Displaying all 6 publications

Abstract:
Sort:
  1. Marzuki N, Ismail S, Al-Sadat N, Ehsan FZ, Chan CK, Ng CW
    Asia Pac J Public Health, 2015 Nov;27(8 Suppl):86S-93S.
    PMID: 26085477 DOI: 10.1177/1010539515590180
    Despite the high costs involved and the lack of definitive evidence of sustained effectiveness, many low- and middle-income countries had begun to strengthen their health information system using information and communication technology in the past few decades. Following this international trend, the Malaysian Ministry of Health had been incorporating Telehealth (National Telehealth initiatives) into national health policies since the 1990s. Employing qualitative approaches, including key informant interviews and document review, this study examines the agenda-setting processes of the Telehealth policy using Kingdon's framework. The findings suggested that Telehealth policies emerged through actions of policy entrepreneurs within the Ministry of Health, who took advantage of several simultaneously occurring opportunities--official recognition of problems within the existing health information system, availability of information and communication technology to strengthen health information system and political interests surrounding the national Multimedia Super Corridor initiative being developed at the time. The last was achieved by the inclusion of Telehealth as a component of the Multimedia Super Corridor.
    Matched MeSH terms: Health Information Systems/organization & administration*
  2. Mohsin AH, Zaidan AA, Zaidan BB, Ariffin SAB, Albahri OS, Albahri AS, et al.
    J Med Syst, 2018 Oct 29;42(12):245.
    PMID: 30374820 DOI: 10.1007/s10916-018-1103-6
    In real-time medical systems, the role of biometric technology is significant in authentication systems because it is used in verifying the identity of people through their biometric features. The biometric technology provides crucial properties for biometric features that can support the process of personal identification. The storage of biometric template within a central database makes it vulnerable to attack which can also occur during data transmission. Therefore, an alternative mechanism of protection becomes important to develop. On this basis, this study focuses on providing a detailed analysis of the extant literature (2013-2018) to identify the taxonomy and research distribution. Furthermore, this study also seeks to ascertain the challenges and motivations associated with biometric steganography in real-time medical systems to provide recommendations that can enhance the efficient use of real-time medical systems in biometric steganography and its applications. A review of articles on human biometric steganography in real-time medical systems obtained from three main databases (IEEE Xplore, ScienceDirect and Web of Science) is conducted according to an appropriate review protocol. Then, 41 related articles are selected by using exclusion and inclusion criteria. Majority of the studies reviewed had been conducted in the field of data-hiding (particularly steganography) technologies. In this review, various steganographic methods that have been applied in different human biometrics are investigated. Thereafter, these methods are categorised according to taxonomy, and the results are presented on the basis of human steganography biometric real-time medical systems, testing and evaluation methods, significance of use and applications and techniques. Finally, recommendations on how the challenges associated with data hiding can be addressed are provided to enhance the efficiency of using biometric information processed in any authentication real-time medical system. These recommendations are expected to be immensely helpful to developers, company users and researchers.
    Matched MeSH terms: Health Information Systems/organization & administration*
  3. Firdaus A, Anuar NB, Razak MFA, Hashem IAT, Bachok S, Sangaiah AK
    J Med Syst, 2018 May 04;42(6):112.
    PMID: 29728780 DOI: 10.1007/s10916-018-0966-x
    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).
    Matched MeSH terms: Health Information Systems/organization & administration*
  4. Shahri AB, Ismail Z, Mohanna S
    J Med Syst, 2016 Nov;40(11):241.
    PMID: 27681101
    The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.
    Matched MeSH terms: Health Information Systems/organization & administration*
  5. Awang Kalong N, Yusof M
    Int J Health Care Qual Assur, 2017 May 08;30(4):341-357.
    PMID: 28470137 DOI: 10.1108/IJHCQA-06-2016-0082
    Purpose The purpose of this paper is to discuss a systematic review on waste identification related to health information systems (HIS) in Lean transformation. Design/methodology/approach A systematic review was conducted on 19 studies to evaluate Lean transformation and tools used to remove waste related to HIS in clinical settings. Findings Ten waste categories were identified, along with their relationships and applications of Lean tool types related to HIS. Different Lean tools were used at the early and final stages of Lean transformation; the tool selection depended on the waste characteristic. Nine studies reported a positive impact from Lean transformation in improving daily work processes. The selection of Lean tools should be made based on the timing, purpose and characteristics of waste to be removed. Research limitations/implications Overview of waste and its category within HIS and its analysis from socio-technical perspectives enabled the identification of its root cause in a holistic and rigorous manner. Practical implications Understanding waste types, their root cause and review of Lean tools could subsequently lead to the identification of mitigation approach to prevent future error occurrence. Originality/value Specific waste models for HIS settings are yet to be developed. Hence, the identification of the waste categories could guide future implementation of Lean transformations in HIS settings.
    Matched MeSH terms: Health Information Systems/organization & administration*
  6. Yusof M, Sahroni MN
    Int J Health Care Qual Assur, 2018 Oct 08;31(8):1014-1029.
    PMID: 30415623 DOI: 10.1108/IJHCQA-07-2017-0125
    PURPOSE: The purpose of this paper is to present a review of health information system (HIS)-induced errors and its management. This paper concludes that the occurrence of errors is inevitable but it can be minimised with preventive measures. The review of classifications can be used to evaluate medical errors related to HISs using a socio-technical approach. The evaluation could provide an understanding of errors as a learning process in managing medical errors.

    DESIGN/METHODOLOGY/APPROACH: A literature review was performed on issues, sources, management and approaches to HISs-induced errors. A critical review of selected models was performed in order to identify medical error dimensions and elements based on human, process, technology and organisation factors.

    FINDINGS: Various error classifications have resulted in the difficulty to understand the overall error incidents. Most classifications are based on clinical processes and settings. Medical errors are attributed to human, process, technology and organisation factors that influenced and need to be aligned with each other. Although most medical errors are caused by humans, they also originate from other latent factors such as poor system design and training. Existing evaluation models emphasise different aspects of medical errors and could be combined into a comprehensive evaluation model.

    RESEARCH LIMITATIONS/IMPLICATIONS: Overview of the issues and discourses in HIS-induced errors could divulge its complexity and enable its causal analysis.

    PRACTICAL IMPLICATIONS: This paper helps in understanding various types of HIS-induced errors and promising prevention and management approaches that call for further studies and improvement leading to good practices that help prevent medical errors.

    ORIGINALITY/VALUE: Classification of HIS-induced errors and its management, which incorporates a socio-technical and multi-disciplinary approach, could guide researchers and practitioners to conduct a holistic and systematic evaluation.

    Matched MeSH terms: Health Information Systems/organization & administration*
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links