1,125 research outputs found

    Online at Will: A Novel Protocol for Mutual Authentication in Peer-to-Peer Networks for Patient-Centered Health Care Information Systems

    Get PDF
    Patient-centered health care information systems (PHSs) on peer-to-peer (P2P) networks promise decentralization benefits. P2P PHSs, such as decentralized personal health records or interoperable Covid-19 proximity trackers, can enhance data sovereignty and resilience to single points of failure, but the openness of P2P networks introduces new security issues. We propose a novel, simple, and secure mutual authentication protocol that supports offline access, leverages independent and stateless encryption services, and enables patients and medical professionals to establish secure connections when using P2P PHSs. Our protocol includes a virtual smart card (software-based) feature to ease integration of authentication features of emerging national health-IT infrastructures. The security evaluation shows that our protocol resists most online and offline threats while exhibiting performance comparable to traditional, albeit less secure, password-based authentication methods. Our protocol serves as foundation for the design and implementation of P2P PHSs that will make use of P2P PHSs more secure and trustworthy

    Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review

    Get PDF
    Background: Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves. Objective: This study aims to identify the inherent security issues for PHS deployment in P2P networks and how they can be overcome. In addition, this study reviews different P2P architectures and proposes a suitable architecture for P2P PHS deployment. Methods: A systematic literature review was conducted following PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines. Thematic analysis was used for data analysis. We searched the following databases: IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar. The search was conducted on articles published between 2008 and 2020. The Common Vulnerability Scoring System was used as a guide for rating security issues. Results: Our findings are consolidated into 8 key security issues associated with PHS implementation and deployment on P2P networks and 7 factors promoting them. Moreover, we propose a suitable architecture for P2P PHSs and guidelines for the provision of PHSs while maintaining information security. Conclusions: Despite the clear advantages of P2P PHSs, the absence of centralized controls and inconsistent views of the network on some P2P systems have profound adverse impacts in terms of security. The security issues identified in this study need to be addressed to increase patients\u27 intention to use PHSs on P2P networks by making them safe to use

    Privacy and Patient Involvement in e-HealthWorldwide: An International AnalysisArno Appenzeller

    Get PDF

    A Structural Equation Model for implementation of Smart Card Technology in public healthcare

    Get PDF
    The improvement of health care, efficiency, safety, and quality of delivery and access for patients highly portray a rather significant increase in public healthcare. The emergence of this proliferation of healthcare technology is then expected to grow. Therefore, Information technology (IT) has become significant part of providing consistent care quality by healthcare professionals to patients. The study seeks to explain on factors that influence the implementation of Smart Card Technology in South African public healthcare institutions. This was a cross-sectional study conducted in four Tshwane hospitals in Gauteng province, South Africa in 2021. A quantitative research method approach was used. respondents were selected using the purposive sampling method. using a self-administered questionnaire completed by (n=406) healthcare professionals from Steve Biko academic hospital, Tshwane District hospital, Kalafong hospital and Pretoria West Hospital were analysed. The structural equation modeling (SEM) and principal component analysis (PCA) methods in statistical package for social sciences (SPSS) were used to analyse the data. The factor analysis in this study used 15 variables were used for the conceptual framework. The findings generally supported the hypothesized model. The study recommends that a framework for the implementation of SCT be developed in public healthcare

    Digitalising Social Protection Systems for Achieving the Sustainable Development Goals: Insights from Zimbabwe

    Get PDF
    Social protection systems, a target of the United Nation’s (UN) Sustainable Development Goals (SDGs), are intended to reduce extreme poverty, build human capital, and protect against risks to sustainable livelihoods and well-being. As social protection systems are by their nature inherently complex, multi-faceted, and socially embedded, it is inevitable that tensions will emerge between their design and implementation, representing design-reality gaps. These tensions present an excellent opportunity for cross-disciplinary research, by understanding how best to bridge these design-reality gaps. In this qualitative, interpretivist case study, we situate our work on the ground with the actors involved in the design, implementation, and use of a social protection system in Zimbabwe. We find interaction failures amongst some users; design-reality gaps around network access and ICT policy implementation; as well as mixed views regarding transparency and accountability of ICT. Our findings provide rich insights from ICT users in the global south and underscore the importance of the co-creation of IS interventions together with communities to ensure technologies consider social, political, economic, and network realities. We conclude by providing directions for future research

    Internet of Things (IoT) for Automated and Smart Applications

    Get PDF
    Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications

    Connected Health in Europe: Where are we today?

    Get PDF
    This report, which has grown out of an ENJECT survey of 19 European countries, examines the situation of Connected Health in Europe today. It focuses on creating a clear understanding of the current and developing presence of Connected Health throughout European healthcare systems under five headings: The Policy Environment, Education, Business and Health Models, Interoperability, and The Perso

    Electronic Health Record Implementation Strategies for Decreasing Healthcare Costs

    Get PDF
    Some managers of primary care provider (PCP) facilities lack the strategies to implement electronic health records (EHRs), which could decrease healthcare costs and enhance the efficiency and quality of healthcare that patients receive. The purpose of this single-case study was to explore the strategies PCP managers used to implement EHRs to decrease healthcare costs. The population consisted of 5 primary care managers with responsibility for the administration, oversight, and direct working knowledge of EHRs in Central Florida. The conceptual framework was the technology acceptance model. Data were collected from semistructured face-to-face interviews and the review of company documents, including training logs, activity records, and cost information. Methodological triangulation was used to validate the creditability and interpretation of the data in transcribing themes. Three themes emerged from the analysis of study data: implementation of EHRs, costs of implementing EHRs, and perceived usefulness of EHRs. Participants indicated that the implementation of EHRs depended on motivation, financial cost, and the usefulness of EHRs relating to training that reflected user-friendliness. The implications of this study for social change include the potential to lower the cost and improve the efficiency of healthcare for patients. The use of EHR systems could enhance the quality of care delivered to patients through improved accessibility, elimination of duplicative tests, and retrieval of accurate patient information. The use of EHRs can lead to a comprehensive preventative healthcare system resulting in a healthier environment

    Preface

    Get PDF
    • 

    corecore