3 research outputs found

    Faktor – Faktor Yang Mempengaruhi Sikap Menggunakan Rekam Medis Elektronik Di RSGM UNSOED

    Get PDF
    Penelitian ini bertujuan untuk mengetahui pengaruh literasi komputer, dukungan manajemen puncak, kompleksitas terhadap sikap menggunakan rekam medis elektronik di RSGM Unsoed. Penelitian ini merupakan penelitian kuantitatif dengan rancangan cross sectional. Pengumpulan data diperoleh melalui pengisian kuesioner dengan jumlah responden 65 orang yang dianalisis menggunakan SEM-PLS. Hasil penelitian ini menunjukkan bahwa: (1) Literasi komputer berpengaruh positif terhadap sikap menggunakan rekam medis elektronik.; (2) Dukungan manajemen puncak berpengaruh positif terhadap sikap menggunakan rekam medis elektronik; (3) Kompleksitas berpengaruh negatif terhadap sikap menggunakan rekam medis elektronik; (4) Literasi komputer berpengaruh positif terhadap sikap menggunakan RME melalui persepsi kemudahan penggunaan; (5) Manajemen puncak berpengaruh positif terhadap sikap menggunakan RME melalui persepsi kemudahan penggunaan; (6) Kompleksitas berpengaruh negatif terhadap sikap menggunakan RME melalui persepsi kemudahan penggunaan; dan (7) Persepsi kemudahan penggunaan berpengaruh positif terhadap sikap menggunakan RME. Implikasi dari penelitian ini yaitu perlu dilakukan tindak lanjut dan langkah perbaikan dalam hal literasi komputer, dukungan manajemen puncak, kompleksitas terhadap sikap menggunakan rekam medis elektronik, sehingga persentasi penggunaan rekam medis elektronik di RSGM Unsoed dapat lebih meningkat

    A systematic literature review on security and privacy of electronic health record systems: technical perspectives

    Get PDF
    Abstract Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. Objective: This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Method: Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Results: Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. Conclusion: This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements

    Advanced tool kits for EPR security

    No full text
    Responding to the challenge for efficient and high quality health care, the shared care paradigm must be established in health. In that context, information systems such as electronic patient records (EPR) have to meet this paradigm supporting communication and interoperation between the health care establishments (HCE) and health professionals (HP) involved. Due to the sensitivity of personal medical information, this co-operation must be provided in a trustworthy way. To enable different views of HCE and HP ranging from management, doctors, nurses up to systems administrators and IT professionals, a set of models for analysis, design and implementation of secure distributed EPR has been developed and introduced. The approach is based on the popular UML methodology and the component paradigm for open, interoperable systems. Easy to use tool kits deal with both application security services and communication security services but also with the security infrastructure needed. Regarding the requirements for distributed multi-user EPRs, modelling and implementation of policy agreements, authorisation and access control are especially considered. Current developments for a security infrastructure in health care based on cryptographic algorithms as health professional cards (HPC), security services employing digital signatures, and health-related TTP services are discussed. CEN and ISO initiatives for health informatics standards in the context of secure and communicable EPR are especially mentioned
    corecore