A systematic literature review on security and privacy of electronic health record systems: Technical perspectives
Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. Objective: This article presents the results of a systematic literature review regarding frequently adopted...
Gespeichert in:
Veröffentlicht in: | Health Information Management Journal 2015, Vol.44 (3), p.23-38 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 38 |
---|---|
container_issue | 3 |
container_start_page | 23 |
container_title | Health Information Management Journal |
container_volume | 44 |
creator | Rezaeibagha, Fatemeh Win, Khin Than Susilo, Willy |
description | Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. Objective: This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Method: Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Results: Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. Conclusion: This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements. |
doi_str_mv | 10.1177/183335831504400304 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1177_183335831504400304</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><informt_id>10.3316/ielapa.548633336142172</informt_id><sage_id>10.1177_183335831504400304</sage_id><sourcerecordid>1722422272</sourcerecordid><originalsourceid>FETCH-LOGICAL-c469t-d0fe3e32d2f6059142a88f5454c0a72a2a3a74bdabf2045cbfcfeb56eebc4cc53</originalsourceid><addsrcrecordid>eNqVkEtr3DAUhU1paEKaP5BF0bIbN3ranu5CaJuGQDdJtuJavsposC1XkqfMv6_mkRBIW-jKgvudD59TFOeMfmKsri9YI4RQjWCKSkmpoPJNccIE56VcMPE2vzNQbonj4izGFaWUK6nEon5XHPOKMaF4dVKESxI3MeEAyRnSu4QB0hyQBFw7_EX8SCKaObi0ITB2ZApuDWZDvCXYo0nBjzm3ROjTMmeMD91BGD-TOzTLfIaeTBjilHG3xvi-OLLQRzw7fE-L-69f7q6uy9sf375fXd6WRlaLVHbUokDBO24rqhZMcmgamytIQ6HmwEFALdsOWsupVKa1xmKrKsTWSGOUOC0-7r1T8D9njEkPLhrsexjRz1GzmnPJOa95RvkeNcHHGNDq3HOAsNGM6u3c-vXcOfTh4J_bAbvnyNO4GbjYAxEeUa_8HMbc99_Kh30iDC5p4_vtxM6PcQUp6ogQzFK70frd3YdH3Xmnod1JhWCVdtjDBFrJpsp2UeXZ2K7gzQtxJmz6q-5Z9XR4Lbv-f9mf_-s3nlvaJg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1722422272</pqid></control><display><type>article</type><title>A systematic literature review on security and privacy of electronic health record systems: Technical perspectives</title><source>SAGE Complete A-Z List</source><creator>Rezaeibagha, Fatemeh ; Win, Khin Than ; Susilo, Willy</creator><creatorcontrib>Rezaeibagha, Fatemeh ; Win, Khin Than ; Susilo, Willy</creatorcontrib><description>Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. Objective: This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Method: Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Results: Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. Conclusion: This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.</description><identifier>ISSN: 1833-3583</identifier><identifier>EISSN: 1322-4913</identifier><identifier>EISSN: 1833-3575</identifier><identifier>DOI: 10.1177/183335831504400304</identifier><identifier>PMID: 26113526</identifier><language>eng</language><publisher>London, England: SAGE Publications</publisher><subject>Cryptography ; Data integration (Computer science) ; Data processing ; Health administration ; Information storage and retrieval systems ; Internetworking (Telecommunication) ; Medical records ; Security measures</subject><ispartof>Health Information Management Journal, 2015, Vol.44 (3), p.23-38</ispartof><rights>2015 Health Information Management Association of Australia Limited</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c469t-d0fe3e32d2f6059142a88f5454c0a72a2a3a74bdabf2045cbfcfeb56eebc4cc53</citedby><cites>FETCH-LOGICAL-c469t-d0fe3e32d2f6059142a88f5454c0a72a2a3a74bdabf2045cbfcfeb56eebc4cc53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://journals.sagepub.com/doi/pdf/10.1177/183335831504400304$$EPDF$$P50$$Gsage$$H</linktopdf><linktohtml>$$Uhttps://journals.sagepub.com/doi/10.1177/183335831504400304$$EHTML$$P50$$Gsage$$H</linktohtml><link.rule.ids>314,776,780,4009,21799,27902,27903,27904,43600,43601</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/26113526$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Rezaeibagha, Fatemeh</creatorcontrib><creatorcontrib>Win, Khin Than</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><title>A systematic literature review on security and privacy of electronic health record systems: Technical perspectives</title><title>Health Information Management Journal</title><addtitle>Health Inf Manag</addtitle><description>Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. Objective: This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Method: Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Results: Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. Conclusion: This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.</description><subject>Cryptography</subject><subject>Data integration (Computer science)</subject><subject>Data processing</subject><subject>Health administration</subject><subject>Information storage and retrieval systems</subject><subject>Internetworking (Telecommunication)</subject><subject>Medical records</subject><subject>Security measures</subject><issn>1833-3583</issn><issn>1322-4913</issn><issn>1833-3575</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNqVkEtr3DAUhU1paEKaP5BF0bIbN3ranu5CaJuGQDdJtuJavsposC1XkqfMv6_mkRBIW-jKgvudD59TFOeMfmKsri9YI4RQjWCKSkmpoPJNccIE56VcMPE2vzNQbonj4izGFaWUK6nEon5XHPOKMaF4dVKESxI3MeEAyRnSu4QB0hyQBFw7_EX8SCKaObi0ITB2ZApuDWZDvCXYo0nBjzm3ROjTMmeMD91BGD-TOzTLfIaeTBjilHG3xvi-OLLQRzw7fE-L-69f7q6uy9sf375fXd6WRlaLVHbUokDBO24rqhZMcmgamytIQ6HmwEFALdsOWsupVKa1xmKrKsTWSGOUOC0-7r1T8D9njEkPLhrsexjRz1GzmnPJOa95RvkeNcHHGNDq3HOAsNGM6u3c-vXcOfTh4J_bAbvnyNO4GbjYAxEeUa_8HMbc99_Kh30iDC5p4_vtxM6PcQUp6ogQzFK70frd3YdH3Xmnod1JhWCVdtjDBFrJpsp2UeXZ2K7gzQtxJmz6q-5Z9XR4Lbv-f9mf_-s3nlvaJg</recordid><startdate>2015</startdate><enddate>2015</enddate><creator>Rezaeibagha, Fatemeh</creator><creator>Win, Khin Than</creator><creator>Susilo, Willy</creator><general>SAGE Publications</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope></search><sort><creationdate>2015</creationdate><title>A systematic literature review on security and privacy of electronic health record systems: Technical perspectives</title><author>Rezaeibagha, Fatemeh ; Win, Khin Than ; Susilo, Willy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c469t-d0fe3e32d2f6059142a88f5454c0a72a2a3a74bdabf2045cbfcfeb56eebc4cc53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Cryptography</topic><topic>Data integration (Computer science)</topic><topic>Data processing</topic><topic>Health administration</topic><topic>Information storage and retrieval systems</topic><topic>Internetworking (Telecommunication)</topic><topic>Medical records</topic><topic>Security measures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rezaeibagha, Fatemeh</creatorcontrib><creatorcontrib>Win, Khin Than</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>Health Information Management Journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rezaeibagha, Fatemeh</au><au>Win, Khin Than</au><au>Susilo, Willy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A systematic literature review on security and privacy of electronic health record systems: Technical perspectives</atitle><jtitle>Health Information Management Journal</jtitle><addtitle>Health Inf Manag</addtitle><date>2015</date><risdate>2015</risdate><volume>44</volume><issue>3</issue><spage>23</spage><epage>38</epage><pages>23-38</pages><issn>1833-3583</issn><eissn>1322-4913</eissn><eissn>1833-3575</eissn><abstract>Background: Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. Objective: This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Method: Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Results: Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. Conclusion: This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.</abstract><cop>London, England</cop><pub>SAGE Publications</pub><pmid>26113526</pmid><doi>10.1177/183335831504400304</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1833-3583 |
ispartof | Health Information Management Journal, 2015, Vol.44 (3), p.23-38 |
issn | 1833-3583 1322-4913 1833-3575 |
language | eng |
recordid | cdi_crossref_primary_10_1177_183335831504400304 |
source | SAGE Complete A-Z List |
subjects | Cryptography Data integration (Computer science) Data processing Health administration Information storage and retrieval systems Internetworking (Telecommunication) Medical records Security measures |
title | A systematic literature review on security and privacy of electronic health record systems: Technical perspectives |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T18%3A43%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20systematic%20literature%20review%20on%20security%20and%20privacy%20of%20electronic%20health%20record%20systems:%20Technical%20perspectives&rft.jtitle=Health%20Information%20Management%20Journal&rft.au=Rezaeibagha,%20Fatemeh&rft.date=2015&rft.volume=44&rft.issue=3&rft.spage=23&rft.epage=38&rft.pages=23-38&rft.issn=1833-3583&rft.eissn=1322-4913&rft_id=info:doi/10.1177/183335831504400304&rft_dat=%3Cproquest_cross%3E1722422272%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1722422272&rft_id=info:pmid/26113526&rft_informt_id=10.3316/ielapa.548633336142172&rft_sage_id=10.1177_183335831504400304&rfr_iscdi=true |