Access Control in Healthcare Information Systems Logic Will Get You from a to B. Imagination Will Take You Everywhere
نویسنده
چکیده
Access control is a key feature of healthcare information systems. Access control is about enforcing rules to ensure that only authorized users get access to resources in a system. In healthcare systems this means protecting patient privacy. However, the top priority is always to provide the best possible care for a patient. This depends on the clinicians having access to the information they need to make the best, most informed, care decisions. Care processes are often unpredictable and hard to map to strict access control rules. As a result, in emergency or otherwise unexpected situations, clinicians need to be able to bypass access control. In a crisis, availability of information takes precedence over privacy concerns. This duality of concerns is what makes access control in healthcare systems so challenging and interesting as a research subject. To create access control models for healthcare we need to understand how healthcare works. Before creating a model we need to understand the requirements the model should fulfill. Though many access control models have been proposed and argued to be suitable for healthcare, little work has been published on access control requirements for healthcare. This PhD project has focused on bridging the gap between formalized models and real world requirements for access control in healthcare by targeting the following research goals: RG1 To collect knowledge that forms a foundation for access control requirements in healthcare systems. RG2 To create improved access control models for healthcare systems based on real requirements. This PhD project has consisted of a number of smaller, distinct, but related projects to reach the research goals. The main contributions can be summarized as: C1 Requirements for access control in healthcare: Studies performed on audit data, in workshops, by observation and interviews have helped discover requirements. Results from this work include methods for access control requirements elicitation in addition to the actual requirements discovered. C2 Process-based access control: The main conclusion from the requirements work is that access control should be tailored to care processes. Care processes are highly dynamic and often unpredictable, and access control needs to adapt to this. This thesis suggests how existing sources of process information, both explicit and implicit, may be used for this purpose. C3 Personally controlled health records (PCHR): This thesis explores the consequences of making the patient the administrator of access control and proposes a model based on these initial requirements. From a performed usability study it is clear that the main challenge is how to keep the patient informed about the consequences of sharing.
منابع مشابه
Online gaming in relation to negative consequences and ill-health among adolescents
" Logic will get you from A to B. Imagination will take you everywhere. " Albert Einstein (1879-1955) Influences of motives to play and time spent gaming on the negative consequences of adolescent online computer gaming. Motives for playing and online gaming time in relation to depression, musculoskeletal symptoms and psychosomatic symptoms: a population-based cross-sectional study of Swedish a...
متن کاملIt Ain’t What You Do (But the Way That You Do It): Will Safety II Transform the Way We Do Patient Safety; Comment on “False Dawns and New Horizons in Patient Safety Research and Practice”
Mannion and Braithwaite outline a new paradigm for studying and improving patient safety – Safety II. In this response, I argue that Safety I should not be dismissed simply because the safety management strategies that are developed and enacted in the name of Safety I are not always true to the original philosophy of ‘systems thinking.’
متن کاملsmall embedded systems
[email protected] EMBEDDED SYSTEMS C AN B E FOUND virtually everywhere. In this article I will describe some of the features of these small computing engines and will take you along the road to building and programming one yourself to ease simple control tasks in your daily life. In the embedded world, understanding issues of small systems is much easier when you have encountered them your...
متن کاملAdvances in Biologically Inspired Information Systems: Models, Methods, and Tools
A solution to get the problem off, have you found it? Really? What kind of solution do you resolve the problem? From what sources? Well, there are so many questions that we utter every day. No matter how you will get the solution, it will mean better. You can take the reference from some books. And the advances in biologically inspired information systems models methods and tools is one book th...
متن کاملFrom Boolean Logic to Switching Circuits and Automata - Towards Modern Information Technology
A solution to get the problem off, have you found it? Really? What kind of solution do you resolve the problem? From what sources? Well, there are so many questions that we utter every day. No matter how you will get the solution, it will mean better. You can take the reference from some books. And the from boolean logic to switching circuits and automata towards modern information technology 1...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009