Skip to main content
Erschienen in: Journal of Medical Systems 3/2012

01.06.2012 | ORIGINAL PAPER

The Enhancement of Security in Healthcare Information Systems

verfasst von: Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang

Erschienen in: Journal of Medical Systems | Ausgabe 3/2012

Einloggen, um Zugang zu erhalten

Abstract

With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the “Internet”. For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.
Literatur
1.
Zurück zum Zitat The state of HIPAA privacy and security compliance, AHIMA, April 2005. The state of HIPAA privacy and security compliance, AHIMA, April 2005.
2.
Zurück zum Zitat Institute of Medicine, The computer-based patient record, An essential technology for health care, NAP, Washington, DC, 1991 (revised 1997). Institute of Medicine, The computer-based patient record, An essential technology for health care, NAP, Washington, DC, 1991 (revised 1997).
3.
Zurück zum Zitat NVN-ENV 12924, 1997 Medical informatics, Division of Security and Protection of Information Systems in Health Care. NVN-ENV 12924, 1997 Medical informatics, Division of Security and Protection of Information Systems in Health Care.
4.
Zurück zum Zitat W. Stallings, Cryptography and network security, principles and practice, 3rd Edition. Prentice Hall, 2003. W. Stallings, Cryptography and network security, principles and practice, 3rd Edition. Prentice Hall, 2003.
5.
Zurück zum Zitat AIM (Advance Informatics in Medicine, Secure Environment for Information Systems in medicine, SEISMED (A2033)/SP14/HILD/05.07. 95. AIM (Advance Informatics in Medicine, Secure Environment for Information Systems in medicine, SEISMED (A2033)/SP14/HILD/05.07. 95.
6.
Zurück zum Zitat Snee, N. L., and McCormick, K. A., The case for integrating public health informatics networks. Eng Med Biol Mag 23(1):81–88, 2004.CrossRef Snee, N. L., and McCormick, K. A., The case for integrating public health informatics networks. Eng Med Biol Mag 23(1):81–88, 2004.CrossRef
7.
Zurück zum Zitat Detmer, D. E., Building the National Health Information Infrastructure for Personal Health, Health Care Services, Public Health and Research. BMC Medical Informatics and Decision Making, 3(1), 2003. Detmer, D. E., Building the National Health Information Infrastructure for Personal Health, Health Care Services, Public Health and Research. BMC Medical Informatics and Decision Making, 3(1), 2003.
8.
Zurück zum Zitat Shepherd, M., Challenges in Health Informatics, The 40th Annual Hawaii International Conference on System Sciences, pp. 135, 2007. Shepherd, M., Challenges in Health Informatics, The 40th Annual Hawaii International Conference on System Sciences, pp. 135, 2007.
9.
Zurück zum Zitat ISO TS 17090 Health Informatics, Public key infrastructure, Part 1, framework and overview, Part 2, certification profiles, Part 3, policy management of certification authority (revised towards an ISO standards by ISO TC 215 WG 4 in 2004). ISO TS 17090 Health Informatics, Public key infrastructure, Part 1, framework and overview, Part 2, certification profiles, Part 3, policy management of certification authority (revised towards an ISO standards by ISO TC 215 WG 4 in 2004).
10.
Zurück zum Zitat Povalej, P., Leni, M., Zoman, M., Kokol, P., and Dinevski, D., Accuracy of intelligent medical systems. Comput Meth Programs Biomed 80:S95–S105, 2005.CrossRef Povalej, P., Leni, M., Zoman, M., Kokol, P., and Dinevski, D., Accuracy of intelligent medical systems. Comput Meth Programs Biomed 80:S95–S105, 2005.CrossRef
11.
Zurück zum Zitat Kokol, P., Babic, S. H., Podgorelec, V., and Zorman, M., Some ideas about intelligent medical system design. The 12th IEEE Symposium on Computer-Based Medical Systems, pp. 48–52, 1999. Kokol, P., Babic, S. H., Podgorelec, V., and Zorman, M., Some ideas about intelligent medical system design. The 12th IEEE Symposium on Computer-Based Medical Systems, pp. 48–52, 1999.
12.
Zurück zum Zitat Kokol, P., Method Engineering—A Framework for Improved Computer Based Medical Systems Design, Ninth IEEE Symposium on Computer-Based Medical Systems, pp. 41–46, 1996. Kokol, P., Method Engineering—A Framework for Improved Computer Based Medical Systems Design, Ninth IEEE Symposium on Computer-Based Medical Systems, pp. 41–46, 1996.
13.
Zurück zum Zitat Ross, M. M., and Kyusuk, C., Current issues in health care informatics. J Med Syst 30(1):1–2, 2006.CrossRef Ross, M. M., and Kyusuk, C., Current issues in health care informatics. J Med Syst 30(1):1–2, 2006.CrossRef
14.
Zurück zum Zitat Benaloh, J., Chase, M, Horvitz, E., and Lauter, K., Patient controlled encryption: ensuring privacy of electronic medical records. Proceedings of the 2009 ACM workshop on Cloud computing security, November, 2009. Benaloh, J., Chase, M, Horvitz, E., and Lauter, K., Patient controlled encryption: ensuring privacy of electronic medical records. Proceedings of the 2009 ACM workshop on Cloud computing security, November, 2009.
15.
Zurück zum Zitat Panko, R., Corporate Computer and Network Security. Prentice-Hall, Englewood Cliffs, 2003. Panko, R., Corporate Computer and Network Security. Prentice-Hall, Englewood Cliffs, 2003.
16.
Zurück zum Zitat Tao, L., Introduction to Network Security. Electronic Industry Press, Beijing, pp. 107–111, 2003. Tao, L., Introduction to Network Security. Electronic Industry Press, Beijing, pp. 107–111, 2003.
17.
Zurück zum Zitat Bartal, Y., Mayer, A., Nissim, K., and Wool, A., Firmato: A novel firewall management toolkit. ACM Trans Comput Syst 22(4):381–420, 2004.CrossRef Bartal, Y., Mayer, A., Nissim, K., and Wool, A., Firmato: A novel firewall management toolkit. ACM Trans Comput Syst 22(4):381–420, 2004.CrossRef
18.
Zurück zum Zitat Chapman, D., and Zwicky, E. Building internet firewalls, Second Edition. Orielly & Associates Inc., 2000. Chapman, D., and Zwicky, E. Building internet firewalls, Second Edition. Orielly & Associates Inc., 2000.
19.
Zurück zum Zitat Cheswick, W., and Belovin, S., Firewalls and Internet Security. Addison-Wesley, 1995. Cheswick, W., and Belovin, S., Firewalls and Internet Security. Addison-Wesley, 1995.
20.
Zurück zum Zitat Mayer, A., Wool, A., and Ziskind, E., Fang: A Firewall Analysis Engine. The 2000 IEEE Symposium on Security and Privacy, pp. 177, May 2000. Mayer, A., Wool, A., and Ziskind, E., Fang: A Firewall Analysis Engine. The 2000 IEEE Symposium on Security and Privacy, pp. 177, May 2000.
21.
Zurück zum Zitat Ioannidis, S., Keromytis, A., Bellovin, S., and Smith, J., Implementing a distributed firewall. Conference on Computer and Communications Security, pp. 190–199, November 2000. Ioannidis, S., Keromytis, A., Bellovin, S., and Smith, J., Implementing a distributed firewall. Conference on Computer and Communications Security, pp. 190–199, November 2000.
22.
Zurück zum Zitat Hua, W. J., Su, C. X., Zhu, Z. Y., and Jun, N. A flexible policy-based firewall management framework. International Conference on Cyberworlds, pp. 192–194, 2008. Hua, W. J., Su, C. X., Zhu, Z. Y., and Jun, N. A flexible policy-based firewall management framework. International Conference on Cyberworlds, pp. 192–194, 2008.
Metadaten
Titel
The Enhancement of Security in Healthcare Information Systems
verfasst von
Chia-Hui Liu
Yu-Fang Chung
Tzer-Shyong Chen
Sheng-De Wang
Publikationsdatum
01.06.2012
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 3/2012
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-010-9628-3

Weitere Artikel der Ausgabe 3/2012

Journal of Medical Systems 3/2012 Zur Ausgabe