Point-of-care arrangements are extensively secondhand in healthcare to react quickly and halt critical fitness issues. As a result, POC systems repeatedly process large amounts of individual health information. Therefore, their cybersecurity and solitude requirements are important, while evaluating those necessities is an important task. In this work, we aim at crafty and reporting the execution of a use case approach to judge cybersecurity and privacy necessities and specifications of POC schemes. Accordingly, we detail a use case approach as part of a absolute healthcare IT infrastructure that includes a Health Information System, unification engines, use servers, web aids, medical ploys, smartphone apps, medical modalities (all dossier simulated) and interplay with parties. Overall, following the use case approach, the results obtained indicate that all the working KPI, non-functional KPI and Societal & Roadmap acquired a positive judgment. Furthermore, the usability occurrence from the participants was positive and the use case writing and the validation gradual plan were highly agreeable with the various daily experience of the partners.
Author(s) Details:
Marc Jofre,
Department
of Research and Innovation. Fundació Privada Hospital Asil de Granollers,
Granollers – 08402, Barcelona, Spain.
Diana
Navarro-Llobet,
Department
of Research and Innovation. Fundació Privada Hospital Asil de Granollers,
Granollers – 08402, Barcelona, Spain.
Ramon Agulló,
Digital Strategy Direction, Fundació Privada Hospital Asil de
Granollers, Granollers – 08402, Barcelona, Spain.
Jordi Puig,
Digital Strategy Direction, Fundació Privada Hospital Asil de
Granollers, Granollers – 08402, Barcelona, Spain.
Gustavo
Gonzalez-Granadillo,
Atos
Research and Innovation, Cybersecurity Laboratory, Spain.
Juan
Mora Zamorano,
Instituto
de Investigation Sanitaria Puerta de Hierro, Servicio Madrileño de Salud,
Spain.
Ramon Romeu,
Digital Strategy Direction, Fundació Privada Hospital Asil de
Granollers, Granollers – 08402, Barcelona, Spain.
Please see the link here: https://stm.bookpi.org/COSTR-V10/article/view/8903
No comments:
Post a Comment