Cargando…
Integrated personal health record (PHR) security: requirements and mechanisms
BACKGROUND: Personal Health Records (PHRs) are designed to fulfill the goals of electronic health (eHealth) and empower the individual in the process of self-care. Integrated PHR can improve the quality of care, strengthen the patient-healthcare provider relationship, and reduce healthcare costs. St...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
BioMed Central
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10334660/ https://www.ncbi.nlm.nih.gov/pubmed/37430242 http://dx.doi.org/10.1186/s12911-023-02225-0 |
_version_ | 1785070906453786624 |
---|---|
author | Hosseini, Azamossadat Emami, Hassan Sadat, Yousef Paydar, Somayeh |
author_facet | Hosseini, Azamossadat Emami, Hassan Sadat, Yousef Paydar, Somayeh |
author_sort | Hosseini, Azamossadat |
collection | PubMed |
description | BACKGROUND: Personal Health Records (PHRs) are designed to fulfill the goals of electronic health (eHealth) and empower the individual in the process of self-care. Integrated PHR can improve the quality of care, strengthen the patient-healthcare provider relationship, and reduce healthcare costs. Still, the process of PHR acceptance and use has been slow and mainly hindered by people’s concerns about the security of their personal health information. Thus, the present study aimed to identify the Integrated PHR security requirements and mechanisms. METHODS: In this applied study, PHR security requirements were identified with a literature review of (library sources, research articles, scientific documents, and reliable websites). The identified requirements were classified, and a questionnaire was developed accordingly. Thirty experts completed the questionnaire in a two-round Delphi technique, and the data were analyzed by descriptive statistics. RESULTS: The PHR security requirements were identified and classified into seven dimensions confidentiality, availability, integrity, authentication, authorization, non-repudiation, and right of access, each dimension having certain mechanisms. On average, the experts reached an agreement about the mechanisms of confidentiality (94.67%), availability (96.67%), integrity (93.33%), authentication (100%), authorization (97.78%), non-repudiation (100%), and right of access (90%). CONCLUSION: Integrated PHR security is a requirement for its acceptance and use. To design a useful and reliable integrated PHR, system designers, health policymakers, and healthcare organizations must identify and apply security requirements to guarantee the privacy and confidentiality of data. SUPPLEMENTARY INFORMATION: The online version contains supplementary material available at 10.1186/s12911-023-02225-0. |
format | Online Article Text |
id | pubmed-10334660 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | BioMed Central |
record_format | MEDLINE/PubMed |
spelling | pubmed-103346602023-07-12 Integrated personal health record (PHR) security: requirements and mechanisms Hosseini, Azamossadat Emami, Hassan Sadat, Yousef Paydar, Somayeh BMC Med Inform Decis Mak Research BACKGROUND: Personal Health Records (PHRs) are designed to fulfill the goals of electronic health (eHealth) and empower the individual in the process of self-care. Integrated PHR can improve the quality of care, strengthen the patient-healthcare provider relationship, and reduce healthcare costs. Still, the process of PHR acceptance and use has been slow and mainly hindered by people’s concerns about the security of their personal health information. Thus, the present study aimed to identify the Integrated PHR security requirements and mechanisms. METHODS: In this applied study, PHR security requirements were identified with a literature review of (library sources, research articles, scientific documents, and reliable websites). The identified requirements were classified, and a questionnaire was developed accordingly. Thirty experts completed the questionnaire in a two-round Delphi technique, and the data were analyzed by descriptive statistics. RESULTS: The PHR security requirements were identified and classified into seven dimensions confidentiality, availability, integrity, authentication, authorization, non-repudiation, and right of access, each dimension having certain mechanisms. On average, the experts reached an agreement about the mechanisms of confidentiality (94.67%), availability (96.67%), integrity (93.33%), authentication (100%), authorization (97.78%), non-repudiation (100%), and right of access (90%). CONCLUSION: Integrated PHR security is a requirement for its acceptance and use. To design a useful and reliable integrated PHR, system designers, health policymakers, and healthcare organizations must identify and apply security requirements to guarantee the privacy and confidentiality of data. SUPPLEMENTARY INFORMATION: The online version contains supplementary material available at 10.1186/s12911-023-02225-0. BioMed Central 2023-07-10 /pmc/articles/PMC10334660/ /pubmed/37430242 http://dx.doi.org/10.1186/s12911-023-02225-0 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/ (https://creativecommons.org/publicdomain/zero/1.0/) ) applies to the data made available in this article, unless otherwise stated in a credit line to the data. |
spellingShingle | Research Hosseini, Azamossadat Emami, Hassan Sadat, Yousef Paydar, Somayeh Integrated personal health record (PHR) security: requirements and mechanisms |
title | Integrated personal health record (PHR) security: requirements and mechanisms |
title_full | Integrated personal health record (PHR) security: requirements and mechanisms |
title_fullStr | Integrated personal health record (PHR) security: requirements and mechanisms |
title_full_unstemmed | Integrated personal health record (PHR) security: requirements and mechanisms |
title_short | Integrated personal health record (PHR) security: requirements and mechanisms |
title_sort | integrated personal health record (phr) security: requirements and mechanisms |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10334660/ https://www.ncbi.nlm.nih.gov/pubmed/37430242 http://dx.doi.org/10.1186/s12911-023-02225-0 |
work_keys_str_mv | AT hosseiniazamossadat integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms AT emamihassan integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms AT sadatyousef integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms AT paydarsomayeh integratedpersonalhealthrecordphrsecurityrequirementsandmechanisms |