Security Issues, Challenges and Success Factors of Hospital Information System

Amal Krishna Sarkar*, R. A. Khan**, C. M. Pandey***
* Research Scholar, Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, India.
** Professor & Head, Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, India.
*** Professor & Head, Department of Biostatistics and Health Informatics, Sanjay Gandhi Postgraduate Institute of Medical Sciences, Lucknow, India.
Periodicity:June - August'2017
DOI : https://doi.org/10.26634/jit.6.3.13782

Abstract

The utility of Hospital Information System (HIS) is vast, although one cannot ignore its challenges which prevent the electronic healthcare system from being used properly. Challenges in privacy and security of HIS needs to be studied and understood properly by any healthcare organization and should be resolved to get optimum benefit. One of the main objectives of this paper is to review, explore and analyze the current state of hospital information system's privacy and security of patient's electronic health records. It also focuses on security at the level policy of healthcare organization so that electronic patient record can be protected and secured. In healthcare organization security risks and financial consequences are increasing day-by-day. The vulnerable and breached electronic patient data revealed the fact that, the privacy and security of electronic patient records in health information exchanges is an imperative of any healthcare organization. For any patient care organization persons who are involved in the IT and administrative management should seriously think the issues of privacy and security of patient health record and also proper health information exchange in a secured manner.

Keywords

Hospital Information System, Cryptography, Electronic Patient Record, Electronic Medical Record, Information Exchange

How to Cite this Article?

Sarkar, A. K, Khan, R. A. and Pandey, C. M. (2017). Security Issues, Challenges and Success Factors of Hospital Information System. i-manager’s Journal on Information Technology, 6(3), 30-35. https://doi.org/10.26634/jit.6.3.13782

References

[1]. Anderson, J. G. (2007). Social, ethical and legal barriers to e-health. International Journal of Medical Informatics, 76(5), 480-483.
[2]. Brady, J. W. (2011, January). Securing health care: Assessing factors that affect HIPAA security compliance in academic medical centers. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10). IEEE.
[3]. Dong, N., Jonker, H., & Pang, J. (2011, August). Challenges in eHealth: From Enabling to Enforcing Privacy. In FHIES, (pp. 195-206).
[4]. Fernando, J. I., & Dawson, L. L. (2009). The health information system security threat lifecycle: An informatics theory. International Journal of Medical Informatics, 78(12), 815-826.
[5]. Ferreira, A., Antunes, L., Chadwick, D., & Correia, R. (2010). Grounding information security in healthcare. International Journal of Medical Informatics, 79(4), 268- 283.
[6]. Ghazvini, A., & Shukur, Z. (2013). Security challenges and success factors of electronic healthcare system. Procedia Technology, 11, 212-219.
[7]. Gunter, T. D., & Terry, N. P. (2005). The emergence of national electronic health record architectures in the United States and Australia: Models, costs, and questions. Journal of Medical Internet Research, 7(1), 87-94.
[8]. Hassan, N. H., & Ismail, Z. (2012). A conceptual model for investigating factors influencing information security culture in healthcare environment. Procedia-Social and Behavioral Sciences, 65, 1007-1012.
[9]. Huang, C. D., Behara, R. S., & Goo, J. (2014). Optimal information security investment in a Healthcare Information Exchange: An economic analysis. Decision Support Systems, 61, 1-11.
[10]. Karunakaran, A., Hee-Nam, Y., & Reddy, M. (2012, January). Investigating barriers to electronic medical record use during collaborative information seeking activities. In Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium (pp. 743- 748). ACM.
[11]. Love, V. D. (2011). IT Security Strategy: Is your Health Care Organization doing everything it can to protect Patient Information? Journal of Health Care Compliance, 13(6), 21-64.
[12]. MacKinnon, W., & Wasserman, M. (2009, January). Integrated electronic medical record systems: Critical success factors for implementation. In System Sciences,2009. HICSS'09. 42nd Hawaii International Conference on (pp. 1-10). IEEE.
[13]. Mandl, K. D., Simons, W. W., Crawford, W. C., & Abbett, J. M. (2007). Indivo: A personally controlled health record for health information exchange and communication. BMC Medical Informatics and Decision Making, 7(1), 25.
[14]. Ueckert, F., Goerz, M., Ataian, M., Tessmann, S., & Prokosch, H. U. (2003). Empowerment of patients and communication with health care professionals through an electronic health record. International Journal of Medical Informatics, 70(2), 99-108.
[15]. Wright, A., & Sittig, D. F. (2007). Encryption characteristics of two USB-based personal health record devices. Journal of the American Medical Informatics Association, 14(4), 397-399.
[16]. Zayim, N., Bozkurt, S., & Samur, M. K. (2011, October). Organizational issues in health informatics applications: Findings from a systematic review. In Biomedical Engineering and Informatics (BMEI), 2011 4th International Conference on (Vol. 4, pp. 1985-1988). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.