A Viewpoint of Security for Digital Health Care in the United States: What's There? What Works? What's Needed?

A Viewpoint of Security for Digital Health Care in the United States: What's There? What Works? What's Needed?

Steven A. Demurjian, Alberto De la Rosa Algarín, Jinbo Bi, Solomon Berhe, Thomas Agresta, Xiaoyan Wang, Michael Blechner
ISBN13: 9781466687561|ISBN10: 1466687568|EISBN13: 9781466687578
DOI: 10.4018/978-1-4666-8756-1.ch062
Cite Chapter Cite Chapter

MLA

Demurjian, Steven A., et al. "A Viewpoint of Security for Digital Health Care in the United States: What's There? What Works? What's Needed?." E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2016, pp. 1245-1263. https://doi.org/10.4018/978-1-4666-8756-1.ch062

APA

Demurjian, S. A., Algarín, A. D., Bi, J., Berhe, S., Agresta, T., Wang, X., & Blechner, M. (2016). A Viewpoint of Security for Digital Health Care in the United States: What's There? What Works? What's Needed?. In I. Management Association (Ed.), E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications (pp. 1245-1263). IGI Global. https://doi.org/10.4018/978-1-4666-8756-1.ch062

Chicago

Demurjian, Steven A., et al. "A Viewpoint of Security for Digital Health Care in the United States: What's There? What Works? What's Needed?." In E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1245-1263. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8756-1.ch062

Export Reference

Mendeley
Favorite

Abstract

In health care, patient information of interest to health providers, researchers, public health researchers, insurers, patients, etc., is stored in different locations via electronic media and/or hard-copy formats. All potential users need electronic access to health information technology systems such as: electronic health records, personal health records, patient portals, and ancillary systems such as imaging, laboratory, pharmacy, etc. Controlling access to information from multiple systems requires granularity levels of privileges ranging from one patient to a cohort to an entire population. In this paper, we present a viewpoint of the state of secure digital health care in the United States, focusing on the resources that need to be protected as dictated by legal entities and regulations, the available approaches in the present state-of-the art, and, the potential needs for the future of security for digital health care. By utilizing a real world scenario, the authors explore the limitations of health information exchange in the United States, and present one possible architecture for secure digital health care that builds on existing technology alternatives.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.