Conference PaperPDF Available

Abstract and Figures

In Zimbabwe the health care delivery system is hierarchical and patient transfer from the lower level to the next higher level health care facility involves patients carrying their physical medical record card. A medical record card holds information pertaining to the patient's medical history, pre-existing allergies, medical health conditions, prescribed medication the patient is currently taking among other details. Recording such patient information on a medical health card renders it susceptible to tempering, loss, and misinterpretation as well as susceptible to breaches in confidentiality. In this paper, we propose the application of Quick Response (QR) codes to secure and transmit this sensitive patient information from one level of the health care delivery system to another. Other security methods such as steganography could be used, but in this paper we propose the use of QR codes owing to the high proliferation of mobile phones in the country, high storage capacity, flexibility, ease of use and their capability to maintain data integrity as well as storage of data in any format.
Content may be subject to copyright.
Proceedings of Informing Science & IT Education Conference (InSITE) 2015
Cite as: Dube, S., Ndlovu, S., Nyathi, T., & Sibanda, K. (2015). QR code based patient medical health records trans-
mission: Zimbabwean case. Proceedings of Informing Science & IT Education Conference (InSITE) 2015, 521-520.
Retrieved from http://Proceedings.InformingScience.org/InSITE2015/InSITE15p521-530Dube1523.pdf
Editor: Eli Cohen
QR Code Based Patient Medical Health Records
Transmission: Zimbabwean Case
Sibusisiwe Dube, Siqabukile Ndlovu, Thambo Nyathi,
and Khulekani Sibanda
National University of Science and Technology,
Bulawayo, Bulawayo Province, Zimbabwe
sibusisiwe.dube@nust.ac.zw, siqabukile.sihwa@nust.ac.zw,
thambo.nyathi@nust.ac.zw, khulekani.sibanda@nust.ac.zw
Abstract
In Zimbabwe the health care delivery system is hierarchical and patient transfer from the lower
level to the next higher level health care facility involves patients carrying their physical medical
record card. A medical record card holds information pertaining to the patient’s medical history,
pre-existing allergies, medical health conditions, prescribed medication the patient is currently
taking among other details. Recording such patient information on a medical health card renders
it susceptible to tempering, loss, and misinterpretation as well as susceptible to breaches in confi-
dentiality. In this paper, we propose the application of Quick Response (QR) codes to secure and
transmit this sensitive patient information from one level of the health care delivery system to
another. Other security methods such as steganography could be used, but in this paper we pro-
pose the use of QR codes owing to the high proliferation of mobile phones in the country, high
storage capacity, flexibility, ease of use and their capability to maintain data integrity as well as
storage of data in any format.
Keywords QR code(s), medical health records, mobile phone, patient, medical health card
Introduction
The health care delivery system in Zimbabwe has a hierarchical structure depicted in
Figure 1.
In an ideal situation the community, this could be a village in a rural setting or a locale in an ur-
ban setting is manned by an individual with basic medical training referred to as a community
health worker (CHW)(Ministry of Health &Child Welfare Zimbabwe, 2013). The CHW is not
usually attached to any physical structure such as a clinic but is mobile within the community
he/she can make home visits and be vis-
ited to attend to minor ailments. This
scenario is no longer the case in urban
settings as people are not restricted in
choice when it comes to health issues,
but is still more prevalent in rural areas
which house the majority of the Zimba-
bwean populace. If a patient who is at-
tended to by the CHW requires further
treatment the CHW verbally refers them
to the community health clinic/facility
Material published as part of this publication, either on-line or
in print, is copyrighted by the Informing Science Institute.
Permission to make digital or paper copy of part or all of these
works for personal or classroom use is granted without fee
provided that the copies are not made or distributed for profit
or commercial advantage AND that copies 1) bear this notice
in full and 2) give the full citation on the first page. It is per-
missible to abstract these works so long as credit is given. To
copy in all other cases or to republish or to post on a server or
to redistribute to lists requires specific permission and payment
of a fee. Contact Publisher@InformingScience.org to request
redistribution permission.
QR Code Based Patient Medical Health Records Transmission
522
(CHF). The CHF is manned by nurses and has a periodical visiting doctor although the ideal situ-
ation will be to a have one stationed there permanently. In both instances i.e. successful treatment
or referral there is currently no record kept by the CHW. This is an inconvenience as the patient
will have to re-narrate their health problem when they are referred to the clinic. At the CHF, the
nurse will perform the standard basic medical examination procedures which may include but are
not limited to checking the weight, blood pressure and temperature of the patient. These details,
together with the narrated health problem are recorded in a medical record card. At this point of
the hierarchy the nurse repeats this process for every new patient. The nurse, at the CHF, has the
authority to diagnose and treat except if the problem is major and requires the attention of a visit-
ing doctor. Upon successful diagnosis, the patient either gets free medication or gets a prescrip-
tion to purchase the medication and returns home without giving feed back to the CHW. If diag-
nosis and/or treatment are not successful the patient is further transferred to a referral district hos-
pital (DH) which is at the next level in the hierarchy.
Figure. 1 Structure of the Health System
(Ministry of Health and Child Welfare Zimbabwe, 2013)
On referral, the patient maintains the same medical record card with the details of their history,
diagnosis, condition and comments from either the clinic nurse or the clinic visiting doctor. The
same medical record card is maintained possibly to the highest level in the hierarchy indicating
what was observed and prescribed all the way from the clinic to the referral hospital where the
patiently is possibly treated successfully. It is maintained throughout the monitoring and review
process downward from the referral hospital to the clinic as indicated in Figure 2.
Dube, Ndlovu, Nyathi & Sibanda
523
CHF
DISCHARGED
DISTRICT HF
YES
NO FURTHER
TREATMENT
FURTHER
TREATMENT
FURTHER
TREATMENT
YES
YES
NO
NO
NO
REFERRALS
FROM THE DHW
PROVINCIAL
HF
REFERRAL
NATIONAL
HF
FURTHER
TREATMENT
YES
Figure 2 Patient Movement within Hierarchy
Problem Statement
During the process of patient transfer the patient's medical information is vulnerable and suscep-
tible to various degrees of integrity compromise. For example the medical record card may get
lost hence losing all the important patient medical information. It is also susceptible to infor-
mation tempering either by the patient or other third parties. For example, the medical record card
can be scribbled on, soiled, illegally altered or torn. An additional problem is that the medical
record card may be accessible to unauthorised individuals who may eavesdrop the information on
the card and maliciously release it hence violating the privacy of the patient. Most importantly,
despite access by unintended recipients, the details on the medical record card are also prone to
misinterpretation owing to illegible handwriting. All these problems may result in a breached se-
curity based on the lack of confidentiality, integrity and availability of the authentic patient medi-
cal information. The research thus seeks to find an answer to the question as to how the use of QR
codes can enable secure delivery of patient medical information.
Aim and Objectives
The aim of the paper is to evaluate the capability of the QR code to secure patient medical infor-
mation during transit maintaining confidentiality, integrity and availability at the intended desti-
nation within the hierarchical structure of the health delivery system in Zimbabwe. We also advo-
cate a secure and affordable information transmission method that ensures the delivery of com-
plete, accurate and well documented patient medical records.
QR Code Based Patient Medical Health Records Transmission
524
Related Work
Method for Privacy-Protecting Display and Exchange of
Emergency Information on Mobile Devices
Salvador and Christian (2012) developed a solution that allows users to decode patient infor-
mation and automatically notify authorized contacts of the nature of the emergency and the loca-
tion where the patient is being cared for. A QR code is created by encoding the mobile phone us-
er’s emergency and medical information (such as the name and contact details of the user’s next
of kin, their doctor or specialist, blood group, allergies, etc.). The created code image is then used
as a wallpaper on the phone. This allows anyone to scan the code without unlocking the phone.
Scanning and decoding the QR code can be accomplished with any standard QR Code reader, but
when read with QRCScan, additional information is retrieved and revealed. This helps emergency
medical responders by enabling them to provide medical care with a more informed base.
QR Codes Could Minimize Medical Errors Made by First
Responders
Drug mistakes are the most common recorded errors in the healthcare industry all over the world
(Dong-Hee, Jaemin, & Byeng-Hee, 2012). According to the same authors, medication er-
rors affect more than 1.5 million people in US each year which translates to $3.5 billion spent on
related treatments. QR codes could minimise the chances of these errors by offering accurate in-
formation to first responders who can easily read this information by using a QR code scanner on
their Smartphones. In this research, QR codes holding the patient’s information are tattooed onto
an area easily reachable by first responders. The information would also provide accountability
when a treatment does not go the way it was planned. Many of these medical errors are preventa-
ble through an increase in communication between healthcare providers, improved patient identi-
fication, and consumer knowledge (Dong-Hee, Jaemin, & Byeng-Hee, 2012).
A Novel Secret sharing technique using QR Code
In this paper, (Jun-Chou, Yu-Chen, & Hsien-Ju, 2013) propose a secret sharing mechanism to
enhance the security and data privacy for QR codes. The secret sharing scheme was first proposed
by Shamir in 1979 (Shamir, 1979). The main idea of the secret sharing scheme divides a secret
into n shadows or called shares. Anyone cannot decrypt the original secret from their own share.
The secret can be recovered only when any of t out of n shadows (t<=n) are held together. The
proposed technique improves data security during data transmission. On the other hand, the pro-
posed technique does not need to establish a back-end database beforehand for contents search-
ing. It direct embeds the secret data into tags therefore the proposed technique can save a lot of
hardware cost and software maintenance. The proposed technique can be applied to some applica-
tions such as electronic tickets, airline luggage inspection, medical e-health system, and other
fields. However, the major drawback is that the recovery process requires all the stakeholders to
come together which may not always be possible in the Zimbabwean rural setting. This would
also affect the speed of getting the information and would mean the patient would have to wait
for their information to be decoded.
Proposed Solution
QR codes can be implemented to solve the problems stated in the problem statement section of
this paper. QR codes are 2 dimensional barcodes which provide instant access to information
(Espejel-Trujillo, Castillo-Camacho, Nakano-Miyatake, & Perez-Meana, 2012), (Gao & Prakash,
2007). They allow for storage of higher amounts of data compared to conventional barcodes
Dube, Ndlovu, Nyathi & Sibanda
525
which is appropriate for the proposed solution. This data can be in the form of numbers (maxi-
mum 7,089 characters), text (maximum 4,296 characters), binary (maximum 2,953 bytes) or kanji
characters (maximum 1,817 characters) and this would allow even pictures to be sent. An inter-
esting feature of QR codes is their capability to perform error correction in case the parts of the
code are damaged (Espejel-Trujillo, Castillo-Camacho, Nakano-Miyatake, & Perez-Meana,
2012). This means even if the code is damaged, the information in it will still be valid and usable.
They can be coded and decoded on smartphones through the in-built cameras as long as the
smartphone is equipped with a QR code reader.
QR code readers can be downloaded for free from the internet which another advantage of the
proposed solution is given that Zimbabwe is a developing country. QR codes can handle infor-
mation in a variety of formats such as URLs, contact information, SMS and plain text among oth-
ers (Law & So, 2010). As research has shown, QR codes have proved to be useful in several
fields. In the medical field, they have been used on food and drink packages to show the nutri-
tional information these products carry (Yeh, You, & Jong, 2008), as assistive tools for emergen-
cy workers and as transaction authentication tools for medical billing (Starnberger, Froihofer, &
Goeschka, 2009.). QR codes have been and can be tattooed onto patients (Dong-Hee, Jaemin, &
Byeng-Hee, 2012) and this helps particularly in situations where patients are in a serious condi-
tion.
The tattooed information can still be decoded as and when needed as it has a direct link with the
specific patient’s medical health records. Patients can also decode QR coded instructions on how
their medication should be administered. However due to cultural constraints, this paper recom-
mends that the patient medical health information, prescriptions and the instructions for the medi-
cine administration be restricted to the QR codes encoded and decoded via the smartphones and
not tattooed. This means at the source, the patient medical health details are encoded and at the
destination decoded using a smartphone.
Methodology
The research approach followed is the Action Research methodology. In Action Research the re-
searcher tries to provide a service to a research "client", often an entity, and at the same time add
to the body of knowledge in a particular domain (Nyathi, Dube, Sibanda, & Mutunhu, 2013). For
example, in a technology-related domain, an Action Research study could involve the researcher
introducing a new technology, and at the same time studying the effects of the technology in that
entity. The methodology best suits the problem at hand as it involves the participation of the sub-
jects in the provision of a solution to the security problem. Action research is used in real life sit-
uations, rather than in artificial, experimental studies, as its primary focus is on solving real life
problems. It can be used by social scientists for preliminary or pilot research. It is mostly used
when the situation is too ambiguous to come up with a precise research question. Mostly it is cho-
sen when circumstances require flexibility, the participation of the people in the research, or when
change must take place quickly or fully. Figure 3 depicts the phases in an Action Research meth-
odology.
Stage 1: Diagnosis
The diagnosis stage involves the identification of an enhancement opportunity or a general prob-
lem to be solved at the client entity. An enhancement opportunity has been identified in the trans-
fer of patient information from one level to the other. Since patient information is transmitted on
a medical record card it is prone to loss, misinterpretation, eavesdropping and unauthorized edit-
ing hence the need for a more secure method of transmission capable of countering such identi-
fied problems. QR codes can be used to securely transmit confidential patient information. Data
transmission using QR codes is reliable as they can still be read even when they are damaged.
QR Code Based Patient Medical Health Records Transmission
526
Figure 3: Stages of Action Research Methodology
Stage 2: Action Planning
Action planning involves considering the alternative solutions to attain the enhancement or solve
the identified problem(s). The possible solutions include the design, development and: implemen-
tation of a centralized database to store patient information; which can be transmitted via the e-
mail, which can further be secured by steganography. However there is a challenge of infrastruc-
ture particularly in the lower levels of the hierarchy of the health delivery system. These areas do
not have electrical power to ensure the use of computing technology. This renders this alternative
not feasible. The other alternative is the use of an Android app (Reiser & Bruce, 2008.) to transfer
information between stations. This alternative is also not feasible given that the available apps are
not customized for the given situation. The use of QR codes as both the storage and transmission
method of medical records is the most feasibly solution to the problem. This is a multipurpose
method which comes in handy in the given economic environment as information can be record-
ed, stored, transmitted and retrieved using a single device.
Stage 3: Action Taking
In the action taking stage the best course of action among those considered in the previous stage
is selected and implemented. The alternative selected to implement a solution to the problem is
the use of QR codes. There are a number of reasons why this option was selected. The QR code
technology is easy to deploy, fast and economical. QR codes allow their contents to be decoded at
high speed (Espejel-Trujillo, Castillo-Camacho, Nakano-Miyatake, & Perez-Meana, 2012),
(Rouillard, 2008). They carry information in two directions i.e. vertically and horizontally, hence
they are capable of handling large amounts of data. QR codes can be combined into one large
symbol. One symbol can then be divided into 16 separate symbols making the data capacity ex-
tremely large. The other alternatives considered in the Action Planning phase were not selected
because of the following disadvantages: performance degradation as the size of the database in-
creases, issues of scalability since data for the whole nation has to be centrally stored, inaccessi-
bility when offline, security vulnerabilities, dependence on electrical power, resource intensive as
each point will have to be equipped with at least the basic computing infrastructure which in-
cludes hardware, software network connection and communication devices and all these have a
high initial and maintenance costs.
Dube, Ndlovu, Nyathi & Sibanda
527
On the other hand the use of QR codes is more feasible due to accessibility to low cost
smartphones and the freely available QR code application which can be downloaded from the
internet at no cost except the insignificant internet connectivity cost. The implementation of the
proposed system will entail a patient visiting a low level health care institution were a caregiver
diagnoses and treats them. The diagnosis and treatment are recorded on a medical record card that
should be safely kept at this health facility for future reference instead of the patient carrying it
around. If treatment fails at that level, the caregiver generates a QR code from the recorded in-
formation and encrypts it before sending it to the next higher level health care facility. When the
patient is referred, they will only need to carry their national identity card so that their data can be
retrieved.
QRDroid is an Android application used to generate and decode QR codes. It is freely available
for downloading on the internet. The application has two modules: a code generator and a code
reader (Kheder & Alvi, 2013). The QR code generator module is used to generate the QR code
where the user selects the “Plain Text” option on the type of QR code to generate and then types
the medical information of the patient in the console. Before sending, the created code is encrypt-
ed for extra security. The benefit of this application is that it allows for the generation of QR
codes using any other type of information like pictures. This allows x-rays, scans and the actual
image of the patient’s initial health status when they first visited the lower health care facility to
be encoded and transmitted for further examination. The generated QR code can then be sent to
the next higher level health care institution were the patient has been referred to as an MMS or
any communications application that can send and receive any type of information like Whatsapp.
At the receiving end the code is scanned using the reading module and the decryption key is en-
tered to decode information.
Stage 4: Evaluating
This stage involves the study of the outcomes of the selected course of action. Using QR codes
has proved to be a very secure and affordable method of patient medical health information
transmission. The information is delivered to the intended destination in its expected and intended
form. The patient information integrity and confidentiality are maintained and this information is
available as and when required. It neither disappears, leaks nor allows modification while on
transit. It also retains its integrity as it does not suffer from misinterpretation caused by illegible
handwriting. As long as the information is sent to the intended recipient, QR codes offer confi-
dentiality of patient information.
Stage 5: Specifying Learning
The specifying learning stage reviews the outcomes of the evaluating stage and builds knowledge
in the form of a model describing the situation under study. The major challenge faced in Zimba-
bwe is a lack of a centralized system that keeps medical information of all patients who visit pub-
lic hospitals. The system we have proposed helps when it comes to transferring patient infor-
mation from one level to another level in the health care delivery system but it was going to be of
more help if that information was stored centrally and any changes in a patient’s health card to
reflect in the central system.
Discussion and Conclusion
QR codes are a very reliable means of transmitting patient information within the health care de-
livery system hierarchy. The QR codes ensure confidentiality, integrity and availability of the
transmitted patient information from one level of the health delivery system hierarchy to the oth-
er. This is essential for preventing high mortality rates possibly caused by wrong diagnosis and
treatment as a result of lost or misinterpreted records. Figure 4 is an extract of an actual child
QR Code Based Patient Medical Health Records Transmission
528
health card used in Zimbabwe showing the type information that is recorded in it. Looking at the
figure immediately brings out the issue of illegible handwriting.
Figure 4: An extract of a QR coded baby health card.
Figure 5 is a QR code produced from the information recorded in the child health card in Figure
3. This QR code can then be encrypted using the encryption function found in QRDroid and
passed on to another health centre or doctor in case of referral. This is proof that the use of QR
codes is a highly secure, reliable and trustworthy method to transfer sensitive data.
Figure 5: QR code containing information on the baby health card
System deployment expense, user education and IT literacy are parameters perceived to hamper
the adoption process. However as already indicated the critical infrastructure for system adoption
already exists and Zimbabwe enjoys the highest literacy rate in Africa of 91% which is likely to
make IT literacy conversion seamless.
Dube, Ndlovu, Nyathi & Sibanda
529
References
Dong-Hee, S., Jaemin, J., & Byeng-Hee, C. (2012). The psychology behind QR codes: User experience
perspective. Computers in Human Behavior 28 , 1417–1426.
Espejel-Trujillo, A., Castillo-Camacho, I., Nakano-Miyatake, M., & Perez-Meana, H. (2012). Identity
Document Authentication Based on VSS and QR Codes. Procedia Technology 3, 241 250.
Gao, J., & Prakash, L. J. (2007). Understanding 2D-barcode technology and applications in m-commerce
design and implementation of a 2D barcode processing solution”. Proceedings of the Computer
Software and Applications Conference,. Bejing,.
Jun-Chou, C., Yu-Chen, H., & Hsien-Ju, K. (2013). A Novel Secret Sharing Technique Using QR Code.
International Journal of Image Processing (IJIP), Volume (4) : Issue (5).
Kheder, L. S., & Alvi, A. (2013). Authentication System Using Quick Response Code. International
Journal of Management, IT and Engineering, Vol 3, Issue 2, 373-38.
Law, C., & So, S. (2010). , QR codes in education. Journal of Educational Technology. Development and
Exchange, 3(1),, 85-100.
Ministry of Health and Child Welfare Zimbabwe, A. (2013, October 20). Hierarchical structure of the
health delivery system. Retrieved from mohcc.gov.zw: http://www.mohcc.gov.zw/
Nyathi, T., Dube, S., Sibanda, K., & Mutunhu, B. (2013). Poultry Contractual Farming Decision Support
System. IST Africa 2013 Proceedings (pp. 1-8). Kenya: IST Africa.
Reiser, S., & Bruce, R. (2008.). Service learning meets mobile computing. Proceedings of the Annual
Southeast Regional Conference. Auburn, Alabama.
Rouillard, J. (2008). Contextual QR codes. Proceedings of the 3rd International Multi-Conference on
Computing in the Global Information Technology, . Athens, Greece.
Salvador, A., & Christian, P. (2012). Method for Privacy-Protecting Display and Exchange of Emergency
Information on Mobile Devices.
Shamir, A. (1979). “How to Share a Secret. Communication of the ACM, 22(11), 612-613.
Starnberger, G., Froihofer, L., & Goeschka, K. ( 2009.). QR-TAN: Secure mobile transaction
authentication. Proceedings of the Availability, Reliability and Security, . Fukuoka, Japan.
Yeh, Y., You, J., & Jong, G. (2008). The 2D bar-code technology applications in medical information
management. Proceedings of the Intelligent Systems Design and Applications. Kaohsiung, Taiwan,.
Biographies
Sibusisiwe Dube is a PhD in Information Systems student at the Uni-
versity of Cape Town, South Africa. She has worked as a Lecturer and
her research interest is on technology enabled education. The research
work is available in the IEEE sponsored conference proceedings such
as IST as well as other conference proceedings such as the e-skills,
ECEL, ICAT and SACLA. Mrs Dube holds an MSc in Computer Sci-
ence, and BSc in Information Systems.
QR Code Based Patient Medical Health Records Transmission
530
Siqabukile Ndlovu is a Computer Science Maters’ graduate who has
been teaching at the National University of Science and Technology
(Zimbabwe) for the past five years. Her publishing career started in
2013 and to date, she has collaboratively published two articles with
international journals (“Beacon Frame Manipulation to Mitigate Rogue
Access Points: Case of Smartphone Rogue Access Points.”: Interna-
tional Journal of Advanced Computer Technology (COMPUSOFT).
02/2014; Three(Two):576 and “Optimisation of the Linear Probability
Model for Credit Risk Management.”: International Journal of Com-
puter and Information Technology (ISSN: 2279 – 0764) Volume 03 –
Issue 06, November 2014 ) with another article awaiting publishing in
the near future. Siqabukile has also presented a conference paper entitled “Wireless Security” at
the ICT for Africa 2013 Conference held in Harare—Zimbabwe in February 2013. She is regis-
tered as a Technovation mentor to teach and motivate young
Thambo Nyathi is currently working towards his PhD with the Uni-
versity of Kwazulu Natal in South Africa. He holds a MSc in Comput-
er Science and is an avid researcher interested in, Computer security,
application of bio inspired techniques in cybersecurity.
Khulekani Sibanda is a Lecturer in the department of computer sci-
ence at the National University of science and technology. He holds a
Master’s Degree in Computer Science. His research interests lie in the
fields of security, networking and business intelligence. Mr Sibanda’s
research has been published in IEEE sponsored conferences such as the
IST Africa
... Services at the secondary level provide adequate services to handle the emergencies referred from the primary care facilities. In the event that the patient needs more specialised care, the patient is further referred to the tertiary level and lastly the quaternary level, hence the need to have coordinated care (Masuku, 2013 andDube, Ndlovu, Nyathi, andSibanda, 2015). ...
... Services at the secondary level provide adequate services to handle the emergencies referred from the primary care facilities. In the event that the patient needs more specialised care, the patient is further referred to the tertiary level and lastly the quaternary level, hence the need to have coordinated care (Masuku, 2013 andDube, Ndlovu, Nyathi, andSibanda, 2015). ...
Article
Full-text available
Purpose: The purpose of the study was to investigate the relationship between health records usage and electronic consultation in the management of chronic conditions at MCH. Methodology: The study employed a qualitative research approach and a case study as its research design. Semi-structured interviews and document reviews were used to gather data from twenty-eight respondents who were purposively and conveniently selected from a population of 35 clinicians. Findings: The results of the study showed that the relationship between health records usage and electronic consultation in the management of chronic conditions was not existing. This was even though MCH has a steady ICT infrastructural base that could be harnessed in enhancing the utilization of EHR for e-consultation. Management support, legislation, policies, standards, and a functional finance model were crucial to the success of the project. The perceived resistance to adopting technology was a major barrier to the enhanced use of EHR at MCH. Therefore, there was the need to engage stakeholders in managing changes brought by the use of EHR in e-consultation so as to realize benefits. Originality: The investigation of the relationship between health records usage and electronic consultation in the management of chronic conditions at MCH is a first of its kind. As such the research sought to fill in information-sharing gaps, hence improving clinical processes
... Creating an application (app) with a quick response (QR) code to support measurement results is critical for several reasons, particularly in the context of a health passport. Firstly, a QR code is an efficient and convenient way to store and transmit large amounts of data in a compact and secure form [11,12]. A single code can contain all the necessary information regarding an individual's health, including their measurement results, allowing for easy and accurate tracking of their health status. ...
Article
Full-text available
Aim: After the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) pandemic and the realization of mass vaccination against the virus, the availability of a reliable, rapid, and easy-to-use system for registering the individual anti-S1 antibody titer could facilitate the personalized assessment of the need for booster vaccine doses and the reduction of social distancing and other measures. Methods: The biosensor system is based on immobilized engineered SK-N-SH neuroblastoma cells, bearing the S1 protein, and it can detect immunoglobulin G (IgG) antibodies against the SARS-CoV-2 S1 spike antigen. A disposable electrode strip bearing the engineered mammalian cells is connected to a customized read-out potentiometric device with real-time data transmission to a wireless fidelity (WiFi)-connected smartphone. Blood samples from past-infected individuals and individuals vaccinated against SARS-CoV-2 were used for validation. Results: In the present study, a smartphone application (app), capable of analyzing data regarding the levels of anti-S1 antibodies in blood is introduced. The app works in conjunction with a portable, ultra-rapid, and sensitive biosensor transmitting real-time measurements to the smartphone. Both historical and current individual data can be encoded by using the app, resulting in a widely accepted quick response (QR) code, which can then be constantly updated to match a person’s status. Conclusions: This novel system could be utilized for the eventual development of a coronavirus disease 2019 (COVID-19) electronic passport, which could be further employed to improve the population-wide, cross-country surveillance of vaccination efficiency, as well as facilitate the implementation of cross-border digital health services in a user-friendly and secure way.
... In addition, they examined the number of distinct cases with epidemiological history or confirmed COVID-19 infections, pregnant women's attitudes towards the summer outbreak and healthcare services, the time required to collect epidemiological history, and the accuracy of the hospital triage system based on health codes. Chen S et al.(2021) [3] In Zimbabwe, the delivery of healthcare is hierarchical, and patients must carry their physical medical record card while moving from one level of care to the next higher level. A medical record card proposed by Sibanda k et al. (2015) contains details about the patient's medical history, current medications being taken, allergies that have previously been known to exist, and other things. ...
... Several implementations of QR codes also exist in other fields. [8], for example, made use of the QR technology to secure and transmit patient-sensitive information from one level of the system of health care delivery to another. Getting a digital platform that incorporates the QR code technology is quite crucial for the survival of the lending business sector in this competitive market, especially with the increasing number of loan seekers across the country. ...
Article
Full-text available
This research paper aims at design of an innovative framework scalable and integrated loan management with Quick Response Code enhancement, which will guarantee easy and better-secured loan validation and processing in microfinance banks and other lending institutions. As the number of microfinance bank customers in need of personal loans rises on a daily basis, especially in the post COVID-19 era, management is faced with the complex job of loan application verification in order to correctly determine eligibility for a loan. There is the challenge of coping with fraudulent customers who make false claims with their loan application documentations, sometimes seeking to access multiple loans from more than one microfinance banks and using single collateral security. There is need for a central regulatory agency that links up major lending institutions in a collaborative effort to forestall incidences of multiple loan access using single loan security. Our new model will also forestall activities of some fraudulent bank officials who go as far as granting credit facilities to their friends and family members without following due process and using their privileged positions to obtain unsecured loans for themselves and their relations, sometimes in excess of bank’s statutory lending limits, and in total violation of the provisions of policy of microfinance banking sector. Our new model was designed using the Rapid Application Development (RAD) methodology following its high involvement and concentration on user’s viewpoint as well as its ability to change system design on the go based on user demands. Implementation of the new system was done using such development tools as PHP, JavaScript, MySQL, and Visual Studio. Basic functionality testing was carried out on the system to make sure all the buttons on every screen works as desired, and to ascertain that the system could forestallincidences of “insider abuse” and that loan approvals are done according to internal and external regulations.
... In [4], the authors discussed one of the problems of the healthcare system in the city of Zimbabwean, which is the misinterpretation of the patient's healthcare card due to handwriting, loss, and access it by unauthorized persons. During the transfer of the patient who needs more health care from the minimum level of healthcare to a higher level. ...
Chapter
Full-text available
Electronic appointments booking systems contribute to facilitating the work of companies and institutions. With the current situations caused by the spread of the COVID-19, these systems have become ineffective. Many procedures have been forced to reduce the spread of the COVID-19, including social distancing, which emphasizes keeping a safe distance between people. This paper presents a literature review of QR code applications and social distancing techniques that aid in developing smart appointments booking systems for social distancing.
Chapter
As social beings, human need interaction to meet their needs in terms of carrying out their lives in daily activities. Human who tends to be individualistic makes the existing sense of empathy eroded, especially in the modern as today. No matter how individualistic a person is, there will be times when humans need help or assistance from others. For example, when someone is experiencing an urgent medical experience or when a crime is being committed. Sometimes, many communication barriers regarding asking for help in these situations. This study is a pilot project that tries to create a jewelry product that has additional functions as a means of communication to ask for help from people around and provide medical information for the emergency needs of the disease suffered by the user of the product. The features developed are jewelry products with designs that can be used to make sounds as a signal to ask for help and the provision of medical information that can be accessed via a QR code that can be scanned using a smartphone device. The method uses a behavioral observation approach and design thinking methodology for the design process. The study and testing of product prototypes show that the sound signal generated from the jewelry product can attract the attention of people around the user and easier to hear. The QR code can be accessed and provide medical information from smartphone devices through the Revive application (mobile or desktop).KeywordsWearable DeviceMedical InformationCommunication
Conference Paper
Full-text available
This paper is aimed at implementing cryptocurrency using the block chain data structure. Block chain is considered by many to be a troublesome but core technology. Many researchers have realized the dire need of block chain but the research of block chain is still in its elementary level. Consequently, this study reviews the current academic research on chain data structure offers great prospective to promote various sectors with its distinctive combination of characteristics, construction of prototypes instead of large amounts of up-front planning. It will make life simpler and safer, changing used for this study is the Rapid Application Development (RAD). The RAD favors iterative development and the rapid the way personal information is stored and how transactions for good and services are made. During the process of possibilities in the use of this technology for science and academia. Keyword: Block Chain, Cryptography, Hacking, Bit for example, decentralization, immutability, and transparency. Block chain Hi –Tech is revolutionary. The methodology record of every transaction. This impassable digital ledger makes fraud, hacking, data theft and information loss elucidate adding fresh transactions and blocks. Block chain technology generates an enduring and immutable digital dreadful. A proof-of-work unanimity algorithm was instigated using Java Programming language. We see auspicious block chain, especially in the subject area of business and economics (cryptocurrency). Block chain data structure development, the following tools were used: CSS, HTML5, JavaScript, Servlets. Java Server Pages (JSP) were used to promises doles in trust-ability, association, organization, identification, trustworthiness, and transparency. The block Coin, Transactions
Chapter
Clinics and hospitals always have this exhausting task of handling patients’ health records. Especially in this time of Covid-19 pandemic, number of outpatients visiting hospitals surge and it is also paramount to maintain the outpatient records to retrieve patient’s medical history at times of emergency. However, there has been no standard, easy to use, cost-effective and secure applications available for the maintenance of the out-patient records that contain their medical history, medication details and diet suggestions of the outpatients who walk in and out of clinics that are present across the country. Also, there is no system of cross-sharing patients’ records among the hospitals securely. It is noteworthy that these health records are of value at critical times. The proposed system employs a lightweight, holistic approach to maintain outpatient records and facilitate sharing of the same among clinics at times of need. The proposed system aims at recording vital information (Audio) such as Doctor’s advice, medications and dietary suggestions during consulting and converts the same to text and subsequently to QR Code. The QR codes along with medical tests data, if any are stored chronologically. The application also facilitates sharing of this systematically stored data among clinics, as and when required. In this paper, implementation of the above said system is presented with techniques used for voice capturing, speech to text conversion, bilingual translation and QR code generation. Notable benefits of the proposed application, especially during pandemic times include paperless medical consultation and prescription related records and a framework for sharing the same across clinics as needed.
Conference Paper
Full-text available
Zimbabwe has an agro based economy and as such the majority of the population make a living from Agriculture. Small scale poultry urban farmers find it difficult to compete against large scale poultry producers, as such that they resort to contract farming on behalf of the large scale farmers. Large scale producers find it difficult to locate the small scale farmers to assess their resources for use. This paper presents a decision support system which is used to match the small scale farmer to the large scale producers.
Article
Full-text available
In this paper, an identification document authentication system is proposed, taking advantage of the perfect secrecy of the Visual Secret Sharing (VSS) scheme and the powerful and practical Quick Response (QR) code. In the proposed scheme, a binary secret image is encrypted into two shares, which are generated under a (2,2)-threshold VSS, and encoded into two QR codes. The first code is printed onto an ID-card, while the other is kept in a database. When the ID-card authentication is required, using a mobile phone the printed QR code is read and the share is extracted from it. Next the share kept in database is read and stacked with the extracted share from ID-card. Finally the stacking result of both shares determines the authenticity of the ID-card.
Conference Paper
Full-text available
First responders and emergency care providers make life or death decisions with little to no information about patient's medical problems. Access to a person's medical record could greatly improve the medical care they receive. Challenges to proving this information include finding the correct platform and protecting the patient's privacy. Current solutions are lacking in both these areas. Here we propose leveraging smartphone sensor and matrix barcode technology to allow users to securely encode sensitive information using the widely accepted Quick Response code standard. Placing this code on the phone's lock-screen removes the need to unlock the phone and search for it. Our solution lets users decode information, automatically notify authorized contacts of the nature of the emergency, and location where the patient is being cared for. Future research work will explore utilizing near field communication interfaces to augment the app's features for ease of use.
Conference Paper
Full-text available
Computer Science educators are often frustrated in their attempts to demonstrate the power and relevance of their discipline in a classroom setting. Increasingly, educators are turning to carefully designed service learning projects to provide that experience. This paper describes a year-long service learning project in which we developed a working prototype of a mobile, location-aware tour for the Bonsai Exhibition Garden of the North Carolina Arboretum. The tour is a web-based, customizable, multimedia presentation on handheld Personal Digital Assistants. Students developed the complete tour, including all presentation materials and system installation, at the University of North Carolina at Asheville in a series of three computer science courses. The project abounded with both the benefits and pitfalls that come from combining service learning with cutting edge technology.
Article
Full-text available
Any mobile device with capture function can read content from a barcode tag directly. When a barcode contains important data or privacy information, the risk of security becomes an important problem. In this paper, the QR code is employed to design the secret sharing mechanism so that the data privacy during data transmission can be enhanced. The secret data is divided into some shadows by the secret sharing mechanism and the results are embedded into barcode tags. The secret can be recovered only when the number of shadows is greater than or equal to the predefined threshold. In sum, the proposed technique improves data security for data transmission.
Article
QR codes, developed by a Japanese company, have been around for over fifteen years. With the advent of smart and Web capable mobile devices, we witness a steady growth of interesting commercial applications using QR codes. As the movement of using QR codes in education is still in its infancy, this paper serves to be one of the first comprehensive papers in journal publication to fully delineate (a) the user characteristics of QR codes, (b) the processes of making and reading QR codes, (c) the survey of commercial applications using QR codes, (d) the literature review of educational applications using QR codes, and (e) offer suggestions and implementations of QR codes in school education.
Conference Paper
In this paper, we used the two dimensional bar code technical to manage medical information (e.g. an anamnesis or prescription. . . etc.). The 2D bar-code formats not only have much clear superiorities like high capacity, small size and damage resistant, but also can improve medical information management in terms of incurring less error in hand-writing. We introduce 2D Bar-code conception, and then account for building on 2D Bar-code processing solution to support medical information management.
Conference Paper
Abstract The security of electronic transactions depends,on the security of the user’s terminal. An insecure terminal may allow an attacker to create or manipulate,transactions. Several techniques have been developed that help to protect transactions performed over insecure terminals. TAN codes, security tokens, and smart cards prevent an attacker who obtained,the user’s password,from signing transactions under the user’s identity. However, usually these techniques do not allow a user to assert that the content of a transaction has not been manipulated. This paper contributes with the QR-TAN authentication technique. QR-TANs are a transaction authentication tech- nique based on two-dimensional barcodes. Compared,to other established techniques, QR-TANs show three advan- tages: First, QR-TANs allow the user to directly validate the content of a transaction within a trusted device. Second, validation is secure even if an attacker manages,to gain full control over a user’s computer. Finally, QR-TANs in combination,with smart cards can also be utilized for offline transactions that do not require any server.
Article
In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.