132 research outputs found

    Patient Health Record Systems Scope and Functionalities: Literature Review and Future Directions

    Get PDF
    Background: A new generation of user-centric information systems is emerging in health care as patient health record (PHR) systems. These systems create a platform supporting the new vision of health services that empowers patients and enables patient-provider communication, with the goal of improving health outcomes and reducing costs. This evolution has generated new sets of data and capabilities, providing opportunities and challenges at the user, system, and industry levels. Objective: The objective of our study was to assess PHR data types and functionalities through a review of the literature to inform the health care informatics community, and to provide recommendations for PHR design, research, and practice. Methods: We conducted a review of the literature to assess PHR data types and functionalities. We searched PubMed, Embase, and MEDLINE databases from 1966 to 2015 for studies of PHRs, resulting in 1822 articles, from which we selected a total of 106 articles for a detailed review of PHR data content. Results: We present several key findings related to the scope and functionalities in PHR systems. We also present a functional taxonomy and chronological analysis of PHR data types and functionalities, to improve understanding and provide insights for future directions. Functional taxonomy analysis of the extracted data revealed the presence of new PHR data sources such as tracking devices and data types such as time-series data. Chronological data analysis showed an evolution of PHR system functionalities over time, from simple data access to data modification and, more recently, automated assessment, prediction, and recommendation. Conclusions: Efforts are needed to improve (1) PHR data quality through patient-centered user interface design and standardized patient-generated data guidelines, (2) data integrity through consolidation of various types and sources, (3) PHR functionality through application of new data analytics methods, and (4) metrics to evaluate clinical outcomes associated with automated PHR system use, and costs associated with PHR data storage and analytics

    A Threat Taxonomy for mHealth Privacy

    Get PDF
    Networked mobile devices have great potential to enable individuals (and their physicians) to better monitor their health and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called \emphmHealth\/ technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges

    Taxonomy Development in Health-IT

    Get PDF
    Health-IT is attracting increasing attention in the research community. To understand the relevant constructs and the relationships among them, many authors present taxonomies or typologies for classifying different things in health-IT. Even with much attention to health-IT, there is still limited theoretical knowledge in this field. This may be attributed to our observation that the process of developing taxonomies has not been adequately addressed in the health-IT literature. In this paper we address this challenge by (a) a comprehensive literature survey that shows a high diversity in the field and that the related discussion of the structural nature has largely been ad hoc, (b) presenting methods for developing health-IT taxonomies, and, (c) contributing to the theoretical foundations of the field by a taxonomy for health-IT applications

    Information Systems and Health Care X: A User-Driven Approach to Personal Health Records

    Get PDF
    User acceptance issues and user-centered design have long been an important theme in information systems research. In the field of health care information systems, much attention has been devoted to user issues in the health care provider domain, e.g. physicians, nurses, medical records. Recent developments toward promoting more consumer-oriented healthcare information systems have opened new questions about how individuals can and should relate to their personal health information in the form of Personal Health Records (PHR) systems. This paper adopts a user-driven perspective toward these new and challenging questions. Drawing upon ideas and discussions from a cross-section of information systems researchers, health care providers, private industry, and government, we examine several of the major issues that will need to be addressed in order to meet a national challenge to adopt PHR for all Americans by 2014

    A P2P Optimistic Fair Exchange (OFE) Scheme For Personal Health Records Using Blockchain Technology

    Get PDF
    In today’s digital world, it is common to exchange sensitive data between different parties. There are many examples of sensitive data or documents that require a digital exchange, such as banking information, insurance data, health records. In many cases, the exchange exists between unknown and untrusted parties. Therefore, it is essential to execute the data exchange over a fair non-repudiation protocol. In digital communication, non-repudiation is undeniable evidence of one’s responsibility regarding the validity of any data he shares/receives. Usually, this is achieved by the use of a cryptographic digital signature. In this case, the parties cannot deny the authenticity of their digital signature. The protocol satisfies the fairness property if and only if it does not give the sender any advantages over the receiver or vice versa, at any step during the exchange process. Combining fair exchange and non-repudiation for digital exchange is critical in many applications and can be acquired with or without the involvement of any trusted third party (TTP). However, without the involvement of TTP, fairness becomes probabilistic, and the involvement of TTP can cause significant dependency on the third party. Therefore, a peer-to-peer (P2P) (aka offline) fair non-repudiation protocol that does not require a trusted third-party is desirable in many applications. Blockchain is designed in such a way that the network can handle the trustless environment and deliver the correct result. Thus, if the exchanges are done leveraging Blockchain, it will ensure true fairness, and at the same time, none of the participants have to deal with the trust issue. In this thesis we propose a P2P fair non-repudiation data exchange scheme by leveraging Blockchain and distributed ledger technology. The scheme combines on-chain and off-chain communication patterns to enable the exchange of personal health records between patients and healthcare providers. We provide an informal reasoning of the proposed scheme. Moreover, we propose a design and implementation agnostic to existing Blockchain platforms to enable unbiased evaluation of the proposed scheme. Finally, we make a comparative analysis of the result derived from our approach with the existing one

    Making the Case for Leveraging the Patient-Centered E-Health (PCEH) Context to Expand Information Systems Theory

    Get PDF
    Patient-centered e-health (PCEH) represents a fascinating area of digitized stakeholder interactions characterized by complex information flows, shared decision making, co-created value, and mutual interest in improving health outcomes. Such a context lies in contrast to often contentious firm-consumer relationships characterized by self-interest, surplus maximization (from both producer and consumer sides), and consumer segmentation. This article suggests that PCEH is an ideal context in which to study the emerging class of information systems that include consumers as empowered influencers, stakeholders, and decision makers, rather than only “purchasers” on the other side of the exchange relationship or “mandated” users in the enterprise context. The PCEH context is proposed as an enormous research opportunity that may significantly contribute to expanding information systems research and theory

    Health on a Cloud: Modeling Digital Flows in an E-health Ecosystem

    Get PDF
    A unified and well-knit e-health network is one that provides a common platform to its key stakeholders to facilitate a sharing of information with a view to promoting cooperation and maximizing benefits. A promising candidate worthy of being considered for this ponderous job is the emerging "cloud technology" with its offer of computing as a utility, which seems well-suited to foster such a network bringing together diverse players who would otherwise remain fragmented and be unable to reap benefits that accrue from cooperation. The e-health network serves to provide added value to its various stakeholders through syndication, aggregation and distribution of this health information, thereby reducing costs and improving efficiencies. Because such a network is in fact an interconnected "network of network" that delivers a product or service through both competition and cooperation, it can be thought of as a business ecosystem. . This study attempts to model the digital information flows in an e-health ecosystem and analyze the resulting strategic implications for the key players for whom the rules of the game are bound to change given their interdependent added-values. The ADVISOR framework is deployed to examine the values created and captured in the ecosystem. Based on this analysis, some critical questions that must be addressed as necessary preconditions for an e-Health Cloud, are derived. The paper concludes with the conjecture that "collaboration for value" will replace "competition for revenue" as the new axiom in the health care business that could ideally usher in a fair, efficient and sustainable ecosystem

    A Methodology for Secure Sharing of Personal Health Records in the Cloud

    Get PDF
    In the health care sector has resulted in value effective and convenient exchange of non-public Health Records (PHRs) among many taking part entities of the e-Health systems. still, storing the confidential health data to cloud servers is prone to revelation or larceny and demand the event of methodologies that make sure the privacy of the PHRs. Therefore, we tend to propose a technique referred to as SeSPHR for secure sharing of the PHRs within the cloud. The SeSPHR theme ensures patient-centric management on the PHRs and preserves the confidentiality of the PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and by selection grant access to differing types of users on totally different parts of the PHRs. A semi-trusted proxy referred to as Setup and Re-encryption Server (SRS) is introduced to line up the public/private key pairs and to supply the re-encryption keys. Moreover, the methodology is secure against business executive threats and conjointly enforces a forward and backward access management. Moreover, we tend to formally analyze and verify the operating of SeSPHR methodology through the High Level Petri Nets (HLPN). Performance analysis concerning time consumption indicates that the SeSPHR methodology has potential to use for firmly sharing the PHRs within the cloud. conjointly we tend to Implement as a contribution during this paper time Server, Secure Auditing Storage, in Time Server PHR Owner add the start and Ending time attach to uploaded Encrypted files, and conjointly implement the TPA Module for verify the PHR Record its hack or corrupted for the other hacker and wrongdoer if information hack from hacker facet discover all system details of wrongdoer like Macintosh Address and information science Address its our contribution in our project.

    Designing an architecture for secure sharing of personal health records : a case of developing countries

    Get PDF
    Includes bibliographical references.While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite the usual problems of poor infrastructure, PHR systems designed for the developing world need to conform to users with different models of security and literacy than those designed for developed world. This study investigated a PHR system distributed across mobile devices with a security model and an interface that supports the usage and concerns of low literacy users in developing countries. The main question addressed in this study is: “Can personal health records be stored securely and usefully on mobile phones?” In this study, mobile phones were integrated into the PHR architecture that we/I designed because the literature reveals that the majority of the population in developing countries possess mobile phones. Additionally, mobile phones are very flexible and cost efficient devices that offer adequate storage and computing capabilities to users for typically communication operations. However, it is also worth noting that, mobile phones generally do not provide sufficient security mechanisms to protect the user data from unauthorized access

    Privacy in Mobile Technology for Personal Healthcare

    Get PDF
    Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of \emphmobile\/ computing technologies that have the potential to transform healthcare. Such \emphmHealth\/ technology enables physicians to remotely monitor patients\u27 health, and enables individuals to manage their own health more easily. Despite these advantages, privacy is essential for any personal monitoring technology. Through an extensive survey of the literature, we develop a conceptual privacy framework for mHealth, itemize the privacy properties needed in mHealth systems, and discuss the technologies that could support privacy-sensitive mHealth systems. We end with a list of open research questions
    • …
    corecore