Skip to main content

2016 | OriginalPaper | Buchkapitel

A Trust-Based Framework for Information Sharing Between Mobile Health Care Applications

verfasst von : Saghar Behrooz, Stephen Marsh

Erschienen in: Trust Management X

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The use of information systems in the health care area, specifically in Mobile health care, can result in delivering high quality and efficient patient care. At the same time, using electronic systems for sharing information contributes to some challenges regarding privacy and access control. Despite the importance of this issue, there is a lack of frameworks in this area. In this paper, we propose a trust-based model for information sharing between mobile health care applications. This model consists of two parts, the first part calculates the needed amount of trust for sharing a specific part of information for each user, and the second part calculates the (contextual) current existing amount of trust. A decision for sharing information would be made based on a comparison between the components.
To examine the model, we provide different scenarios. Using mathematical analysis, we illustrate how the model works in those scenarios.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat Ball, M.J., Lillis, J.: E-health: transforming the physician/patient relationship. Int. J. Med. Inform. 61(1), 1–10 (2001)CrossRef Ball, M.J., Lillis, J.: E-health: transforming the physician/patient relationship. Int. J. Med. Inform. 61(1), 1–10 (2001)CrossRef
8.
Zurück zum Zitat Becker, M.Y., Sewell, P.: Cassandra: flexible trust management, applied to electronic health records. In: Computer Security Foundations Workshop, 2004. Proceedings. 17th IEEE, pp. 139–154. IEEE (2004) Becker, M.Y., Sewell, P.: Cassandra: flexible trust management, applied to electronic health records. In: Computer Security Foundations Workshop, 2004. Proceedings. 17th IEEE, pp. 139–154. IEEE (2004)
9.
Zurück zum Zitat Boukerche, A., Ren, Y.: A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Sel. Areas Commun. 27(4), 387–399 (2009)CrossRef Boukerche, A., Ren, Y.: A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Sel. Areas Commun. 27(4), 387–399 (2009)CrossRef
10.
Zurück zum Zitat Gefen, D., Benbasat, I., Pavlou, P.: A research agenda for trust in online environments. J. Manage. Inf. Syst. 24(4), 275–286 (2008)CrossRef Gefen, D., Benbasat, I., Pavlou, P.: A research agenda for trust in online environments. J. Manage. Inf. Syst. 24(4), 275–286 (2008)CrossRef
11.
Zurück zum Zitat Haux, R.: Health information systems-past, present, future. Int. J. Med. Inform. 75(3), 268–281 (2006)CrossRef Haux, R.: Health information systems-past, present, future. Int. J. Med. Inform. 75(3), 268–281 (2006)CrossRef
12.
Zurück zum Zitat Haux, R., Winter, A., Ammenwerth, E., Brigl, B.: Strategic Information Management in Hospitals: An Introduction to Hospital Information Systems. Springer Science Business Media, New York (2013) Haux, R., Winter, A., Ammenwerth, E., Brigl, B.: Strategic Information Management in Hospitals: An Introduction to Hospital Information Systems. Springer Science Business Media, New York (2013)
13.
Zurück zum Zitat Hsu, M.H., Ju, T.L., Yen, C.H., Chang, C.M.: Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations. Int. J. Hum. Comput. Stud. 65(2), 153–169 (2007)CrossRef Hsu, M.H., Ju, T.L., Yen, C.H., Chang, C.M.: Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations. Int. J. Hum. Comput. Stud. 65(2), 153–169 (2007)CrossRef
14.
Zurück zum Zitat Jydstrup, R.A., Gross, M.J.: Cost of information handling in hospitals. Health Serv. Res. 1(3), 235 (1966) Jydstrup, R.A., Gross, M.J.: Cost of information handling in hospitals. Health Serv. Res. 1(3), 235 (1966)
15.
Zurück zum Zitat Klasnja, P., Pratt, W.: Healthcare in the pocket: mapping the space of mobile-phone health interventions. J. Biomed. Inform. 45(1), 184–198 (2012)CrossRef Klasnja, P., Pratt, W.: Healthcare in the pocket: mapping the space of mobile-phone health interventions. J. Biomed. Inform. 45(1), 184–198 (2012)CrossRef
16.
Zurück zum Zitat Kotz, D., Avancha, S., Baxi, A.: A privacy framework for mobile health and home-care systems. In: Proceedings of the First ACM Workshop on Security and Privacy in Medical and Home-care Systems, pp. 1–12. ACM (2009) Kotz, D., Avancha, S., Baxi, A.: A privacy framework for mobile health and home-care systems. In: Proceedings of the First ACM Workshop on Security and Privacy in Medical and Home-care Systems, pp. 1–12. ACM (2009)
17.
Zurück zum Zitat Lukowicz, P., Kirstein, T., Troster, G.: Wearable systems for health care applications. Methods of Information in Medicine-Methodik der Information in der Medizin 43(3), 232–238 (2004) Lukowicz, P., Kirstein, T., Troster, G.: Wearable systems for health care applications. Methods of Information in Medicine-Methodik der Information in der Medizin 43(3), 232–238 (2004)
18.
Zurück zum Zitat Mandl, K.D., Markwell, D., MacDonald, R., Szolovits, P., Kohane, I.S.: Public standards and patients’ control: how to keep electronic medical records accessible but privatemedical information: access and privacydoctrines for developing electronic medical recordsdesirable characteristics of electronic medical recordschallenges and limitations for electronic medical recordsconclusionscommentary: Open approaches to electronic patient recordscommentary: A patient’s viewpoint. BMJ 322(7281), 283–287 (2001)CrossRef Mandl, K.D., Markwell, D., MacDonald, R., Szolovits, P., Kohane, I.S.: Public standards and patients’ control: how to keep electronic medical records accessible but privatemedical information: access and privacydoctrines for developing electronic medical recordsdesirable characteristics of electronic medical recordschallenges and limitations for electronic medical recordsconclusionscommentary: Open approaches to electronic patient recordscommentary: A patient’s viewpoint. BMJ 322(7281), 283–287 (2001)CrossRef
19.
Zurück zum Zitat Marsh, S., Wang, Y., Noël, S., Robart, L., Stewart, J.: Device comfort for mobile health information accessibility. In: 2013 Eleventh Annual International Conference on Privacy, Security and Trust (PST), pp. 377–380. IEEE (2013) Marsh, S., Wang, Y., Noël, S., Robart, L., Stewart, J.: Device comfort for mobile health information accessibility. In: 2013 Eleventh Annual International Conference on Privacy, Security and Trust (PST), pp. 377–380. IEEE (2013)
20.
Zurück zum Zitat Marsh, S.P.: Formalising Trust as a computational concept. Ph.D. thesis Marsh, S.P.: Formalising Trust as a computational concept. Ph.D. thesis
21.
Zurück zum Zitat Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Comput. Commun. 31(4), 760–769 (2008)CrossRef Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Comput. Commun. 31(4), 760–769 (2008)CrossRef
22.
Zurück zum Zitat Nowak, G.J., Phelps, J.: Understanding privacy concerns. An assessment of consumers’ information-related knowledge and beliefs. J. Direct Mark. 6(4), 28–39 (1992)CrossRef Nowak, G.J., Phelps, J.: Understanding privacy concerns. An assessment of consumers’ information-related knowledge and beliefs. J. Direct Mark. 6(4), 28–39 (1992)CrossRef
23.
Zurück zum Zitat Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Public Policy Mark. 19(1), 27–41 (2000)CrossRef Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Public Policy Mark. 19(1), 27–41 (2000)CrossRef
24.
Zurück zum Zitat Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., Podsakoff, N.P.: Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879 (2003)CrossRef Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., Podsakoff, N.P.: Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879 (2003)CrossRef
25.
Zurück zum Zitat Shahriyar, R., Bari, M.F., Kundu, G., Ahamed, S.I., Akbar, M.M.: Intelligent mobile health monitoring system (imhms). Int. J. Control Autom. 2(3), 13–28 (2009) Shahriyar, R., Bari, M.F., Kundu, G., Ahamed, S.I., Akbar, M.M.: Intelligent mobile health monitoring system (imhms). Int. J. Control Autom. 2(3), 13–28 (2009)
26.
Zurück zum Zitat Siau, K., Shen, Z.: Mobile healthcare informatics. Inform. Health Soc. Care 31(2), 89–99 (2006) Siau, K., Shen, Z.: Mobile healthcare informatics. Inform. Health Soc. Care 31(2), 89–99 (2006)
27.
Zurück zum Zitat Stone, E.F., Stone, D.L.: Privacy in organizations: theoretical issues, research findings, and protection mechanisms. Res. Pers. Hum. Res. Manage. 8(3), 349–411 (1990) Stone, E.F., Stone, D.L.: Privacy in organizations: theoretical issues, research findings, and protection mechanisms. Res. Pers. Hum. Res. Manage. 8(3), 349–411 (1990)
28.
Zurück zum Zitat Sunyaev, A., Dehling, T., Taylor, P.L., Mandl, K.D.: Availability and quality of mobile health app privacy policies. J. Am. Med. Inform. Assoc. 22(e1), e28–e33 (2015) Sunyaev, A., Dehling, T., Taylor, P.L., Mandl, K.D.: Availability and quality of mobile health app privacy policies. J. Am. Med. Inform. Assoc. 22(e1), e28–e33 (2015)
29.
Zurück zum Zitat Vawdrey, D.K., Hall, E.S., Knutson, C.D., Archibald, J.K.: A self-adapting healthcare information infrastructure using mobile computing devices. In: 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry, Healthcom 2003. Proceedings, pp. 91–97. IEEE (2003) Vawdrey, D.K., Hall, E.S., Knutson, C.D., Archibald, J.K.: A self-adapting healthcare information infrastructure using mobile computing devices. In: 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry, Healthcom 2003. Proceedings, pp. 91–97. IEEE (2003)
30.
Zurück zum Zitat Weerasinghe, D., Rajarajan, M., Rakocevic, V.: Device data protection in mobile healthcare applications. In: Weerasinghe, D. (ed.) eHealth 2008. LNICST, vol. 1, pp. 82–89. Springer, Heidelberg (2009)CrossRef Weerasinghe, D., Rajarajan, M., Rakocevic, V.: Device data protection in mobile healthcare applications. In: Weerasinghe, D. (ed.) eHealth 2008. LNICST, vol. 1, pp. 82–89. Springer, Heidelberg (2009)CrossRef
31.
Zurück zum Zitat Yarmand, M.H., Sartipi, K., Down, D.G.: Behavior-based access control for distributed healthcare environment. In: 21st IEEE International Symposium on Computer-Based Medical Systems, CBMS 2008, pp. 126–131. IEEE (2008) Yarmand, M.H., Sartipi, K., Down, D.G.: Behavior-based access control for distributed healthcare environment. In: 21st IEEE International Symposium on Computer-Based Medical Systems, CBMS 2008, pp. 126–131. IEEE (2008)
32.
Zurück zum Zitat Yousefi, A., Mastouri, N., Sartipi, K.: Scenario-oriented information extraction from electronic health records. In: 22nd IEEE International Symposium on Computer-Based Medical Systems, CBMS 2009, pp. 1–5. IEEE (2009) Yousefi, A., Mastouri, N., Sartipi, K.: Scenario-oriented information extraction from electronic health records. In: 22nd IEEE International Symposium on Computer-Based Medical Systems, CBMS 2009, pp. 1–5. IEEE (2009)
33.
Zurück zum Zitat Zhang, L., Ahn, G.J., Chu, B.T.: A role-based delegation framework for healthcare information systems. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 125–134. ACM (2002) Zhang, L., Ahn, G.J., Chu, B.T.: A role-based delegation framework for healthcare information systems. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 125–134. ACM (2002)
Metadaten
Titel
A Trust-Based Framework for Information Sharing Between Mobile Health Care Applications
verfasst von
Saghar Behrooz
Stephen Marsh
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-41354-9_6

Premium Partner