Skip to main content
Proceedings of the AMIA Symposium logoLink to Proceedings of the AMIA Symposium
. 1998:245–249.

Methodology for security development of an electronic prescription system.

J Niinimäki 1, M Savolainen 1, J J Forsström 1
PMCID: PMC2232178  PMID: 9929219

Abstract

Data security is an essential requirement in all health care applications. Developers of medical information systems should utilize the existing security development and evaluation methods to foresee as many of the technical and human factors that may endanger data security as possible and apply appropriate precautions. Modern smart card technology facilitates the building of robust security framework for interorganizational shared care systems. In this article, we describe the way we utilized the existing security evaluation criteria in developing the security concept of our electronic prescription system.

Full text

PDF
245

Images in this article

Selected References

These references are in PubMed. This may not be the complete list of references from this article.

  1. Baur H. J., Engelmann U., Saurbier F., Schröter A., Baur U., Meinzer H. P. How to deal with security issues in teleradiology. Comput Methods Programs Biomed. 1997 May;53(1):1–8. doi: 10.1016/s0169-2607(96)01798-1. [DOI] [PubMed] [Google Scholar]
  2. Bleumer G. Security for decentralized health information systems. Int J Biomed Comput. 1994 Feb;35 (Suppl):139–145. [PubMed] [Google Scholar]
  3. Gostin L. O., Turek-Brezina J., Powers M., Kozloff R., Faden R., Steinauer D. D. Privacy and security of personal information in a new health care system. JAMA. 1993 Nov 24;270(20):2487–2493. [PubMed] [Google Scholar]
  4. Halamka J. D., Szolovits P., Rind D., Safran C. A WWW implementation of national recommendations for protecting electronic health information. J Am Med Inform Assoc. 1997 Nov-Dec;4(6):458–464. doi: 10.1136/jamia.1997.0040458. [DOI] [PMC free article] [PubMed] [Google Scholar]
  5. Hayam A. Security Audit Center--a suggested model for effective audit strategies in health care informatics. Int J Biomed Comput. 1994 Feb;35 (Suppl):115–127. [PubMed] [Google Scholar]
  6. Neame R. Smart cards--the key to trustworthy health information systems. BMJ. 1997 Feb 22;314(7080):573–577. doi: 10.1136/bmj.314.7080.573. [DOI] [PMC free article] [PubMed] [Google Scholar]
  7. Niinimäki J., Forsström J. Approaches for certification of electronic prescription software. Int J Med Inform. 1997 Dec;47(3):175–182. doi: 10.1016/s1386-5056(97)00101-9. [DOI] [PubMed] [Google Scholar]
  8. Tervo-Pellikka R. The principles of data protection concerning patient related data in Finland. Int J Biomed Comput. 1994 Feb;35 (Suppl):39–50. [PubMed] [Google Scholar]

Articles from Proceedings of the AMIA Symposium are provided here courtesy of American Medical Informatics Association

RESOURCES