Table 4.
Health data management systems in the literature vs the requirements.
| System | Medical record data | Real-time data | Patient participation | Sharing | Security | Privacy | Public insights | |||||||
|
|
|
|
Data access | Data input | Degree 1 | Degree 2 | Degree 3 |
|
|
|
||||
| Paper-based | Allows recording of medical data for eventual use | Encounters high delays | Does not allow patients to track the use of their medical data | Does not allow patients to provide their health conditions |
Supports data sharing only within the same hospital | Allows data sharing with the patient, patient’s friends, and family |
Does not allow data sharing with the patient, patient’s friends, and family | Does not provide methods against cybersecurity attacks | Does not provide methods for preserving a patient’s privacy | Does not support prediction | ||||
| Computer-based | Allows recording of medical data for eventual use | Encounters high delays | Does not allow patients to track the use of their medical data | Does not allow patients to provide their health conditions |
Supports data sharing only within the same hospital | Allows data sharing with the patient, patient’s friends, and family | Allows data sharing with other medical organizations and government | Does not provide methods against cybersecurity attacks | Does not provide methods for preserving a patient’s privacy | Does not support prediction | ||||
| Client-server–based | Allows recording of medical data for eventual use | Allows data retrieval in real time | Allows patients to access and monitor their medical data | Does not allow patients to provide their health conditions |
Supports data sharing only within the same hospital | Allows data sharing with the patient, patient’s friends, and family | Allows data sharing with other medical organizations and government | Does not provide methods against cybersecurity attacks | Does not provide methods for preserving a patient’s privacy | Does not support prediction | ||||
| Cloud-based | Allows recording of medical data for eventual use | Allows data retrieval in real time | Allows patients to access and monitor their medical data | Does not allow patients to provide their health conditions |
Supports data sharing only within the same hospital | Allows data sharing with the patient, patient’s friends, and family | Allows data sharing with other medical organizations and government | Does not provide methods against cybersecurity attacks | Does not reveal a patient’s identity | Does not support prediction | ||||
| IoTa-based | Allows recording of medical data for eventual use | Allows data retrieval in real time | Allows patients to access and monitor their medical data | Allows patients to provide health conditions | Supports data sharing only within the same hospital | Allows data sharing with the patient, patient’s friends, and family | Allows data sharing with other medical organizations and government | Does not provide methods against cybersecurity attacks | Does not provide methods for preserving a patient’s privacy | Provides methods for the prediction of health conditions | ||||
| Big data analytics | Allows recording of medical data for eventual use | Allows data retrieval in real time | Allows patients to access and monitor their medical data | Allows patients to provide health conditions | Supports data sharing only within the same hospital | Allows data sharing with the patient, patient’s friends, and family | Allows data sharing with other medical organizations and government | Does not provide methods against cybersecurity attacks | Does not reveal a patient’s identity | Provides methods for the prediction of health conditions | ||||
| Blockchain-based | Allows recording of medical data for eventual use | Allows data retrieval in real time | Allows patients to access and monitor their medical data | Allows patients to provide health conditions | Supports data sharing only within the same hospital | Allows data sharing with the patient, patient’s friends, and family | Allows data sharing with other medical organizations and government | Ensures the protection of medical data against cybersecurity attacks | Does not reveal a patient’s identity | Provides methods for the prediction of health conditions | ||||
aIoT: Internet of Things.