A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals

  • Piping Asgiani Diponegoro University
  • Chriswardani Suryawati Diponegoro University
  • Farid Agushybana Diponegoro University
Keywords: Electronic Medical Record, Privacy, Security

Abstract

Backgrounds: Electronic Medical Records have complete and integrated patient health data, and are up to date because RME combines clinical and genomic data, this poses a great risk to data disclosure The priority of privacy is data security (security) so that data will not leak to other parties. That way cyber attacks can be suppressed by increasing cybersecurity, namely conducting regular evaluation and testing of security levels.
Objectives: To determine the security technique that maintains privacy of electronic medical records.
Methods: This type of research uses a literature review method
Results: Data security techniques are determined from each type of health service. Data security techniques that can be applied are cryptographic methods, firewalls, access control, and other security techniques. This method has proven to be a very promising and successful technique for safeguarding the privacy and security of RME
Conclusion: Patient medical records or medical records are very private and sensitive because they store all data about complaints, diagnoses, disease histories, actions, and treatments about patients, so the information contained therein must be kept confidential. As well as the hospital as a medical record manager is required to apply for patient privacy data security techniques.

Author Biographies

Piping Asgiani, Diponegoro University

Jl. Prof Soedarto, SH, Tembalang, Semarang, Central Java

Chriswardani Suryawati, Diponegoro University

Jl. Prof Soedarto, SH, Tembalang, Semarang, Central Java

Farid Agushybana, Diponegoro University

Jl. Prof Soedarto, SH, Tembalang, Semarang, Central Java

References

Sittig, D., Gonzales, D., and Singh, H. Contingency planning for electronic health record-based care continuity: a survey of recommended practices. International Journal of Medical Informatics. 07 August 2014. Volumes. 83, p. 797–804.

Saif, S., Wani, S., and Khan SA Network engineering solution for data sharing across healthcare providers and protecting patients' health data privacy using EHR system. Journal of Global Research in Computer Science. 08 August 2011. Volumes. 2.

Shabo, A. The implications of electronic health records for personalized medicine. Personalized Medicine. 12 August 2005. Volumes. 2, p. 251-258.

Brothers, KB and Rothstein, MA Ethical, legal and social implications of incorporating personalized medicine into healthcare, Personalized Medicine. 01 November 2015. Volumes. 12, p. 43–51.

Budiyanti, RT, Arso, SP, and Herlambang, PM Cloud-Based Electronic Medical Record. Mirror of the World of Medicine Edition 268. 2018. Volume. 45.

Al-shaher, MA Protect Healthcare System Based on Intelligent Techniques. Proceedings of 2017 4th International Conference on CoDIT. 5-7 April 2017. p. 0421–0426.

Amer, K. Informatics: Ethical Use of Genomic Information and Electronic Medical Records. OJIN. 08 May 2015. Volumes. 20

Chaturvedi, A., Mishra, D., and Mukhopadhyay, S. An enhanced dynamic ID-based authentication scheme for telecare medical information systems, J. King Saud Univ. Comput. inf. Sci., January 2017. Volume. 29, p. 54–62.

Huang, LC, Chu, HC, Lien, CY, Hsiao, CH, and Kao, T. Embedding a hiding function in a portable electronic health record for privacy preservation. J. Med. syst. June 2010. Volumes. 34, p. 313–320.

Jannetti, MC In Focus: Safeguarding patient information in electronic health records, AORN J. 2014. Volume. 100, p. C7–C8.

Carvalho, M. and Paiva PB Health Information System (HIS) Role-Based Access Control Current Security Trends and Challenges. J. Healthc. eng. February 2018. Volumes. 2018, pp. 1–8.

Senese, SV A Study of Access Control for Electronic Health Records. Open Portal to University Scholarships. 2015.

Nuryati and Widayanti, NA Evaluation of the Implementation of the Electronic Health Record (HER) System at the Gadjah Mada University Academic Hospital based on the PIECES Analysis Method. 2014.

Rusli R. Digital Signature for Electronic Medical Records in the Medical World in Indonesia. 2010.

Setiawan, EP, Bhawiyuga, A. and Siregar, RA Development of a Hospital Medical Record System with a Permissioned Blockchain-based Multi User Rest Server using the Hyperledger Framework. JPTIIK. 7 February 2020. Volumes. 4, p. 01–10.

Kruse, CS, Smith, B., Vanderlinden, H., and Nealand, A. Security Techniques for the Electronic Health Records. J. Med. syst. August

Published
2022-01-29
How to Cite
1.
Asgiani P, Suryawati C, Agushybana F. A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals. Media ilmu kesehatan [Internet]. 2022Jan.29 [cited 2024Nov.19];10(2):161-6. Available from: https://ejournal.unjaya.ac.id/index.php/mik/article/view/561