A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals
Abstract
Backgrounds: Electronic Medical Records have complete and integrated patient health data, and are up to date because RME combines clinical and genomic data, this poses a great risk to data disclosure The priority of privacy is data security (security) so that data will not leak to other parties. That way cyber attacks can be suppressed by increasing cybersecurity, namely conducting regular evaluation and testing of security levels.
Objectives: To determine the security technique that maintains privacy of electronic medical records.
Methods: This type of research uses a literature review method
Results: Data security techniques are determined from each type of health service. Data security techniques that can be applied are cryptographic methods, firewalls, access control, and other security techniques. This method has proven to be a very promising and successful technique for safeguarding the privacy and security of RME
Conclusion: Patient medical records or medical records are very private and sensitive because they store all data about complaints, diagnoses, disease histories, actions, and treatments about patients, so the information contained therein must be kept confidential. As well as the hospital as a medical record manager is required to apply for patient privacy data security techniques.
References
Sittig, D., Gonzales, D., and Singh, H. Contingency planning for electronic health record-based care continuity: a survey of recommended practices. International Journal of Medical Informatics. 07 August 2014. Volumes. 83, p. 797–804.
Saif, S., Wani, S., and Khan SA Network engineering solution for data sharing across healthcare providers and protecting patients' health data privacy using EHR system. Journal of Global Research in Computer Science. 08 August 2011. Volumes. 2.
Shabo, A. The implications of electronic health records for personalized medicine. Personalized Medicine. 12 August 2005. Volumes. 2, p. 251-258.
Brothers, KB and Rothstein, MA Ethical, legal and social implications of incorporating personalized medicine into healthcare, Personalized Medicine. 01 November 2015. Volumes. 12, p. 43–51.
Budiyanti, RT, Arso, SP, and Herlambang, PM Cloud-Based Electronic Medical Record. Mirror of the World of Medicine Edition 268. 2018. Volume. 45.
Al-shaher, MA Protect Healthcare System Based on Intelligent Techniques. Proceedings of 2017 4th International Conference on CoDIT. 5-7 April 2017. p. 0421–0426.
Amer, K. Informatics: Ethical Use of Genomic Information and Electronic Medical Records. OJIN. 08 May 2015. Volumes. 20
Chaturvedi, A., Mishra, D., and Mukhopadhyay, S. An enhanced dynamic ID-based authentication scheme for telecare medical information systems, J. King Saud Univ. Comput. inf. Sci., January 2017. Volume. 29, p. 54–62.
Huang, LC, Chu, HC, Lien, CY, Hsiao, CH, and Kao, T. Embedding a hiding function in a portable electronic health record for privacy preservation. J. Med. syst. June 2010. Volumes. 34, p. 313–320.
Jannetti, MC In Focus: Safeguarding patient information in electronic health records, AORN J. 2014. Volume. 100, p. C7–C8.
Carvalho, M. and Paiva PB Health Information System (HIS) Role-Based Access Control Current Security Trends and Challenges. J. Healthc. eng. February 2018. Volumes. 2018, pp. 1–8.
Senese, SV A Study of Access Control for Electronic Health Records. Open Portal to University Scholarships. 2015.
Nuryati and Widayanti, NA Evaluation of the Implementation of the Electronic Health Record (HER) System at the Gadjah Mada University Academic Hospital based on the PIECES Analysis Method. 2014.
Rusli R. Digital Signature for Electronic Medical Records in the Medical World in Indonesia. 2010.
Setiawan, EP, Bhawiyuga, A. and Siregar, RA Development of a Hospital Medical Record System with a Permissioned Blockchain-based Multi User Rest Server using the Hyperledger Framework. JPTIIK. 7 February 2020. Volumes. 4, p. 01–10.
Kruse, CS, Smith, B., Vanderlinden, H., and Nealand, A. Security Techniques for the Electronic Health Records. J. Med. syst. August
Articles received and published by the Media Ilmu Kesehatan are by the publication, the copyright of the article is fully transferred to the Media Ilmu Kesehatan. All operational forms such as printing, publication, and distribution of hard file journals are carried out by the Media Ilmu Kesehatan. Articles that have finished the review process and have been declared accepted by the journal manager or editor will be asked to fill out a statement of submission of copyright by the journal secretary to the main author or correspondent author. The statement of transfer of copyright is signed with a seal and sent via email to journalmik2018@gmail.com and contacted the admin of the journal to be followed up on archiving. Journal managers and editors have the right to edit the manuscript according to the provisions of the writing rules in the Media Ilmu Kesehatan.
Articles that have been declared accepted either online through the author's account on the OJS website https://ejournal.unjaya.ac.id/index.php/mik or a letter of receipt of the article (LOA), as well as those that have been published on OJS are not allowed to be published in other journals, or proceedings. The number of authors with more than one and as the main author or designated as the correspondent writer must have coordinated with members of the research team. The order of the authors submitted in the article as the author of one, two, three and so on cannot be changed when the article is published unless an error occurs in the technical operation of the journal.