2003
DOI: 10.1109/msecp.2003.1193217
|View full text |Cite
|
Sign up to set email alerts
|

Patient privacy in electronic prescription transfer

Abstract: Changing from paper-based systems to digital mechanisms means that personal information becomes more easily accessible and more difficult to control and secure. When the paper-based practice is in a sector such as healthcare, concerns for patient privacy protection are great. In paper-based prescribing in the United Kingdom's National Health Service (NHS), patients are responsible for protecting the privacy of their prescription information while it is in transit from the prescriber to the dispenser. The UK go… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
2

Year Published

2005
2005
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(22 citation statements)
references
References 1 publication
0
20
0
2
Order By: Relevance
“…Financial risk: Information security failures could also lead to financial losses to various stakeholders including patients, providers, and payers arising from fraudulent care and drug charges by organized criminals (Ball et al 2003), the sale of medical identities to illegal immigrants (Messmer 2008), and fraudulent billing for services never received leading to erroneous health records and potential harm to patients (Dixon 2006). Aside such anecdotal evidences, a systematic study of financial risk is in order to guide information security policy development and inform health maintenance organizations as they move toward wider adoption of electronic health records systems.…”
Section: New Directions For Information Security and Privacy Researchmentioning
confidence: 99%
“…Financial risk: Information security failures could also lead to financial losses to various stakeholders including patients, providers, and payers arising from fraudulent care and drug charges by organized criminals (Ball et al 2003), the sale of medical identities to illegal immigrants (Messmer 2008), and fraudulent billing for services never received leading to erroneous health records and potential harm to patients (Dixon 2006). Aside such anecdotal evidences, a systematic study of financial risk is in order to guide information security policy development and inform health maintenance organizations as they move toward wider adoption of electronic health records systems.…”
Section: New Directions For Information Security and Privacy Researchmentioning
confidence: 99%
“…Many case studies focus on a specific market or an organization's use or introduction of a specific technology with privacy implications. For example, case studies have been used to discuss widespread privacy policy violations by US airlines [20], the introduction of PKI-based systems in banks [92], and the introduction of electronic patient records in healthcare IT systems [29].…”
Section: Controlled Experiments and Case Studiesmentioning
confidence: 99%
“…Like medical fraud, it involves fraudulent charges and like financial identity theft, it involves the theft of identity. It is unique in that it involves a medical identity (patient identification, insurance information, medical histories, prescriptions, test results…) that may be used to obtain medical services or prescription drugs (Ball et al 2003). Leaked insurance information can be used to fraudulently obtain service, but unlike a credit card the spending limits are much higher-charges can quickly reach tens of thousands or even millions of dollars.…”
Section: Consequences Of Data Hemorrhagesmentioning
confidence: 99%