2023
DOI: 10.1007/s10389-022-01795-z
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in electronic health records: a systematic mapping study

Abstract: Main Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 71 publications
0
13
0
1
Order By: Relevance
“…To realize such a comprehensive treatment management tool, several challenges must be addressed. Primarily, integrating patient data from diverse sources, particularly diagnostic and treatment tools, necessitates strict compliance with data privacy regulations. , Ensuring the security of this sensitive health information is vital to safeguarding patient privacy. Within this context, it is imperative to clearly define data ownership and sharing protocols among stakeholders including patients, providers, and researchers.…”
Section: Resultsmentioning
confidence: 99%
“…To realize such a comprehensive treatment management tool, several challenges must be addressed. Primarily, integrating patient data from diverse sources, particularly diagnostic and treatment tools, necessitates strict compliance with data privacy regulations. , Ensuring the security of this sensitive health information is vital to safeguarding patient privacy. Within this context, it is imperative to clearly define data ownership and sharing protocols among stakeholders including patients, providers, and researchers.…”
Section: Resultsmentioning
confidence: 99%
“…After conducting the classiőcation, we purposefully proceeded to the design phase of our SRA to enhance the privacy and security requirements in the EHRs. Furthermore, we considered the main components and connections between them discovered through the systematic mapping study [10]. Therefore, concepts from software architecture design methods were used to establish and document this SRA.…”
Section: Designing Sramentioning
confidence: 99%
“…Whereas the privacy layer contains the modules: Access Control, Emergency Access, Consent, and Anonymization. Hence, these requirements provide privacy for EHR users [10].…”
Section: Layered Viewmentioning
confidence: 99%
“…Healthcare users, IoMT devices, and SHSs must all be verified using robust methods [99]. According to Da Silva et al [159] and Alzu'bi et al [160], authentication-based techniques are methods and technologies used to verify healthcare users' credentials against data stored in the system database and determine if the credentials match, ensuring that only authorized users have access to sensitive healthcare data and services. To prevent medical information from being disclosed to unauthorized entities, healthcare users and IoMT devices must be authenticated in SHSs [139].…”
Section: Authentication-based Techniquesmentioning
confidence: 99%