Professional Documents
Culture Documents
Introduction
1.1 Overview
Hospital is a health care institution that provides patient treatment by specialized staffs and
equipment’s. As hospitals are a vital service for providing health care facilities, proper
management of file records and efficient synching of patient data are essential. In the current
scenario hospitals follows a procedure of storing and maintaining data’s manually. A hospital
staff today has to do huge amount of paper work from the time of a patient’s admission, his
treatment and medicines and its costs till his discharge. The procedure followed are not
efficient as it is not compact, indexing or searching patient’s details is cumbersome. Privacy
has become an increasingly significant apprehension in today’s rapidly changing economy
primarily for personal and sensitive user data. The levels of personal data violation are
increasing day by day however privacy-preserving frameworks are available. This paper
conducted an in-depth analysis of contemporary frameworks to identify the key mechanisms
to produce a sophisticated data privacy framework to reduce the rate of data breach
particularly for the Patient Record Management System (PRMS). There are several studies
available that stated healthcare data privacy, still, complete data protection solution with the
application of privacy by design towards patients’ health data by ensuring privacy in each
layer of the PRMS are quite limited, which is the focus of this study.
1.2 Motivation
This system motive for the people, who are Busy with their professional work. They can get
doctor suggestions through online and can share their problems with doctor. The self-
diagnosis features help the patient for taking medicine without consulting the doctor. It can
provide treatment up to some level that means rectifiable diseases without doctor suggestion
with some dosage of tablets. Other then this online patient treatment system is capable of
managing records and other reports. It refers to a number of efficient automated systems
designed for tracking patient information, diagnoses, prescriptions, interactions and
encounters within healthcare organizations like medical clinics or hospitals.
1.3 Problem Definition
In this busy world we don’t have the time to wait in infamously long hospital queues. The
problem is, queuing at hospital is often managed manually by administrative staff, then
take a token there and then wait for our turn then ask for the doctor and the most
frustrating thing - we went there by traveling a long distance and then we come to know
the doctor is on leave or the doctor can’t take appointments. HMS will help us overcome
all these problems because now patients can book their appointments at home, they can
check whether the doctor they want to meet is available or not. Doctors can also confirm
or decline appointments, this help both patient and the doctor because if the doctor
declines’ appointment then patient will know this in advance and patient will visit
hospital only when the doctor confirms’ the appointment this will save time and money of
the patient.
PRM is essential for all healthcare establishments, be it hospitals, nursing homes, health
clinics, rehabilitation centres, dispensaries, or clinics. The main goal is to computerize all
the details regarding the patient and the hospital. The installation of this healthcare
software results in improvement in administrative functions and hence better patient care,
which is the prime focus of any healthcare unit. Research initiatives in the field of
healthcare data privacy with complete resolution towards the protection of personal and
sensitive data are rather scant, despite that, the section analysed some of the closely
related works to address the key aspects to design prolific privacy by design framework.
2. Literature Survey
Bari and O’Neill [1] suggested that patients’ health records are collected by different
platforms such as social media, pregnancy and mental health apps, depression and smoking
cessation apps, wearable fitness trackers. All these platforms are joined to medical records
and can be shared with third parties for advertising and other purposes, often without any
consent from the individual using the applications. The range and volume of patient data that
are in digital form are rapidly growing.
[2]. The Health Insurance Portability and Accountability Act of 1996 is known as HIPAA
that outlines the legal use and disclosure of health information.
[3]. The European General Data Protection Regulation (GDPR) and the California Consumer
Privacy Act (CCPA) are two data protection laws that use a similar conceptual approach to
permit and prohibit the use of personal information and rights and obligations of access and
control.
[4]. HIPAA and GDPR contain similar patterns for patient and users consent for use or
disclosure and rules to be analysed to ensure that individuals are notified if any data breach
occurs.
[5]. This research recommended that modernizing HIPAA by comparing the models HIPAA
and GDPR. Moreover, their research extended and adapted the HIPAA framework and
suggested five areas to preserve the privacy of patients’ information by using new data-driven
tools to manage their healthcare. The areas are health data in scope, regulated entities,
permitted use of personal health data, security standards, breach notification requirements
[6]. The limits of HIPAA framework are almost a quarter century old. Public may not trust
the appearance of repeated scandals without clear guidelines. Therefore, the potentiality to
adopt HIPAA is challenging to ensure confidentiality for digital health data . Sahi et al.
[7] suggested that e-healthcare provides benefits to the patients’ and healthcare providers,
however, the services are not fully developed and has lacked widely implemented obligatory
facilities such as confidentiality, integrity, privacy and user trust. The quality of healthcare
services and patient trust are the primary features of any healthcare operation. Trusts of the
patients are dependent on the issues of confidentiality, authenticity and data management.
Ensuring privacy is one of the biggest obstacles to achieving the success of the healthcare
solution in winning the trust of the patients
[8]. Privacy requirements are compounded by the fact that the healthcare data managing is
extremely personal and private in nature, consequently, the misconduct either intentionally or
by mistake can seriously affect the
[9] Patient as well as the organizational prospects. Privacy concerns are identified in this
research that focuses on certain failure parts of the healthcare organization to address all the
aspects of privacy. Their research gradually alters the e-healthcare enterprise controls from an
organizational level to the level of patients while doing the implementation. In this way,
patients have more control over decision making to protect their healthcare information.
Their investigation requires more efforts to do this assessment for altering to patients’ level
control from the e-health enterprise control. Moreover, their existing research is divided
based on techniques used such as anonymization/pseudonymization and access control for the
privacy of stored data that supports the privacy requirements (accountability, integrity,
identity management)
[10]. Their research mainly reviews existing related studies to find out if their proposals have
any possibilities to the privacy requirements and concerns of the patients.
Software requirement
Operating System - Windows 7/8/10
Front End - Android
Android SDK
Hardware Requirement
Processor - Intel i5/i7
RAM - 4GB(min)
Hard Disk - 40 GB
Key Board - Standard Windows Keyboard
Android Mobile
4 System Design
Geofencing Algorithm
• Location-based services: When a user is near a service point and their car is up for
service, send a message to remind them of the upcoming service or provide an
incentive offer to come in.
• Track a child or pet: When a child or pet is exiting the home or safe place and enters
into an unfamiliar place, a device can send parents an alert message. Angel Sense and
Tracker are existing wearable solution for kids and pets, respectively. These products
support the geofencing feature
Fig. Geofencing Algorithm
It has been observed that to receive medical treatment in most of our hospitals, the patients
queue up for several hours from one unit of the hospital to another starting from obtaining a
new hospital folder, or retrieving an old one before consulting a doctor, to the laboratory unit
for lab test then to the pharmacy to get the prescribed drugs and so on. With the manual
processes involved in handling the patient most of them waste the whole day in the hospital.
This system helpful for the people, who are Busy with their professional work. They can get
doctor suggestions through online and can share their problems with doctor. The self-
diagnosis features help the patient for taking medicine without consulting the doctor. It can
provide treatment up to some level that means rectifiable diseases without doctor suggestion
with some dosage of tablets. Other then this online patient treatment system is capable of
managing records and other reports. It refers to a number of efficient automated systems
designed for tracking patient information, diagnoses, prescriptions, interactions and
encounters within healthcare organizations like medical clinics or hospitals. In the current
context, getting statistical information about the record of a patient need extra effort and only
helps the hospital management and is not useful to the patient out of the hospital or remote
areas. This system provides a solution to this problem by providing automatically generated
statistical information in many aspects and created the computerized hospital environment .
5 Analysis Module
The waterfall model is a sequential design process, used in software development processes,
in which progress is seen as flowing steadily downwards (like a waterfall) through the phases
of conception, initiation, analysis, design, construction, testing, production/Implementation
and maintenance. Waterfall approach was first SDLC Model to be used widely in Software
Engineering to ensure success of the project. In the waterfall approach, the whole process of
software development is divided into separate phases. In Waterfall model, typically, the
outcome of one phase acts as the input for the next phase sequentially. Following is a
diagrammatic representation of different phases of waterfall model.
5.2. System Design: The requirement specifications from first phase are studied in this phase
and system design is prepared. System Design helps in specifying hardware and system
requirements and also helps in defining overall system architecture.
Figure : Waterfall Model
3. Implementation: With inputs from system design, the system is first developed in small
programs called units, which are integrated in the next phase. Each unit is developed and
tested for its functionality which is referred to as Unit Testing.
4. Integration and Testing: All the units developed in the implementation phase are
integrated into a system after testing of each unit. Post integration the entire system is tested
for any faults and failures.
5. Deployment of system: Once the functional and non-functional testing is done, the
product is deployed in the customer environment or released into the market.
6. Maintenance: There are some issues which come up in the client environment. To fix
those issues patches are released. Also to enhance the product some better versions are
released. Maintenance is done to deliver these changes in the customer environment.
All these phases are cascaded to each other in which progress is seen as flowing steadily
downwards (like a waterfall) through the phases. The next phase is started only after the
defined set of goals are achieved for previous phase and it is signed off, so the name
“Waterfall Model”. In this model phases do not overlap.
To help the developers to understand the code base and enable them to make changes
quickly.
User Acceptance Testing (UAT) is a type of testing performed by the end user or the client
to verify/accept the software system before moving the software application to the production
environment. UAT is done in the final phase of testing after functional, integration and
system testing is done.
The main Purpose of UAT is to validate end to end business flow. It does not focus on
cosmetic errors, spelling mistakes or system testing. User Acceptance Testing is carried out
in a separate testing environment with production-like data setup. It is kind of black box
testing where two or more end-users will be involved.
UAT is performed by –
Client
End users
Communication
Literature survey
Define scope
Develop SRS
Plan the project
Design mathematical
model
Feasibility Analysis
Develop work
breakdown structure
Planning project
schedule
Design risk
management plan
Execute the
project
6 Other Specifications
6.1 Advantages
Enabling quick access to patient records for more coordinated, efficient care. Securely
sharing electronic information with patients and other clinicians. study was to assess PRM
data types and functionalities through a review of the literature to inform the health care
informatics community, and to provide recommendations for PRM design, research, and
practice.
Medical record
Limitations
Cybersecurity Issues
While digital storage can be safer than carrying physical papers around, data breaches are
becoming much more widespread. Most certified PRM systems have security measures in
place, but the staff of a physician’s business must be trained in basic digital security to ensure
they do not leave their stations vulnerable to unauthorized access. Having your patient’s data
fall into the wrong hands is not acceptable.
Since other healthcare professionals partnered with you, such as personal trainers and
pharmacists, may be using the same electronic health record system as you, it is essential that
you keep patient records updated after every appointment or consultation.
Based on the findings, the following conclusions were reached. The implementation of a
patient record maintain android app for a hospital will be a big relief for medical doctors
when operational. The system can be a tremendous help to hospital management. It will also
serve as a tool for quick operational decision making of the patient, thus enabling them to
reach the solutions of their problem more quickly and more accurately than human being.
Thus the overall effect of the use of computer in medical system is that patients acquire
competence, accuracy, and effectiveness within the shortest time in their operations and can
break into new ground with certainty.
Future Scope
8 References
1] A. Pika, M. T. Wynn, S. Budiono, A. H. M. ter Hofstede, W. M. P. van der Aalst,
and H. A. Reijers, ‘‘Privacy-preserving process mining in healthcare,’’ Int. J. Environ.
Res. Public Health, vol. 17, no. 5, p. 1612, Mar. 2020, doi: 10.3390/ijerph17051612.
[2] K. Abouelmehdi, A. Beni-Hessane, and H. Khaloufi, ‘‘Big healthcare data:
Preserving security and privacy,’’ J. Big Data, vol. 5, no. 1, pp. 1–18, Dec. 2018.
[3] V. Diamantopoulou, N. Argyropoulos, C. Kalloniatis, and S. Gritzalis,
‘‘Supporting the design of privacy-aware business processes via privacy process
patterns,’’ in Proc. 11th Int. Conf. Res. Challenges Inf. Sci. (RCIS), May 2017, pp.
187–198.
[4] A. McLeod and D. Dolezel, ‘‘Cyber-analytics: Modeling factors associated with
healthcare data breaches,’’ Decis. Support Syst., vol. 108, pp. 57–68, Apr. 2018.
[5] R. Taplin, Managing Cyber Risk in the Financial Sector: Lessons From Asia,
Europe and the USA. Evanston, IL, USA: Routledge, 2016.
[6] F. H. Semantha, S. Azam, K. C. Yeo, and B. Shanmugam, ‘‘A systematic
literature review on privacy by design in the healthcare sector,’’ Electronics, vol. 9,
no. 3, p. 452, Mar. 2020.
[7] OAIC. Notifiable Data Breaches Report, Australian Government—Office of the
Australian Information Commissioner. Accessed: Jan. 25, 2021. [Online]. Available:
https://www.oaic.gov.au/privacy/notifiable-databreaches/notifiable-data-breaches-
statistics/notifiable-data-breachesreport-january-june-2020/
[8] A. H. Seh, M. Zarour, M. Alenezi, A. K. Sarkar, A. Agrawal, R. Kumar, and R.
A. Khan, ‘‘Healthcare data breaches: Insights and implications,’’ Healthcare, vol. 8,
no. 2, p. 133, May 2020, doi: 10.3390/ healthcare8020133.
[9] N. Whigham. Health Sector Tops the List as Australians Hit by 300 Data Breaches
Since February. News.com.au. Accessed: Nov. 20, 2020. [Online]. Available:
https://www.news.com.au/technology/online/ hacking/health-sector-tops-the-list-as-
australians-hit-by-300-databreaches-since-february/news-story/
5e95c47694418ad072bf34d872 e22124