Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security for mobile and cloud frontiers in healthcare
Kotz D., Fu K., Gunter C., Rubin A. Communications of the ACM58 (8):21-23,2015.Type:Article
Date Reviewed: Dec 1 2015

Healthcare organizations need secure clinical information systems to provide better quality medical services, increase access to medical records, and reduce the operative costs of business. What technologies do healthcare providers need? What roles should information technology (IT) specialists play in the design and implementation of secure medical information systems? Kotz et al. address these questions in this article.

The authors advocate constructive viewpoints: (1) healthcare providers ought to capitalize on the use of mobile devices, cloud services, and electronic health records (EHRs) for monitoring the conditions of patients; (2) IT specialists should take more responsibility in the design of secure systems that provide privacy and safe access to EHRs from different computers and medical and smart devices; (3) medical health technology inventors should develop robust security policies for collecting, storing, accessing, and sharing the medical records of patients; and (4) healthcare organizations require steadfast and reliable medical information systems for the diagnosis, the cure, and decisions about patients.

Indisputably, medical IT developers are confronted with many real-world challenges today. It is not easy to design and implement systems for handling all current, surfacing, and unknown future security vulnerabilities and threats. To help build trust in patients, managers of medical systems should be logging and auditing all legal and illegal access to patient medical records. Doctors, health caregivers, and systems administrators of medical information systems should read about the inspiring security issues discussed in this paper. Together, patients, healthcare organizations, and IT experts can help to develop effective solutions to security problems.

Reviewer:  Amos Olagunju Review #: CR143986 (1602-0157)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Medical Information Systems (J.3 ... )
 
 
Governmental Issues (K.5.2 )
 
 
Hardware/ Software Protection (K.5.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Medical Information Systems": Date
The computer-based patient record
Dick R. (ed), Steen E. (ed), National Academy Press, Washington, DC, 1991. Type: Book (9780309044950)
Jan 1 1993
The doctor’s use of a computer in the consulting room: an analysis
Brownbridge G., Fitter M., Sime M. International Journal of Man-Machine Studies 21(1): 65-90, 1984. Type: Article
Mar 1 1985
Computing in medicine
Kendall ., Fagan L. (ed), Huang H., Pryor T. Computer 17(10): 294-313, 1984. Type: Article
May 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy