Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Entire DC Network

Security Risks Of Medical Devices In Wireless Environments, Krishnun Sansurooah Jan 2015

Security Risks Of Medical Devices In Wireless Environments, Krishnun Sansurooah

Australian eHealth Informatics and Security Conference

The advancement of wireless medical devices technology, that has developed in hospitals and migrated into the home environment, has created unsustainability in in terms of the management of security for such devices. Through this paper, we shall attempt to explain how medical devices have completely changed the way security needs to be approached in the medical field. We shall also explore the history of medical devices and the organizational problems faced for the development of these devices, the different stakeholders strengths and weaknesses, especially if the device is implanted inside the body of a patient. Once the risk is understood …


Security Of Eprescription: Security Of Data At Rest In Prescription Exchange Services Vs On Mobile Devices, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley Jan 2015

Security Of Eprescription: Security Of Data At Rest In Prescription Exchange Services Vs On Mobile Devices, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley

Australian eHealth Informatics and Security Conference

One area of healthcare that has moved more quickly than others in adopting electronic transfer of information is prescribing in the primary care environment. Several Acts and Regulations have been repealed and amended at Commonwealth and State levels to enable this progress over the past decade, as medication provision is a strictly controlled area of healthcare. Further, numerous standards and specifications have been developed and adopted to support and safeguard the regulatory changes and facilitate the electronic transfer of prescriptions. However, the current model of electronic prescription transfer comes with a substantial price tag for ongoing use. With the Nation’s …


The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan Dec 2014

The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan

Australian eHealth Informatics and Security Conference

The potential to use big data sources for public health increases with the broadening availability of data and improved methods of analysis. Whilst there are some well-known examples of the opportunistic use of big data, such as GoogleFlu, public health has not yet realised the full potential of such data sources. A literature review was undertaken to identify the potential of such data collections to impact public health, and to identify what challenges are currently limiting this potential. The potential include improved real-time analysis, research and development and genome studies. However, challenges listed are poor universal standardisation and classification, privacy …


Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams Dec 2014

Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams

Australian eHealth Informatics and Security Conference

The use of personal devices in the work environment has crossed the boundaries of work and socially related tasks. With cyber criminals seriously targeting healthcare for medical identity theft, the lack of control of new technologies within healthcare networks becomes an increasing vulnerability. The prolific adoption of personal mobile devices in the healthcare environment requires a proactive approach to the management of Bring Your Own Device (BYOD). This paper analysed the current state of the problem and the challenges that this creates in an environment that has stringent privacy and security requirements. The discourse demonstrates that the issue is not …


3rd Australian Ehealth Informatics And Security Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University Dec 2014

3rd Australian Ehealth Informatics And Security Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University

Australian eHealth Informatics and Security Conference

No abstract provided.


Customising Doctor-Nurse Communications, Brian Cusack, Dave Parry Dec 2014

Customising Doctor-Nurse Communications, Brian Cusack, Dave Parry

Australian eHealth Informatics and Security Conference

Doctor-Nurse communications are critical for patient safety and workflow effectiveness. Our research question was: What further improvements can be made to current communication systems? A variety of mobile and land based communication systems have been used and experimented with. In the study, the pager was found to be most common and more recent attempts to provide broadband capability with systems such as the iBeep. We built an alternative information system using Android phones and a software application that was customised by feedback from the medical professionals. The trial in five wards with 22 doctors and 170 nurses over one month …


Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw Dec 2014

Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw

Australian eHealth Informatics and Security Conference

Medical systems are designed for a range of end users from different professional skill groups and people who carry the devices in and on their bodies. Open, accurate, and efficient communication is the priority for medical systems and consequently strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorise ways to mitigate wireless security vulnerabilities. The benefits of wireless medical services are great in terms of efficiencies, mobility, and information management. These benefits may be realised by treating the vulnerabilities and …


Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo Dec 2014

Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo

Australian eHealth Informatics and Security Conference

This paper presents a case study of security issues related to the operationalization of smart-care, an electronic medical record (EMR) used to manage Human Immunodeficiency Virus (HIV) health information in Zambia. The aim of the smart-care program is to link up services and improve access to health information, by providing a reliable way to collect, store, retrieve and analyse health data in a secure way. As health professionals gain improved access to patient health information electronically, there is need to ensure this information is secured, and that patient privacy and confidentiality is maintained. During the initial stages of the program …


Avoiding Epic Fails: Software And Standards Directions To Increase Clinical Safety, Patricia A H Williams, Vincent B. Mccauley Dec 2014

Avoiding Epic Fails: Software And Standards Directions To Increase Clinical Safety, Patricia A H Williams, Vincent B. Mccauley

Australian eHealth Informatics and Security Conference

No abstract provided.


Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams Dec 2014

Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams

Australian eHealth Informatics and Security Conference

Big data analytics is a growth area with the potential to provide useful insight in healthcare. Whilst many dimensions of big data still present issues in its use and adoption, such as managing the volume, variety, velocity, veracity, and value, the accuracy, integrity, and semantic interpretation are of greater concern in clinical application. However, such challenges have not deterred the use and exploration of big data as an evidence source in healthcare. This drives the need to investigate healthcare information to control and reduce the burgeoning cost of healthcare, as well as to seek evidence to improve patient outcomes. Whilst …


A Rapidly Moving Target: Conformance With E-Health Standards For Mobile Computing, Patricia A.H. Williams, Vincent B. Mccauley Dec 2013

A Rapidly Moving Target: Conformance With E-Health Standards For Mobile Computing, Patricia A.H. Williams, Vincent B. Mccauley

Australian eHealth Informatics and Security Conference

The rapid adoption and evolution of mobile applications in health is posing significant challenges in terms of standards development, standards adoption, patient safety, and patient privacy. This is a complex continuum to navigate. There are many competing demands from the standards development process, to the use by clinicians and patients. In between there are compliance and conformance measures to be defined to ensure patient safety, effective use with integration into clinical workflow, and the protection of data and patient privacy involved in data collection and exchange. The result is a composite and intricate mixture of stakeholders, legislation, and policy together …


A Privacy-Preserving Framework For Personally Controlled Electronic Health Record (Pcehr) System, Mahmuda Begum, Quazi Mamun, Mohammed Kaosar Dec 2013

A Privacy-Preserving Framework For Personally Controlled Electronic Health Record (Pcehr) System, Mahmuda Begum, Quazi Mamun, Mohammed Kaosar

Australian eHealth Informatics and Security Conference

The electronic health record (eHR) system has recently been considered one of the biggest advancements in healthcare services. A personally controlled electronic health record (PCEHR) system is proposed by the Australian government to make the health system more agile, secure, and sustainable. Although the PCEHR system claims the electronic health records can be controlled by the patients, healthcare professionals and database/system operators may assist in disclosing the patients’ eHRs for retaliation or other ill purposes. As the conventional methods for preserving the privacy of eHRs solely trust the system operators, these data are vulnerable to be exploited by the authorised …


Developing A Mobile Audiometric Sound Booth Application For Apple Ios Devices, Luke J. Brook, Patricia A.H. Williams Dec 2013

Developing A Mobile Audiometric Sound Booth Application For Apple Ios Devices, Luke J. Brook, Patricia A.H. Williams

Australian eHealth Informatics and Security Conference

Hearing loss in Australian children, particularly those in rural and remote areas, is a growing health concern. Resultant deafness has significant impact on the educational and social development of such children. Whilst telehealth had provided other benefits for rural and remote areas, the absence of suitable testing equipment and associated healthcare specialists has meant that there is a gap in this area of child health that could be addressed using a mobile solution. This paper discusses the research and development of a mobile application for testing and diagnosis of hearing loss in children. It is unique in its ability to …


Ehealth Security Australia: The Solution Lies With Frameworks And Standards, Bryan Foster, Yvette Lejins Dec 2013

Ehealth Security Australia: The Solution Lies With Frameworks And Standards, Bryan Foster, Yvette Lejins

Australian eHealth Informatics and Security Conference

Security is a key foundation for eHealth in Australia, driving benefits in healthcare quality, safety, and efficiency towards improved health outcomes for all Australians. To this end, the National eHealth Transition Authority (NEHTA), the Royal Australian College of General Practitioners (RACGP), and Standards Australia have each produced security-related publications to assist Australian healthcare organisations protect their data. These publications provide standards, tools, and guides for the healthcare industry to build and implement secure systems that protect patient data and eHealth-related assets, while providing the provenance required to help ensure patient safety and privacy. This paper outlines some of the current …


The Applicability Of Iso/Iec27014:2013 For Use Within General Medical Practice, Rachel J. Mahncke Dec 2013

The Applicability Of Iso/Iec27014:2013 For Use Within General Medical Practice, Rachel J. Mahncke

Australian eHealth Informatics and Security Conference

General practices are increasingly cognizant of their responsibilities in regards to information security, as is evidenced by professional bodies such as the Royal Australian College of General Practitioners (RACGP) who publish the Computer and Information Security Standards (CISS) for General Practices. Information security governance in general medical practice is an emerging area of importance. As such, the CISS (2013) standard incorporates elements of information security governance. The International Organization for Standardization (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology -- Security techniques -- Governance of information security. The release of this revised ISO standard, …


Cartoons For E-Health Informatics, Moira Sim, Eric Khong, Ashleigh Mcevoy, Toni Wain, Mick Sim, Patricia A.H. Williams Dec 2013

Cartoons For E-Health Informatics, Moira Sim, Eric Khong, Ashleigh Mcevoy, Toni Wain, Mick Sim, Patricia A.H. Williams

Australian eHealth Informatics and Security Conference

Not only is Hepatitis B serology often misunderstood because of its complex serological implications, but advances in medical science have revolutionised screening and treatment of hepatitis B. To maximise such evolution however, this new information must be relayed effectively and efficiently to current and future medical professionals. Cartoons have been well regarded as a teaching tool in a variety of different settings as is the use of web based technology. Therefore the delivery of a cartoon based learning tool, accessed via on-line learning modules was considered a novel and potentially effective way of disseminating new knowledge. To increase health professionals’ …


A Study On Information Induced Medication Errors, Rebecca Hermon, Patricia A.H. Williams Dec 2013

A Study On Information Induced Medication Errors, Rebecca Hermon, Patricia A.H. Williams

Australian eHealth Informatics and Security Conference

Preventable medical adverse events are a serious concern for healthcare. Medication errors form a significant part of these concerns and it is evident that these errors can have serious consequences such as death or disability. Many medication errors are a consequence of information failure. Therefore to prevent such adverse events, the associated information flow must be understood. This research used a systematic review methodology to conduct an analysis of medication error as a result of information failure. Its aim was to suggest solutions on reducing information induced medication errors. The results indicate that is apparent that human error such as …


Developing Governance Capability To Improve Information Security Resilience In Healthcare, Rachel Mahncke, Patricia Williams Jan 2012

Developing Governance Capability To Improve Information Security Resilience In Healthcare, Rachel Mahncke, Patricia Williams

Australian eHealth Informatics and Security Conference

General medical practices’ in Australia are vulnerable to information security threats and insecure practices. It is becoming well accepted in the healthcare environment that information security is both a technical and a human endeavour, and that the human behaviours, particularly around integration with healthcare workflow, are key barriers to good information security practice. This paper develops a holistic capability approach to information security by completing a preliminary iteration of mapping operational capabilities to governance capabilities. Using an operational backup capability matrix exemplar, the approach is analysed against the governance policy capability matrix. The resultant mapping between the operational and governance …


Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams Jan 2012

Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams

Australian eHealth Informatics and Security Conference

Information security is a necessary requirement of information sharing in the healthcare environment. Research shows that the application of security in this setting is sometimes subject to work-arounds where healthcare practitioners feel forced to incorporate practices that they have not had an input into and with which they have not engaged with. This can result in a sense of security practitioners and healthcare practitioners being culturally very different in their approach to information systems. As a result such practices do not constitute part of their community of practice nor their identity. In order to respond to this, systems designers typically …


Building Patient Trust In Electronic Health Records, Helen Cripps, Craig Standing Jan 2012

Building Patient Trust In Electronic Health Records, Helen Cripps, Craig Standing

Australian eHealth Informatics and Security Conference

While electronic medical records have the potential to vastly improve a patient’s health care, their introduction also raises new and complex security and privacy issues. The challenge of preserving what patients’ believe as their privacy in the context of the introduction of the Personally Controlled Electronic Health Record (PCEHR), into the multi-layered and decentralised Australian health system is discussed. Based on a number of European case studies the paper outlines the institutional measures for privacy and security that have been put in place, and compares them with the current status in Australia. The implementation of the PCEHR has not been …


Cloud Security: A Case Study In Telemedicine, Michael Johnstone Jan 2012

Cloud Security: A Case Study In Telemedicine, Michael Johnstone

Australian eHealth Informatics and Security Conference

Security as part of requirements engineering is now seen as an essential part of systems development in several modern methodologies. Unfortunately, medical systems are one domain where security is seen as an impediment to patient care and not as an essential part of a system. Cloud computing may offer a seamless way to allow medical data to be transferred from patient to medical practitioners, whilst maintaining security requirements. This paper uses a case study to investigate the use of cloud computing in a mobile application for Parkinson Disease. It was found that functionality took precedence over security requirements and standards.


Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams Jan 2012

Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams

Australian eHealth Informatics and Security Conference

Enterprises are faced with the task of managing a plethora of mobile computing devices in the workplace that are employed for both business purposes and private use. This integration can contribute to the demands of security protection and add significant threats to the enterprise. The introduction of the Personally Controlled Electronic Health Record (PCEHR) system is a significant step in e-health for Australia and will likely result in sensitive information being accessed from mobile computing devices. Mobile Device Management (MDM) offers a potential solution to manage these devices, however there is a variety of vendors with a range of solutions. …


Legal Issues Related To Accountable-Ehealth Systems In Australia, Randike Gajanayake, Bill Lane, Tony Iannella, Tony Sahama Jan 2012

Legal Issues Related To Accountable-Ehealth Systems In Australia, Randike Gajanayake, Bill Lane, Tony Iannella, Tony Sahama

Australian eHealth Informatics and Security Conference

Information privacy requirements of patients and information requirements of healthcare providers (HCP) are competing concerns. Reaching a balance between these requirements have proven difficult but is crucial for the success of eHealth systems. The traditional approaches to information management have been preventive measures which either allow or deny access to information. We believe that this approach is inappropriate for a domain such as healthcare. We contend that introducing information accountability (IA) to eHealth systems can reach the aforementioned balance without the need for rigid information control. IA is a fairly new concept to computer science, hence, there are no unambiguously …


Accountable-Ehealth Systems: The Next Step Forward For Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, Tony Sahama Jan 2012

Accountable-Ehealth Systems: The Next Step Forward For Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, Tony Sahama

Australian eHealth Informatics and Security Conference

EHealth systems promise enviable benefits and capabilities for healthcare, yet the technologies that make these capabilities possible brings with them undesirable drawback such as information security related threats which need to be appropriately addressed. Lurking in these threats are patient privacy concerns. Resolving these privacy concerns have proven to be difficult since they often conflict with information requirements of healthcare providers. It is important to achieve a proper balance between these requirements. We believe that information accountability can achieve this balance. In this paper we introduce accountable-eHealth systems. We will discuss how our designed protocols can successfully address the aforementioned …


A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch Jan 2012

A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch

Australian eHealth Informatics and Security Conference

The Australian ehealth landscape is confronted with new challenges for healthcare providers in appropriately managing and protecting personal health information. The vision of the National eHealth Security and Access Framework (NESAF) is to adopt a consistent approach to the application of health information security standards and provide better practice guidance in relation to eHealth specific security and access practices. The eHealth information security landscape has a number of unique attributes, many that are faced by other business that provide a service or products – but we see that there is no industry in Australia where such widespread changes in the …