Neo Tomorrow’s Healthcare Today.

Slides:



Advertisements
Similar presentations
Security Issues and Challenges in Cloud Computing
Advertisements

Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Norman SecureSurf Protect your users when surfing the Internet.
Solution Overview for NIPDEC- CDAP July 15, 2005.
Security and Privacy Services Cloud computing point of view October 2012.
Your Medical Blog Zero to Hero Guide Mark Seigel, MD, FACOG Chair, ACOG Committee on Practice Management Co-Chair, Physicians’ Electronic Health Record.
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Electronic Health Records: Healthcare System’s Common Trends Based on Cloud Computing Group 2: OU Jin FANG Ting
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1.Summary of Needs Analysis 2.Summary of Action Plan 3.Systems Analysis between Microsoft SharePoint® and OpenText Content Server 4.System Recommendation.
Presented by: Sanketh Beerabbi University of Central Florida.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
July What is the eCost TMS Solution ? Benefits & Features Explore the eCost Software Smart Storage Device (SSD9000 / SSD9001) - Buffers DX10 Dongle.
Introduction to MTBC Medical Transcription Billing, Corp.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
© 2016 Chapter 6 Data Management Health Information Management Technology: An Applied Approach.
Is Endpoint security dead?
Security and resilience for Smart Hospitals Key findings
Securing Information Systems
Introduction to Barracuda IM Firewall
BUILD SECURE PRODUCTS AND SERVICES
Where it is today and how it is used.
About Me Name: Yaokai Feng, from Kyushu University
The Revolutionary Benefits Of Blockchain
Chapter 8 Environments, Alternatives, and Decisions.
Top 5 Open Source Firewall Software for Linux User
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
An Introduction to Electronic Health Records
Active Cyber Security, OnDemand
Leverage What’s Out There
Developing a Prototype
Leveraging Blockchain Technology in Legal Work Process
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Making Blockchain Real for Business
Blockchain initiatives
Blockchain beyond cryptocurrencies
National Mining University
What is Blockchain (Distributed Ledger Technology)?
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Alan Kim George J Raymond Jeremy A. John Johnathan Holland
Computerized and Manual Systems
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
BLOCKCHAIN DEVELOPMENT COMPANY
Call AVG Antivirus Support | Fix Your PC
2018 Real Cisco Dumps IT-Dumps
This presentation will begin shortly.
ECM for Legal & Law.
Overview of the Connecting for Health Common Framework Resources
Check Point Connectra NGX R60
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Blockchain technology at Change Healthcare
Ameda meeting in Botswana April 2018
The influence of Blockchain in different Industries Blockchain Technology.
Distributed Ledger Technology (DLT) and Blockchain
Basics for Blockchain Healthcare Use and Technology: 101 Course
OurSQL = MySQL + Blockchain
Crimson® 3.1 Updates January 2019.
Computer Science and Engineering
Database Trends Sampath Jayarathna Cal Poly Pomona
Electronic Communication and the Internet
Sachiko A. Kuwabara, PhD, MA
COMPLETE BUSINESS TEXTING SOLUTION
Protect data in core business applications
Duke University and NBER
The Learning @HEE_TEL.
10 REASONS TO USE JETPACK FOR WORDPRESS IN 2019
Duke University and NBER
IoT in Healthcare: Life or Death
Presentation transcript:

Neo Tomorrow’s Healthcare Today. Presented by Prashanth T.K. ( Founder Network+) Startup Info: www.networkplus.ca Twitter: @networkplus Facebook: @networkplusblockchain

Contents Introduction Problem Solution Contributions: Neo Product Features Neo: User Guide Results Discussion and Future Work

Introduction It is impossible to do Requirements Elicitation(REl) after victims have been “cyber-attacked” Requirements Engineering(REng.) need to be introduced as the first step of development of a product PIPEDA Def.: The Personal Information Protection and Electronic Documents Act In simple terms , PIPEDA “requires” everyone to keep records of breaches

Requirements for DNS Protection

Problem Statement Centralized storage < Decentralized Storage 2 databases is better than 1 Failure to comply with PIPEDA and other Compliance Requirements in general Threats: Malware, ransomware, botnet attacks CarePartners software was not updated for 2 years. Data was unencrypted. Hackers made use of it. MedStar was attacked by a virus. Common keywords after an analysis of North Carolina State University’s antivirus requirements and regulation policy shows that exemption is a commonly occurring theme

Problem Statement Ranking of Top 5 Requirements Elicitation Processes: Observation : Rank 1 Brainstorming: Rank 2 ( lack of communication with client) Interviews: Rank 3 ( Expensive and sample size constraints) Req Workshops ( Expensive and lack of “direct” understanding and communication with client requirements) Prototyping: ( Same as Rank 4) CarePartners software was not updated for 2 years. Data was unencrypted. Hackers made use of it. MedStar was attacked by a virus. Common keywords after an analysis of North Carolina State University’s antivirus requirements and regulation policy shows that exemption is a commonly occurring theme

Research Questions What are the common requirements of the User of a Distributed Ledger based Electronic Medical Record system ? What are the critical functional requirements of a blockchain based serverless storage solution ? How to effectively migrate a centralized legacy EHR storage system to a decentralized storage solution? CarePartners software was not updated for 2 years. Data was unencrypted. Hackers made use of it. MedStar was attacked by a virus. Common keywords after an analysis of North Carolina State University’s antivirus requirements and regulation policy shows that exemption is a commonly occurring theme

Solution: Neo Defense Model

Requirements of a Secure EHR Storage System Digital formatting enables information to be used and shared over secure networks Track care (e.g. prescriptions) and outcomes (e.g. blood pressure) Trigger warnings and reminders Send and receive orders, reports, and results Decrease billing processing time and create more accurate billing system

Results: Neo Product Features Immutable Ledger Cryptographically Verifiable Scalable Serverless Easy to Use Case study of popular DApp features Product Usage Guide

Neo: Defense Model User Guide Step 1: Encryption Step 2: Electronic Health Record Ledger Storage (IPFS) Step 3: Smart Contract Automation Step 4: DApp Development Step 5: DApp Release on Platform Neo

Discussion and Future Work Post Requirements Gathering: Establishing Goals, Objectives and KPIs Smart-Contract based Access Control Leveraging PIPEDA Toolkit Integration with common platforms such as SQL Server, mongoDB, docker, wordpress etc.

Thank you Twitter: @networkplus Facebook: @networkplusblockchain