Skip to main content
Top

2016 | OriginalPaper | Chapter

A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The ubiquity of mobile computing devices in the workplace has created a vast landscape of opportunity in rural communities centered on the increased population access owing to the improved mobility. Healthcare workers are able to reach previously disconnected communities and homesteads to deliver health related services through the use of custom mobile computing devices or applications that facilitate the viewing, recording and updating of patient records. Notably, the presence of electronic patient information presents privacy and confidentiality challenges that if not addressed, may affect the delivery of health services thereby negatively impacting on the overall health outcomes of the communities. Deficit based solutions target the needs and challenges of the communities in developing solutions and have been widely used; however, little emphasis has been placed on utilizing the existing asset resources that contribute positively to the overall health outcomes in the development of solutions. This paper leverages off an asset model developed by Morgan and Ziglio to identify existing community assets in a rural community through the use of a survey issued to community health workers and the supporting IT staff. The results point to assets in the cohesive social structures centered on the trust bond between the patients and the providers. Moreover, mentoring support structures and periodic training activities keep the health worker skills up to date. Furthermore, a positive appreciation of health information sensitivity and the need for patient privacy and confidentiality provide for productive interactions between health workers and patients.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agbele, K., Nyongesa, H., Adesina, A.: lCT and information security perspectives in E-Health systems. J. Mob. Commun. 4(1), 17–22 (2010)CrossRef Agbele, K., Nyongesa, H., Adesina, A.: lCT and information security perspectives in E-Health systems. J. Mob. Commun. 4(1), 17–22 (2010)CrossRef
2.
go back to reference Bauer, G., Davies, J.K., Pelikan, J.: The EUHPID Health Development Model for the classification of public health indicators. Health Promot. Int. 21(2), 153–159 (2006)CrossRef Bauer, G., Davies, J.K., Pelikan, J.: The EUHPID Health Development Model for the classification of public health indicators. Health Promot. Int. 21(2), 153–159 (2006)CrossRef
3.
go back to reference Braun, R., Catalani, C., Wimbush, J., Israelski, D.: Community health workers and mobile technology: a systematic review of the literature. PLoS ONE 8(6), 4–9 (2013) Braun, R., Catalani, C., Wimbush, J., Israelski, D.: Community health workers and mobile technology: a systematic review of the literature. PLoS ONE 8(6), 4–9 (2013)
4.
go back to reference Bringsén, Å., Andersson, H.I., Ejlertsson, G.: Development and quality analysis of the Salutogenic Health Indicator Scale (SHIS). Scand. J. Public Health 37(1), 13–19 (2009)CrossRef Bringsén, Å., Andersson, H.I., Ejlertsson, G.: Development and quality analysis of the Salutogenic Health Indicator Scale (SHIS). Scand. J. Public Health 37(1), 13–19 (2009)CrossRef
5.
go back to reference Brynjolfsson, E., Hitt, L.M.: Beyond computation: information technology, organizational transformation and business performance. J. Econ. Perspect. 14(4), 23–48 (2000)CrossRef Brynjolfsson, E., Hitt, L.M.: Beyond computation: information technology, organizational transformation and business performance. J. Econ. Perspect. 14(4), 23–48 (2000)CrossRef
6.
go back to reference D’Arcy, P.: CIO strategies for consumerization: the future of enterprise mobile computing (Whitepaper).Dell (2011) D’Arcy, P.: CIO strategies for consumerization: the future of enterprise mobile computing (Whitepaper).Dell (2011)
7.
go back to reference Disterer, G., Kleiner, C.: BYOD Bring Your Own Device. Procedia Technol. 9, 43–53 (2013)CrossRef Disterer, G., Kleiner, C.: BYOD Bring Your Own Device. Procedia Technol. 9, 43–53 (2013)CrossRef
8.
go back to reference Glasgow Center for Population Healthcph. Asset based approaches for health improvement: rederessing the balance, 1–24 October 2011 Glasgow Center for Population Healthcph. Asset based approaches for health improvement: rederessing the balance, 1–24 October 2011
9.
go back to reference Gens, F., Levitas, D., Segal, R.: 2011 Consumerization of IT Study: Closing the “Consumerization Gap.” A report by IDC, sponsored by Unysis (2011) Gens, F., Levitas, D., Segal, R.: 2011 Consumerization of IT Study: Closing the “Consumerization Gap.” A report by IDC, sponsored by Unysis (2011)
10.
go back to reference Gilson, L., Palmer, N., Schneider, H.: Trust and health worker performance: exploring a conceptual framework using South African evidence. Soc. Sci. Med. 61(7), 1418–1429 (2005)CrossRef Gilson, L., Palmer, N., Schneider, H.: Trust and health worker performance: exploring a conceptual framework using South African evidence. Soc. Sci. Med. 61(7), 1418–1429 (2005)CrossRef
11.
go back to reference Harris, J., Ives, B., Junglas, I.: The genie is out of the bottle: managing the infiltration of consumer IT into the workforce (Whitepaper). Accenture Institute for High Performance (2011) Harris, J., Ives, B., Junglas, I.: The genie is out of the bottle: managing the infiltration of consumer IT into the workforce (Whitepaper). Accenture Institute for High Performance (2011)
12.
go back to reference Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47(2), 154–165 (2009)CrossRef Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47(2), 154–165 (2009)CrossRef
13.
go back to reference Jovanov, E., Raskovic, D., Price, J., Chapman, J., Moore, A., Krishnamurthy, A.: Patient monitoring using personal area networks of wireless intelligent sensors. Biomed. Sci. Instrum. 37, 373–378 (2001) Jovanov, E., Raskovic, D., Price, J., Chapman, J., Moore, A., Krishnamurthy, A.: Patient monitoring using personal area networks of wireless intelligent sensors. Biomed. Sci. Instrum. 37, 373–378 (2001)
14.
go back to reference Marshall, S.: IT consumerization: a case study of BYOD in a healthcare setting. Technology Innovation Management Review, pp. 14–18, March 2014 Marshall, S.: IT consumerization: a case study of BYOD in a healthcare setting. Technology Innovation Management Review, pp. 14–18, March 2014
15.
go back to reference Morgan, A., Ziglio, E.: Revitalising the evidence base for public health: an assets model. Promot. Educ. 4(2 Suppl), 17–22 (2007) Morgan, A., Ziglio, E.: Revitalising the evidence base for public health: an assets model. Promot. Educ. 4(2 Suppl), 17–22 (2007)
16.
go back to reference Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Netw. Secur. 2012(12), 5–8 (2012)CrossRef Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Netw. Secur. 2012(12), 5–8 (2012)CrossRef
17.
go back to reference Von Solms, B., Von Solms, R.: The 10 deadly sins of information security management. Comput. Secur. 23(5), 371–376 (2004)CrossRef Von Solms, B., Von Solms, R.: The 10 deadly sins of information security management. Comput. Secur. 23(5), 371–376 (2004)CrossRef
18.
go back to reference Vroom, C., Von Solms, R.: Towards information security behavioural compliance. Comput. Secur. 23(3), 191–198 (2004)CrossRef Vroom, C., Von Solms, R.: Towards information security behavioural compliance. Comput. Secur. 23(3), 191–198 (2004)CrossRef
19.
go back to reference Wickramasinghe, N., Davison, G.: Making explicit the implicit knowledge assets in healthcare: the case of multidisciplinary teams in care and cure environments. Health Care Manag. Sci. 7(3), 185–195 (2004)CrossRef Wickramasinghe, N., Davison, G.: Making explicit the implicit knowledge assets in healthcare: the case of multidisciplinary teams in care and cure environments. Health Care Manag. Sci. 7(3), 185–195 (2004)CrossRef
Metadata
Title
A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape
Authors
Kevin Kativu
Dalenca Pottas
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-44447-5_10

Premium Partner