Research Publications (Accounting and Informatics)
Permanent URI for this collectionhttp://ir-dev.dut.ac.za/handle/10321/212
Browse
3 results
Search Results
Item Health information system and health care applications performance in the healthcare arena : a bibliometric analysis(MDPI AG, 2022-11-12) Epizitone, Ayogeboh; Moyane, Smangele Pretty; Agbehadji, Israel EdemThere have been several studies centred on health information systems with many insights provided to enhance health care applications globally. These studies have provided theoretical schemes for fortifying the enactment and utilisation of the Health Information System (HIS). In addition, these research studies contribute greatly to the development of HIS in alignment with major stakeholders such as health practitioners and recipients of health care. Conversely, there has been trepidation about HIS' sustainability and resilience for healthcare applications in the era of digitalization and globalization. Hence, this paper investigates research on HIS with a primary focus on health care applications to ascertain its sustainability and resilience amidst the transformation of the global healthcare space. Therefore, using a bibliometric approach, this paper measures the performance of health information systems and healthcare for health care applications using bibliometric data from the web of science database. The findings reveal solid evidence of the constructive transformation of health information systems and health care applications in the healthcare arena, providing ample evidence of the adaptation of HIS and health care applications within the healthcare arena to the fourth industrial revolution and, additionally, revealing the resilient alignment of health care applications and health information systems.Item Assessment of user authentication risks in a healthcare knowledge management system(The Clute Insitute, 2015) Adekanmbi, Oluwole; Green, PaulRisk management is a concept which has becomes very popular with a number of national and international businesses. Many companies often establish a risk management procedure in their projects for improving performance and increasing profits. Projects undertaken in the construction sector are widely complex, often having significant budgets; therefore, reducing risks associated with projects should be a priority for each project manager. Patient information security has become a matter of interest to healthcare professionals, governments and researchers worldwide. This paper proposes a comprehensive risk assessment methodology that provides a decision support tool, directed to a healthcare system, which can be utilized for evaluating risk involved during user authorization and authentication procedures. Within this context, a process technique was implemented to develop a risk assessment model, which is used to derive the relative priorities of the risk factors associated with a healthcare knowledge management system. The study showed risks involved when users are accessing a healthcare system. It proposes a model for assessing each risk occurring during the user authorization and authentication process. The results of the knowledge generated from the risk assessment provide a basis for deriving a system performance that is desirable for evaluating risk.Item Assessment of user authentication risks in a healthcare knowledge management system(The Clute Institute, 2015) Adekanmbi, Oluwole; Green, PaulThis paper proposes a comprehensive risk assessment methodology that provides a decision support tool, directed to a healthcare system, which can be utilized for evaluating risk involved during user authorization and authentication procedures. Within this context, a process technique was implemented to develop a risk assessment model, which is used to derive the relative priorities of the risk factors associated with a healthcare knowledge management system. The study showed risks involved when users are accessing a healthcare system. It proposes a model for assessing each risk occurring during the user authorization and authentication process. The results of the knowledge generated from the risk assessment provide a basis for deriving a system performance that is desirable for evaluating risk.