Healthcare Data Security Technology: HIPAA Compliance

被引:20
作者
Mbonihankuye, Scholas [1 ]
Nkunzimana, Athanase [2 ,3 ]
Ndagijimana, Ange [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Dept Comp Sci & Technol, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Dept Geog Sci, Nanjing 210044, Peoples R China
[3] Univ Burundi, Dept Geog, POB 5142, Bujumbura, Burundi
关键词
KNOWLEDGE;
D O I
10.1155/2019/1927495
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general. The number of data breaches compromising confidential healthcare data is on the rise. For data security, cloud computing is very useful for securing data. Due to data storage issue, there is a need to use the electronic communication, and a number of methods have been developed for data security technology. Health Insurance Portability and Accountability Act (HIPAA) is one of the methods that can help in healthcare research. On stored database of patient in hospital or clinic, we can develop a conservational and analytical method so as to keep the medical records of the patients in a well-preserved and adequate environment. The method includes the improvement of working possibilities by delivering all the details necessary for the patient. All the information must be identified clearly. The protection of the privacy of the patients and the security of their information are the most imperative obstacles to obtain their intakes when considering the adoption of useful health data in the electronic field of healthcare industries.
引用
收藏
页数:7
相关论文
共 20 条
  • [1] Appari Ajit, 2010, International Journal of Internet and Enterprise Management, V6, P279, DOI 10.1504/IJIEM.2010.035624
  • [2] April R., 2003, SEARCH, V502, P2002
  • [3] Austin J.L., 1962, PHILOS PAP
  • [4] Bagula A., 2012, APPL WIRELES SENSOR
  • [5] Data B., 2015, ISCIDE, V9243, P1
  • [6] Information system security management in the new millennium
    Dhillon, G
    Backhouse, J
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (07) : 125 - 128
  • [7] How I learned to stop worrying and love the hackers
    Diana, Carla
    [J]. Interactions, 2008, 15 (02) : 46 - 49
  • [8] FLYVERBOM M, 2017, BUSINESS SOC, V58, P3, DOI DOI 10.1177/0007650317727540
  • [9] Gomez P., 2011, REV FRANCAISE GESTIO, V37, P107, DOI [10.3166/RFG.214.107-125, DOI 10.3166/RFG.214.107-125]
  • [10] HILL K., 2012, FORBES INC, V7, P4