Methodology Final Edit
Methodology Final Edit
3.0 Introduction
This section gives an exhaustive portrayal of the exploration reasoning, research approach,
research technique, information assortment strategies and instruments, pre-testing
methodology and information examination, moral contemplations, restrictions and the work
plan.
3.1 Research Design
A research design is an overall framework identified by the researcher to merge the
different study components coherently and logically (Debor, 2018), hence, ensuring the
study problem is solved. It is also known as the blueprint for the collection, interpretation,
analysis, and discussion of data (Leavy, 2017). This study will adopt Saunders et al. (2019)
research Onion as the overall framework for the development of the research design
Saunders Research Onion is a layered approach that illustrates the different stages involved
in
the development of a research methodology (Saunders et al., 2019). While using the
research
onion, one must go from the outermost layers i.e., Research Philosophy, Research
Approaches,
Research Strategies, time horizons and lastly to the innermost layer which is Data Collection
Methods
3.2 Research Philosophy.
Twala and Kekwaletswe (2019) define a research philosophy as a bunch of convictions
concerning the peculiarities or the idea of the truth that is being investigated, and how
information about that specific peculiarity ought to be gathered, broken down and utilized.
Research Philosophy is generally examined as far as metaphysics and epistemology where
cosmology alludes to the credibility of the data and how one comprehends its presence and
epistemology alludes to the legitimacy of data expected for the examination and how one
can get it (Mosweu and Mosweu, 2020). Sounders research Onion recommends a few ways
of thinking that are mostly arranged into two broad paradigms namely; positivism and
constructionism. (Monette et al., 2014). These paradigms are sometimes described as
empiricism and interpretivism but the underlying assumptions are broadly similar (Bryman
2012). Manian, Jamporazmey and Sherkat, (2014) define positivism as the approaches that
apply scientific methods to human and social affairs. Based on Francis Bacon’s second way
of discovering the truth, positivism involves approaches that apply scientific methods to
human and social affairs which are conceived as belonging to a natural order that is open to
objective enquiry (Davoudi, 2012).
Interpretivism alludes to a humanistic methodology that accentuates the need to
comprehend or decipher the convictions, intentions, and reasons of social entertainers
(people) to get social reality (Scauso, 2020). The Interpretivism theory underscores the
utilization of subjective investigation over the quantitative examination to acquire the ideal
outcomes (Ryan, 2018)
The study will adopt the interpretivism paradigm because it enables understanding how
people perceive the world (individual or group) and the meanings and values that people
assign to a particular phenomenon (Briony 2006). Talk about the eHealth security and
privacy challenges for LMIC health facilities. These views will be used as inputs to the
development of an Information Security Governance Model for health facilities in LMICs
The Design Method starts with the problem definition, basically questioning: [Who] need(s)
[what] because [why]?. What is the problem? Who has the problem? Why is it important to
solve? So, rather than scientific curiosity, the design is actually driven by needs of society
(Monson, 2021). The second step is the background research, i.e., the state-of-the-art that
includes scientific knowledge, but it also includes devices, components, market and
economic conditions (Monson, 2021). These steps correspond to the problem
characterization and observations in the scientific method. After understanding the problem
and existing solutions, the third step is to specify requirements, i.e., the characteristics that
your solution should meet. Requirement’s specification is based on what is known from
other existing solutions, as well as by consulting users that need it. Again, this step would
correspond to the formulation of a hypothesis, or proposing an explanation. The fourth step
is to propose a solution. Researchers should brainstorm solutions within their group and
choose the one that better satisfies the project goals, meeting all (or most) requirements.
The fifth step, the solution is then further detailed and modeled, by means of modeling
languages, drawings, and so forth. This need of a model is important to predict the behavior
of the solution before prototyping (Monson, 2021). Similarly, the scientific method needs to
define the experiment and its procedures. Once researchers have a clear idea of what to do,
they start the sixth step, to build a prototype. In the scientific method this is the test of the
hypothesis by experimentation. The seventh step is the test and redesign of the prototype
by multiple iterations. Similar to the evaluation and improvement steps in the scientific
method. And at last, in both methods, researchers should communicate results, through
technical reports, publications and documentation.
A structured review of the literature was done to identify success factors that influence the
adoption of eHealth standards/technology. At the start of the study, we consulted seven
eHealth stakeholders drawn from the Ministry of Health, Ministry of ICT, Uganda Bureau of
standards, four top health system levels in Uganda. The decision was influenced by the
research field, that these stakeholders represent the views of problem owners and
therefore helped identify pertinent issues to the success of eHealth in Uganda. The
stakeholders helped conceptualise the context of success in the adoption of eHealth
standards. They refined the objectives to focus the study proper preparation mapping,
adoption process, and standards adoption outcomes.
Search strategy: To perform a full search, articles for this review were gathered from
PubMed and Google scholar. The choice of PubMed and Google scholar is based on the
argument that one, they provide free access allowing researchers to retrieve full papers of
all relevant publications. Two, almost all (very percentage) health informatics publications
are indexed in PubMed. Since 91% of all PubMed content is indexed in MEDLINE the
database of all medical publications and a study by [36], reveal that a combination involving
MEDLINE and Google scholar can achieve a recall of not less than 98.3%. Therefore, the
study believes that these two databases are suitable to retrieve relevant literature regards
factors that influence potential eHealth standards adoption. The search strategy included
three categories of keywords: (i) “adoption” OR “adoption success”; (ii) “electronic health”
OR “e-health”; and (iii) “standard” OR “technology” OR “innovation”. Synonyms of the
keywords were used to perform an exhaustive search of relevant literature.
3.3.1 Study Selection and Data Extraction: An article was included if it satisfied the inclusion
criteria: (1) peer-reviewed publication in English; (2) has a full-text status; and (3) discusses
success factors or enables of technology/standard adoption and or implementation in
health. Evaluation of the success factors is not a requirement for inclusion. After removing
duplicates, the studies were screened for inclusion/exclusion, and only nineteen peer-
reviewed publications remained to be used in the extraction of information that was used in
the analysis.
The following information was extracted into a spreadsheet: first author surname and year
of publication, type of study, type of study country, theory/model/standard, constructs of
the theory/components that guided the study, success factors that inform/influence
successful adoption/contextualization of standard, and for the standards: where they have
been implemented, and results of success (if evaluated). Analysis qualitatively explored the
concept of eHealth standards adoption success and success factors of eHealth standards
adoption.
The author used identified constructs to study the adoption of eHealth artefacts in the ratio
of 47%, 24%, and 29% of the time organizational, human dimension and technological
respectively. To attain full benefits of the eHealth artefact, then the technology, innovation,
or standard must diffuse and infuse into the healthcare work practices of the health system.
Besides studies have explored various pre-existing conditions that influence the success of
technology/standards adoption. The identified constructs were used to develop the model
in the Figure that can be used to assess the potential success of eHealth standards adoption.
More often than not e-health projects have to be integrated within existing healthcare
processes and systems over which they have no direct mandate. There may be other e-
health projects planned or already under way. Furthermore, such projects comprise so
many variables those general solutions are not directly applicable and have to be
tailored to each case.
Essentially, mHealth and eHealth inherits problems from mobile computing and wireless
networks. The communication channels are more vulnerable due to their wireless
characteristics (e.g., network eavesdropping and spoofing) and mobile devices have more
constrained amount of processing power and memory (i.e., need for lightweight
cryptography). Devices can be shared among users, and they are more vulnerable to theft,
loss and damage, which may result in data breaches, data loss, and privacy infringements.
Regarding general issues linked to mHealth and eHealth security and privacy, some
interesting publications can be discussed. From a more technical perspective, in [38] the
authors proposed a number of security and privacy recommendations for mHealth and
eHealth developers. These recommendations were made based on a preliminary survey of
169 papers, resulting in the nine general recommendations listed below:
• Authentication – Users should be able to authenticate with a unique ID and password (or
multi-factor authentication). Passwords should be kept in secrecy and should reach
appropriate levels of security.
• Security and confidentiality – Use of encryption mechanisms (e.g., AES) with proper
parameter configurations (i.e., key size).
• Inform patients – Present privacy policy to users before collection of data that informs
about the user rights and specifies the purposes of data collection and processing.
• Data transfer – Use secure communication channels (e.g., TLS, VPNs) while transferring
data among entities. Notify user about data transfers.
• Data retention – Inform users about retention policy. The data should be kept only for the
necessary time to accomplish the initial purpose. User should be able to check when data is
deleted.
• Body Area Network communication – Use security mechanisms for authentication and key
distribution among sensors and smart-phones; establish secure communication channels
among devices.
• Breach notification – In case of data breaches, the competent authorities and users should
be notified. Entities should help users in order to relieve the consequences and restore
possible damages.
Overall, the recommendations help developers to have a glimpse about privacy and security
issues in mHealth and eHealth. However, they are incomplete if compared to existing
legislations on privacy and data protection, and thus, have limited practical use. In the case
of European Union (EU), the General Data Protection Regulation (GDPR) (EU Commission,
2015) is the upcoming regulation for personal data privacy and protection, replacing the EU
Data Protection Directive 95/46/EC (European Union, 2018)
Many countries (i.e., separate legal jurisdictions) however do not have specific legislation for
data privacy (Graham Greenleaf, 2012). This does not imply a legal void in the area, but
privacy rights might stem from the constitution or consumer rights; and in the case of
healthcare, from medical codes of conduct, and so on. Thus, from the legal perspective,
some publications help to bridge this gap between privacy and mHealth and eHealth
technologies. For example, (Hibah Hussain,2013) presents a list of five guiding principles
for mobile privacy in the context of developing countries ( that map to principles of the
GDPR):
Principle 1
Address Surveillance Risks – Projects should take steps to ensure that user data is secure
from third party surveillance, e.g., user discriminatory profiling can be made by mobile
operators and government.
Principle 2
Limit Data Collection and Use – Projects should limit data collection to what is absolutely
necessary for the project’s goal, e.g., by employing access control, data retention policy, and
not collect unnecessary data.
Principle 3
Promote and Facilitate Transparency – Projects should be transparent about what data is
collected, how it is shared, and how it might be used in the future, e.g., user notifications,
data transfer policies, audit trails of others that also have access to the data.
Principle 4
Incorporate User Feedback – Projects should give users the ability to access, amend, and/or
delete their data, e.g., create user interfaces, create communication channels to receive
feedback from users.
Principle 5
Assume Responsibility – Projects should assume accountability for potential risks and harms
incurred via their projects and platforms, e.g., perform risk assessment, plan incident
response, notify data breaches. The content of the recommendations (Martínez-Pérez, De
la Torre-Díez, & López-Coronado, 2014) and the guiding principles (Hibah Hussain,
2013) offer a good starting point for developers and project leaders. However, in practice,
security and privacy analysis should be done case-by-case, given the complexity, multiplicity
of actors, jurisdictions, and highly culture-specific dimensions of privacy (Thomson Reuters
Foundation,2013).
Here we review some fundamental cryptographic mechanisms and protocols used in the
research, specifically for MDCSs. In brief, a Key Management Mechanism (KMM) is used to
provide Authentication and Key Exchange (AKE) between parties (user’s mobile and
application server). Authentication protocols and key derivation schemes for MDCSs usually
rely on symmetric cryptography, using password authentication. These protocols should
also give support for online and offline user authentication. Other mechanisms should cope
with confidentiality of stored and in-transit data, by means of encryption schemes for
secure storage and transmission. As a result, the security background herein presented
forms the building blocks of our solutions.
Typically, the output of a KDF is employed in one of two manners: it can be locally stored in
the form of a token for future verifications of the password or it can be used as the secret
key for data encryption and/or authentication. Whichever the case, such solutions internally
employ a one-way function (e.g., hash), so that recovering the password from the KDF’s
output turns out to be computationally infeasible (Fujioka, et al.,2014). Nonetheless,
attackers can still use dictionary attacks (Schneier, 2015) and test many different passwords
combinations until a match is found (i.e., brute force). KDFs usually rely on two basic
strategies for preventing such brute force attacks. The first is to purposely raise the cost of
every password guess in terms of computational resources, such as: processing time and/or
memory usage. The second is to take as input not only the user-memorisable password, but
also a sequence of random bits known as salt 3 (Schneier, 2015). The presence of such
random variable thwarts several attacks based on pre-built tables of common passwords,
i.e., forces the attacker to create a new table from the scratch for every different salt. The
salt can, thus, be seen as an index into a large set of possible keys derived from the
password, that does not have to be memorized by users or kept in secret.
In principle, KDFs could be used for data delivery: if the local and remote systems share the
same password, they could exchange data by revealing to each other the salt employed for
generating the key that protects such data. However, since this would allow attackers to use
the same salt in an offline dictionary attack, KDFs are usually employed only for local data
storage, establishing a secure channel between the human user and the local system. Data
delivery to remote locations usually employs Password Authenticated Key Exchange (PAKE)
protocols. Such schemes allow two or more parties who share a password to authenticate
each other and create a secure channel to protect their communication ( for example,
(Bellare, Pointcheval, & Rogaway, 2000). To be considered secure, a PAKE solutions
must ensure that an unauthorized party ( that fully controls the communication channel but
does not know the password) is unable to learn the resulting key and is, as much as possible,
unable to guess the password using offline brute force attacks. The Secure Remote
Password (SRP) project group (O'Brien et al., 2020). describes the following attacker model
for PAKE protocols: (a) attackers have complete knowledge of the protocol; (b) attackers
have access to a large dictionary of commonly used passwords; (c) attackers can eavesdrop
on all communications between client and server; (d) attackers can intercept, modify, and
forge arbitrary messages between client and server; and, (e) a mutually trusted third party is
not available. Looking briefly into the history of PAKE protocols, the Encrypted Key Exchange
(EKE) (Bellovin, & Merritt, 1992) was probably the first successful proposal. Although
several of the published methods were flawed, the surviving and enhanced forms of EKE
have effectively amplified the security of using passwords to establish shared keys for
confidential communication and authentication. Other provably-secure PAKE include the
schemes described in (Brusilovsky et al., 2010) (which uses the standard model4 ) and in
(Bellare, & Rogaway, 1993) (which uses the random oracle model5 ). This groups of EKE-
inspired proposals are commonly referred as EKE family of protocols.
At the time that user and server agree on a common shared key (e.g., the ephemeral keys
aforementioned) by means of a PAKE protocol, this key can be used to protect the data
stored in the mobile phone. This secure storage mechanism should encrypt all the sensitive
information that will reside in the mobile storage (e.g., configuration files, user’s data) and
the in-transit data that is temporarily stored and sent to the server. Hence, encryption
assures data confidentiality letting only authorized parties to read data. This mechanism
shall use sufficiently lightweight encryption algorithms owing to the device’s limited
processing and memory capacity. However, encryption carries the risk of making data
unavailable due to data transformation, or if anything goes wrong with the key
management process. In other words, developers should be aware that the key
management adds complexity since at least on the server-side its necessary to store partial
values to rebuild users’ keys in order to decrypt and to consolidate received data.
[PIA is] “a process whereby the potential impacts and implications of proposals that involve
potential privacy-invasiveness are surfaced and examined.” (Clarke, 2019) Or a more
detailed construction: “a privacy impact assessment as a methodology for assessing the
impacts on privacy of a project, policy, programme, service, product or other initiative and,
in consultation with stakeholders, for taking remedial actions as necessary in order to avoid
or minimise negative impacts. A PIA is more than a tool: it is a process which should begin at
the earliest possible stages, when there are still opportunities to influence the outcome of a
project. It is a process that should continue until and even after the project has been
deployed.” (Clarke, 2019)
PIAs can be tailored to a specific technology and application. For instance, RFID PIA
Framework which was developed by industry players and endorsed by the Article 29
Working Party6 (Wright, 2012). Such approach creates a PIA template that is pertinent for a
specific industry sector. A PIA template establishes a four-stage process (Wright &
Hert, 2012). (1) a full description of the application and scenario; (2) identification of
privacy threats; (3) a proposal of technical and organizational mitigating measures; and, (4)
document the resolution (results of the analysis) regarding the application. In the same way,
mHealth and eHealth developers could benefit from PIA templates.
High quality healthcare requires sharing data. Access control is one of the straightforward
strategies to enforce confidentiality of patient’s information in health systems. However, we
believe that besides the typical binary decision of revealing or not a data value, access
control can be further improved with data obfuscation, i.e., to lower individual data item
accuracy in a systematic, controlled, and statistically rigorous way to guarantee patient’s
privacy while retaining its usefulness. For instance, instead of revealing the patient’s age
one can reveal a range of values. Or even, replace the of medical condition or disease by a
more general term (e.g., “Human Immunodeficiency Virus (HIV) infection” replaced by
“Infectious Disease”). Besides, individuals’ health information are also important to create
rich statistical databases for researchers and to support public health programs. In such
cases, data anonymisation should be employed, i.e., to protect privacy by making a number
of data transformations so that individuals whom the data describe remain anonymous. The
anonymisation process can have variable degrees of robustness (European Commission,
2018) depending on how likely is to: 1) single out an individual in the dataset; 2) link
records concerning the same individual; or, 3) infer the value of one attribute based on
other values. In essence, all these circumstances should be avoided, resulting in an
anonymised dataset. Therefore, anonymised data is not considered personal data, so that,
data privacy laws would no longer apply.
In light of the various challenges to the standardization of digital health in Uganda’s health
system (Alunyu et al., 2021; Kiwanuka et al., 2021), we derived and validated requirements
to guide the development of the digital health standards and Enterprise Architecture (EA)
framework. These requirements were also informed by literature and success stories in
other countries. The requirements are presented under three broad categories as follows;
A. Digital Health Standards – are requirements that should be met by MoH when developing
standards/guidelines/SOPs for patient and health data, standards for the communication
infrastructure (ICT including devices, network and connectivity, and use), security and
privacy standards, and when conducting the activities of the digital health standardization
process.
B. Digital Health Architecture – are requirements that should be met by MoH, Health
Development Partners and other stakeholders to streamline digital health implementations
and governance in Uganda.
C. Digital Health Capacity Building – are requirements for building the human resources
required to implement and use digital health. These includes requirements for ICT skills
development and training, sensitization of healthcare professionals and health
informaticians on emerging digital health trends, adopted technologies, and
guidelines/SOPs, and training on the digital health standards itself and how to apply such
standards.
Requirements for the digital health standards shall cover the scope of data standards
(semantic and syntactic interoperability), the communication infrastructure that support
HIE, and the security and privacy of both the patient data that is collected, and the
components of the communication infrastructure. Table 2 presents the three main
categories of the digital health standards.
Data Standards The following standards shall be applied to ensure that the patient (health)
data collected, information processed, shared, and stored are in formats that support both
semantic and syntactic interoperability.
(i). The standards should be explicit about data sharing and exchange across the four
domains including business, data, applications, security and technology.
(ii). The standards should be implementable using the available resources (technical
expertise, technology, infrastructure, finance etc.).
(iii).The standards should be well documented and with a clear dissemination strategy.
Requirement DHS_DS02 DHS_DS02:
Adopt digital health standards for electronic sharing and exchange of patient data.
(i). Develop guidelines on what and how to (harmonize) adopt digital health standards.
(ii). Create regulatory frameworks that guide the adoption and implementation of digital
health data exchange standards in DHS_DS01.
(iii).Allocate resources for the adoption process for digital health standards.
3.1.2 Communication Infrastructure / Technology Standards
Four key requirements need to be met to realize the role of electronic health
communication infrastructure to support reliable and timely exchange of patient data for
the purposes of patient care and health information sharing for timely and informed
decision making. The requirements are;
Develop minimum requirements for the acquisition and maintenance of ICT infrastructure
for digital health.
(i). Specify minimum requirements for health facilities and agencies for acquiring ICT devices
for digital health.
(ii). The minimum requirements for health facilities and agencies for acquiring
communication infrastructure for digital health should be contextual, ubiquitous and secure
to enable protection, privacy and confidentiality of shared data.
(iii).The guidelines should specify topologies, protocols, middleware, security and privacy
mechanisms.
(iv).The guidelines should specify a set of administrative, technical and managerial actions
that should be applied during the lifecycle of the digital health infrastructure.
(i). Specify the terms for zero rating of healthcare services by telecommunication service
providers. (ii). Specify the expected quality of service to support healthcare communication
in Uganda’s healthcare system.
Develop a funding model for the digital health communication infrastructure for health
facilities.
(i). The model should specify critical areas of infrastructure to be funded, possible sources of
funding and the responsible authorities.
(i). The policy should emphasize the use of diverse sources of energy focusing on clean
energy (renewable energy) such as solar, wind, water (hydro), biomass, and geothermal.
The scope of digital health security includes authentication, data integrity, system security
and network/Internet security. Therefore, for Uganda to ensure digital health security and
privacy of its data systems, the following requirements should be met.
Adopt officially the digital health data security guidelines to support the core data security
elements of confidentiality, integrity, and availability. DHS_SP01
Requirement’s Specification
(i). The guidelines for digital health data security should be tailored towards the digital
health strategy for Uganda as well as the Uganda Data Protection and Privacy Act 2019, and
international information security standards such as ISO/IEC 2700 series among others;
outlining how the cardinal principles of confidentiality, integrity, and availability (CIA) should
guide policies/controls designed to protect health data.
(ii). The guidelines should specify a mechanism for monitoring implementation and
enforcing compliance with health data security controls.
Develop a digital health information security and privacy standard/guideline to ensure all
health facilities deploy security and privacy measures that protect privacy and
confidentiality of electronic patient data.
(i). The security and privacy standard/guideline should outline how the cardinal principles of
confidentiality, integrity, and availability should guide policies/controls designed to protect
health data.
(ii). The standard should define the full scope of digital health security and data privacy
measures that goes beyond physical security to identifying health information and related
assets plus potential threats, vulnerabilities and impacts.
(iii).The security and privacy standard/guideline should have clear indicators for compliance
with the Uganda Data Protection and Privacy Act.
(iv).The security and privacy standard/guideline should outline how personal identifiable
data can be protected.
(v). The security and privacy standard/guideline should have an M&E plan specifying how
risks faced by health data residing on digital health systems can be mitigated.
(vi).Also, the guidelines for digital health data security should be tailored towards the digital
health strategy for Uganda as well as the Data Protection and Privacy Act 2019, and
international information security standards such as ISO/IEC 2700 series among others;
outlining how the cardinal principles of confidentiality, integrity, and availability (CIA) should
guide policies/controls designed to protect health data.
To keep abreast with developments in technology, standards are reviewed from time to
time. Also, it is important to ensure proper implementation and monitoring of
compliance with agreed-upon standards. The entire process that entails standards
determination, implementation, compliance monitoring and review is what is referred
to as the standardization process. The requirements for the process of standardization
of digital health in Uganda include the following.
Requirement DHP_SP01
Specify criteria for determining suitable standards for syntactic (rules and format) and
semantic (shared meaning) interoperability.
Clearly define a systematic process to guide the MoH and stakeholders who are
selecting/determining the digital health standards.
Properly articulate the implementation plan for digital health standard. (v). Specify criteria
and tools for testing / validating the standards.
Have a clear M&E plan including who conducts it, frequency, and criteria.
Have a clear strategy for the selection and composition of stakeholders who participate
in the digital health standardization process.
Requirement DHP_SP02
DHP_SP02: Create a collaborative platform where all stakeholders can participate online
in the development, review and/or monitoring compliance with digital health
standards.
Avail centralized (online) resources and tools to support interaction and/or group decisions
when developing/reviewing digital health standards.
(iii). Identify and allocate financial resources to support the digital health standards
development and review process.
(iv). The collaborative platform should have guidelines on user involvement specifying how
users / stakeholders will be involved in initiation activities (readiness assessment,
requirements elicitation, capability assessment), adoption / adaptation / development
processes, and implementation of digital health.
The purpose of the digital health (eHealth) EA is to support the deliberate development
of digital health technical architecture, technologies and operational capabilities of the
health system in a standardized and aligned manner. To achieve this purpose, two main
categories of requirements have been developed as see in Table 3.
Requirement DHA_IM01
Outline the Business Reference Model (BRM), Service Reference Model (SRM), Data
Reference Model (DRM), Application Reference Model (ARM) and Technology
Reference Model.
Detail the digital health Information Security Architecture. (iv). Outline digital health
Interoperability profile.
Requirement DHA_IM02
Requirement DHA_IM03
Specify modes for linking (sharing) health data from one digital health application with
anther applications
(iii). Clearly stipulate mechanisms for testing and evaluating digital health applications
before committing to use.
Requirement DHA_IM04
DHA_IM04: Develop a health data reference model to describe data from healthcare
processes independent of current indicator definitions.
Include a class model of the main data items (the healthcare process data entities)
and their relationships.
Requirement DHA_IM05
Procedure to be followed to ensure that the quality of patient data is not compromised
during the migration process (i.e., process of transforming manual records to the digital
formats).
(iii). Acceptable forms of electronic health data storage devices (hard drive disk, Compact
Disc (CD), DVD and Blu-ray Discs, USB Flash drive, or tapes) and storage sites such as
cloud storage and offsite storage.
Requirement DHA_ GS 01
(i). Roles and responsibilities of the digital health governance structure as well as the
governance processes
(ii). How the digital health governance teams are to be empowered and or provided
with resources to oversee development, and implementation of digital health
standards.
Requirement DHA_ GS 02
Requirement DHA_ GS 03
(iii). Have criteria for assessing risk of non- compliance with digital health standards.
(iv). Provide a mechanism for monitoring and reviewing compliance with digital health
standards.
(v). Provide a procedure for reporting level of compliance with digital health standards.
Requirement DHA_ GS 04
(i). Develop a roadmap for sensitizing health workers on requirements for monitoring
compliance and structures for digital health.
Being a developing field, healthcare practitioners require training in the use of digital
health technologies and the application of digital health standards. Ways in which skills
and knowledge regarding digital health and standards can reach the expected persons
are categorized into ICT skills and training, training in digital health standards, and
sensitization of stakeholders regards digital health applications, technologies and
standards (see Table 4).
Table 4. Categories of Requirements for Building Capacity to use Digital Health and
Standards
DHC_IT ICT skills & Training Equip practitioners with the required computer skills to
use digital
Requirement DHC_IT01
DHC_IT01: Develop training guidelines for health workers on basic ICT Skills and
digital health Information management.
(i) The specialized digital health training may include short courses on electronic health
data coding, digital health applications development, digital health data security and
privacy, digital health standards, digital health EA and emerging digital health
technologies.
Requirement DHC_IT02
DHC_IT02: Advocate for digital health courses to be incorporated in health workers’
training curricula.
The in-service training curricula should incorporate short courses on electronic health
data coding, digital health applications, digital health data security and privacy, digital
health standards, EA, Emerging digital health technologies, etc.
The MoH should work / collaborate / partner with HEI/Academia to review their health
sciences programmes to include / accommodate digital health courses for pre-service
health workers.
Requirement DHC_ST01
DHC-ST01: Develop training guidelines for health workers on basic ICT Skills and
digital health Information management.
(i) The specialized digital health training may include short courses on electronic
health data coding, digital health applications development, digital health data security
and privacy, digital health standards, digital health EA and emerging digital health
technologies.
Requirement DHC_SN01
Risk-based approach
Data security requires the highest level of security measures. However, as infallible
data security is nonexistent, a risk-based approach through enterprise risk
management is necessary. Even with quality IT infrastructure and practices, along
with a proactive stance and information security measures, the risk of an attack will al-
ways persist. Therefore, the framework for managing data security recommended by
the US National Institute of Standards and Technology (NIST) and the
recommendations of the European Union Agency for Network and Information
Security (ENISA) are rooted in a risk- based approach.
Risk assessment depends on the identification of at risk IT assets, stressed as the
first step by the NIST Cybersecurity Framework (CSF) for critical infrastructure, and the
identification of potential threats through methods such as vulnerability
management (Argaw et al., 2020). An asset’s value to the organization and its
exposure to risk should determine its priority in the protection processes. Quality IT is
important here, as configuration management will be integral to this identification
step. Risk analysis of these findings should consider tradeoffs between risks and
benefits, as well as between different risks (Soldatos, 2020). It should also evaluate
the potential consequences for patient safety and maintenance of operations (Argaw
et al., 2020). This requires the assessment of an incident’s impact on data and privacy
protection (confidentiality), availability of in- formation, and integrity of information.
The latter is especially important as the integrity of health data can have severe
consequences for the patient’s safety.
Health facilities can manage risks through various methods, from mitigating,
avoiding, or transferring to accepting the risks (Soldatos, 2020). The NIST CSF follows
this identification of risks step with Protect, Detect Incidents, Respond, and Recover
(CI Cybersecurity,2018)
The risks associated with granting administrative privileges to users in health facilities
are immense. According to Cyber Sheath’s APT Privileged Account Exploitation report,
the vast majority of large-scale attacks that caused significant damage and expenses
were initiated through the compromise of a privileged account such as that of a third-
party provider (Hodson, 2019). This was the case for the attack that took place at
Hancock Regional Hospital in January 2018, when the login credentials to a vendor’s
account were compromised (Hughes, 2018).
Health entities should grant administrative privileges in a controlled and restrictive
manner, in order to minimize the number of such accounts to an enterprise-
dependent manageable sum (Hughes, 2018).These accounts should be inventoried,
monitored for abnormal use, and evaluated for log entries. To avoid malicious insider
threats, the health entity should also enforce local pass- word policy and revisit their
criteria for privileged access in addition to the vetting of users. A study revealed that
disgruntled employees account for 70% of computer- related criminal activity (Argaw
et al., 2020). Organizations should address the risk of such threats by closely
monitoring the lifecycle of user accounts and revoking client and user certificates
when no longer in use. Additionally, end users requiring administrative privileges
should have two accounts: one that has privileges limited to local ma- chines and
another with no administrative privileges to be used for routine tasks such as
browsing the internet or checking emails (Hughes, 2018). When necessary, direct
web-access on critical devices should be denied or the use of encapsulated browsers
should be enforced.
It is important to provide users who are granted ad- ministrative or privileged
accounts with additional training on the risks brought on by their privileges, as it is
important to equip them with the proper security measures. Among the most
important measures is the use of multifactorial authentication for all administrative
and privileged users—preferably for all users. The Center for Internet Security’s (CIS’s)
Critical Security Controls for Effective Cyber Defense lists the use of smart cards, One
Time Passwords, or biometrics, among the techniques to implement this vital step
(Hughes, 2018).
Incident response plans should also endorse post- incident steps. This can involve enforcing
organization- wide password resets after an attack, factory resetting, and replacing
compromised hardware and software as necessary. However, there needs to be an internal
plan for regrouping and implementing changes (CI Cybersecurity, 2018). The IT and data
security system and its management should then be adapted to the new needs and
requirements that were revealed by the incident (i.e., patching and beyond). A notification
system should be established between the health facility and the manufacturers (CI
Cybersecurity, 2018). A process can be built for those in the enterprise (e.g., clinicians,
business administrators, and IT staff) to report incidents directly to the manufacturers. In
fact, this type of sharing is also being mandated in the most recent FDA 510(k) pre-market
submission guidelines (Argaw et al., 2020).
Information sharing
The exchange of potential threats, indicators of com- promise, best practices,
vulnerabilities, lessons learned, and of mitigation strategies between stakeholders
across public and private sectors is an essential step in building the data security of
healthcare systems (Hodson, 2019). Information sharing facilitates situational
awareness and a solid understanding of threats and threat actors, their motivations,
campaigns, tactics, and techniques. Consequently, it better equips decision makers to
understand organizational exposure and to employ enterprise risk management
policies. Information sharing should include all stakeholders: providers,
manufacturers, suppliers, payers, and electronic record providers, as well as
government(s) where applicable.
There are organizations that exist specifically to facilitate collaboration between
institutions, for example, the National Health Information Sharing and Analysis Center
(NH-ISAC), a global, member-driven non-profit providing a forum for trusted sharing
amongst healthcare organizations. The EU adopted the Network and Information
System (NIS) Directive in 2016—the first EU law specifically focused on cybersecurity—
to be transposed by member states by 2018. The directive requires member states,
most notably, to adopt national data security strategies, to designate national
competent authorities, and to develop one or more computer security incident
response teams (CSIRTs). It also establishes security and incident notification
requirements for “operators of essential services,” such as healthcare organizations,
even requiring incidents of certain magnitudes to be reported to national
authorities. To promote swift and effective operational cooperation regarding threats
and incidents, the directive emphasizes coordination among member states, setting
up a CSIRT network (also to include CERT-EU), and a strategic NIS “cooperation group”
to support and facilitate cooperation and information ex- change among member
states (Hodson, 2019).
Health Informatics advance just as far as the individuals’ trust in it. Various applications have
been created with the hope to further develop healthcare as medical or public health
practice. Social development, however, is only real if in consonance with fundamental
human rights. Above all, is the right to freedom. Privacy, in turn, has precedence in the right
to freedom of opinion and expression, which includes freedom to hold opinions without
interference [2]. Without respecting such conditions, new technologies in HI – and other
fields – will not achieve their full potential, and may instead be harmful to its users. In this
paper we deal with the concepts of security and privacy as fundamental principles to
achieve high quality healthcare. The research has special focus on eHealth technologies,
that have been particularly successful in developing countries. We started with a
comprehensive literature review about mHealth initiatives. Among the various categories of
mHealth applications, the class of MDCSs attracted most attention, since such systems
handle large amounts of data, for surveillance of whole communities. This, along with the
vexing lack of security in existing solutions, provoked the researcher to continue research in
the topic.
Community Health Workers (CHWs) also play a crucial role in the deliver of basic health and
medical care worldwide. They are the first and often the only link between the community
and the health system. It is crucial to understand how CHWs make use of mHealth
technologies in their work environment in order to design systems that fit their needs.
MDCSs should be primarily made for empowering them. Besides, specially regarding
security and privacy, it is important to raise awareness among stakeholders, including the
CHWs, project managers, developers, nurses, doctors, and other users. Privacy by design
and by default, well-known in the literature and data protection laws, should be put in
practice. Health professionals should be conscious that privacy and data protection is a part
of their job; and, that its non-observance leads to inferior or inadmissible level of
healthcare. In this regard, this paper presents our implementation experience on secure and
privacy-preserving MDCSs. The privacy aspects of MDCSs should be nevertheless further
investigated. Therefore, for future work, the researcher plans to continue the research
already introduced in in this paper. Respectively, the completion of the PIA template for
MDCSs and additional investigations on medical data obfuscation and anonymisation. Thus,
heading towards the design of relevant security and privacy frameworks for MDCS, as well
as for mHealth systems in general. This document should therefore rapidly become
obsolete, having served merely as a stepping stone to the future.