Cargando…

Integrated personal health record (PHR) security: requirements and mechanisms

BACKGROUND: Personal Health Records (PHRs) are designed to fulfill the goals of electronic health (eHealth) and empower the individual in the process of self-care. Integrated PHR can improve the quality of care, strengthen the patient-healthcare provider relationship, and reduce healthcare costs. St...

Descripción completa

Detalles Bibliográficos
Autores principales: Hosseini, Azamossadat, Emami, Hassan, Sadat, Yousef, Paydar, Somayeh
Formato: Online Artículo Texto
Lenguaje:English
Publicado: BioMed Central 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10334660/
https://www.ncbi.nlm.nih.gov/pubmed/37430242
http://dx.doi.org/10.1186/s12911-023-02225-0
_version_ 1785070906453786624
author Hosseini, Azamossadat
Emami, Hassan
Sadat, Yousef
Paydar, Somayeh
author_facet Hosseini, Azamossadat
Emami, Hassan
Sadat, Yousef
Paydar, Somayeh
author_sort Hosseini, Azamossadat
collection PubMed
description BACKGROUND: Personal Health Records (PHRs) are designed to fulfill the goals of electronic health (eHealth) and empower the individual in the process of self-care. Integrated PHR can improve the quality of care, strengthen the patient-healthcare provider relationship, and reduce healthcare costs. Still, the process of PHR acceptance and use has been slow and mainly hindered by people’s concerns about the security of their personal health information. Thus, the present study aimed to identify the Integrated PHR security requirements and mechanisms. METHODS: In this applied study, PHR security requirements were identified with a literature review of (library sources, research articles, scientific documents, and reliable websites). The identified requirements were classified, and a questionnaire was developed accordingly. Thirty experts completed the questionnaire in a two-round Delphi technique, and the data were analyzed by descriptive statistics. RESULTS: The PHR security requirements were identified and classified into seven dimensions confidentiality, availability, integrity, authentication, authorization, non-repudiation, and right of access, each dimension having certain mechanisms. On average, the experts reached an agreement about the mechanisms of confidentiality (94.67%), availability (96.67%), integrity (93.33%), authentication (100%), authorization (97.78%), non-repudiation (100%), and right of access (90%). CONCLUSION: Integrated PHR security is a requirement for its acceptance and use. To design a useful and reliable integrated PHR, system designers, health policymakers, and healthcare organizations must identify and apply security requirements to guarantee the privacy and confidentiality of data. SUPPLEMENTARY INFORMATION: The online version contains supplementary material available at 10.1186/s12911-023-02225-0.
format Online
Article
Text
id pubmed-10334660
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher BioMed Central
record_format MEDLINE/PubMed
spelling pubmed-103346602023-07-12 Integrated personal health record (PHR) security: requirements and mechanisms Hosseini, Azamossadat Emami, Hassan Sadat, Yousef Paydar, Somayeh BMC Med Inform Decis Mak Research BACKGROUND: Personal Health Records (PHRs) are designed to fulfill the goals of electronic health (eHealth) and empower the individual in the process of self-care. Integrated PHR can improve the quality of care, strengthen the patient-healthcare provider relationship, and reduce healthcare costs. Still, the process of PHR acceptance and use has been slow and mainly hindered by people’s concerns about the security of their personal health information. Thus, the present study aimed to identify the Integrated PHR security requirements and mechanisms. METHODS: In this applied study, PHR security requirements were identified with a literature review of (library sources, research articles, scientific documents, and reliable websites). The identified requirements were classified, and a questionnaire was developed accordingly. Thirty experts completed the questionnaire in a two-round Delphi technique, and the data were analyzed by descriptive statistics. RESULTS: The PHR security requirements were identified and classified into seven dimensions confidentiality, availability, integrity, authentication, authorization, non-repudiation, and right of access, each dimension having certain mechanisms. On average, the experts reached an agreement about the mechanisms of confidentiality (94.67%), availability (96.67%), integrity (93.33%), authentication (100%), authorization (97.78%), non-repudiation (100%), and right of access (90%). CONCLUSION: Integrated PHR security is a requirement for its acceptance and use. To design a useful and reliable integrated PHR, system designers, health policymakers, and healthcare organizations must identify and apply security requirements to guarantee the privacy and confidentiality of data. SUPPLEMENTARY INFORMATION: The online version contains supplementary material available at 10.1186/s12911-023-02225-0. BioMed Central 2023-07-10 /pmc/articles/PMC10334660/ /pubmed/37430242 http://dx.doi.org/10.1186/s12911-023-02225-0 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/ (https://creativecommons.org/publicdomain/zero/1.0/) ) applies to the data made available in this article, unless otherwise stated in a credit line to the data.
spellingShingle Research
Hosseini, Azamossadat
Emami, Hassan
Sadat, Yousef
Paydar, Somayeh
Integrated personal health record (PHR) security: requirements and mechanisms
title Integrated personal health record (PHR) security: requirements and mechanisms
title_full Integrated personal health record (PHR) security: requirements and mechanisms
title_fullStr Integrated personal health record (PHR) security: requirements and mechanisms
title_full_unstemmed Integrated personal health record (PHR) security: requirements and mechanisms
title_short Integrated personal health record (PHR) security: requirements and mechanisms
title_sort integrated personal health record (phr) security: requirements and mechanisms
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10334660/
https://www.ncbi.nlm.nih.gov/pubmed/37430242
http://dx.doi.org/10.1186/s12911-023-02225-0
work_keys_str_mv AT hosseiniazamossadat integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms
AT emamihassan integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms
AT sadatyousef integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms
AT paydarsomayeh integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms