Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting

  • Inger Anne Tøndel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7161)

Abstract

This paper presents a solution for visualization control aimed at public displays used in a hospital setting. The solution controls what is displayed on a screen based on its location and the current time of day. In addition it makes risk/benefit trade-offs based on the quality and newness of the information, as well as its sensitivity and its importance for intended users. The solution can be realized by utilizing an existing publish/subscribe middleware solution.

Keywords

Access Control Access Control Policy Health Care Personnel Event Quality Public Display 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    O’Neill, E., Woodgate, D., Kostakos, V.: Easing the wait in the emergency room: building a theory of public information systems. In: Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS 2004, pp. 17–25 (2004)Google Scholar
  2. 2.
    Bardram, J.E., Hansen, T.R., Soegaard, M.: Awaremedia: a shared interactive display supporting social, temporal, and spatial awareness in surgery. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW 2006, pp. 109–118 (2006)Google Scholar
  3. 3.
    Aronsky, D., Jones, I., Lanaghan, K., Slovis, C.M.: Supporting patient care in the emergency department with a computerized whiteboard system. Journal of the American Medical Informatics Association 15(2), 184–194 (2008)CrossRefGoogle Scholar
  4. 4.
    Faxvaag, A., Røstad, L., Tøndel, I.A., Seim, A.R., Toussaint, P.J.: Visualizing patient trajectories on wall-mounted boards - information security challenges. In: Proceedings of MIE 2009. Studies in Health Technology and Informatics, pp. 715–719 (2009)Google Scholar
  5. 5.
    Gjære, E.A., Tøndel, I.A., Line, M.B., Andresen, H., Toussaint, P.: Personal health information on display: Balancing needs, usability and legislative requirements. In: Proceedings of MIE 2011. Studies in Health Technology and Informatics, vol. 169, pp. 606–610 (2011)Google Scholar
  6. 6.
    Gjære, E.A.: Sensitive Information on Display: Using flexible de-identification for protecting patient privacy in (semi-) public hospital environments, Master’s thesis, Norwegian University of Science and Technology (2011)Google Scholar
  7. 7.
    Line, M.B., Tøndel, I.A., Gjære, E.A.: A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol. 6908, pp. 26–37. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  8. 8.
    Faxvaag, A., Johansen, T.S., Heimly, V., Melby, L., Grimsmo, A.: Healthcare professionals’ experiences with ehr-system access control mechanisms. In: Proceedings of MIE 2011. Studies in Health Technology and Informatics, vol. 169, pp. 601–605 (2011)Google Scholar
  9. 9.
    Wienhofen, L.W.M., Preuveneers, D., Landmark, A.D., Toussaint, P.J., Berbers, Y.: A Notion of Event Quality for Contextualized Planning and Decision Support Systems. In: Beigl, M., Christiansen, H., Roth-Berghofer, T.R., Kofod-Petersen, A., Coventry, K.R., Schmidtke, H.R. (eds.) CONTEXT 2011. LNCS, vol. 6967, pp. 307–320. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    ANSI, American National Standard for Information Technology - Role Based Access Control, ANSI INCITS 359-2004 (2004)Google Scholar
  11. 11.
    Appari, A., Johnson, M.E.: Information security and privacy in healthcare: Current state of research. Forthcoming: International J. Internet and Enterprise Management (2009)Google Scholar
  12. 12.
    Ferreira, A., Cruz-Correira, R., Antunes, L., Chadwick, D.: Access control: how can it improve patients’ healthcare? Studies in Health Technology and Informatics, vol. 127, pp. 65–76 (2007)Google Scholar
  13. 13.
    Røstad, L., Edsberg, O.: A study of access control requirements for healthcare systems based on audit trails from access logs. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 175–186 (2006)Google Scholar
  14. 14.
    Singh, J., Vargas, L., Bacon, J., Moody, K.: Policy-based information sharing in publish/subscribe middleware. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 137–144 (2008)Google Scholar
  15. 15.
    Bacon, J., Eyers, D.M., Singh, J., Pietzuch, P.R.: Access control in publish/subscribe systems. In: Proceedings of the Second International Conference on Distributed Event-Based Systems, DEBS 2008, pp. 23–34 (2008)Google Scholar
  16. 16.
    Hu, J., Weaver, A.: Dynamic, context-aware access control for distributed healthcare applications. In: Proceedings of the First Workshop on Pervasive Security, Privacy and Trust, PSPT (2004)Google Scholar
  17. 17.
    Alam, M., Hafner, M., Memon, M., Hung, P.: Modeling and enforcing advanced access control policies in healthcare systems with SECTET. In: 1st International Workshop on Model-Based Trustworthy Health Informaton Systems, MOTHIS 2007 (2007)Google Scholar
  18. 18.
    Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT 2004, pp. 156–162 (2004)Google Scholar
  19. 19.
    Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Risk Models for Trust-Based Access Control(TBAC). In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 364–371. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  20. 20.
    Cheng, P.-C., Fohatgi, P., Keser, C.: Fuzzy MLS: An Experiment on Quantified Risk-Adaptive Access Control, IBM Thomas J. Watson Research Center, Tech. Rep. (January 2007)Google Scholar
  21. 21.
    Diep, N.N., Hung, L.X., Zhung, Y., Lee, S., Lee, Y.-K., Lee, H.: Enforcing access control using risk assessment. In: European Conference on Universal Multiservice Networks, pp. 419–424 (2007)Google Scholar
  22. 22.
    Shoemaker, G.B.D., Inkpen, K.M.: Single display privacyware: augmenting public displays with private information. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2001, pp. 522–529 (2001)Google Scholar
  23. 23.
    Tarasewich, P., Campbell, C.: What are you looking at. In: The First Symposium on Usable Privacy and Security, SOUPS 2005 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Inger Anne Tøndel
    • 1
  1. 1.SINTEF ICTTrondheimNorway

Personalised recommendations