STAT6001 Group Summary Assessment 3 PDF

Title STAT6001 Group Summary Assessment 3
Author Sabina RanaBhujel
Course Public Health Informatics
Institution Torrens University Australia
Pages 5
File Size 157.6 KB
File Type PDF
Total Downloads 6
Total Views 151

Summary

Summary...


Description

STAT6001: PUBLIC HEALTH INFORMATICS GROUP ASSESSMENT SUMMARY

Submitted to: Craig Mclachlan

Submitted by: Sabina Ranabhujel (00264372T)

Learning facilitator

Sujan Sharma (00279458T) Pitambar Gurung (00260941T) Jitendra Raya (00263564T)

WORD COUNT: 502

Summary: e-health and m-health are being extensively used these days (Stevens et al., 2019). The use of internet and mobile phones for health purposes have changed the way by which Electronic Health Records (EHRs) can be accessed. Big data is the large pack of data that is stored within the Cloud storage in e-health. While using the e-health system, there are many challenges like Data protection and privacy. These are related to the protection of datasets from various unsanctioned sources and access. Many ethical and legal issues are present during the protection of data and maintenance of privacy.

Ethical challenges:  Context sensitivity: Data from the patients are usually utilised for public health purposes but sometimes may be used for commercial purposes. So, there should be differentiation between public health and commercial uses.  Violation of confidentiality agreement: The people trust the medical practitioners and hospitals so their confidentiality should be maintained.  Informed consent: Taking consent from the consumers to access their data is mandatory. This safeguards their right to privacy.  Anonymity: Hiding the real identity of the individual or the data owner and using certain identification number instead.

Legal challenges: • EHRs related to the individual patient’s right to privacy and needs to be protected by laws to avoid unauthorized access. The Cross border legal challenges need to protect the integrity, confidentiality and availability of EHRs. There are various risks that are associated with the utilization of ehealth and data protection and privacy like: loss of privacy and data breaching, poor lifestyle or clinical decisions and loss of reputation. In such case, there are certain tools for data protection that can be applied. They are as follows:  Data loss prevention tool: to identify the vulnerabilities of datasets  Endpoint protection tool: to protect data from malwares  Mobile device management tool: to protect the mobile devices  Consent

management

application:

to monitor

the data

compliances

Similarly, there are few tools for data privacy like use of anti-virus, Hardware Firewall systems, cloud storage data and email protection. And some steps like risk identification, application of possible measures, policy making, backup establishment and employee training can be done for the protection and privacy maintenance of data. Thus, the concept of Big data, e-health and m-health should be sustainable. And this sustainability can be achieved by making long term visions and strategies, strong financial and ethical frameworks

and keeping good communication between the consumers and investors. Additionally, there are many key challenges within e-health and Big data. Some of them are: 1. Data security and data protection 2. Active engagement of doctors, nurses and other health professionals within this concept 3. Simple yet standard applications for Healthcare 4. Patient acceptance (making people ready to face the change) 5. Complex User experience 6. User error in technology adoption 7. Adoption of cloud and mobile technology in Healthcare 8. Outdated technologies in hospitals

Overall, there is a necessity to formulate and implement stronger ethical and economical frameworks to solve the issues present in data protection and privacy under the e-health and m-health.

References: Vayena, E., Salathé, M., Madoff, L. C., & Brownstein, J. S. (2015). Ethical challenges of big data in public health. Martin, K. E. (2015). Ethical issues in the big data industry. MIS Quarterly Executive, 14, 2. Grupe, F. H., Kuechler, W., & Sweeney, S. (2002). Dealing with Data Privacy Protection: An Issue for the 21St Century. Information Systems Management, 19(4), 61. Chen, Y. L., Cheng, B. C., Chen, H. L., Lin, C. I., Liao, G. T., Hou, B. Y., & Hsu, S. C. (2012). A privacy-preserved analytical method for ehealth database with minimized information loss. Journal of biomedicine & biotechnology, 2012, 521267. doi:10.1155/2012/521267 De Rosis, S., & Nuti, S. (2018). Public strategies for improving eHealth integration and long‐ term sustainability in public health care systems: Findings from an Italian case study. The International journal of health planning and management, 33(1), e131-e152. Director, B. L. I., & Brisbane, Q. A. (2010). 13. Privacy, Security and Access with Sensitive Health Information. Health Informatics: An Overview, 151, 167. Giannotti, F., Trasarti, R., Bontcheva, K., & Grossi, V. (2018). SoBigData: social mining & big data ecosystem. Paper presented at the Companion of the The Web Conference 2018 on The Web Conference 2018. Greenhalgh, T., Stramer, K., Bratan, T., Byrne, E., Russell, J., & Potts, H. W. (2010). Adoption and non-adoption of a shared electronic summary record in England: a mixedmethod case study. BMJ, 340, c3111. McCann, E. (2013). Kaiser reports second fall data breach. Healthcare IT News. McLoughlin, I. P., Garrety, K., & Wilson, R. (2017). The digitalization of healthcare: Electronic records and the disruption of moral orders: Oxford University Press. Patil, H. K., & Seshadri, R. (2014). Big data security and privacy issues in healthcare. Paper presented at the 2014 IEEE international congress on big data. Sahama, T., Simpson, L., & Lane, B. (2013). Security and Privacy in eHealth: Is it possible? Paper presented at the 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013). Stevens, W. J. M., van der Sande, R., Beijer, L. J., Gerritsen, M. G., & Assendelft, W. J. (2019). eHealth Apps Replacing or Complementing Health Care Contacts: Scoping Review on Adverse Effects. Journal of medical Internet research, 21(3), e10736. Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L., Tirtea, R., & Schiffner, S. (2015). Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726. Zhang, D. (2018, October). Big data security and privacy protection. In 8th International Conference on Management and Computer Science (ICMCS 2018). Atlantis Press. Floridi, L. (2014). Open data, data protection, and group privacy. Philosophy & Technology, 27(1), 1-3....


Similar Free PDFs