implemented the child protection by prevention. The
Childhood protection is a subject with high value for
the society, but, the Child Abuse cases are difficult
to identify (JN, 2013). The process from suspicious
to accusation is very difficult to achieve. It must
configure very strong evidences. Typically, Health
Care services deal with these cases from the
beginning where there are evidences based on the
diagnosis, but they aren't enough to promote the
accusation. Besides that, this subject is highly
sensitive because there are legal aspects to deal with
such as: the patient privacy, paternity issues, medical
confidentiality, among others.
2 HEALTHCARE CRITICAL
KNOWLEGE
The development of standards of health care
software is a big step to the interoperability between
information systems in this area. There are, at least,
six entities that have developed standards in this
field: The American Society for Testing and
Materials with ASTM-E31, The American National
Standards Institute with ANSI-HL7, The European
Committee for Standardization with CEN-TC251,
The International Organization for Standardization
with ISO-TC215, The Association of Electrical
Equipment and Medical Imaging Manufactures with
NEMA-DICOM and IEEE with multiple standards
(IRMA, 2013). With the evolution of the health care
information systems the access to patient
information using Electronic Health Record Systems
(EHRS) is facilitated, e. g. Urgency treatment data,
health monitoring data, among others. According to
the health domain analysis report from the technical
committee from HL7 about security and privacy of
health care information, particularly, in exchange of
information between information systems and
according to HL7 Security and Privacy Ontology
was possible for us to identify critical knowledge
concepts in health care domain (WG, 2013, HL7,
2010): Substances abuse, Sexual abuse and domestic
violence, Genetic disease, Sexual transmitted
disease, Sickle Cell, Sexuality and Reproductive,
HIV/AIDS, Psychiatry and Taboo (HL7, 2010), see
figure 1.
From this, we explore the subject General
Abuses with the focus on the child abuse and based
on regulations and legal documentation we have
constructed an ontology that maps the concepts:
symptoms, behaviour and other evidences of child
abuse (Saúde, 2008). For the different phases and
objectives of this research we have used multiple
research techniques: survey literature techniques,
content analysis and proof of concept in Design
Research context.
“Design Science research is a research paradigm
in which a designer answers questions relevant to
human problems via the creation of innovative
artefacts, thereby contributing new knowledge to the
body of scientific evidence. The designed artefacts
are both useful and fundamental in understanding
that problem” (Hevner and Chatterjee, 2010).
The design science research has its roots in the
sciences of the artificial. Artificial as something that
is created by humans that doesn’t exists in Nature.
Design Research is fundamentally a problem-solving
paradigm. It consists in seeking innovation through
ideas, practices, technical abilities and products
obtained from a set of routines such as: analysis,
design, implementation, and use of information
systems concerning the effectiveness and efficiency
achievement on organizations. The outputs forms of
Design research could be: constructs (vocabulary
and symbols), models (abstractions and
representations), methods (algorithms and practices),
and instantiations (implemented and prototype
systems).
3 CHILD ABUSE CRITICAL
KNOWLEDGE MONITORING
SYSTEM
The model of the system, see figure 1 and 2, is
defined by four components: the knowledge capture
component that allows to extract topics and the
descriptors from documents, the critical knowledge
ontology component that is used to filter the critical
topics and descriptors addressing the context of
ontology; the critical knowledge repository
component that stores all files produced in all
process of the system; and the alert and log
component that we need the use of Artificial
Intelligent algorithms and techniques that allow to
predict actions. Each component is based on a
variety of information systems fields (Pereira and
Santos, 2012, Pereira and Santos, 2013a).
Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model
237