Requirements of Information Security in a Telemedicine Network: Review of IT Managers' Opinion

Document Type : Original Article

Authors

1 M.Sc. in Medical Records Education, School of Health Management and Information Sciences, Iran University of Medical Sciences, Tehran,Iran

2 Assistant Professor in Medical Informatics, School of Health Management and Information Sciences, Iran University of Medical Sciences, Tehran, Iran

3 Lecturer in Biostatistics, Department of Statistics, School of Health, Iran University of Medical Sciences, Tehran, Iran

4 Ph.D Student of Health Information Management, Tehran University of Medical Science, Tehran, Iran

Abstract

Purpose:
The requirements of information security in a telemedicine network can be categorized in four areas, namely; data storage and data accessibility, data transfer, human resources, and equipment for medical diagnosis. The purpose of this study was to determine the importance of each of the above areas from the perspective of information technology (IT) managers in teaching hospitals affiliated to Tehran and Shahid Beheshti Universities of Medical Sciences, and the experts in the field who worked in the Ministry of Health.
Methods:
This was a survey study conducted in 2013. The participants of the study included 41 information technology (IT) managers in teaching hospitals and seven experts who worked in the Ministry of Health. Data were collected using a five-point Likert scale questionnaire and were analyzed using descriptive statistics. The content and face validity of the questionnaire were confirmed by the experts in the field. The reliability of the questionnaire was calculated using Cronbach’s coefficient alpha (0/75=α).
Results:
The results of the present study showed that among the requirements of information security in a telemedicine network, human resources were of high importance (mean = 87.50). The requirements related to the medical diagnostic equipment and those related to data storage and data accessibility were in the second (mean=87.04) and the third place (mean=85.97) of importance respectively. The requirements of information security in the area of data transfer were in the fourth place of importance.
Conclusion:
Considering the degree of importance that human resources gained compared to the importance of other requirements of information security in a telemedicine network, it seems that employing experts in the field of information security and training health care professionals in the application of telemedicine technology, may facilitate efficient deployment of this technology in the healthcare settings.

Keywords


1.Mehraeen E, Ayatollahi H, Ahmadi M. A study on information security in hospital information systems. Journal of Health Information Management 2014; 10(6): 788.
2. Mehraeen E, Ahmadi M, Shajarat M, Khoshgam M. Assessment of hospital information system in selected hospitals in tehran. Payavard Salamat 2013; 6(6):458-466.
3. Zain JM. Threats and challenges in securing telemedicine system. Int J Med Inform 2006; 15(2): 1-7.
4. Hein MA. Telemedicine: an important force in the transformation of healthcare. Int J Med Inform 2009; 9(2): 1-26.
5. Zhang GH, Poon CY, Li Y, Zhang YT. A biometric method to secure telemedicine systems.  In:Proceedings of annual international conference of the IEEE EMBS Minneapolis; Minnesota USA; 2009: 2-6.
6. Wozak F, Schabetsberger T, Ammmenwerth E. End-to-end security in telemedical networks – A practical guideline. Int J Med Inform 2007; 76(1): 484-90.
7. Telemedicine Global. [Online]. [Accessed 2012 Sep 18]. Available from: http: // teledoctornet. lamula.pe/2009/11/03/telemedicine-in-healthcare-2-the-legal-and-ethical-aspects-of-using-new technology /unmedicoaventurero 2010.
8. Guillen E, Estupiñan P, Lemus C, Ramirez L. Analysis of security requirements in telemedicine networks. In:Proceedings of annual international conference of telecommunications engineering, Colombia: 2010.
9. Jack C, Mars M. Telemedicine a need for ethical and legal guidelines in South Africa. SA Fam Pract 2008; 50(2): 60-60d.
10. Broadband & Telemedicine. [Online]. 2011 [Accessed 2013 July 22]. Available from: http://www.nyls.edu/user_files/1/3/4/30/83/Broadband%20%20Telemedicine%20%20Policy%20Reccs.pdf.
11. Telemedicine, Telehealth, and Health Information Technology. [Online]. 2006 [Accessed 2013 July 20]. Available from:  http://www.americantelemed.org/docs/default-source/policy/telemedicine-telehealth-and-health-information-technology.pdf?sfvrsn=8.
12. Asadi H, Akhlaghi H. Ethical and legal aspects of telemedicine and telecare tehran. In: proceedings of 1st international conference on information and knowledge technology, Iran, Tehran 2002.
13. Healthcare information and management systems society (HIMSS). Information systems security.[Online]. 2011 [Accessed 2011 Apr 14].Available from:http://www.himss.org/content/files/applicationsecurityv2.3.pdf.
14. HIPAA related information security concerns in health care, HIPAA in health care: Information security in a health care environment.  [Online].2010 [Accessed 2011 Apr 14].Available from:http://www.infosecwriters.com/text_resources/pdf/InfoSec_In_ Health_Care_DJames.pdf.
15. Garg V, Brewer J. Telemedicine Security: A Systematic Review. J Diabetes Sci Technol 2011; 5(3): 768-77.
16. Rezgui Y,  Marks A. Informatio  security awareness in higher education: An exploratory study. Com  and Sec 2008;27(7-8): 243.
17. Rialle V, Lamy JB, Noury N, Bajolle L. Telemonitoring of patients at home: a software agent approach. Com Meth & Prog Biomed 2003;72(1): 257-68.
18. Olanrewaju RF, Ali NB, Khalifa O, Manaf AA. ICT in Telemedicine: conquering privacy and security issues in health care services. electronic Journal of Computer Science and Information Technology (eJCSIT) 2013; 4(1): 19-24.
19. Harnett H. Telemedicine systems and telecommunications. J Telemed and Telecare 2006; 12: 1-12.
20. Das S, Mukhopadhyay A. Security and Privacy Challenges in Telemedicine. CSI Communications. [Online] .2011. [Accessed 2012 Nov 04]. Available from:http://www.definitions.net/definition/access+to+information.
21. Pendergrass JC, Heart K, Ranganathan C,Venkatakrishnan VN. A threat table based approach to telemedicine security. In: Transactions of the International Conference on Health Information Technology Advancement; 2013: Paper 38.
22. Garg V. Security concerns in telecare and telemedicine, [M.Sc. Dissertation]. Purdue University, Graduate School. 2009; 14-20.