The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the field research data of more than 20 counties and cities in Anhui Province, the empirical test is carried out for the utilization status of different groups of medical services by seemingly unrelated regression model. The study shows that there is a high similarity between the agricultural registered population and the urban flexible employed population in the medical service utilization...
Binding technology to healthcare domain for simplifying the process of symptom detection and reliable methods of treatment has attracted vast research. Predictive analysis and recommendation systems have proved noteworthy for symptom detection and have been able to revolutionize healthcare at a very large scale. Our team envisions a web application as the basis of our project inclined towards building...
Health Information is considered the most sensitive information associated to an individual. Even though numerous suitable policies, guidelines, and compliance requirements are in place to safeguard health information, privacy and security breach remains key issues for electronic healthcare systems. In this paper we focus on these issues and propose a security and privacy model implemented in Methodist...
There are many potential security risks associated with viewing, accessing, and storage of DICOM files on mobile devices. Digital Imaging and Communications in Medicine (DICOM) is the industry standard for the communication and management of medical imaging. DICOM files contain multidimensional image data and associated meta-data (e.g., patient name, date of birth, etc.) designated as electronic protected...
The combination of cloud computing and telemedicine introduces new opportunities for transforming healthcare delivery in a more effective and sustainable manner. A number of telemedicine applications have been investigated and developed on the cloud, such as telemonitoring and teleconsultation, all of which fully demonstrate the potential of telemedicine in promoting more affordable and higher quality...
Various health care devices owned by either hospitals or individuals are producing huge amount of health care data. The big health data may contain valuable knowledge and new business opportunities. Obviously, cloud is a good candidate to collect, store and analyse such big health care data. However, health care data is very sensitive for its owners, and thus should be well protected on cloud. This...
With the advancement in technology and availability of internet access and smart mobile systems, there has been an increasing interest in eHealth related research activities due to the attractive and important benefits that eHealth systems can offer to many. However, the security of the eHealth systems has been a great concern. In this paper, we discuss the pilot design experience and results of a...
The number of security incidents is still increasing. The re-occurrence of past breaches shows that lessons have not been effectively learned across different organisations. This illustrates important weaknesses within information security management systems (ISMS). The sharing of recommendations between public and private organisations has, arguably, not been given enough attention across academic...
This paper presents an overview of HIPAA and ARRA HITECH legislation and its impacts on the implementation of security in Electronic Health Records systems (EHRs). Best practices for EHR system security to aid in legal compliance are discussed.
The authors are engaged in on-going research on the functionality of Electronic Health Records (EHR) software, and challenges doctors and nurse practitioners face when they migrate from paper to electronic-based record keeping. Our goal is to assist small practices in the adoption of EHR software and in the optimization of their clinical and practice management functions. In this paper, we discuss...
The emergence and advancement in Information and Communication Technology (ICT), initiated a promising revolution to healthcare. Healthcare Organizations are willing to coordinate and collaborate regarding patient information for better and in time services because health is a critical issue and require urgent focus. In this paper, a case study in Sweden is conducted including interviews and survey...
In this paper, we present “HealthKiosk”, a family-based healthcare system, to provide rich contextual information and alerting mechanisms for continuous monitoring of health conditions. HealthKiosk significantly improves the reach and quality of regional and community healthcare services, and could potentially minimize the efforts of care professionals for the chronical illness, not only applicable...
A smart start program decision making system based on power system integrated data platform is introduced in this paper. The data platform of the power system is integrated with EMS, GIS, DAS as well as MIS for protective relaying, which abbeys IEC61970. Many obstacles are conquered with all of the new techniques, which will be described in detail.
Korea power exchange (KPX) plays a pivotal role in South Korea's electric power industry. As a neutral and independent organization, KPX coordinates the flow of electricity through all transmission networks of South Korea, ensure reliable operation of the grid, operate cost-based competitive electricity market, and plan long-term generation/transmission expansion to secure reliable power supply. To...
Java is a kind of type-safe language, it introduces access control mechanism into bytecode and application layer, so as to guarantee the system resource and running environment avoid the invasion of the malicious code. However, in some information systems, information leakage is not due to the faultiness of the security model, but the absence of the information flow control policy and implementation...
The paper describes a service engineering modeling of the integration of a parking guidance system (PGS) services with an electronic health record (EHR) system. The integrated system provides services for two groups of healthcare users: (1) patients who need urgent care, and (2) healthcare providers who perform emergency operations. By entering a zip code and basic patient data, the system would return...
The research project aims at designing and implementing a Web based wireless mobile system security and privacy framework that is centered on the concepts of ubiquitous healthcare services provided to the patients in rural or remote areas from distant hospitals. With this system framework, a physician can securely access and carry the patient information from a mobile device, update the patient information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.