| Literature DB >> 32245499 |
Mehrdad Farzandipour1,2, Zahra Meidani3,4, Ehsan Nabovati3,4, Monireh Sadeqi Jabali4, Razieh Dehghan Banadaki5.
Abstract
BACKGROUND: Implementing the health information system (HIS) is more complex and costly than implementing other information systems. The present study was conducted to design and evaluate technical requirements for the HIS.Entities:
Keywords: Communication service; Hospital information system; Security service; System architecture; System response time; Technical requirements
Mesh:
Year: 2020 PMID: 32245499 PMCID: PMC7119017 DOI: 10.1186/s12911-020-1076-5
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
The mean score of the technical requirements and the HIS evaluation results
| Domains | Delphi | Evaluation | ||||
|---|---|---|---|---|---|---|
| Mean Score | Yes | No | Total | Status | ||
| 1 | Communication service | 3.49 | 102 (63.8) | 58 (36.2) | 160 (100) | Good |
| 2 | System architecture | 3.53 | 283 (65.5) | 149 (34.5) | 432 (100) | Good |
| 3 | Security service | 3.5 | 359 (72.4) | 137 (27.6) | 496 (100) | Good |
| 4 | System response time | 3.82 | 61 (76.3) | 19 (23.8) | 80 (100) | Good |
| Total | 3.6 | 805 (68.9) | 363 (31.1) | 1168 (100) | Good | |
The mean score of communication service requirements and the HIS evaluation results
| Item | Delphi | Evaluation | ||
|---|---|---|---|---|
| Mean Score | Yes | No | ||
| 1 | Electronically transferring data among different hospital departments | 3.78 | 14 (87.5) | 2 (12.5) |
| 2 | Exchanging data with other software systems | 3.73 | 12 (75) | 4 (25) |
| 3 | Transferring data among different software versions | 3.71 | 12 (75) | 4 (25) |
| 4 | Using standard protocols approved by the country’s competent authorities to exchange patient records and financial information | 3.6 | 8 (50) | 8 (50) |
| 5 | Simultaneous review of a file by multiple users | 3.5 | 15 (93.8) | 1 (6.2) |
| 6 | Having access to the data of other components from other locations based on the access level | 3.5 | 16 (100) | – |
| 7 | Recording and modifying orders in different parts of the hospital and accessing these stations based on security and level of access | 3.34 | 14 (87.5) | 2 (12.5) |
| 8 | Calling the required developed services | 3.28 | 2 (12.5) | 14 (87.5) |
| 9 | Supporting communication with software through fax, WORD, spreadsheet, e-mail and the Internet | 3.26 | 6 (37.5) | 10 (62.5) |
| 10 | Consulting and communicating with physicians and specialists outside the hospital (audio-visual communication) | 3.18 | 3 (18.8) | 13 (81.2) |
| 3.49 ± 0.38 | 102 (63.8) | 58 (36.2) | ||
The mean score of system architecture requirements and the HIS evaluation results
| Item | Delphi | Evaluation | ||
|---|---|---|---|---|
| Mean Score | Yes | No | ||
| 1 | Using standard databases | 3.86 | 16 (100) | – |
| 2 | Handling the standard Persian language | 3.84 | 16 (100) | – |
| 3 | Handling an unlimited number of clients | 3.78 | 14 (87.5) | 2 (12.5) |
| 4 | Availability of standard templates for output and input information | 3.76 | 13 (81.2) | 3 (18.8) |
| 5 | Installing the client and server easily and standard form. | 3.73 | 16 (100) | – |
| 6 | Upgrading through the server easily and automatically | 3.73 | 14 (87.5) | 2 (12.5) |
| 7 | Employing standard programming languages | 3.71 | 15 (93.8) | 1 (6.2) |
| 8 | Compatibility with the international standards for client-server operating systems | 3.71 | 11 (68.8) | 5 (31.2) |
| 9 | Exporting data to different types of statistical programs | 3.71 | 11 (68.8) | 5 (31.2) |
| 10 | Generating customized reports | 3.68 | 9 (56.2) | 7 (43.8) |
| 11 | Application of server’s date and time rather than client’s date and time in the software | 3.63 | 13 (81.2) | 3 (18.8) |
| 12 | Execution of routines as services instead of manual execution | 3.55 | 12 (75) | 4 (25) |
| 13 | Being run in a network-connected mode using the client-server method | 3.52 | 13 (81.2) | 3 (18.8) |
| 14 | Providing predicted and routine reports | 3.52 | 14 (87.5) | 2 (12.5) |
| 15 | Adopting appropriate solutions to server connection among different units | 3.5 | 11 (68.8) | 5 (31.2) |
| 16 | Application of external devices and other devices in the system | 3.5 | 15 (93.8) | 1 (6.2) |
| 17 | Providing functional independence for clients of certain operating systems and platforms | 3.47 | 7 (43.8) | 9 (56.2) |
| 18 | Application of supported standards | 3.47 | 8 (50) | 8 (50) |
| 19 | Reporting through the Web Service | 3.44 | 7 (43.8) | 9 (56.2) |
| 20 | Providing all the technical specifications, relationships among tables, ERD, routines and among software classes as UML as well as other technical features of the database in writing and based on the RUP methodology for large projects or XP for small projects | 3.44 | 4 (25) | 12 (75) |
| 21 | Recording all the modifiable data and procedures in the database and avoiding storing them in the program code | 3.39 | 9 (56.2) | 7 (43.8) |
| 22 | Availability of a multilayer enterprise architecture for the design | 3.34 | 6 (37.5) | 10 (62.5) |
| 23 | Compatibility with the Web | 3.28 | 6 (37.5) | 10 (62.5) |
| 24 | Employing the procedures by using Commit and Rollback | 3.28 | 5 (31.2) | 11 (68.8) |
| 25 | Recording and editing data through the Web | 3.23 | 4 (25) | 12 (75) |
| 26 | Using open-source tools in the system design and production | 3.07 | 6 (37.5) | 10 (62.5) |
| 27 | Visibility of database contents and non-coding information | 3.02 | 8 (50) | 8 (50) |
| 3.53 ± 0.37 | 283 (65.5) | 149 (34.5) | ||
The mean score of security service requirements and the HIS evaluation results
| Item | Delphi | Evaluation | ||
|---|---|---|---|---|
| Mean Score | Yes | No | ||
| 1 | Automatic and periodic backup options | 3.89 | 15 (93.8) | 1 (6.2) |
| 2 | Observing all the protection and security issues when accessing the database on the network | 3.86 | 15 (93.8) | 1 (6.2) |
| 3 | Providing user identity by placing username and password based on the user access level | 3.84 | 16 (100) | – |
| 4 | Defining the access level based on layering data to preserve valuable information | 3.78 | 16 (100) | – |
| 5 | Security in web applications | 3.73 | 6 (37.5) | 10 (62.5) |
| 6 | Logging user performance and reporting it to the system administrator, log management | 3.71 | 12 (75) | 4 (25) |
| 7 | Automatic retrieval of information whenever necessary | 3.71 | 14 (87.5) | 2 (12.5) |
| 8 | Equipping servers and clients with the antivirus employed by users | 3.68 | 15 (93.8) | 1 (6.2) |
| 9 | Providing a program for electronically storing and archiving information at specific intervals | 3.68 | 10 (62.5) | 6 (37.5) |
| 10 | Not displaying encryption as text | 3.65 | 16 (100) | – |
| 11 | Supporting a standard locking mechanism to prevent updates by unauthorized individuals | 3.63 | 9 (56.2) | 7 (43.8) |
| 12 | Setting the password as text/number | 3.6 | 12 (75) | 4 (25) |
| 13 | Forming a personal information file including user characteristics required for determining the security service level | 3.6 | 13 (81.2) | 3 (18.8) |
| 14 | Defining functional roles and relationships with access levels | 3.6 | 14 (87.5) | 2 (12.5) |
| 15 | Recording and reporting all logins and logouts from the software and accessing all the appropriate features for registration such as username, workstation IP and MAC | 3.6 | 12 (75) | 4 (25) |
| 16 | Manual retrieval of information whenever necessary | 3.55 | 15 (93.8) | 1 (6.2) |
| 17 | Defining sections of the specific and confidential information | 3.55 | 11 (68.8) | 5 (31.2) |
| 18 | Resetting a password used | 3.5 | 15 (93.8) | 1 (6.2) |
| 19 | Application functionality in workstations under domain | 3.47 | 14 (87.5) | 2 (12.5) |
| 20 | Lack of access to the database except for the interface | 3.42 | 11 (68.8) | 5 (31.2) |
| 21 | Remote monitoring and control technology | 3.36 | 6 (37.5) | 10 (62.5) |
| 22 | Compatibility with hardware firewalls | 3.34 | 12 (75) | 4 (25) |
| 23 | Restricting user access to other operating system resources | 3.28 | 13 (81.2) | 3 (18.8) |
| 24 | Manual backup options | 3.28 | 16 (100) | – |
| 25 | Supporting digital signatures | 3.23 | 2 (12.5) | 14 (87.5) |
| 26 | Lack of a random port use | 3.23 | 5 (31.2) | 11 (68.8) |
| 27 | Not requiring local administrators | 3.21 | 13 (81.2) | 3 (18.8) |
| 28 | Authentication via domain | 3.18 | 11 (68.8) | 5 (31.2) |
| 29 | Providing access to the system using different IPs and routing capabilities | 3.15 | 6 (37.5) | 10 (62.5) |
| 30 | Using name (as defined in DNS) and not depending on IP and computer name | 3.15 | 9 (56.2) | 7 (43.8) |
| 31 | Supporting the biosensor technology for logon | 3.02 | 5 (31.2) | 11 (68.8) |
| 3.5 ± 0.39 | 359 (72.4) | 137 (27.6) | ||
The mean score of system response time requirements and the HIS evaluation results
| Item | Delphi | Evaluation | ||
|---|---|---|---|---|
| Mean Score | Yes | No | ||
| 1 | Fast search in sections with massive amounts of information | 3.86 | 11 (68.8) | 5 (31.2) |
| 2 | Easily and quickly reporting | 3.84 | 13 (81.2) | 3 (18.8) |
| 3 | Responding to user requests for specific operations within an acceptable response time | 3.81 | 9 (56.2) | 7 (43.8) |
| 4 | Providing uninterrupted access to the system 24 h a day | 3.81 | 16 (100) | – |
| 5 | Acceptable processing time | 3.78 | 12 (75) | 4 (25) |
| 3.82 ± 0.29 | 61 (76.2) | 19 (23.8) | ||