By Topic

Security in Healthcare Information Systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Z. O. Omogbadegun ; Department of Computer & Information Sciences, College of Science & Technology, Covenant University, Ota, Ogun State, Nigeria. Phone: +2348035062887, oniomogbadegun@yahoo.com

Healthcare informatics affirm that healthcare presents most problems of user control with disparate, individualized and often vulnerable users having little information with which to assess service quality and little choice, at least within the formal hospital sector. Also, consultative experience in many Healthcare Organization (HCO) IT environments strongly suggests that technical security fundamentals are consistently neglected. Integrated network and systems architectures provide the means for healthcare to get out of this predicament in the age of the wily hacker. More than ever, healthcare and financial organizations require comprehensive, easy-to-deploy solutions for protecting private data within the email system. Security in healthcare information systems is among the highest priority research areas as part of the new security framework for HIPAA-compliant healthcare information. This paper appraises security concerns in healthcare information systems and concludes that what is needed is an approach that firmly cements the foundations for a sustainable and efficient healthcare system based on solidarity and built to cope with the emerging threats. The model emerging from this approach would require a robust security infrastructure to support authentication, confidentiality, and data integrity so that there is no single point of failure that, if compromised, would give access to all the information.

Published in:

2006 ITI 4th International Conference on Information & Communications Technology

Date of Conference:

10-12 Dec. 2006