Skip to main content

Data Protection in Hospital Information Systems: 2. Software Methods and Techniques

  • Chapter
Implementing Health Care Information Systems

Part of the book series: Computers and Medicine ((C+M))

  • 128 Accesses

Abstract

In line with the development of advanced computer systems, powerful information technologies, namely in the field of data bases and communication, allow for sharing data and programs, for handling complex data structures, and for accessing system functions via remotely located terminals, possibly serving a large number of users simultaneously.36,37

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ANSI/X3/SPARC. Study Group on Data Base Management Systems. Interim Report. Am Natl Stand Inst CBEMA, 1975.

    Google Scholar 

  2. Boehm BW, Brown JR, Kaspar H, et al: Characteristics of Software Quality. Amsterdam, North-Holland, 1978.

    Google Scholar 

  3. Botting R: Novel security techniques for on-line systems. Commun ACM 29, 1986; 5: 416–417.

    Article  Google Scholar 

  4. Bowen JB: A survey of standards and proposed metrics for software quality testing. IEEE Comput Mag 1979, pp 37–42.

    Google Scholar 

  5. Bracchi G, Lockemann PC (eds): Information Systems Methodology. Lecture Notes in Computer Science 65, Berlin, Springer, 1978, pp 1–38, 367-379.

    Google Scholar 

  6. Brodie ML: Data Abstraction, Databases and Conceptual Modelling, in 6th Conf on Very Large Data Bases, Montreal, 1980, pp 105–110.

    Google Scholar 

  7. Chamberlin DD, Gray JM, Traiger IL: Views, Authorization and Locking in a Relational Data Base System. IBM Research Report, RJ 1486, San José, California, 1974.

    Google Scholar 

  8. Champine GA: Distributed Computer Systems-Impact on Management, Design and Analysis. Amsterdam, North-Holland, 1980, pp 16–18.

    Google Scholar 

  9. Chen PP: The Entity-Relationship Model. ACM Trans Database Syst 1976; 1: 9–36.

    Article  Google Scholar 

  10. CODASYL Programming Language Committee: Data Base Task Group (DBTG) Report. New York, Assoc Comput Machin 1971.

    Google Scholar 

  11. Codd EF: A relational model of data for large shared data banks. Commun ACM 1970; 13: 377–387.

    Article  Google Scholar 

  12. Codd EF: Extending the relational model to capture more meaning. ACM Trans Database Syst 4, 1979; 4: 397–434.

    Article  Google Scholar 

  13. Collen MF (ed): Hospital Computer Systems. New York, John Wiley & Sons, 1974, pp 457–753.

    Google Scholar 

  14. Date CJ: An Introduction to Database Systems, ed 2. Reading, Mass, Addison-Wesley, 1977, pp 51–69.

    Google Scholar 

  15. Denert E, Hesse W, Neumaier H: S/E/TEC—An Environment for the Production of Reliable Software, in Duijvestijn AJW, Lockemann PC (eds): Trends in Information Processing Systems. Lecture Notes in Computer Science 123. Berlin, Springer, 1981, pp 65–84.

    Google Scholar 

  16. Denning DE, Denning PJ: Data Security. Comput Surv 1979; 11: 227–249.

    Article  Google Scholar 

  17. Duijvestijn AJW, Lockemann PC (eds): Trends in Information Processing Systems. Lecture Notes in Computer Science 123. Berlin, Springer, 1981, pp 16–121.

    Google Scholar 

  18. Feldmann U, Reichertz PL, Sauter K: On the Selectivity of the Identification Number in the Patient Data Base of the Medical System Hannover. Methods Inf Med 1980; 19: 28–36.

    PubMed  CAS  Google Scholar 

  19. Griesser G (ed): Realisation of Data Protection in Health Information Systems. Amsterdam, North-Holland, 1977.

    Google Scholar 

  20. Griesser G, Bakker A, Danielsson J, et al (eds): Data Protection in Health Information Systems-Considerations and Guidelines. Amsterdam, North-Holland, 1980, pp 57–129.

    Google Scholar 

  21. Haskett JA: Pass-algorithms: A user-validation schema based on knowledge of secret algorithms. Commun ACM 27, 1984; 8: 777–781.

    Article  Google Scholar 

  22. Hoffmann LJ: Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ, Prentice-Hall, 1977.

    Google Scholar 

  23. Hsiao DK, Kerr DS, Madnick SE: Privacy and Security of Data Communication and Data Bases. Proc 4th Int Conf on Very Large Data Bases. 1978, pp 55–67.

    Google Scholar 

  24. Jensen RW, Tonies CC: Software Engineering. Englewood Cliffs, NJ, Prentice Hall, 1979.

    Google Scholar 

  25. Klonk J, Sauter K: Steps towards a methodology for database design, in Lindberg DAB, Kaihara S (eds): MEDINFO 80. Amsterdam, North-Holland, 1980, pp 470- 474.

    Google Scholar 

  26. Lai J, Chi-Sang HD, Covvey KC, et al: The Quality Control of Data in a Clinical Database System-The Patient Identification Problem. Proc Fifth Annual Symposium on Computer Applications in Medical Care. New York, IEEE, 1981, pp 847–851.

    Google Scholar 

  27. Leavitt HJ: Applying organizational change in industry: Structural, technological and humanistic approaches, in March JG (ed): Handbook of Organizations. Chicago, Rand McNally, 1965, pp 45–56.

    Google Scholar 

  28. Lucas HC Jr, Land FF, Lincoln TJ et al (eds): The Information Systems Environment. Amsterdam, North-Holland, 1980, pp 173–331.

    Google Scholar 

  29. Martin J: Security, Accuracy and Privacy in Computer Systems. Englewood Cliffs, NJ, Prentice-Hall, 1973, pp 204–242.

    Google Scholar 

  30. Merkle RC: Secure communications over insecure channels. Commun ACM 1978; 21: 294–299.

    Article  Google Scholar 

  31. National Bureau of Standards (US): Data Encryption Standard. FIPS 46. US Government Printing Office, 1970.

    Google Scholar 

  32. Reichertz PL: The challenge of medical informatics-Delusions or new perspectives? in O’Moore RR, Barber B, Reichertz DL, et al (eds): Medical Informatics Europe 82, Berlin, Springer, 1982, pp 909–924.

    Google Scholar 

  33. Ross DT: Structured Analysis: A language for communicating ideas. IEEE Trans SE 1977; 3: 16–34.

    Google Scholar 

  34. Sauter K: Structure and functions of the patient data bank in the medical system Hannover, in Günther A, Levrat B, Lipps H (eds): Int Comput Sympos 1973. Amsterdam, North-Holland, 1974, pp 585–589.

    Google Scholar 

  35. Sauter K: Data Protection by Software Techniques with Special Regard to Problems Created by Multi-User Access, in Griesser G (ed): Realisation of Data Protection in Health Information Systems. Amsterdam, North-Holland, 1977, pp 97–105.

    Google Scholar 

  36. Sauter K: Data Security in Health Information Systems by Applying Software Techniques. Methods Inf Med 1979; 18: 214–222.

    PubMed  CAS  Google Scholar 

  37. Sauter K, Klonk J, Rienhoff O: Integrity problems within a database-supported patient information system, in Barber B, Grémy F, Ueberla K, et al (eds): Proc Med Inf Berlin. Lecture Notes in Medical Informatics 5, Berlin, Springer, 1979, pp 570–579.

    Google Scholar 

  38. Sauter K: Distributed health information systems, in van Bemmel JH, Ball MJ, Wigertz O (eds): MEDINFO 83, Amsterdam, North-Holland, 1983, pp 1122–1126.

    Google Scholar 

  39. Sauter K: Information Systems Methodology Related to Data Protection, in Griesser G, Jardel JP, Kenny DJ et al (eds): Data Protection in Health Information Systems—Where do we stand? Amsterdam, North-Holland, 1983, pp 91–101.

    Google Scholar 

  40. Sauter K, Hedderich J: Methodological aspects of information management with special regard to disease registries and hospital care statistics, in Eimeren W., Engelbrecht R, Flagle CD (eds): Proc Third Int Conf on System Science in Health Care. Berlin, Springer, 1984, pp 743–746.

    Google Scholar 

  41. Sauter K, Hedderich J, Appel M: Experiences with large database-supported disease registries with special regard to integrity control, in Salamon R, Blum B, J0rgensen M (eds): MEDINFO 86. Amsterdam, North-Holland, 1986, pp 1133–1135.

    Google Scholar 

  42. Schneider H-J (ed): Formal Models and Practical Tools for Information Systems Design. Amsterdam, North-Holland, 1979, pp 1–231.

    Google Scholar 

  43. Shannon RH (ed): Hospital Information Systems. Amsterdam, North-Holland, 1979.

    Google Scholar 

  44. Tanenbaum AS: Network Protocols. Comput Surv 1981; 13: 453–489.

    Article  Google Scholar 

  45. Teichroew D, Hershey EA: PLS/PSA: A computer-aided technique for structured documentation and analysis of information processing systems. IEEE Trans SE 1977; 3: 41–48.

    Google Scholar 

  46. Wagner G, Newcombe HB: Record linkage. Its methodology and application in medical data processing. Methods Inf Med 1970; 9: 121–138.

    PubMed  CAS  Google Scholar 

  47. Wasserman AI: USE: A Methodology for the Design and Development of Interactive Information Systems, in Schneider H-J (ed): Formal Models and Practical Tools for Information Systems Design. Amsterdam, North-Holland, 1979, pp 31–50.

    Google Scholar 

  48. Zimmermann H : OSI Reference Model: The ISO model architecture for open systems interconnection. IEEE Trans Commun 1980; COM-28, 425–432.

    Article  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1989 Springer-Verlag New York Inc.

About this chapter

Cite this chapter

Sauter, K. (1989). Data Protection in Hospital Information Systems: 2. Software Methods and Techniques. In: Orthner, H.F., Blum, B.I. (eds) Implementing Health Care Information Systems. Computers and Medicine. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-3488-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-3488-3_16

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4612-8122-1

  • Online ISBN: 978-1-4612-3488-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics