Abbas et al., 2017 - Google Patents
The need for trustworthiness models in healthcare software solutionsAbbas et al., 2017
View PDF- Document ID
- 11337591404217561190
- Author
- Abbas R
- Carroll N
- Richardson I
- Beecham S
- Publication year
- Publication venue
- International Conference on Health Informatics
External Links
Snippet
Trustworthiness in software is of vital importance to technology users, especially in health, where lives may depend on the correct application of software that is fit for purpose. Despite the risk posed by improper use of technology in the health domain, there is evidence to …
- 230000036541 health 0 abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2247—Tree structured documents; Markup, e.g. Standard Generalized Markup Language [SGML], Document Type Definition [DTD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Poly et al. | Appropriateness of overridden alerts in computerized physician order entry: systematic review | |
| Simon et al. | Predicting suicide attempts and suicide deaths following outpatient visits using electronic health records | |
| Coravos et al. | Modernizing and designing evaluation frameworks for connected sensor technologies in medicine | |
| Gerke et al. | Ethical and legal issues of ingestible electronic sensors | |
| Naseralallah et al. | An umbrella review of systematic reviews on contributory factors to medication errors in health-care settings | |
| Churi et al. | Perception of privacy issues and awareness in health-care knowledge management systems: empirical study in Indian health-care context | |
| Scott et al. | Evaluation considerations for secondary uses of clinical data: principles for an evidence-based approach to policy and implementation of secondary analysis | |
| Larsen et al. | Understanding the scope of downtime threats: A scoping review of downtime-focused literature and news media | |
| Alqenae et al. | Analysis of the nature and contributory factors of medication safety incidents following hospital discharge using National Reporting and Learning System (NRLS) data from England and Wales: a multi-method study | |
| Li et al. | Medication nonadherence and risk of violence to others among patients with schizophrenia in Western China | |
| Abbas et al. | The need for trustworthiness models in healthcare software solutions | |
| Greenbaum | Making compassionate use more useful: using real-world data, real-world evidence and digital twins to supplement or supplant randomized controlled trials | |
| Sockolow et al. | The time is now: Informatics research opportunities in home health care | |
| Taegtmeyer et al. | Electronic prescribing increases uptake of clinical pharmacologists' recommendations in the hospital setting | |
| Raddatz et al. | Giving to get well: Patients’ willingness to manage and share health information on AI-driven platforms | |
| Balendran et al. | Algorithmovigilance, lessons from pharmacovigilance | |
| Alkaeed et al. | Open foundation models in healthcare: Challenges, paradoxes, and opportunities with genai driven personalized prescription | |
| Wasserman et al. | Frequency and preventability of adverse drug events in the outpatient setting | |
| Tolentino et al. | A cross‐sectional study on social determinants of mental health during COVID‐19 among adults in California | |
| Bowden et al. | Emergency department and urgent care clinician perspectives on digital access to past medical histories | |
| Greenall et al. | Failure mode and effects analysis: A tool for identifying risk in community pharmacies | |
| Koul et al. | Healthcare cyber risk and its impact on healthcare | |
| Jain et al. | Privacy and Security Concerns in Healthcare Big Data: An Innovative Prescriptive. | |
| Kasunuran-Cruz et al. | Sustainability and impact of the implementation of a frailty checklist for the acute medical unit: experience from a tertiary public hospital in Singapore | |
| Rosen et al. | Smart agent system for insulin infusion protocol management: a simulation-based human factors evaluation study |