Dynamic Security For Health Record Sharing

Read Complete Research Material

DYNAMIC SECURITY FOR HEALTH RECORD SHARING

Dynamic Security for Medical Record Sharing

Table of Contents TABLE OF CONTENTS

Title Page

ABSTRACT………………………………………………………………………………..3

DELIMITATIONS………………………………………………………………………...3

ABBREVIATIONS ……………………………………………………………………….4

CHAPTER 1: INTRODUCTION Context of the Study …………………………………………………………5 Statement of the Study ………………………………………………………5 Specific Research Question …………………………………………………6 Significance of the Study ……………………………………………………7 Methodology………………………………………………………………….7

Organization of the Study…………………………………………………..

CHAPTER 2: LITERATURE REVIEW

Software Security in Health Setting ………………………………………....8

Pros and Cons of Security System …………………………………………...9

Security resolutions in Medical Institutions ……..………………………….11

CHAPTER 3: RESEARCH QUESTION………………………………………………..

CHAPTER 4: FINDINGS/RESULTS ………………………………………….............

CHAPTER 5: REFERENCES CITED………………………………………………….

Abstract

Medical software is regarded as both a success and a risk factor for quality and efficiency of medical care. First, reasons are given in what respects the medical industry is special: it is highly complex and variable, exposed to risks of privacy confidentiality but also of denied access to authorized personnel, and medical users are a highly qualified and demanding population. Then the same software technology and engineering approaches are presented that partially master these challenges. They include various divide and conquer strategies, process and change management approaches that quality assurance approaches. There can be little question that software engineers today are expected not only to produce programs that are accessible and efficacious but also programs that will protect the privacy and security of ordinary citizens in an age of computer hacking and online surveillance. With this in mind this paper explores what computer programmers must do to protect the online identities of clients and businesses as well as to protect organizations more generally from fraud systems compromise and information extraction by hostile parties.

Delimitations

This proposal is limited to discussing the identified challenge facing the software engineering industry, relating to the medical privacy of individuals.

ABBREVIATIONS

AMA American Medical Association

CCR Continuity of Care Record

DRP Directed Research Project

FDA Food and Drug Administration

HHS Health and Human Services

HIPAA Health Insurance Portability and Accountability Act

IRBs Institutional Review Boards

MCOs Managed Care Organizations

MSIS Masters of Science Information Systems

NIH National Institutes of Health

PBMs Pharmacy Benefit Management

Dynamic Security for Medical Record Sharing

CHAPTER 1: INTRODUCTION

Context of the Study Medical information is used for a number of research purposes to advance biomedical science, understand health care utilization, evaluate and improve health care practices, and determine causes and patterns of disease. While such research is sometimes conducted without information tied to identifiable patient records, other research relies on personal identifiers to track treatment of an individual over time, link multiple sources of patient information, or verify such information. There can be little question that software engineers today are expected not only to produce programs that are accessible and efficacious but also programs that will protect the privacy and security of ordinary citizens in an age of computer hacking and online surveillance. With this in mind this paper explores what computer programmers must do to protect the online identities of clients and businesses as well as to protect organizations more generally from fraud systems compromise and information extraction by hostile parties.

Specific Research Question

As computing proceeded to evolve, programs had became more tough and tasks increased bigger, while programs had since been regularly particular, in writing, functioned, and ...
Related Ads