1
|
Pal P, Sambhakar S, Dave V, Paliwal SK, Paliwal S, Sharma M, Kumar A, Dhama N. A review on emerging smart technological innovations in healthcare sector for increasing patient's medication adherence. GLOBAL HEALTH JOURNAL 2021. [DOI: 10.1016/j.glohj.2021.11.006] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/12/2022] Open
|
2
|
Koenig KR, Pasupathy KS, Hellmich TR, Hawthorne HJ, Karalius VP, Sir M, Das D, Heaton HA, Nestler DM. Measuring Sensitivity and Precision of Real-Time Location Systems (RTLS): Definition, Protocol and Demonstration for Clinical Relevance. J Med Syst 2021; 45:15. [PMID: 33411118 DOI: 10.1007/s10916-020-01606-6] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/15/2019] [Accepted: 07/15/2020] [Indexed: 11/25/2022]
Abstract
The ability of a Real Time Location System (RTLS) to provide correct information in a clinical environment is an important consideration in evaluating the effectiveness of the technology. While past efforts describe how well the technology performed in a lab environment, the performance of such technology has not been specifically defined or evaluated in a practice setting involving workflow and movement. Clinical environments pose complexity owing to various layouts and various movements. Further, RTL systems are not equipped to provide true negative information (where an entity is not located). Hence, this study defined sensitivity and precision in this context, and developed a simulation protocol to serve as a systematic testing framework using actors in a clinical environment. The protocol was used to measure the sensitivity and precision of an RTL system in the emergency department space of a quaternary care medical center. The overall sensitivity and precision were determined to be 84 and 93% respectively. These varied for patient rooms, staff area, hallway and other rooms.
Collapse
Affiliation(s)
- Kyle R Koenig
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Robert D. and Patricia E. Kern Center for the Science of Health Care Delivery, Mayo Clinic, Rochester, MN, USA
| | - Kalyan S Pasupathy
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA.
- Robert D. and Patricia E. Kern Center for the Science of Health Care Delivery, Mayo Clinic, Rochester, MN, USA.
- Department of Health Sciences Research, Mayo Clinic, Rochester, MN, USA.
| | - Thomas R Hellmich
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Department of Emergency Medicine, Mayo Clinic, Rochester, MN, USA
| | - Hunter J Hawthorne
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Robert D. and Patricia E. Kern Center for the Science of Health Care Delivery, Mayo Clinic, Rochester, MN, USA
| | - Vytas P Karalius
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Mayo Clinic School of Medicine, Mayo Clinic, Rochester, MN, USA
| | - Mustafa Sir
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Robert D. and Patricia E. Kern Center for the Science of Health Care Delivery, Mayo Clinic, Rochester, MN, USA
- Department of Health Sciences Research, Mayo Clinic, Rochester, MN, USA
| | - Devashish Das
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Robert D. and Patricia E. Kern Center for the Science of Health Care Delivery, Mayo Clinic, Rochester, MN, USA
- Department of Health Sciences Research, Mayo Clinic, Rochester, MN, USA
- Department of Industrial & Management Systems Engineering, University of South Florida, Tamps, FL, USA
| | - Heather A Heaton
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Department of Emergency Medicine, Mayo Clinic, Rochester, MN, USA
| | - David M Nestler
- Clinical Engineering Learning Lab, Mayo Clinic, Rochester, MN, USA
- Department of Emergency Medicine, Mayo Clinic, Rochester, MN, USA
| |
Collapse
|
4
|
Abstract
Radio Frequency Identification (RFID) enables automatic identification of objects using radio waves. The identified objects can be in and out of the line of sight and there is no need for physical contact with them. RFID technology is deployed in a wide range of industries such as supply chain management, inventory control, farming (to track animals), e-Passports, the tracking of humans (in prisons and hospitals) and in healthcare [1]. The three key elements of an RFID system are the tags, readers and the backend server. Tags are devices physically attached to objects and readers (wired or mobile) recognize the presence of objects in its range.
Collapse
Affiliation(s)
- Sasan Adibi
- Faculty of Science Engineering & Built Environment, School of Information Technology, Burwood, Victoria Australia
| |
Collapse
|
8
|
Safkhani M, Bagheri N, Naderi M. On the designing of a tamper resistant prescription RFID access control system. J Med Syst 2012; 36:3995-4004. [PMID: 22878923 DOI: 10.1007/s10916-012-9872-9] [Citation(s) in RCA: 11] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/02/2012] [Accepted: 07/16/2012] [Indexed: 12/01/2022]
Abstract
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Collapse
Affiliation(s)
- Masoumeh Safkhani
- Electrical Engineering Department, Iran University of Science and Technology, Tehran, Iran.
| | | | | |
Collapse
|
9
|
Fosso Wamba S. RFID-enabled healthcare applications, issues and benefits: an archival analysis (1997-2011). J Med Syst 2011; 36:3393-8. [PMID: 22109670 DOI: 10.1007/s10916-011-9807-x] [Citation(s) in RCA: 32] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/02/2011] [Accepted: 11/04/2011] [Indexed: 11/27/2022]
Abstract
In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.
Collapse
|
10
|
Lin J, Pai JY, Chen CC. Applied patent RFID systems for building reacting HEPA air ventilation system in hospital operation rooms. J Med Syst 2011; 36:3399-405. [PMID: 22081235 DOI: 10.1007/s10916-011-9800-4] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/14/2011] [Accepted: 10/20/2011] [Indexed: 11/29/2022]
Abstract
RFID technology, an automatic identification and data capture technology to provide identification, tracing, security and so on, was widely applied to healthcare industry in these years. Employing HEPA ventilation system in hospital is a way to ensure healthful indoor air quality to protect patients and healthcare workers against hospital-acquired infections. However, the system consumes lots of electricity which cost a lot. This study aims to apply the RFID technology to offer a unique medical staff and patient identification, and reacting HEPA air ventilation system in order to reduce the cost, save energy and prevent the prevalence of hospital-acquired infection. The system, reacting HEPA air ventilation system, contains RFID tags (for medical staffs and patients), sensor, and reacting system which receives the information regarding the number of medical staff and the status of the surgery, and controls the air volume of the HEPA air ventilation system accordingly. A pilot program was carried out in a unit of operation rooms of a medical center with 1,500 beds located in central Taiwan from Jan to Aug 2010. The results found the air ventilation system was able to function much more efficiently with less energy consumed. Furthermore, the indoor air quality could still keep qualified and hospital-acquired infection or other occupational diseases could be prevented.
Collapse
Affiliation(s)
- Jesun Lin
- Institute of Medicine, Chung Shan Medical University, Taichung, Taiwan
| | | | | |
Collapse
|
11
|
Yao W, Chu CH, Li Z. The adoption and implementation of RFID technologies in healthcare: a literature review. J Med Syst 2011; 36:3507-25. [PMID: 22009254 DOI: 10.1007/s10916-011-9789-8] [Citation(s) in RCA: 171] [Impact Index Per Article: 13.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/15/2011] [Accepted: 10/04/2011] [Indexed: 11/25/2022]
Abstract
Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use of RFID in healthcare/hospitals following a formal innovation-decision framework. We aim to identify the common applications, potential benefits, barriers, and critical success factors. Our study facilitates quick assessment and provides guidance for researchers and practitioners in adopting RFID in medical arenas. Many earlier adopters in healthcare found RFID to be functional and useful in such areas as asset tracking and patient identification. Major barriers to adoption include technological limitations, interference concerns, prohibitive costs, lack of global standards and privacy concerns. Better designed RFID systems with low cost and privacy issues addressed are needed to increase acceptance of RFID in healthcare.
Collapse
Affiliation(s)
- Wen Yao
- College of Information Sciences and Technology, The Pennsylvania State University, 306A, IST Building, University Park, PA 16802, USA.
| | | | | |
Collapse
|
13
|
Wickboldt AK, Piramuthu S. Patient safety through RFID: vulnerabilities in recently proposed grouping protocols. J Med Syst 2010; 36:431-5. [PMID: 20703708 DOI: 10.1007/s10916-010-9487-y] [Citation(s) in RCA: 20] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/16/2010] [Accepted: 03/30/2010] [Indexed: 10/19/2022]
Abstract
As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.
Collapse
|