IEEE Technology and Society Magazine - Spring 2013 - 41

facility or by its affiliate third party
provider to ensure that there is a sufficiently large subscription base to
support the operation. people in the
rural community can be invited to
subscribe to the micro-health-insurance in exchange for low or no cost
healthcare by community healthcare workers. The money raised
through the insurance premium will
be used to fund both the community
healthcare workers and the central
medical facility.
To ensure perceived value by the
end customers, the quality of community healthcare workers is crucial. The healthcare workers need
to be sufficiently professionally
trained and proactive in reaching out
to patients, especially for preventive
medical services.

Key Risk Exposures
There are many layers of risk exposures associated with the proposed
solution, including technical risks,
human factors, and operationally
related impairments. While technical
issues are important, frequently it is
the latter two risk components that
can lead to premature failures of
a scheme.
With the large number of people and components involved in
a community healthcare system,
there are constant exposures to the
risk components. It is important to
identify the risks early and derive
mitigation and safeguard strategies during system design, and to
factor risks into the evaluation of
the solution.
One of the most fundamental risks
is the acceptance of the solution by the
various stakeholders, including the
people at the central medical facility,
the community healthcare workers,
and the rural community inhabitants.
Without adequate support and buy-in
by all these groups, the solution will
fail. To secure buy-in, it is critical
that the value of the solution is clear
for everyone.
Even if all the stakeholders
embrace the solution, sustainability can only be preserved if the

There are constant exposures to risk
components.
generated revenue is sufficient to
provide reasonable benefits to all.
These include adequate income
for the community healthcare
workers at a fair market pay level
and sufficient compensation to the
central medical facility for running the electronic medical record
system and the rFID medical
card system. In addition, the number of patients participating in the
scheme, the patients' willingness
to pay for the services, and the
quality of healthcare service that
can be provided are key factors
that will determine the long-term
viability of such a community
e-health solution.
The ongoing maintenance of
equipment, continuous training
of healthcare workers, and accurate and safe keeping of personal
health records will determine the
reputation of the scheme and the
support of the community. If any
of these elements breaks down or
if there are any serious errors or
malpractices, it can lead to irreparable, long-term damage to the
mutual trust between the provider
and the community.
Fraud is another risk exposure that may threaten the system.
There are potential cash transfers
within the system; the community
healthcare workers can potentially
bypass the system entirely and take
the full fee from the patients without passing on the agreed share to
the central medical facility. The
community healthcare workers
may even negotiate a lower rate
with the patients to encourage
the patient to undercut the central medical facility and participate in the fraud. In this situation
the healthcare workers will not be
able to update the medical record
of the patient or retrieve medical
records from the central medical
facility. This is a source of revenue

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

|

SprING 2013

leakage even though it still helps
to ease the loading of the central
medical facility. This revenue leakage is not easy to plug completely
apart from the use of tight supervision and tracking of performance
and impose disciplinary actions
against offending healthcare workers if foul plays are discovered.
Good training together with some
form of competition among the
community healthcare workers or
incentive scheme may help to minimize the temptation of fraudulent
practices and instill a sense of pride
and loyalty. The use of analytics
can also help to identify systematic
fraudulent activities.
privacy and security are valid
concerns when personal health
information is being handled,
transferred, and recorded, especially in the field. Adequate
security measures have to be put
in place to ensure that personal
information is not exposed or
intercepted by third parties during storage or being transmitted.
To this end password protected
access to the mobile rFID device
is of critical importance; adequate
training for the community healthcare workers on ethical practice
would also be useful. Many of
the issues including the custodian
of the personal clinical information, transmission of the record,
storage of the content, the technical approach to security and
authentication, and the party who
authorizes access to the information are of critical importance to
protect the individuals. In addition
to basic security measures, secure
transmission techniques including
secure socket layer for encryption
information over the network or
secure tunnels such as virtual private network or secure shell technology will be appropriate as part
of the implementation.
|

41



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - Spring 2013

IEEE Technology and Society Magazine - Spring 2013 - Cover1
IEEE Technology and Society Magazine - Spring 2013 - Cover2
IEEE Technology and Society Magazine - Spring 2013 - 1
IEEE Technology and Society Magazine - Spring 2013 - 2
IEEE Technology and Society Magazine - Spring 2013 - 3
IEEE Technology and Society Magazine - Spring 2013 - 4
IEEE Technology and Society Magazine - Spring 2013 - 5
IEEE Technology and Society Magazine - Spring 2013 - 6
IEEE Technology and Society Magazine - Spring 2013 - 7
IEEE Technology and Society Magazine - Spring 2013 - 8
IEEE Technology and Society Magazine - Spring 2013 - 9
IEEE Technology and Society Magazine - Spring 2013 - 10
IEEE Technology and Society Magazine - Spring 2013 - 11
IEEE Technology and Society Magazine - Spring 2013 - 12
IEEE Technology and Society Magazine - Spring 2013 - 13
IEEE Technology and Society Magazine - Spring 2013 - 14
IEEE Technology and Society Magazine - Spring 2013 - 15
IEEE Technology and Society Magazine - Spring 2013 - 16
IEEE Technology and Society Magazine - Spring 2013 - 17
IEEE Technology and Society Magazine - Spring 2013 - 18
IEEE Technology and Society Magazine - Spring 2013 - 19
IEEE Technology and Society Magazine - Spring 2013 - 20
IEEE Technology and Society Magazine - Spring 2013 - 21
IEEE Technology and Society Magazine - Spring 2013 - 22
IEEE Technology and Society Magazine - Spring 2013 - 23
IEEE Technology and Society Magazine - Spring 2013 - 24
IEEE Technology and Society Magazine - Spring 2013 - 25
IEEE Technology and Society Magazine - Spring 2013 - 26
IEEE Technology and Society Magazine - Spring 2013 - 27
IEEE Technology and Society Magazine - Spring 2013 - 28
IEEE Technology and Society Magazine - Spring 2013 - 29
IEEE Technology and Society Magazine - Spring 2013 - 30
IEEE Technology and Society Magazine - Spring 2013 - 31
IEEE Technology and Society Magazine - Spring 2013 - 32
IEEE Technology and Society Magazine - Spring 2013 - 33
IEEE Technology and Society Magazine - Spring 2013 - 34
IEEE Technology and Society Magazine - Spring 2013 - 35
IEEE Technology and Society Magazine - Spring 2013 - 36
IEEE Technology and Society Magazine - Spring 2013 - 37
IEEE Technology and Society Magazine - Spring 2013 - 38
IEEE Technology and Society Magazine - Spring 2013 - 39
IEEE Technology and Society Magazine - Spring 2013 - 40
IEEE Technology and Society Magazine - Spring 2013 - 41
IEEE Technology and Society Magazine - Spring 2013 - 42
IEEE Technology and Society Magazine - Spring 2013 - 43
IEEE Technology and Society Magazine - Spring 2013 - 44
IEEE Technology and Society Magazine - Spring 2013 - 45
IEEE Technology and Society Magazine - Spring 2013 - 46
IEEE Technology and Society Magazine - Spring 2013 - 47
IEEE Technology and Society Magazine - Spring 2013 - 48
IEEE Technology and Society Magazine - Spring 2013 - 49
IEEE Technology and Society Magazine - Spring 2013 - 50
IEEE Technology and Society Magazine - Spring 2013 - 51
IEEE Technology and Society Magazine - Spring 2013 - 52
IEEE Technology and Society Magazine - Spring 2013 - 53
IEEE Technology and Society Magazine - Spring 2013 - 54
IEEE Technology and Society Magazine - Spring 2013 - 55
IEEE Technology and Society Magazine - Spring 2013 - 56
IEEE Technology and Society Magazine - Spring 2013 - 57
IEEE Technology and Society Magazine - Spring 2013 - 58
IEEE Technology and Society Magazine - Spring 2013 - 59
IEEE Technology and Society Magazine - Spring 2013 - 60
IEEE Technology and Society Magazine - Spring 2013 - 61
IEEE Technology and Society Magazine - Spring 2013 - 62
IEEE Technology and Society Magazine - Spring 2013 - 63
IEEE Technology and Society Magazine - Spring 2013 - 64
IEEE Technology and Society Magazine - Spring 2013 - 65
IEEE Technology and Society Magazine - Spring 2013 - 66
IEEE Technology and Society Magazine - Spring 2013 - 67
IEEE Technology and Society Magazine - Spring 2013 - 68
IEEE Technology and Society Magazine - Spring 2013 - 69
IEEE Technology and Society Magazine - Spring 2013 - 70
IEEE Technology and Society Magazine - Spring 2013 - 71
IEEE Technology and Society Magazine - Spring 2013 - 72
IEEE Technology and Society Magazine - Spring 2013 - 73
IEEE Technology and Society Magazine - Spring 2013 - 74
IEEE Technology and Society Magazine - Spring 2013 - 75
IEEE Technology and Society Magazine - Spring 2013 - 76
IEEE Technology and Society Magazine - Spring 2013 - 77
IEEE Technology and Society Magazine - Spring 2013 - 78
IEEE Technology and Society Magazine - Spring 2013 - 79
IEEE Technology and Society Magazine - Spring 2013 - 80
IEEE Technology and Society Magazine - Spring 2013 - Cover3
IEEE Technology and Society Magazine - Spring 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com