高质量证据,高质量决策:提高电子病历系统安全性和隐私性的方法

Hamzah Osop, T. Sahama
{"title":"高质量证据,高质量决策:提高电子病历系统安全性和隐私性的方法","authors":"Hamzah Osop, T. Sahama","doi":"10.1109/HealthCom.2016.7749424","DOIUrl":null,"url":null,"abstract":"The readily available and accessible large collection of electronic health records has encouraged an increasing interest on its secondary use. It is especially true for the approach of practice-based evidence where the secondary use of EHR data, collected during routine care, has the potential to improve healthcare professionals' decision-making capabilities and effectiveness, and broadens their knowledge regarding treatments, medications and clinical conditions. Through effective and quality decision-making, healthcare professionals are able to deliver care that positively improves patient health outcomes in a cost-effective and safe manner. However, privacy and security breaches potentially impact the integrity of data captured in electronic health records, and this invalidates its perceived usefulness in providing evidence to support care. In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of preventive, detective and corrective control. Within each control, different security solutions are recommended so that security design is truly holistic.","PeriodicalId":167022,"journal":{"name":"2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Quality evidence, quality decisions: Ways to improve security and privacy of EHR systems\",\"authors\":\"Hamzah Osop, T. Sahama\",\"doi\":\"10.1109/HealthCom.2016.7749424\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The readily available and accessible large collection of electronic health records has encouraged an increasing interest on its secondary use. It is especially true for the approach of practice-based evidence where the secondary use of EHR data, collected during routine care, has the potential to improve healthcare professionals' decision-making capabilities and effectiveness, and broadens their knowledge regarding treatments, medications and clinical conditions. Through effective and quality decision-making, healthcare professionals are able to deliver care that positively improves patient health outcomes in a cost-effective and safe manner. However, privacy and security breaches potentially impact the integrity of data captured in electronic health records, and this invalidates its perceived usefulness in providing evidence to support care. In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of preventive, detective and corrective control. Within each control, different security solutions are recommended so that security design is truly holistic.\",\"PeriodicalId\":167022,\"journal\":{\"name\":\"2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HealthCom.2016.7749424\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HealthCom.2016.7749424","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

电子健康记录的大量可用性和可访问性促使人们对其二次使用越来越感兴趣。对于基于实践的证据方法尤其如此,在这种方法中,在常规护理期间收集的电子病历数据的二次使用有可能提高医疗保健专业人员的决策能力和有效性,并拓宽他们对治疗、药物和临床条件的了解。通过有效和高质量的决策,医疗保健专业人员能够以具有成本效益和安全的方式提供积极改善患者健康结果的护理。然而,隐私和安全漏洞可能会影响电子健康记录中捕获数据的完整性,从而使其在提供支持护理的证据方面的可用性失效。为了设计一个安全有效的电子病历系统,采用基于实践的证据方法,隐私和安全措施的建议可以遵循预防、侦查和纠正控制的安全控制协议。在每个控件中,都推荐了不同的安全解决方案,从而使安全设计真正具有整体性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Quality evidence, quality decisions: Ways to improve security and privacy of EHR systems
The readily available and accessible large collection of electronic health records has encouraged an increasing interest on its secondary use. It is especially true for the approach of practice-based evidence where the secondary use of EHR data, collected during routine care, has the potential to improve healthcare professionals' decision-making capabilities and effectiveness, and broadens their knowledge regarding treatments, medications and clinical conditions. Through effective and quality decision-making, healthcare professionals are able to deliver care that positively improves patient health outcomes in a cost-effective and safe manner. However, privacy and security breaches potentially impact the integrity of data captured in electronic health records, and this invalidates its perceived usefulness in providing evidence to support care. In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of preventive, detective and corrective control. Within each control, different security solutions are recommended so that security design is truly holistic.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A hybrid quality evaluation approach based on fuzzy inference system for medical video streaming over small cell technology Mobile self-management application for COPD patients with comorbidities: A usability study A hierarchical lazy smoking detection algorithm using smartwatch sensors Analysis of thigh cross-sectional proportion using the portable ultrasound imaging system Computer-aided diagnosis in medical imaging: Review of legal barriers to entry for the commercial systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1