[AISWorld] AIS Journal Club 11-Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm

Rachel Daeger rachel at aisnet.org
Mon Nov 17 14:45:52 EST 2014




[https://origin.ih.constantcontact.com/fs143/1102108705356/img/336.jpg]


AIS Journal Club Webinar #11 – Final Session of Semester
Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm
Register for this webinar presented live at 1 p.m. EST on November 19

  *   Register to receive the recording
https://www2.gotomeeting.com/register/644069138<http://r20.rs6.net/tn.jsp?e=001tCtzV_2mBPkKvfl__pJPy0Fx-8amZP2YiuEw9xVJ-DxMB-TzwVP-Q1e4lRVdDI_Y1MEetVGmatVb-vSEYZYYuLPdJ06xBTK8vbW_baOLTvNbcEcYG7l6nuXyGJ_phV17AgIA5soy04k=>

  *   Details on the entire webinar series is on the AIS website<http://r20.rs6.net/tn.jsp?e=001tCtzV_2mBPkKvfl__pJPy0Fx-8amZP2YiuEw9xVJ-DxMB-TzwVP-Q1e4lRVdDI_YJrf96lDekhNtYzxsTU6Zh5O1SdxPSIgvSxGsya_K4F30M2APqIBeag==>
Sweta Sneha, Department of Information Systems, Kennesaw State University

Health IT applications today generally incorporate patients as passive users or consumers of information rather than active individuals who, in concert with their providers, are motivated and jointly responsible for their own good health. This article uses the healthcare value chain concept [Porter and Teisberg, 2006] as a framework to identify gaps in patient-centered e-health applications.
Learning Objectives
1. Overview of Ubiquitous Healthcare - Ubiquitous healthcare information system is increasingly seen as a viable option for reducing the inherent time lag and inaccuracies in the traditional model of healthcare and promoting the delivery and practice evidence based healthcare as and when needed without any location and time constraints. Although promising, the realization of ubiquitous healthcare information system, brings several threats and risks rooted in real time collection, analysis, storage, transmission, and access of critical medical data.
2. Information security concerns pertaining to the paradigm of ubiquitous healthcare information system.
3. Using NIST's framework to reflect on security concerns - To accomplish this we use National Institute for Standards and Technology’s (NIST’s) system development lifecycle model (SDLC) as the underlying framework to explore the current state of ubiquitous healthcare from the perspective of security. We then leverage  the model to propose future research directions in this area.

ABOUT AIS:
AIS Members attend webinars free as a benefit of membership. Cost to attend
as a non-member is $25. If you are not an AIS member you will receive an
email with payment instructions after registering. If you indicated an
interest in joining, you'll be contacted with membership details.

Title:  Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm

Date: Wednesday, November 19, 2014

Time: 1:00 - 2:00 PM EST











-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20141117/fc88eaa0/attachment.html>


More information about the AISWorld mailing list