Abstract:Hospital information systems have an essential role in clinical and administrative services. This triggers an innovation that supports an integrated quality measurement data management system by integrating the Hospital Management Information System (SIMRS). SIMRS can be implemented locally or in the cloud, using the network to exchange data and information. Along with the current development of Information Technology, information security is very important, especially on a network connected to the internet. B… Show more
“…Measures that focus on addressing pending problems and potential risks and actively promote reform and innovation in the management and security of computer networks in the health sector. Likewise, apply techniques to protect network computers [11]. In addition, to ensure the security of sectional medical image (SMI) transmission, it is critical to strengthen the hospital network infrastructure by implementing a four-tiered endpoint network penetration scheme [12].…”
Section: Rq1: What Types Of Computer Security Are Implemented For The...mentioning
There is growing concern about IT security in the healthcare sector due to the number of cyberattacks. The objective of the review is to analyze the state of adoption of computer security in the healthcare sector and provide valuable knowledge to researchers and health organizations interested in this field of study. An exhaustive search of international and regional articles on computer security in healthcare organizations was conducted using Scopus, Dimensions, and pubMed databases. Preferred reporting items for systematic reviews and meta-analysis (PRISMA) statement was used for the selection of articles published between 2018 and 2022. The final number of articles considered is 50. The review explored approaches related to computer security types, mechanisms, and technologies. The findings reveal that blockchain is the most widely used technology to protect medical information. In addition, network, software, and hardware security approaches are employed, using mechanisms such as data encryption, authentication, and access control. Based on these findings, a perimeter security model for the protection of medical information is proposed. In conclusion, these results highlight the importance of adopting robust security measures in terms of networks, software, and hardware, as well as adopting blockchain technology to improve data security in the healthcare sector.
“…Measures that focus on addressing pending problems and potential risks and actively promote reform and innovation in the management and security of computer networks in the health sector. Likewise, apply techniques to protect network computers [11]. In addition, to ensure the security of sectional medical image (SMI) transmission, it is critical to strengthen the hospital network infrastructure by implementing a four-tiered endpoint network penetration scheme [12].…”
Section: Rq1: What Types Of Computer Security Are Implemented For The...mentioning
There is growing concern about IT security in the healthcare sector due to the number of cyberattacks. The objective of the review is to analyze the state of adoption of computer security in the healthcare sector and provide valuable knowledge to researchers and health organizations interested in this field of study. An exhaustive search of international and regional articles on computer security in healthcare organizations was conducted using Scopus, Dimensions, and pubMed databases. Preferred reporting items for systematic reviews and meta-analysis (PRISMA) statement was used for the selection of articles published between 2018 and 2022. The final number of articles considered is 50. The review explored approaches related to computer security types, mechanisms, and technologies. The findings reveal that blockchain is the most widely used technology to protect medical information. In addition, network, software, and hardware security approaches are employed, using mechanisms such as data encryption, authentication, and access control. Based on these findings, a perimeter security model for the protection of medical information is proposed. In conclusion, these results highlight the importance of adopting robust security measures in terms of networks, software, and hardware, as well as adopting blockchain technology to improve data security in the healthcare sector.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.