E-Health Systems in Digital Environments

被引:0
|
作者
Hummelholm, Aarne [1 ]
机构
[1] Univ Jyvaskyla, Fac Informat Technol, Jyvaskyla, Finland
关键词
healthcare systems; vulnerabilities; cyber threat; cyber-attacks; telemedicine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manufacturer has their own technical solutions and they only work in certain environments. There is a great need for unified concepts and for IT platform solutions in healthcare systems. The technology currently in use is very varied. Standards are developing now days, but they are not yet ready. In addition, the lack of technical and functional requirements for telemedical communications systems and equipment, as well as the requirements for providing secure data transmission in remote medical care. In the news we can see and hear often that there are a lot of medical devices that have damaged the patient's health around the world. And then there are a lot of vulnerabilities and that means security risks, cyber risks and the risks of reliability of data. These risks are associated with loT devices and sensors, and in the field of data transfer. This document describes telemedicine solutions for the future of society. Includes a brief introduction of hospital equipment in a hospital environment and a patient's home. The main overall is the communication arrangements, consisting of the bio-signal formation of the patient's sensor and the flow of bio-signals to the hospital information systems for analysis and monitoring. This study examines cyber threats and attacks against e-health systems and what that means for patients' health. This study also examines the authenticity, traceability, authentication and protection of privacy.
引用
收藏
页码:641 / 649
页数:9
相关论文
共 50 条
  • [41] Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach
    Aranha, Helder
    Masi, Massimiliano
    Pavleska, Tanja
    Sellitto, Giovanni Paolo
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [42] Intelligent Environments and e-Health Assistance for Aging Citizens, the AmIE Project
    Iturburu, Miren
    De Segura, Nuria Gomez
    Lozano, Sara
    Ruiz, Ricardo
    Martinez, Alberto
    Acinas, Victor
    De Las Heras, Ricardo
    [J]. AMBIENT INTELLIGENCE PERSPECTIVES II, 2009, 5 : 113 - 119
  • [43] Special Issue on Privacy and Security on Pervasive e-Health and Assistive Environments
    Pantziou, Grammati
    Makedon, Fillia
    Belsis, Petros
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1227 - 1229
  • [44] Authentication and Access Control in e-Health Systems in the Cloud
    Kahani, Nafiseh
    Elgazzar, Khalid
    Cordy, James R.
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 13 - 23
  • [45] Design implications of e-Health systems for a sustainable growth
    Roa L.M.
    Reina-Tosina J.
    [J]. Health and Technology, 2016, 6 (1) : 7 - 9
  • [46] Automated and user involved data synchronization in collaborative e-health environments
    Hossain, M. Shamim
    Masud, Mehedi
    Muhammad, Ghulam
    Rawashdeh, Majdi
    Hassan, Mohammad Mehedi
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2014, 30 : 485 - 490
  • [47] Low level communication management for e-health systems
    Riva, Guillermo
    Zerbini, Carlos
    Voos, Javier
    Centeno, Carlos
    Gonzalez, Eduardo
    [J]. 8TH ARGENTINEAN BIOENGINEERING SOCIETY CONFERENCE (SABI 2011) AND 7TH CLINICAL ENGINEERING MEETING, 2011, 332
  • [48] A GDPR controller for IoT systems: Application to e-health
    Rhahla, Mouna
    Abdellatif, Takoua
    Attia, Rabah
    Berrayana, Wassel
    [J]. 2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, : 170 - 173
  • [49] Why is it difficult to achieve e-health systems at scale?
    Williams, Robin
    [J]. INFORMATION COMMUNICATION & SOCIETY, 2016, 19 (04) : 540 - 550
  • [50] Privacy-preserving access to e-health systems
    Lax, Gianluca
    [J]. 11TH ACM INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS (PETRA 2018), 2018, : 120 - 121