Future of healthcare vis-a-vis building trust in major stakeholders through Information Security Management

Authors

  • Alpana Kakkar Amity University, Noida - INDIA
  • Priyanka Tayal Amity University, Noida - INDIA
  • Ritu Punhani Amity University, Noida, INDIA

DOI:

https://doi.org/10.51611/iars.irj.v3i2.2013.32

Keywords:

DIGITAL PATIENT RECORDS, HIPAA, ISMS, ISO 27799, ISO27001

Abstract

The Healthcare sector is growing leaps and bound, so is its data and information. Security and privacy of this Information has become a crucial issue for this proliferating healthcare industry. In this fast moving global scenario, patients need not carry their medical records in a big bag on move, as in this digital world ,all that patients have to do is to get admitted in a hospital for the treatment , rest all is in hands of Information Assets Infrastructure of these mushrooming hospitals. But due to the increased use of patient’s information sharing among doctors, vis hospitals ;patients and their families raise an issue for security of their medical data and records. Hence improving the Information Security Management Systems (ISMS) has become the necessity to keep secure digital patient records for success of hospitals and their brands or at large name and fame of Healthcare Industry. Patients are required to share information with doctors for correct diagnosis and treatment. Security concerns arise, in transmitting and processing electronic medical records, personal healthcare records, patients’ billing records as well as public health alerts across many parties with varying security, privacy and trust levels. Not all hospitals adopt all the essential security measures. In the present paper, we are studying eight International Hospitals to review their Information Security Management Systems (ISMS) standards , concluding their stands on the basis of proposed five principles and also proposing the future scope of implementation of IS in the hospital. We contemplate an Information Security model based on the proposed five principles of Information Security.

Downloads

Download data is not yet available.

Author Biography

  • Ritu Punhani, Amity University, Noida, INDIA

    Assistant Professor,
    Computer Science and Information Technology,
    Amity University, Noida,
    U.P., 201301, INDIA

References

A case study - LogLogic Improves Prognosis for Risk Management at Northwestern Memorial Hospital, https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fstructuredweb.com%2Fsw%2Fswchannel%2FCustomerCenter%2Fdocuments%2F7769%2F19285%2FlogLogic_Health_Care_Case_Study.pdf&ei=xtfDUarBOY7JrQfNm4CQBw&usg=AFQjCNERINVG_-gxhXJctP7PnXulFajcZg&sig2=CZ8IzfOJoL0XQkMV_XTY-g&bvm=bv.48293060,d.bmk
About ISO 27799, http://sl.infoway-inforoute.ca/downloads/ross_fraser_-_iso_27799.pdf
Alpana kakkar, Dr Ritu Punhani, Dr S Madan, and Dr D Jain. An Assessment of ISMS Process Maturity based on Readiness and Awareness of team members of team members of selected IT organizations. IARS International Research Journal, ISSN 1839-6518 vol 2 No 2, 2012
Alpana Kakkar, Ritu Punhani and D. Jain. Process Capability and Maturity in Information Security. IARS International Research Journal, ISSN 1839-6518 Vol 1, No2, 2011
Alpana Kakkar, Ritu Punhani, Dr S Madan and Prof D Jain. Implementation of ISMS and its Practical Shortcomings. IARS International Research Journal, ISSN 1839-6518 Vol 2, No 1, 2012
ARTEMIS: Towards a secure Interoperability Infrastructure for Healthcare Information Systems by Mike Boniface and Paul Wilken, https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDUQFjAA&url=http%3A%2F%2Fwww.srdc.com.tr%2Fmetu-srdc%2Fprojects%2Fartemis%2Fpublications%2FBoniface-HG05-security-interoperability_final.doc&ei=adfDUdrELYP3rQfSu4CgBw&usg=AFQjCNEwiVmNA25bElyR3Kq4_Of4vDaceg&sig2=EwAe_9Y-19ybKGm_054rQw&bvm=bv.48293060,d.bmk
Case Study by FUJITSU, on Shanghai Shuguang Hospital, https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.fujitsu.com%2Frs%2FImages%2FCS_Shanghai-Shuguang-Hospital.pdf&ei=VNfDUcr1KYSyrAfNxoG4Bg&usg=AFQjCNFmYgNYqFBYWnT1VKtIt9D5R5xbiA&sig2=gLcHfvUFlIxNZzh2K950YA&bvm=bv.48293060,d.bmk
Good Samaritan Hospital gets a security check-up – A case study by AT&T, http://www.business.att.com/enterprise/resource_item/Family/network-security/consulting/Case_Study/good-samaritan-hospital-security-consulting/
HIPAA, http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
Hospital da Luz implements Cisco BioMedical Network Admission Control Technology to Increase Security. A case study by Cisco, https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.cisco.com%2Fweb%2Fstrategy%2Fdocs%2Fhealthcare%2FdaLuz_hospital_cStudy.pdf&ei=I9fDUaHHNcaCrgf_0YHIBg&usg=AFQjCNEe68So2QpDgin9ZiC6bLepdm7iQg&sig2=a2AVsSX-ErLG0mmNAFLmTw&bvm=bv.48293060,d.bmk
IBM Case Study: Implementing database activity monitoring and auditing in a leading healthcare payer organization, https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.ibm.com%2Fcommon%2Fssi%2Fcgi-bin%2Fssialias%3Finfotype%3DPM%26subtype%3DAB%26appname%3DSWGE_IM_DM_USEN%26htmlfid%3DIMC14608USEN%26attachment%3DIMC14608USEN.PDF&ei=fdfDUcixJM3JrAfRwoDgAQ&usg=AFQjCNFCeSsctM_8Xv_oIXfFhahqon9ffw&sig2=3naeT4gTNPArUuH3Nq847Q&bvm=bv.48293060,d.bmk
Information security and Privacy in healthcare: current state of Research by Ajit Appari and M. Eric Johnson, Published in Aug 2008
ISO 27799 standard format, http://www.27000.org/iso-27799.htm
Lehig Valley Hospital, https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=30&cad=rja&ved=0CHkQFjAJOBQ&url=http%3A%2F%2Fwww.eventtracker.com%2Fwp-content%2Fuploads%2F2012%2F08%2FLeHigh-Valley-DMReview-Case-Study.pdf&ei=r6bGUdnjNsyXrAer04DYCA&usg=AFQjCNHbUaxgSxTlaRgFUyTAykQyJ-voug&sig2=Csb9NnM5KiSd1pO4JwENUw&bvm=bv.48293060,d.bmk
Potomac Hospital Case Study, https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.sonicwall.com%2Fapp%2Fprojects%2Ffile_downloader%2Fdocument_lib.php%3Ft%3DCS%26id%3D149&ei=l9fDUbTjA4LprAfH6IGAAg&usg=AFQjCNG29U-uH9u1cofSk1mSPG90uzMYig&sig2=rq1Taw40z0RocVMtPYs4sA&bvm=bv.48293060,d.bmk

Crossref Crossmark

Downloads

Published

2013-08-29

Issue

Section

Peer Reviewed Research Manuscript

How to Cite

“Future of healthcare vis-a-vis building trust in major stakeholders through Information Security Management” (2013) IARS’ International Research Journal, 3(2). doi:10.51611/iars.irj.v3i2.2013.32.

Citations

Similar Articles

1-10 of 16

You may also start an advanced similarity search for this article.