----------------------------- ----------------------------

Search published articles


Showing 3 results for Cloud Computing

Mahsa Rouzkhatouni, Zari Rahmat Pasand Fatideh, Zolikha Asadi, Mohammad Dehghani,
Volume 4, Issue 2 (10-2018)
Abstract

Aim: Nowadays, cloud computing technology is widely used in health care industry because of its advantages in cost reduction  and improving the availability and integrity of information. In this study, nurses' attitude towards cloud computing technology is examined in order to determine the benefits, barriers and infrastructure required for implementation.
Methods: This descriptive-analytic study was done in Farabi Hospital in 2017. The research population included nurses working in this hospital and sampling method was census (310 nurses). After completing questionnaires and entering data, SPSS-19 software used for data analyzed and Pearson and ANOVA used for hypothesistests.
Results: In this study 228 individual (181 women and 47 men) participated. The most important (+0.46/±4) advantage of using cloud computing in hospitals was easy transfer and better access to medical records. Web-based hospital software (95/5/54/3) is the most important prerequisite to use this technology. Also, the main (68/3±83/3) barrier was the inability to interoperability in clinical information systems.
Conclusion: Given the benefits of cloud computing technology, such as access to information and optimal communication between health care organizations, appropriate policy making can solve barriers, such as lack of appropriate data networks in hospitals, lack of interoperability of hospital information systems and the internet problems to implement this technology in the future.

Mahin Mohammadi, Abbas Sheikhtaheri, Farzaneh Kermani,
Volume 5, Issue 2 (12-2019)
Abstract

Aim: Electronic health enables patients share their own medical information and this sharing poses security risks. The purpose of this research is to review, and compare algorithms and methods for solving patient information security, from different aspects, including user revocation, and access control capabilities. The strengths and weaknesses of these algorithms are identified.
Information sources or data: This review conducted using online databases including PubMed, Web of Science, and Science Direct.
Selection methods for study: Keywords including health information systems, computer security, access to information, cloud computing and social networking was used to search. Articles published in 2009 to 2019 were selected. 29 articles related to solving the problem of user revocation and 7 articles related to solving the problem of access control were selected. Related articles were reviewed, then the access control and user revocation solutions were compared.
Combine content and results: To protect the confidentiality of patient information, a cryptographic method is suggested before data sharing. This solution has the problem of revocation of the users. To solve this problem, various methods have been proposed. In this paper, these solutions are compared in different respects. The features of these methods have been compared in terms of instant revocation, key update, cloud free, encrypted text updates, and short revocation. Finally, methods for access control by the patients were also compared.
Conclusion: Security issues associated with health data make patients hesitant to post sensitive health information and share it with health providers. In this paper, algorithms and health information security methods were compared. Most of the solutions to revocation of users need re-encryption methods, also, access control solutions do not have the required flexibility. In the future, better methods should be presented.

Mohammad Hosein Haghighi Hayavi, Jahanpour Alipour, Mohammad Dehghani,
Volume 9, Issue 4 (2-2024)
Abstract

Objective Recently, healthcare organizations use advanced information technologies such as cloud computing (CC) to reduce costs and increase productivity. Since the level of technology acceptance plays an essential role in technology success or failure, this study aims to assess the factors affecting the acceptance of CC by the staff of teaching hospitals in Hormozgan, Iran.
Methods This is a descriptive-analytical study with a cross-sectional design that was conducted in 2021. Participants were 285 staff of three teaching hospitals affiliated to Hormozgan University of Medical Sciences, who were selected using stratified random sampling method. The data collection tool was the unified theory of acceptance and use of technology (UTAUT) questionnaire with acceptable validity and reliability (Cronbach’s α=0.88). The collected data were analyzed in SPSS software, version 24 using descriptive statistics, independent t-test, ANOVA, and Pearson correlation test. Also, the effect of the factors was calculated in LISREL software.
Results The history of using CC had a significant impact on the behavioral intention and usage behavior (P<0.001). In addition, the relationship of social influence, facilitating conditions, effort expectancy, and performance expectancy with usage behavior and behavioral intention to use CC was significant, and their impact was higher on the behavioral intention of staff
Conclusion Individual awareness and knowledge, relevant organizational conditions, and the necessary infrastructure are the key factors in the acceptance of cloud computing by the staff of teaching hospitals in Hormozgan, Iran.


Page 1 from 1     

© 2025 CC BY-NC 4.0 | Journal of Modern Medical Information Sciences

Designed & Developed by: Yektaweb