1
|
Rezaee R, Khashayar M, Saeedinezhad S, Nasiri M, Zare S. Critical Criteria and Countermeasures for Mobile Health Developers to Ensure Mobile Health Privacy and Security: Mixed Methods Study. JMIR Mhealth Uhealth 2023; 11:e39055. [PMID: 36862494 PMCID: PMC10020905 DOI: 10.2196/39055] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/27/2022] [Revised: 08/16/2022] [Accepted: 09/21/2022] [Indexed: 03/03/2023] Open
Abstract
BACKGROUND Despite the importance of the privacy and confidentiality of patients' information, mobile health (mHealth) apps can raise the risk of violating users' privacy and confidentiality. Research has shown that many apps provide an insecure infrastructure and that security is not a priority for developers. OBJECTIVE This study aims to develop and validate a comprehensive tool to be considered by developers for assessing the security and privacy of mHealth apps. METHODS A literature search was performed to identify papers on app development, and those papers reporting criteria for the security and privacy of mHealth were assessed. The criteria were extracted using content analysis and presented to experts. An expert panel was held for determining the categories and subcategories of the criteria according to meaning, repetition, and overlap; impact scores were also measured. Quantitative and qualitative methods were used for validating the criteria. The validity and reliability of the instrument were calculated to present an assessment instrument. RESULTS The search strategy identified 8190 papers, of which 33 (0.4%) were deemed eligible. A total of 218 criteria were extracted based on the literature search; of these, 119 (54.6%) criteria were removed as duplicates and 10 (4.6%) were deemed irrelevant to the security or privacy of mHealth apps. The remaining 89 (40.8%) criteria were presented to the expert panel. After calculating impact scores, the content validity ratio (CVR), and the content validity index (CVI), 63 (70.8%) criteria were confirmed. The mean CVR and CVI of the instrument were 0.72 and 0.86, respectively. The criteria were grouped into 8 categories: authentication and authorization, access management, security, data storage, integrity, encryption and decryption, privacy, and privacy policy content. CONCLUSIONS The proposed comprehensive criteria can be used as a guide for app designers, developers, and even researchers. The criteria and the countermeasures presented in this study can be considered to improve the privacy and security of mHealth apps before releasing the apps into the market. Regulators are recommended to consider an established standard using such criteria for the accreditation process, since the available self-certification of developers is not reliable enough.
Collapse
Affiliation(s)
- Rita Rezaee
- Department of Health Information Technology, Shiraz University of Medical Sciences, Shiraz, Iran.,Clinical Education Research Center, Shiraz University of Medical Sciences, Shiraz, Iran.,Health Human Resources Research Center, Shiraz University of Medical Sciences, Shiraz, Iran
| | - Mahboobeh Khashayar
- Student Research Committee, Shiraz University of Medical Sciences, Shiraz, Iran
| | - Saeed Saeedinezhad
- Health Human Resources Research Center, Shiraz University of Medical Sciences, Shiraz, Iran
| | - Mahdi Nasiri
- Health Human Resources Research Center, Shiraz University of Medical Sciences, Shiraz, Iran.,Department of Computer Engineering and Information Technology, Shiraz University of Technology, Shiraz, Iran
| | - Sahar Zare
- Health Information Management Research Center (HIMRC), Kashan University of Medical Sciences, Kashan, Iran
| |
Collapse
|
2
|
Iwaya LH, Babar MA, Rashid A, Wijayarathna C. On the privacy of mental health apps: An empirical investigation and its implications for app development. EMPIRICAL SOFTWARE ENGINEERING 2022; 28:2. [PMID: 36407814 PMCID: PMC9643945 DOI: 10.1007/s10664-022-10236-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 09/01/2022] [Indexed: 06/16/2023]
Abstract
UNLABELLED An increasing number of mental health services are now offered through mobile health (mHealth) systems, such as in mobile applications (apps). Although there is an unprecedented growth in the adoption of mental health services, partly due to the COVID-19 pandemic, concerns about data privacy risks due to security breaches are also increasing. Whilst some studies have analyzed mHealth apps from different angles, including security, there is relatively little evidence for data privacy issues that may exist in mHealth apps used for mental health services, whose recipients can be particularly vulnerable. This paper reports an empirical study aimed at systematically identifying and understanding data privacy incorporated in mental health apps. We analyzed 27 top-ranked mental health apps from Google Play Store. Our methodology enabled us to perform an in-depth privacy analysis of the apps, covering static and dynamic analysis, data sharing behaviour, server-side tests, privacy impact assessment requests, and privacy policy evaluation. Furthermore, we mapped the findings to the LINDDUN threat taxonomy, describing how threats manifest on the studied apps. The findings reveal important data privacy issues such as unnecessary permissions, insecure cryptography implementations, and leaks of personal data and credentials in logs and web requests. There is also a high risk of user profiling as the apps' development do not provide foolproof mechanisms against linkability, detectability and identifiability. Data sharing among 3rd-parties and advertisers in the current apps' ecosystem aggravates this situation. Based on the empirical findings of this study, we provide recommendations to be considered by different stakeholders of mHealth apps in general and apps developers in particular. We conclude that while developers ought to be more knowledgeable in considering and addressing privacy issues, users and health professionals can also play a role by demanding privacy-friendly apps. SUPPLEMENTARY INFORMATION The online version contains supplementary material available at 10.1007/s10664-022-10236-0.
Collapse
Affiliation(s)
- Leonardo Horn Iwaya
- Centre for Research on Engineering Software Technologies, The University of Adelaide, Adelaide, SA 5005 Australia
- Cyber Security Cooperative Research Centre (CSCRC), Joondalup, Australia
- Privacy and Security (PriSec), Department of Mathematics and Computer Science, Karlstad University, Karlstad, Sweden
| | - M. Ali Babar
- Centre for Research on Engineering Software Technologies, The University of Adelaide, Adelaide, SA 5005 Australia
- Cyber Security Cooperative Research Centre (CSCRC), Joondalup, Australia
| | - Awais Rashid
- Bristol Cyber Security Group, Department of Computer Science, University of Bristol, Bristol, UK
- REPHRAIN: National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online, Bristol, UK
| | - Chamila Wijayarathna
- Centre for Research on Engineering Software Technologies, The University of Adelaide, Adelaide, SA 5005 Australia
- Cyber Security Cooperative Research Centre (CSCRC), Joondalup, Australia
| |
Collapse
|
3
|
Manocha A, Afaq Y, Bhatia M. Intelligent analysis of irregular physical factors for panic disorder using quantum probability. J EXP THEOR ARTIF IN 2022. [DOI: 10.1080/0952813x.2022.2121426] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
Affiliation(s)
- Ankush Manocha
- Department of Computer Applications, Lovely Professional University, Jalandhar, Punjab, India
| | - Yasir Afaq
- Department of Computer Applications, Lovely Professional University, Jalandhar, Punjab, India
| | - Munish Bhatia
- Department of Computer Science and Engineering, Lovely Professional University, Jalandhar, Punjab, India
| |
Collapse
|
4
|
Tarricone R, Petracca F, Cucciniello M, Ciani O. Recommendations for developing a lifecycle, multidimensional assessment framework for mobile medical apps. HEALTH ECONOMICS 2022; 31 Suppl 1:73-97. [PMID: 35388585 PMCID: PMC9545972 DOI: 10.1002/hec.4505] [Citation(s) in RCA: 8] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Subscribe] [Scholar Register] [Received: 08/06/2021] [Revised: 02/18/2022] [Accepted: 03/02/2022] [Indexed: 06/14/2023]
Abstract
Digital health and mobile medical apps (MMAs) have shown great promise in transforming health care, but their adoption in clinical care has been unsatisfactory, and regulatory guidance and coverage decisions have been lacking or incomplete. A multidimensional assessment framework for regulatory, policymaking, health technology assessment, and coverage purposes based on the MMA lifecycle is needed. A targeted review of relevant policy documents from international sources was conducted to map current MMA assessment frameworks, to formulate 10 recommendations, subsequently shared amongst an expert panel of key stakeholders. Recommendations go beyond economic dimensions such as cost and economic evaluation and also include MMA development and update, classification and evidentiary requirements, performance and maintenance monitoring, usability testing, clinical evidence requirements, safety and security, equity considerations, organizational assessment, and additional outcome domains (patient empowerment and environmental impact). The COVID-19 pandemic greatly expanded the use of MMAs, but temporary policies governing their use and oversight need consolidation through well-developed frameworks to support decision-makers, producers and introduction into clinical care processes, especially in light of the strong international, cross-border character of MMAs, the new EU medical device and health technology assessment regulations, and the Next Generation EU funding earmarked for health digitalization.
Collapse
Affiliation(s)
- Rosanna Tarricone
- Centre for Research in Health and Social Care Management (CERGAS)Government, Health and Non Profit DivisionSDA BocconiMilanItaly
- Department of Social and Political SciencesBocconi UniversityMilanItaly
| | - Francesco Petracca
- Centre for Research in Health and Social Care Management (CERGAS)Government, Health and Non Profit DivisionSDA BocconiMilanItaly
| | - Maria Cucciniello
- Department of Social and Political SciencesBocconi UniversityMilanItaly
- University of Edinburgh Business SchoolScotlandUK
| | - Oriana Ciani
- Centre for Research in Health and Social Care Management (CERGAS)Government, Health and Non Profit DivisionSDA BocconiMilanItaly
- Institute of Health ResearchUniversity of Exeter Medical SchoolExeterUK
| |
Collapse
|
5
|
Critical Retrospection of Performance of Emerging Mobile Technologies in Health Data Management. JOURNAL OF HEALTHCARE ENGINEERING 2022; 2022:8903604. [PMID: 35345655 PMCID: PMC8957038 DOI: 10.1155/2022/8903604] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/08/2021] [Revised: 01/16/2022] [Accepted: 02/16/2022] [Indexed: 11/25/2022]
Abstract
The recent advancement in mobile technologies has led to opening a new paradigm in the field of medical healthcare systems. The development of WBAN sensors, wearable devices, and 5G/6G wireless technology has made real-time monitoring and telecare of the patient feasible. The complex framework to secure sensitive data of the patient and healthcare professionals is critical. The fast computation of health data generated is crucial for disease prediction and trauma-related services; the security of data and financial transactions is also a major concern. Various models, algorithms, and frameworks have been developed to tame critical issues related to healthcare services. The efficiency of these frameworks and models depends on energy and time consumption. Thus, the review of recent emerging technologies in respect of energy and time consumption is required. This paper reviews the developments in recent mobile technologies, their application, and the comparative analysis of their performance parameters to explicitly understand the utility, capacity, and limitations. This will help to understand the shortcomings of the recent technologies for the development of better frameworks with higher performance capabilities as well as higher quality of services.
Collapse
|
6
|
Turnbull A, Sculley D, Santos D, Maarj M, Chapple L, Gironès X, Fellas A, Coda A. Emerging Tools to Capture Self-Reported Acute and Chronic Pain Outcome in Children and Adolescents: A Literature Review. Med Sci (Basel) 2022; 10:medsci10010006. [PMID: 35225940 PMCID: PMC8884018 DOI: 10.3390/medsci10010006] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/03/2021] [Revised: 01/13/2022] [Accepted: 01/20/2022] [Indexed: 11/30/2022] Open
Abstract
The advancement of digital health provides strategic and cost-effective opportunities for the progression of health care in children and adolescents. It is important for clinicians to be aware of the potential of emerging pain outcome measures and employ evidence-based tools capable of reliably tracking acute and chronic pain over time. The main emerging pain outcome measures for children and adolescents were examined. Overall, seven main texts and their corresponding digital health technologies were included in this study. The main findings indicated that the use of emerging digital health is able to reduce recall bias and can improve the real time paediatric data capture of acute and chronic symptoms. This literature review highlights new developments in pain management in children and adolescents and emphasizes the need for further research to be conducted on the use of emerging technologies in pain management. This may include larger scale, multicentre studies to further assess validity and reliability of these tools across various demographics. The privacy and security of mHealth data must also be carefully evaluated when choosing health applications that can be introduced into daily clinical settings.
Collapse
Affiliation(s)
- Alexandra Turnbull
- School of Health Sciences, College of Health, Medicine and Wellbeing, The University of Newcastle, Ourimbah 2258, Australia; (A.T.); (D.S.); (M.M.); (L.C.); (A.F.)
| | - Dean Sculley
- School of Biomedical Sciences and Pharmacy, College of Health, Medicine and Wellbeing, The University of Newcastle, Ourimbah 2258, Australia;
| | - Derek Santos
- School of Health Sciences, College of Health, Medicine and Wellbeing, The University of Newcastle, Ourimbah 2258, Australia; (A.T.); (D.S.); (M.M.); (L.C.); (A.F.)
- School of Health Sciences, Queen Margaret University, Edinburgh EH21 6UU, UK
| | - Mohammed Maarj
- School of Health Sciences, College of Health, Medicine and Wellbeing, The University of Newcastle, Ourimbah 2258, Australia; (A.T.); (D.S.); (M.M.); (L.C.); (A.F.)
| | - Lachlan Chapple
- School of Health Sciences, College of Health, Medicine and Wellbeing, The University of Newcastle, Ourimbah 2258, Australia; (A.T.); (D.S.); (M.M.); (L.C.); (A.F.)
| | - Xavier Gironès
- Facultat de Ciències de la Salut de Manresa, Universitat de Vic-Universitat Central de Catalunya, 08242 Manresa, Spain;
| | - Antoni Fellas
- School of Health Sciences, College of Health, Medicine and Wellbeing, The University of Newcastle, Ourimbah 2258, Australia; (A.T.); (D.S.); (M.M.); (L.C.); (A.F.)
| | - Andrea Coda
- School of Health Sciences, College of Health, Medicine and Wellbeing, The University of Newcastle, Ourimbah 2258, Australia; (A.T.); (D.S.); (M.M.); (L.C.); (A.F.)
- Priority Research Centre Health Behaviour, Hunter Medical Research Institute, Newcastle 2305, Australia
- Correspondence:
| |
Collapse
|
7
|
Blockchain-Based IoT Devices in Supply Chain Management: A Systematic Literature Review. SUSTAINABILITY 2021. [DOI: 10.3390/su132413646] [Citation(s) in RCA: 45] [Impact Index Per Article: 15.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/12/2023]
Abstract
Through recent progress, the forms of modern supply chains have evolved into complex networks. The supply chain management systems face a variety of challenges. These include lack of visibility of the upstream party (Provider) to the downstream party (Client); lack of flexibility in the face of sudden variations in demand and control of operating costs; lack of reliance on safety stakeholders; ineffective management of supply chain risks. Blockchain (BC) is used in the supply chain to overcome the growing demands for items. The Internet of Things (IoT) is a profoundly encouraging innovation that can help companies observe, track, and monitor products, activities, and processes within their respective value chain networks. Research establishments and logical gatherings are ceaselessly attempting to answer IoT gadgets in supply chain management. This paper presents orderly writing on and reviewing of Blockchain-based IoT advances and their current usage. We discuss the smart devices used in this system and which device is the most appropriate in the supply chain. This paper also looks at future examination themes in blockchain-based IoT, referred to as the executive’s framework production network. The essential deliberate writing audit has been consolidated by surveying research articles circulated in highly reputable publications between 2016 and 2021. Lastly, current issues and challenges are present to provide researchers with promising future directions in IoT supply chain management systems.
Collapse
|
8
|
Wahab A, Alam TM, Raza MM. Usability Evaluation of FinTech Mobile Applications: A Statistical Approach. 2021 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (ICIC) 2021. [DOI: 10.1109/icic53490.2021.9691512] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
9
|
Tran CD, Nguyen TT. Health vs. privacy? The risk-risk tradeoff in using COVID-19 contact-tracing apps. TECHNOLOGY IN SOCIETY 2021; 67:101755. [PMID: 34566204 PMCID: PMC8454194 DOI: 10.1016/j.techsoc.2021.101755] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/12/2021] [Revised: 08/25/2021] [Accepted: 09/12/2021] [Indexed: 05/14/2023]
Abstract
In the midst of the COVID-19 pandemic, contact-tracing apps have emerged as reliable tools for public health communication and the promotion of preventative health. However, to function properly, contact-tracing apps require users to provide sensitive information, which has raised concerns about data disclosure, misuse and social surveillance. Little is known about how different types of risk perception simultaneously hinder and motivate individuals' engagement in mobile health apps, particularly in the context of a pandemic. Based on the privacy calculus theory and the risk-risk tradeoff concept, this study examined the risk-risk tradeoff model to enhance the understanding of COVID-19 contact-tracing app users' decision from the perspective of risk minimization. Findings from PLS-SEM and fsQCA revealed that users engage in health risk-privacy risk tradeoff when evaluating and deciding to use the apps. The focal study therefore contributes to the research on privacy calculus theory and calls for a balanced managerial solution to mitigate this tradeoff dilemma.
Collapse
Affiliation(s)
- Cong Duc Tran
- Faculty of Business Administration, Ton Duc Thang University, 19 Nguyen Huu Tho Street, Tan Phong Ward, District 7, Ho Chi Minh City, Viet Nam
| | - Tin Trung Nguyen
- Faculty of Business Administration, Ton Duc Thang University, 19 Nguyen Huu Tho Street, Tan Phong Ward, District 7, Ho Chi Minh City, Viet Nam
| |
Collapse
|
10
|
Menon AK, Adhya S, Kanitkar M. Health technology assessment of telemedicine applications in Northern borders of India. Med J Armed Forces India 2021; 77:452-458. [PMID: 34594075 PMCID: PMC8459044 DOI: 10.1016/j.mjafi.2021.03.007] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/04/2020] [Accepted: 03/18/2021] [Indexed: 10/21/2022] Open
Abstract
BACKGROUND Economic evaluations of health technology help to decide which interventions are to be continued and which are to be terminated. In the Armed Forces, the provision of efficient medical services requires meticulous planning for optimal utilization of scarce resources. We report a cost analysis of telemedicine and air transportation of casualties, and attempt to identify the strengths, weaknesses, opportunities and threats of telemedicine services. METHODS The costs incurred in telemedicine were compared with the cost of air evacuation. A qualitative assessment of telemedicine was undertaken through in-depth interviews with the hospital authorities and focused group discussions with medical officers and paramedical staff. RESULTS 34.2% of casualties could successfully be stabilized on-site using available healthcare resources with the peripheral hospitals. 18 casualties were managed at the periphery on-site by teleconsultations each year, averting air-transportation efforts. Estimated cost savings achieved in the initial management of casualty by teleconsultation was Rs. 146,111 per case. The strengths of telemedicine are knowledge updation, faster decision making, improved pre-hospital care and improved confidence in case management. CONCLUSION The reduction in air efforts and remote management of casualties make a substantive case for scaling up telemedicine interventions.
Collapse
Affiliation(s)
| | - Saibal Adhya
- Professor, Department of Community Medicine, Armed Forces Medical College, Pune, India
| | | |
Collapse
|
11
|
Albahri AS, Zaidan AA, Albahri OS, Zaidan BB, Alamoodi AH, Shareef AH, Alwan JK, Hamid RA, Aljbory MT, Jasim AN, Baqer MJ, Mohammed KI. Development of IoT-based mhealth framework for various cases of heart disease patients. HEALTH AND TECHNOLOGY 2021. [DOI: 10.1007/s12553-021-00579-x] [Citation(s) in RCA: 16] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/20/2022]
|
12
|
Keshta I, Odeh A. Security and privacy of electronic health records: Concerns and challenges. EGYPTIAN INFORMATICS JOURNAL 2021. [DOI: 10.1016/j.eij.2020.07.003] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
13
|
Jusob FR, George C, Mapp G. A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world. JOURNAL OF PUBLIC HEALTH-HEIDELBERG 2021; 30:37-47. [PMID: 34178579 PMCID: PMC8213038 DOI: 10.1007/s10389-021-01608-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/08/2020] [Accepted: 05/21/2021] [Indexed: 11/29/2022]
Abstract
Aim New challenges are being faced by global healthcare systems such as an increase in the elderly population, budget cuts as well as the ongoing Covid-19 pandemic. As pressures mount on healthcare systems to provide treatment to patients, mHealth is seen as one of the possible solutions to addressing these challenges. Given the sensitivity of health data, the rapid development of the mHealth sector raises privacy concerns. The aims of this research were to investigate privacy threats/concerns in the context of mHealth and the management of chronic diseases and to propose a novel privacy framework to address these concerns. Subject and method The study adopted a modified version of the engineering design process. After defining the problem, information was gathered through literature reviews, and analyses of existing regulatory (privacy) frameworks and past research on privacy threats/concerns. Requirements for a new framework were then specified leading to its development and comparison with existing frameworks. Results A novel future-proof privacy framework was developed and illustrated. Using existing regulatory frameworks for privacy and privacy threats/concerns from research studies, privacy principles and their resulting requirements were identified. Furthermore, mechanisms and associated technologies needed to implement the privacy principles/requirements into a functional prototype were also identified. A comparison of the proposed framework with existing frameworks, showed that it addressed privacy threats/concerns in a more comprehensive manner. Conclusion This research makes a valuable contribution to protecting privacy in mHealth. The novel framework developed is an improvement on existing frameworks. It is also future-proof since its foundations are built on regulatory frameworks and privacy threats/concerns existing at the time of its deployment/revision.
Collapse
Affiliation(s)
| | - Carlisle George
- School of Science and Technology, Middlesex University, London, UK
| | - Glenford Mapp
- School of Science and Technology, Middlesex University, London, UK
| |
Collapse
|
14
|
|
15
|
Mohd Aman AH, Hassan WH, Sameen S, Attarbashi ZS, Alizadeh M, Latiff LA. IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (ONLINE) 2021; 174:102886. [PMID: 34173428 PMCID: PMC7605812 DOI: 10.1016/j.jnca.2020.102886] [Citation(s) in RCA: 37] [Impact Index Per Article: 12.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/28/2020] [Revised: 10/04/2020] [Accepted: 10/20/2020] [Indexed: 05/23/2023]
Abstract
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of applications and technology, as well as security which have also been magnified through the rapid and widespread adoption of IoMT across the globe. A number of on-going researches show the adoption of secure IoMT applications is possible by incorporating security measures with the technology. Furthermore, the development of new IoMT technologies merge with Artificial Intelligence, Big Data and Blockchain offers more viable solutions. Hence, this paper highlights the IoMT architecture, applications, technologies, and security developments that have been made with respect to IoMT in combating COVID-19. Additionally, this paper provides useful insights into specific IoMT architecture models, emerging IoMT applications, IoMT security measurements, and technology direction that apply to many IoMT systems within the medical environment to combat COVID-19.
Collapse
Affiliation(s)
| | - Wan Haslina Hassan
- Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Malaysia
| | - Shilan Sameen
- Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, Malaysia
- Directorate of Information Technology, Koya University, Koya, Kurdistan Region, Iraq
| | | | | | - Liza Abdul Latiff
- Fakulti Teknologi & Informatik Razak, Universiti Teknologi Malaysia, Malaysia
| |
Collapse
|
16
|
Santos JA, Inácio PRM, Silva BMC. Towards the Use of Blockchain in Mobile Health Services and Applications. J Med Syst 2021; 45:17. [PMID: 33426574 DOI: 10.1007/s10916-020-01680-w] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/30/2020] [Accepted: 11/23/2020] [Indexed: 10/22/2022]
Abstract
With the advent of cryptocurrencies and blockchain, the growth and adaptation of cryptographic features and capabilities were quickly extended to new and underexplored areas, such as healthcare. Currently, blockchain is being implemented mainly as a mechanism to secure Electronic Health Records (EHRs). However, new studies have shown that this technology can be a powerful tool in empowering patients to control their own health data, as well for enabling a fool-proof health data history and establishing medical responsibility. Additionally, with the proliferation of mobile health (m-Health) sustained on service-oriented architectures, the adaptation of blockchain mechanisms into m-Health applications creates the possibility for a more decentralized and available healthcare service. Hence, this paper presents a review of the current security best practices for m-Health and the most used and widely known implementations of the blockchain protocol, including blockchain technologies in m-Health. The main goal of this comprehensive review is to further discuss and elaborate on identified open-issues and potential use cases regarding the uses of blockchain in this area. Finally, the paper presents the major findings, challenges and advantages on future blockchain implementations for m-Health services and applications.
Collapse
Affiliation(s)
- João Amaral Santos
- Instituto de Telecomunicações, Universidade da Beira Interior, Rua Marquês d'Ávila e Bolama, 6201-001, Covilhã, Portugal
| | - Pedro R M Inácio
- Instituto de Telecomunicações, Universidade da Beira Interior, Rua Marquês d'Ávila e Bolama, 6201-001, Covilhã, Portugal
| | - Bruno M C Silva
- Instituto de Telecomunicações, Universidade da Beira Interior, Rua Marquês d'Ávila e Bolama, 6201-001, Covilhã, Portugal. .,Universidade Europeia, IADE, Av. D. Carlos I, 4, 1200-649, Lisbon, Portugal.
| |
Collapse
|
17
|
Mohsin AH, Zaidan AA, Zaidan BB, Mohammed KI, Albahri OS, Albahri AS, Alsalem MA. PSO-Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. MULTIMEDIA TOOLS AND APPLICATIONS 2021; 80:14137-14161. [PMID: 33519293 PMCID: PMC7821848 DOI: 10.1007/s11042-020-10284-y] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/29/2019] [Revised: 09/17/2020] [Accepted: 12/22/2020] [Indexed: 05/02/2023]
Abstract
Secure updating and sharing for large amounts of healthcare information (such as medical data on coronavirus disease 2019 [COVID-19]) in efficient and secure transmission are important but challenging in communication channels amongst hospitals. In particular, in addressing the above challenges, two issues are faced, namely, those related to confidentiality and integrity of their health data and to network failure that may cause concerns about data availability. To the authors' knowledge, no study provides secure updating and sharing solution for large amounts of healthcare information in communication channels amongst hospitals. Therefore, this study proposes and discusses a novel steganography-based blockchain method in the spatial domain as a solution. The novelty of the proposed method is the removal and addition of new particles in the particle swarm optimisation (PSO) algorithm. In addition, hash function can hide secret medical COVID-19 data in hospital databases whilst providing confidentiality with high embedding capacity and high image quality. Moreover, stego images with hash data and blockchain technology are used in updating and sharing medical COVID-19 data between hospitals in the network to improve the level of confidentiality and protect the integrity of medical COVID-19 data in grey-scale images, achieve data availability if any connection failure occurs in a single point of the network and eliminate the central point (third party) in the network during transmission. The proposed method is discussed in three stages. Firstly, the pre-hiding stage estimates the embedding capacity of each host image. Secondly, the secret COVID-19 data hiding stage uses PSO algorithm and hash function. Thirdly, the transmission stage transfers the stego images based on blockchain technology and updates all nodes (hospitals) in the network. As proof of concept for the case study, the authors adopted the latest COVID-19 research published in the Computer Methods and Programs in Biomedicine journal, which presents a rescue framework within hospitals for the storage and transfusion of the best convalescent plasma to the most critical patients with COVID-19 on the basis of biological requirements. The validation and evaluation of the proposed method are discussed.
Collapse
Affiliation(s)
- A. H. Mohsin
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak Malaysia
- Republic of Iraq-Presidency of Ministries - Establishment of Martyrs, Baghdad, Iraq
| | - A. A. Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak Malaysia
| | - B. B. Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak Malaysia
| | - K. I. Mohammed
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak Malaysia
| | - O. S. Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak Malaysia
| | - A. S. Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak Malaysia
- Informatics Institute for Postgraduate Studies (IIPS), Iraqi Commission for Computers and Informatics (ICCI), Baghdad, Iraq
| | - M. A. Alsalem
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak Malaysia
| |
Collapse
|
18
|
A Comparative Systematic Literature Review on Knee Bone Reports from MRI, X-rays and CT Scans Using Deep Learning and Machine Learning Methodologies. Diagnostics (Basel) 2020; 10:diagnostics10080518. [PMID: 32722605 PMCID: PMC7460189 DOI: 10.3390/diagnostics10080518] [Citation(s) in RCA: 30] [Impact Index Per Article: 7.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/10/2020] [Revised: 07/02/2020] [Accepted: 07/15/2020] [Indexed: 01/26/2023] Open
Abstract
The purpose of this research was to provide a “systematic literature review” of knee bone reports that are obtained by MRI, CT scans, and X-rays by using deep learning and machine learning techniques by comparing different approaches—to perform a comprehensive study on the deep learning and machine learning methodologies to diagnose knee bone diseases by detecting symptoms from X-ray, CT scan, and MRI images. This study will help those researchers who want to conduct research in the knee bone field. A comparative systematic literature review was conducted for the accomplishment of our work. A total of 32 papers were reviewed in this research. Six papers consist of X-rays of knee bone with deep learning methodologies, five papers cover the MRI of knee bone using deep learning approaches, and another five papers cover CT scans of knee bone with deep learning techniques. Another 16 papers cover the machine learning techniques for evaluating CT scans, X-rays, and MRIs of knee bone. This research compares the deep learning methodologies for CT scan, MRI, and X-ray reports on knee bone, comparing the accuracy of each technique, which can be used for future development. In the future, this research will be enhanced by comparing X-ray, CT-scan, and MRI reports of knee bone with information retrieval and big data techniques. The results show that deep learning techniques are best for X-ray, MRI, and CT scan images of the knee bone to diagnose diseases.
Collapse
|
19
|
Mohammed KI, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohsin AH. Novel technique for reorganisation of opinion order to interval levels for solving several instances representing prioritisation in patients with multiple chronic diseases. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2020; 185:105151. [PMID: 31710981 DOI: 10.1016/j.cmpb.2019.105151] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/16/2019] [Revised: 07/20/2019] [Accepted: 10/21/2019] [Indexed: 06/10/2023]
Abstract
CONTEXT Telemedicine has been increasingly used in healthcare to provide services to patients remotely. However, prioritising patients with multiple chronic diseases (MCDs) in telemedicine environment is challenging because it includes decision-making (DM) with regard to the emergency degree of each chronic disease for every patient. OBJECTIVE This paper proposes a novel technique for reorganisation of opinion order to interval levels (TROOIL) to prioritise the patients with MCDs in real-time remote health-monitoring system. METHODS The proposed TROOIL technique comprises six steps for prioritisation of patients with MCDs: (1) conversion of actual data into intervals; (2) rule generation; (3) rule ordering; (4) expert rule validation; (5) data reorganisation; and (6) criteria weighting and ranking alternatives within each rule. The secondary dataset of 500 patients from the most relevant study in a remote prioritisation area was adopted. The dataset contains three diseases, namely, chronic heart disease, high blood pressure (BP) and low BP. RESULTS The proposed TROOIL is an effective technique for prioritising patients with MCDs. In the objective validation, remarkable differences were recognised among the groups' scores, indicating identical ranking results. In the evaluation of issues within all scenarios, the proposed framework has an advantage of 22.95% over the benchmark framework. DISCUSSION Patients with the most severe MCD were treated first on the basis of their highest priority levels. The treatment for patients with less severe cases was delayed more than that for other patients. CONCLUSIONS The proposed TROOIL technique can deal with multiple DM problems in prioritisation of patients with MCDs.
Collapse
Affiliation(s)
- K I Mohammed
- Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia
| | - A A Zaidan
- Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia
| | - B B Zaidan
- Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia.
| | - O S Albahri
- Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia
| | - A S Albahri
- Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia
| | - M A Alsalem
- Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia
| | - A H Mohsin
- Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia
| |
Collapse
|
20
|
Vera-Jiménez JC, Ferreiro-González M, Barbero GF, Álvarez JÁ, Fernández-Zacarías F, Ayuso J. OTP-PRL: an app for occupational risk prevention in policing activities. BMC Public Health 2019; 19:1549. [PMID: 31752804 PMCID: PMC6873564 DOI: 10.1186/s12889-019-7935-2] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/26/2019] [Accepted: 11/11/2019] [Indexed: 12/02/2022] Open
Abstract
Background The rapid progress in information and communication technologies has promoted the development of smartphone applications (apps) for a wide variety of purposes including workplace safety. However, no specific apps for occupational risk prevention in the police domain seemingly exist as yet. In this work, an app running under the iOS and Android operating systems was developed to help police officers become acquainted with policing-related occupational risks and to prevent their damaging consequences. Results The proposed app, which uses an iterative user-centered design to avoid occupational risks in policing activities, was assessed for performance by a group of users and experts through a System Usability Scale (SUS) questionnaire. The mean overall score for the questionnaire was 82.3. The app has backend support to facilitate continual improvement through contributions from users and administrators. A field test revealed increased awareness of policing occupational risks after using the app in many users. Conclusions A novel product that covers the needs of ORP requirements of police officers has been developed.
Collapse
Affiliation(s)
- José C Vera-Jiménez
- Cadiz Municipal Police, Police Technology Area, Public Safety School, Cadiz Council, Cadiz, Spain
| | - Marta Ferreiro-González
- Department of Analytical Chemistry, Faculty of Sciences, IVAGRO, CeiA3, University of Cadiz, P.O. Box 40, 11510, Cadiz, Puerto Real, Spain.
| | - Gerardo F Barbero
- Department of Analytical Chemistry, Faculty of Sciences, IVAGRO, CeiA3, University of Cadiz, P.O. Box 40, 11510, Cadiz, Puerto Real, Spain
| | - José Ángel Álvarez
- Department of Physical Chemistry, Faculty of Sciences, Institute of Biomolecules (INBIO), University of Cadiz, 11510, Cadiz, Puerto Real, Spain
| | | | - Jesús Ayuso
- Department of Physical Chemistry, Faculty of Sciences, Institute of Biomolecules (INBIO), University of Cadiz, 11510, Cadiz, Puerto Real, Spain
| |
Collapse
|
21
|
Rafique I, Hamid A, Naseer S, Asad M, Awais M, Yasir T. Age and Gender Prediction using Deep Convolutional Neural Networks. 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (ICIC) 2019. [DOI: 10.1109/icic48496.2019.8966704] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
22
|
Hussien HM, Yasin SM, Udzir SNI, Zaidan AA, Zaidan BB. A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction. J Med Syst 2019; 43:320. [PMID: 31522262 DOI: 10.1007/s10916-019-1445-8] [Citation(s) in RCA: 45] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/30/2019] [Accepted: 08/28/2019] [Indexed: 01/17/2023]
Abstract
Blockchain in healthcare applications requires robust security and privacy mechanism for high-level authentication, interoperability and medical records sharing to comply with the strict legal requirements of the Health Insurance Portability and Accountability Act of 1996. Blockchain technology in the healthcare industry has received considerable research attention in recent years. This study conducts a review to substantially analyse and map the research landscape of current technologies, mainly the use of blockchain in healthcare applications, into a coherent taxonomy. The present study systematically searches all relevant research articles on blockchain in healthcare applications in three accessible databases, namely, ScienceDirect, IEEE and Web of Science, by using the defined keywords 'blockchain', 'healthcare' and 'electronic health records' and their variations. The final set of collected articles related to the use of blockchain in healthcare application is divided into three categories. The first category includes articles (i.e. 43/58 scientific articles) that attempted to develop and design healthcare applications integrating blockchain, particularly those on new architecture, system designs, framework, scheme, model, platform, approach, protocol and algorithm. The second category includes studies (i.e., 6/58 scientific articles) that attempted to evaluate and analyse the adoption of blockchain in the healthcare system. Finally, the third category comprises review and survey articles (i.e., 6/58 scientific articles) related to the integration of blockchain into healthcare applications. The final articles for review are discussed on the basis of five aspects: (1) year of publication, (2) nationality of authors, (3) publishing house or journal, (4) purpose of using blockchain in health applications and the corresponding contributions and (5) problem types and proposed solutions. Additionally, this study provides identified motivations, open challenges and recommendations on the use of blockchain in healthcare applications. The current research contributes to the literature by providing a detailed review of feasible alternatives and identifying the research gaps. Accordingly, researchers and developers are provided with appealing opportunities to further develop decentralised healthcare applications through a comprehensive discussion of about the importance of blockchain and its integration into various healthcare applications.
Collapse
Affiliation(s)
- H M Hussien
- Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Malaysia
| | - S M Yasin
- Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Malaysia
| | - S N I Udzir
- Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Malaysia
| | - A A Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Malaysia
| | - B B Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Malaysia.
| |
Collapse
|
23
|
Napi NM, Zaidan AA, Zaidan BB, Albahri OS, Alsalem MA, Albahri AS. Medical emergency triage and patient prioritisation in a telemedicine environment: a systematic review. HEALTH AND TECHNOLOGY 2019. [DOI: 10.1007/s12553-019-00357-w] [Citation(s) in RCA: 24] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022]
|
24
|
Real-Time Remote-Health Monitoring Systems: a Review on Patients Prioritisation for Multiple-Chronic Diseases, Taxonomy Analysis, Concerns and Solution Procedure. J Med Syst 2019; 43:223. [PMID: 31187288 DOI: 10.1007/s10916-019-1362-x] [Citation(s) in RCA: 44] [Impact Index Per Article: 8.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/03/2018] [Accepted: 05/30/2019] [Indexed: 01/01/2023]
Abstract
Remotely monitoring a patient's condition is a serious issue and must be addressed. Remote health monitoring systems (RHMS) in telemedicine refers to resources, strategies, methods and installations that enable doctors or other medical professionals to work remotely to consult, diagnose and treat patients. The goal of RHMS is to provide timely medical services at remote areas through telecommunication technologies. Through major advancements in technology, particularly in wireless networking, cloud computing and data storage, RHMS is becoming a feasible aspect of modern medicine. RHMS for the prioritisation of patients with multiple chronic diseases (MCDs) plays an important role in sustainably providing high-quality healthcare services. Further investigations are required to highlight the limitations of the prioritisation of patients with MCDs over a telemedicine environment. This study introduces a comprehensive and inclusive review on the prioritisation of patients with MCDs in telemedicine applications. Furthermore, it presents the challenges and open issues regarding patient prioritisation in telemedicine. The findings of this study are as follows: (1) The limitations and problems of existing patients' prioritisation with MCDs are presented and emphasised. (2) Based on the analysis of the academic literature, an accurate solution for remote prioritisation in a large scale of patients with MCDs was not presented. (3) There is an essential need to produce a new multiple-criteria decision-making theory to address the current problems in the prioritisation of patients with MCDs.
Collapse
|
25
|
Mobile-Based Patient Monitoring Systems: A Prioritisation Framework Using Multi-Criteria Decision-Making Techniques. J Med Syst 2019; 43:219. [PMID: 31172296 DOI: 10.1007/s10916-019-1339-9] [Citation(s) in RCA: 37] [Impact Index Per Article: 7.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/13/2019] [Accepted: 05/13/2019] [Indexed: 10/26/2022]
Abstract
This study presents a prioritisation framework for mobile patient monitoring systems (MPMSs) based on multicriteria analysis in architectural components. This framework selects the most appropriate system amongst available MPMSs for the telemedicine environment. Prioritisation of MPMSs is a challenging task due to (a) multiple evaluation criteria, (b) importance of criteria, (c) data variation and (d) unmeasurable values. The secondary data presented as the decision evaluation matrix include six systems (namely, Yale-National Aeronautics and Space Administration (NASA), advanced health and disaster aid network, personalised health monitoring, CMS, MobiHealth and NTU) as alternatives and 13 criteria (namely, supported number of sensors, sensor front-end (SFE) communication, SFE to mobile base unit (MBU) communications, display of biosignals on the MBU, storage of biosignals on the MBU, intra-body area network (BAN) communication problems, extra-BAN communication problems, extra-BAN communication technology, extra-BAN communication protocols, back-end system communication technology, intended geographic area of use, end-to-end security and reported trial problems) based on the architectural components of MPMSs. These criteria are adopted from the most relevant studies and are found to be applicable to this study. The prioritisation framework is developed in three stages. (1) The unmeasurable values of the MPMS evaluation criteria in the adopted decision evaluation matrix based on expert opinion are represented by using the best-worst method (BWM). (2) The importance of the evaluation criteria based on the architectural components of the MPMS is determined by using the BWM. (3) The VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method is utilised to rank the MPMSs according to the determined importance of the evaluation criteria and the adopted decision matrix. For validation, mean ± standard deviation is used to verify the similarity of systematic prioritisations objectively. The following results are obtained. (1) The BWM represents the unmeasurable values of the MPMS evaluation criteria. (2) The BWM is suitable for weighing the evaluation criteria based on the architectural components of the MPMS. (3) VIKOR is suitable for solving the MPMS prioritisation problem. Moreover, the internal and external VIKOR group decision making are approximately the same, with the best MPMS being 'Yale-NASA' and the worst MPMS being 'NTU'. (4) For the objective validation, remarkable differences are observed between the group scores, which indicate the similarity of internal and external prioritisation results.
Collapse
|
26
|
Multiclass Benchmarking Framework for Automated Acute Leukaemia Detection and Classification Based on BWM and Group-VIKOR. J Med Syst 2019; 43:212. [PMID: 31154550 DOI: 10.1007/s10916-019-1338-x] [Citation(s) in RCA: 39] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/04/2019] [Accepted: 05/13/2019] [Indexed: 10/26/2022]
Abstract
This paper aims to assist the administration departments of medical organisations in making the right decision on selecting a suitable multiclass classification model for acute leukaemia. In this paper, we proposed a framework that will aid these departments in evaluating, benchmarking and ranking available multiclass classification models for the selection of the best one. Medical organisations have continuously faced evaluation and benchmarking challenges in such endeavour, especially when no single model is superior. Moreover, the improper selection of multiclass classification for acute leukaemia model may be costly for medical organisations. For example, when a patient dies, one such organisation will be legally or financially sued for incidents in which the model fails to fulfil its desired outcome. With regard to evaluation and benchmarking, multiclass classification models are challenging processes due to multiple evaluation and conflicting criteria. This study structured a decision matrix (DM) based on the crossover of 2 groups of multi-evaluation criteria and 22 multiclass classification models. The matrix was then evaluated with datasets comprising 72 samples of acute leukaemia, which include 5327 gens. Subsequently, multi-criteria decision-making (MCDM) techniques are used in the benchmarking and ranking of multiclass classification models. The MCDM used techniques that include the integrated BWM and VIKOR. BWM has been applied for the weight calculations of evaluation criteria, whereas VIKOR has been used to benchmark and rank classification models. VIKOR has also been employed in two decision-making contexts: individual and group decision making and internal and external group aggregation. Results showed the following: (1) the integration of BWM and VIKOR is effective at solving the benchmarking/selection problems of multiclass classification models. (2) The ranks of classification models obtained from internal and external VIKOR group decision making were almost the same, and the best multiclass classification model based on the two was 'Bayes. Naive Byes Updateable' and the worst one was 'Trees.LMT'. (3) Among the scores of groups in the objective validation, significant differences were identified, which indicated that the ranking results of internal and external VIKOR group decision making were valid.
Collapse
|
27
|
Almahdi EM, Zaidan AA, Zaidan BB, Alsalem MA, Albahri OS, Albahri AS. Mobile Patient Monitoring Systems from a Benchmarking Aspect: Challenges, Open Issues and Recommended Solutions. J Med Syst 2019; 43:207. [PMID: 31144129 DOI: 10.1007/s10916-019-1336-z] [Citation(s) in RCA: 46] [Impact Index Per Article: 9.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/07/2019] [Accepted: 05/13/2019] [Indexed: 11/30/2022]
Abstract
This paper presents comprehensive insights into mobile patient monitoring systems (MPMSs) from evaluation and benchmarking aspects on the basis of two critical directions. The current evaluation criteria of MPMSs based on the architectural components of MPMSs and possible solutions are discussed. This review highlights four serious issues, namely, multiple evaluation criteria, criterion importance, unmeasurable criteria and data variation, in MPMS benchmarking. Multicriteria decision-making (MCDM) analysis techniques are proposed as effective solutions to solve these issues from a methodological aspect. This methodological aspect involves a framework for benchmarking MPMSs on the basis of MCDM to rank available MPMSs and select a suitable one. The benchmarking framework is discussed in four steps. Firstly, pre-processing and identification procedures are presented. Secondly, the procedure of weight calculation based on the best-worst method (BWM) is described. Thirdly, the development of a benchmark framework by using the VIKOR method is introduced. Lastly, the proposed framework is validated.
Collapse
Affiliation(s)
- E M Almahdi
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A A Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia.
| | - B B Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - M A Alsalem
- College of Administration and Economic, University of Mosul, Mosul, Iraq
| | - O S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A S Albahri
- College of Engineering, University of Information Technology and Communications, Baghdad, Iraq
| |
Collapse
|
28
|
Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard. J Med Syst 2019; 43:192. [PMID: 31115768 DOI: 10.1007/s10916-019-1264-y] [Citation(s) in RCA: 23] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/16/2018] [Accepted: 03/27/2019] [Indexed: 01/14/2023]
Abstract
In medical systems for patient's authentication, keeping biometric data secure is a general problem. Many studies have presented various ways of protecting biometric data especially finger vein biometric data. Thus, It is needs to find better ways of securing this data by applying the three principles of information security aforementioned, and creating a robust verification system with high levels of reliability, privacy and security. Moreover, it is very difficult to replace biometric information and any leakage of biometrics information leads to earnest risks for example replay attacks using the robbed biometric data. In this paper presented criticism and analysis to all attempts as revealed in the literature review and discussion the proposes a novel verification secure framework based confidentiality, integrity and availability (CIA) standard in triplex blockchain-particle swarm optimization (PSO)-advanced encryption standard (AES) techniques for medical systems patient's authentication. Three stages are performed on discussion. Firstly, proposes a new hybrid model pattern in order to increase the randomization based on radio frequency identification (RFID) and finger vein biometrics. To achieve this, proposed a new merge algorithm to combine the RFID features and finger vein features in one hybrid and random pattern. Secondly, how the propose verification secure framework are followed the CIA standard for telemedicine authentication by combination of AES encryption technique, blockchain and PSO in steganography technique based on proposed pattern model. Finally, discussed the validation and evaluation of the proposed verification secure framework.
Collapse
|
29
|
Talal M, Zaidan AA, Zaidan BB, Albahri AS, Alamoodi AH, Albahri OS, Alsalem MA, Lim CK, Tan KL, Shir WL, Mohammed KI. Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review. J Med Syst 2019; 43:42. [PMID: 30648217 DOI: 10.1007/s10916-019-1158-z] [Citation(s) in RCA: 49] [Impact Index Per Article: 9.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/09/2018] [Accepted: 01/08/2019] [Indexed: 12/12/2022]
Abstract
The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users' entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher's interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
Collapse
Affiliation(s)
- Mohammed Talal
- Department of Communication Engineering, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM), Parit Raja, Malaysia
| | - A A Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia.
| | - B B Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A H Alamoodi
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - O S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - M A Alsalem
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - C K Lim
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - K L Tan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - W L Shir
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - K I Mohammed
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| |
Collapse
|
30
|
Shuwandy ML, Zaidan BB, Zaidan AA, Albahri AS. Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review. J Med Syst 2019; 43:33. [PMID: 30612191 DOI: 10.1007/s10916-018-1149-5] [Citation(s) in RCA: 31] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/22/2018] [Accepted: 12/20/2018] [Indexed: 02/07/2023]
Abstract
The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included 'other' articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
Collapse
Affiliation(s)
- Moceheb Lazam Shuwandy
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - B B Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A A Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia.
| | - A S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| |
Collapse
|
31
|
Enaizan O, Zaidan AA, Alwi NHM, Zaidan BB, Alsalem MA, Albahri OS, Albahri AS. Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis. HEALTH AND TECHNOLOGY 2018. [DOI: 10.1007/s12553-018-0278-7] [Citation(s) in RCA: 32] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]
|
32
|
Mohsin AH, Zaidan AA, Zaidan BB, Albahri AS, Albahri OS, Alsalem MA, Mohammed KI. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review. J Med Syst 2018; 42:238. [PMID: 30327939 DOI: 10.1007/s10916-018-1104-5] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/14/2018] [Accepted: 10/09/2018] [Indexed: 10/28/2022]
Abstract
The development of wireless body area sensor networks is imperative for modern telemedicine. However, attackers and cybercriminals are gradually becoming aware in attacking telemedicine systems, and the black market value of protected health information has the highest price nowadays. Security remains a formidable challenge to be resolved. Intelligent home environments make up one of the major application areas of pervasive computing. Security and privacy are the two most important issues in the remote monitoring and control of intelligent home environments for clients and servers in telemedicine architecture. The personal authentication approach that uses the finger vein pattern is a newly investigated biometric technique. This type of biometric has many advantages over other types (explained in detail later on) and is suitable for different human categories and ages. This study aims to establish a secure verification method for real-time monitoring systems to be used for the authentication of patients and other members who are working in telemedicine systems. The process begins with the sensor based on Tiers 1 and 2 (client side) in the telemedicine architecture and ends with patient verification in Tier 3 (server side) via finger vein biometric technology to ensure patient security on both sides. Multilayer taxonomy is conducted in this research to attain the study's goal. In the first layer, real-time remote monitoring studies based on the sensor technology used in telemedicine applications are reviewed and analysed to provide researchers a clear vision of security and privacy based on sensors in telemedicine. An extensive search is conducted to identify articles that deal with security and privacy issues, related applications are reviewed comprehensively and a coherent taxonomy of these articles is established. ScienceDirect, IEEE Xplore and Web of Science databases are checked for articles on mHealth in telemedicine based on sensors. A total of 3064 papers are collected from 2007 to 2017. The retrieved articles are filtered according to the security and privacy of telemedicine applications based on sensors. Nineteen articles are selected and classified into two categories. The first category, which accounts for 57.89% (n = 11/19), includes surveys on telemedicine articles and their applications. The second category, accounting for 42.1% (n = 8/19), includes articles on the three-tiered architecture of telemedicine. The collected studies reveal the essential need to construct another taxonomy layer and review studies on finger vein biometric verification systems. This map-matching for both taxonomies is developed for this study to go deeply into the sensor field and determine novel risks and benefits for patient security and privacy on client and server sides in telemedicine applications. In the second layer of our taxonomy, the literature on finger vein biometric verification systems is analysed and reviewed. In this layer, we obtain a final set of 65 articles classified into four categories. In the first category, 80% (n = 52/65) of the articles focus on development and design. In the second category, 12.30% (n = 8/65) includes evaluation and comparative articles. These articles are not intensively included in our literature analysis. In the third category, 4.61% (n = 3/65) includes articles about analytical studies. In the fourth category, 3.07% (n = 2/65) comprises reviews and surveys. This study aims to provide researchers with an up-to-date overview of studies that have been conducted on (user/patient) authentication to enhance the security level in telemedicine or any information system. In the current study, taxonomy is presented by explaining previous studies. Moreover, this review highlights the motivations, challenges and recommendations related to finger vein biometric verification systems and determines the gaps in this research direction (protection of finger vein templates in real time), which represent a new research direction in this area.
Collapse
Affiliation(s)
- A H Mohsin
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A A Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia.
| | - B B Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - O S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - M A Alsalem
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - K I Mohammed
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| |
Collapse
|
33
|
Alsalem MA, Zaidan AA, Zaidan BB, Hashim M, Albahri OS, Albahri AS, Hadi A, Mohammed KI. Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects. J Med Syst 2018; 42:204. [PMID: 30232632 DOI: 10.1007/s10916-018-1064-9] [Citation(s) in RCA: 56] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/18/2018] [Accepted: 09/06/2018] [Indexed: 10/28/2022]
Abstract
This study aims to systematically review prior research on the evaluation and benchmarking of automated acute leukaemia classification tasks. The review depends on three reliable search engines: ScienceDirect, Web of Science and IEEE Xplore. A research taxonomy developed for the review considers a wide perspective for automated detection and classification of acute leukaemia research and reflects the usage trends in the evaluation criteria in this field. The developed taxonomy consists of three main research directions in this domain. The taxonomy involves two phases. The first phase includes all three research directions. The second one demonstrates all the criteria used for evaluating acute leukaemia classification. The final set of studies includes 83 investigations, most of which focused on enhancing the accuracy and performance of detection and classification through proposed methods or systems. Few efforts were made to undertake the evaluation issues. According to the final set of articles, three groups of articles represented the main research directions in this domain: 56 articles highlighted the proposed methods, 22 articles involved proposals for system development and 5 papers centred on evaluation and comparison. The other taxonomy side included 16 main and sub-evaluation and benchmarking criteria. This review highlights three serious issues in the evaluation and benchmarking of multiclass classification of acute leukaemia, namely, conflicting criteria, evaluation criteria and criteria importance. It also determines the weakness of benchmarking tools. To solve these issues, multicriteria decision-making (MCDM) analysis techniques were proposed as effective recommended solutions in the methodological aspect. This methodological aspect involves a proposed decision support system based on MCDM for evaluation and benchmarking to select suitable multiclass classification models for acute leukaemia. The said support system is examined and has three sequential phases. Phase One presents the identification procedure and process for establishing a decision matrix based on a crossover of evaluation criteria and acute leukaemia multiclass classification models. Phase Two describes the decision matrix development for the selection of acute leukaemia classification models based on the integrated Best and worst method (BWM) and VIKOR. Phase Three entails the validation of the proposed system.
Collapse
Affiliation(s)
- M A Alsalem
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A A Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia.
| | - B B Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - M Hashim
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - O S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - Ali Hadi
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - K I Mohammed
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| |
Collapse
|
34
|
Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients. HEALTH AND TECHNOLOGY 2018. [DOI: 10.1007/s12553-018-0252-4] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
|
35
|
Albahri OS, Zaidan AA, Zaidan BB, Hashim M, Albahri AS, Alsalem MA. Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects. J Med Syst 2018; 42:164. [PMID: 30043085 DOI: 10.1007/s10916-018-1006-6] [Citation(s) in RCA: 57] [Impact Index Per Article: 9.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/29/2018] [Accepted: 06/21/2018] [Indexed: 01/11/2023]
Abstract
Promoting patient care is a priority for all healthcare providers with the overall purpose of realising a high degree of patient satisfaction. A medical centre server is a remote computer that enables hospitals and physicians to analyse data in real time and offer appropriate services to patients. The server can also manage, organise and support professionals in telemedicine. Therefore, a remote medical centre server plays a crucial role in sustainably delivering quality healthcare services in telemedicine. This article presents a comprehensive review of the provision of healthcare services in telemedicine applications, especially in the medical centre server. Moreover, it highlights the open issues and challenges related to providing healthcare services in the medical centre server within telemedicine. Methodological aspects to control and manage the process of healthcare service provision and three distinct and successive phases are presented. The first phase presents the identification process to propose a decision matrix (DM) on the basis of a crossover of 'multi-healthcare services' and 'hospital list' within intelligent data and service management centre (Tier 4). The second phase discusses the development of a DM for hospital selection on the basis of integrated VIKOR-Analytic Hierarchy Process (AHP) methods. Finally, the last phase examines the validation process for the proposed framework.
Collapse
Affiliation(s)
- O S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A A Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia.
| | - B B Zaidan
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - M Hashim
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - A S Albahri
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| | - M A Alsalem
- Department of Computing, Universiti Pendidikan Sultan Idris, Tanjong Malim, Perak, Malaysia
| |
Collapse
|
36
|
Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects. J Med Syst 2018; 42:137. [PMID: 29936593 DOI: 10.1007/s10916-018-0983-9] [Citation(s) in RCA: 56] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/27/2018] [Accepted: 05/18/2018] [Indexed: 10/28/2022]
Abstract
The burden on healthcare services in the world has increased substantially in the past decades. The quality and quantity of care have to increase to meet surging demands, especially among patients with chronic heart diseases. The expansion of information and communication technologies has led to new models for the delivery healthcare services in telemedicine. Therefore, mHealth plays an imperative role in the sustainable delivery of healthcare services in telemedicine. This paper presents a comprehensive review of healthcare service provision. It highlights the open issues and challenges related to the use of the real-time fault-tolerant mHealth system in telemedicine. The methodological aspects of mHealth are examined, and three distinct and successive phases are presented. The first discusses the identification process for establishing a decision matrix based on a crossover of 'time of arrival of patient at the hospital/multi-services' and 'hospitals' within mHealth. The second phase discusses the development of a decision matrix for hospital selection based on the MAHP method. The third phase discusses the validation of the proposed system.
Collapse
|