Preserving Patient Records with Biometrics Identification in e-Health Systems

The increasing technological advancement and usage of Internet has continued to evolve the emergence of proficient health care delivery systems across the globe. Consequently, the concern of data security of patient’s information remains foremost in healt

  • PDF / 783,913 Bytes
  • 11 Pages / 439.37 x 666.142 pts Page_size
  • 79 Downloads / 195 Views

DOWNLOAD

REPORT


1 Introduction Enormous attention has been received in recent years as a result of the deployment of computer technology for health care management system [1]. In other words, the role played by information and communication technology (ICT) in providing health care support services cannot be over-emphasized [2], although with some issues to be addressed. The common issues include—use of easily guessed passwords which has the ability to allow unauthorized access, and also privacy of patient data. The transition of privacy of data (in health data) from the last few decades up until now is such that most computer networks are not only vulnerable but has been compromised A. A. Azeta (B) · N. A. Omoregbe · S. Misra · D.-O. A. Iboroma · E. O. Igbekele · D. O. Fatinikun · E. Ekpunobi Center of ICT/ICE Research, CUCRID Building, Covenant University, Ota, Nigeria e-mail: [email protected] N. A. Omoregbe e-mail: [email protected] S. Misra e-mail: [email protected] D.-O. A. Iboroma e-mail: [email protected] E. O. Igbekele e-mail: [email protected] D. O. Fatinikun e-mail: [email protected] E. Ekpunobi e-mail: [email protected] V. I. Azeta National Productivity Center, Calabar, Nigeria e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2019 R. K. Shukla et al. (eds.), Data, Engineering and Applications, https://doi.org/10.1007/978-981-13-6347-4_17

181

182

A. A. Azeta et al.

in terms of quality of services. When it comes to evaluating the performance of medical information system, security is very important [3]. More so, the ability to monitor adherence from a distant location of patient’s health is essential [4]. In addition, eventuality may happen when a misunderstood or incomplete record arise which is traceable to either wrong prescription or medication that could cause patient death. One of the functions of health information system is to minimize the massive manual paper work in medical centers and hospitals and to resolve the reoccurring dearth of health care professionals [3]. Health information system (HIS) could also be prone to medical fraud, missing records, duplicated medical records, strenuous patient authentication and verification system, and inappropriate billing system. The increasing demand for more reliable authentication system has been reinforced in the health care industry as a result of the push for electronic (e) medical records. Almost on a regular basis, several patients in Nigeria go to some clinics to see their doctors. Feedbacks from most of the visits show that such visits mostly duplicate medical records or build on existing once, and therefore introduce redundancy into the medical record system. The current approach of keeping and reorganizing records demands the implementation of reliable system with proficient users’ authentication [5]. Patient desires to have the confidence that the privacy of their medical records are in safe hands [6]. Arising from the above, a health information