• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18

Health Book

Extracts from this document...

Introduction

JAMEEL KHAN E-Health - The Emerging Role of the Internet in Healthcare Information and Processing Technologies Item H Mr. Carey 9/18/2010 Table of Contents E-Health - The Emerging Role of the Internet in Healthcare 3 Purpose 3 Scope 3 E-Health: Description 3 E-Health: New Developments 4 Information Privacy and Security 4 Information Privacy 4 Information Security 6 Advantages of Healthbook 7 Disadvantages of Healthbook 8 Protection of Healthbook Data Records 9 Conclusion 11 Reference List 12 Appendix 14 E-Health - The Emerging Role of the Internet in Healthcare "The Internet has evolved from the information-retrieval of "Web 1.0" to "Web 2.0,". The outcome of this development is 'Health 2.0'" (Jane Sarasohn-Kahn 2008) Purpose This report will analyse advantages and disadvantages of the E-Health initiative proposed by the Australian government, as well as the privacy, security and integrity of the personal information being stored on the system, to ultimately come to a conclusion as to whether this system would be an asset or a liability to the Australian society. Scope While this report addresses E-Health's initiatives, policies, advantages, disadvantages and security concerns, it does not address the more detailed and technical aspects of the E-Health systems, such as Security, Access and Data Quality frameworks, and Current and Target Architecture. E-Health: Description "...it is unambiguous that health information and sharing is about to explode" (Dr David More 2008) On the 19th and 20th of April, 2008, the 2020 Australian Summit was held, bringing together 1002 delegates from across the nation and generating over 900 ideas. These posed important questions about Australia's future, while others offered the opportunity to embrace significant policy reform in a new way of governing. One of the many ideas proposed by the delegates gathered at the 2020 summit was to construct and implement a nationwide e-health system, with intention to, combine data held by governments with state hospital data, provide better targeted treatments and to establish a system that allows reporting positive outcomes in the health system. ...read more.

Middle

9. If a rushed diagnosis and treatment is crucial, a patient could use the secure messaging and e-prescription capabilities that an e-health system would be able to provide. For example, if someone is in urgent need of medical advice and treatment then the internet may be the fastest way to get that immediate care rather than making an appointment for three months from now to see a specialist, seeing that some people may not be able to afford to wait that long. Also, for low income earners the internet maybe able to offer them free advice and treatment. (Forum 2006-2010) 10. Instead of travelling back to your doctor after a diagnostic test with a paper report and X-Ray film, your doctor will be able to access your results and reports via the secure electronic transfer of health information. (Anonymous4 2010) 11. Only authorized people will have access to certain information, insuring information is secure by server access. (see disadvantages for interception of information on its way to the server) (NEHTA 2010) Disadvantages of Healthbook If E-Health were to be implemented, it would without doubt improve the access, efficiency, effectiveness, and quality of clinical and business processes utilized by healthcare organizations, practitioners, patients, and consumers to improve the health status of patients. However, while it brings these new opportunities to the table, it also brings with it a range of issues, risks and disadvantages. Disadvantages being: START UP COSTS - Start up costs are enormous, from buying equipment to record and store patient charts and training GPs and medical personnel on electronic medical record software. Some physicians do not see any immediate benefit to their practice in the short run and beginning to drag their feet at the mention of the implementation of E-Health. Not only this for at least the first decade the immediate benefits will be to the Australian society and loss to the providers and constructers of E-Health. ...read more.

Conclusion

Subject Alteration Rights A record-keeper shall make reasonable alterations to ensure that records of personal information are accurate, relevant, up to date, complete and not misleading, and where unwilling to make an alteration, shall allow the individual concerned to attach to a record a statement of the alteration sought 8. Quality of Information Used A record-keeper shall not use personal information without taking reasonable steps to ensure that it is accurate, up to date and complete 9. Relevance of Information Used A record-keeper shall not use personal information unless it is relevant 10. Use Limitations A record-keeper shall only use personal information for the purpose for which it was obtained, and for such additional purposes as are consented to by the individual, are authorised by law, are necessary in an emergency, and are reasonably necessary for the enforcement of the criminal law or of a law imposing a pecuniary penalty, or for the protection of the public revenue 11. Disclosure Limitations A record-keeper shall only disclose personal information if the individual to whom it relates should have been aware that it was subject to disclosure, or the disclosure has been consented to by the individual, authorised by law, or is necessary in an emergency, or is reasonably necessary for the enforcement of the criminal law or of a law imposing a pecuniary penalty, or for the protection of the public revenue. In the last three cases a note to that effect shall be included in the record. The recipient of the information shall not use or disclose the information except for the purpose for which it was given it http://www.rogerclarke.com/DV/PaperPrivacyActShort.html Figure 1: E-Health Community Model http://www.nehta.gov.au/about-us/nehta-blueprint (Chapters 1 and 2 - Introduction and Blueprint Overview) Figure 2: Two Parallel Worlds http://www.nehta.gov.au/about-us/nehta-blueprint (Chapter 5, 6, 7, 8 - Future Capabilities, Architecture, Change and Adoption, Risks and Challenges) Figure 3: SAF Aspect ?? ?? ?? ?? Jameel Khan The Emerging Role of the Internet in Healthcare Mr Carey Year 12 | IPT ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    was supposed to be returned, and then multiplying this number by the sum of the daily rental rate multiplied by 1.25. Why ICT Provides a Suitable Solution A business is simply an organisational entity and with the aim of selling goods or services to consumers in order to generate profit.

  2. Personal effectiveness

    Learning from my failures, such as not achieving the grade in a particular exam has enabled me to retrace my steps in areas such as my approach to revision and exam preparation. Establishing the best times in which I learn most have also had a positive impact towards the end results.

  1. The aim of this task is to produce a report for the managing director ...

    A disadvantage of SMS is each message is limited to a certain number of characters; therefore a texting language has developed over time which uses abbreviations and numbers to get the message across in a shorter message. Examples * w8 = wait * 4 = for * 2 = to

  2. Computers in Hospitals. Computers can be used in Hospitals for two main purposes ...

    However, patients may not be able to have their treatment, as budgets are now stricter. For example if somebody wanted an operation which wasn't life threatening but cost a lot of money, then the operation wouldn't be funded as the budget needs to be preserved for the whole year.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    This is a problem as when some order sheets and receipt are thrown out they cannot be referred back to and this leaves the company in a bad position. * At the moment the staff at the company has to add up all the weekly orders using a calculator and this takes a very long time.

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    For example when they get a pay rise, it is updated on the payroll system. The accuracy of the information does not have to be correct if you correctly recorded the information given to you, and have make reasonable steps to check that the information holds water, or you got the information from third parties and checked the validity.

  1. Feasibility Report

    this will link to the sites within the Perfect Pie Company together and also will save the owner time and money, due to driving between the two sites, as customers orders, can appear in a database, from an online order form, through email, this will ensure that customer orders aren't

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    There are several ways in which this could be achieved. Phishing: This is done via the use of emails which impersonate a legitimate business to try and persuade or trick users into providing personal or company details such as PIN numbers, passwords and credit card details, this is a type of social engineering.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work