Skip to main content

Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting

  • Conference paper
Information Security Technology for Applications (NordSec 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7161))

Included in the following conference series:

Abstract

This paper presents a solution for visualization control aimed at public displays used in a hospital setting. The solution controls what is displayed on a screen based on its location and the current time of day. In addition it makes risk/benefit trade-offs based on the quality and newness of the information, as well as its sensitivity and its importance for intended users. The solution can be realized by utilizing an existing publish/subscribe middleware solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. O’Neill, E., Woodgate, D., Kostakos, V.: Easing the wait in the emergency room: building a theory of public information systems. In: Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS 2004, pp. 17–25 (2004)

    Google Scholar 

  2. Bardram, J.E., Hansen, T.R., Soegaard, M.: Awaremedia: a shared interactive display supporting social, temporal, and spatial awareness in surgery. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW 2006, pp. 109–118 (2006)

    Google Scholar 

  3. Aronsky, D., Jones, I., Lanaghan, K., Slovis, C.M.: Supporting patient care in the emergency department with a computerized whiteboard system. Journal of the American Medical Informatics Association 15(2), 184–194 (2008)

    Article  Google Scholar 

  4. Faxvaag, A., Røstad, L., Tøndel, I.A., Seim, A.R., Toussaint, P.J.: Visualizing patient trajectories on wall-mounted boards - information security challenges. In: Proceedings of MIE 2009. Studies in Health Technology and Informatics, pp. 715–719 (2009)

    Google Scholar 

  5. Gjære, E.A., Tøndel, I.A., Line, M.B., Andresen, H., Toussaint, P.: Personal health information on display: Balancing needs, usability and legislative requirements. In: Proceedings of MIE 2011. Studies in Health Technology and Informatics, vol. 169, pp. 606–610 (2011)

    Google Scholar 

  6. Gjære, E.A.: Sensitive Information on Display: Using flexible de-identification for protecting patient privacy in (semi-) public hospital environments, Master’s thesis, Norwegian University of Science and Technology (2011)

    Google Scholar 

  7. Line, M.B., Tøndel, I.A., Gjære, E.A.: A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol. 6908, pp. 26–37. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Faxvaag, A., Johansen, T.S., Heimly, V., Melby, L., Grimsmo, A.: Healthcare professionals’ experiences with ehr-system access control mechanisms. In: Proceedings of MIE 2011. Studies in Health Technology and Informatics, vol. 169, pp. 601–605 (2011)

    Google Scholar 

  9. Wienhofen, L.W.M., Preuveneers, D., Landmark, A.D., Toussaint, P.J., Berbers, Y.: A Notion of Event Quality for Contextualized Planning and Decision Support Systems. In: Beigl, M., Christiansen, H., Roth-Berghofer, T.R., Kofod-Petersen, A., Coventry, K.R., Schmidtke, H.R. (eds.) CONTEXT 2011. LNCS, vol. 6967, pp. 307–320. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. ANSI, American National Standard for Information Technology - Role Based Access Control, ANSI INCITS 359-2004 (2004)

    Google Scholar 

  11. Appari, A., Johnson, M.E.: Information security and privacy in healthcare: Current state of research. Forthcoming: International J. Internet and Enterprise Management (2009)

    Google Scholar 

  12. Ferreira, A., Cruz-Correira, R., Antunes, L., Chadwick, D.: Access control: how can it improve patients’ healthcare? Studies in Health Technology and Informatics, vol. 127, pp. 65–76 (2007)

    Google Scholar 

  13. Røstad, L., Edsberg, O.: A study of access control requirements for healthcare systems based on audit trails from access logs. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 175–186 (2006)

    Google Scholar 

  14. Singh, J., Vargas, L., Bacon, J., Moody, K.: Policy-based information sharing in publish/subscribe middleware. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 137–144 (2008)

    Google Scholar 

  15. Bacon, J., Eyers, D.M., Singh, J., Pietzuch, P.R.: Access control in publish/subscribe systems. In: Proceedings of the Second International Conference on Distributed Event-Based Systems, DEBS 2008, pp. 23–34 (2008)

    Google Scholar 

  16. Hu, J., Weaver, A.: Dynamic, context-aware access control for distributed healthcare applications. In: Proceedings of the First Workshop on Pervasive Security, Privacy and Trust, PSPT (2004)

    Google Scholar 

  17. Alam, M., Hafner, M., Memon, M., Hung, P.: Modeling and enforcing advanced access control policies in healthcare systems with SECTET. In: 1st International Workshop on Model-Based Trustworthy Health Informaton Systems, MOTHIS 2007 (2007)

    Google Scholar 

  18. Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT 2004, pp. 156–162 (2004)

    Google Scholar 

  19. Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Risk Models for Trust-Based Access Control(TBAC). In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 364–371. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Cheng, P.-C., Fohatgi, P., Keser, C.: Fuzzy MLS: An Experiment on Quantified Risk-Adaptive Access Control, IBM Thomas J. Watson Research Center, Tech. Rep. (January 2007)

    Google Scholar 

  21. Diep, N.N., Hung, L.X., Zhung, Y., Lee, S., Lee, Y.-K., Lee, H.: Enforcing access control using risk assessment. In: European Conference on Universal Multiservice Networks, pp. 419–424 (2007)

    Google Scholar 

  22. Shoemaker, G.B.D., Inkpen, K.M.: Single display privacyware: augmenting public displays with private information. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2001, pp. 522–529 (2001)

    Google Scholar 

  23. Tarasewich, P., Campbell, C.: What are you looking at. In: The First Symposium on Usable Privacy and Security, SOUPS 2005 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tøndel, I.A. (2012). Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting. In: Laud, P. (eds) Information Security Technology for Applications. NordSec 2011. Lecture Notes in Computer Science, vol 7161. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29615-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29615-4_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29614-7

  • Online ISBN: 978-3-642-29615-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics