Paper Title : ICT as a Global Solution for Patients Information Security
ISSN : 2394-2231
Year of Publication : 2022
10.5281/zenodo.6814057
MLA Style: ICT as a Global Solution for Patients Information Security "Ebole Alpha Friday, Shomope Adewale Abduirasaq, Amusu Mary, Olakunle Joel Olawale" Volume 9 - Issue 3 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: ICT as a Global Solution for Patients Information Security "Ebole Alpha Friday, Shomope Adewale Abduirasaq, Amusu Mary, Olakunle Joel Olawale" Volume 9 - Issue 3 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
Security of data for patients is the most overriding obstacle in the healthcare sector when contemplating the implementation of HIS. The sharing of clinical data across Nigeria's health systems through a single IT platform seems to be a significant issue, perhaps owing to the country's poor technical progress. The current transfer of such data manually via the internet continues to mislead the supposedly private data of patients. The manual transfer as witnessed was terrible and violated the safety, delivery, confidentiality and ethical risk systems for the dissemination of health information. Electronic health record (EHR) containing patient information is considered extremely vulnerable in healthcare companies, in order to safe and protect unwanted access, sensitive patient care information has to be managed. Patients may get high-quality treatment if the appropriate information is provided at the correct time via health management system. Accessibility and availability are important elements of information security, and information that is available and accessible to users both inside and beyond organizational boundaries must be available. At the same time, patient safety must be protected from unauthorized access and an adequate degree of information security health care is required. The objective of this thesis is to examine current information security management with regard to Electronic Health Records and to examine ways in which sensitive information is exchanged between different health and cross-border players from potential threats to safety and health risks to the environment. Therefore, potential problems and possible recommendations and proposals were examined, with the aim of improving existing data security by preventing the required risks for health-sensitive information.
Reference
Adlassnig, P., amd Information, F., (2020). Medical Informatics in a United and Healthy Europe, IOS Press. Al-Ajlan, A., (2016) Service Oriented Computing for Dynamic Virtual Learning Environments (Moodle), Strl. Leicester, UK, De Montfort. Phd Thesis, pp. 328 Aldrawiesh and Siewe et al., (2019) “An Observation Model to Detect Security Violations in Web Services Environment,” in Proceedings of the 2019 International Conference On Intelligent Semantic Web-Services and Applications. Amman, Jordan, Acm, pp. 1-6. Al-Muhtadi, J., (2017). Cerberus: A context-aware security scheme for smart spaces. In PERCOM '03: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, page 489. Anderson, R., (2016). A security policy model for clinical information systems “In Proceedings of the 2016 IEEE Symposium on Security and Privacy, pages 30-42”. Asabe, A., Oye, N., & Monday, G., (2013). Hospital Patient Database Management System: “A case study of General Hospital North-Bank Nigeria”. Compusoft: An International Journal of Advanced Computer Technology Bardram, J., (2014). Applications of context-aware computing in hospital work: examples and design principles. In SAC '04: Proceedings of the 2014 ACM symposium on Applied computing, pages 1574-1579. Bass, D., (2019). Listening: One of the Hardest Parts of Healthcare Interoperability Requirements Gathering. Retrieved from http://www.healthcareitinteroperability.com/dor/jps%20article_listening_ver2.pdf Bennet, Agyepong, Sheikh, Hanson, Ssengooba & Gilson (2019) "Building the Field of Health Policy and Systems Research: An Agenda for Action". PLoS8 (8): e1001081. Berwick, D., (2017). Disseminating Innovations in Health Care, JAMA 289: 1969-1975 Bhatti, R., (2015). Engineering: a policy-based system for federated healthcare databases IEEE Trans. on Knowledge and Data Eng., 19:1288-1304. Blobel, B., Karla, D., Marc, K., Lunn, K., Pharow, P., Ruptsalian, N. P., (2014). Authorization and access control for electronic health record systems. International Journal of Medical Informatics, 73:251-257. Booth, H., Haas, F., Mccabe, E., Newcomer, M., Champion, C., Ferris, F. and Orchard, D., (2014). Web Services Architecture. [Online]. Available: http://www.w3.org/tr/ws-arch/. Canada Health Infoway (2014) “EHRi Privacy and Security Conceptual Architecture v2” Chandramouli, R (2015). A framework for multiple authorization types in a healthcare application system. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 137-148. Chou, W., Chang, C., Cheng, J., Jehng, C., and Chang, C., (2016) “An Information Retrieval System for Medical Records & Documents,” in Proc. 30th Annual International Conference of the Ieee, Anonymous Engineering on Medicine and Biology Society, pp. 1474-1477 CITA. Wireless Quick Facts www.ctia.org/advocacy/research/index.cfm/aid/10323. Retrived August 2, 2019. Clark, D., (2016). ―Intel takes step into home health care. “The Wall Street Journal, p. B3 vol..6. pg 13-25 Cook, R., Render, M. and Woods, D., (2000). "Gaps in the continuity of care and progress on patient safety". BMJ320 (7237): 791–794. Damiani, et al (2014). New paradigms for access control in open environments. In Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, pages 540-545 Elaine, D., (2002). The Seeds of Innovation: Cultivating the Synergy That Fosters New Ideas. 1st ed. New York, NY: AMACOM/American Management Association. Elizabeth, Docteur & Howard Oxley (2017).” Health-Care Systems: Lessons from the Reform Experience for the organization for economic cooperation and development” (OECD). Faulkner, A., and Kent, J., (2015). Innovation and Regulation in Human Implant Technologies: Developing Comparative Approaches. Social Science and Medicine, vol. 53: 895-913. Ferreira, A (2015). Access control: How can it improve patients' healthcare?Study in Health Technology and Informatics, 127:65-76. Frenk, J., (2015). The Global Health System: strengthening national health systems as the next step for global progress, Plos Medicine, Vol 7, issue 1. Georgiadis, C., (2015) Flexible team-based access control using contexts. In SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, pages 21-27. Giuri, L. and Iglio, P., (1997) Role templates for content-based access control. In RBAC '97: Proceedings of the second ACM workshop on Role-based access control, pages 153-159. Glied, Sherry A., (2016). "Health Care Financing, Efficiency, and Equity."National Bureau of Economic Research. Greco, P. and Eisenberg, J., (2017). Changing Physicians’ Practices. New England Journal of Medicine, 329: 1271-1273. Hadzic H. Dillon, T. and Chang, E. (2015) “Use of Digital Ecosystem and Ontology Technology for Standardization of Medical Records,” in Proc. of Digital Ecosystems and Technologies Conference, Dest '07. Inaugural Ieee-Ies, Anonymous, pp. 595-601, 2015. Hafner, M., (2016). Models in software engineering: modeling and enforcing advanced access control policies in healthcare systems with select. pages 132-144. Hesselman, C., Widya, I.., Halteren, A. and Nieuwenhuis, L., (2000), “Middleware support for media-streaming establishment driven by user-oriented QoS requirements”, in Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, Enschede, Oct. 2000, pp. 158 – 171, Springer Verlag LNCS 1905; Hobsley, M., (2017). “Pathways in Surgical Management”, Edward Arnolds Pub. Ltd., London; Hu, J. and Weaver, A., (2014) Dynamic, context-aware security infrastructure for distributed healthcare applications. In Proceedings of the First Workshop on Pervasive Privacy Security, Privacy, and Trust. Hulsebosch, R., (2014) Context sensitive access control. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 111-119. Hung, P., (2015). Research issues of privacy access control model for mobile ad hoc healthcare applications with xacml. Advanced Information Networking and Applications Workshops, 582-587. Huntington, J., Gilliam M. and Rosen, R (2000). Organizational Development for Clinical Governance, British Medical Journal, 16: 679-682. Integrating the Healthcare Enterprise (IHE), IT Infrastructure Technical Framework, White Paper - Access Control, September 2020. Revision1-3 ITU-T, (2018). E-health standards and interoperability, ITU-T press Jahnke, J., (2014) Toward context-aware computing in clinical care. In OOPSLA Workshopon Building Software for Pervasive Computing. Janjua, M., Hussain, M., Afzal, F. and Ahmad H., (2020) “Digital Health Care Ecosystem: Soa Compliant Hl7 Based Health Care Information Interchange,” Digital Ecosystems and Technologies, Dest '09. 3rd Ieee in Proc. of International Conference On Anonymous, pp. 329-334 Jih, W., (2014) Context-aware access control on pervasive healthcare. In MAM '05: Mobility, Agents, and Mobile Services, pages 21-28. Jones, V., Bults, R., Konstantas, D., Vierhout, P.A.M., (2015), “Healthcare PANs: Personal Area Networks for trauma care and home care” in Fourth International Symposium on Wireless Personal Multimedia Communications, Sep. 9-12, Aalborg, Denmark; Kang, M., (2015) Access control mechanisms for inter-organizational work-flow. In SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, p ages 66-74. Kazemzadeh and Sartipi, K., (2014) “Interoperability of Data and Knowledge in Distributed Health Care Systems,” in Proc. 13th Ieee International Workshop on Anonymous Software Technology and Engineering Practice, pp. 230-240. Kazemzadeh and SARTIPI, K., (2015) “Interoperability of Data and Knowledge in Distributed Health Care Systems,” in Proc. 13th IEEE US Census Bureau Announces 2015 Census Population Counts -- Apportionment Counts Delivered to President”. Press Release. US Census Bureau. December 21, 2015. http://2015.census.gov/news/releases/operations/cb10-cn93.html. Retrieved February 25, 2019. Klersy C, De Silvestri A, Gabutti G, Regoli F, Auricchio A., (2016) A meta-analysis of remote monitoring of heart failure patients. J Am Coll Cardiol 2020; 54(18):1683-1694. Kruse G. Rohland B. Wu X., (2014) Factors associated with missed first appointments at a psychiatric clinic. Psychiatry Services. 2002; 53: 1173-1176. Landro, L., (2016). ―The Hospital Is Watching You. The Wall Street Journal, p. D4. Lansisalmi, H. Kivimaki, M. Aalto, P. and Ruoranen, R., (2016). Innovation in Healthcare: A Systematic Review of Recent Research. Nursing Science Quarterly vol. 19: 66-72. Lees, C., Chronaki, E., Simantirakis, S., Kostomanolakis, S., Orphanoudakis, and Vardas, P., (2014) “Remote Access to Medical Records Via the Internet: Feasibility, Security and Multilingual Considerations,” Computers in Cardiology Anonymous, pp. 89-92. Leisch, E. and Orphanoudakis, S., (2016). “HECTOR Solutions” in 1st International Conference on Health Emergency Telematics, Sevilla, Spain, March 15–17, 17 pp.; Li, X., (2014). Fine-granularity access control in 3-tier laboratory information systems. In IDEAS '05: Proceedings of the 9th International Database Engineering & Application Symposium, pages 391-397. Luzi, D., Ricci, F.L., and Serbanati, L.D., (1997). “Extending the Standard Architecture for Healthcare Units: The Guideline Server”, in New Technologies in Hospital Information Systems, J. Dudeck et al. (Eds.), IOS Press, pp. 95 – 101; Macharia W., Keon G., Rowe BH, Stephenson BJ, Haynes RB. An overview of interventions to improve compliance with appointment keeping for medical services. JAMA. 1992; 267 (13): 1813-1817. Mirror, Mirror on the Wall, (2016). The Commonwealth Fund, in its annual survey, "Mirror, Mirror on the Wall - 2016", compares the performance of the health systems in Australia, New Zealand, the United Kingdom, Germany, Canada and the U.S. MobiHealth, 2002, “MobiHealth project IST-2015-36006”, http://www.mobihealth.org; Modelling Programme home page http://www.standards.nhsia.nhs.uk/hcm/index.html; Modern Short Stories, S., Burton ed., Longman Heritage of Literature series, Longman Group Ltd, Great Britain, first published 1965, sixth impression 1970 Murray, V., (2015). Nursing in Ontario. Queen's Printer pages 9-16. Navarro, V., and Lancet, (2015) “Assessment of the World Health Report 2000”. Lancet 2000; 356: 1598–601. NHS-HCMP, (2000). “Healthcare Models”, NHS Health Care Nigeria Demographic and Health Survey reports (NDHS 2013) Norgall, T., (2000). “VITAL – towards a Family of Standards for Open Medical Device Communication” in XIII International Conference Computing in Clinical Laboratories, Milan, 21-23 Omachonu, V., and Einspruch, N., (2015) “Innovation: Implications for Goods and Services. Accepted for publication in the International Journal of Innovation and Technology Management” Organization task force on development health system guidance Paragon Corporation. (2017). Calling Webservices from Asp.Net: Example Google Web Service. [Online]. Available:http://www.paragoncorporation.com/articledetail.aspx?articleid=13. Pereira, A.L., Muppavarapu, V., Chung, S., (2016) Role-based access control for grid Database services using the community authorization service. Transactions on Dependable and Secure Computing. 3, 2, 156--166 Peters, David and Bennet, (2018) "Better Guidance Is Welcome, but without Blinders". PLoS Med9 (3): e1001188. Potter, P., and Perry, A., (2014) Basic Nursing: Theory and Practice. Mobsy Year Book, Pages 5-8, 97-109. Riezenman, M., (2016). Healthcare Innovation.Robots in Rehab. The Institute, p. 6. Riley JP, Cowie MR. Telemonitoring in heart failure. Heart 2020; 95(23):1964-1968.
Keywords
— Accessibility, access control, hand-to-hand transfer, and security specifications