Introduction to e-Healthcare Information Security

  • Charles A. Shoniregun
  • Kudakwashe Dube
  • Fredrick Mtenzi
Part of the Advances in Information Security book series (ADIS, volume 53)


The e-Healthcare information offers unique security, privacy and confidentiality challenges that require a fresh examination of the mainstream concepts and approaches to information security. The significance of security and privacy in e- Healthcare information raised the issues of individual consent, confidentiality and privacy, which are the main determinants in adopting and successful utilising the e-Healthcare information. Current trends in the domain of e-Healthcare information management point to the need for comprehensive incorporation of security, privacy and confidentiality safeguards within the review of e-Healthcare information management frameworks and approaches. This raises major challenges that demands holistic approaches spanning a wide variety of legal, ethical, psychological, information and security engineering. This introductory chapter explores information security and challenges facing e-Healthcare information management.


European Union National Health Service Information Security Electronic Health Record County Council 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Karen M Albert. Integrating knowledge-based resources into the electronic health record: history, current status, and role of librarians. Medical Reference Services Quarterly, 26:1–19, 2007. ISSN 0276-3869. doi: 17915628. PMID: 17915628.CrossRefGoogle Scholar
  2. DB Baker and DR Masys. Pcasso: a design for secure communication of personal health information via the internet. Int J Med Inform., 54(2):97–104, May 1999. URL Scholar
  3. S Benkner, G Berti, G Engelbrecht, J Fingberg, G Kohring, S E Middleton, and R Schmidt. Gemss: grid-infrastructure for medical service provision. Methods of Information in Medicine, 44(2):177–81, 2005. ISSN 0026-1270. doi: 05020177. PMID: 15924170.Google Scholar
  4. Mike Boniface and Paul Wilken. Artemis: towards a secure interoperability infrastructure for healthcare information systems. Studies in Health Technology and Informatics, 112:181–9, 2005. ISSN 0926-9630. doi: 15923727. PMID: 15923727.Google Scholar
  5. Canada-Health-Research. Canada institute of health research, the future of public health in canada: Developing a public health system for the 21st century, june 2003, (access date 1 may, 2010), 2003.
  6. Persephone Doupi and Johan van der Lei. Design and implementation considerations for a personalized patient education system in burn care. International journal of medical informatics, 74(2-4):151–7, March 2005. ISSN 13865056. PMID: 15694620.CrossRefGoogle Scholar
  7. eHealth-in Canada. e-health in canada, developing tomorrow’s workforce today, current and future challenges, information and communications technology council, april 2009, 2009.Google Scholar
  8. Richard W Grant, Jonathan S Wald, Eric G Poon, Jeffrey L Schnipper, Tejal K Gandhi, Lynn A Volk, and Blackford Middleton. Design and implementation of a web-based patient portal linked to an ambulatory care electronic health record: patient gateway for diabetes collaborative care. Diabetes Technology & Therapeutics, 8:576–86,October 2006. ISSN 1520-9156. doi: 10.1089/dia.2006.8.576. PMID: 17037972.CrossRefGoogle Scholar
  9. Jane Grimson. Delivering the electronic healthcare record for the 21st century. International Journal ofMedical Informatics 64 (2001) 111127, 64:111–127, 2001.CrossRefGoogle Scholar
  10. Claudia Hildebrand, Peter Pharow, Rolf Engelbrecht, Bernd Blobel, Mario Savastano, and Asbjorn Hovsto. Biohealth–the need for security and identity management standards in ehealth. Studies in Health Technology and Informatics, 121: 327–36, 2006. ISSN 0926-9630. doi: 17095831. PMID: 17095831.Google Scholar
  11. C. Derrick Huang, Qing Hu, and Ravi S. Behara. An economic analysis of the optimal information security investment in the case of a riskaverse firm. International Journal of Production Economics, 114(2): 793 – 804, 2008. ISSN 0925-5273. doi: DOI:10.1016/j.ijpe.2008.04. 002. URL Section on Logistics Management in Fashion Retail Supply Chains.CrossRefGoogle Scholar
  12. D Kalra, P Singleton, J Milan, J Mackay, D Detmer, A Rector, and D Ingram. Security and confidentiality approach for the clinical e-science framework (clef). Methods of Information in Medicine, 44(2):193–7, 2005. ISSN 0026-1270. doi: 05020193. PMID: 15924174.Google Scholar
  13. Deborah Beranek Lafky and Thomas A. Horan. Prospective personal health record use among different user groups: Results of a multi-wave study. hicss, 0:233, 2008. ISSN 1530-1605. doi: Scholar
  14. M. Lalonde. A new perspective on the health of canadians, ottawa, health and welfare canada, 1974.Google Scholar
  15. Peter Lennon. Protecting Personal Health Information in Ireland: Law & Practice. Oak Tree Press, 2005.Google Scholar
  16. Kenneth D Mandl, William W Simons, William C R Crawford, and Jonathan M Abbett. Indivo: a personally controlled health record for health information exchange and communication. BMC Medical Informatics and Decision Making, 7: 25, 2007. ISSN 1472-6947. doi: 1472-6947-7-25. PMID: 17850667.CrossRefGoogle Scholar
  17. Mario, Domenico, Giuseppe, Paolo, and Pierangelo. Sigmcc: A system for sharing meta patient records in a peer-to-peer environment. Future Generation Computer Systems, 24:222–234, March 2008. doi: 10.1016/j.future.2007.06.006. URL Scholar
  18. Pew-Internet-Project. Pew internet and american life project, january 2009, 2009.pdf (access date 13 april, 2010), 2009.
  19. Luuc Posthumus. Use of the iso/iec 17799 framework in healthcare information security management. Studies in Health Technology and Informatics, 103:447–52, 2004. ISSN 0926-9630. doi: 15747954. PMID: 15747954.Google Scholar
  20. Pradeep Ray and Jaminda Wimalasiri. The need for technical solutions for maintaining the privacy of ehr. Conference Proceedings: … Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference, 1:4686–9, 2006. ISSN 1557-170X. doi: 10.1109/IEMBS.2006.260862. PMID: 17947109.Google Scholar
  21. William H. Roach, Robert G.Hoban, Bernadette M. Broccolo, Andrew R. Roth, and Timothy P. Blanchard. Medical Records and the Law. Jones and Bartlett Publishers, 4th edition, 2006.Google Scholar
  22. Richard E Scott, Penny Jennett, and Maryann Yeo. Access and authorisation in a glocal e-health policy context. International Journal of Medical Informatics, 73 (3):259–66, March 2004. ISSN 1386-5056. doi: 15066556. PMID: 15066556.CrossRefGoogle Scholar
  23. Amnon Shabo. The implications of electronic health record for personalized medicine. Biomedical Papers of the Medical Faculty of the University Palack?, Olomouc, Czechoslovakia, 149:suppl 251–8, December 2005. ISSN 1213-8118. doi: 16601821. PMID: 16601821.Google Scholar
  24. Alan F. Westin. New issues of computer privacy in the eighties. In IFIP Congress, pages 733–739, 1983.Google Scholar
  25. Zittrain and B. Edelman. Internet filtering in china. Internet Computing, IEEE, 1 (2):70 – 77, March-April 2003 2003.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Charles A. Shoniregun
    • 1
  • Kudakwashe Dube
    • 2
  • Fredrick Mtenzi
    • 3
  1. 1.Infonomics SocietyUnited Kingdom and Ireland
  2. 2.Computer Science and Information Technology School of Engineering & Advanced Technology (SEAT)Massey UniversityNew Zealand
  3. 3.Dublin Institute of TechnologyIreland

Personalised recommendations