Filters








54,086 Hits in 8.0 sec

Information Security Principles for Electronic Medical Record (EMR) Systems

Mohammed Sajedur Rahman, Christopher Kreider
2012 Americas Conference on Information Systems  
With the growing use of this digital information system, concerns about the state of security for the EMR systems have also increased.  ...  A growing number of healthcare organizations are replacing their traditional record keeping methods with the electronic medical record (EMR) systems as part of an on-going effort toward the digitization  ...  Therefore, in order to deal with ongoing security threats, defense in depth is a best strategy to implement in information systems.  ... 
dblp:conf/amcis/RahmanK12a fatcat:5nscmlt6anah7hu6iobrzqselm

Access control: how can it improve patients' healthcare?

Ana Ferreira, Ricardo Cruz-Correia, Luís Antunes, David Chadwick
2007 Studies in Health Technology and Informatics  
Then EMR could be more successfully integrated into the healthcare practice and provide for better patient treatment.  ...  The Electronic Medical Record (EMR) is a very important support tool for patients and healthcare professionals but it has some barriers that prevent its successful integration within the healthcare practice  ...  The complexity of building secure information systems relates mainly to three fundamental and competing factors: i) the complexity of the security technology itself, ii) the difficulty of classifying the  ... 
pmid:17901600 fatcat:edvrjko32jfrtlmaptyp7spkuq

Current Cybersecurity Maturity Models: How Effective in Healthcare Cloud?

Opeoluwa Ore Akinsanya, Maria Papadaki, Lingfen Sun
2019 Collaborative European Research Conference  
Healthcare cyber security maturity models designate a collection of capabilities expected in a healthcare organization and facilitate its ability to identify where their practices are weak or absent and  ...  This paper presents a literature review of maturity models for cloud security assessment in healthcare and argues the need for a cloud security maturity model for healthcare organizations.  ...  , this model is considered technically complex to implement in healthcare [40] [41] [42] .  ... 
dblp:conf/cerc/AkinsanyaPS19 fatcat:xjlza6ca4nhvtoc66jqo3f3ugu

Using 80001 to Manage Medical Devices on the IT Network

Stephen L. Grimes
2011 Biomedical Instrumentation & Technology  
deal with the increasing number of complex systems and the new vulnerabilities they introduced.  ...  practice, could be used together • Guidance for Healthcare Delivery Organizations (HDOs) on how to self-assess their conformance with IEC 80001-1 • Technical report on integration of alarm systems in  ... 
doi:10.2345/0899-8205-45.s2.23 pmid:21992041 fatcat:k6ji6xrvmnhrzmw7t6ptgtd4xa

A Survey of the State of Cloud Computing in Healthcare

Sanjay P. Ahuja, Sindhu Mani, Jesus Zambrano
2012 Network and Communication Technologies  
Current trends aim towards accessing information anytime, anywhere, which can be achieved when moving healthcare information to the cloud.  ...  Since the real life businesses and organizations normally build applications in quite a complex environment that involves networking, security, physical servers, firewalls etc. and transactions worth millions  ...  Acknowledgement This research has been supported by the Fidelity National Financial Distinguished Professorship in Computer and Information Sciences.  ... 
doi:10.5539/nct.v1n2p12 fatcat:4t27tpyvfzh7fa2w6lsm33r3eq

Security Risk Management in Healthcare: A Case Study

Humayun Zafar, Myung S. Ko, Jan G. Clark
2014 Communications of the Association for Information Systems  
When it comes to healthcare IT security issues in general, the inherent security threats and risks associated with healthcare are yet to be fully resolved, despite the known benefits of ubiquitous computing  ...  Therefore, it is imperative that an effective SRM program is in place in a healthcare organization. Information security has been studied in IS.  ...  Some of these mechanisms entail risk assessments, information security policies, and secure computing practice in an organization [Spears and Barki, 2010] .  ... 
doi:10.17705/1cais.03437 fatcat:3keahugyrfax7o22ti7j6si4te

The Role of Information System for Risk Management in Hospital: A Narrative Review

Sutejo Sutejo, Agung Budi Prasetijo, Farid Agushyban
2021 Jurnal Aisyah Jurnal Ilmu Kesehatan  
Integrated Risk Management Information System (IRMIS) is defined as an organized and integrated strategy for hospital risk control which consists of identification, assessment, implementation of strategies  ...  in an integrated manner with the hospital management information system (SIMRS) and/or other applications in the hospital as well as business process integration. hospital.  ...  ., 2013) Risk management, on the other hand, provides you with a method to follow in order to avoid these risks and deal with them and when they arise.  ... 
doi:10.30604/jika.v6i3.1014 fatcat:4jsblvyyj5dlbluhuqi76r5mfy

Human factors of complex sociotechnical systems

Pascale Carayon
2006 Applied Ergonomics  
The design of sociotechnical systems in collaboration with both the workers in the systems and the customers requires increasing attention not only to the design and implementation of systems, but also  ...  This paper draws from research on human factors in the domains of health care and patient safety and of computer security. r  ...  Acknowledgments The research in the domains of healthcare/patient safety and computer security conducted by the author and her research team is funded by the Agency for Healthcare Research  ... 
doi:10.1016/j.apergo.2006.04.011 pmid:16756937 fatcat:dsvvni5qjnhubbfdlcbhbz6hfm

A Framework for eHealth Interoperability Management

2019 Journal of Strategic Innovation and Sustainability  
Practical implications have to deal with the sustainability of the underlying national infrastructure required to support reliable and secure exchange of meaningful EHR data, for both primary and secondary  ...  Reliable and secure access to and sharing of medical data can help patients practice self-care, promote patient engagement and improve their communication with healthcare professionals.  ...  ACKNOWLEDGEMENTS The presented research was supported by the Center for eHealth Applications and Services, and the Computational Biomedicine Laboratory, of the Institute of Computer Science of the Foundation  ... 
doi:10.33423/jsis.v14i5.2521 fatcat:bbndyxbp4jfzxbpiwbf2kbavjm

Redefining the health information management privacy and security role

Laurie A Rinehart-Thompson, Beth M Hjort, Bonnie S Cassidy
2009 Perspectives in health information management  
In fact, as articulated in the strategic plan of the American Health Information Management Association (AHIMA), -privacy and security of personal health information are cornerstones of HIM practice and  ...  However, this responsibility has become increasingly more challenging and, in fact, the role of the healthcare privacy and security professional has been likened to -standing on shifting sand.‖ 2 As the  ...  Health information organization (HIO) and HIE development challenges deal with pinning down liabilities amid shared stakeholder responsibilities.  ... 
pmid:20052319 pmcid:PMC2781727 fatcat:szhgixkxqvaofehn4g4jal3zuy

ETHEREUM BLOCKCHAIN FRAMEWORK FOR HEALTHCARE APPLICATIONS

P. S. G. Aruna Sri, D. Lalitha Bhaskari
2021 Information Technology in Industry  
This work concentrates on healthcare based BT over Ethereum platform for data management. The medical applications include complex medical procedures with clinical and surgical trials.  ...  The performance of this model is analyzed with multiple flows. The data management, security, identity, and autonomy are considered as an essential factor.  ...  The anticipated model is designed for dealing with the complex workflows.  ... 
doi:10.17762/itii.v9i1.264 fatcat:bqpwpowofbgqfopkwor3brmvoq

A Mobile Cloud based Approach for Secure Medical Data Management

Annapurna Patil, Ashwini D V, Rashmi Ranjana T P, Tulasi Srinivas
2015 International Journal of Computer Applications  
Providing the Security and privacy for the medical data is an interesting topic to deal with.  ...  Mobile cloud Computing has become part of cloud computing that also deals with various issues of cloud services when is accessed by portable devices in wireless environment.  ...  With this technology advancement security plays a vital role in accessing the healthcare related data.  ... 
doi:10.5120/21062-3723 fatcat:iivz4kt3ffhcvmms3lsyy2wclu

Application of big data in healthcare: examination of the military experience

David Berry
2021 Health and Technology  
The experience of the United States Military with Big Data during the Vietnam War is a case study with striking parallels to issues described in modern healthcare literature.  ...  Business models, however, are limited in their application to healthcare as the two represent a complicated system versus a complex system respectively.  ...  Lance Knox for editorial assistance, and the Sault Ste. Marie Academic Medical Association for financial support during this endeavour. Funding Sault Ste.  ... 
doi:10.1007/s12553-020-00513-7 fatcat:bxrxuj5vs5dwndk6vzmwo3en3y

Measuring the impact of blockchain on healthcare applications

Constantinos Loizou, Dimka Karastoyanova, Christos N. Schizas
2019 Proceedings of the 2nd International Conference on Applications of Intelligent Systems - APPIS '19  
The value of information related to healthcare creates a clear path for applying blockchain as a solution for some of the challenges in the healthcare sector, in particular with the goal of creating a  ...  The global information technology scene is being overcrowded with blockchain applications with special focus on the vast healthcare market [12] .  ...  Electronic Health Record and Securing Data in a New Age of eHealth -Challenges Medical practitioners have a complex relationship with electronic health record [8, 10, 20] since they need the information  ... 
doi:10.1145/3309772.3309806 dblp:conf/appis/LoizouKS19 fatcat:ngyt3vf3qvfs5pduuwiiui54je

Editor-in-Chief's Letter

Richard M. Krieg
2021 Journal of Critical Infrastructure Policy  
Of the 25 authors whose articles populate this issue-in addition to those who are university-based-we are pleased by the contributions of those working at nationally prominent strategy development and  ...  research organizations.  ...  For example, in Los Angeles, with support provided by the Department of Homeland Security, a system is being implemented to provide real time generator threat alerts to government emergency managers from  ... 
doi:10.18278/jcip.2.2.1 fatcat:sbbvfntribaixfcrmeq7hhjaie
« Previous Showing results 1 — 15 out of 54,086 results