2 research outputs found

    TECHNOLOGIES INVOLVED IN THE PROMOTION OF PATIENT SAFETY IN THE MEDICATION PROCESS: AN INTEGRATIVE REVIEW

    Get PDF
    This study sought to identify technologies existing in the literature and their use in promoting patient safety in the medication process. An integrative review was performed in the following databases: Latin American and Caribbean Health Sciences Literature, Medical Literature Analysis and Retrieval System Online, Spanish Bibliographic Index of Health Sciences, Nursing Database, PubMed Central, Cumulative Index to Nursing and Allied Health Literature, Web of Science and SciVerse Scopus, including articles published between 2013 and 2017. Twenty international articles composed the final sample, ten (50%) published in the year 2014. Eleven technologies were identified, with prevalence of four regarding prescribed steps (36.3%) and four regarding drug administration (36.3%), with the technologies most investigated being: Radio Frequency Identification, Computerized Physician Order Entry and Bar-Code- Assisted Medication Administration.Este estudo buscou identificar na literatura as tecnologias existentes e seu uso na promoção da segurança do paciente no processo de medicação. Trata-se de uma revisão integrativa realizada nas bases de dados: Literatura Latino-Americana e do Caribe em Ciências da Saúde, Medical Literature Analysisand Retrieval System Online, Índice Bibliográfico Espanhol de Ciências da Saúde, Base de Dados de Enfermagem, PubMed Central, Cumulative Index to Nursing and Allied Health Literature, Web Of Science e SciVerse Scopus, abrangendo artigos publicados entre 2013 e 2017. Vinte artigos internacionais compuseram a amostra final, sendo dez (50%) publicados no ano de 2014. Onze tecnologias foram identificadas, com prevalência das etapas de prescrição quatro (36,3%) e administração de medicamentos quatro (36,3%), sendo as tecnologias mais abordadas: Radio Frequency Identification, Computerized Physician Order Entry e Bar-Code-Assisted Medication Administration.Este estudio tuvo el propósito de identificar, en la literatura, las tecnologías existentes así como su uso en la promoción de seguridad del paciente en el proceso de medicación. Es una revisión integrativa realizada en las bases de datos: Literatura Latinoamericana y de Caribe en Ciencias de la Salud, Medical Literature Analysisand Retrieval System Online, Índice Bibliográfico Español de Ciencias de la Salud, Base de Datos de Enfermería, PubMed Central, Cumulative Index to Nursing and Allied Health Literature, Web Of Science y SciVerse Scopus, abarcando artículos publicados entre 2013 y 2017. Veinte artículos internacionales hicieron parte de la muestra final, siendo diez (50%) publicados en el año de 2014. Once tecnologías fueron identificadas, con predominancia de las etapas de prescripción, cuatro (36,3%), y administración de medicamentos, cuatro (36,3%), siendo las tecnologías más abordadas: Radio Frequency Identification, Computerized Physician Order Entry yBar-Code-Assisted Medication Administration

    SRMAP and ISLAP Authentication Protocols: Attacks and Improvements

    Get PDF
    RFID technology is a system which uses radio frequency to transmit data. Data transmission between Tags and Readers is wireless which can be easily eavesdropped by adversary. Due to security and privacy reasons, various authentication protocols proposed. In this paper, we cryptanalyze two different RFID authentication protocols and it is shown that either of them have some weaknesses. In 2014, Chang et al. proposed a mutual authentication protocol for RFID technology based on EPC Class 1 Generation 2 standard. We show that their protocol is not safe regard to privacy and cannot repulse neither Traceability attack nor Forward Traceability attack. Also, in 2015, Pourpouneh et al. proposed a server-less authentication protocol. We discover that their protocol is not able to thwart security and privacy attacks such as Secret Parameter Reveal, Traceability and Forward Traceability. In addition, we robust the two schemes to defend those attacks which can protect RFID users against different threats. Then, analyzing of the protocols are compared with some state-of-art ones
    corecore