IT issues from two perspectives. The first one is a physician's point of view aiming to improve quality of care using fast and accurate health IT. The second is the standpoint of cyber-security specialists aiming to protect data form cyber-criminals, continually developing new strategies and best practices.

2018 ◽  
Vol 25 (1) ◽  
pp. 7-13 ◽  
Author(s):  
Mark A. Sujan

Health information technology (IT) offers exciting opportunities for providing novel services to patients, and for improving the quality and safety of care. Many healthcare professionals are already improving services through the development of numerous bottom-up local health IT innovations. Such innovations from the ground up are to be welcomed, but healthcare providers are struggling to develop processes for managing the risks that come with the introduction of health IT into clinical processes. I argue that too often the main strategy appears to be one of organisational ignorance. This puts patients at risk, and it threatens the successful adoption of health IT. I recommend that healthcare providers focus on strengthening their processes for organisational learning, promoting proactive risk management strategies, and making risk management decisions transparent and explicit.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Jinhyung Lee ◽  
Jae-Young Choi

AbstractThis study aimed to investigate the impact of health information technology (IT) on the Case Mix Index (CMI). This study was a retrospective cohort study using hospital financial data from the Office of Statewide Health Planning and Development (OSHPD) in California. A total of 309 unique hospitals were included in the study for 7 years, from 2009 to 2015, resulting in 2,135 hospital observations. The effects of health information technology (IT) on the Case Mix Index (CMI) was evaluated using dynamic panel data analysis to control endogeneity issues. This study found that more health IT adoption could lead to a lower CMI by improving coding systems. Policy makers, researchers, and healthcare providers must be cautious when interpreting the effect of health IT on the CMI. To encourage the adoption of health IT, the cost savings and reimbursement reductions resulting from health IT adoption should be compared. If any profit loss occurs (i.e., the cost savings is less than reimbursement reduction), more incentives should be provided to healthcare providers.


2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


Author(s):  
Anna Marie Balling Høstgaard

Despite there being extensive cumulative knowledge and many experiences about factors that contribute to health Information Technology (HIT) success, lessons are yet to be learned as many HIT developments still face a number of problems - many of them of an organizational nature. This chapter presents a new method - the EUPHIT method – for studying and understanding one of the most crucial organizational success factors in HIT development: end-user participation. The method was developed and used for the first time throughout a research study of an EHR planning process in a Danish region. It has proved effective in disclosing the interactions that occur between the different social groups involved in HIT development, and in understanding the underlying reasons for these. This allows HIT project management to explore new avenues during the development process in order to support, facilitate, and improve real end-user participation.


2017 ◽  
pp. 694-714
Author(s):  
Kijpokin Kasemsap

This chapter explains the perspectives on global health, the overview of health information technology (health IT), the applications of electronic health record (EHR), and the importance of health IT in global health care. Health IT is the area of IT involving the design, development, creation, utilization, and maintenance of information systems for the health care industry. Health IT makes it possible for health care providers to better manage patient care through the secure use and sharing of health information. Effective health IT can lower costs, improve efficiency, and reduce medical error, while providing better patient care and service. The chapter argues that utilizing health IT has the potential to enhance health care performance and reach strategic goals in global health care.


Author(s):  
Kijpokin Kasemsap

This chapter explains the perspectives on global health, the overview of health information technology (health IT), the applications of electronic health record (EHR), and the importance of health IT in global health care. Health IT is the area of IT involving the design, development, creation, utilization, and maintenance of information systems for the health care industry. Health IT makes it possible for health care providers to better manage patient care through the secure use and sharing of health information. Effective health IT can lower costs, improve efficiency, and reduce medical error, while providing better patient care and service. The chapter argues that utilizing health IT has the potential to enhance health care performance and reach strategic goals in global health care.


Author(s):  
Darshan Mansukhbhai Tank ◽  
Akshai Aggarwal ◽  
Nirbhay Kumar Chaubey

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.


Author(s):  
Darshan Mansukhbhai Tank ◽  
Akshai Aggarwal ◽  
Nirbhay Kumar Chaubey

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.


2012 ◽  
Vol 47 (1) ◽  
pp. 62-63 ◽  
Author(s):  
I. Fox Brent ◽  
G. Felkey Bill

As the new year begins, we like to reflect on where health information technology (IT) has been and where it is going. We are not fond of rehashing the minutia regarding every event that occurred in the health IT domain, so we will not spend our time and space presenting an exhaustive review. We will, however, touch on the continuing efforts surrounding electronic health records (EHRs). We will also focus forward in discussing an emerging area that we are closely following.


Sign in / Sign up

Export Citation Format

Share Document