Selecting Suitable Component for Healthcare IT: A Critical Review
Downloads
Software component selection is developing in vitality. Its achievement depends on accurately selecting the component. For a specific task, you can survey quality by distinguishing and examining the criteria that influences it. Component selection is focused around the suitability and fulfillment of the criteria utilized for assessment. In this paper, we are pointing at the different component prerequisites in the healthcare information technology. Healthcare Information Technology gives the system to clarify the administration of healthcare information on computerized software and its protected trade of information between the clients, suppliers, government and safety netproviders. Healthcare information technology is the most guaranteeing instrument for extemporizing the wellbeing, quality and effectiveness of the healthcare conveyance framework. Data Security, Privacy, Ease of access, Availability, Reusability and Portability are the principle components in Healthcare IT conveyance frameworks. We basically study the research literature on Healthcare IT over the globe. In this research paper, we give a concise perspective of the latest research in Healthcare IT and propose the use of Healthcare IT components while for all intents and purpose executing the Healthcare IT frameworks in India.
Information Security and Privacy in
Healthcare: Ajit Appari And M. Eric
Johnson
Agrawal, R., and Johnson, ―securing
Electronic Health Records Without Impeding the Flow of Information,‖
International Journal of Medical Informatics.
Anderson, R.j. ―security in Clinical
Information Systems‖ University of
Cambridge, 1996
Baker, D.b. (2006) "Privacy and Security in
Public Health," Computer Security
Applications Conference
Ball, E., Chadwick, D.W., Mundy, D. (2003)
―patient Privacy in Electronic Prescription
Transfer,‖ IEEE Security & Privacy, pp 77 –
,
Baumer, D. L., Earp, J. B., & Payton, F. C.
(2000) ―privacy of restorative records: IT
ramifications of HIPAA‖, ACM Computers
and Society, vol. 30, no. 4, pp 40–47.
Reassessing Your Security Practices in a
Health IT Environment.
Protecting Personal Health Information in
Research: Understanding the HIPAA
Privacy Rule
2009 HIMSS Analytics Report: Evaluating
HITECH's Impact on Healthcare Privacy
and Security, HIMSS,
http://www.himssanalytics.org/docs/Id_expe
rts_111509.pdf
http://www.wellpoint.com/privacy_policy.as
p.
"Benchmark Study on Patient Privacy and
Data Security," Ponemon Institute,
November9,2010,
http://www2.idexpertscorp.com/assets/medic
inal,services/healthcare,articleswhitepapers/
ponemon-benchmark-study-onpatient-
security and-information security/#
http://www.healthdatamanagement.com/new
s/breach_hipaa_privacy_security_hitech_
All Content should be original and unpublished.