StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Medical Data Security - Research Paper Example

Cite this document
Summary
This study mainly focused on a small number of general interns (three using the EMR and three not using). The basis of statistical analysis was the comparison of the EMR encounters with the paper chart encounters…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Medical Data Security
Read Text Preview

Extract of sample "Medical Data Security"

? Medical Data Security Lecturer: RELATED WORK It should be d that hierarchical access control via encryption is not anew idea. Akl and Taylor [16] as well as Sandhu [8] propose constructions based on one-way functions. More recently, Hengartner and Steenkiste proposed a given scheme for encryption-based access control based on hierarchical IBE [13]. Atallah et al submits a symmetric key scheme that allows not only the tree-based hierarchies but also for arbitrary acyclic graphs. A recent work on attribute-based encryption enables encryption-based access control having more expressive policies although it is not known on how to incorporate the searchability in the given schemes. A related issue is the one of Cryptographic Storage File Systems (CSFS) that was introduced by Blaze in which the particular files were encrypted before being stored on an untrusted fileserver. Fu [7] do present a CSFS system which enables the sharing of the given access rights. Our approach with regard to using a hierarchical encryption scheme is different from the traditional CSFS approach in that our approach the encryption scheme itself enforces the access structure. This helps by reducing the number of keys that need to be stored/retrieved which guarantees consistent access rights whenever there are different parties writing to the same portion of a record. It also limits the types of the access structure which must be hierarchical one can possibly have. Other works put into consideration how to improve the ease of use of the hierarchical encryption scheme. Miklau and Suciu [14] describe a policy language for cryptographic access control. A model is considered where the particular data is encrypted twice, first by the data owner to reflect the initial permissions and one more time by the server to accommodate the changes in the access permissions. A study conducted at a general internal medicine faculty practice of an urban, academic medical center based in Chicago. A sample of three physicians were currently using the EMR in the examination room were recruited for the survey. The three EMR physicians were all male. Since the focus was on the behavior of the EMR inside the examination room, female physicians were thus not included in the survey. INSTRUMENTS Video Analysis Videotaping was done with a closed-circuit cameras of all the visits of the patients of the study physicians which enabled to analyze the actual form and content of interaction through the use of the SEGUE Framework(Set the stage, Elicit information, Give information, Understand patients perspective, End encounter). The focus was maintained on the six of the SEGUE tasks to evaluate the completeness of information elicited by the study physicians which are: attempts to outline patients agenda, exploration of psychological and emotional issues, discussion of how health affects a patients life, checks and clarifying of information, encouragement of patients in asking questions, and ensuring the completeness of the order at the end. The visit lengths were also noted, laboratory tests done the two major variables that could have an effect depending on type of record used. Sample Between June 1997 and February 198 data was collected from 238 clinical encounters having six physicians. In 18 cases, there was lack of demographic information about patients and in other cases 16 cases, videotapes were inadequate, yielding complete data for a total of 204 patient visits. Patients The study was conducted within a primary care environment characterized with a wide range of patient and health problems. Almost half (49.5%) out of the 204 patients were females. Patients’ ages ranged from 23 to 91 years with a mean of 46.6 years and a median of 42 years [7]. Even though 15.7% of the patients in the control group had at least a single previous encounter with an EMR physicians, a printout of their electronic record was also attached in the paper chart(hence the control physicians never required the computer) Physicians The ages of the EMR physicians too range from 30-44 years. They all indicated having scheduled appointments with new patients within 40 minutes interval and the booking of the return visits at 20-minute interval. RESULTS The table summarizes the extent to which six study physicians were able to accomplish key communication tasks. There was an indication that the EMR physicians checked and clarified information (X2 =6.73, df=1, P Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Medical Data Security Research Paper Example | Topics and Well Written Essays - 2000 words”, n.d.)
Medical Data Security Research Paper Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/information-technology/1438254-medical-data-security
(Medical Data Security Research Paper Example | Topics and Well Written Essays - 2000 Words)
Medical Data Security Research Paper Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1438254-medical-data-security.
“Medical Data Security Research Paper Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1438254-medical-data-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Medical Data Security

Healthcare Reform for Aging

The prospect of one day living in a nursing home and a long list of medical problems are bad enough already for any individual.... The paper "Healthcare Reform for Aging" highlights that old people deserve to be treated with dignity.... Aging is not an easy matter.... hellip; Individual's choice – individuals are being given by many states power to decide over who is going to provide care....
8 Pages (2000 words) Coursework

Medicare vs. Medicaid

Medicare is the largest health insurance covering hospital and medical care for citizens at 65 years or older, some beneficiaries of the Social security disability and in some states it is expanded to citizens with permanent kidney failure.... art A, referred to as Hospital insurance, financed by the Social security taxes.... Electronic data are expected to ease research in areas of diagnostic and treatment procedures to improve on quality of care and control costs associated with manual data collection....
2 Pages (500 words) Essay

The Issue of Security and Privacy Data

 This assignment " The Issue of security and Privacy Data" discusses many conveniences that internet offers like remote access and a quicker way of accomplishing tasks.... The assignment analyses security over the internet which is a tricky affair and information passed over different networks.... The issue of security and privacy can be easily addressed by the federal government having central servers and records being accessed only by ascertained health practitioners with proper security credentials allowing them access to the records (Gunter and Terry, 2005)....
1 Pages (250 words) Assignment

IT Trends

The challenges of the smartphone-based healthcare also includes potentially erroneous data input, computer viruses including spyware, magnetic interference with other medical devices, potentially inefficient patient-physician interactions, loss or theft and breaches of privacy and security.... The privacy and security concerns of storing or communicating patient data with a smartphone should be addressed with caution.... security features must be kept in place like data backup, encryption of stored patient data, remote deletion of all data on a device in case of loss or theft and securely encrypting wireless data transmission over Wi-Fi....
3 Pages (750 words) Research Paper

Cloud Storage as a Means for the US Government to Store Data under Various Security Designations

This paper "Cloud Storage as a Means for the US Government to Store Data under Various security Designations" examines the nature of security and then focuses on the potential underlying vulnerabilities that could threaten the integrity confidentiality, availability, and authenticity of the data.... Ergo the state needs to overhaul its information security infrastructure.... Assets of valueThere are various designations for information security in the United States under which different Assets of value in document and media content are filed so as to differentiate them based on the level of security-related information they contain....
14 Pages (3500 words) Case Study

Success of Federal Funds

This paper describes state entitlement program Medicaid that pays for medical assistance for certain individuals and families with low incomes and resources.... Persons may qualify immediately or may “spend down” by incurring medical expenses that reduce their income to or below their State's MN income level.... All remaining States utilize the “special income level” option to extend Medicaid to the “near poor” in medical institutional settings....
14 Pages (3500 words) Term Paper

Security of Medical Records

The reporter underlines that the main principle in Medicine is the security or the confidentiality of medical records of patients.... Both security and privacy ensure the confidentiality of medical records.... In this case, the patient hardly agrees to publish his medical records to upload to the Internet even if they guarantee its security.... In medical ethics, it always keeps the uniqueness of patient, which holds that the patient himself is the ruler of his body....
5 Pages (1250 words) Admission/Application Essay

Privacy and Security of Health Data

This need for implementation of Medical Data Security brings about by the need to safeguard the sensitive medical data records.... Problem StatementAccording to a survey conducted in 2003 by the Consumers Association and Health on behalf of the NHS Information security, showed that there were significant concerns with regard to Medical Data Security and they felt that the records were susceptible to many security breaches.... The research "Privacy and Security of Health Data" provides a viable solution to counter the security threats posed to the EMR systems so as to maintain the confidentiality of patients' data records, to investigate the ways in which medical data records are insecurely obtained....
7 Pages (1750 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us