Esmaeil Mehraeen; Reza Safdari; Minoo Mohraz; Niloofar Mohammadzadeh; Seyed Ahmad Seyed-Alinaghi
Abstract
Introduction: Due to the widespread use of mobile-based systems, and the low cost of this technology, application of mobile-based self-management system can lead to adherence to the treatment and promotion of the health for the people living with human immunodeficiency virus (HIV). The purpose of this ...
Read More
Introduction: Due to the widespread use of mobile-based systems, and the low cost of this technology, application of mobile-based self-management system can lead to adherence to the treatment and promotion of the health for the people living with human immunodeficiency virus (HIV). The purpose of this study was to identify requirements for the mobile-based self-management system for these people.Methods: This study was a descriptive one, carried out in two main phases in year 2017. In the first stage, in order to identify the requirements for the mobile-based self-management system, similar articles were searched and reviewed, and in the second phase, identified requirements were validated using a researcher-made questionnaire. The statistical population was infectious diseases specialists affiliated with Tehran University of Medical Sciences, Iran. The collected data were analyzed using descriptive statistics methods.Results: The requirements for the self-management system were identified in four categories: demographic data requirements, clinical data requirements, technical capabilities, and self-management strategies. Furthermore, according to the research community' attitude, six data elements for demographic category, 10 data elements for clinical category, 11 features for technical capabilities, and 10 items for self-management strategies were selected.Conclusion: Use of proposed requirements strategies can improve the self-management skills and medication adherence of the people living with human immunodeficiency virus, and facilitate their communication with health care providers.
Esmaeil Mehraeen; Haleh Ayatollahi; Maryam Ahmadi
Volume 10, Issue 6 , December 2012, , Pages 779-788
Abstract
Introduction: Nowadays, with the advent of electronic medical records (EMR), the need for information sharing has increased. As a result, more attention should be paid to the security and confidentiality of information systems. In this research, information security in hospital information systems was ...
Read More
Introduction: Nowadays, with the advent of electronic medical records (EMR), the need for information sharing has increased. As a result, more attention should be paid to the security and confidentiality of information systems. In this research, information security in hospital information systems was investigated considering three dimensions (administrative, technical and physical) in the hospitals affiliated to Tehran and Shahid Beheshti Universities of Medical Sciences. Methods: This was an applied research study completed in 2012. The study population composed of information technology managers working in the hospitals affiliated to Tehran and Shahid Beheshti Universities of Medical Sciences, and the representatives of software companies. Data were collected using a questionnaire. To check the face and content validity of the questionnaire, experts’ views were investigated and the reliability of the questionnaire was confirmed using Cronbach’s Coefficient Alpha (=α 0/75). Descriptive and inferential statistics, such as t-test were used to analyze data. Results: The study results showed that most of the hospitals had addressed issues related to information security in hospital information systems, and all three dimensions had been taken into account. There was no significant difference between the level of information security in the teaching and the non-teaching hospitals. However, there was a significant difference between the views of the information technology managers and the perspectives of the software companies’ representatives about the technical dimension of information security. Conclusion: Although the information security in hospital information systems was evaluated at the acceptable level, planning and implementing more effective security policies are necessary to overcome weaknesses in different dimensions of information security. Keywords: Data Security; Hospital Information Systems; Health Information Technology