Evaluating Usability of Security Mechanisms of E-Health Applications: Cases from Ethiopia

dc.contributor.advisorLessa, Lemma (PhD)
dc.contributor.authorGeorge, Antonyo
dc.date.accessioned2020-11-16T09:03:24Z
dc.date.accessioned2023-11-18T12:46:59Z
dc.date.available2020-11-16T09:03:24Z
dc.date.available2023-11-18T12:46:59Z
dc.date.issued2020-06-06
dc.description.abstractE-Health systems play an important role in information processing in healthcare for the benefit of the patient as well as health professionals in hospital. Various pieces of literature support that many of e-health applications were developed by using one or more standards in SDLC from start to finish to fulfill the functional requirement and more with a proper set of security mechanisms in place, from the development point of view. However, majority of these security mechanisms were not considered from the users’ point of view. As a result, security of health information is becoming an important and growing concern for all those delivering healthcare by protecting sensitive patient records from unauthorized people using security mechanisms. This research is aimed at answering the following two research questions: How usable are the security mechanisms of e-Health applications in Ethiopia? And how do we improve the usability aspect of the security mechanisms of e-Health applications? The objective is to evaluate usability of security mechanisms of e-Health applications functional at health facilities operational under Addis Ababa Health Bureau and identify strengths and weaknesses of the usability of the security features of the e-Health applications. This study uses a qualitative research methodology that uses heuristic evaluation of using three e- Health applications by three experts with thematic analysis to identify their focus idea from the collected data. Three e-health systems are widely used by health care facilities in Ethiopia (DHIS2, SmartCare, and OpenEMR). Data collection instrument having thirteen criteria (Visibility, revocability, clarity, convey features/expressiveness, learnability, aesthetics and minimalist design, errors, satisfaction, user suitability, user language, user assistance, security and privacy) was adopted from a framework developed by Yeratziotis (2011) dissertation and updated in 2012. The finding reviled that out of the thirteen criteria, learnability, aesthetics and minimalist design, and user language were in compliance, in contrary revocability and user suitability were not in compliance with security features according to all the experts review of all e-Health applications. Finally, recommendations were given for practice and suggestions forwarded for future research.en_US
dc.identifier.urihttp://etd.aau.edu.et/handle/12345678/23310
dc.language.isoenen_US
dc.publisherAddis Ababa Universityen_US
dc.subjectApplication Securityen_US
dc.subjectUsabilityen_US
dc.subjectUsable Securityen_US
dc.subjectHuman-Computer Interactionen_US
dc.titleEvaluating Usability of Security Mechanisms of E-Health Applications: Cases from Ethiopiaen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Antonyo George 2020.pdf
Size:
1.93 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description: