5,253 research outputs found

    Temporary Access to Medical Records in Emergency Situations

    Get PDF
    Access to patients Electronic Health Records (EHR) is a daily operation in mainstream healthcare. However, having access to EHR in emergencies while is vitally important to save patients’ life, it could potentially lead to security breaches and violating patients’ privacy. In this regards, getting access to patients’ medical records in emergency situations is one of the issues that emergency responder teams are facing. This access can be temporary until patients reach hospitals or healthcare centers. In this paper, we aim to explore different technology-based solutions to give responders temporary access to patients\u27 medical records in emergency situations. The core of this study is patients and responders authentication methods that can save precious emergency time and protect the privacy and confidentiality of patients data to the utmost. We also have explored control access mechanism and security audits to increase the security of the procedure and patient privacy

    The New Employment Verification Act: The Functionality and Constitutionality of Biometrics in the Hiring Process Note

    Get PDF
    In 1990, Congress created the U.S. Commission on Immigration Reform to assess and make recommendations regarding the implementation and impact of U.S. immigration policy. Unanimously, the Commission proposed employment-based immigration reforms that have lead to the creation of E-Verify, an Internet-based electronic verification system used by employers to verify a prospective worker’s eligibility. Today, the system compares a prospective worker’s identification information, such as her name, date of birth, and social security number with information contained in databases housed by the Department of Homeland Security and Social Security Administration. Several members of Congress, however, have proposed legislation that would require prospective workers to submit biometric information to curb identity fraud and existing shortfalls in the verification process. This Note examines the practical and legal implications of a nationally mandated biometric verification system and whether such a system is constitutionally viable under current Fourth Amendment jurisprudence. Ultimately this Note argues that no matter how unsettling the collection of biometric information by the government may be, at least in the employment hiring context, a nationally mandated biometric verification system will most likely pass constitutional muster

    A Study of Technology Innovations and Applications in Transforming Safety and Security in Healthcare Facility Management

    Get PDF
    The increasing complexity of construction projects has transformed the Architecture, Engineering, and Construction (AEC) industry through technology adoption over the last decade. But, Facility Management (FM) as an industry has been slow in technology adoption. Growing market competition, corporate demands and new ways of attracting clients for owners are compelling FM professionals to be more efficient. This requirement is driving technology adoption by FM professionals. This study identifies technologies adopted by Healthcare Facility Management (HFM) professionals for improving safety and security of users that have capabilities and conceived and/or developed applications that can or in some cases are at present used in HFM. Simultaneously, it also looks into potentials and capabilities of a handful of other technologies in further improving safety and security. Using Literature-Based Discovery (LBD), the technology applications and innovations aimed towards safety and security are discovered from the literature that falls within the purview of HFM to form a picture of how these technologies enhance the practice of FM. The study aims at detecting how technologies have contributed towards transforming user experience. Also, this study identifies existing technologies and innovation demands (knowledge and gaps in knowledge), a general understanding of technology, its use and capabilities, and its recognition by users and industry professionals (adoption/rejection). They serve to illustrate how and to what degree the technologies will come to be used in facility management. Technologies, as they mature, will come to be used by facility managers in similar functions and hypothetically, entirely new ones. One should create a better user experience tailored to the functionality demanded. It is important for facility managers to partner with technology companies presenting innovative solutions to create a platform that is tailored to user-specific needs. Acceptance of a unified process, together with input from users, facility managers, and an assessment of current technologies and new advances in practice are productive ways to develop technologies that drive user satisfaction. This paper works to illustrate a future vision of HFM based on these technologies. Healthcare facility managers will have a reference that assembles multiple technological proficiencies that can function in their practice going forward

    Evaluating indoor positioning systems in a shopping mall : the lessons learned from the IPIN 2018 competition

    Get PDF
    The Indoor Positioning and Indoor Navigation (IPIN) conference holds an annual competition in which indoor localization systems from different research groups worldwide are evaluated empirically. The objective of this competition is to establish a systematic evaluation methodology with rigorous metrics both for real-time (on-site) and post-processing (off-site) situations, in a realistic environment unfamiliar to the prototype developers. For the IPIN 2018 conference, this competition was held on September 22nd, 2018, in Atlantis, a large shopping mall in Nantes (France). Four competition tracks (two on-site and two off-site) were designed. They consisted of several 1 km routes traversing several floors of the mall. Along these paths, 180 points were topographically surveyed with a 10 cm accuracy, to serve as ground truth landmarks, combining theodolite measurements, differential global navigation satellite system (GNSS) and 3D scanner systems. 34 teams effectively competed. The accuracy score corresponds to the third quartile (75th percentile) of an error metric that combines the horizontal positioning error and the floor detection. The best results for the on-site tracks showed an accuracy score of 11.70 m (Track 1) and 5.50 m (Track 2), while the best results for the off-site tracks showed an accuracy score of 0.90 m (Track 3) and 1.30 m (Track 4). These results showed that it is possible to obtain high accuracy indoor positioning solutions in large, realistic environments using wearable light-weight sensors without deploying any beacon. This paper describes the organization work of the tracks, analyzes the methodology used to quantify the results, reviews the lessons learned from the competition and discusses its future

    Managing the security of nursing data in the electronic health record

    Get PDF
    Background: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. Methods: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. Results: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95 and 80, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Conclusions: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. © 2015 Mahnaz Samadbeik, Zahra Gorzin, Masomeh Khoshkam, Masoud Roudbari

    Large-scale Biometrics Deployment in Europe: Identifying Challenges and Threats

    Get PDF
    With large-scale biometrics deployment in the EU still in its infancy and with stakeholders racing to position themselves in view of the lucrative market that is forecasted, a study to identify challenges and threats that need to be dealt with was launched. This is the result: a report on Biometrics large-scale Deployment in Europe. The report tackles three main issues namely, the status, security / privacy and testing / certification processes. A survey was launched so as to help reveal the actual status of Biometrics large-scale Deployment initiatives in EU. The main outcome of the survey was that an open dissemination of implementation results policy is needed mainly on deployment plans, strategies, barriers and best practices. The security/ privacy challenges study identified a number of issues, the most important of which were related to proportionality and compliance to the existing regulatory framework while at the same time it revealed an important number of related actions aiming at ensuring both data security and privacy. The aim of the Bio Testing Europe study was double: to identify and collect comparable and certified results under different technologies, vendors and environments situations and to feed in this information to animate discussion among the members of a European network which would enhance the European testing and certification capacity. The study presents an integrated picture of the identified issues as well as a number of recommendations. With some of the systems that are being implemented involving millions of individuals as target users it is important for policy makers to adopt some of the options presented so as to address the identified through the study challengesJRC.J.4-Information Societ

    Distributed authentication to preserve privacy through smart card based biometric matching

    Get PDF
    Bibliography: pages 135-139.This thesis focuses on privacy concerns, specifically those relating to the storage and use of biometrics. These concerns result from the fact that biometric information is unique. This uniqueness makes the biometric a very strong identifier increasing the possibility that it could be used to monitor an individual's activities. An expert can extract considerable information from a biometric scan, ranging from the age or gender to whether the individual has certain diseases
    corecore