Investigating risk exposure in e-health systems

被引:11
作者
Croll, Peter R.
Croll, Jasmine
机构
[1] QUT, Informat Secur Inst, Brisbane, Qld 4001, Australia
[2] QUT, Fac Hlth, Brisbane, Qld 4059, Australia
关键词
personal health records; acceptability of health care; public health informatics; e-Health; risk analysis;
D O I
10.1016/j.ijmedinf.2006.09.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose: Health managers, administrators and health practitioners now face new challenges due to the increasing dependency being placed on electronic health information systems. This paper focuses on Electronic Health Records for determining the critical attributes for e-health system development. The proposed QUiPS model aims to provide a framework for building trustworthy solutions by identifying the pertinent issues needed to determine the risk exposure with a given system. Approach: To produce dependable, low risk and viable IT solutions, each critical attribute needs to be specifically addressed and prioritized. It is shown how these attributes possess a number of interdependencies making the analysis and prioritization tasks complex and hence, in practice, often incomplete. Two Australian case studies are presented that access enterprise level applications of live health records where these risk based techniques have been applied. Results: The value and the shortcomings of taking a risk based approach to developing and deploying electronic health information systems that are safe and secure, is evaluated. The case studies presented indicate that traditional methods used to derive the requirements are often inadequate and the risks that are faced in ensuring a safe and secure system are highly application dependent and dynamic. Conclusions: Convergence towards a viable universal solution for our electronic health records is not imminent and trust in e-health is fragile. Policies that data custodians follow need to be flexible and updated on a regular basis. Technological solutions are at best a stop gap to avoid the common hazards associated with access control and secure messaging. A wider range of analysis techniques to determine the key issues for a dependable health information system can derive longer term sustainable solutions. (C) 2006 Elsevier Ireland Ltd. All rights reserved.
引用
收藏
页码:460 / 465
页数:6
相关论文
共 50 条
  • [1] Modeling Blockchain E-health Systems
    Coutinho, Emanuel F.
    Neto, Mauricio M.
    Abreu, Antonio Welligton
    Moreira, Leonardo O.
    Bezerra, Carla I. M.
    Paillard, Gabriel
    de Souza, Jose Neuman
    PROCEEDINGS OF THE 10TH EURO-AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS 2020), 2020,
  • [2] Trust and Reputation in e-Health Systems
    Alboaie, L.
    Buraga, S. C.
    INTERNATIONAL CONFERENCE ON ADVANCEMENTS OF MEDICINE AND HEALTH CARE THROUGH TECHNOLOGY, 2009, 26 : 43 - 48
  • [3] A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems
    Ksibi, Sondes
    Jaidi, Faouzi
    Bouhoula, Adel
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 652 - 657
  • [4] E-HEALTH: FROM SENSORS TO SYSTEMS
    De Micheli, Giovanni
    2015 TRANSDUCERS - 2015 18TH INTERNATIONAL CONFERENCE ON SOLID-STATE SENSORS, ACTUATORS AND MICROSYSTEMS (TRANSDUCERS), 2015, : 3 - 6
  • [5] An authentication framework for e-Health systems
    Al-Nayadi, Fahed
    Abawajy, Jemal H.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 1159 - 1163
  • [6] Increasing security in wireless e-health systems
    Papalambrou, Andreas
    Gialelis, John
    Serpanos, Dimitrios
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 15 - 20
  • [7] Trust assessment of security for e-health systems
    Bahtiyar, Erif
    Caglayan, Mehmet Ufuk
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2014, 13 (03) : 164 - 177
  • [8] Modeling Users' Empowerment in E-Health Systems
    Anshari, Muhammad
    Almunawar, Mohammad Nabil
    Younis, Mustafa Z.
    Kisa, Adnan
    SUSTAINABILITY, 2021, 13 (23)
  • [9] Privacy and security shield for health information systems (e-health)
    Ulieru, M
    Ionescu, D
    IECON 2004 - 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL. 1, 2004, : 496 - 501
  • [10] Privacy and security shield for health information systems (e-health)
    Ulieru, Mihaela
    Ionescu, Dan
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (03): : 215 - 221