4th International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine, 2003.
DOI: 10.1109/itab.2003.1222486
|View full text |Cite
|
Sign up to set email alerts
|

Towards a practical healthcare information security model for healthcare institutions

Abstract: In recent years, a number of countries have introduced plans for national electronic patient record (EPR) systems. This paper argues that, in the near future, both patients and healthcare stakeholders will be able to access medical records from WWW-based EPR systems. We contend that the primary impediment to the successful implementation and widespread uptake of the EPR concept is the fact that current healthcare information security (HIS) applications are not sufficiently robust. This paper identifies two mai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 1 publication
0
18
0
Order By: Relevance
“…The implemented system has to be assessed in order to validate that it complies with the functional and security requirements and that it will operate within an acceptable level of residual security [Kissel et al, 2008]. Prior research on implementation in both the healthcare IT and ubiquitous device security has concentrated on the technical aspects of implementation of technologies [Dwivedi, Bali, Belsis, Naguib, et al, 2003;Epstein, Pasieka, Lord, Wong, et al, 1998;Hu and Weaver, 2004;Kardas and Tunali, 2006;Ng et al, 2006].…”
Section: Methodsmentioning
confidence: 99%
“…The implemented system has to be assessed in order to validate that it complies with the functional and security requirements and that it will operate within an acceptable level of residual security [Kissel et al, 2008]. Prior research on implementation in both the healthcare IT and ubiquitous device security has concentrated on the technical aspects of implementation of technologies [Dwivedi, Bali, Belsis, Naguib, et al, 2003;Epstein, Pasieka, Lord, Wong, et al, 1998;Hu and Weaver, 2004;Kardas and Tunali, 2006;Ng et al, 2006].…”
Section: Methodsmentioning
confidence: 99%
“…An important aspect to take into account when building the model for the HIV management system is security. Dwivedi et al [58] argued that electronic medical records will only become a reality if security takes a prominent role in design considerations and during implementation. Two of the most promising techniques for incorporating security into any information system are public key infrastructure and biometrics.…”
Section: Methodsmentioning
confidence: 99%
“…Healthcare IT security research also has focused predominantly on the technical aspects of healthcare IT system implementation [Dwivedi, Bali, Belsis, Naguib, et al, 2003;Epstein, Pasieka, Lord, Wong, et al, 1998;Hu and Weaver, 2004;Kardas and Tunali, 2006;Ng, Sim, and Tan, 2006]. Some work also has been done in the area of maintenance of healthcare IT systems for security reasons.…”
Section: Information Security In Healthcarementioning
confidence: 99%