SciELO - Scientific Electronic Library Online

 
vol.31 issue2 author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Article

Indicators

Related links

  • On index processCited by Google
  • On index processSimilars in Google

Share


South African Computer Journal

On-line version ISSN 2313-7835
Print version ISSN 1015-7999

Abstract

KATIVU, Kevin  and  POTTAS, Dalenca. Leveraging intrinsic resources for the protection of health information assets. SACJ [online]. 2019, vol.31, n.2, pp.150-161. ISSN 2313-7835.  http://dx.doi.org/10.18489/sacj.v31i2.536.

The prevailing state of rural economies continues to constrain the use of digital applications for improved healthcare. These constraints are attributed to the unavailability of key infrastructure and financial resources. Moreover, a prevailing shortage of skilled health workers highlights the critical role digital solutions have to play in alleviating health service delivery challenges. Resource-constrained settings need secure low cost and long shelf-life solutions that leverage existing resources to provide adequate and secure health services. The objective of this paper is to identify the existing resources that can be engaged in the protection of the broader health information assets (including digital applications). To meet the objective, a single case study was conducted. Questionnaires were distributed to twenty-five Community Health Workers to identify existing stressors and resources in the context. The paper leads with a description of resource-constrained settings, highlights the challenges facing healthcare systems in these contexts and emphasizes the need for health information asset protection. The findings, recommendations and conclusions are subsequently presented. The contribution of this paper is a set of recommendations for improving health information asset protection in resource-constrained settings as informed by stressors and resources identified in the case study.CATEGORIES: · Security and privacy ~ Social aspects of security and privacy

Keywords : security and protection; organizational impacts; system management.

        · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License