• Title/Summary/Keyword: Patient privacy

Search Result 160, Processing Time 0.028 seconds

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

Factors Influencing Clinical Nurses' Practice of Personal Information Protection: Focusing on Knowledge of Personal Information Protection Law and Nursing Patient Advocacy (임상간호사의 개인정보보호 실천 영향요인: 개인정보보호법 지식, 옹호간호를 중심으로)

  • Kim, Dongeun;Park, Wanju
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.3
    • /
    • pp.261-270
    • /
    • 2023
  • Purpose: This study aimed to identify the influence of knowledge of personal information protection law and nursing patient advocacy on practice of personal information protection among nurses. Methods: The subjects were 130 nurses who have worked for six months or more in the ward of the tertiary or general hospitals. Data were collected from February 20 to March 3, 2023. Results: Factors influencing practice of personal information protection were acting as an advocate (β=.32, p=.004), environmental and educational influences (β=.21, p=.040), knowledge of personal information protection law (β=.19, p=.013) and clinical experience for five years or more but less than ten years (β=.17, p=.036). The regression model showed an explanatory power of 34.0%. Conclusion: Acting as an advocate has the most effect on practice of personal information protection. To promote practice of personal information protection for nurses, it is necessary to provide education related to privacy protection and encourage nursing patient advocacy.

A Study on the Architectural Planning of the Planning Characteristics in the Ward History (병동의 발전과정에 수용된 계획요소에 관한 건축계획적 연구)

  • Kim, Khil-Chae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.5 no.9
    • /
    • pp.117-124
    • /
    • 1999
  • Wards are the biggest part in hospital buildings and the flow of medical personnels and materials is an important factor in the ward design. The evaluation method of the wards and is esscential for the optimum design considering function, environment, patient psychology, etc. To achieve this goal, factors for evaluation of wards were introduced and then each factor was systematically analyzed. A evaluation method are developed from studied factors and are applied to existing wards to check the reliability. The selected evaluation factors are limited to the privacy of patient, the functional efficiency of operation, and the economy of wards.

  • PDF

An Improved Anonymous Authentication Scheme for Remote Health Monitoring System (원격 건강정보 모니터링 시스템을 위한 개선된 익명인증 기법)

  • Park, Youngho;Noh, Si-Wan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1551-1560
    • /
    • 2016
  • With the advancement of wearable devices and wireless body are networks, smart healthcare systems based on such technologies have been emerging to effectively monitor patient health and disease progression. In order to implement viable smart healthcare systems, the security and privacy of patient's personal health information must be considered. Yang et al. proposed a privacy-preserving authentication scheme using key-insulation technique for remote health monitoring system, however, key-insulation technique is not properly adapted to their scheme which in turn causes a security pitfall contrary to their assertions. Besides, Yang et al.'s scheme does not guarantee user anonymity against healthcare service provider. Therefore, in this paper, we discuss the security concerns for Yang et al.'s scheme and present an improved anonymous authentication scheme.

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.

User Evaluation for User-Oriented Children's Hospital Design - Focused on the Mothers of Child Inpatients and the Nurses - (사용자 중심의 어린이전문병원 계획을 위한 사용자 평가 - 어린이 환자의 보호자와 간호사를 중심으로 -)

  • Ha, Ji-Min;Park, Soo-Been
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.1
    • /
    • pp.192-200
    • /
    • 2016
  • This study aims to design user-oriented children's hospital by examining the user needs, especially the mothers of child inpatients and the nurses. The subjects participated in a questionnaire survey including the user's characteristics, awareness of patient's room, the preference on ward size, demands, satisfaction and hospital environment assessment. The survey was conducted of the mothers of child inpatients and the nurses in A children's hospital, and the data were analyzed by the SPSS WIN 18.0 Version software. A total of 115 copies of the questionnaire were finally analyzed. The results and conclusions are as follows. 1) The mothers' demand on family-centered space and private spaces were higher than the nurses. 2) The mothers preferred 1-bed-room to 4-bed-room due to safety and privacy. 3) The items of hospital environment assessment was categorized into four factors; 'Aesthetics', 'Accessibility', 'Comfort', and 'Lighting'. The most positive factor was 'Aesthetics', whereas 'Comfort' was the negative factor. 4) The mother's satisfaction was lower than the nurse's. The most influential factors on the satisfaction was 'Accessibility'. To improve the satisfaction of the mothers of child inpatients and the nurses, safety, privacy, accessibility should be considered.

A Study on the Nurses Need for the Planning in Children's Hospital (어린이전문병원 계획을 위한 간호사의 요구에 관한 연구)

  • Kim, Hye-shin;Park, Soo-Been
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.4
    • /
    • pp.105-112
    • /
    • 2016
  • Nurses in a children's hospital have to meet a special condition with their younger patients who need continuous supervision and cares. The planning of the ward where the nurse as well as the patient and his/her caregivers stay all day long should cover all the users need. This study focused on the nurse's need for the ward in children's hospital. The nurse stay longer than any users in hospital and their treatment have to be based on deep understanding of their patients. The survey research followed the literature review on the children's hospital and the nurses' task and behavior. 119 nurses answered the structural questionnaire and their answers were analyzed using the statistical process such as basic descriptive statistics, ANOVA, and actor analysis. Results and conclusions are as follows. (1) The subjects least satisfied with the accessibility for the children and the nature-and child-friendly design features among physical environment design factors of the hospital. (2) The Subject regarded the patients' room to a private place of the patients and their caregivers not to the work places. (3) The design factors of the nursing station were classified into four: the functionality-, the privacy-, the supervision-and the restfulness-factor. The functionality and supervision factor were highly required as a workplace, the privacy factor between the patients, their caregivers and subject were also represented high score, but the restfulness factor were least required.

A Study on the Possible New Fusion between Mobile and Healthcare Service (모바일과 의료서비스 간의 새로운 융합 가능성에 관한 연구)

  • Shin, Yong Jae;Kim, Jin Hwa;Lee, Jea Beom
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.27-39
    • /
    • 2012
  • As many applications are possible now in mobile environment with the trend of mobile convergence, diverse applications in healthcare industry are also possible in mobile devices. Though lots of researches on mobile and health services are introduced, they are limited to specific area or techniques. This study shows possible directions of fusion between mobile technologies and health services in the future using a data mining technique called association rule analysis. The data used in this study is collected from web pages containing key words related to mobile technologies and health services. The analysis shows that current cases of fusion between monitoring based telemedicine and patients. It also shows another case of fusion between mobile hospital and medical screen charts. These show that fusion between mobile technologies and health services already began in industry. Association rules are found between well-being, city, diet, and sleep. The association rules containing security and privacy, though their associations are not so strong, also show that security and privacy of patient information should be protected in the future. The results show that the fusion of mobile technologies and health services is expected to provide health services to more users and larger areas. It is also expected to create new diverse business models in the future.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.