-
Journal of Medical Systems Aug 2018The provision of Quality of Service (QoS) and Quality of Experience (QoE) is a mandatory requirement when transmitting telemedicine traffic, due to information relevance... (Review)
Review
The provision of Quality of Service (QoS) and Quality of Experience (QoE) is a mandatory requirement when transmitting telemedicine traffic, due to information relevance to maintain the patient's health. The main objective of this paper is to present a review of existing research works in the literature, referring to QoS and QoE in telemedicine and eHealth applications. The academic databases that were used to perform the searches are Google Scholar, IEEE Xplore, PubMed, Science Direct and Web of Science, taking into account the date of publication from 2008 to the present. These databases cover the most information of scientific texts in multidisciplinary fields, engineering and medicine. Several search criteria were established such as 'QoS' AND 'eHealth' OR 'Telemedicine', 'QoE' AND 'eHealth' AND 'Telemedicine' etc. selecting the items of greatest interest. A total of 248 papers related to QoS and QoE in telemedicine and eHealth have been found, of which 39 papers have been identified as relevant works. The results show that the percentage of studies related to QoS in literature is higher with 74.36% to QoE with 25.64%. From the review of the research articles analyzed, it can be said that QoS and QoE in telemedicine and eHealth are important and necessary factors to guarantee the privacy, reliability, quality and security of data in health care systems.
Topics: Databases, Factual; Delivery of Health Care; Humans; Reproducibility of Results; Telemedicine
PubMed: 30155565
DOI: 10.1007/s10916-018-1040-4 -
Journal of Dentistry Jul 2022This scoping review aims to review explore, assess, and map the literature to inform clinical practice regarding communication between clinicians. Specific Apps/channels... (Review)
Review
OBJECTIVES
This scoping review aims to review explore, assess, and map the literature to inform clinical practice regarding communication between clinicians. Specific Apps/channels used were identified and assessed with a focus on data security with key concepts and knowledge gaps identified.
DATA
The Joanna Briggs Institute framework is followed, with search results reported as per the PRISMA ScR for scoping reviews guidelines.
SOURCES
A systematic search strategy encompassing EBSCO and OneSearch databases was conducted - two identical searches, (June and October 2020) limited to English language articles published 2016-2020. A narrative synthesis was used to integrate and report the findings.
STUDY SELECTION
Sixty-six publications were selected. Twelve from EBSCO, thirty-five from OneSearch, nineteen were hand searched. Sixteen of the publications were research studies, nine were literature reviews, twenty-six were editorial, one was a newspaper article and fourteen were grey literature. Instant Messaging (40%, n = 23), image sharing (41%, n = 24), and video conferencing (19%, n = 11) were functions most popular with clinicians. WhatsApp, generic instant messaging, Facebook messenger, ZOOM, and Skype are evidenced as channels for communication between clinicians within the EU. A sizeable proportion of the publications (38%; n = 25) failed to identify or adequately address technical security concerns and requirements around privacy and data protection.
CONCLUSIONS
Clinicians use smartphones /Apps to communicate clinical information with each other. The security and privacy issues arising from their communication of sensitive data is absent or only superficially acknowledged within the literature.
CLINICAL SIGNIFICANCE
Clinician's need clearer guidance on the use of smartphone technology for clinical communications.
Topics: Communication; Computer Security; Humans; Privacy; Smartphone; Technology
PubMed: 35413411
DOI: 10.1016/j.jdent.2022.104112 -
Journal of Medical Internet Research Jul 2021Functionalities of personal health record (PHR) are evolving, and continued discussions about PHR functionalities need to be performed to keep it up-to-date.... (Review)
Review
BACKGROUND
Functionalities of personal health record (PHR) are evolving, and continued discussions about PHR functionalities need to be performed to keep it up-to-date. Technological issues such as nonfunctional requirements should also be discussed in the implementation of PHR.
OBJECTIVE
This study systematically reviewed the main functionalities and issues in implementing the PHR.
METHODS
This systematic review was conducted using Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) guidelines. The search is performed using the online databases Scopus, ScienceDirect, IEEE, MEDLINE, CINAHL, and PubMed for English journal articles and conference proceedings published between 2015 and 2020.
RESULTS
A total of 105 articles were selected in the review. Seven function categories were identified in this review, which is grouped into basic and advanced functions. Health records and administrative records were grouped into basic functions. Medication management, communication, appointment management, education, and self-health monitoring were grouped into advanced functions. The issues found in this study include interoperability, security and privacy, usability, data quality, and personalization.
CONCLUSIONS
In addition to PHR basic and advanced functions, other supporting functionalities may also need to be developed based on the issues identified in this study. This paper provides an integrated PHR architectural model that describes the functional requirements and data sources of PHRs.
Topics: Health Records, Personal; Humans; Information Storage and Retrieval; Medical Records Systems, Computerized; Technology
PubMed: 34287210
DOI: 10.2196/26236 -
Perspectives in Health Information... 2023The objective of the study is to identify challenges and associated factors for privacy and security related to telehealth visits during the COVID-19 pandemic. The...
The objective of the study is to identify challenges and associated factors for privacy and security related to telehealth visits during the COVID-19 pandemic. The systematic search strategy used the databases of PubMed, ScienceDirect, ProQuest, Embase, CINAHL, and COCHRANE, with the search terms of telehealth/telemedicine, privacy, security, and confidentiality. Reviews included peer-reviewed empirical studies conducted from January 2020 to February 2022. Studies conducted outside of the US, non-empirical, and non-telehealth related were excluded. Eighteen studies were included in the final analysis. Three risk factors associated with privacy and security in telehealth practice included: environmental factors (lack of private space for vulnerable populations, difficulty sharing sensitive health information remotely), technology factors (data security issues, limited access to the internet, and technology), and operational factors (reimbursement, payer denials, technology accessibility, training, and education). Findings from this study can assist governments, policymakers, and healthcare organizations in developing best practices in telehealth privacy and security strategies.
Topics: Humans; Privacy; Pandemics; COVID-19; Confidentiality; Risk Factors; Telemedicine
PubMed: 37215337
DOI: No ID Found -
Yearbook of Medical Informatics Aug 2018To summarize the recent literature and research and present a selection of the best papers published in 2017 in the field of Health Information Management (HIM) and... (Review)
Review
OBJECTIVE
To summarize the recent literature and research and present a selection of the best papers published in 2017 in the field of Health Information Management (HIM) and Health Informatics.
METHODS
A systematic review of the literature was performed by the two HIM section editors of the International Medical Informatics Association (IMIA) Yearbook with the help of a medical librarian. We searched bibliographic databases for HIM-related papers using both MeSH descriptors and keywords in titles and abstracts. A shortlist of 15 candidate best papers was first selected by section editors before being peer-reviewed by independent external reviewers.
RESULTS
Health Information Exchange was a major theme within candidate best papers. The four papers ultimately selected as 'Best Papers' represent themes that include health information exchange, governance and policy issues, results of health information exchange, and methods of integrating information from multiple sources. Other articles within the candidate best papers include these themes as well as those focusing on authentication and de-identification and usability of information systems.
CONCLUSIONS
The papers discussed in the HIM section of IMIA Yearbook reflect the overall theme of the 2018 edition of the Yearbook, i.e., the tension between privacy and access to information. While most of the papers focused on health information exchange, which reflects the "access" side of the equation, most of the others addressed privacy issues. This synopsis discusses these key issues at the intersection of HIM and informatics.
Topics: Confidentiality; Data Anonymization; Health Information Exchange; Health Information Management; Health Policy; Health Records, Personal; Humans
PubMed: 30157507
DOI: 10.1055/s-0038-1667072 -
Sensors (Basel, Switzerland) Dec 2021Owing to the hasty growth of communication technologies in the Underwater Internet of Things (UIoT), many researchers and industries focus on enhancing the existing... (Review)
Review
Owing to the hasty growth of communication technologies in the Underwater Internet of Things (UIoT), many researchers and industries focus on enhancing the existing technologies of UIoT systems for developing numerous applications such as oceanography, diver networks monitoring, deep-sea exploration and early warning systems. In a constrained UIoT environment, communication media such as acoustic, infrared (IR), visible light, radiofrequency (RF) and magnet induction (MI) are generally used to transmit information via digitally linked underwater devices. However, each medium has its technical limitations: for example, the acoustic medium has challenges such as narrow-channel bandwidth, low data rate, high cost, etc., and optical medium has challenges such as high absorption, scattering, long-distance data transmission, etc. Moreover, the malicious node can steal the underwater data by employing blackhole attacks, routing attacks, Sybil attacks, etc. Furthermore, due to heavyweight, the existing privacy and security mechanism of the terrestrial internet of things (IoT) cannot be applied directly to UIoT environment. Hence, this paper aims to provide a systematic review of recent trends, applications, communication technologies, challenges, security threats and privacy issues of UIoT system. Additionally, this paper highlights the methods of preventing the technical challenges and security attacks of the UIoT environment. Finally, this systematic review contributes much to the profit of researchers to analyze and improve the performance of services in UIoT applications.
Topics: Acoustics; Computer Security; Internet of Things; Privacy; Technology
PubMed: 34960366
DOI: 10.3390/s21248262 -
Journal of Advanced Nursing Nov 2022To synthesize quantitative evidence on levels of dignity during acute hospital admission and identify barriers and facilitators to patients' dignity or dignified care... (Review)
Review
AIMS
To synthesize quantitative evidence on levels of dignity during acute hospital admission and identify barriers and facilitators to patients' dignity or dignified care from the perspective of hospitalized patients. The secondary aim was to examine the relationship between dignity and demographic, clinical and psychological characteristics of patients.
DESIGN
A systematic review based on the protocol of the Preferred Reporting Items for Systematic reviews and Meta-Analyses guideline for reporting systematic reviews.
DATA SOURCES
Five electronic databases (PubMed, CINAHL, Embase, PsycINFO, AgeLine) were searched in February 2021, followed by backward-forward searching using Web of Science and Scopus databases.
REVIEW METHODS
Potentially eligible articles were scrutinized by two reviewers. Articles that met the eligibility criteria were appraised for quality using the Critical Appraisal Tool for Cross-Sectional Studies. Two reviewers extracted data for the review and resolved differences by consensus.
RESULTS
Out of 3052 potentially eligible studies, 25 met the inclusion criteria. Levels of dignity for hospitalized patients vary widely across geographic locations. Patients' dignity is upheld when healthcare professionals communicate effectively, maintain their privacy, and provide dignity therapy. Patients' perceptions of dignity were, in some studies, reported to be associated with demographic (e.g. age, marital status, gender, employment, educational status), clinical (e.g. hospitalization, functional impairment, physical symptoms) and psychological (e.g. depression, anxiety, demoralization, coping mechanisms) variables whilst other studies did not observe such associations.
CONCLUSION
Patients in acute care settings experience mild to a severe loss of dignity across different geographic locations. Patients' dignity is influenced by several demographic, clinical and psychological characteristics of patients.
IMPACT
The findings of the review support impetus for improvement in dignified care for hospitalized patients, addressing factors that facilitate or impede patients' dignity. Measures aimed at alleviating suffering, fostering functional independence and addressing patients' psychosocial needs can be used to promote dignity.
Topics: Cross-Sectional Studies; Hospitalization; Hospitals; Humans; Patient Reported Outcome Measures; Respect
PubMed: 35841334
DOI: 10.1111/jan.15370 -
Informatics For Health & Social Care Jan 2023Information security and privacy are matters of concern in every industry. The healthcare sector has lagged in terms of implementing cybersecurity measures. Therefore,...
Information security and privacy are matters of concern in every industry. The healthcare sector has lagged in terms of implementing cybersecurity measures. Therefore, hospitals are more exposed to cyber events due to the criticality of patient data. Currently, little is known about state-of-the-art research on information security and privacy in hospitals. The purpose of this study is to report the outcome of a systematic literature review on research about the application of information security and privacy in hospitals. A systematic literature review following the PRISMA methodology was conducted. To reference our sample according to cybersecurity domains, we benchmarked each article against two cybersecurity frameworks: ISO 27001 Annex A and the NIST framework core. Limited articles in our papers referred to the policies and compliance sections of ISO 27001. In addition, most of our sample is classified by the NIST function "Protect," meaning activities related to identity management, access control and data security. Furthermore, we have identified key domains where research in security and privacy are critical, such as big data, IOT, cloud computing, standards and regulations. The results indicate that although cybersecurity is a growing concern in hospitals, research is still weak in some areas. Considering the recrudescence of cyber-attacks in the healthcare sector, we call for more research in hospitals in managerial and non-technical domains of information security and privacy that are uncovered by our analysis.
Topics: Humans; Privacy; Evidence Gaps; Hospitals; Computer Security; Cloud Computing
PubMed: 35300555
DOI: 10.1080/17538157.2022.2049274 -
Health Information Management : Journal... 2015Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR... (Meta-Analysis)
Meta-Analysis Review
BACKGROUND
Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist.
OBJECTIVE
This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems.
METHOD
Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings.
RESULTS
Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques.
CONCLUSION
This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.
Topics: Access to Information; Computer Security; Confidentiality; Electronic Health Records; Guideline Adherence; Humans
PubMed: 26464299
DOI: 10.1177/183335831504400304 -
International Journal of... 2017The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth... (Review)
Review
The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 - 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth. Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen's kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions.
PubMed: 29238448
DOI: 10.5195/ijt.2017.6231