首页 > 最新文献

International journal of bio-medical computing最新文献

英文 中文
Data security and patient confidentiality: the manager's role 数据安全和病人保密:管理者的角色
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01236-6
Fleur Fisher , Bruce Madge

The maintenance of patient confidentiality is of utmost importance in the doctor patient relationship. With the advent of networks such as the National Health Service Wide Area Network in the UK, the potential to transmit identifiable clinical data will become greater. Links between general practitioners (GPs) and hospitals will allow the rapid transmission of data which if intercepted could be potentially embarrassing to the patient concerned. In 1994 the British Medical Association launched a draft bill on privacy and confidentiality and in association with this bill it is pushing for encryption of all clinical data across electronic networks. The manager's role within an acute hospital, community units and general practice, is to ensure that all employees are aware of the principles of data protection, security of hospital computer systems and that no obvious breaches of security can occur at publicly accessible terminals. Managers must be kept up to date with the latest developments in computer security such as digital signatures and be prepared to instigate these developments where practically possible. Managers must also take responsibility for the monitoring of access to terminals and be prepared to deal severely with staff who breach the code of confidentiality. Each manager must be kept informed of employees status with regard to their ‘need to know’ clearance level and also to promote confidentiality of patient details throughout the hospital. All of the management team must be prepared to train new staff in the principles of data security as they join the organisation and recognise their accountability if the programme fails. Data security and patient confidentiality is a broad responsibility in any healthcare organisation, with the Chief Executive accountable. In family practice, the partners are responsible and accountable. The British Medical Association believes as a matter of policy, that allowing access to personal health data without the patients consent, except in a legally allowable situation, should be a statutory offence.

在医患关系中,对病人保密是至关重要的。随着英国国家卫生服务广域网等网络的出现,传输可识别临床数据的潜力将变得更大。全科医生(gp)和医院之间的联系将允许数据的快速传输,如果被截获,可能会让有关患者感到尴尬。1994年,英国医学协会发起了一项关于隐私和保密的法案草案,并与该法案相结合,推动对电子网络上的所有临床数据进行加密。在急症医院、社区单位和一般实践中,经理的角色是确保所有员工都了解数据保护原则、医院计算机系统的安全性,以及在公众可访问的终端上不会发生明显的安全违规行为。管理人员必须跟上计算机安全的最新发展,如数字签名,并准备在实际可能的情况下推动这些发展。管理人员还必须负责监测使用终端机的情况,并准备严惩违反保密守则的工作人员。每位管理人员都必须被告知员工的“需要知道”的许可级别,并在整个医院内促进患者详细信息的保密。所有的管理团队都必须做好准备,在新员工加入组织时,对他们进行数据安全原则方面的培训,并认识到如果项目失败,他们的责任。数据安全和病人保密是任何医疗机构的一项广泛责任,由行政长官负责。在家庭实践中,合伙人是负责任的。英国医学协会认为,作为一个政策问题,允许未经患者同意访问个人健康数据,除非在法律允许的情况下,应该是一种法定犯罪。
{"title":"Data security and patient confidentiality: the manager's role","authors":"Fleur Fisher ,&nbsp;Bruce Madge","doi":"10.1016/S0020-7101(96)01236-6","DOIUrl":"10.1016/S0020-7101(96)01236-6","url":null,"abstract":"<div><p>The maintenance of patient confidentiality is of utmost importance in the doctor patient relationship. With the advent of networks such as the National Health Service Wide Area Network in the UK, the potential to transmit identifiable clinical data will become greater. Links between general practitioners (GPs) and hospitals will allow the rapid transmission of data which if intercepted could be potentially embarrassing to the patient concerned. In 1994 the British Medical Association launched a draft bill on privacy and confidentiality and in association with this bill it is pushing for encryption of all clinical data across electronic networks. The manager's role within an acute hospital, community units and general practice, is to ensure that all employees are aware of the principles of data protection, security of hospital computer systems and that no obvious breaches of security can occur at publicly accessible terminals. Managers must be kept up to date with the latest developments in computer security such as digital signatures and be prepared to instigate these developments where practically possible. Managers must also take responsibility for the monitoring of access to terminals and be prepared to deal severely with staff who breach the code of confidentiality. Each manager must be kept informed of employees status with regard to their ‘need to know’ clearance level and also to promote confidentiality of patient details throughout the hospital. All of the management team must be prepared to train new staff in the principles of data security as they join the organisation and recognise their accountability if the programme fails. Data security and patient confidentiality is a broad responsibility in any healthcare organisation, with the Chief Executive accountable. In family practice, the partners are responsible and accountable. The British Medical Association believes as a matter of policy, that allowing access to personal health data without the patients consent, except in a legally allowable situation, should be a statutory offence.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 115-119"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01236-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cryptographic protection of health information: cost and benefit 健康信息的加密保护:成本与收益
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01228-7
Joachim Biskup, Gerrit Bleumer

Medical, legal, and economic reasons inevitably force health care establishments to apply more and more open distributed IT systems rather than the less flexible and more expensive mainframes. Managing, for example, electronic patient records by various users at different locations by means of large scale client-server systems requires new security provisions for storing, archiving and communicating those data. Using an analogy, data processing is being changed from railroads to highways. Formerly, only one engine-driver was responsible for the security of a whole train, whereas now the car-drivers themselves are responsible each for his own car. Unless the cars are equipped with suitable security mechanisms like breaks and safety belts this change endangers individuals within and outside the cars. Cryptography provides many of the relevant security mechanisms for open distributed health care IT systems. Indeed, suitable cost effective cryptographic products are available but are rarely found in health care IT systems. The reason is more political than economic: diverging national security interests in the EU have prevented strong security in public telecommunication infrastructures arguing that, e.g. criminals would profit, too. The resulting uncertainty of investments delays the development, standardisation and installation of cryptographic solutions.

医疗、法律和经济方面的原因不可避免地迫使医疗机构应用越来越开放的分布式IT系统,而不是灵活性较低且价格较高的大型机。例如,通过大规模客户机-服务器系统管理不同位置的不同用户的电子病历,需要新的安全规定来存储、归档和通信这些数据。打个比方,数据处理正在从铁路转向高速公路。以前,只有一名火车司机负责整列火车的安全,而现在,汽车司机自己负责自己的汽车。除非汽车配备适当的安全机制,如刹车和安全带,这种变化危及车内和车外的人。密码学为开放的分布式医疗保健IT系统提供了许多相关的安全机制。确实,有合适的具有成本效益的加密产品,但很少在医疗保健IT系统中找到。原因与其说是经济上的,不如说是政治上的:欧盟内部不同的国家安全利益阻碍了公共电信基础设施的强大安全,理由是,犯罪分子也会从中获利。由此产生的投资不确定性延迟了加密解决方案的开发、标准化和安装。
{"title":"Cryptographic protection of health information: cost and benefit","authors":"Joachim Biskup,&nbsp;Gerrit Bleumer","doi":"10.1016/S0020-7101(96)01228-7","DOIUrl":"10.1016/S0020-7101(96)01228-7","url":null,"abstract":"<div><p>Medical, legal, and economic reasons inevitably force health care establishments to apply more and more open distributed IT systems rather than the less flexible and more expensive mainframes. Managing, for example, electronic patient records by various users at different locations by means of large scale client-server systems requires new security provisions for storing, archiving and communicating those data. Using an analogy, data processing is being changed from railroads to highways. Formerly, only one engine-driver was responsible for the security of a whole train, whereas now the car-drivers themselves are responsible each for his own car. Unless the cars are equipped with suitable security mechanisms like breaks and safety belts this change endangers individuals within and outside the cars. Cryptography provides many of the relevant security mechanisms for open distributed health care IT systems. Indeed, suitable cost effective cryptographic products are available but are rarely found in health care IT systems. The reason is more political than economic: diverging national security interests in the EU have prevented strong security in public telecommunication infrastructures arguing that, e.g. criminals would profit, too. The resulting uncertainty of investments delays the development, standardisation and installation of cryptographic solutions.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 61-67"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01228-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The use of personal health information for controlling the costs of delivering health care: does the end justify the means? 使用个人健康信息来控制提供医疗保健的成本:目的是否证明手段是正当的?
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01231-7
Francois-André Allaert

With the increasing costs of medical care many countries are seeking ways of controlling costs. Two approaches are discussed; the accounting control of costs and the medicalised control of costs. The former provides a very blunt and insensitive instrument while the latter can support best practice and reduce unnecesssary examinations. However, the medicalised approach requires limited access to the patients' medical files thus breaching the medical secret. The paper discusses the strict controls necessary to make this approach work in an acceptable fashion.

随着医疗保健费用的增加,许多国家都在寻求控制费用的方法。讨论了两种方法;成本的会计控制和成本的医疗化控制。前者提供了一种非常生硬和不敏感的工具,而后者可以支持最佳实践并减少不必要的检查。然而,医疗化的方法需要对病人的医疗档案进行有限的访问,从而泄露了医疗秘密。本文讨论了使这种方法以可接受的方式工作所必需的严格控制。
{"title":"The use of personal health information for controlling the costs of delivering health care: does the end justify the means?","authors":"Francois-André Allaert","doi":"10.1016/S0020-7101(96)01231-7","DOIUrl":"10.1016/S0020-7101(96)01231-7","url":null,"abstract":"<div><p>With the increasing costs of medical care many countries are seeking ways of controlling costs. Two approaches are discussed; the accounting control of costs and the medicalised control of costs. The former provides a very blunt and insensitive instrument while the latter can support best practice and reduce unnecesssary examinations. However, the medicalised approach requires limited access to the patients' medical files thus breaching the medical secret. The paper discusses the strict controls necessary to make this approach work in an acceptable fashion.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 79-82"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01231-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Socio-technical aspects of the use of health related personal information for management and research 使用与健康有关的个人信息进行管理和研究的社会技术方面
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01232-9
Kenneth R. Iversen, Tor Olav Grøtan

This paper focuses on the organisational, technical and ethical aspects related to the use of person identifiable health information for various health care management, administration, finance, research and educational purposes. It is based on the ethical standpoint that to the individuals in question, the identifiable health information represents the uttermost sensitive and critical information. In addition, nobody, possibly apart from the patients themselves, may claim ownership of such information. Thus identifiable health information should be (per individual) kept as collected and protected as possible, within the scope of the patient provider relationship. Identifiable health information should, whenever possible and reasonable, be restricted to the health care professionals providing the treatment and care to the patient, and only be made available to others, e.g. for management, research or educational purposes, either in anonymous or pseudonymous form. Secure information management (SIM) is presented as the socio-technical means to facilitate our ethical standpoint in a practical health care environment.

本文着重于组织,技术和伦理方面的相关使用个人身份的健康信息的各种卫生保健管理,行政,财务,研究和教育目的。基于道德立场,对有关个人而言,可识别的健康信息是最敏感和最关键的信息。此外,除了病人自己之外,没有人可以声称对这些信息拥有所有权。因此,应在患者-提供者关系的范围内尽可能收集和保护(每个人)可识别的健康信息。在可能和合理的情况下,可识别的健康信息应仅限于向患者提供治疗和护理的保健专业人员,并且只能以匿名或假名的形式提供给其他人,例如用于管理、研究或教育目的。安全信息管理(SIM)是作为社会技术手段提出的,以促进我们在实际卫生保健环境中的道德立场。
{"title":"Socio-technical aspects of the use of health related personal information for management and research","authors":"Kenneth R. Iversen,&nbsp;Tor Olav Grøtan","doi":"10.1016/S0020-7101(96)01232-9","DOIUrl":"10.1016/S0020-7101(96)01232-9","url":null,"abstract":"<div><p>This paper focuses on the organisational, technical and ethical aspects related to the use of person identifiable health information for various health care management, administration, finance, research and educational purposes. It is based on the ethical standpoint that to the individuals in question, the identifiable health information represents the uttermost sensitive and critical information. In addition, nobody, possibly apart from the patients themselves, may claim ownership of such information. Thus identifiable health information should be (per individual) kept as collected and protected as possible, within the scope of the patient provider relationship. Identifiable health information should, whenever possible and reasonable, be restricted to the health care professionals providing the treatment and care to the patient, and only be made available to others, e.g. for management, research or educational purposes, either in anonymous or pseudonymous form. Secure information management (SIM) is presented as the socio-technical means to facilitate our ethical standpoint in a practical health care environment.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 83-91"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01232-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Control and use of information, seen from a nurse's perspective 从护士的角度看信息的控制和使用
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01223-8
Elly S.P. Pluyter-Wenting

This paper deals with the impact of information technology used in nursing with special regard to confidentiality, integrity and availability. A brief overview is given of the current value and usage of information systems by nurses. This is followed by recommendations for the increase of awareness regarding proper use of IT systems in (A) the direct environment of patients, and (B) the secure communication between health professionals and institutions.

本文讨论了信息技术在护理中的应用对保密性、完整性和可用性的影响。简要概述了当前护士信息系统的价值和使用情况。随后提出了以下建议:提高在以下情况下正确使用IT系统的认识:(A)患者的直接环境,以及(B)卫生专业人员与机构之间的安全通信。
{"title":"Control and use of information, seen from a nurse's perspective","authors":"Elly S.P. Pluyter-Wenting","doi":"10.1016/S0020-7101(96)01223-8","DOIUrl":"10.1016/S0020-7101(96)01223-8","url":null,"abstract":"<div><p>This paper deals with the impact of information technology used in nursing with special regard to confidentiality, integrity and availability. A brief overview is given of the current value and usage of information systems by nurses. This is followed by recommendations for the increase of awareness regarding proper use of IT systems in (A) the direct environment of patients, and (B) the secure communication between health professionals and institutions.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 27-32"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01223-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Professional ethics as basis for legal control of health care information 职业道德是医疗信息法律控制的基础
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01224-X
Eike-Henner W. Kluge

The development of uniform, ethical and internationally enforceable standards for handling computerised electronic patient records is a major requirement for the implementation of the next generation of health information systems. This paper develops a model code of ethics to address this issue.

为处理计算机化的电子病历制定统一的、合乎道德的和国际上可执行的标准,是实施下一代卫生信息系统的主要要求。本文开发了一个道德规范模型来解决这个问题。
{"title":"Professional ethics as basis for legal control of health care information","authors":"Eike-Henner W. Kluge","doi":"10.1016/S0020-7101(96)01224-X","DOIUrl":"10.1016/S0020-7101(96)01224-X","url":null,"abstract":"<div><p>The development of uniform, ethical and internationally enforceable standards for handling computerised electronic patient records is a major requirement for the implementation of the next generation of health information systems. This paper develops a model code of ethics to address this issue.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 33-37"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01224-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The networking between hospital and health centre 医院和保健中心之间的联网
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01230-5
Tapio Tervo

Health care providers, purchasers, and insurers try to manage the costs while maintaining the quality of the care. In the Hospital District of Central Finland we based our plans on the following values: life worth living, justice, truth, responsibility, equality, relationship, and commitment. Most of these values mean responsibility for the patient. At the same time they tell of the ethical basis of our regional networking between hospitals and health centres.

医疗保健提供者、购买者和保险公司试图在保持医疗质量的同时管理成本。在芬兰中部的医院区,我们的计划基于以下价值观:值得活下去的生命、正义、真理、责任、平等、关系和承诺。这些价值观大多意味着对病人负责。与此同时,它们也说明了我们在医院和保健中心之间建立区域网络的道德基础。
{"title":"The networking between hospital and health centre","authors":"Tapio Tervo","doi":"10.1016/S0020-7101(96)01230-5","DOIUrl":"10.1016/S0020-7101(96)01230-5","url":null,"abstract":"<div><p>Health care providers, purchasers, and insurers try to manage the costs while maintaining the quality of the care. In the Hospital District of Central Finland we based our plans on the following values: life worth living, justice, truth, responsibility, equality, relationship, and commitment. Most of these values mean responsibility for the patient. At the same time they tell of the ethical basis of our regional networking between hospitals and health centres.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 75-76"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01230-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communicating Health Information in an Insecure World. Proceedings of IMIA Working Group 4 Working Conference. Helsinki, Finland, September 30-October 3, 1995. 在不安全的世界中沟通健康信息。IMIA第四工作组工作会议记录。芬兰赫尔辛基,1995年9月30日至10月3日。
{"title":"Communicating Health Information in an Insecure World. Proceedings of IMIA Working Group 4 Working Conference. Helsinki, Finland, September 30-October 3, 1995.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1-2","pages":"1-152"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"20001708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security training and education for IT professionals 为IT专业人员提供安全培训和教育
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01235-4
Louise Yngström

This paper presents some of the difficulties inherent in understanding IT security as a context oriented area when it comes to practicalities. Such attributes have to be included in education and training; here presented through demands put forward by some official international bodies. A short state-of-the-art report is given and an approach to meet stated demands is presented including evaluations performed. Finally there are remarks on future work needed.

本文介绍了在将IT安全理解为面向上下文的领域时所固有的一些困难。这些特点必须包括在教育和培训中;这里介绍一些国际官方机构提出的要求。一个简短的最新的报告,并提出了一种方法,以满足规定的要求,包括评估执行。最后,对今后需要开展的工作提出了意见。
{"title":"Security training and education for IT professionals","authors":"Louise Yngström","doi":"10.1016/S0020-7101(96)01235-4","DOIUrl":"10.1016/S0020-7101(96)01235-4","url":null,"abstract":"<div><p>This paper presents some of the difficulties inherent in understanding IT security as a context oriented area when it comes to practicalities. Such attributes have to be included in education and training; here presented through demands put forward by some official international bodies. A short state-of-the-art report is given and an approach to meet stated demands is presented including evaluations performed. Finally there are remarks on future work needed.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 105-113"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01235-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The role of standards in a dynamic area 标准在动态领域中的作用
Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01239-1
Cees P. Louwerse

It proves difficult to achieve a good measure of security in medical informatics applications. A number of reasons for this are analyzed. It is argued, that standardisation will help in solving this problem to a certain extent, but a more complete solution is possible when this is used in close conjunction with legal instruments (e.g. EU directives) and advice of a less strict nature, like guidelines. On the whole, a pragmatic step-by-step approach is needed, although there are signs that the general environment for these developments is improving.

在医学信息学应用中,很难实现良好的安全措施。分析了造成这种情况的一些原因。有人认为,标准化将有助于在一定程度上解决这个问题,但更完整的解决方案是可能的,当它与法律文书(如欧盟指令)和不太严格的性质的建议,如指导方针紧密结合使用。总的来说,需要采取一种务实的循序渐进的办法,尽管有迹象表明这些事态发展的总体环境正在改善。
{"title":"The role of standards in a dynamic area","authors":"Cees P. Louwerse","doi":"10.1016/S0020-7101(96)01239-1","DOIUrl":"10.1016/S0020-7101(96)01239-1","url":null,"abstract":"<div><p>It proves difficult to achieve a good measure of security in medical informatics applications. A number of reasons for this are analyzed. It is argued, that standardisation will help in solving this problem to a certain extent, but a more complete solution is possible when this is used in close conjunction with legal instruments (e.g. EU directives) and advice of a less strict nature, like guidelines. On the whole, a pragmatic step-by-step approach is needed, although there are signs that the general environment for these developments is improving.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 137-141"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01239-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International journal of bio-medical computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1