35 research outputs found

    Comparison of Arrangements Manually Operated Health Records California and the Republic of Slovenia

    Get PDF
    Theoretical background: health documentation has since its beginnings in ancient Egypt, that 3000 years BC, a very varied. Even the ancient Greeks were writing the symptoms and treatments. After the year 1750 were in European hospitals to develop a systematic and objective records of diseases. The expansion of science is meant better value accurate medical records that are already in the sixteenth century as a result of the book cases, called Casebook, following the example of the legal profession. Methods: based on the analysis of foreign and domestic law have devised a comparison of Slovenian legal system for health records and the California legal act and seek deficiencies in domestic legislation in the field of management of health records. Results: comparison of domestic laws and foreign legal act, says the legal void in domestic law and hence disorderly conduct medical documentation. Discussion: keeping health records throughout history, with the development of science and research is changing. For the exercise of patients’ rights and their security, based on the health resords, managers need accurate guidance. Conclusion: to realization the patient’s rights and the rights of the operator documentation is very important. Important is also a record and storage of documents, which allows you to search documents

    On the Use of XML in Medical Imaging Web-Based Applications

    Get PDF
    The rapid growth of digital technology in medical fields over recent years has increased the need for applications able to manage patient medical records, imaging data, and chart information. Web-based applications are implemented with the purpose to link digital databases, storage and transmission protocols, management of large volumes of data and security concepts, allowing the possibility to read, analyze, and even diagnose remotely from the medical center where the information was acquired. The objective of this paper is to analyze the use of the Extensible Markup Language (XML) language in web-based applications that aid in diagnosis or treatment of patients, considering how this protocol allows indexing and exchanging the huge amount of information associated with each medical case. The purpose of this paper is to point out the main advantages and drawbacks of the XML technology in order to provide key ideas for future web-based applicationsPeer ReviewedPostprint (author's final draft

    Automated Transformation of Semi-Structured Text Elements

    Get PDF
    Interconnected systems, such as electronic health records (EHR), considerably improved the handling and processing of health information while keeping the costs at a controlled level. Since the EHR virtually stores all data in digitized form, personal medical documents are easily and swiftly available when needed. However, multiple formats and differences in the health documents managed by various health care providers severely reduce the efficiency of the data sharing process. This paper presents a rule-based transformation system that converts semi-structured (annotated) text into standardized formats, such as HL7 CDA. It identifies relevant information in the input document by analyzing its structure as well as its content and inserts the required elements into corresponding reusable CDA templates, where the templates are selected according to the CDA document type-specific requirements

    Can HIT Work Alone? A Security and Socio-Economic Perspective of Healthcare Quality

    Get PDF
    Healthcare delivery system can immensely benefit from the use of HIT (Healthcare Information Technology). Clinical and administrative automation in hospitals can improve clinical quality through reduced mortality. Previous literature has failed to identify the impact of security technology usage and socio-economic factors on clinical quality improvement. Our paper addresses this gap through the security-HIT interaction and socio-economic impact on overall clinical quality. We used OLS based regression technique to validate our model. We combined survey data of U.S. hospitals from Dorenfest Institute and Centers for Medicare & Medicaid Services from 2011 to 2013. Results from our study will guide healthcare professionals to understand the interaction effect of security, effective technology integration in clinical and administrative automation systems. We also obtained strong evidence of socio-economic impact on mortality rate reduction

    Review of Various Encryption Algorithms

    Get PDF
    Advancement in technology dictates that information security, user data integrity and security be paramount to protect user information and data from vulnerabilities from malicious intruders- third parties. Need is therefore a factor for information systems to secure user data and information. The concept data encryption ensures that user data is unreadable to third parties keeping their information more safe and secure while using the internet. A lot information on security has been provided by both the physical security and operating system security but neither of these methods have successfully and sufficiently provided a secure mechanism and support on storing and processing of user data and information. This paper reviews the various encryption algorithms that are employed to protect user information and data against various vulnerabilities

    REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs

    Get PDF
    Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks

    Healthcare Information Privacy Research: Iusses, Gaps and What Next?

    Get PDF
    The proliferation of e-health holds great promises in sharing medical data, improving healthcare quality, saving patient lives and reducing costs. However, these potential benefits also bring much attention to the issues of information privacy. Given that medical data disclosure is the second highest reported breaches, it is imperative to understand both information privacy and its context in healthcare. Just as lack of appropriate privacy measures might cause economic harm or denied service from insurance or employers, tight privacy can prevent care providers from accessing patient information in time to save lives. This paper takes an integrated look into the area of healthcare information privacy from both MIS and health informatics perspectives. Based on the literature review and our personal communication with health informatics experts, we identified and presented four major themes: 1) scope and definition of privacy and electronic health records, 2) the information privacy issues and threats, 3) the countermeasures used to address and manage information privacy and 4) why privacy responses matter. This paper provides a unique perspective to privacy in the context of healthcare by focusing on the issues, the matching countermeasures and the drivers behind organizational behaviors into how they manage these threats

    Linking Data Sovereignty and Data Economy: Arising Areas of Tension

    Get PDF
    In the emerging information economy, data evolves as an essential asset and personal data in particular is used for data-driven business models. However, companies frequently leverage personal data without considering individuals’ data sovereignty. Therefore, we strive to strengthen individuals’ position in data ecosystems by combining concepts of data sovereignty and data economy. Our research design comprises an approach to design thinking iteratively generating, validating, and refining such concepts. As a result, we identified ten areas of tension that arise when linking data sovereignty and data economy. Subsequently, we propose initial solutions to resolve these tensions and thus contribute to knowledge about the development of fair data ecosystems benefiting both individuals’ sovereignty and companies’ access to data

    Cyber risk in health facilities: A systematic literature review

    Get PDF
    The current world challenges include issues such as infectious disease pandemics, environmental health risks, food safety, and crime prevention. Through this article, a special emphasis is given to one of the main challenges in the healthcare sector during the COVID-19 pandemic, the cyber risk. Since the beginning of the Covid-19 pandemic, the World Health Organization has detected a dramatic increase in the number of cyber-attacks. For instance, in Italy the COVID-19 emergency has heavily affected cybersecurity; from January to April 2020, the total of attacks, accidents, and violations of privacy to the detriment of companies and individuals has doubled. Using a systematic and rigorous approach, this paper aims to analyze the literature on the cyber risk in the healthcare sector to understand the real knowledge on this topic. The findings highlight the poor attention of the scientific community on this topic, except in the United States. The literature lacks research contributions to support cyber risk management in subject areas such as Business, Management and Accounting; Social Science; and Mathematics. This research outlines the need to empirically investigate the cyber risk, giving a practical solution to health facilities. Keywords: cyber risk; cyber-attack; cybersecurity; computer security; COVID-19; coronavirus;information technology risk; risk management; risk assessment; health facilities; healthcare sector;systematic literature review; insuranc
    corecore