2015
DOI: 10.1504/ijeh.2015.071638
|View full text |Cite
|
Sign up to set email alerts
|

Applying CHAID algorithm to investigate critical attributes of secured interoperable health data exchange

Abstract: With enhanced interoperability in healthcare environment the exchange of electronic health records (EHRs), both intra and inter organisations, has increased manifold. Sharing of the EHR creates room for illegal disclosures and confidentiality breaches. Interoperable healthcare is a complex system with many independent components. To design a secured framework for such a system, one need to understand the most important security attributes and predict various dependencies among them. The security attributes sel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…privacy and confidentiality of patient data thereby making it mandatory to preserve and prohibit access to data without the patient's consent (Bhartiya & Mehrotra, 2014). In as much as security protocols and rules are developed in HISs, confidentiality breaches will always be a threat in interoperable healthcare systems, and as such adequate authentication measures must be developed and enforced (Tipton et al, 2016).…”
Section: Confidentiality Needsmentioning
confidence: 99%
See 2 more Smart Citations
“…privacy and confidentiality of patient data thereby making it mandatory to preserve and prohibit access to data without the patient's consent (Bhartiya & Mehrotra, 2014). In as much as security protocols and rules are developed in HISs, confidentiality breaches will always be a threat in interoperable healthcare systems, and as such adequate authentication measures must be developed and enforced (Tipton et al, 2016).…”
Section: Confidentiality Needsmentioning
confidence: 99%
“…Availability of information is mainly threatened by communication network reliability. Denial of service (DoS) attacks due to network conflicts and other vulnerabilities render service unavailable to seemingly connected applications sharing access to database servers (Bhartiya & Mehrotra, 2014; Shave, 2018).…”
Section: Theoretical Insightsmentioning
confidence: 99%
See 1 more Smart Citation
“…This leads to inconsistencies in file storage, with some images being complete and others lacking data. 48 Integrating the Healthcare Enterprise Launched in 1998, the IHE initiative was a joint collaboration between the Healthcare Information and Management Systems Society (HIMSS) and the Radiological Society of North America (RSNA) to coordinate "the use of many different standards by layering on the context of healthcare delivery." 49 The IHE framework utilizes system integration profiles that are based on clinical scenario use cases, considering both the associated actors, i.e., systems, and transaction activities.…”
Section: Inter-facility (Macro-tier) Interoperabilitymentioning
confidence: 99%
“…Data-related challenges in healthcare share commonalities with other domains, encompassing issues of data integration, manipulation, accessibility, and comprehensibility (Bhartiya & Mehrotra, 2014). However, the healthcare field presents distinct domain-specific complexities that warrant special attention, such as the breath of use, data complexity and statistical rigor (Gotz & Borland, 2016).…”
Section: Casementioning
confidence: 99%