“It is the ability to benchmark across countries, adjust variables, and produce data for planning, that transforms our ability to understand health systems,” said Dr. Ariel Pablos-Méndez, Assistant Administrator, Bureau for Global Health, at the recent launch of USAID’s Health Systems Benchmarking Tool. Unlike other web-based tools, the HSBT is intended for use in the field. It can be easily downloaded and is not reliant on Wi-Fi or large bandwidth. Download the tool...
The promise of digital technologies has seen multiple systems and millions of dollars invested for health information system in Sub-Saharan Africa. After overcoming barriers of infrastructure, technology, and connectivity, few of these systems have been able to directly impact patient care.
The Product Vision for the Better Immunization Data (BID) Initiative combines a "top down" approach with a "bottom up" view. We begin with the national strategies, incorporating the current context of the users (e.g., the functional architecture) before considering the facility applications (e.g., the technical architecture) that are in use and have gained traction, and how they might tie together. Through a series of seven chapters, you will be led through the steps to organize how your processes and information and communication technology (ICT) infrastructure can be integrated and standardized to meet a ministry of health's vision and requirements. This document is not intended to be a definitive description of any single country's health enterprise architecture (EA). Rather, it is a starting point; a toolkit that may be adapted by countries, as necessary, to a specific country's needs and reflective of their unique context. Readers are not expected to be experts in ICT or in EA. However, a basic knowledge of eHealth and its role in supporting health care delivery workflows is assumed. The document is written in plain language with background information, illustrations of key points, and examples where it is thought they will be helpful.
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.
Poverty has deepened the crisis in health-care delivery in developing countries, particularly sub-Saharan Africa, which is a region facing a disease burden that is unmatched in the world. Whether access to proven and powerful information and communication technologies (ICTs) can improve health indicators is an ongoing debate. However, this brief review shows that in the last decade there has been significant growth in Internet access in urban areas; health-care workers now use it for communication, access to relevant health-care information, and international collaboration. The central message learned during this period about the application of ICTs is that infrastructural and cultural contexts vary and require different models and approaches. Thus, to harness the full potential of ICTs to the benefit of health systems, health workers, and patients will demand an intricate mix of old and new technologies.
Articles in this issue show clearly the enormous impact that the use of health information technology can have on the quality of health care for children. However, they also point out the challenges that need to be overcome to realize fully the potential of health information technology to improve the quality and efficiency of health care.
Biometrics refers to the automatic identification of human beings based on their physical and/or behavioural characteristics (Bio = life + Metrics = measurement). These characteristics present some specific properties such as, uniqueness and persistency, making them suitable for this kind of task. Examples of physical characteristics include among others: fingerprints, face, iris, retina, and hand geometry. On the other hand, examples of behavioural characteristics include: signature, voice, keystroke dynamics, etc. The purpose of this book is to serve as an introductory source of information for people interested in Biometrics.
The potential for misidentification of trial participants, leading to misclassification, is a threat to the integrity of randomized controlled trials. The correct identification of study subjects in large trials over prolonged periods is of vital importance to those conducting clinical trials. Currently used means of identifying study participants, such as identity cards and records of name, address, name of household head and demographic characteristics, require large numbers of well-trained personnel, and still leave room for uncertainty.