The Tele-Board MED server’s availability could
be checked by a request from inside the clinic
network. Incidents of e.g., hard disk failure, can
then be reported automatically by using an inter-
nal mail server.
• Automated security scans performed with a spe-
cial software, e.g., Nessus,
19
allow to check the
infrastructure for vulnerabilities on a regular ba-
sis. These checks provide feedback for the person
responsible for security updates of the involved
systems.
The mentioned measures and tools allow an auto-
mated prevention and detection of security threats,
and therefore improve the protection and simplify the
management of security events for the monitored sys-
tem. However, the presence of such tools still does
not guarantee that a system is fully secure.
7 CONCLUSION
In this paper we illustrated the realization of security
measures in our system Tele-Board MED in order to
create conditions which shall enable user tests involv-
ing patients in a psychotherapy clinic.
The described security issues concern technical,
infrastructural, personal as well as organizational lev-
els. In order to cover these aspects as comprehen-
sively as possible we took into account several refer-
ences such as legal obligations and general informa-
tion security objectives.
The more comprehensive the security measure
catalogue gets, the higher the security level is. Yet,
an absolute guarantee can never be reached.
The focus in research projects on new applications
or concepts of human computer interaction, is often
on functional features and their usage. Nevertheless,
if such projects involve sensitive data, an integrated
security concept is recommended from the beginning.
Even if it is about early user tests, sensitive personal
data is worthwhile protecting.
We hope that the measures described in this pa-
per can serve as an example for other health software
research projects dealing with sensitive patient data.
ACKNOWLEDGEMENTS
The work of this project was funded by the HPI-
Stanford Design Thinking Research Program.
19
http://www.nessus.org
REFERENCES
Curtin, C. M. and Ayres, L. T. (2008). Using Science to
Combat Data Loss: Analyzing Breaches by Type and
Industry. I/S: A Journal of Law and Policy for the
Information Society, 4:566–598.
European Parliament and the Council of the European
Union (1995). Directive 95/46/EC of the european
parliament and of the council of 24 october 1995 on
the protection of individuals with regard to the pro-
cessing of personal data and on the free movement of
such data. Official Journal of the European Union,
L281:0031–0050.
Fern
´
andez-Alem
´
an, J. L., Se
˜
nor, I. C., Lozoya, P.
´
A. O., and
Toval, A. (2013). Security and privacy in electronic
health records: A systematic literature review. Journal
of Biomedical Informatics, 46(3):541–562.
German Medical Association (2008). Empfehlungen zur
¨
arztlichen Schweigepflicht, Datenschutz und Daten-
verarbeitung in der Arztpraxis - Technische An-
lage. http://www.bundesaerztekammer.de/downloads/
Schweigepflicht Tech Anlage 2008.pdf.
Gumienny, R., Gericke, L., Quasthoff, M., Willems, C., and
Meinel, C. (2011). Tele-Board: Enabling efficient col-
laboration in digital design spaces. Proceedings of the
International Conference on Computer Supported Co-
operative Work in Design (CSCWD), pages 47–54.
Gumienny, R., Gericke, L., Wenzel, M., and Meinel, C.
(2013). Supporting creative collaboration in globally
distributed companies. CSCW ’13, pages 995–1007.
ACM.
Josephsen, D. (2007). Building a Monitoring Infrastructure
with Nagios. Prentice Hall PTR, Upper Saddle River,
NJ, USA.
Lambert, M. J. (2013). Bergin and Garfield’s Handbook of
Psychotherapy and Behavior Change. John Wiley &
Sons.
Leiner, F., Gaus, W., Haux, R., Knaup-Gregori, P., and
Pfeiffer, K.-P. (2009). Medizinische Dokumenta-
tion: Grundlagen einer qualit
¨
atsgesicherten integri-
erten Krankenversorgung ; Lehrbuch und Leitfaden.
Schattauer.
Pelnekar, C. (2011). Planning for and Implementing ISO
27001. ISACA Journal, 4:28–35.
Roehrig, S. and Knorr, K. (2000). Towards a Secure Web
Based Health Care Application. Proceedings of the
European Conference on Information Systems (ECIS),
pages 1323–1330.
van der Linden, H., Kalra, D., Hasman, A., and Talmon,
J. (2009). Inter-organizational future proof EHR sys-
tems. A review of the security and privacy related is-
sues. International journal of medical informatics,
78(3):141–60.
von Thienen, J. P. A., Perlich, A., and Meinel, C.
(2015). Design Thinking Research. Building Innova-
tors, chapter Tele-Board MED: Supporting Twenty-
First Century Medicine for Mutual Benefit. Springer.
ImplementationofDataSecurityRequirementsinaWeb-basedApplicationforInteractiveMedicalDocumentation
359