Full Name | Himanshu Shally | |
Student ID | 11720376 | |
Subject | ITC571 – Emerging Technology and Innovations | |
Assignment Item 3 | Annotated Bibliography | |
Due Date | 7th September 2021 | |
Ccourse Specialisation | Master of Information Technology in Software Design and Network Security (Dual Specification)
|
|
Title of Research | Importance of Network Security in Software Design for Healthcare Sector
|
TASK 1 – Annotated Bibliography 25%
Article 1
CITATION
|
Aqsa Fatima & Ricardo Colomo Palacios, 2018 |
SUMMARY
|
The legal acquiring of the data of a patient is the most significant oppressive hurdle in the sector of the Healthcare Information System. The author’s viewpoint is to examine the significant concerns that are required in information healthcare.
In this article it is discussed about the technology which secures the information and data of patients. By securing such confidential matters, the health care providers can maintain the privacy as well as reputation of their firm. Although there is an insurance institute which ensures this action such as HIPAA, but still there are two important keys which are responsible for protecting such significant data. However, there are a few threats to this all system but keeping the data in a closed cloud system, that can be accessed by only authorities with the given security keys can keep the data safe. As per the experts there are certain programs which can be threat to the online data of healthcare system such as ransomware, spyware, phishing, crypto mining and data theft and other malicious activities. Such programs can cause a serious damage to the whole system. Healthcare Information system is a way good way of keeping the secret data secure form such threats. In HIS, the experts have adopted several methods to maintain the safety such as encryption, firewall access and etc. Systematic mapping review to identify describe, recognize and examining the studies published basically can be a good way of strengthening the data security. However, so far there is no mapping review published on Healthcare Information System.
|
CRITIQUE
|
Security is the basic privacy of the patients so the priority of the health sector so it to secure data, so this is the strength of the Security of Health care information system.
I agree with all these relevant information due to the Security in the software design of the Healthcare sector.
|
Article 2
CITATION
|
Dr TVS Narayana & Naveen Naik, 2013 |
SUMMARY
|
The authors in this article have expressed their concern about the growing issue of information security and privacy in healthcare sector. With the increased trend of information exchange among the healthcare providers, patients and medical insurers have increased the threat on this secret data and have made it vulnerable to the scammers. Moreover, the authors have mentioned about the survey that has been conducted by them on the literature of survey of information and security published in various journals.
In this article, the main idea expressed is about improving healthcare quality and reducing the cost spent by the government of United States and citizens by Implementing the Healthcare Information System. Several proofs have pointed towards the breach of security of patient’s confidential data, hence as a consequence it leads the patients to economic threat, mental torture and likely social humiliation. This article includes the analysis of the present situation of data security and privacy study in healthcare that covers many research techniques, for instance quantitative research, qualitative research and design research. Taking the example of a major part of study that concentrates specifically on building of technological resolutions to make sure patients’ privacy when their data is taken by the concerning authorities, processed and shared. While, on the contrary side , there are numerous scientists that have analyzed the effect of health IT acceptance on care quality. Moreover, this article also displays a current scenario which shows flow of data in healthcare sector and the changing regulatory landscape. Not only this, such article also recognizes plenty of research domains that are used to distinguish and categorize the works. |
CRITIQUE
|
In this article the author has tried to show the way information passes from one end to the another in the healthcare sector. Moreover, the writer also has tried to display the way regulatory authorities’ landscape site is changing with the change in time, which I believe is a good point and considered the strength in this topic.
I think this article is going to be very helpful in my project as there are a lot of points and numerous information has been mentioned regarding the design research and information security and privacy.
|
Article 3
CITATION
|
Puvaneswaran Amirthan, 2019 |
SUMMARY
|
The author viewpoint is saying about the level of network security in the software designs in newly advancement gadgets and the wireless communication industry. It is talking about the MAR Technology which is also known as Mobile Augmented Reality and MEC which is known as Multi access Edge computing in health care sector. The author said it help for treatment, display information, X-RAY and scanned images. The purpose of this Thesis is to secure the applications in health care sector with Internet and Applications security protocols.
The understanding of this thesis’s are the main focusing on the network security of the applications in the health care sector which have the real data of the patients for their treatment and for displaying information. From the large time of researches on this project the writer is saying about the network Security in the two main parts of the industry which is well known and useful in this industry. The MEC (Multi access Edge computing) and MAR (Mobile Augmented Reality) Technology are the most essential needs for the security. The author works on some parts to clarify the necessary parts for network security. In this Thesis, the background is discussed with the research problems and worked on methodologies. The architecture of this project is analysis the MEC based MAR planning. The formal verifications on the network design is in registered and authentication phases for the registered admin, users and Professionals like doctors and workers. The new generations of the communication devices are also known by Mobile Argumented reality system likewise easily used based devices for example Tabs, installed systems and Smartphones which are planned to use with the purpose of these applications in MAR system.
|
CRITIQUE
|
The articles reveal about the information about the security of the devices which are used in the health care sector there are advantage on this research to secure the next generation devices which are using 5th generation in the devices and working with the advanced technologies. The more secured application is the beneficial for this industry which are securing the data of the patients and the network which is designed for improvement.
The article is useful for some extent which is the network security in the devices which are used with advance technology for the admin, users and the professionals. It can be helpful for my Assessment to discuss about the network security of the gadgets in health care sector.
|
Article 4
CITATION
|
Dinesh Kumar Saini, 2015 |
SUMMARY
|
The article concerns about the increasing expenditure of countries in their healthcare sector. Hence the author has proposed a software design framework for the healthcare services, which will function with the help of another technologies in order to enhance the independency of the healthcare department from manual as well as it will increase the automation and compatible for the patients and service providers. Name of the technique suggested by the software design framework is Multi agent systems.
The main ideas expressed in this article are about decreasing the load of expenses from governing bodies, simultaneously increasing the efficiency of the healthcare sector so as to speed up the progress of providing the services and facility to the patients and gaining the profit with more margin. Multi Agent system has emerged as a successful real time actor that can provide a real time experience to the doctors for treating the patients. Although, the treatment will be done remotely. In a clinical follow up, Multi-Agent Systems can recognize the role-based communication system. Moreover, one can describe the design and application of MAS in such a way that it must aid to describe the management of course of clinical follow up. However, in order to improve the communication system among patients, nurses and doctors, it has to be taken care and should be monitored by the authorities by making the appointments simpler. As per a patient’s requirements and primary requisition a reminder can be used for several purposes such as for the time of taking the dose of medicines, for the time of doing exercises and lots of other stuff, for instance staying away of the bad habits such as avoiding junk food, avoiding any kind of smoking or drugs.
|
CRITIQUE
|
In this article, it is clear that the Multi Agent system can be very beneficial for the governing bodies as well as all the citizens of a nation. However, while implementation of this system, all the departments of healthcare sector will have to work as a team and keep up the good coordination.
I think this article will help me in my project, it is because this article is all about software design framework and Multi Agent System.
|
Article 5
CITATION
|
Pranjal Pandey & Upendra kumar, 2019 |
SUMMARY
|
The author has created an impact of digitalize many processes of every day. The process of the multiple connection between the computing devices and the Radio frequency identification system with internet usability with the access of some items like sensors and objects. Those objects connected to send and receive the network data and can be attacked by many different ways. The author gives the solution of cryptographic for all using devices of Internet of things in health care sector.
The Security concerns in the Internet of things due to the attracts on the health care network in these days. The data is working as interconnected for the information likewise sending and receiving data between the devices using internet Services. The computer devices, wireless devices and radio frequency identification system are allowing for the access of the network connection and share data with each other’s. Some of the networks are easy to access because of lack of Security system so that devices connection are attacking frequently and can damage the devices with the Network attacks. For saving the data and devices in health care sector, there are valuable algorithms like symmetric, asymmetric algorithm for the solutions saving them from attacks in the use of Internet of things. Besides this, there are many other challenges in this network like security, privacy, bandwidth and scalability in various IOT Security issues. In this article it also discussed about the architecture for the Security and the cryptographic solutions to tackle this dilemma in health care sector.
|
CRITIQUE
|
In this article the author is trying to give solution for the network which is related to internet of things services in the health care sector. The most useful thing in this article is the cryptographic solution and architecture for Security.
This article is not much useful for my blog and helpful for my assessment due to the main discussion of the IOT security and business sectors.
|
Article 6
CITATION
|
Shouki A. Ebad, 2021 |
SUMMARY
|
In this article the author have expressed the views about failure of Electronic health record used by the health care providers and the consequences of its failures with the point of view of the service providers as well as the public. Moreover, the author has discussed about the factors that influence the failure of Electronic Health Record in both qualitative and quantitate manner.
I believe this article mentions about the Electronic Health Record and its functions. With the changing world, the health care providers are altering their method of keeping the record from manual to the digital by using various platforms and types. Digital records are considered to be the safest and most secure way of having the data stored. As per an agency, out of the total cloud data storage, one third comprises of health data record globally. Whereas talking about each nation, the percentage of such record varies from one country to the another. Some countries comprise of almost half of the record with health data, on the other hand there are some nations which consist almost three fourth parts of the total record with the health data. Talking about the EHR, many of the states and countries have not adopted this system and there are few which have adopted but failed due to certain reasons. This article also talks about the reasons of failure in implementation of EHR due to several factors. The author suspects that governing authorities fear of implementing Electronic Health Record, Although the benefits of introducing this idea in the Healthcare sector can cause a boom to this industry. Moreover, the author has mentioned about the lack of interest of scientists towards the research in this issue in developing countries because of political imbalance and financial issues. |
CRITIQUE
|
Implementing EHR can prove to be advantageous as it saves a lot of money, energy as well as Human resource. Moreover it connects the doctors, patients and the Health care providers very easily and conveniently. Limitations in implementing EHR are different with every place.
I agree with information given in this article and believe this article can be very helpful for me in my project.
|
Article 7
CITATION
|
Vera Kartseva & Joris Hulstijn, 2010 |
SUMMARY
|
The author view point saying about the network of the project which is maintained, control and measure by inter organization as per needs to identify network. According to the author it research shows the requirements for understanding the control on the problems and design for the solutions relating viewpoint. The meaningful control pattern is the solving method for such problems and shows to the legal and control the working of the machinery’s.
The control patterns is elaborate about the information system in the health care sector. The growth includes many different aspects like stakeholders, government agencies, administrators, health care professionals, workers and patients. In the organizations of this network there are many other problems growing with the time and with some kinds of misunderstandings in the structure of control and governances. They are just focusing on some Requirements in the technology for tackling misunderstandings. Due to some political process, there are regular changes for development and that is not clear in health care sector. The author in this book is also discussing about the solution to analysis for development with a generic method. There are some control patterns which are existing in subsequent sections with a structure in health care network which may develop.
|
CRITIQUE
|
The all of the design is based on the network to maintain and control the system in health care sector. The useful thing of this article is to organize, manage and design to control the present pattern in health care sector.
This article is opposite to my assessment due the out of topic as per my blog Assessment. It is totally different with the network Security in software. This research is based on the health care network discussion of maintenance and controls.
|
Article 8
CITATION
|
Neelu Lalband & D. Kavitha, 2019 |
SUMMARY
|
This article examines the software engineering used in medical sector and health care field in various ways in the form of numerous applications and virtual programs. Moving further the author mentions about the development of software engineering and its programs in the past years and has increased the efficiency of various sorts of industries in many ways. The writer argues about the need of skills required to develop the health care applications in the best customized way. In case of any errors in application can cause a huge level of flaws. As a consequence, the healthcare providers will have to a huge amount of loss.
The authors research focuses on Software Development Life Cycle which is a group of fundamental processes that are considered while a software engineer designs, develops and tests the newly made software programs. Moreover, the generally used SDLC models consist of numerous strategies which are known as very significant methodologies. Most of such methodologies are Rapid application development, agile, waterfall spiral and etc. Furthermore, there is a universal truth that the expenses and costs on healthcare sector can be reduced significantly by making the services and facilities in this department smart and automatic, still there are lots issues that are not measurable but the still the technology relies on this. So, in such situation there is a very crucial and significant social and technical viewpoint that points to the use of techniques by an end user. Moreover, if one wants the technology to get success in healthcare sector, they must understand and build smart opportunities in this sector and also must have knowledge of users’ decisions or in simpler words one must have knowledge of impression of users’ minds about the use of technology in healthcare facilities. In case, there is an absence of the social technical skills, it can resist the growth of technologies severely. Moving further, the usage of technology by the users such as doctors, patients and nurses may vary with the span of time as per the change in the devices, technology and etc.
|
CRITIQUE
|
The pros in this article are the use of new technology which is Software Development Life Cycle. This program can turn around the dependency of users on the technology in healthcare sector.
I agree with the author’s notion and consider this article is relevant to my thesis topic because it is about Software Development life cycle.
|
Article 9
CITATION
|
USHA BATRA & SAURABH MUKHERJEE, 2011 |
SUMMARY
|
The author describes about the need of building a medical infrastructure that is approachable as well as affordable to the most of the people. In order to do that the author has introduced in this paper the idea of software design patterns for Service Oriented Architecture. The author has mentioned about targeting the general digital atmosphere for inter and intra applications. Which further targets to display system need motivated approach in order to develop an Enterprise Application Integration (EAI) key which utilizes the Service Oriented Architecture and Message Oriented Middleware (MOM) values.
The main ideas expressed in this article are about discussing the various design requirements for improving the healthcare system. The goal is to combine the healthcare institutions with its commercial associates in such a way that all of them must interoperate with each other in a diverse atmosphere in the system in a unified pattern. Message Oriented Middleware is an important aiding expertise for assisting meet interoperability needs and keep the beaver systems away. The design idea of Service Oriented Architecture for effective enterprise program combining aids the interoperability and permits ‘on –the- fly’ data interchange between various systems in a slackly combined atmosphere which trails the general rules. It has been noticed that now a days the interest in spreading the distribution of successful service-oriented architecture for combination of venture wide programs in the Indian healthcare systems is growing very rapidly. Moreover there are numerous perspectives to the design of Enterprise Application Integration that has been put forward by the researchers. It is mentioned in the article that an information system is constructed basically by using the equation of point-to-point message between the programs.
|
CRITIQUE
|
It can really be very beneficial to implement the idea of Enterprise Application Integration (EAI) in order to improve the health care system in India.
I agree to the writers notion and think that this article can be of great use in my project as it gives me a lot of information about software design to improve the medical infrastructure. |
Article 10
CITATION
|
Rajashekar Kailar, 2007 |
SUMMARY
|
The author gives the information about the network to control security system according to the needs of security control as per the architecture of national wide health care Information network they share some insecure data network on internet. To secure network between the nodes with using patterns in health care network with trust model and data flow. Without implementing new technologies they try to set some security controls. The framework adding mechanism technology sets with network security and environmental controls for accepting threads.
The Security of architects in health care sector is spreads its wings in EHR which is also known as Electronic health records. It helps to become better to the quality of accurate health information of the patient care in clinics. Moreover, the healthcare information network is designs to find out the needs of regular security controls and efforts of implementing the network. The author also discussed about the security goals with the purpose of health care network privacy rules and connections. The network data flows in a exchanging scenario which shares the data by the data supplies with data consumers. The author revels the information of the data Communications system which is depends on request with response and data provides with one way system. It is clearly mentioned the Requirements of network Security with trust models, inter domain data flows, threat analysis, network security controls and requirements.
|
CRITIQUE
|
The information in this task is equal important to the network chain of the security system to provide the information and receiving the information as a form of accurate data between the Communications of suppliers and consumers.
This article is little bit helpful for the network security in software design in health care system. When the information needs more security between the communication of sender and receivers this article will be helpful for some extents. |
Article 11
CITATION
|
Dr. Nurhizam Safie, 2013
|
SUMMARY
|
The author have discussed Information technology which is increasing day by day in every sector, here in the health care world the services, structures gives the improvement in its quality. Information security gives the new level of advantage for the patients information which is stored in the health care database. The Information security book shows all the information security system in health care sector.
In this book there are all aspects of the security system which are taking care of the information which is stored in all the systems of the health care system. The author gives the information with very deep knowledge and research based data with de-Identification, pseudonymization, re-identification technique for privacy. The success key for this advancement in hospital management system they secure the data from stolen and losing data from various methods. In this book there is also mention about the real incident of 2011, when data was lost due to some lack of privacy and the process of recovery data of Microsoft SDL and frameworks. The author also discuss about the role of security and access based models with GNU software and university logo. The patient record is recorded as a EMR which is known as Electronic medical record in the documentation and functional model of hospital information system.
|
CRITIQUE
|
The data of this book gives the more useful information for my assessment which help to reveal various phases of the security system in Information technology in health care sector. It is the basic and necessary information shown in this book by the author.
The information is useful and relevant for my project. Reading and Writing this article, I learnt many new points and cover some useful topics for the security of health care world. The implementation of the new Technology and usability demonstrate the improvement and performance of the health care sector. |
Article 12
CITATION
|
Sabiha Khanum & Maria de Lourdes de Souza, 2016 |
SUMMARY
|
In this article, author describes about the uses of networking by the medical staff such as nurses, doctors and medicine suppliers. Networking gives easy access to the unlimited chances to the health care providers along with the patients to coordinate and team up with each other in order to increase the efficiency of the whole system and get the best out of it as well as enhance the health quality of their citizens. If the authorities want to improve the medical sector and healthcare facilities, they must improve in the networking, information and technology system, as this system has vast potential for this task. Moreover, the author also targets in this article to research about the part of tools of networking in modification and succeeding the nursing practices.
In this article, author’s research focuses on networking and its uses in the nursing sector. As per the article, networking is the interchange of data and the services between the people, masses and the institutes. It describes interactions and communication activities between individuals, groups, communities and organizations functioning in various types of settings and situations. Information and knowledge is a very precious reserve and has developed as the main requirement for accomplishment in all the sectors of lifecycle. Societies, administrations, and firms require to know exactly what data and acquaintance will give them a benefit in the case of competition. Later they will require to maintain this skill to utilize it, distribute it and modify it across the association. Data and knowledge are required to be managed, used, distributed and changed like an important valuable property. Gathering information and transforming it into useful knowledge a lot of efforts of coordination, networking and concentration on the community of exercise.
|
CRITIQUE
|
This article has a lot of valuable information about networking as the author have mentioned the way in the nursing and medical field networking can boost the efficiency.
This article has good points but is not of a good use as per the context of my project. This article is based on the networking security for the facilites for nursing practise in health care sector.
|
References:
- Aqsa Fatima & Ricardo Colomo Palacios. (2018). Procedia Computer Science : Security aspects in healthcare information systems. 138, 12-19. https://www.sciencedirect.com/science/article/pii/S187705091831634X
- Dr TVS Narayana & Naveen Naik & E. Venkataiah. (2013). International Refereed Journal of Engineering and Science: Information Security in Healthcare Sector, V 2 (12), 14-130. http://www.irjes.com/Papers/vol2-issue12/CSE2%20-%20124-130.pdf
- Puvaneswaran Amirthan. (2019). University of Oulu’s Master Thesis: Network security for augmented reality application in health care sector. 6. http://jultika.oulu.fi/files/nbnfioulu-201908152766.pdf
- Dinesh Kumar Saini. (2015). Article in International Journal of Computer Applications: Software Design Framework for Healthcare Systems. 116 (4). https://www.researchgate.net/publication/275328861_Software_Design_Framework_for_Healthcare_Systems
- Pranjal Pandey & Upendra kumar. (2019). Springer Link: Security Issues of Internet of Things in Health-Care Sector. 307-329. https://link.springer.com/chapter/10.1007/978-981-15-1100-4_15
- Shouki A. Ebad. (2021). Healthcare software design and implementation: A project failure case. https://www.researchgate.net/publication/339477506_Healthcare_software_design_and_implementation-A_project_failure_case
- Vera Kartseva, Joris Hulstijn. (2010). Springer Link: Control patterns in a health-care network, 19, https://link.springer.com/article/10.1057/ejis.2010.13
- Neelu Lalband & D. Kavitha. (2019). International Journal of Innovative Technology and Exploring Engineering: Software Engineering for Smart Healthcare Applications, 8 (64), https://www.ijitee.org/wp-content/uploads/papers/v8i6s4/F10660486S419.pdf
- USHA BATRA & SAURABH MUKHERJEE. (2011). Recent researches in applied computer and applied computational science: Software design patterns for message driven service oriented integration of stovepipe applications in healthcare enterprise, 211-216, http://www.wseas.us/e-library/conferences/2011/Venice/ACACOS/ACACOS-36.pdf
- Rajashekar Kailar. (2007). AMIA Annu Symp Proceedings Archive: A Security Architecture for Health Information Networks. 379-383. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2655907/
- Dr. Nurhizam Safie. (2013). Health IT Security: Information Technology Security in Healthcare, 70-90, https://www.researchgate.net/publication/288839534_Information_Technology_Security_in_Healthcare
- Sabiha Khanum & Maria de Lourdes de Souza & Najma Naz. (2016). The Use of Networking in Nursing Practice: An Integrative Review. 12-14. https://www.mdpi.com/2075-4698/6/3/22