Team for Research in
Ubiquitous Secure Technology

Security and Privacy Issues with Health Care Information Technology
Marci Meingast, Tanya Roosta, Shankar Sastry

Citation
Marci Meingast, Tanya Roosta, Shankar Sastry. "Security and Privacy Issues with Health Care Information Technology". IEEE International Conference of the, August, 2006.

Abstract
The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic Patient Records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

Electronic downloads


Internal. This publication has been marked by the author for TRUST-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Marci Meingast, Tanya Roosta, Shankar Sastry. <a
    href="http://www.truststc.org/pubs/233.html"
    >Security and Privacy Issues with Health Care Information
    Technology</a>, IEEE International Conference of the,
    August, 2006.
  • Plain text
    Marci Meingast, Tanya Roosta, Shankar Sastry. "Security
    and Privacy Issues with Health Care Information
    Technology". IEEE International Conference of the,
    August, 2006.
  • BibTeX
    @inproceedings{MeingastRoostaSastry06_SecurityPrivacyIssuesWithHealthCareInformationTechnology,
        author = {Marci Meingast and Tanya Roosta and Shankar Sastry},
        title = {Security and Privacy Issues with Health Care
                  Information Technology},
        booktitle = {IEEE International Conference of the},
        month = {August},
        year = {2006},
        abstract = {The face of health care is changing as new
                  technologies are being incorporated into the
                  existing infrastructure. Electronic Patient
                  Records and sensor networks for in-home patient
                  monitoring are at the current forefront of new
                  technologies. Paper-based patient records are
                  being put in electronic format enabling patients
                  to access their records via the Internet. Remote
                  patient monitoring is becoming more feasible as
                  specialized sensors can be placed inside homes.
                  The combination of these technologies will improve
                  the quality of health care by making it more
                  personalized and reducing costs and medical
                  errors. While there are benefits to technologies,
                  associated privacy and security issues need to be
                  analyzed to make these systems socially
                  acceptable. In this paper we explore the privacy
                  and security implications of these next-generation
                  health care technologies. We describe existing
                  methods for handling issues as well as discussing
                  which issues need further consideration.},
        URL = {http://www.truststc.org/pubs/233.html}
    }
    

Posted by Tanya Roosta on 22 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.