1
|
Basil NN, Ambe S, Ekhator C, Fonkem E. Health Records Database and Inherent Security Concerns: A Review of the Literature. Cureus 2022; 14:e30168. [DOI: 10.7759/cureus.30168] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 10/11/2022] [Indexed: 11/06/2022] Open
|
2
|
Chatterjee A, Prinz A. Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study. SENSORS (BASEL, SWITZERLAND) 2022; 22:s22051703. [PMID: 35270850 PMCID: PMC8914669 DOI: 10.3390/s22051703] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/05/2022] [Revised: 02/19/2022] [Accepted: 02/20/2022] [Indexed: 05/14/2023]
Abstract
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solution, we utilized a web engineering security method. As a case study, we designed and developed an electronic health coaching (eCoach) prototype system and hosted the system in the expanded digital secure infrastructure to collect and exchange personal health data over microservice APIs. We further described our adopted security solution's procedural, technical, and practical considerations. We validated our SSK solution implementation by theoretical evaluation and experimental testing. We have compared the test outcomes with related studies qualitatively to determine the efficacy of the hybrid security solution in digital infrastructure. The SSK implementation and configuration in the eCoach prototype system has effectively secured its microservice APIs from an attack in all the considered scenarios with 100% accuracy. The developed digital infrastructure with SSK solution efficiently sustained a load of (≈)300 concurrent users. In addition, we have performed a qualitative comparison among the following security solutions: Spring-based security, Keycloak-based security, and their combination (our utilized hybrid security solution), where SSK showed a promising outcome.
Collapse
|
3
|
Keshta I, Odeh A. Security and privacy of electronic health records: Concerns and challenges. EGYPTIAN INFORMATICS JOURNAL 2021. [DOI: 10.1016/j.eij.2020.07.003] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
4
|
Scalia P, Ahmad F, Schubbe D, Forcino R, Durand MA, Barr PJ, Elwyn G. Integrating Option Grid Patient Decision Aids in the Epic Electronic Health Record: Case Study at 5 Health Systems. J Med Internet Res 2021; 23:e22766. [PMID: 33938806 PMCID: PMC8129884 DOI: 10.2196/22766] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/22/2020] [Revised: 10/20/2020] [Accepted: 02/17/2021] [Indexed: 11/26/2022] Open
Abstract
Background Some researchers argue that the successful implementation of patient decision aids (PDAs) into clinical workflows depends on their integration into electronic health records (EHRs). Anecdotally, we know that EHR integration is a complex and time-consuming task; yet, the process has not been examined in detail. As part of an implementation project, we examined the work involved in integrating an encounter PDA for symptomatic uterine fibroids into Epic EHR systems. Objective This study aims to identify the steps and time required to integrate a PDA into the Epic EHR system and examine facilitators and barriers to the integration effort. Methods We conducted a case study at 5 academic medical centers in the United States. A clinical champion at each institution liaised with their Epic EHR team to initiate the integration of the uterine fibroid Option Grid PDAs into clinician-facing menus. We scheduled regular meetings with the Epic software analysts and an expert Epic technologist to discuss how best to integrate the tools into Epic for use by clinicians with patients. The meetings were then recorded and transcribed. Two researchers independently coded the transcripts and field notes before categorizing the codes and conducting a thematic analysis to identify the facilitators and barriers to EHR integration. The steps were reviewed and edited by an Epic technologist to ensure their accuracy. Results Integrating the uterine fibroid Option Grid PDA into clinician-facing menus required an 18-month timeline and a 6-step process, as follows: task priority negotiation with Epic software teams, security risk assessment, technical review, Epic configuration; troubleshooting, and launch. The key facilitators of the process were the clinical champions who advocated for integration at the institutional level and the presence of an experienced technologist who guided Epic software analysts during the build. Another facilitator was the use of an emerging industry standard app platform (Health Level 7 Substitutable Medical Applications and Reusable Technologies on Fast Healthcare Interoperability Resources) as a means of integrating the Option Grid into existing systems. This standard platform enabled clinicians to access the tools by using single sign-on credentials and prevented protected health information from leaving the EHR. Key barriers were the lack of control over the Option Grid product developed by EBSCO (Elton B Stephens Company) Health; the periodic Epic upgrades that can result in a pause on new software configurations; and the unforeseen software problems with Option Grid (ie, inability to print the PDA), which delayed the launch of the PDA. Conclusions The integration of PDAs into the Epic EHR system requires a 6-step process and an 18-month timeline. The process required support and prioritization from a clinical champion, guidance from an experienced technologist, and a willing EHR software developer team.
Collapse
Affiliation(s)
| | | | | | | | | | | | - Glyn Elwyn
- Dartmouth College, Lebanon, NH, United States
| |
Collapse
|
5
|
Mukhopadhyay S, Basak R, Carpenter D, Reithel BJ. Patient use of online medical records: an application of technology acceptance framework. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-07-2019-0076] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/28/2023]
Abstract
Purpose
Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy breaches, patient use of OMR requires further attention. This paper aims to investigate patient use of OMR. Using the Unified Theory of Acceptance and Use of Technology (UTAUT), factors affecting continued use of OMR were examined.
Design/methodology/approach
The Health Information National Trends Survey 5 (HINTS 5), Cycle 1 data were used. This is an ongoing nation-wide survey sponsored by the National Cancer Institute (NCI) of the USA. The subjects were 31-74 years old with access to the Internet. Descriptive information was projected to the US population.
Findings
In total, 765 respondents representing 48.7 million members of the US population were analyzed. Weighted regression results showed significant effects of perceived usefulness, visit frequency and provider encouragement on continued use of OMR while vulnerability perception was not significant. Moderating effects of these variables were also noted. Perceived usefulness and provider encouragement emerged as important predictors.
Practical implications
Insights may help design interventions by health-care providers and policymakers.
Social implications
Insights should help patient empowerment and developers with designing systems.
Originality/value
This is the first study to examine health-care consumers’ continued use of OMR using nationally representative data and real-world patients, many of who have one or more chronic diseases (e.g. diabetes, hypertension, asthma) or are cancer survivors. Results highlight factors helping or hindering continuing OMR use. As such, insights should help identify opportunities to increase the extent of use, project future OMR usage patterns and spread the benefits of OMR, including bringing forth positive health outcomes.
Collapse
|
6
|
Uwizeyemungu S, Poba-Nzaou P, Cantinotti M. European Hospitals' Transition Toward Fully Electronic-Based Systems: Do Information Technology Security and Privacy Practices Follow? JMIR Med Inform 2019; 7:e11211. [PMID: 30907732 PMCID: PMC6452275 DOI: 10.2196/11211] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/02/2018] [Revised: 11/29/2018] [Accepted: 12/29/2018] [Indexed: 11/13/2022] Open
Abstract
BACKGROUND Traditionally, health information has been mainly kept in paper-based records. This has deeply changed throughout approximately the last three decades with the widespread use of multiple health information technologies. The digitization of health care systems contributes to improving health care delivery. However, it also exposes health records to security and privacy breaches inherently related to information technology (IT). Thus, health care organizations willing to leverage IT for improved health care delivery need to put in place IT security and privacy measures consistent with their use of IT resources. OBJECTIVE In this study, 2 main objectives are pursued: (1) to assess the state of the implementation of IT security and privacy practices in European hospitals and (2) to assess to what extent these hospitals enhance their IT security and privacy practices as they move from paper-based systems toward fully electronic-based systems. METHODS Drawing on data from the European Commission electronic health survey, we performed a cluster analysis based on IT security and privacy practices implemented in 1723 European hospitals. We also developed an IT security index, a compounded measure of implemented IT security and privacy practices, and compared it with the hospitals' level in their transition from a paper-based system toward a fully electronic-based system. RESULTS A total of 3 clearly distinct patterns of health IT-related security and privacy practices were unveiled. These patterns, as well as the IT security index, indicate that most of the sampled hospitals (70.2%) failed to implement basic security and privacy measures consistent with their digitization level. CONCLUSIONS Even though, on average, the most electronically advanced hospitals display a higher IT security index than hospitals where the paper system still dominates, surprisingly, it appears that the enhancement of IT security and privacy practices as the health information digitization advances in European hospitals is neither systematic nor strong enough regarding the IT-security requirements. This study will contribute to raising awareness among hospitals' managers as to the importance of enhancing their IT security and privacy measures so that they can keep up with the security threats inherently related to the digitization of health care organizations.
Collapse
Affiliation(s)
- Sylvestre Uwizeyemungu
- Accounting Department, Université du Québec à Trois-Rivières, Trois-Rivières, QC, Canada
| | - Placide Poba-Nzaou
- Department of Organization and Human Resources Management, École des Sciences de la Gestion, Université du Québec à Montréal, Montréal, QC, Canada
| | - Michael Cantinotti
- Psychology Department, Université du Québec à Trois-Rivières, Trois-Rivières, QC, Canada
| |
Collapse
|
7
|
Kruse CS, Smith B, Vanderlinden H, Nealand A. Security Techniques for the Electronic Health Records. J Med Syst 2017; 41:127. [PMID: 28733949 PMCID: PMC5522514 DOI: 10.1007/s10916-017-0778-4] [Citation(s) in RCA: 45] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/15/2016] [Accepted: 07/12/2017] [Indexed: 11/22/2022]
Abstract
The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.
Collapse
Affiliation(s)
- Clemens Scott Kruse
- School of Health Administration, Texas State University - San Marcos, 601 University Drive, San Marcos, TX, 78666, USA.
| | - Brenna Smith
- School of Health Administration, Texas State University - San Marcos, 601 University Drive, San Marcos, TX, 78666, USA
| | - Hannah Vanderlinden
- School of Health Administration, Texas State University - San Marcos, 601 University Drive, San Marcos, TX, 78666, USA
| | - Alexandra Nealand
- School of Health Administration, Texas State University - San Marcos, 601 University Drive, San Marcos, TX, 78666, USA
| |
Collapse
|
8
|
Showell C. Barriers to the use of personal health records by patients: a structured review. PeerJ 2017; 5:e3268. [PMID: 28462058 PMCID: PMC5410160 DOI: 10.7717/peerj.3268] [Citation(s) in RCA: 44] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/28/2016] [Accepted: 04/03/2017] [Indexed: 12/20/2022] Open
Abstract
Introduction An increasing focus on personal electronic health records (PHRs) offers healthcare benefits for patients, particularly those in undeserved and marginalised populations, who are at risk of receiving less effective healthcare, and may have worse health outcomes. However, PHRs are likely to favour text, technical and health literate users, and be less suitable for disadvantaged patients. These concerns have prompted this review of the literature, which seeks evidence about barriers to the adoption and continued use of PHRs, the nature of the evidence for those barriers, and the stage of PHR implementation where particular barriers apply. Methods Searches in PubMed, Embase, CINAHL and ProQuest databases were used to retrieve articles published in English after 2003 in a refereed journal, or presented in a refereed conference or scientific meeting. After screening to remove items which were out of scope, the phase of the PHR implementation, the type of investigation, and PHR barriers were categorised using thematic coding. Results The search retrieved 395 items; screening identified 34 in-scope publications, which provided evidence of 21 identified barriers to patient adoption and continued use of PHRs, categorised here as Individual, Demographic, Capability, Health-related, PHR or Attitudinal factors. Barriers were identified in most phases of PHR implementation, and in most types of study. A secondary outcome identified that eleven of the publications may have introduced a bias by excluding participants who were less affluent, less capable, or marginalised. Conclusions PHR barriers can interfere with the decision to start using a PHR, with the adoption process, and with continued use, and the impact of particular barriers may vary at different phases of PHR adoption. The complex interrelationships which exist between many of the barriers is suggested in some publications, and emerges more clearly from this review. Many PHR barriers appear to be related to low socioeconomic status. A better understanding is needed of how the effect of barriers is manifested, how that effect can be countered, and how planning and implementation of PHR initiatives can make allowance for patient level barriers to PHR adoption and use, with appropriate actions to mitigate the effect of those barriers for more disadvantaged patients.
Collapse
Affiliation(s)
- Chris Showell
- eHealth Services Research Group, University of Tasmania, Australia
| |
Collapse
|
9
|
Access control and privilege management in electronic health record: a systematic literature review. J Med Syst 2016; 40:261. [DOI: 10.1007/s10916-016-0589-z] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2016] [Accepted: 09/04/2016] [Indexed: 10/20/2022]
|
10
|
de la Torre-Díez I, Lopez-Coronado M, Garcia-Zapirain Soto B, Mendez-Zorrilla A. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers. J Med Internet Res 2015. [PMID: 26215155 PMCID: PMC4705355 DOI: 10.2196/jmir.4422] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/03/2022] Open
Abstract
Background The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. Objective The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. Methods The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. Results We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. Conclusions The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost.
Collapse
Affiliation(s)
- Isabel de la Torre-Díez
- Grupo de Telemedicina y eSalud, Departamento de Teoría de la Señal y Comunicaciones e Ingeniería Telemática, University of Valladolid, Valladolid, Spain
| | | | | | | |
Collapse
|
11
|
Abstract
OBJECTIVES Implementation of Electronic Health Record (EHR) systems continues to expand. The massive number of patient encounters results in high amounts of stored data. Transforming clinical data into knowledge to improve patient care has been the goal of biomedical informatics professionals for many decades, and this work is now increasingly recognized outside our field. In reviewing the literature for the past three years, we focus on "big data" in the context of EHR systems and we report on some examples of how secondary use of data has been put into practice. METHODS We searched PubMed database for articles from January 1, 2011 to November 1, 2013. We initiated the search with keywords related to "big data" and EHR. We identified relevant articles and additional keywords from the retrieved articles were added. Based on the new keywords, more articles were retrieved and we manually narrowed down the set utilizing predefined inclusion and exclusion criteria. RESULTS Our final review includes articles categorized into the themes of data mining (pharmacovigilance, phenotyping, natural language processing), data application and integration (clinical decision support, personal monitoring, social media), and privacy and security. CONCLUSION The increasing adoption of EHR systems worldwide makes it possible to capture large amounts of clinical data. There is an increasing number of articles addressing the theme of "big data", and the concepts associated with these articles vary. The next step is to transform healthcare big data into actionable knowledge.
Collapse
Affiliation(s)
- M K Ross
- Lucila Ohno-Machado, Division of Biomedical Informatics, 9500 Gilman Drive, MC 0505, La Jolla, California, 92037-0505, USA, Tel: +1 858 822 4931, E-mail:
| | | | | |
Collapse
|
12
|
Rodrigues JJPC, de la Torre I, Fernández G, López-Coronado M. Analysis of the security and privacy requirements of cloud-based electronic health records systems. J Med Internet Res 2013; 15:e186. [PMID: 23965254 PMCID: PMC3757992 DOI: 10.2196/jmir.2494] [Citation(s) in RCA: 106] [Impact Index Per Article: 9.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/15/2012] [Accepted: 06/11/2013] [Indexed: 11/13/2022] Open
Abstract
BACKGROUND The Cloud Computing paradigm offers eHealth systems the opportunity to enhance the features and functionality that they offer. However, moving patients' medical information to the Cloud implies several risks in terms of the security and privacy of sensitive health records. In this paper, the risks of hosting Electronic Health Records (EHRs) on the servers of third-party Cloud service providers are reviewed. To protect the confidentiality of patient information and facilitate the process, some suggestions for health care providers are made. Moreover, security issues that Cloud service providers should address in their platforms are considered. OBJECTIVE To show that, before moving patient health records to the Cloud, security and privacy concerns must be considered by both health care providers and Cloud service providers. Security requirements of a generic Cloud service provider are analyzed. METHODS To study the latest in Cloud-based computing solutions, bibliographic material was obtained mainly from Medline sources. Furthermore, direct contact was made with several Cloud service providers. RESULTS Some of the security issues that should be considered by both Cloud service providers and their health care customers are role-based access, network security mechanisms, data encryption, digital signatures, and access monitoring. Furthermore, to guarantee the safety of the information and comply with privacy policies, the Cloud service provider must be compliant with various certifications and third-party requirements, such as SAS70 Type II, PCI DSS Level 1, ISO 27001, and the US Federal Information Security Management Act (FISMA). CONCLUSIONS Storing sensitive information such as EHRs in the Cloud means that precautions must be taken to ensure the safety and confidentiality of the data. A relationship built on trust with the Cloud service provider is essential to ensure a transparent process. Cloud service providers must make certain that all security mechanisms are in place to avoid unauthorized access and data breaches. Patients must be kept informed about how their data are being managed.
Collapse
|
13
|
Benefits and Challenges of Electronic Health Record System on Stakeholders: A Qualitative Study of Outpatient Physicians. J Med Syst 2013; 37:9960. [DOI: 10.1007/s10916-013-9960-5] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/20/2013] [Accepted: 07/02/2013] [Indexed: 10/26/2022]
|