• Title/Summary/Keyword: healthcare information technology

Search Result 725, Processing Time 0.026 seconds

Information Technology Usage to Improve the Perceived Quality of Healthcare Service

  • Vilivong, Chindavanh;Cho, Namjae
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.2
    • /
    • pp.31-48
    • /
    • 2014
  • The concept of Health Related Quality of Life and its determinants have evolved since the 1980s. Although many researchers have published articles of technology usage in hospitals and the installation of technology based healthcare system, the research about applying the information technology to improve the patients' perceived quality of healthcare services is still limited. In general, services are deeds, processes and performances that are essentially concerns of the consumer. The healthcare service quality depends on tangible factors, such as equipments, facilities, and the quality of hospital staff and also the intangible ones. The main purpose of this work is to establish new model and find out the contribution of information technology to enhance the patients' perceived quality of healthcare service. We attempted to examine the main information technology related factors in 3 aspects, namely quality of information, the technology accessibility and the community that can improve patients' perceived quality of healthcare services. Offline and online questionnaires were used to measure the patients' perceived quality and were distributed to 384 people in 2 countries, Laos and South Korea. A principle component analysis and multiple regressions were used to verify our model. Results show that the use of information technology has partial positive effect on patient-physician interaction in both countries. However, patient knowledge and patient autonomy which are the 2 dimensions of patient-physician interaction has significant positive effect on patients' perceived quality of healthcare service.

Implementing Rule-based Healthcare Edits

  • Abdullah, Umair;Shaheen, Muhammad;Ujager, Farhan Sabir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.116-132
    • /
    • 2022
  • Automated medical claims processing and billing is a popular application domain of information technology. Managing medical related data is a tedious job for healthcare professionals, which distracts them from their main job of healthcare. The technology used in data management has a sound impact on the quality of healthcare data. Most of Information Technology (IT) organizations use conventional software development technology for the implementation of healthcare systems. The objective of this experimental study is to devise a mechanism for use of rule-based expert systems in medical related edits and compare it with the conventional software development technology. A sample of 100 medical edits is selected as a dataset to be tested for implementation using both technologies. Besides empirical analysis, paired t-test is also used to validate the statistical significance of the difference between the two techniques. The conventional software development technology took 254.5 working hours, while rule-based technology took 81 hours to process these edits. Rule-based technology outperformed the conventional systems by increasing the confidence value to 95% and reliability measure to 0.462 (which is < 0.5) which is three times more efficient than conventional software development technology.

Healthcare Security based on Blockchain

  • Almalki, Taghreed;Alzahrani, Shahad;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.149-160
    • /
    • 2021
  • One of the most important inventions and developments in the digital world today is the healthcare system based on blockchain technology. Healthcare is an important field that requires the application of security mechanisms due to the sensitivity of patient data. The association of blockchain with healthcare contributed to achieving better security mechanisms than the traditional approach. The new approach operates in a decentralized system, which in turn, improves security in the healthcare environment. Consequently, blockchain technology has emerged as one of the most crucial solutions to security violations and challenges in the healthcare industry. This paper provides a comprehensive review of several experts' recent protection and detection approaches in this domain. It is also imperative to note that the paper focuses only on the recent techniques that have been published during 2017-2020. The sophisticated procedures have been investigated and discussed in terms of similarities and differences to highlight the significance of the protection needed to secure the healthcare environment.

Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

  • Asma Albassam;Fatima Almutairi;Nouf Majoun;Reem Althukair;Zahra Alturaiki;Atta Rahman;Dania AlKhulaifi;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.17-26
    • /
    • 2023
  • Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

The Effects of Consumer Characteristics on the Intention to Use U-healthcare Services (소비자 특성이 u-헬스케어 서비스 이용의도에 미치는 영향)

  • Noh, Mi-Jin;Park, Soon-Chang;Youn, Kyung-Il
    • Korea Journal of Hospital Management
    • /
    • v.15 no.4
    • /
    • pp.27-42
    • /
    • 2010
  • The purpose of this study is to investigate the intention to utilize u-healthcare services in Korea. Specifically, this study attempted to identify the relationships among the intention to use u-healthcare, consumer's demographic characteristics, and personal information technology level. We conducted telephone interview and collected data from 406 householders 20 years old or older. The results showed significant differences in use intention of u-healthcare service by innovation, gender, and their interaction term. Residence area and average time of internet use had significant effect on the use intention of u-healthcare service. Also, the interaction term between innovation and education level had a significant effect on use intention. Based on the results we concluded that the consumer's characteristics and information technology level had a significant effect on the use intention of u-healthcare service.

  • PDF

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

Digital Healthcare and Main Issues (디지털 헬스케어와 주요이슈)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.560-563
    • /
    • 2016
  • The changes in the medical and healthcare are started from the digital technology. The new field of digital healthcare has started fused with existing healthcare, medical technology, and digital technology. It can increase the service effect and reduce healthcare costs by applying ICT skills such as ICBM(Internet of Things, Cloud, Big data and Mobile), artificial intelligence, robotics, virtual, augmented reality, and wearable devices to healthcare services including healthcare, disease management. Recently there has been grafted an artificial intelligence technologies such as AlphaGo of Google and Watson of IBM onto the healthcare area. In this study, we analyze the main technology, ecosystem, platforms for digital healthcare, and lastly future changes in health care services and issues of digital healthcare.

  • PDF

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing

  • Saeed, Waqar;Ahmad, Zulfiqar;Jehangiri, Ali Imran;Mohamed, Nader;Umar, Arif Iqbal;Ahmad, Jamil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.35-57
    • /
    • 2021
  • Fog computing aims to provide the solution of bandwidth, network latency and energy consumption problems of cloud computing. Likewise, management of data generated by healthcare IoT devices is one of the significant applications of fog computing. Huge amount of data is being generated by healthcare IoT devices and such types of data is required to be managed efficiently, with low latency, without failure, and with minimum energy consumption and low cost. Failures of task or node can cause more latency, maximum energy consumption and high cost. Thus, a failure free, cost efficient, and energy aware management and scheduling scheme for data generated by healthcare IoT devices not only improves the performance of the system but also saves the precious lives of patients because of due to minimum latency and provision of fault tolerance. Therefore, to address all such challenges with regard to data management and fault tolerance, we have presented a Fault Tolerant Data management (FTDM) scheme for healthcare IoT in fog computing. In FTDM, the data generated by healthcare IoT devices is efficiently organized and managed through well-defined components and steps. A two way fault-tolerant mechanism i.e., task-based fault-tolerance and node-based fault-tolerance, is provided in FTDM through which failure of tasks and nodes are managed. The paper considers energy consumption, execution cost, network usage, latency, and execution time as performance evaluation parameters. The simulation results show significantly improvements which are performed using iFogSim. Further, the simulation results show that the proposed FTDM strategy reduces energy consumption 3.97%, execution cost 5.09%, network usage 25.88%, latency 44.15% and execution time 48.89% as compared with existing Greedy Knapsack Scheduling (GKS) strategy. Moreover, it is worthwhile to mention that sometimes the patients are required to be treated remotely due to non-availability of facilities or due to some infectious diseases such as COVID-19. Thus, in such circumstances, the proposed strategy is significantly efficient.

Secure Architecture of the Mobile Healthcare Environment Using security protocols

  • Moon, KangNam;Lee, JeongHoon;Kwock, DongYeup;sahama, Tony;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.892-895
    • /
    • 2009
  • Medical records must be well protected because they are needed to care for the health of patients. For that reason, user authentication and medical data encryption are essential for the security of both wired and wireless Healthcare Information Systems (HIS). The main focus of this paper is on the analysis of the numerous possible attacks and the countermeasures to overcome these attacks in Mobile Healthcare Environment (MHE) with an appropriate security protocols. To draw a conclusion, this will propose why a healthcare architecture should establish a multi-layered defense against the risks.

  • PDF