[go: up one dir, main page]

Abbas et al., 2017 - Google Patents

The need for trustworthiness models in healthcare software solutions

Abbas et al., 2017

View PDF
Document ID
11337591404217561190
Author
Abbas R
Carroll N
Richardson I
Beecham S
Publication year
Publication venue
International Conference on Health Informatics

External Links

Snippet

Trustworthiness in software is of vital importance to technology users, especially in health, where lives may depend on the correct application of software that is fit for purpose. Despite the risk posed by improper use of technology in the health domain, there is evidence to …
Continue reading at www.scitepress.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2247Tree structured documents; Markup, e.g. Standard Generalized Markup Language [SGML], Document Type Definition [DTD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/24Editing, e.g. insert/delete

Similar Documents

Publication Publication Date Title
Poly et al. Appropriateness of overridden alerts in computerized physician order entry: systematic review
Simon et al. Predicting suicide attempts and suicide deaths following outpatient visits using electronic health records
Coravos et al. Modernizing and designing evaluation frameworks for connected sensor technologies in medicine
Gerke et al. Ethical and legal issues of ingestible electronic sensors
Naseralallah et al. An umbrella review of systematic reviews on contributory factors to medication errors in health-care settings
Churi et al. Perception of privacy issues and awareness in health-care knowledge management systems: empirical study in Indian health-care context
Scott et al. Evaluation considerations for secondary uses of clinical data: principles for an evidence-based approach to policy and implementation of secondary analysis
Larsen et al. Understanding the scope of downtime threats: A scoping review of downtime-focused literature and news media
Alqenae et al. Analysis of the nature and contributory factors of medication safety incidents following hospital discharge using National Reporting and Learning System (NRLS) data from England and Wales: a multi-method study
Li et al. Medication nonadherence and risk of violence to others among patients with schizophrenia in Western China
Abbas et al. The need for trustworthiness models in healthcare software solutions
Greenbaum Making compassionate use more useful: using real-world data, real-world evidence and digital twins to supplement or supplant randomized controlled trials
Sockolow et al. The time is now: Informatics research opportunities in home health care
Taegtmeyer et al. Electronic prescribing increases uptake of clinical pharmacologists' recommendations in the hospital setting
Raddatz et al. Giving to get well: Patients’ willingness to manage and share health information on AI-driven platforms
Balendran et al. Algorithmovigilance, lessons from pharmacovigilance
Alkaeed et al. Open foundation models in healthcare: Challenges, paradoxes, and opportunities with genai driven personalized prescription
Wasserman et al. Frequency and preventability of adverse drug events in the outpatient setting
Tolentino et al. A cross‐sectional study on social determinants of mental health during COVID‐19 among adults in California
Bowden et al. Emergency department and urgent care clinician perspectives on digital access to past medical histories
Greenall et al. Failure mode and effects analysis: A tool for identifying risk in community pharmacies
Koul et al. Healthcare cyber risk and its impact on healthcare
Jain et al. Privacy and Security Concerns in Healthcare Big Data: An Innovative Prescriptive.
Kasunuran-Cruz et al. Sustainability and impact of the implementation of a frailty checklist for the acute medical unit: experience from a tertiary public hospital in Singapore
Rosen et al. Smart agent system for insulin infusion protocol management: a simulation-based human factors evaluation study