The Internet of Medical Things (IoMT). Группа авторов

Чтение книги онлайн.

Читать онлайн книгу The Internet of Medical Things (IoMT) - Группа авторов страница 16

The Internet of Medical Things (IoMT) - Группа авторов

Скачать книгу

capture routines by prioritizing valuable data types for their specific projects, by enlisting the data management and integrity expertise of professional health information managers, and by developing clinical documentation improvement programs to train clinicians on how to ensure data are useful for downstream analysis.

       2.1.1.2 Cleaning

      Health providers are familiar with the necessity of cleanliness in both the clinic and the operating room, but are not aware of the importance of cleaning their data.

      Dirty data can swiftly ruin a large data analytics project, especially if multiple data sources are used to capture clinical or operational elements in slightly different formats. Data cleaning—also known as cleaning or scrubbing—guarantees accuracy, correctness, consistency, relevance, and in no way corruption of datasets.

      While most data cleaning activities are still done manually, certain IT vendors provide automated scrubbing instruments that compare, contrast, and rectify big data sets using logic rules. These technologies may grow more sophisticated and accurate as machine learning techniques continue to progress rapidly, lowering time and cost necessary to guarantee high levels of accuracy and integrity in health data stores.

       2.1.1.3 Storage

      Clinicians at the front line rarely worry about the location of their data, yet it is a critical cost, safety, and performance issue for the IT department. Due to the exponential growth in the amount of health data, several suppliers can no longer manage the costs and implications on local data centers.

      While many firms are more convenient to store data in the premises, which promises control over security, access, and up-time, the on-site server network can be costly, hard to operate, and prone to data silo production in various departments.

      The cloud promises a smooth recovery from disasters, reduced upfront costs, and simpler expansion—even though enterprises have to be exceedingly careful to select partners who understand the significance of HIPAA and other compliance and safety issues for health.

      Many firms have a hybrid approach to their data store initiatives, which can offer providers with diverse access and storage requirements the most flexible and workable solution. However, providers should be careful to ensure that separate systems can communicate and share data with other sectors of the company when appropriate while establishing a hybrid infrastructure.

       2.1.1.4 Security

      Data security for healthcare businesses is the number one issue, particularly following a fast fire succession of high-profile violations, hackings, and ransomware outbreaks. From phishing assaults, viruses, and laptops left accidently in a cab, health information is exposed to an almost endless range of dangers.

      The HIPAA Security Rule offers a broad set of technological guarantees for PHI storage organizations, including transmission security, authentication procedures and access, and integrity and auditing measures.

      These precautions really lead to common sense safety processes, such as the use of up-to-date anti-virus software, the setup of firewalls, the encryption of sensitive data, and multi-factor authentication.

      However, even the most closely secured data center can be overcome by personnel who tend to give priority over long software updates and sophisticated limits on their access to data or software.

      Health organizations should often remind their staff members of the important nature of data security standards and continuously examine who has access to high-value data in order to prevent damage caused by malevolent parties.

       2.1.1.5 Stewardship

      Understanding when and for what purposes the data were created—as well as who utilized it previously, why, how, and when—is vital to academics and data analysts.

      The development of complete, accurate, and up-to-date metadata is an important component of a successful data management plan. Metadata enables analysts to precisely duplicate earlier questions that are critical for scientific investigations and proper benchmarking and prevents the creation of “data trash”.

      Health organizations should employ a data manager to produce and curate valuable metadata. A data controller may ensure that all pieces have standard definitions and formats, are properly documented from creation to deletion, and remain valuable for the tasks involved.

      Access control is a mechanism to ensure that users are who they say they are and have enough access to company data.

      Access control at a high level is a selective restriction of data access. It comprises two primary components: authentication and authorization, as explained by Daniel Crowley, IBM’s X-Force Red research manager with a focus on data security.

      Authentication is a technique used to check that someone claims to be. Authentication alone is not enough to protect data, as noted by Crowley. What is required is an additional authorization layer that assesses if a user should be authorized to access or execute the transaction.

      2.2.1 Authentication

       2.2.1.1 User Password Authentication

      Authentication is the process of identifying users who ask for system, network or device access. Access control frequently determines user identity using credentials such as login and password. Additional authentication technologies, such as biometric and authentication applications, are also utilized to authenticate user identification.

Скачать книгу