Abstract
Implementation of Personal Health Record (PHR) systems involves multiple stakeholders with different interpretations and expectations; more importantly it involves changes in the custody of data, patient privacy, and consent management. In PHR analysis we need to answer questions such as: Who is the provider of PHR? Who has access to the patient data and why? And how the system can empower the patient? And how can the patient privacy be managed. This paper exploits techniques from Goal and Agent-oriented Requirements Engineering and proposes a methodological framework for dealing with concerns surrounding PHR systems. The framework is illustrated through an example that emphasizes the privacy aspects of PHRs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tang, P.C., Lansky, D.: The missing link: bridging the patient-provider health information gap. Health Aff. 24, 1290–1295 (2005)
Halamka, J.D., Mandl, K.D., Tang, P.C.: Early Experiences with Personal Health Records. J. Am. Med. Inform. Assoc. 15(1), 1–7 (2008)
HIPAA., Act of 1996 (accessed, May 2008), http://aspe.hhs.gov/admnsimp/pl104191.htm
PIPEDA., (accessed, May 2008), http://www.privcom.gc.ca/legislation/02_06_01_e.asp
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: Tropos: An Agent-Oriented Software Development Methodology, vol. 8(3), pp. 203–236 (2004)
Giorgini, P., Massacci, F., Mylopoulous, J., Zannone, N.: Requirements Engineering meets Trust Management. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 176–190. Springer, Heidelberg (2004)
Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Dordrecht (2000)
Markle Foundation: Connecting for Health. Connecting Americans to their healthcare. Final rep. of the wg on policies for electronic information sharing. NY Markle Found (2004)
Jones, C.: Patterns of software failure and Success. Thomson (1996)
Hickey, A., Davis, A.: The role of Requirement Elicitation technique in Achieving Software Quality. In: Req. Eng. WS: Foundation for Software Quality (REFSQ) (2002)
Yu, E.: Towards Modelling and reasoning Support for Early-Phase Requirements Engineering. In: Proc. RE 1997-3rd Int. Symp. on RE, Annapolis, pp. 226–235 (1997)
Samavi, R., Yu, E., Topaloglou, T.: Strategic Reasoning about Business Models: a Conceptual Modelling approach. J. Info. Sys. & E-Business Manag. (2008)
Liu, L., Yu, E.: Designing Information Systems in Social Context: A Goal and Scenario Modelling Approach. J. Information Systems 29(2), 187–203 (2002)
van Lamsweerde, A.: Goal-Oriented Requirements Engineering: A Guided Tour. Invited minitutorial. In: Proc. RE 2001, Int. Joint Conf. on RE, Toronto, pp. 249–263. IEEE, Los Alamitos (2001)
PRIME: Privacy and Identity Management for Europe (accessed, May 2008), https://www.prime-project.eu/
Karjoth, G., Schunter, M.: A Privacy Policy Model for Enterprises. In: Proc. Of CSFW 2002, pp. 271–281. IEEE Press, Los Alamitos (2002)
Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 237–272. Springer, Heidelberg (2005)
Giorgini, P., Massacci, F., Mylopoulous, J., Zannone, N.: Modelling Security Requirements Through Ownership, Permission and Delegation. In: Proc. of the 13th IEEE Requirements Engineering Conference (RE 2005) (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Samavi, R., Topaloglou, T. (2008). Designing Privacy-Aware Personal Health Record Systems. In: Song, IY., et al. Advances in Conceptual Modeling – Challenges and Opportunities. ER 2008. Lecture Notes in Computer Science, vol 5232. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87991-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-87991-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87990-9
Online ISBN: 978-3-540-87991-6
eBook Packages: Computer ScienceComputer Science (R0)