logo

RESEARCH | Developing a Secure Electronic Health

   

Added on  2022-10-09

11 Pages2916 Words23 Views
Data Science and Big DataPublic and Global HealthHealthcare and Research
 | 
 | 
 | 
Developing a Secure
Electronic Health
Service (Possible a
Mobile Health
Service) to
Exchange HER
RESEARCH | Developing a Secure Electronic Health_1

RESEARCH 1
Table of Contents
Literature review........................................................................................................ 2
Research Methodology............................................................................................... 4
Research design...................................................................................................... 5
Research approach.................................................................................................. 5
Research strategy................................................................................................... 5
Data gathering processes....................................................................................... 6
Sampling technique................................................................................................. 6
Data analysis........................................................................................................... 7
References................................................................................................................. 8
RESEARCH | Developing a Secure Electronic Health_2

RESEARCH 2
Literature review
Electronic health service (EHS) is a kind of process which is mainly used in
the health communities to store and evaluate the data of the patients. Using
computing devices and mobile networks the health care systems are able to
control and store the information of the patients. The purpose of conducting
a literature review is to analyze the security or privacy issues linked with
the electronic health service and identify the findings or opinions of the
recent articles based on the electronic health service.
According to Fernández-Alemán, Señor, Lozoya, and Toval, (2013) the
security of patient’s data is a major problem faced by the health care
systems and communities. Electronic health service is a network that can be
used in the health communities for storing the data of the patients and
reducing complexity from the systems [1]. It is observed that security is a
crucial part of the management and health communities are not able to
address the security threats linked with the electronic health service. In this
generation, the use of information systems and networks are increasing
rapidly and electronic health service is a part of information technology that
helps the health associations to handle the data of the patients effectively.
It is true that electronic health services are able to reduce complexity from
the systems and help the management to control a large amount of data
effectively. Forrest, et al., (2014) reported that the patients’ security and
privacy of their data is mainly produced problems in the health communities
and HER is capable to store data of the patients but cannot address security
threats and risks [2]. This paper identified the importance of electronic
health service and mobile devices in the context of health communities. It is
true that the utilization of third party servers in the electronic health
services may produce data breach and security issues which may affect the
performance of the health communities.
RESEARCH | Developing a Secure Electronic Health_3

RESEARCH 3
There are major three themes that can be used for controlling security
issues associated with the electronic health service, for example, technical,
physical and administrative safeguards. In order to handle the data of the
patients, the management teams should develop and implement effective
strategies and provide a complete process about electronic health service.
Friedman, Parrish, and Ross, (2013) conducted a survey and examined that
more than 67% of health communities are using electronic health services
for managing data of the patients but they are suffering from security
threats and risks that negatively impact on the sensitive data [3]. It is very
significant for the management to use secured networks while
implementing electronic or mobile health services in order to handle
privacy-related issues.
It is observed that technical systems including computing devices,
networks, databases and communication channels should be advanced and
secured in the context of electronic health services. From recent literature,
it is found that in health communities’ lack of experience about computing
devices and electronic health service is a major issue that led security
issues and helps the attackers to enter into the main servers. Goldzweig, et
al., (2013) supported this argument and suggested that providing proper
training and education to the staffs and employees is the best strategy that
can be implemented in the health care systems in order to handle security
threats and risks linked with the electronic health services [4].
For both employees and patients, the training process is very important as
patients must read their privacy and security information while providing
details to the electronic health services. It is examined that more than 57%
of health care systems are providing electronic health services to the
patients along with the proper description and conditions in order to reduce
conflict-related issues. Gottlieb, et al., (2015) proposed a research article
and highlighted that there are various security issue occurs in electronic
health services, for example, malware signals, DDOS attack, phishing, and
RESEARCH | Developing a Secure Electronic Health_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges of Internet of Things in Health care sector
|8
|1491
|206

E-health Security: Application, Issues, and Solutions
|8
|2776
|88

Assignment | “Mobile Device–Based Electronic Data Capture System Used in a Clinical Randomized Controlled Trial: Advantages and Challenges”
|6
|1080
|18

Power aware routing in mobile networks Literature Review 2022
|11
|2787
|21

(PDF) Security and Privacy Issues with IoT in Healthcare
|17
|3666
|40

Overview of Network Security in Healthcare Network
|6
|2347
|367