Skip to main content

Secure e-Healthcare Information Systems

  • Chapter
Electronic Healthcare Information Security

Part of the book series: Advances in Information Security ((ADIS,volume 53))

  • 1493 Accesses

Abstract

The e-Healthcare information systems (e-HIS) are, by nature, network-based and internet-enabled. In the developed countries, e-HIS typically operate in regional networks and international health management organisations and trusts. Therefore, e-HIS must meet the requirements of new emerging paradigms and international organisational phenomenon. These requirements include the support for distribution, cooperation and communication. However, the success and acceptance of e- HIS may not be guaranteed in the absence of security and privacy service components, incorporation of standards-based interoperability that takes into account the legal, ethical and organisational policy provision. The typical e-HIS are e- Healthcare record systems (EHR systems) and electronic-personal healthcare record systems (EPHR systems). The EHR systems are created, maintained by clinicians and healthcare organisations, while EPHR systems are created, maintained and controlled, at least in theory, by the individual subject of the health information. The concept of the EHRs is fairly older than the concept of EPHR, which is emerging coupled with the patient-centred paradigm. Consequently, the EHR systems are fairly established as compared to EPHR systems which are starting to be introduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • BBC (2008) Palin e-mail hack details emerge. BBC News (Online) Friday, 19 September 2008, news.bbc.co.uk/2/hi/technology/7624809.stm

  • Eddy DM (2005) Evidence-Based Medicine: A Unified Approach. Health Aff 24(1):9–17,DOI 10.1377/hlthaff.24.1.9, content.healthaffairs.org/cgi/content/abstract/24/1/9, http://content.healthaffairs.org/cgi/reprint/24/1/9.pdf

    Article  Google Scholar 

  • Field M, Lohr K (1990) Attributes of good practice guidelines. In: Field M, Lohr K (eds) Clinical Practice Guidelines: Directions for a New Program, National Academy Press, Washington, DC, pp 53–77

    Google Scholar 

  • Greenhalgh T, Wood GW, Bratan T, Stramer K, Hinder S (2008) Patients’ attitudes to the summary care record and healthspace: qualitative study. British Medical Journal 0:1–11, DOI http://doi:10.1136/bmj.a114, www.bmj.com/cgi/reprint/bmj.a114v1(accessed:19October2008)

    Google Scholar 

  • HPP (2008) Health privacy stories. Health Privacy Project August 2008, www.healthprivacy.org/usr-doc/Privacystories.pdf

  • Jensen T, Larsen KH, Kofod-Petersen A (2006) Towards a norwegian implementation of electronic personal health records. In: Kofod-Petersen A, Brasethvik T (eds) Proceedings of the International Symposium on Electronic Personal Health Records 2006 (ISePHR 2006), Trondheim,Norway, September 28, 2006, pp 1–10

    Google Scholar 

  • Mandl KD, Simons WW, Crawford WCR, Abbett JM (2007) Indivo: a personally controlled health record for health information exchange and communication. BMC Medical Informatics and Decision Making 7:25, DOI 1472-6947-7-25, pMID: 17850667

    Article  Google Scholar 

  • Perreault L, Metzger J (1999) A pragmatic framework for understanding clinical decision support. Journal of Healthcare InformationManagement 13(2):5 – 12

    Google Scholar 

  • Sax U, Kohane I, Mandl KD (2005) Wireless technology infrastructures for authentication of patients: Pki that rings. Journal of the American Medical Informatics Association: JAMIA 12(3):263–8, DOI M1681, pMID: 15684133

    Article  Google Scholar 

  • Shortliffe E (1986) Medical expert systems knowledge tools for physicians. Western Journal of Medicine 145:830 – 839

    Google Scholar 

  • Wyatt J, Spiegelhalter D (1991) Know-Based Systems in Medicine, Applications and Evaluation, Heidelberg: Springer Verlag, chap Evaluatingmedical expert systems: what to test, and how?, pp 274 –290

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Shoniregun, C.A., Dube, K., Mtenzi, F. (2010). Secure e-Healthcare Information Systems. In: Electronic Healthcare Information Security. Advances in Information Security, vol 53. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-84919-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-84919-5_4

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-84817-4

  • Online ISBN: 978-0-387-84919-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics