The BID Initiative took a holistic approach to address immunization data challenges by packaging together information system products, data management policies, and evidence-based practices with people who are empowered to improve decision-making. This document captures the various lessons learned throughout BID, from the design and testing phase through implementation, noting if the lesson was learned in the Tanzania or Zambia implementation (or both). Read the full BID Initiative Lessons Learned Encyclopedia.
“It is the ability to benchmark across countries, adjust variables, and produce data for planning, that transforms our ability to understand health systems,” said Dr. Ariel Pablos-Méndez, Assistant Administrator, Bureau for Global Health, at the recent launch of USAID’s Health Systems Benchmarking Tool. Unlike other web-based tools, the HSBT is intended for use in the field. It can be easily downloaded and is not reliant on Wi-Fi or large bandwidth. Download the tool...
The promise of digital technologies has seen multiple systems and millions of dollars invested for health information system in Sub-Saharan Africa. After overcoming barriers of infrastructure, technology, and connectivity, few of these systems have been able to directly impact patient care.
Articles in this issue show clearly the enormous impact that the use of health information technology can have on the quality of health care for children. However, they also point out the challenges that need to be overcome to realize fully the potential of health information technology to improve the quality and efficiency of health care.
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.
Poverty has deepened the crisis in health-care delivery in developing countries, particularly sub-Saharan Africa, which is a region facing a disease burden that is unmatched in the world. Whether access to proven and powerful information and communication technologies (ICTs) can improve health indicators is an ongoing debate. However, this brief review shows that in the last decade there has been significant growth in Internet access in urban areas; health-care workers now use it for communication, access to relevant health-care information, and international collaboration. The central message learned during this period about the application of ICTs is that infrastructural and cultural contexts vary and require different models and approaches. Thus, to harness the full potential of ICTs to the benefit of health systems, health workers, and patients will demand an intricate mix of old and new technologies.
The digital health community is on a journey to deliver health impact. We have achieved considerable success in the past decade, demonstrating that information and communication technology can improve health services delivery in the developing world. Although our achievements implementing pilots should
be celebrated, we must also acknowledge that digital health interventions are not yet routinely used as part of all global health service delivery and have not yet been proven to demonstrate large scale health impact. This paper describes a journey toward successful scale in digital health interventions.
The Product Vision for the Better Immunization Data (BID) Initiative combines a "top down" approach with a "bottom up" view. We begin with the national strategies, incorporating the current context of the users (e.g., the functional architecture) before considering the facility applications (e.g., the technical architecture) that are in use and have gained traction, and how they might tie together. Through a series of seven chapters, you will be led through the steps to organize how your processes and information and communication technology (ICT) infrastructure can be integrated and standardized to meet a ministry of health's vision and requirements. This document is not intended to be a definitive description of any single country's health enterprise architecture (EA). Rather, it is a starting point; a toolkit that may be adapted by countries, as necessary, to a specific country's needs and reflective of their unique context. Readers are not expected to be experts in ICT or in EA. However, a basic knowledge of eHealth and its role in supporting health care delivery workflows is assumed. The document is written in plain language with background information, illustrations of key points, and examples where it is thought they will be helpful.
Biometrics refers to the automatic identification of human beings based on their physical and/or behavioural characteristics (Bio = life + Metrics = measurement). These characteristics present some specific properties such as, uniqueness and persistency, making them suitable for this kind of task. Examples of physical characteristics include among others: fingerprints, face, iris, retina, and hand geometry. On the other hand, examples of behavioural characteristics include: signature, voice, keystroke dynamics, etc. The purpose of this book is to serve as an introductory source of information for people interested in Biometrics.
The potential for misidentification of trial participants, leading to misclassification, is a threat to the integrity of randomized controlled trials. The correct identification of study subjects in large trials over prolonged periods is of vital importance to those conducting clinical trials. Currently used means of identifying study participants, such as identity cards and records of name, address, name of household head and demographic characteristics, require large numbers of well-trained personnel, and still leave room for uncertainty.