The potential of voice recognition technology in medical record documentation
Review
Keywords:
Electronic Health Records, Security, Privacy, Voice Recognition, Healthcare, Information TechnologyAbstract
Background: Electronic health records (EHRs) have become an integral part of healthcare, providing a digital representation of patient medical histories. However, the transition from paper-based to electronic records has raised concerns about the security and privacy of sensitive health data. Aim of Work: This study aims to provide valuable insights to stakeholders in the healthcare system on the need for implementing, selecting, developing, and using electronic health records that improve the privacy and security of patients. Methods: The review explores the potential of voice recognition technology in medical record documentation, examining the key security and privacy considerations surrounding electronic health records. Results: The study highlights the importance of ensuring the confidentiality, integrity, and availability of health data stored in electronic systems. It also discusses the impact of emerging technologies, such as cloud computing and mobile devices, on the security and privacy of electronic health records. Conclusion: Securing electronic health records is crucial to safeguarding patient privacy and maintaining trust in the healthcare system. The study emphasizes the need for a multidisciplinary approach involving experts in communications, instrumentation, and computer science to facilitate the secure exchange of medical data and enhance the overall quality of healthcare services.
Downloads
References
Achampong E. Electronic health record (EHR) and cloud security: the current issues. IJ- CLOSER 2014;2(6):417–20.
Alanazi HO et al. Meeting the security requirements of electronic medical records in the ERA of high-speed computing. JMed Syst 2015;39(1):165.
Albahri OS et al. Systematic review of real-time remote health monitoring system in triage and priority-based sensor technology: taxonomy, open challenges motivation and recommendations. J Med Syst 2018;42(5):80.
Allard T, Anciaux N, Bouganim L, Guo Y, Folgoc LL, Nguyen B, et al. Secure personal data servers: a vision paper. PVLDB 2010;3(1–2):25–35.
Carey DJ, Fetterolf SN, Davis FD, Faucett WA, Kirchner HL, Mirshahi U, et al. The Geisinger MyCode community health initiative: an electronic health record– linked biobank for precision medicine research. Genet Med 2016;18(9):906.
Alsalem MA et al. Systematic review of an automated multiclass detection and classification system for acute leukaemia in terms of evaluation and benchmarking, open challenges, issues and methodological aspects. J Med Syst 2018;42(11):204.
Amer K. Informatics: ethical use of genomic information and electronic medical records, J Am Nurses Assoc 2015;20(2).
Ancker J, Silver M, Miller M, Kaushal R. Consumer experience with and attitude toward health information technology: a nationwide survey. Am Medical Informatics Assoc 2012;1:152–6.
Anderson C, Agarwal R. The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information. Information Syst Res 2011;22(3):469–90.
Angst C, Agarwal R, Downing J. An empirical examination of the importance of defining PHR for research and for practice. Robert H. Smith School Research Paper No. RHS-06-011; 2006.
Bahtiyar S,, Çag˘layan MU. Trust assessment of security for e-health systems. Electron Commer Res Appl 2014;13(3):164–77. doi: https://doi.org/10.1016/j. elerap.2013.10.003.
Bansal G, Zahedi F, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst 2010;49(2):138–50.
Benaloh J, Chase M, Horvitz E, Lauter K. Patient controlled encryption: ensuring privacy of electronic medical records. In: Proc ACM workshop on cloud computing security; 2009, p. 103–14.
Brumen B, Hericˇko M, Sevcˇnikar A, Završnik J, Hölbl M. Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues? J Med Internet Res 2013 Dec 16;15(12):e283.
Centers for Medicare & Medicaid Services. Electronic Health Records. URL: https://www.cms.gov/Medicare/E-health/EHealthRecords/index.html.
Chen C-L, Huang P-T, Deng Y-Y, Chen H-C, Wang Y-C. A secure electronic medical record authorization system for smart device application in cloud computing environments. Human-Centric Computing Information Sci. 2020;10:1–31.
Cifuentes M, Davis M, Fernald D, Gunn R, Dickinson P, Cohen DJ. Electronic health record challenges, workarounds, and solutions observed in practices integrating behavioral health and primary care. J Am Board Fam Med 2015;28 (Supplement 1):S63–72.
Collier R. New tools to improve safety of electronic health records. CMAJ 2014;186(4):251. doi: https://doi.org/10.1503/cmaj.109-4715.
Collier R. US health information breaches up 137%. Can Med Assoc J 2014;186 (6):412. doi: https://doi.org/10.1503/cmaj.109-4731.
Cooper T, Fuchs K. Technology risk assessment in healthcare facilities. Biomed Instrum Technol 2013;47(3):202–7. doi: https://doi.org/10.2345/0899-8205- 47.3.202.
Dehling T, Sunyaev A. Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German nationwide health information technology infrastructure. Electron Markets 2014;24(2):89–99.
Dinev T, Albano V, Xu H, D’Atri A, Hart P. Individual’s attitudes towards electronic health records – a privacy calculus perspective. Ann. Information Syst. 2012.
Dorgham O, Al-Rahamneh B, Almomani A, Khatatneh KF. Enhancing the security of exchanging and storing DICOM medical images on the cloud. Int. J. Cloud Appl. Computing (IJCAC) 2018;8(1):154–72.
Edemekong PF, Haydel, MJ, 2018. Health Insurance Portability and Accountability Act (HIPAA).
Ermakova T, Fabian B, Zarnekow R. Security and Privacy System Requirements for Adopting Cloud Computing in Healthcare Data Sharing Scenarios. Proceedings of the 19th Americas Conference on Information Systems, 2013.
Gupta BB. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. In: Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press, Taylor & Francis; 2018, p. 666.
Gupta BB, Agrawal DP, (Eds.). Handbook of Research on Cloud Computing and Big Data Applications in IoT, IGI GlobalHershey; 2019.
Haque Rafita, Hasan Sarwar, Rayhan Kabir S, Rokeya Forhat, Muhammad Jafar Sadeq, Md Akhtaruzzaman, Nafisa Haque, Blockchain-Based Information Security of Electronic Medical Records (EMR) in a Healthcare Communication System, In: Intelligent Computing and Innovation on Data Science, Springer, Singapore, 2020, pp. 641–650.
Häyrinen K, Saranto K, Nykänen P. Definition, structure, content, use and impacts of electronic health records: a review of the research literature. Int J Med Inform 2008;77(5):291–304.
Healthcare Information Security. Princeton, NJ: ISMG; 2014. The State of Healthcare Information Security Today. Update on HIPAA Omnibus Compliance, Protecting Patient Data URL: https://www. healthcareinfosecurity.com/surveys/state-healthcare- information-security- today-s-23 [accessed 2019-02-04]
Hesse BW, Hansen D, Finholt T, Munson S, Kellogg W, Thomas JC. Social participation in health 2.0. Computer 2010;43(11):45–52.
HIMSS. Chicago, IL: HIMSS; 2015 Jun. 2015 HIMSS Cybersecurity Survey URL:https://www.himss.org/2015-cybersecurity-survey/full-report [accessed 2019-02-04]
Hunter ES. Electronic health Records in an Occupational Health Setting-Part I. A global overview. Workplace Health Safety 2013;61(2):57–60.
Wikina SB. What caused the breach? An examination of use of information technology and health data breaches. Perspect Health Inf Mana 2014;2014:1–16.
Hussain M et al. A security framework for mHealth apps on Android platform. Comput Secur 2018;75:191–217.
Hussain M et al. The landscape of research on smartphone medical apps: coherent taxonomy, motivations, open challenges and recommendations. Comput Methods Prog Biomed 2015;122(3):393–408.
Ives TE. The New ’E-Clinician’ guide to compliance. Audiol. Today. 2014;26 (1):52–3. [Google Scholar]
Jannetti MC. Safeguarding patient information in electronic health records. AORN J 2014;100(3):C7–8. doi: https://doi.org/10.1016/S0001-2092(14) 00873-4.
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D. Security of the Internet of Things: perspectives and challenges. Wireless Netw 2014;20(8):2481–501.
Kiah MLM et al. MIRASS: medical informatics research activity support system using information mashup network. J Med Syst 2014;38(4):37.
King T, Brankovic L, Gillard P. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. Int J Med Informatics 2011;81:279–89.
Kisekka V, Giboney J. The effectiveness of health care information technologies: evaluation of trust, security beliefs, and privacy as determinants of health care outcomes. J Med Internet Res 2018;20(4):e107.
Kruse CS, Beane A. Health information technology continues to show positive effect on medical outcomes: systematic review. J Med Internet Res 2018;20 (2):e41.
Kruse CS, Smith B, Vanderlinden H, Nealand A. Security techniques for the electronic health records. J Med Syst 2017;41(8):127.
Kuo K-M, Ma C-C, Alexander J. How do patients respond to violation of their information privacy. Health Information Manag J 2013;43(2):23–33.
Lafky D, Horan T. Personal health records: consumer attitudes toward privacy and security of their personal health information. Health Informatics J 2011;17 (1):63–71.
Lemke J. Storage and security of personal health information. OOHNA J 2013;32(1):25–6.
Liu V, Musen MA, Chou T. Data breaches of protected health information in the United States. J Am Med Assoc 2015;313(14):1471–3. doi: https://doi.org/ 10.1001/jama.2015.2252
Ma Q, Schmidt MB, Pearson JM, Herberger GR. An integrated framework for information security management. Rev Bus 2009;30(1):58–69.
Miotto R, Li L, Kidd BA, Dudley JT. Deep patient: an unsupervised representation to predict the future of patients from the electronic health records. Sci Rep 2016;6:26094.
Muhammad G, Alhamid MF, Alsulaiman M, Gupta B. Edge computing with cloud for voice disorder assessment and treatment. IEEE Commun Mag 2018;56(4):60–5.
Paganini P. Infosec Institute. 2014. Risks and cyber threats to the healthcare industry URL: https://resources.infosecinstitute.com/risks-cyber-threats- healthcare-industry/ [accessed 2018-06-01]
Perera G, Holbrook A, Thabane L, Foster G, Willison DJ. Views on health information sharing and privacy from primary care practices using electronic medical records. Int J Med Informatics 2011;80(2):94–101.
Pfleeger CP, Pfleeger SL, Margulies J. Security in computing. In: Security In Computing (5th Edition). Upper Saddle River, NJ: Prentice Hall; Feb 5, 2015:944.
Rohm A, Milne G Just. What the doctor ordered. The role of information sensitivity and trust in reducing medical privacy concern. J Business Res 2004;57:1000–11.
Rothstein MA. Health privacy in the electronic age. J Leg Med 2007;28 (4):487–501.
Sheikh A, Sood HS, Bates DW. Leveraging health information technology to achieve the ‘‘triple aim” of healthcare reform. J Am Med Inform Assoc 2015;22 (4):849–56.
Sittig DF, Singh H. A new socio-technical model for studying health information technology in complex adaptive healthcare systems. In: Cognitive Informatics for Biomedicine. Cham: Springer; 2015. p. 59–80.
Tejero A, de la Torre I. Advances and current state of the security and privacy in electronic health records: survey from a social perspective. J Med Syst 2012;36 (5):3019–27. doi: https://doi.org/10.1007/s10916-011-9779-x.
Verheij RA, Curcin V, Delaney BC, McGilchrist MM. Possible sources of bias in primary care electronic health record data use and reuse. J Med Internet Res 2018;20(5):e185.
Wang CJ, Huang DJ. The HIPAA conundrum in the era of mobile health and communications. JAMA 2013;310(11):1121–2. doi: https://doi.org/ 10.1001/jama.2013.219869.
Whetstone M, Goldsmith R. Factors influencing intention to use personal health records. Int J Pharmaceutical Healthcare Marketing 2009;3(1):8–25.
Win KT. A review of security of electronic health records. Health Information Manag. 2005;34(1):13–8.
Zulman DM, Nazi KM, Turvey CL, Wagner TH, Woods SS, An LC. Patient interest in sharing personal health record information. Ann Intern Med 2011;155 (12):805–11.
Published
How to Cite
Issue
Section
Copyright (c) 2018 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.