题名

電子病歷之真確性保護機制

并列篇名

Protecting Information Integrity for Electronic Patient Record

DOI

10.6382/JIM.200610.0011

作者

黃景彰(Jing-Jang Hwang);周淑羚(Shu-Ling Chou);葉怡鎮(Yi-Jen Yeh);蔡榮隆(Ron-Lon Tsai)

关键词

複合式文件 ; 電子病歷 ; 資訊真確性 ; 真確性檢查碼 ; Compound document ; Electronic patient record ; Information integrity ; Integrity checking code

期刊名称

資訊管理學報

卷期/出版年月

13卷4期(2006 / 10 / 01)

页次

53 - 71

内容语文

繁體中文

中文摘要

在本文中,我們以傳統病歷具有的循序記錄、檢驗記錄逐件加入的特性為基礎,以系統流程的角度思考,設計適用於電子病歷的漸增式複合式文件架構,並依此架構發展出真確性保護機制。本文提出的真確性保護機制是以新增單元文件為常態,只須對新增的單元文件計算檢查碼,並用以更新文件整體的檢查碼,原有眾多單元文件的檢查碼不需要重新計算,因而能有效率地更新複合式電子病歷的檢查碼,以進行真確性的維護與查驗。利用本研究所提出之複合式電子病歷架構與真確性保護方法,除了能保護電子病歷文件的真確性外,同時也能確保病歷中關於診斷流程先後順序的真確性,可以避免病歷資料遭到未經授權的變更,進而達到提升醫療品質的目的。

英文摘要

We present a compound-document model for structuring the electronic patient records, based on the current practices of collecting the paper-form patient records in a hospital. We further devise a method for protecting information integrity to utilize the structural feature of the compound-document model. Through the the proposed compound-document model and integrity protection method, medical institutions can maintain document with integrity inspections more efficiently and thereby enhance the quality of medical care.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. 黃景彰(2001)。資訊安全-電子商務之基礎。台北:華泰文化事業股份有限公司。
    連結:
  2. eCheck Organization web site
  3. Bakker, A.(1998).Security in perspective|luxury or must.International Journal of Medical Informatics,49,31-37.
  4. Bakker, A.,Barber, B.,Ishikawa, K.,Takeda, H.,Yamamoto K.(1998).Over conclusions and recommendations.International Journal of Medical Informatics,49,135-137.
  5. Bakker, A.,Barber, B.,Moehr, J.(2000).Security of the distributed electronic patient record: conclusions, recommendations and guidance.International Journal of Medical Informatics,60,227-236.
  6. Barber, B.(1998).Patient data and security: an overview.International Journal of Medical Informatics,49,19-30.
  7. Brandner, R.,Haak, M. van der, Hartmann, M.,Haux, R.,Schmucker, P.(2002).Electronic signature for medical documents-integration and evaluation of a public key infrastructure in hospitals.Methods of Information in Medicine,41,321-330.
  8. CPSA website
  9. Debiez, J.,Hughes, J. P.,Apvrille, A.(2003).Data Integrity Check Method Using Cumulative Hash Function.U.S. Patent 6,640,294 B2.
  10. Dolin, R. H.(2001).The HL7 Clinical Document Architecture.Journal of the American Medical Informatics Association,8,552-569.
  11. Eastlake, D. 3rd,Jones P.(2001).US Secure Hash Algorithm 1 (SHA1).RFC 3174.
  12. Gropper, A.,Doyle, S.(2003).Method And Structure For Electronically Transmitting A Text Document And Linked Information.US Patent Application 2003/0177446 A1.
  13. Haak, M. van der,Wolff, A. C.,Brandner, R.,Drings, P.,Wannenmacher, M.,Wetter, Th.(2003).Data security and protection in cross-institutional electronic patient records.International Journal of Medical Informatics,70,117-130.
  14. HL7 website
  15. ISO/IEC(1996).ISO/IEC 10181-6: Information technology-Open Systems Interconnection-Security frameworks for open systems: Integrity framework.
  16. Kaihara, S.(1998).Realisation of the computerised patient record-relevance and unsolved problems.International Journal of Medical Informatics,49,1-8.
  17. Smith, E.,Eloff, J. F. P.(1999).Security in health-care information systems-current trends.International Journal of Medical Informatics,54,37-54.
  18. W3C website
  19. West Midlands Regional Health Authority(1992).Report of the Independent Enquiry commissioned by the West Midlands Regional Health Authority into the Conduct of Isocentric radiotherapy at the North Staffordshire Royal Infirmary between 1982 and 1991.