993 resultados para Patient privacy


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays the use of information and communication technology is becoming prevalent in many aspects of healthcare services from patient registration, to consultation, treatment and pathology tests request. Manual interface techniques have dominated data-capture activities in primary care and secondary care settings for decades. Despites the improvements made in IT, usability issues still remain over the use of I/O devices like the computer keyboard, touch-sensitive screens, light pen and barcodes. Furthermore, clinicians have to use several computer applications when providing healthcare services to patients. One of the problems faced by medical professionals is the lack of data integrity between the different software applications which in turn can hinder the provision of healthcare services tailored to the needs of the patients. The use of digital pen and paper technology integrated with legacy medical systems hold the promise of improving healthcare quality. This paper discusses the issue of data integrity in e-health systems and proposes the modelling of "Smart Forms" via semiotics to potentially improve integrity between legacy systems, making the work of medical professionals easier and improve the quality of care in primary care practices and hospitals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in building automation, healthcare and agriculture. In the EU project Hydra1 highlevel security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios especially in the user domains of building automation, healthcare, and agriculture. This paper gives a short introduction to the Hydra project, its user domains and its approach to ensure security by design. Based on the results of a focus group analysis of the building automation domain typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta Model. How concepts such as context security, semantic security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.