Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

A Security based Framework for Interoperability of Healthcare Systems

Iroju Olaronke, Ikono Rhoda Published in Security

International Journal of Applied Information Systems
Year of Publication: 2013
© 2012 by IJAIS Journal
10.5120/ijais13-451008
Download full text
  1. Iroju Olaronke and Ikono Rhoda. Article: A Security based Framework for Interoperability of Healthcare Systems. International Journal of Applied Information Systems 6(2):23-31, September 2013. BibTeX

    @article{key:article,
    	author = "Iroju Olaronke and Ikono Rhoda",
    	title = "Article: A Security based Framework for Interoperability of Healthcare Systems",
    	journal = "International Journal of Applied Information Systems",
    	year = 2013,
    	volume = 6,
    	number = 2,
    	pages = "23-31",
    	month = "September",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

The healthcare domain requires the seamless, secured and meaningful exchange of health related information for effective and efficient patient care. These information are highly sensitive and they are meant to be highly confidential. However, health related information are usually distributed across several heterogeneous and autonomous healthcare systems which makes the interoperability process prone to abuse, medical fraud, inappropriate disclosure of patients' information for secondary purposes by unauthorized persons and misuse. The effects of inadequate security and privacy in healthcare include monetary penalties, loss of revenue, damage to the healthcare system reputation, risk of receiving less information for optimum care, decreased quality of patients' care as well as threat to patients' lives. Consequently, effective information protection within the healthcare domain is highly significant. Hence, this paper examines the security and privacy policies that safeguard sensitive and confidential information in healthcare systems during the exchange and use of vital health information. The paper also proposes a security based framework that seeks to mitigate security risks in healthcare, and thus protect the integrity, confidentiality, and access to health related information.

Reference

  1. Iroju O. Soriyan A. Gambo I. and Olaleke J. 2013. Interoperability in healthcare: benefits, challenges and resolutions. International journal of innovation and applied studies, 3 (Mar, 2013), 262-270.
  2. Moen W. E. 2001. The metadata approach to accessing government information. Government Information Quarterly, 155-165.
  3. Heubusch K. 2006. Interoperability: What it means, why it matters. Journal of AHIMA, 26-30.
  4. Yum K. K. and Drogemuller R. 2002. How much interoperability can be achieved for the construction industry today. INCITE World IT for design and construction, Hong Kong.
  5. Trans Atlantic Consumer Dialogue, 2008. Resolution on software interoperability and open standards. Trans Atlantic Consumer Dialogue, 1-6.
  6. Institute of Electrical and Electronics Engineers Standard Computer Dictionary, 1999. A Compilation of IEEE Standard Computer Glossaries, Institute of Electrical and Electronics Engineers, USA.
  7. Semantic Health Report, 2007. Semantic interoperability deployment and research roadmap. European Commission of Information Society and Media, USA.
  8. Ai, J. and Ahlfors, L. 2012. Interoperability of electronic medical records, department of informatics. Lund University.
  9. McGovern, J. , Sims , O. , Jain A. and Little M. 2006. Enterprise service oriented architectures, concepts challenges, recommendations. Springer.
  10. Khan W. A. , Hussain M. , Latif K. , Afzal M. , Ahmad F. and Lee. S. 2013. Process interoperability in healthcare systems,. Springer-Verlag Wien, 1-26.
  11. Cooper T. and Collman J. 2006. Managing information security and privacy in healthcare data mining state of the art. Department of Ophthalmology, Stanford University Medical School, Palo Alto, California.
  12. Renner S. A. 2001. A community of interest approach to data interoperability. Federal Database Colloquium, San Diego, 1-7.
  13. Laurinda B. H. , Flite C. A. , and Bond K. . 2012. Electronic health records: privacy, confidentiality, and security. American Medical Association Journal of Ethics, USA, 712-719.
  14. Ingenix white paper, 2010. Security is not privacy: why current hit provisions may fail, http://www. ingenix. com/content/attachments/Ingenix_Security-is-Not-Privacy-WhtPaper%20June%202010. pdf,.
  15. Appari, A. and Johnson, M. E. 2008. Information Security and Privacy in Healthcare: Current State of Research Center for Digital Strategies Tuck School of Business Dartmouth College, Hanover.
  16. Keckley,P. H. 2010. Privacy And Security In Health Care: A Fresh Look. Deloitte Center for Health Solutions, USA.
  17. Ponemon Institute, 2010. Preventative care, proactive response. Mission College Boulevard Santa Clara, USA.
  18. HIMSS Analytics Report, 2009. Evaluating HITECH's impact on healthcare privacy and security," Retrieved from:http://www. himssanalytics. org/docs/ID_Experts_111509. pdf.
  19. US Department of Health and Human Services. 2011. "University of California settles HIPAA privacy and security case involving UCLA Health System facilities", Retrieved from: http://www. hhs. gov/news/press/2011pres/07/20110707a. html.
  20. Bolin J. N. and Clark L. S. 2011. Avoiding charges of fraud and abuse: developing and implementing an effective compliance program, JONA, 546-550.
  21. Connors,C. L. , Malloy, M. A. and Masek E. V. 2006. Enabling secure interoperability among federated national entities:it's a matter of trust. The MITRE Corporation, USA.
  22. National Institute of Standards and Technology Computer Security Division. 2012. An Introduction to Computer Security. U. S. Department of Commerce. Gaithersburg, MD, USA.
  23. Wiederhold G. , Bilello M. , Sarathy V. , Qian M. S. 1996. A Security Mediator for Health Care Information, Health Security.
  24. Petkovi? M. , Katzenbeisser S. , and Kursawe K. . 2007. Rights Management Technologies: A good choice for securing electronic health records? Securing Electronic Business Processes, 178-187.
  25. Choi Y. B,. Capitan K. E,. Krause J. S, and Streepe M. M. 2007. Challenges associated with privacy in healthcare industry: implementation of HIPAA and security rules. Journal of Medical Systems, 57–64.
  26. Burgsteiner H. and Prietl J. A. 2008. Framework for secure communication of mobile e-health. application. Medical Informatics meets eHealth, 29-30.
  27. Cheng V. S. Y. , and Hung P. C. K. 2005. Towards an integrated privacy framework for HIPAA-Compliant web services. In Proceedings of IEEE International Conference on E-Commerce Technology.
  28. Blobel B. 2004. Authorization and access control for electronic health record systems. International Journal of Medical Informatics, 251-257.
  29. Aramudhan, M and Mohan, K. . 2010. New Secure Communication Protocols for Mobile E-health System. International Journal of Computer Applications,8, (October, 2008), USA, 10-15.

Keywords

Interoperability, healthcare, security, privacy