The BID Initiative Story highlights the value of collaborative, country-driven planning; local leadership and ownership; user-centered design; and continuous learning and adaptation when developing and deploying innovations. It also shows why we are optimistic about our progress and future efforts to improve health services and outcomes across sub-Saharan Africa by transforming data collection, quality, and use.
The purpose of this document is to present a description of the Tanzania Immunization Registry (TImR), a system developed in collaboration with the Government of Tanzania and PATH through the BID Initiative to address many of the challenges the immunization program faces. This document explains the purpose and features of TImR, how it should interface with external systems, the constraints under which the system must operate, and the data that needs to be collected. The full document is available here.
The Zambia Electronic Immunization Registry (ZEIR), powered by the Open Smart Register Platform (OpenSRP), is an open source Android application geared towards frontline health workers with offline functionality and is interoperable with other open source global goods such as District Health Information Software (DHIS2). ZEIR is standard based and has been built to ensure timely, complete and accurate immunization data that enables the tracking of children and their vaccination records. This user manual provides instructions on how to use the ZEIR app during daily work at the health facility.
“It is the ability to benchmark across countries, adjust variables, and produce data for planning, that transforms our ability to understand health systems,” said Dr. Ariel Pablos-Méndez, Assistant Administrator, Bureau for Global Health, at the recent launch of USAID’s Health Systems Benchmarking Tool. Unlike other web-based tools, the HSBT is intended for use in the field. It can be easily downloaded and is not reliant on Wi-Fi or large bandwidth. Download the tool...
The promise of digital technologies has seen multiple systems and millions of dollars invested for health information system in Sub-Saharan Africa. After overcoming barriers of infrastructure, technology, and connectivity, few of these systems have been able to directly impact patient care.
Articles in this issue show clearly the enormous impact that the use of health information technology can have on the quality of health care for children. However, they also point out the challenges that need to be overcome to realize fully the potential of health information technology to improve the quality and efficiency of health care.
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.
Poverty has deepened the crisis in health-care delivery in developing countries, particularly sub-Saharan Africa, which is a region facing a disease burden that is unmatched in the world. Whether access to proven and powerful information and communication technologies (ICTs) can improve health indicators is an ongoing debate. However, this brief review shows that in the last decade there has been significant growth in Internet access in urban areas; health-care workers now use it for communication, access to relevant health-care information, and international collaboration. The central message learned during this period about the application of ICTs is that infrastructural and cultural contexts vary and require different models and approaches. Thus, to harness the full potential of ICTs to the benefit of health systems, health workers, and patients will demand an intricate mix of old and new technologies.
The Product Vision for the Better Immunization Data (BID) Initiative combines a "top down" approach with a "bottom up" view. We begin with the national strategies, incorporating the current context of the users (e.g., the functional architecture) before considering the facility applications (e.g., the technical architecture) that are in use and have gained traction, and how they might tie together. Through a series of seven chapters, you will be led through the steps to organize how your processes and information and communication technology (ICT) infrastructure can be integrated and standardized to meet a ministry of health's vision and requirements. This document is not intended to be a definitive description of any single country's health enterprise architecture (EA). Rather, it is a starting point; a toolkit that may be adapted by countries, as necessary, to a specific country's needs and reflective of their unique context. Readers are not expected to be experts in ICT or in EA. However, a basic knowledge of eHealth and its role in supporting health care delivery workflows is assumed. The document is written in plain language with background information, illustrations of key points, and examples where it is thought they will be helpful.
Biometrics refers to the automatic identification of human beings based on their physical and/or behavioural characteristics (Bio = life + Metrics = measurement). These characteristics present some specific properties such as, uniqueness and persistency, making them suitable for this kind of task. Examples of physical characteristics include among others: fingerprints, face, iris, retina, and hand geometry. On the other hand, examples of behavioural characteristics include: signature, voice, keystroke dynamics, etc. The purpose of this book is to serve as an introductory source of information for people interested in Biometrics.