Healthcare Data Security Technology: HIPAA Compliance

被引:20
作者
Mbonihankuye, Scholas [1 ]
Nkunzimana, Athanase [2 ,3 ]
Ndagijimana, Ange [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Dept Comp Sci & Technol, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Dept Geog Sci, Nanjing 210044, Peoples R China
[3] Univ Burundi, Dept Geog, POB 5142, Bujumbura, Burundi
关键词
KNOWLEDGE;
D O I
10.1155/2019/1927495
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general. The number of data breaches compromising confidential healthcare data is on the rise. For data security, cloud computing is very useful for securing data. Due to data storage issue, there is a need to use the electronic communication, and a number of methods have been developed for data security technology. Health Insurance Portability and Accountability Act (HIPAA) is one of the methods that can help in healthcare research. On stored database of patient in hospital or clinic, we can develop a conservational and analytical method so as to keep the medical records of the patients in a well-preserved and adequate environment. The method includes the improvement of working possibilities by delivering all the details necessary for the patient. All the information must be identified clearly. The protection of the privacy of the patients and the security of their information are the most imperative obstacles to obtain their intakes when considering the adoption of useful health data in the electronic field of healthcare industries.
引用
收藏
页数:7
相关论文
共 20 条
  • [11] Institut Canadien D'information sur la Sante, 2013, MEILL INF MEILL SANT
  • [12] Security Techniques for the Electronic Health Records
    Kruse, Clemens Scott
    Smith, Brenna
    Vanderlinden, Hannah
    Nealand, Alexandra
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (08)
  • [13] Lu J., 2014, WIRELESS SENSOR NETW, V06, P192, DOI [10.4236/wsn.2014.69019, DOI 10.4236/WSN.2014.69019]
  • [14] Ologeanu-Taddei R., 2017, SYSTEMES INFORM MANA, V22, P3, DOI [10.3917/sim.171.0003, DOI 10.3917/SIM.171.0003]
  • [15] Synthesizing information systems knowledge: A typology of literature reviews
    Pare, Guy
    Trudel, Marie-Claude
    Jaana, Mirou
    Kitsiou, Spyros
    [J]. INFORMATION & MANAGEMENT, 2015, 52 (02) : 183 - 199
  • [16] Cloud computing and trans-border health data: Unpacking US and EU healthcare regulation and compliance
    Seddon, Jonathan J. M.
    Currie, Wendy L.
    [J]. HEALTH POLICY AND TECHNOLOGY, 2013, 2 (04) : 229 - 241
  • [17] BANA: Body Area Network Authentication Exploiting Channel Characteristics
    Shi, Lu
    Li, Ming
    Yu, Shucheng
    Yuan, Jiawei
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1803 - 1816
  • [18] Big Data, Big Knowledge: Big Data for Personalized Healthcare
    Viceconti, Marco
    Hunter, Peter
    Hose, Rod
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2015, 19 (04) : 1209 - 1215
  • [19] Increasing Clinical Presence of Mobile Communication Technology: Avoiding the Pitfalls
    Visvanathan, Akila
    Gibb, Alan P.
    Brady, Richard R. W.
    [J]. TELEMEDICINE AND E-HEALTH, 2011, 17 (08) : 656 - 661
  • [20] Compression artifacts reduction using variational methods:: Algorithms and experimental study
    Weiss, Pierre
    Blanc-Feraud, Laure
    Andre, Thomas
    Antonini, Marc
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1173 - +