IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY
|
|
- Rolf Butler
- 8 years ago
- Views:
Transcription
1 IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY JOTHI PRAKASH A/L MURUGAN DISSERTATION SUBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF COMPUTER SCIENCE FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY UNIVERSITY MALAYA KUALA LUMPUR July 2009
2 ABSTRACT Patients medical histories are documented within their medical records and these records must accompany them over the course of their lifetimes. Until recently, the majority of medical records were handwritten or printed on paper and kept in a paper folder. Healthcare institutions are now moving away from traditional paper-based records to electronic versions; patients entire medical histories are recreated in a digital format as the healthcare field incorporates more technology into its daily practices. Although many healthcare institutions have adopted electronic medical record (EMR) systems, the goals of comprehensive, continuous and patient-centered care have not occurred due to lack of mechanisms that provide practitioners timely and efficient access to the patient's complete health history. Thus, to be able to retrieve patient s health record timely and efficiently, smartcard technology was adopted into EMR systems. Although substantial benefits were expected from smartcard-based EMR systems to solve those primary issues, privacy and confidentiality of EMRs are obviously at risk if the implementations of such EMR systems are not made secured. This research effort addresses two major areas. Firstly is to analyze and scrutinize the implementation of EMR-based systems in healthcare sector. The second area is to attempt to manage EMRs in a secure smartcard platform. Crucial factors affecting a smartcard-based EMR, such as security, privacy and implementation methodology is presented in detail in the first part of this research. Subsequently a four-level security authentication model has been introduced in an attempt to secure the EMR smartcard which complies with international standards for smartcard. The software methodology used in this research area is Unified Modeling Language (UML), an object oriented modeling technique. The significant contribution of this study is to present an implementation model for a secure smartcard-based EMR system. A patient-centered EMR smartcard interface prototype is developed to prove its integration viability. Testing results from the prototype demonstrates that the idea of using smartcard technology to secure EMR is viable. Further enhancement to safeguard the EMR on smartcard has been presented in the research which would greatly benefits the healthcare industry in general and the patients in particular. ii
3 ACKNOWLEDGEMENTS I wish to express my heartiest gratitude to all the people who have helped me in completing this dissertation especially to my supervisor Dr. Rosli bin Salleh, for his encouragement, patience and invaluable guidance throughout the process of writing this dissertation. Special thanks to Ms. Devi and Mr. Mathura for proof reading my dissertation and their helpful comments and moral support that they gave. I m also greatly thankful to my friends and colleagues, who have given me ideas and constant inspiration for the continuation and completion of this dissertation. Last but not least, I dedicate this dissertation to all my family members who have always been there to support me in all my endeavors, especially my mother and demised father who had sacrificed their lifetime for my success. iii
4 TABLE OF CONTENTS Abstract Acknowledgement Table of Contents List of Figures List of Tables ii iii iv vi viii Chapter 1: Introduction 1.1 Background And Motivation Advancement of Medical Informatics in Malaysia Changes in Medical Record Keeping Trend The Electronic Medical Record The Emergence of Smartcards in Healthcare Problem Statement Objectives Scope and Limitations Research Methodology Expected Research Outcome Organization Of Dissertation 19 Chapter 2: Literature Review 2.1 Introduction Definition and Terminologies An Analysis On Medical Record Terminologies Capabilities of EMR EMR Adoption Model Healthcare in Malaysia Security, Privacy and Confidentiality of EMR Case Study On Security Breaches in EMR Systems Technical Review of Smartcard Technology Smartcards in Healthcare An Analysis Of Previous Healthcare Smartcard Implementations Current Researches in EMR Smartcard Summary of Related Literature 65 Chapter 3: Research Methodology 3.1 Key Methodological Approaches Identify The Modeling Technique for EMR Smartcard Software Development Methodology Requirement Capturing and Modeling Requirement Analysis Analysis and Design A Systematic Test Procedure 104 iv
5 Chapter 4: Development & Testing 4.1 Introduction System Overview Objective Of The Software Software And Hardware Technology Consideration System Architecture Graphical User Interface Implementation Using The Tool Test Results And Discussion System Limitation Summary 144 Chapter 5: Discussion And Conclusion 5.1 Introduction Research Outcomes and Discussion Challenges Limitation Future Enhancements Summary 153 APPENDIX A The Smartcard Protocols: ISO/IEC 7816-PART4 155 APPENDIX B EMRSmartcard Source Code 183 REFERENCES 227 v
6 LIST OF FIGURES Figure 1.1 The Four Components of Malaysian Telehealth Application 3 Figure 1.2 Research Methodology 17 Figure 2.1 Popularity of Terminologies used in Medical Software 24 Figure 2.2 Sources of EMR 27 Figure 2.3 EMR Adoption Model 36 Figure 2.4 The different types of insider threats to information 45 Figure 2.5 Level of vulnerability exploitation 47 Figure 2.6 Level of vulnerability severity 48 Figure 2.7 Vulnerability duration 48 Figure 2.8 Level of protection against vulnerability 52 Figure 3.1 Methodology Approaches of this research 69 Figure 3.2 File Base Modeling Sample for Smartcard 71 Figure 3.3 A 3DES Encryption/Decryption Procedure 80 Figure 3.4 Memory Mapping of EMR Smartcard 83 Figure 3.5 Unified Process disciplines and phases 87 Figure 3.6 Abstract Use Cases 94 Figure 3.7 Use Case Diagram for Secure medical record clinic management system Figure 3.8 Use Case Diagram for Smartcard 97 Figure 3.9 Use Case Realization for Add Patient Record Use Case 99 Figure 3.10 Collaboration diagram for Add Patient Record Use Case 99 Figure 3.11 Write Medical Record Use Case realization 100 Figure 3.12 Write Medical Record Collaboration Diagram 100 Figure 3.13 Read Medical Record Use Case realization 101 Figure 3.14 Read Medical Record Collaboration Diagram 101 Figure 3.15 Add Patient Record sequence diagram 102 Figure 3.16 Layered security model 106 Figure 4.1 Architecture Diagram 115 Figure Level Security Implementation Architecture 117 Figure 4.3 Protecting Access to EMR using smartcard 118 Fugue 4.4 Protecting Access to Smartcard vi
7 Figure 4.5 Protecting Health Records on a Smartcard 120 Figure 4.6 Basic Frame for the GUI of EMRSmartcard 122 Figure 4.7 File Creation with Secure Messaging 124 Figure 4.8 Key Creation with Secure Messaging 124 Figure 4.9 User Login to EMRSmartcard Application 128 Figure 4.10 Select Patient Registration submenu from Main Menu 129 Figure 4.11 Enter New Patient Details 130 Figure 4.12 Completed Patient Registration Form 131 Figure 4.13 EMRSmartcard Read/Write Interface 132 Figure 4.14 Search Patient Record Using EMRSmartcard 133 Figure 4.15 Implementation of Transmission Level Security 143 Figure 4.16 Implementation of Card Level Security 143 vii
8 LIST OF TABLES Table 1.1 Research Outcome Summary 18 Table 2.1 EMR and EHR Comparison 32 Table 2.2 Different Smartcard Implementation and Description 61 Table 2.3 Implementation of Smartcard and its benefits 62 Table 3.1 File Organization for EMRSmartcard 82 Table 3.2 Activities and Deliverables for phases in USDP 88 Table 3.3 Abstract Healthcare Domain Use Case 94 Table 3.4 Use Case Description 95 Table 3.5 Security Services Security Mechanisms Test Plan 107 Table 3.6 Compliance Test Plan 108 Table 3.7 Performance Test Plan #1 110 Table 3.8 Performance Test Plan #2 110 Table 3.9 Performance Test Plan #3 111 Table 3.10 Performance Test Plan #4 112 Table 3.11 Performance Test Plan #5 112 Table 4.1 Initial Requirements and Respective Interface Modules 121 Table 4.2 List of Administration and Security Command Set 125 Table 4.3 List of Response Code 127 Table 4.4 Security Services Security Mechanisms Test Result 134 Table 4.5 Compliance Test Result 136 Table 4.6 Performance Test Result #1 137 Table 4.7 Performance Test Result #2 138 Table 4.8 Performance Test Result #3 139 Table 4.9 Performance Test Result #4 139 Table 4.10 Performance Test Result #5 140 viii
9 ix
Chapter 5: Discussion & Conclusion
Chapter 5: Discussion & Conclusion 5.1 INTRODUCTION The outcome of this research is analyzed to check if it meets the objectives outlined in chapter one. In chapter one, for each objective, a set of research
More informationThe performance of an E-commerce application relies on various aspects. Apart from the
ABSTRACT The performance of an E-commerce application relies on various aspects. Apart from the quality of the E-commerce application itself, the factors which determine the performance of an E-commerce
More informationChapter 1: Introduction
Chapter 1: Introduction 1.1 BACKGROUND AND MOTIVATION The infusion of Information Technology (IT) has triggered rapid changes in the healthcare sector in various ways. IT infusion is the degree to which
More informationINTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING A report submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Science (Computer Systems & Networking)
More informationUniversiti Teknologi MARA. Requirement Analysis Using UML Approach for Research Management System (RMS)
C^tJ O19OO(^'J.Tfi^'i- Universiti Teknologi MARA Requirement Analysis Using UML Approach for Research Management System (RMS) Enamul Hasan Bin Rusly Thesis submitted in fulfillment of the requirements
More informationLaboratory Information Management and Process Control Software for Microbiological Laboratories of the Government Hospitals
Laboratory Information Management and Process Control Software for Microbiological Laboratories of the Government Hospitals Hewapathirana R H MSc IT 06/10000 Faculty of Information Technology University
More informationUTILISING SPATIAL TECHNOLOGY FOR HOSPITAL BED MANAGEMENT
UNIVERSITY OF SOUTHERN QUEENSLAND Faculty of Engineering and Surveying UTILISING SPATIAL TECHNOLOGY FOR HOSPITAL BED MANAGEMENT A dissertation submitted by Angela G. Nicholls B. of Social Science (Geography)
More informationFactors Influencing the Adoption of Biometric Authentication in Mobile Government Security
Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security Thamer Omar Alhussain Bachelor of Computing, Master of ICT School of Information and Communication Technology
More informationDISTRIBUTED ARCHITECTURE FOR ELECTRONIC HEALTH REFERRAL SYSTEM UTILIZING COMPUTATIONAL INTELLIGENCE FOR CLINICAL DECISION SUPPORT
DISTRIBUTED ARCHITECTURE FOR ELECTRONIC HEALTH REFERRAL SYSTEM UTILIZING COMPUTATIONAL INTELLIGENCE FOR CLINICAL DECISION SUPPORT By Majd Misbah Al-Zghoul Supervisor Dr. Majid Al-Taee, Prof. This Thesis
More informationTABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES ii iii x xiv CHAPTER 1: INTRODUCTION 1 1.0 Background 1 1.1 Research Motivation 4 1.2 Research Objectives 5 1.3 Project Scope 6
More informationElectronic Student Academic System (E-SAS) For Secondary School
Electronic Student Academic System (E-SAS) For Secondary School 211 Electronic Student Academic System (E-SAS) For Secondary School Abstract Nowadays computers are used to manage daily works. School management
More informationSchneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
More informationC015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
More informationHealth Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules. The Curriculum.
Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules Introduction: The Curriculum The outline below frames the 14 modules of this curriculum within their
More informationSecure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
More informationSUCCESSION PLANNING AND MANAGEMENT PRACTICES AMONG PRIVATE SECTOR FIRMS IN MALAYSIA KRISHNA NAIDU S/O D. SUPPIAH
SUCCESSION PLANNING AND MANAGEMENT PRACTICES AMONG PRIVATE SECTOR FIRMS IN MALAYSIA KRISHNA NAIDU S/O D. SUPPIAH GRADUATE SCHOOL OF BUSINESS FACULTY OF BUSINESS AND ACCOUNTANCY UNIVERSITY OF MALAYA JUNE
More informationT141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationShould you have any questions, please feel free to contact Velante directly as they are leading EMR delivery on our behalf.
January 17, 2013 Re: New Brunswick EMR Program - Velante For several years, the New Brunswick Medical Society has been advocating an EMR Program so I am extremely happy that it is finally here. Thank you
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
More informationRFP for Documentation and Development of Governance Process for Services Oriented Architecture
RFP for Documentation and Development of Governance Process for Services Oriented Architecture Section I RFP Process Introduction The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in
More informationSCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION)
SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION) ELECTRONIC MEDICAL RECORD INFORMATION EXCHANGE PROTOCOL (AHS AND
More informationFahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan
WWW.JOURNALOFCOMPUTING.ORG 85 New Quantitative Study for Dissertations Repository System Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan Abstract In the age of technology,
More informationUse Cases for Argonaut Project. Version 1.1
Page 1 Use Cases for Argonaut Project Version 1.1 July 31, 2015 Page 2 Revision History Date Version Number Summary of Changes 7/31/15 V 1.1 Modifications to use case 5, responsive to needs for clarification
More informationVICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
More informationTHE CASE FOR VALUE MANAGEMENT TO BE INCLUDED IN EVERY CONSTRUCTION PROJECT DESIGN PROCESS
THESIS KAKITANGAN THE CASE FOR VALUE MANAGEMENT TO BE INCLUDED IN EVERY CONSTRUCTION PROJECT DESIGN PROCESS By FOTOSTAT TIDAK DIBEMARKAN AINIJAAPAR This dissertation is submitted in partial fulfillment
More information1. Introduction to ehealth:
1. Introduction to ehealth: E-Health is one of the fastest growing areas within the health sector. The scope of e- Health involves application of the knowledge, skills and tools, which enable information
More informationOverview of ehr Development. Slide - 1
Overview of ehr Development Slide - 1 Where are we today? Hospital Authority 8 million patient records 800 million laboratory results 340 million prescribed drugs 34 million Xray images 33 million transactions
More informationSCHEDULE "C" ELECTRONIC MEDICAL RECORD INFORMATION EXCHANGE PROTOCOL
SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING AMONG ALBERTA HEALTH SERVICES, PARTICIPATING OTHER CUSTODIAN(S) AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION) ELECTRONIC MEDICAL RECORD INFORMATION
More informationC033 Certification Report
C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: mycc@cybersecurity.my
More informationMaster of Science in Cyber Security and Management
Master of Science in Cyber Security and Management Introduction Realizing the importance of protecting her critical national information infrastructure, Malaysia has introduced the National Cyber Security
More informationTABLE OF CONTENT CHAPTER TITLE PAGE TITLE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK
TABLE OF CONTENT CHAPTER TITLE PAGE TITLE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK TABLE OF CONTENT LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS LIST OF APPENDICES i ii iii iv v
More informationUSE OF INFORMATION SOURCES AMONGST POSTGRADUATE STUDENTS IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING A CITATION ANALYSIS YIP SUMIN
USE OF INFORMATION SOURCES AMONGST POSTGRADUATE STUDENTS IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING A CITATION ANALYSIS YIP SUMIN A dissertation submitted in partial fulfillment of requirements for the
More informationAuburn Montgomery. Registration and Security Policy for AUM Servers
Auburn Montgomery Title: Responsible Office: Registration and Security Policy for AUM Servers Information Technology Services I. PURPOSE To outline the steps required to register and maintain departmental
More informationComprehensive Network Security Approach: Security Breaches at Retail company- A Case Study
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 107 Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study Mehdi Jahanirad,
More informationApplying Information Lifecycle Management Strategies Enables Healthcare Providers to Accelerate Clinical Workflow
An EMC Healthcare Perspective Applying Information Lifecycle Management Strategies Enables Healthcare Providers to Accelerate Clinical Workflow By Roberta A. Katz Healthcare Information Technology Challenges........2
More informationLDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
More informationUNIVERSITI PUTRA MALAYSIA THE USAGE OF OBJECT ORIENTED APPROACH IN SOFTWARE DEVELOPMENT COMPANIES ANNE VIKNESW ARY FSKTM 2003 15
UNIVERSITI PUTRA MALAYSIA THE USAGE OF OBJECT ORIENTED APPROACH IN SOFTWARE DEVELOPMENT COMPANIES ANNE VIKNESW ARY FSKTM 2003 15 THE USAGE OF OBJECT ORIENTED APPROACH IN SOFTWARE DEVELOPMENT COMPANIES
More informationABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
More informationUNIVERSITY OF MANITOBA PROCEDURE
UNIVERSITY OF MANITOBA PROCEDURE Procedure: Parent Policy: Effective Date: June 23, 2015 Revised Date: Review Date: June 23, 2025 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
More informatione-consent design and implementation issues for health information managers
e-consent design and implementation issues for health information managers Heather Grain Abstract This article outlines and discusses a number of e-consent issues concerning an individual s access to information
More informationLIABILITY FOR CLOUD COMPUTING UNDER COPYRIGHT LAW
LIABILITY FOR CLOUD COMPUTING UNDER COPYRIGHT LAW BY MR. SORAWAT WONGKAWEEPAIROT A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF LAWS IN BUSINESS LAWS (ENGLISH
More informationRecent Researches in Electrical Engineering
The importance of introducing Information Security Management Systems for Service Providers Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis**** * Faculty of Electrical Engineering
More informationWhite Paper. Document Security and Compliance. April 2013. Enterprise Challenges and Opportunities. Comments or Questions?
White Paper April 2013 Document Security and Compliance Enterprise Challenges and Opportunities Comments or Questions? Table of Contents Introduction... 3 Prevalence of Document-Related Security Breaches...
More informationA system is a set of integrated components interacting with each other to serve a common purpose.
SYSTEM DEVELOPMENT AND THE WATERFALL MODEL What is a System? (Ch. 18) A system is a set of integrated components interacting with each other to serve a common purpose. A computer-based system is a system
More informationThe Unified Software Development Process
The Unified Software Development Process Technieche Universal Darmstadt FACHBEREICH IN-FORMAHK BLIOTHEK Ivar Jacobson Grady Booch James Rumbaugh Rational Software Corporation tnventar-nsr.: Sachgebiete:
More information5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
More informationACKNOWLEDGMENT. I would like to thank Allah for giving me the patience to work hard and overcome all the
ACKNOWLEDGMENT I would like to thank Allah for giving me the patience to work hard and overcome all the research obstacles. My full gratitude is to Dr. Mohammed Al-Jarrah and Dr. Izzat Alsmadi for their
More informationA STUDY ON SOTWARE PRODUCT DEVELOPMENT APPROACHES IN THE SRI LANKAN SOFTWARE INDUSTRY
u b / s o ^ /?2 /o~j A STUDY ON SOTWARE PRODUCT DEVELOPMENT APPROACHES IN THE SRI LANKAN SOFTWARE INDUSTRY By V.Manoharan LIBRARY HWIVERSITY OF R/iORATuWA, SRI LANKA MORATUWA The Dissertation was submitted
More informationOpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
More informationMore effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
More informationHIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
More informationINFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY Scope These program criteria apply to Information Technology, Computer Engineering Technology, and specialities therein, such as computer programming, computer systems analysis,
More informationStudent Guide to Neehr Perfect Go!
Student Guide to Neehr Perfect Go! I. Introduction... 1 II. Quick Facts... 1 III. Creating your Account... 1 IV. Applying Your Subscription... 4 V. Logging in to Neehr Perfect... 6 VI. Activities... 6
More informationOther Required Courses (14-18 hours)
1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900
More informationHIT Workflow & Redesign Specialist: Curriculum Overview
HIT Workflow & Redesign Specialist: Curriculum Overview Component - Description Units - Description Appx. Time 1: Introduction to Health Care and Public Health in the U.S. Survey of how healthcare and
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationVoice Documentation in HIPAA Compliance
Voice Documentation in HIPAA Compliance An OAISYS White Paper Americas Headquarters OAISYS 7965 South Priest Drive, Suite 105 Tempe, AZ 85284 USA www.oaisys.com (480) 496-9040 CONTENTS 1 Introduction 2
More informationAppendix 2-A. Application and System Development Requirements
Appendix 2-A. Application and System Development Requirements Introduction AHRQ has set up a Distributed Systems Engineering Lab (DSEL) to support all internal development efforts and provide a facility
More informationPrivate vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
More informationENHANCED DEPOT LEVEL MAINTENANCE OF DEFENSE AEROSPACE ASSETS THROUGH SUPPLY CHAIN MANAGEMENT TRANSFORMATION
ENHANCED DEPOT LEVEL MAINTENANCE OF DEFENSE AEROSPACE ASSETS THROUGH SUPPLY CHAIN MANAGEMENT TRANSFORMATION By SAMIR CHABRA INDUSTRIAL TRIBOLOGY, MACHINE DYNAMICS AND MAINTENANCE ENGINEERING CENTRE (ITMMEC)
More informationName of pattern types 1 Process control patterns 2 Logic architectural patterns 3 Organizational patterns 4 Analytic patterns 5 Design patterns 6
The Researches on Unified Pattern of Information System Deng Zhonghua,Guo Liang,Xia Yanping School of Information Management, Wuhan University Wuhan, Hubei, China 430072 Abstract: This paper discusses
More information4.7 Website Privacy Policy
Policy Statement The is committed to ensuring that its departments, offices, agencies, boards, and commissions adhere to the privacy protection provisions of the Freedom of Information and Protection of
More informationVoIP Logic HIPAA/SSAE SOC II Compliance Overview for Service Providers
VoIP Logic HIPAA/SSAE SOC II Compliance Overview for Service Providers VoIP Logic and HIPAA/SOC-II The Health Insurance Portability and Accountability Act (HIPAA) regulations, Medicare Improvements for
More informationIF2261 Software Engineering. Introduction. What is software? What is software? What is software? Failure Curve. Software Applications Type
IF2261 Software Engineering Introduction Program Studi Teknik Informatika STEI ITB What is software? Definitions: Computer programs, procedures, and possibly associated documentation and data pertaining
More informationHow To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
More informationAssessing and Managing Security Risk in IT Systems: a Technology-independent Approach. John McCumber Software Assurance Forum October 15, 2008
Assessing and Managing Security Risk in IT Systems: a Technology-independent Approach John McCumber Software Assurance Forum October 15, 2008 IT Risk Assessment Find out the cause of this effect, Or rather
More informationDesign of a University Portal with Biometric Lecture Attendance Monitoring System
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):847-856 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationHEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES
HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES OCTOBER 2014 3300 North Fairfax Drive, Suite 308 Arlington, Virginia 22201 USA +1.571.481.9300 www.lunarline.com OUR CLIENTS INCLUDE Contents Healthcare
More informationWebsite Privacy & Security Policy
I. Our commitment to your privacy Website Privacy & Security Policy Your privacy is important to us, and we are committed to protecting it. We want you to understand how we use your information and that
More informationWhat is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
More informationBusiness Administration specializing in Marketing
Name Diploma Supervisor Title Regan a/l Rajan Business Administration specializing in Marketing Mr. Karuna The study of Public relations and customer satisfaction in the wireless telecommunication industry
More informationGuidance for Data Users on the Collection and Use of Personal Data through the Internet 1
Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations
More informationMaster of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
More informationB.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
More informationReview Your Thesis or Dissertation
Review Your Thesis or Dissertation This document shows the formatting requirements for UBC theses. Theses must follow these guidelines in order to be accepted at the Faculty of Graduate and Postdoctoral
More informationRecent Advances in Automatic Control, Information and Communications
Proposal of the improvement of actual ITIL version based on comparative IT Service Management methodologies and standards The implementation of IT Service Management frameworks and standards Anel Tanovic*,
More informationContents. Acknowledgments
Abstract Acknowledgments Acronyms iii v xiii 1 Introduction 1 1.1 Problems and Motivation 3 1.1.1 Competition by Web/Internet Application Service Providers 3 1.1.2 Web-Telecom Service and Application Convergence
More informationDr. Pat Mirenda. Software Design Specification Document
CPSC 319 Team 2 Dr. Pat Mirenda Software Design Specification Document Version: 1.2 Date: (03/17/2006) 2Communicate SDS Revisions Version Primary Author(s) Description of Version Date Completed 1.0 Wei
More informationThis Version Not For Distribution EMR/EHR
This Version Not For Distribution EMR/EHR Cheng B Saw, Ph.D. Chair, Asian-Oceanic Affairs of AAPM Director - Physics, Northeast Radiation Oncology Centers President, CBSaw Publishing, LLC Harrisburg, PA,
More informationNeehr Perfect Educational EHR STUDENT GUIDE
Neehr Perfect Educational EHR STUDENT GUIDE I. Introduction... 1 II. Quick Facts... 1 III. Creating Your Account... 2 IV. My Account Already Exists... 4 V. Applying Your Subscription... 5 VI. Logging in
More informationPersonal Data & Privacy Policy Statement
Personal Data & Privacy Policy Statement Your Privacy Hong Kong Broadband Network Limited ("we" or the "Company") respect the privacy rights of visitors to all our company websites (the Websites ) and
More informationon the transfer of personal data from the European Union
on the transfer of personal data from the European Union BCRsseptembre 2008.doc 1 TABLE OF CONTENTS I. PRELIMINARY REMARKS 3 II. DEFINITIONS 3 III. DELEGATED DATA PROTECTION MANAGER 4 IV. MICHELIN GROUP
More informationMAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0
MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:
More informationData Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
More informationCesario Di Sarno. Security Information and Event Management in Critical Infrastructures
Cesario Di Sarno Ph.D. Student in Information Engineering University of Naples «Parthenope» Security Information and Event Management in Critical Infrastructures Fai della Paganella 11 Febbraio 2014 Critical
More informationCOMPARISON OF PROBLEM BANK IDENTIFICATION, INTERVENTION AND RESOLUTION IN THE SEACEN COUNTRIES
COMPARISON OF PROBLEM BANK IDENTIFICATION, INTERVENTION AND RESOLUTION IN THE SEACEN COUNTRIES Sukarela Batunanggar (Project Leader) The South East Asian Central Banks (SEACEN) Research and Training Centre
More informationProgram Assessment Plan for Health Informatics, MS
Program Mission Program Assessment Plan for Health Informatics, MS The Master of Science in health Informatics will provide graduates with a firm understanding of an emerging discipline located at the
More informationMedical Informatics An Overview Saudi Board For Community Medicine
Medical Informatics An Overview Saudi Board For Community Medicine Ahmed AlBarrak PhD Medical Informatics Associate Professor of Health Informatics, Family & Community Med, Chairman, Medical Informatics,
More informationMS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
More informationComplete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
More informationCHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
More informationPOSITION DESCRIPTION #
POSITION DESCRIPTION # LEAD SCANNING SPECIALIST, GS-303-6 HEALTH INFORMATION MANAGEMENT SECTION/INFORMATION RESOURCE MANAGEMENT Position will serve as work leader in the Scanning Unit of the Health Information
More informationPolish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
More informationAUTOMATION OF HEALTH RECORD MANAGEMENT USING SOME SELECTED HOSPITALS IN SOUTH WESTERN NIGERIA AS CASE STUDY
AUTOMATION OF HEALTH RECORD MANAGEMENT USING SOME SELECTED HOSPITALS IN SOUTH WESTERN NIGERIA AS CASE STUDY Kola Ayanlowo 1, O. Shoewu 2, Segun O. Olatinwo 3 1 Department of Computer Science, Moshood Abiola
More informationVersion: January 2008 ASTM E-31: EHR and Informatics Standards Education For Health Professional Disciplines. Background
Version: January 2008 ASTM E-31: EHR and Informatics Standards Education For Health Professional Disciplines Background Work on standards for the EHR in the context of all such standards for the Health
More informationFACTORS THAT INFLUENCE JOB TURNOVER OF SOCIAL WORKERS IN THE DIRECTORATE OF DEVELOPMENTAL SOCIAL WELFARE SERVICES (DDSWS) IN NAMIBIA
FACTORS THAT INFLUENCE JOB TURNOVER OF SOCIAL WORKERS IN THE DIRECTORATE OF DEVELOPMENTAL SOCIAL WELFARE SERVICES (DDSWS) IN NAMIBIA BY CECILIA MATHE MABENGANO SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS
More informationThe Development of Mobile Device Management Framework on Android Platform for Devices Security and Applications
The Development of Mobile Device ment Framework on Android Platform for Devices Security and Applications Kurnia Anggriani kurnia.anggriani@students.itb.ac.id Rinaldi Munir rinaldi@informatika.org Yusep
More informationInstallation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
More information