University of Minho School of Engineering Centre Algoritmi Resume We are witnessing a generalization of the concept of digital identity due to the spread.

Slides:



Advertisements
Similar presentations
Nursing Diagnosis: Definition
Advertisements

Health Promotion.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 20 a 26 de Outubro de 2011.
Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Copyright © Healthcare Quality Quest, Proposed standards for a national clinical audit — How we got involved and what we have learned.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
University of Minho School of Engineering Centre ALGORITMI Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 e 27 de Outubro de 2011 ABSTRACT Two areas.
University of Minho School of Engineering Computer Science and Technology Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24.
University of Minho School of Engineering Centre Algoritmi Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering CITEPE Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011 Motivation.
University of Minho School of Engineering ALGORITMI Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011 Introduction.
University of Minho School of Engineering Center Algoritmi Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
Introduction Considering that the growth of cities does not always follow the principles of sustainability, it is essential to study this phenomenon in.
University of Minho School of Engineering R&D Centre ALGORITMI / Department of Information Systems Uma Escola a Reinventar o Futuro – Semana da Escola.
University of Minho School of Engineering Algoritmi Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Territory, Environment and Construction Centre (C-TAC), DEC Uma Escola a Reinventar o Futuro – Semana da Escola.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
Findings and discussion The critical ergonomic factors identified with the ETdA methodology; Thermal environment, Noise, Postures and movements and Lifting,
University of Minho School of Engineering Algoritmi Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
University of Minho School of Engineering Computer Science and Technology Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24.
Company LOGO B2C E-commerce Web Site Quality: an Empirical Examination (Cao, et al) Article overview presented by: Karen Bray Emilie Martin Trung (John)
Copyright 2012 Delmar, a part of Cengage Learning. All Rights Reserved. Chapter 13 Health Information Systems and Strategy.
Introduction (Pendahuluan)  Information Security.
University of Minho School of Engineering Computer Science and Technology Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24.
CURRICULUM PROSPECTIVES: MONITORING AND CURRICULUM EVALUATION DEM 332
Promoting Excellence in Family Medicine Enabling Patients to Access Electronic Health Records Guidance for Health Professionals.
Creating Research proposal. What is a Marketing or Business Research Proposal? “A plan that offers ideas for conducting research”. “A marketing research.
Methods of Data Collection
…patient reported outcome (PRO) measure for your clinical study Dr Keith Meadows, DHP Research & Consultancy Ltd.
 Increasing concerns about the nursing profession in the U.K.  Concern from NMC over the number of new registrants reported for fitness for practice.
The Knowledge Resources Guide The SUVOT Project Sustainable and Vocational Tourism Rimini, 20 October 2005.
Medical Informatics Basics
Factors affecting contractors’ risk attitudes in construction projects: Case study from China 박병권.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Putting Professional Ethics into research and practice BASW.
Gurpreet Dhillon Virginia Commonwealth University
How to develop research skills in students. The model of searching information. Carol Collier Kuhlthau How to develop research skills in students. The.
Copyright © 2008 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 12 Undertaking Research for Specific Purposes.
Medical Audit.
Medical Informatics Basics
Medical Informatics Basics Lection 1 Associated professor Andriy Semenets Department of Medical Informatics.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
October  The Economic and Social Council (ESC) is “the civil parliament” of Bulgaria. It unites a variety of Bulgarian civil society organisations.
PPA 502 – Program Evaluation Lecture 2c – Process Evaluation.
Programme Objectives Analyze the main components of a competency-based qualification system (e.g., Singapore Workforce Skills) Analyze the process and.
Nursing research Is a systematic inquiry into a subject that uses various approach quantitative and qualitative methods) to answer questions and solve.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Tier III Implementation. Define the Problem  In general - Identify initial concern General description of problem Prioritize and select target behavior.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Acceptance of health services on mobile phones: A study of consumer perceptions.
Introduction to research
Introduction It had its early roots in World War II and is flourishing in business and industry with the aid of computer.
Management Information System In Healthcare
IMPROVING THE HUMAN TECHNOLOGY INTERFACE NURSING INFORMATICS CHAPTER 4 1.
Health Management Information Systems Unit 3 Electronic Health Records Component 6/Unit31 Health IT Workforce Curriculum Version 1.0/Fall 2010.
Author: Zhenhui Rao Student: 范明麗 Olivia I D:
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
© 2016 Chapter 6 Data Management Health Information Management Technology: An Applied Approach.
Paperless & Cashless Poland Program overview
Understanding Results
Communication Skills Lecture 1-2
CLINICAL INFORMATION SYSTEM
MGT601 SME MANAGEMENT.
Presentation transcript:

University of Minho School of Engineering Centre Algoritmi Resume We are witnessing a generalization of the concept of digital identity due to the spread of information technologies. From the perspective of system administrators, users are the weakest link in the security chain. Users usually show concern for the safety and privacy, but at the same time eager to use simple mechanisms to facilitate their authentication process before a particular system. The authentication technologies using biometrics already play a major role in the context of security systems. Some techniques are used in various services not only to ensure physical access to facilities but also to provide some rigor in access. This study addresses the perception of users regarding the use of biometric authentication technologies in access to health services. Preliminary results derived from a survey by questionnaire indicate a trend of acceptance of such technologies in access to health services. It is expected that the final results of this study support the possible implementation of such technologies, Introduction The growing sense of insecurity in society means that researchers in the field of security of information systems feel the need to implement safer ways to use and manage access to services that they provide. Society is increasingly dependent on new authentication technologies. The name of a person or his presence no longer meet the requirements of validating the identity of a particular individual(Laux 2007). Information systems in health care are increasingly complex. With different implementations, it is necessary to integrate and operate platforms in order to ensure their interoperability. These constraints contribute to the difficulty that exists to ensure the privacy and rights of users of these systems. Nowadays it is common to hear stories about mistakes made within our health system. Clinical records exchanged, confusing receipts, wrong medication given to wrong patients and improper access by unauthorized users. We are witnessing a desperate race with the aim of finding the best method of protecting data and prevent errors with consequences ranging from embarrassment to risk situations, sometimes fatal. Access should be granted only to authorized users who can view the clinical data being passed and stored in the information system, never forgetting the context of service provided to patients. In this field, biometric authentication technologies would be more reliable alternative (but not infallible) in the process of identification / verification of individuals at the expense of traditional methods (eg: paper, electronic documents without verification). PAULO RODRIGUES* Supervisor: Henrique Santos * USERS' PERCEPTIONS REGARDING THE USE OF BIOMETRIC AUTHENTICATION TECHNOLOGIES IN THE ACCESS TO HEALTH SERVICES Problem Definition Considering these, it is really necessary to delve into the factors that may influence the adoption of this technologies, leaving for a more comprehensive and detailed study. Through the theories and techniques available to measure and interpret the factors influencing the adoption of these technologies, enabling the development of a model that can positively influence the rate of adoption of biometric authentication in access to health services. Given this, the main research question formulated was the following: - With regard to biometric-based authentication technologies, factors that influence (and how) the citizens in the use of public health? From the work that is currently being developed is expected the following contributions: - An identification and characterization of the key issues that influence the adoption process; - The proposal of a value model with the aim to help widespread adoption of these technologies. Research design In this type of research, we deal with processes of technology adoption the quantitative methods view does not satisfy some of the aspects of human behavior and its interactions with its environment. Hence, the choice of mixed methods is more appropriate for the study and the research plan set. On the one hand, a data collection instrument (questionnaire) in which it intends to monitor the use and perception of perceived ease of use and the other, an instrument (semi-structured interviews), which gives explanations of groups of individuals previously selected after analysis of data from the first instrument, and laboratory experience with the subject. Conclusions and future work According to the preliminary results, the majority is predisposed to adopt, sees advantages in the process and reinforces expectations towards the willingness to adopt such systems. But we also found that some respondents reluctant when it comes to issue an opinion on the items evaluated in various constructs and items shown. It will be important in the second phase of this study to examine the arguments and strategies that can influence the adoption process. We can only measure which could be decisive in decision-making on the part of respondents without an opinion on the various items. It is hoped that a comprehensive reading problems associated with the adoption of such technologies, will provide a model that can optimize the process of acceptance and without calling into question the ethical principles, safeguarding the privacy and human dignity References Compeau, D. R., and Higgins, C. A. "Application of Social Cognitive Theory to Training for Computer Skills," Information Systems Research (6:2) 1995, pp James, T., Pirim, T., Boswell, K., Reithel, B., and Barkhi, R. "Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model," Journal of Organizational & End User Computing (18:3) 2006, pp Jones, L. A., Antón, A. I., and Earp, J. B. "Towards understanding user perceptions of authentication technologies," in: Proceedings of the 2007 ACM workshop on Privacy in electronic society, ACM, Alexandria, Virginia, USA, 2007, pp Laux, D. D. "A study of biometric authentication adoption in the credit union industry," Iowea State University, 2007, p. 62. Venkatesh, V., and Bala, H. "Technology Acceptance Model 3 and a Research Agenda on Interventions," Decision Sciences (39:2) 2008, pp Figure 1 - Research plan and expect results Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011