{"title":"Quality evidence, quality decisions: Ways to improve security and privacy of EHR systems","authors":"Hamzah Osop, T. Sahama","doi":"10.1109/HealthCom.2016.7749424","DOIUrl":null,"url":null,"abstract":"The readily available and accessible large collection of electronic health records has encouraged an increasing interest on its secondary use. It is especially true for the approach of practice-based evidence where the secondary use of EHR data, collected during routine care, has the potential to improve healthcare professionals' decision-making capabilities and effectiveness, and broadens their knowledge regarding treatments, medications and clinical conditions. Through effective and quality decision-making, healthcare professionals are able to deliver care that positively improves patient health outcomes in a cost-effective and safe manner. However, privacy and security breaches potentially impact the integrity of data captured in electronic health records, and this invalidates its perceived usefulness in providing evidence to support care. In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of preventive, detective and corrective control. Within each control, different security solutions are recommended so that security design is truly holistic.","PeriodicalId":167022,"journal":{"name":"2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HealthCom.2016.7749424","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The readily available and accessible large collection of electronic health records has encouraged an increasing interest on its secondary use. It is especially true for the approach of practice-based evidence where the secondary use of EHR data, collected during routine care, has the potential to improve healthcare professionals' decision-making capabilities and effectiveness, and broadens their knowledge regarding treatments, medications and clinical conditions. Through effective and quality decision-making, healthcare professionals are able to deliver care that positively improves patient health outcomes in a cost-effective and safe manner. However, privacy and security breaches potentially impact the integrity of data captured in electronic health records, and this invalidates its perceived usefulness in providing evidence to support care. In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of preventive, detective and corrective control. Within each control, different security solutions are recommended so that security design is truly holistic.