CHAPTER 1: INTRODUCTION Context of the Study …………………………………………………………5 Statement of the Study ………………………………………………………5 Specific Research Question …………………………………………………6 Significance of the Study ……………………………………………………7 Methodology………………………………………………………………….7
Organization of the Study…………………………………………………..
CHAPTER 2: LITERATURE REVIEW
Software Security in Health Setting ………………………………………....8
Pros and Cons of Security System …………………………………………...9
Security resolutions in Medical Institutions ……..………………………….11
Medical software is regarded as both a success and a risk factor for quality and efficiency of medical care. First, reasons are given in what respects the medical industry is special: it is highly complex and variable, exposed to risks of privacy confidentiality but also of denied access to authorized personnel, and medical users are a highly qualified and demanding population. Then the same software technology and engineering approaches are presented that partially master these challenges. They include various divide and conquer strategies, process and change management approaches that quality assurance approaches. There can be little question that software engineers today are expected not only to produce programs that are accessible and efficacious but also programs that will protect the privacy and security of ordinary citizens in an age of computer hacking and online surveillance. With this in mind this paper explores what computer programmers must do to protect the online identities of clients and businesses as well as to protect organizations more generally from fraud systems compromise and information extraction by hostile parties.
Delimitations
This proposal is limited to discussing the identified challenge facing the software engineering industry, relating to the medical privacy of individuals.
ABBREVIATIONS
AMA American Medical Association
CCR Continuity of Care Record
DRP Directed Research Project
FDA Food and Drug Administration
HHS Health and Human Services
HIPAA Health Insurance Portability and Accountability Act
IRBs Institutional Review Boards
MCOs Managed Care Organizations
MSIS Masters of Science Information Systems
NIH National Institutes of Health
PBMs Pharmacy Benefit Management
Dynamic Security for Medical Record Sharing
CHAPTER 1: INTRODUCTION
Context of the Study Medical information is used for a number of research purposes to advance biomedical science, understand health care utilization, evaluate and improve health care practices, and determine causes and patterns of disease. While such research is sometimes conducted without information tied to identifiable patient records, other research relies on personal identifiers to track treatment of an individual over time, link multiple sources of patient information, or verify such information. There can be little question that software engineers today are expected not only to produce programs that are accessible and efficacious but also programs that will protect the privacy and security of ordinary citizens in an age of computer hacking and online surveillance. With this in mind this paper explores what computer programmers must do to protect the online identities of clients and businesses as well as to protect organizations more generally from fraud systems compromise and information extraction by hostile parties.
Specific Research Question
As computing proceeded to evolve, programs had became more tough and tasks increased bigger, while programs had since been regularly particular, in writing, functioned, and ...