1
|
Privacy in electronic health records: a systematic mapping study. J Public Health (Oxf) 2023. [DOI: 10.1007/s10389-022-01795-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/25/2023] Open
Abstract
Abstract
Main
Electronic health record (EHR) applications are digital versions of paper-based patient health information. Traditionally, medical records are made on paper. However, nowadays, advances in information and communication technology have made it possible to change medical records from paper to EHR. Therefore, preserving user data privacy is extremely important in healthcare environments. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy and at the same time not compromising the performance and interoperability of these systems.
Subject and methods
This systematic mapping study intends to investigate the current research on security and privacy requirements in EHR systems and identify potential research gaps in the literature. The main challenges are providing ways to make EHR systems increasingly capable of ensuring data privacy, and at the same time, not compromising the performance and interoperability of these systems. Our research was carried out in the Scopus database, the largest database of abstracts and citations in the literature with peer review.
Results
We have collected 848 articles related to the area. After disambiguation and filtering, we selected 30 articles for analysis. The result of such an analysis provides a comprehensive view of current research.
Conclusions
We can highlight some relevant research possibilities. First, we noticed a growing interest in privacy in EHR research in the last 6 years. Second, blockchain has been used in many EHR systems as a solution to achieve data privacy. However, it is a challenge to maintain traceability by recording metadata that can be mapped to private data of the users applying a particular mapping function that can be hosted outside the blockchain. Finally, the lack of a systematic approach between EHR solutions and existing laws or policies leads to better strategies for developing a certification process for EHR systems.
Collapse
|
2
|
Process Mining the Performance of a Real-Time Healthcare 4.0 Systems Using Conditional Survival Models. ALGORITHMS 2022. [DOI: 10.3390/a15060196] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
As the world moves into the exciting age of Healthcare 4.0, it is essential that patients and clinicians have confidence and reassurance that the real-time clinical decision support systems being used throughout their care guarantee robustness and optimal quality of care. However, current systems involving autonomic behaviour and those with no prior clinical feedback, have generally to date had little focus on demonstrating robustness in the use of data and final output, thus generating a lack of confidence. This paper wishes to address this challenge by introducing a new process mining approach based on a statistically robust methodology that relies on the utilisation of conditional survival models for the purpose of evaluating the performance of Healthcare 4.0 systems and the quality of the care provided. Its effectiveness is demonstrated by analysing the performance of a clinical decision support system operating in an intensive care setting with the goal to monitor ventilated patients in real-time and to notify clinicians if the patient is predicted at risk of receiving injurious mechanical ventilation. Additionally, we will also demonstrate how the same metrics can be used for evaluating the patient quality of care. The proposed methodology can be used to analyse the performance of any Healthcare 4.0 system and the quality of care provided to the patient.
Collapse
|
3
|
Novakovic A, Marshall AH. Introducing the DM-P approach for analysing the performances of real-time clinical decision support systems. Knowl Based Syst 2020. [DOI: 10.1016/j.knosys.2020.105877] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
4
|
Esposito A, Sicuranza M, Ciampi M. An Access Control Architecture for Protecting Health Information Systems. ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING 2017:35-47. [DOI: 10.1007/978-3-319-49109-7_4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
5
|
Martinelli F, Marulli F, Mercaldo F. Evaluating Convolutional Neural Network for Effective Mobile Malware Detection. ACTA ACUST UNITED AC 2017. [DOI: 10.1016/j.procs.2017.08.216] [Citation(s) in RCA: 47] [Impact Index Per Article: 5.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
6
|
Access control and privilege management in electronic health record: a systematic literature review. J Med Syst 2016; 40:261. [DOI: 10.1007/s10916-016-0589-z] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2016] [Accepted: 09/04/2016] [Indexed: 10/20/2022]
|