Sunday, May 3, 2020

Survey of Intelligent Computing in Medical and Health Care

Question: Contrast the terms confidentiality, privacy, and security. Identify threats to the security of health information. Describe the primary components of the security provision of the Health Insurance Portability and Accountability Act and extensions by HITECH ACT. Describe the roles and responsibilities of the health information technician with regards to information security? Answer: Confidentiality, privacy, and security Confidentiality is the ability that the person has in order to control the release of the personal health information to the person who provides the care. It also involves the information custodians that are under an agreement which have a limitation on the further release of the information (HATA NAKAJIMA, 2014). Whereas privacy is the desire of the person in order to control the revelation of the information related to the health of the person. The security is called the protection of the confidentiality and privacy that are followed through the policies, procedures and safeguards Today, the information system in the health care has many possible benefits like to improve the quality of care, to reduce the medical errors, availability as well as accessibility of information (Li Frmlohner, 2005). But there are certain risks that are there in the Healthcare Information Systems (HIS) which have considerably amplified in recent years. It was found that the name of the patients was exposed through data breaches. Thus the storing of information related to health in the electronic form raises concern about health of patient, privacy as well as safety. HIS are endangered by both accidental events and deliberate actions threats that can sternly harm reliability of health information systems and consequently can discourage the professionals in future (van Laere Aggestam, 2015). The primary components of HITECH ACT are to promote health information technology by improving the quality of the health care, safety as well as efficiency, and to act as a platform for exchange of health information. More over it deals with the provisions for privacy and security of the information related to the patients. The roles of the health information technicians is to acquire, maintain, analyses and protect the information related to the health of the patient as well as information related to the care of the patients (Zhang, H., Mehotra, S., Liebovitz, D., Gunter, C., Malin, B., 2013). They do not collect the information rather they keep the information up to date as submitted by the doctor and the patients. They must keep the data safe as it contains important care procedure which if altered can cause serious damage to the people. References HATA, Y., NAKAJIMA, H. (2014). A Survey of Intelligent Computing in Medical and Health Care System. IEICE Transactions On Information And Systems, E97.D(9), 2218-2225. doi:10.1587/transinf.2013lop0005 Li, Z., Frmlohner, K. (2005). Database for supporting engineers and innovators on the basis of a CD-ROM infor-mation system for aging processes. Gerontechnology, 3(4). doi:10.4017/gt.2005.03.04.110.00 van Laere, J., Aggestam, L. (2015). Understanding champion behaviour in a health-care information system development project how multiple champions and champion behaviours build a coherent whole. European Journal Of Information Systems. doi:10.1057/ejis.2015.5 Zhang, H., Mehotra, S., Liebovitz, D., Gunter, C., Malin, B. (2013). Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits. TMIS, 4(4), 1-20. doi:10.1145/2544102

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.