International journal of bio-medical computing最新文献

筛选
英文 中文
Data security and patient confidentiality: the manager's role 数据安全和病人保密:管理者的角色
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01236-6
Fleur Fisher , Bruce Madge
{"title":"Data security and patient confidentiality: the manager's role","authors":"Fleur Fisher ,&nbsp;Bruce Madge","doi":"10.1016/S0020-7101(96)01236-6","DOIUrl":"10.1016/S0020-7101(96)01236-6","url":null,"abstract":"<div><p>The maintenance of patient confidentiality is of utmost importance in the doctor patient relationship. With the advent of networks such as the National Health Service Wide Area Network in the UK, the potential to transmit identifiable clinical data will become greater. Links between general practitioners (GPs) and hospitals will allow the rapid transmission of data which if intercepted could be potentially embarrassing to the patient concerned. In 1994 the British Medical Association launched a draft bill on privacy and confidentiality and in association with this bill it is pushing for encryption of all clinical data across electronic networks. The manager's role within an acute hospital, community units and general practice, is to ensure that all employees are aware of the principles of data protection, security of hospital computer systems and that no obvious breaches of security can occur at publicly accessible terminals. Managers must be kept up to date with the latest developments in computer security such as digital signatures and be prepared to instigate these developments where practically possible. Managers must also take responsibility for the monitoring of access to terminals and be prepared to deal severely with staff who breach the code of confidentiality. Each manager must be kept informed of employees status with regard to their ‘need to know’ clearance level and also to promote confidentiality of patient details throughout the hospital. All of the management team must be prepared to train new staff in the principles of data security as they join the organisation and recognise their accountability if the programme fails. Data security and patient confidentiality is a broad responsibility in any healthcare organisation, with the Chief Executive accountable. In family practice, the partners are responsible and accountable. The British Medical Association believes as a matter of policy, that allowing access to personal health data without the patients consent, except in a legally allowable situation, should be a statutory offence.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 115-119"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01236-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cryptographic protection of health information: cost and benefit 健康信息的加密保护:成本与收益
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01228-7
Joachim Biskup, Gerrit Bleumer
{"title":"Cryptographic protection of health information: cost and benefit","authors":"Joachim Biskup,&nbsp;Gerrit Bleumer","doi":"10.1016/S0020-7101(96)01228-7","DOIUrl":"10.1016/S0020-7101(96)01228-7","url":null,"abstract":"<div><p>Medical, legal, and economic reasons inevitably force health care establishments to apply more and more open distributed IT systems rather than the less flexible and more expensive mainframes. Managing, for example, electronic patient records by various users at different locations by means of large scale client-server systems requires new security provisions for storing, archiving and communicating those data. Using an analogy, data processing is being changed from railroads to highways. Formerly, only one engine-driver was responsible for the security of a whole train, whereas now the car-drivers themselves are responsible each for his own car. Unless the cars are equipped with suitable security mechanisms like breaks and safety belts this change endangers individuals within and outside the cars. Cryptography provides many of the relevant security mechanisms for open distributed health care IT systems. Indeed, suitable cost effective cryptographic products are available but are rarely found in health care IT systems. The reason is more political than economic: diverging national security interests in the EU have prevented strong security in public telecommunication infrastructures arguing that, e.g. criminals would profit, too. The resulting uncertainty of investments delays the development, standardisation and installation of cryptographic solutions.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 61-67"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01228-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The use of personal health information for controlling the costs of delivering health care: does the end justify the means? 使用个人健康信息来控制提供医疗保健的成本:目的是否证明手段是正当的?
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01231-7
Francois-André Allaert
{"title":"The use of personal health information for controlling the costs of delivering health care: does the end justify the means?","authors":"Francois-André Allaert","doi":"10.1016/S0020-7101(96)01231-7","DOIUrl":"10.1016/S0020-7101(96)01231-7","url":null,"abstract":"<div><p>With the increasing costs of medical care many countries are seeking ways of controlling costs. Two approaches are discussed; the accounting control of costs and the medicalised control of costs. The former provides a very blunt and insensitive instrument while the latter can support best practice and reduce unnecesssary examinations. However, the medicalised approach requires limited access to the patients' medical files thus breaching the medical secret. The paper discusses the strict controls necessary to make this approach work in an acceptable fashion.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 79-82"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01231-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Socio-technical aspects of the use of health related personal information for management and research 使用与健康有关的个人信息进行管理和研究的社会技术方面
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01232-9
Kenneth R. Iversen, Tor Olav Grøtan
{"title":"Socio-technical aspects of the use of health related personal information for management and research","authors":"Kenneth R. Iversen,&nbsp;Tor Olav Grøtan","doi":"10.1016/S0020-7101(96)01232-9","DOIUrl":"10.1016/S0020-7101(96)01232-9","url":null,"abstract":"<div><p>This paper focuses on the organisational, technical and ethical aspects related to the use of person identifiable health information for various health care management, administration, finance, research and educational purposes. It is based on the ethical standpoint that to the individuals in question, the identifiable health information represents the uttermost sensitive and critical information. In addition, nobody, possibly apart from the patients themselves, may claim ownership of such information. Thus identifiable health information should be (per individual) kept as collected and protected as possible, within the scope of the patient provider relationship. Identifiable health information should, whenever possible and reasonable, be restricted to the health care professionals providing the treatment and care to the patient, and only be made available to others, e.g. for management, research or educational purposes, either in anonymous or pseudonymous form. Secure information management (SIM) is presented as the socio-technical means to facilitate our ethical standpoint in a practical health care environment.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 83-91"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01232-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Control and use of information, seen from a nurse's perspective 从护士的角度看信息的控制和使用
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01223-8
Elly S.P. Pluyter-Wenting
{"title":"Control and use of information, seen from a nurse's perspective","authors":"Elly S.P. Pluyter-Wenting","doi":"10.1016/S0020-7101(96)01223-8","DOIUrl":"10.1016/S0020-7101(96)01223-8","url":null,"abstract":"<div><p>This paper deals with the impact of information technology used in nursing with special regard to confidentiality, integrity and availability. A brief overview is given of the current value and usage of information systems by nurses. This is followed by recommendations for the increase of awareness regarding proper use of IT systems in (A) the direct environment of patients, and (B) the secure communication between health professionals and institutions.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 27-32"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01223-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Professional ethics as basis for legal control of health care information 职业道德是医疗信息法律控制的基础
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01224-X
Eike-Henner W. Kluge
{"title":"Professional ethics as basis for legal control of health care information","authors":"Eike-Henner W. Kluge","doi":"10.1016/S0020-7101(96)01224-X","DOIUrl":"10.1016/S0020-7101(96)01224-X","url":null,"abstract":"<div><p>The development of uniform, ethical and internationally enforceable standards for handling computerised electronic patient records is a major requirement for the implementation of the next generation of health information systems. This paper develops a model code of ethics to address this issue.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 33-37"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01224-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The networking between hospital and health centre 医院和保健中心之间的联网
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01230-5
Tapio Tervo
{"title":"The networking between hospital and health centre","authors":"Tapio Tervo","doi":"10.1016/S0020-7101(96)01230-5","DOIUrl":"10.1016/S0020-7101(96)01230-5","url":null,"abstract":"<div><p>Health care providers, purchasers, and insurers try to manage the costs while maintaining the quality of the care. In the Hospital District of Central Finland we based our plans on the following values: life worth living, justice, truth, responsibility, equality, relationship, and commitment. Most of these values mean responsibility for the patient. At the same time they tell of the ethical basis of our regional networking between hospitals and health centres.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 75-76"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01230-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communicating Health Information in an Insecure World. Proceedings of IMIA Working Group 4 Working Conference. Helsinki, Finland, September 30-October 3, 1995. 在不安全的世界中沟通健康信息。IMIA第四工作组工作会议记录。芬兰赫尔辛基,1995年9月30日至10月3日。
{"title":"Communicating Health Information in an Insecure World. Proceedings of IMIA Working Group 4 Working Conference. Helsinki, Finland, September 30-October 3, 1995.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1-2","pages":"1-152"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"20001708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security training and education for IT professionals 为IT专业人员提供安全培训和教育
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01235-4
Louise Yngström
{"title":"Security training and education for IT professionals","authors":"Louise Yngström","doi":"10.1016/S0020-7101(96)01235-4","DOIUrl":"10.1016/S0020-7101(96)01235-4","url":null,"abstract":"<div><p>This paper presents some of the difficulties inherent in understanding IT security as a context oriented area when it comes to practicalities. Such attributes have to be included in education and training; here presented through demands put forward by some official international bodies. A short state-of-the-art report is given and an approach to meet stated demands is presented including evaluations performed. Finally there are remarks on future work needed.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 105-113"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01235-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The role of standards in a dynamic area 标准在动态领域中的作用
International journal of bio-medical computing Pub Date : 1996-10-01 DOI: 10.1016/S0020-7101(96)01239-1
Cees P. Louwerse
{"title":"The role of standards in a dynamic area","authors":"Cees P. Louwerse","doi":"10.1016/S0020-7101(96)01239-1","DOIUrl":"10.1016/S0020-7101(96)01239-1","url":null,"abstract":"<div><p>It proves difficult to achieve a good measure of security in medical informatics applications. A number of reasons for this are analyzed. It is argued, that standardisation will help in solving this problem to a certain extent, but a more complete solution is possible when this is used in close conjunction with legal instruments (e.g. EU directives) and advice of a less strict nature, like guidelines. On the whole, a pragmatic step-by-step approach is needed, although there are signs that the general environment for these developments is improving.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 137-141"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01239-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信