-
Journal of Medical Internet Research Aug 2023The health care sector experiences 76% of cybersecurity breaches due to basic web application attacks, miscellaneous errors, and system intrusions, resulting in...
The health care sector experiences 76% of cybersecurity breaches due to basic web application attacks, miscellaneous errors, and system intrusions, resulting in compromised health data or disrupted health services. The European Commission proposed the European Health Data Space (EHDS) in 2022 to enhance care delivery and improve patients' lives by offering all European Union (EU) citizens control over their personal health data in a private and secure environment. The EU has taken an important step in homogenizing the health data environment of the European health ecosystem, although more attention needs to be paid to keeping the health data of EU citizens safe and secure within the EHDS. The pooling of health data across countries can have tremendous benefits, but it may also become a target for cybercriminals or state-sponsored hackers. State-of-the-art security measures are essential, and the current EHDS proposal lacks sufficient measures to warrant a cybersecure and resilient environment.
Topics: Humans; Ecosystem; Computer Security; Europe; European Union; Health Care Sector
PubMed: 37616048
DOI: 10.2196/48824 -
International Journal of Neonatal... Aug 2023Dried blood spot (DBS) cards from newborn screening (NBS) programs represent a wealth of biological data. They can be stored easily for a long time, have the potential...
Dried blood spot (DBS) cards from newborn screening (NBS) programs represent a wealth of biological data. They can be stored easily for a long time, have the potential to support medical and public health research, and have secondary usages such as quality assurance and forensics, making it the ideal candidate for bio-banking. However, worldwide policies vary with regard to the duration of storage of DBS cards and how it can be used. Recent advances in genomics have also made it possible to perform extended genetic testing on DBS cards in the newborn period to diagnose both actionable and non-actionable childhood and adult diseases. Both storage and secondary uses of DBS cards raise many ethical, clinical, and social questions. The openness of the key stakeholders, namely, parents and healthcare providers (HCPs), to store the DBS cards, and for what duration and purposes, and to extended genetic testing is largely dependent on local cultural-social-specific factors. The study objective is to assess the parents' and HCPs' awareness and receptivity toward DBS retention, its secondary usage, and extended genetic testing. A cross-sectional, self-administrated survey was adopted at three hospitals, out of which two were public hospitals with maternity services, between June and December 2022. In total, 452 parents and 107 HCPs completed and returned the survey. Overall, both HCPs and parents were largely knowledgeable about the potential benefits of DBS card storage for a prolonged period and its secondary uses, and they supported extended genetic testing. Knowledge gaps were found in respondents with a lower education level who did not know that a DBS card could be stored for an extended period ( < 0.001), could support scientific research ( = 0.033), and could aid public health research, and future policy implementation ( = 0.030). Main concerns with regard to DBS card storage related to potential privacy breaches and anonymity (Parents 70%, HCPs 60%). More parents, compared to HCPs, believed that storing DBS cards for secondary research does not lead to a reciprocal benefit to the child ( < 0.005). Regarding extended genetic testing, both groups were receptive and wanted to know about actionable childhood- and adult-onset diseases. More parents (four-fifths) rather than HCPs (three-fifths) were interested in learning about a variant with unknown significance ( < 0.001). Our findings report positive support from both parents and HCPs toward the extended retention of DBS cards for secondary usage and for extended genetic testing. However, more efforts to raise awareness need to be undertaken in addition to addressing the ethical concerns of both parents and HCPs to pave the way forward toward policy-making for DBS bio-banking and extended genetic testing in Hong Kong.
PubMed: 37606482
DOI: 10.3390/ijns9030045 -
Heliyon Aug 2023While working alongside professional nurses, student nurses develop professional identity and learn the professional nursing role, a process known as professional...
While working alongside professional nurses, student nurses develop professional identity and learn the professional nursing role, a process known as professional socialisation. Professional nurses should model professional behaviour to be emulated by student nurses. We used a qualitative exploratory design to explore if professional nurses behave in a manner that supports professional socialisation of student nurses in a clinical learning environment. According to our observations, two main categories emerged regarding professional nurses' behaviour. The first category was unprofessional conduct with sub-categories that included disrespect, infringed patient privacy, breached confidentiality, inappropriate dress code and lack of punctuality. The second category was ward disorganisation which was related to delegating duties and structured orientation programmes for student nurses. In this study, professional nurses did not behave in a manner consistent with professional socialisation in the clinical learning environment. Student nurses may struggle to develop professional identity, leading to reduced confidence and poor patient quality care. Student nurses need to be professionally socialised in a clinical learning environment and professional nurses need to be empowered on how to carry out this process.
PubMed: 37576296
DOI: 10.1016/j.heliyon.2023.e18611 -
International Journal of Environmental... Aug 2023Federated learning (FL) provides a distributed machine learning system that enables participants to train using local data to create a shared model by eliminating the... (Review)
Review
Federated learning (FL) provides a distributed machine learning system that enables participants to train using local data to create a shared model by eliminating the requirement of data sharing. In healthcare systems, FL allows Medical Internet of Things (MIoT) devices and electronic health records (EHRs) to be trained locally without sending patients data to the central server. This allows healthcare decisions and diagnoses based on datasets from all participants, as well as streamlining other healthcare processes. In terms of user data privacy, this technology allows collaborative training without the need of sharing the local data with the central server. However, there are privacy challenges in FL arising from the fact that the model updates are shared between the client and the server which can be used for re-generating the client's data, breaching privacy requirements of applications in domains like healthcare. In this paper, we have conducted a review of the literature to analyse the existing privacy and security enhancement methods proposed for FL in healthcare systems. It has been identified that the research in the domain focuses on seven techniques: Differential Privacy, Homomorphic Encryption, Blockchain, Hierarchical Approaches, Peer to Peer Sharing, Intelligence on the Edge Device, and Mixed, Hybrid and Miscellaneous Approaches. The strengths, limitations, and trade-offs of each technique were discussed, and the possible future for these seven privacy enhancement techniques for healthcare FL systems was identified.
Topics: Humans; Privacy; Blockchain; Computer Communication Networks; Electronic Health Records; Delivery of Health Care
PubMed: 37569079
DOI: 10.3390/ijerph20156539 -
Journal of Medical Internet Research Aug 2023ChatGPT has promising applications in health care, but potential ethical issues need to be addressed proactively to prevent harm. ChatGPT presents potential ethical...
ChatGPT has promising applications in health care, but potential ethical issues need to be addressed proactively to prevent harm. ChatGPT presents potential ethical challenges from legal, humanistic, algorithmic, and informational perspectives. Legal ethics concerns arise from the unclear allocation of responsibility when patient harm occurs and from potential breaches of patient privacy due to data collection. Clear rules and legal boundaries are needed to properly allocate liability and protect users. Humanistic ethics concerns arise from the potential disruption of the physician-patient relationship, humanistic care, and issues of integrity. Overreliance on artificial intelligence (AI) can undermine compassion and erode trust. Transparency and disclosure of AI-generated content are critical to maintaining integrity. Algorithmic ethics raise concerns about algorithmic bias, responsibility, transparency and explainability, as well as validation and evaluation. Information ethics include data bias, validity, and effectiveness. Biased training data can lead to biased output, and overreliance on ChatGPT can reduce patient adherence and encourage self-diagnosis. Ensuring the accuracy, reliability, and validity of ChatGPT-generated content requires rigorous validation and ongoing updates based on clinical practice. To navigate the evolving ethical landscape of AI, AI in health care must adhere to the strictest ethical standards. Through comprehensive ethical guidelines, health care professionals can ensure the responsible use of ChatGPT, promote accurate and reliable information exchange, protect patient privacy, and empower patients to make informed decisions about their health care.
Topics: Humans; Artificial Intelligence; Reproducibility of Results; Data Collection; Disclosure; Patient Compliance
PubMed: 37566454
DOI: 10.2196/48009 -
Cureus Jun 2023Background Coronavirus disease 2019 (COVID-19) isolation protocols in India restricted family members of COVID-19 patients from visiting them in hospitals and in...
Background Coronavirus disease 2019 (COVID-19) isolation protocols in India restricted family members of COVID-19 patients from visiting them in hospitals and in intensive care units, especially during the peak of the pandemic. This along with the elaborate personal protective equipment (PPE) created challenges for intensivists and nurses in COVID ICUs in effectively communicating with patients and patients' families, especially in shared decision-making processes. Methods This article is the outcome of a qualitative study using in-depth one-on-one interviews with 10 intensivists and four intensive care nurses in two teaching hospitals in Bengaluru, South India. Each participant, purposively selected till data saturation was reached, had spent extensive periods of time in a COVID ICU during both COVID-19 waves in 2020 and 2021. A framework of descriptive phenomenology led to the design of the study in which varied experiences and insights of participants were captured using an interview guide to understand their lived reality. The interviews were conducted online or in person between July 2021 and October 2021 and were audio recorded and transcribed verbatim. Coding of transcripts using the NVivo 12 (Burlington, MA: QSR International Pty Ltd) software helped with the thematic analysis. This was guided by interpretive phenomenological methods that derived meaning from participants' life experiences. Results Four themes involving challenges in effective communication in the COVID ICU emerged as follows: physical barriers, emotional and mental stressors, infrastructural challenges, and ethical and moral dilemmas. Sub-themes included personal protective equipment as a barrier, reduced energy levels, and isolation of family from patients under the domain of physical challenges; fears of the unknown, handling death of patients in isolation, and the frustrations of families were challenges under the emotional and mental domain. Infrastructural/systemic challenges included poor connectivity and insufficient mobile phones, and the absence of rules to handle interruptions. Privacy breaches, taking consent over the phone, end-of-life discussions, and medico-legal risks emerged as the subthemes under the domain of ethical and moral challenges. A mobile phone communication policy specifying usage times and operating methods, a mandatory communication and counseling training module for intensivists and intensive care nurses, and a set of protocols for highly restrictive, intensive care units in pandemic situations were recommendations and lessons learned. Conclusions The lack of face-to-face interactions was a serious barrier to communication between ICU staff and patients and their caregivers. It had a bearing on trust levels and had emotional and ethical consequences for healthcare teams to handle. Opportunities for self-care, venting of anxiety and distress, and opportunities to celebrate and reward special efforts and cooperation between consultants, residents, nurses, and technicians in stressful environments like a pandemic ICU were important to sustain empathy and keep care and communication humane.
PubMed: 37503489
DOI: 10.7759/cureus.40961 -
Journal of Medical Internet Research Aug 2023The health care industry has faced various challenges over the past decade as we move toward a digital future where services and data are available on demand. The... (Review)
Review
The health care industry has faced various challenges over the past decade as we move toward a digital future where services and data are available on demand. The systems of interconnected devices, users, data, and working environments are referred to as the Internet of Health Care Things (IoHT). IoHT devices have emerged in the past decade as cost-effective solutions with large scalability capabilities to address the constraints on limited resources. These devices cater to the need for remote health care services outside of physical interactions. However, IoHT security is often overlooked because the devices are quickly deployed and configured as solutions to meet the demands of a heavily saturated industry. During the COVID-19 pandemic, studies have shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through authentication vulnerabilities. Poor password use and management and the lack of multifactor authentication security posture within IoHT cause a loss of millions according to the IBM reports. Therefore, it is important that health care authentication security moves toward adaptive multifactor authentication (AMFA) to replace the traditional approaches to authentication. We identified a lack of taxonomy for data models that particularly focus on IoHT data architecture to improve the feasibility of AMFA. This viewpoint focuses on identifying key cybersecurity challenges in a theoretical framework for a data model that summarizes the main components of IoHT data. The data are to be used in modalities that are suited for health care users in modern IoHT environments and in response to the COVID-19 pandemic. To establish the data taxonomy, a review of recent IoHT papers was conducted to discuss the related work in IoHT data management and use in next-generation authentication systems. Reports, journal articles, conferences, and white papers were reviewed for IoHT authentication data technologies in relation to the problem statement of remote authentication and user management systems. Only publications written in English from the last decade were included (2012-2022) to identify key issues within the current health care practices and their management of IoHT devices. We discuss the components of the IoHT architecture from the perspective of data management and sensitivity to ensure privacy for all users. The data model addresses the security requirements of IoHT users, environments, and devices toward the automation of AMFA in health care. We found that in health care authentication, the significant threats occurring were related to data breaches owing to weak security options and poor user configuration of IoHT devices. The security requirements of IoHT data architecture and identified impactful methods of cybersecurity for health care devices, data, and their respective attacks are discussed. Data taxonomy provides better understanding, solutions, and improvements of user authentication in remote working environments for security features.
Topics: Humans; Confidentiality; Telemedicine; Pandemics; COVID-19; Internet; Computer Security
PubMed: 37490633
DOI: 10.2196/44114 -
JMIR Human Factors Jul 2023Patient portals can facilitate patient engagement in care management. Driven by national efforts over the past decade, patient portals are being implemented by hospitals...
Adult Patients' Experiences of Using a Patient Portal With a Focus on Perceived Benefits and Difficulties, and Perceptions on Privacy and Security: Qualitative Descriptive Study.
BACKGROUND
Patient portals can facilitate patient engagement in care management. Driven by national efforts over the past decade, patient portals are being implemented by hospitals and clinics nationwide. Continuous evaluation of patient portals and reflection of feedback from end users across care settings are needed to make patient portals more user-centered after the implementation.
OBJECTIVE
The aim of this study was to investigate the lived experience of using a patient portal in adult patients recruited from a variety of care settings, focusing on their perceived benefits and difficulties of using the patient portal, and trust and concerns about privacy and security.
METHODS
This qualitative descriptive study was part of a cross-sectional digital survey research to examine the comprehensive experience of using a patient portal in adult patients recruited from 20 care settings from hospitals and clinics of a large integrated health care system in the mid-Atlantic area of the United States. Those who had used a patient portal offered by the health care system in the past 12 months were eligible to participate in the survey. Data collected from 734 patients were subjected to descriptive statistics and content analysis.
RESULTS
The majority of the participants were female and non-Hispanic White with a mean age of 53.1 (SD 15.34) years. Content analysis of 1589 qualitative comments identified 22 themes across 4 topics: beneficial aspects (6 themes) and difficulties (7 themes) in using the patient portal; trust (5 themes) and concerns (4 themes) about privacy and security of the patient portal. Most of the participants perceived the patient portal functions as beneficial for communicating with health care teams and monitoring health status and care activities. At the same time, about a quarter of them shared difficulties they experienced while using those functions, including not getting eMessage responses timely and difficulty finding information in the portal. Protected log-in process and trust in health care providers were the most mentioned reasons for trusting privacy and security of the patient portal. The most mentioned reason for concerns about privacy and security was the risk of data breaches such as hacking attacks and identity theft.
CONCLUSIONS
This study provides an empirical understanding of the lived experience of using a patient portal in adult patient users across care settings with a focus on the beneficial aspects and difficulties in using the patient portal, and trust and concerns about privacy and security. Our study findings can serve as a valuable reference for health care institutions and software companies to implement more user-centered, secure, and private patient portals. Future studies may consider targeting other patient portal programs and patients with infrequent or nonuse of patient portals.
PubMed: 37490316
DOI: 10.2196/46044 -
Journal of Bioethical Inquiry Jun 2023The recently passed Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022 (Cth) introduced important changes to the Australian Privacy Act 1988 (Cth)... (Review)
Review
The recently passed Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022 (Cth) introduced important changes to the Australian Privacy Act 1988 (Cth) which increase penalties for serious and repeated interferences with privacy and strengthen the investigative and enforcement powers of the Information Commissioner. The amendments were made subsequent to a number of high profile data breaches and represent the first set of changes to the Privacy Act following the review of the Act commenced by the Attorney-General in October 2020. The submissions made to the review emphasized the need for more effective enforcement mechanisms to increase individuals' control over their personal information and as a form of deterrence. This article reviews the recent amendments to the Privacy Act and explains their effect. It comments upon the relevance of the amendments for health and medical data and other data collected in the context of healthcare, and refers to the Attorney-General's Department's review of the Privacy Act regarding other proposals relating to enforcement which have not as yet been put into effect in legislation.
Topics: Humans; Privacy; Australia; Personally Identifiable Information; Confidentiality
PubMed: 37432509
DOI: 10.1007/s11673-023-10249-4