The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information technology is increasingly being used in healthcare paramedic sector with the goal to improve management of resources and enhance medical services to save lives. In this paper, we introduce EMTriage, a distributed Android application with the ability to access patients EHR's, and depending on the data and inputs, assess and distribute an acuity level to patients in need of resources. We...
With the evolution of digital services, data protection & security have become cruical areas and companies that offer digital services must have defined processes for these. These companies face pressures from: (i) people who are concerned about data being held about them, (ii) risk of cyber attacks that allows unauthorized data access, (iii) regulatory requirements from governments and (iii)...
In distributed systems, there is often a need to combine the heterogeneous access control policies to offer more comprehensive services to users in the local or national level. A large scale healthcare system is usually distributed in a computer network and might require sophisticated access control policies to protect the system. Therefore, the need for integrating the electronic healthcare systems...
The last few years, significant advances provide better solutions for interconnectivity and security in Intelligent Buildings (IBs). An overview of these advances is presented in this paper. Also, in this paper, we presented a patient monitoring system for hospital buildings and a Building Management System (BMS) layered design. Then, we made a comparative analysis of our system over other similar...
Sustainable technology means technology is capable of being maintained over a long span of time; independent of shifts in both hardware and software. Effective implementation and use of Health information Systems (HIS) for years to come is crucial as sustainable HIS. Numbers of studies have discussed various factors contributes towards barriers for successful implementation of HIS. However, very few...
Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and...
The healthcare network can be seen as a cyber-physical system where interconnected physical systems uses cyber technologies to interact and function. Because of the increasing complexity of the healthcare system new vulnerabilities appear in terms of security. In this article, we present the challenges of cyber security in healthcare and cyber-attacks classification based on their targeted security...
In this paper, we combine a framework for ethical requirement elicitation eFRIEND with automated reasoning. To provide trustworthy and secure IoT for vulnerable users in healthcare scenarios, we need to apply ethics to arrive at suitable system requirements. In order to map those to technical system requirements, we employ high level logical modeling using dedicated Isabelle frameworks for (1) infrastructures...
Recent developments in Internet of Things (IoT) technologies have already put a huge impact on the medical and health sector. Thus, the patient treatment can be performed in more efficient ways compared with traditional methods. Secure identification is a key system requirement for patients to acquire these health related services. Fast and convenient identification is important in the case of critical...
As technological advances make strides into many fields, including that of healthcare, the onus is on us to take advantage of these. Technology has been adopted by the healthcare industry since long; however, it retains a secondary role as far as patient data management and connectivity is concerned. The aim of this paper is to devise a novel architecture and framework to make available the patient...
This paper mainly introduces the design and implementation of the resident workstation of the mobile hospital information system (HIS). The main contributions include needs analysis, system design, implementation and test according to the current needs of the hospital business. The system uses Client/Server (C/S) architecture with three layers, they are the presentation layer, business logic layer...
This paper presents a qualitative study which provides an in-depth understanding of the Cloud Computing adoption decision-making process in healthcare organisations in Saudi Arabia. The paper discusses the factors which will affect Cloud Computing decision making process in Saudi Arabia. The findings of the study showed that the factors affecting Cloud Computing adoption can be divided into five main...
This paper introduce a geographic information is present on the internet which is in the scattered format. When user search for any place then various locations based service providers find out the results. The commonly used location based service providers are Google, Bing, Yahoo etc. we considers a novel distributed system for collaborative location-based information generation and sharing which...
Applications in the Internet of Things offer many benefits and risks. Poor design, unplanned interconnections, and human adversaries raise the stakes and liabilities for systems designers. Early identification, mitigation, and prevention of these threats can help limit liability issues.
Knowledge discovery from various health data repositories requires the incorporation of healthcare data from diversified sources. Maintaining record linkage during the integration of medical data is an important research issue. Researchers have given different solutions to this problem that are applicable for developed countries where electronic health record of patients are maintained with identifiers...
A computerized brain database management system is designed and implemented to replace the existing traditional largely hand-recorded system in the radiological department of selectsd hospitals in Malaysia. The new system provides easy access to patient registration, diagnosis, and appointment. It can also collect, calculate and plot statistical data. Thus, it is a useful research tool. The system...
Radio Frequency Identification Device (RFID) technology use in health care services has been shown to save lives, prevents errors, save costs and increases security. Implementation of RFID technology has been challenged with high implementation costs, substantial gap between technology implementation costs and the RFID-enabled benefits, lack of common standard of usage/data analysis and low operational...
Lean maintenance is a new thinking looking for ways to reduce maintenance costs by focusing on adding value operations. Healthcare logistics aims also to minimize costs of several functions including maintenance. In that context, this paper intends to show the impact of lean and logistics on maintenance in hospitals. For that, the first part describes the interest of the Lean and logistics on maintenance...
In recent years, the electronic medical records can be easily stored with the rapid development of healthcare technology and cloud computing. However, the patient's medical information security is currently concern issue. Despite of many literatures discussed about it, these literatures still face many security challenges. Therefore, we propose an authentication scheme based on cloud environment....
In the Medical world, one of the new goals is to pay attention to the patient safety. The surveillance of medical devices is called Technovigilance. Several laws exist in the world to apply those rules in hospitals, institutions or industry. The objective is to prevent the recurrence of adverse incidents and risks of serious incidents involving medical devices and to take preventive and corrective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.