SlideShare a Scribd company logo
Biometric Authentication Systems in Healthcare Amir Ahmed and Bharath Perugu  The University of Texas at Austin Health Information Technology Fall Certificate Program 2011 Discussion/Conclusion Healthcare providers must ensure efficient management of sensitive patient data. In addition, patient records should be accessed by authorized personnel only on a  “need to know” basis 2 . The increased adoption of electronic health records (EHRs) has prompted vendors to improve the robustness of the privacy and security of their systems. Federal agencies have also taken positions regarding security of patient data. Since its inception, the Health Insurance Portability and Accountability Act (HIPAA) has increased patient privacy and security. The Centers for Medicare and Medicaid Services (CMS) encourages the use of two-factor authentication when accessing ePHI 3 . Additionally, the Federal Trade Commission (FTC) has required healthcare organizations to comply with the Identity Theft Red Flag regulations, as found in the Fair and Accurate Credit Transactions (FACT) Act 4 .  However, patient data are still subjected to unauthorized access, both intentionally and unintentionally, on a frequent basis.  Recently, Tricare- the managed care arm of the Military Health System- announced that five million records containing electronic protected health information (ePHI) were illegally breached 1 . Biometric authentication systems (BAS) could help healthcare providers in fulfilling the FTC mandate, as well as decrease the opportunity of illegal access to ePHI. Therefore, the purpose of this research poster is to investigate the best possible biometric authentication method for accessing health records, based on cost, hygiene, usability, anti-forgery, and accuracy.  Napua reviewed different biometric methods and compared them for accuracy and usability, as shown in Figure 1 4 .  From Napua ’s results, we selected three methods (palm vein authentication as shown in figures 2 and 3, fingerprint authentication as shown in  figure 4, and Iris authentication as shown in figures 5 and 6), and compared them across five factors (accuracy, hygiene, cost, usability, and anti-forgery) that should be considered when choosing a BAS. These factors were common throughout the research articles we studied. The three methods were chosen because they were ranked moderate to high on usability. We then ranked each biometric method against the five factors on a low-medium-high scale, as shown in Table 1.    The research by Malki showed that palm vein patterns (Figure 2) are recognized with a 99.45% accuracy rate, within 100 milliseconds scan-to-identification time 5 . The false rejection rate (FRR) is less than 0.01%, and the false acceptance rate (FAR) less than 0.00002% 5 . We researched scientific articles using Google Scholar, PubMed, and Science Direct. The keywords we used were  “biometrics”, “iris scanning”, “biometric authentication”, “ePHI”, “palm vein scanning”, and “biometrics in healthcare”. We reviewed, and selected from, the first 25 articles of every search query that were published within the last six years.  We also reviewed the website of the United States Department of Health and Human Services, as well as current news articles.  1 Versel, N. (2011) Information Week Healthcare.  http://www.informationweek.com/news/healthcare/security-privacy/231700161 2 Hewitt, B. (2010)  ‘Exploring how security features affect the uses of electronic health records’,  International Journal of Healthcare Technology and Management,  Vol. 11, Nos. 1/2, pp. 31-49. 3 Search for reference 4 Napua, J. (2011)  ‘Growth of Biometric Technology in Self-Service Situations’,  Fujitsu Science & Technical Journal , Vol. 47, No.1, pp. 68-74. 5 Malki, S., Spaanenburg, L. (2010)  ‘CBAS: A CNN-based Biometrics Authentication System’,  International Workshop on Cellular Nanoscale Networks and their Applications (CNNA) , pp. 1-6. 6 Watanabe, M., Endoh, T., Shiohara, M., Sasaki, S. (2005)  “Palm vein authentication technology and its applications”,  Proceedings of the Biometric Consortium Conference.  Table 1: Comparison of Major Biometric Methods Figure 1: Comparison of palm vein and other technologies 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],Amir Ahmed: aahmed99@gmail.com;  (512) 736-3319 Bharath Perugu: bharath.perugu@gmail.com;  (512) 632-4236 We thank Dr. Leanne Field, Dr. Kimberly Smith, Mr. Robert Ligon, Dr. Diane Kneeland, and Dr. Richard Nauert for their guidance, support, and helpful suggestions in creating this poster. Despite the different rules and regulations put in place to ensure the protection of electronic protected health information (ePHI), there are still many instances where data breaches occur. We performed a review of the literature to determine the best possible biometric authentication method. We considered eight methods, and evaluated three based on five selected factors. Based on these factors, we found that palm vein scanning was found to be the most accurate, hygienic, and cost-effective biometric authentication method. Acknowledgements References Contact Information Results Abstract Introduction Methods Figure 2: Palm  Vein Pattern Figure 3: Palm Vein  authentication device Figure 5: IRIS authentication device Figure 4: Finger Print authentication device Figure 6: IRIS Pattern

More Related Content

What's hot

The Role of Laboratory Reports in the Adoption of Electronic Medical Records
The Role of Laboratory Reports in the Adoption of Electronic Medical RecordsThe Role of Laboratory Reports in the Adoption of Electronic Medical Records
The Role of Laboratory Reports in the Adoption of Electronic Medical Records
smartlinkemr
 
Media presentation (social impact of technology)ppt
Media presentation (social impact of technology)pptMedia presentation (social impact of technology)ppt
Media presentation (social impact of technology)ppt
ChelsieClingen
 
EMR 101
EMR 101EMR 101
EMR 101
Jack Shaffer
 
Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...
Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...
Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...Xiaoming Zeng
 
EMR Training Action research lit review
EMR Training Action research   lit reviewEMR Training Action research   lit review
EMR Training Action research lit review
Laura Cole, BS, COT, OSC
 
IT with health & communication
IT with health & communicationIT with health & communication
IT with health & communication
Ksoft Technologies
 
Electronic Medical Records - MxSecure
Electronic Medical Records - MxSecureElectronic Medical Records - MxSecure
Electronic Medical Records - MxSecure
Craig Mercure
 
IT in Pharmaceutical Error Prevention - Bioinformatics for Pharmacy
IT in Pharmaceutical Error Prevention - Bioinformatics for PharmacyIT in Pharmaceutical Error Prevention - Bioinformatics for Pharmacy
IT in Pharmaceutical Error Prevention - Bioinformatics for Pharmacy
Annisa Hayatunnufus
 
EHR Quality Measurement In Its Infancy, Study Says
EHR Quality Measurement In Its Infancy, Study SaysEHR Quality Measurement In Its Infancy, Study Says
EHR Quality Measurement In Its Infancy, Study SaysACROSEAS Global Solutions
 
Long Term Care - Improving Patient care and decreasing costs through EHRs
Long Term Care - Improving Patient care and decreasing costs through EHRsLong Term Care - Improving Patient care and decreasing costs through EHRs
Long Term Care - Improving Patient care and decreasing costs through EHRs
shawtho2
 
EMR Innovations in Eye Care lit review
EMR Innovations in Eye Care   lit reviewEMR Innovations in Eye Care   lit review
EMR Innovations in Eye Care lit review
Laura Cole, BS, COT, OSC
 
EMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionEMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective Solution
Codal
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
Kendra Guyton-Sheppard
 
Health information security system
Health information security systemHealth information security system
Health information security systemDiana Fernandez
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSUsmanYakubuMaaruf
 
Consumer Health Informatics & Pharmacy
Consumer Health Informatics & PharmacyConsumer Health Informatics & Pharmacy
Consumer Health Informatics & Pharmacy
NSU Center for Consumer Health Informatics Research
 
Policy Related to Health Information Systems: A U.S. Case Study
Policy Related to Health Information Systems: A U.S. Case StudyPolicy Related to Health Information Systems: A U.S. Case Study
Policy Related to Health Information Systems: A U.S. Case Study
Nawanan Theera-Ampornpunt
 
Hci capstone
Hci capstoneHci capstone
Hci capstonevpharoah
 
Emerging technologies final.
Emerging technologies final.Emerging technologies final.
Emerging technologies final.
NIHALAHMEDKUNIYILDM
 

What's hot (20)

The Role of Laboratory Reports in the Adoption of Electronic Medical Records
The Role of Laboratory Reports in the Adoption of Electronic Medical RecordsThe Role of Laboratory Reports in the Adoption of Electronic Medical Records
The Role of Laboratory Reports in the Adoption of Electronic Medical Records
 
Media presentation (social impact of technology)ppt
Media presentation (social impact of technology)pptMedia presentation (social impact of technology)ppt
Media presentation (social impact of technology)ppt
 
EMR 101
EMR 101EMR 101
EMR 101
 
Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...
Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...
Submit20your20 powerpoint20file20here cavinessj07_attempt_2012-12-05-19-54-05...
 
EMR Training Action research lit review
EMR Training Action research   lit reviewEMR Training Action research   lit review
EMR Training Action research lit review
 
IT with health & communication
IT with health & communicationIT with health & communication
IT with health & communication
 
Electronic Medical Records - MxSecure
Electronic Medical Records - MxSecureElectronic Medical Records - MxSecure
Electronic Medical Records - MxSecure
 
IT in Pharmaceutical Error Prevention - Bioinformatics for Pharmacy
IT in Pharmaceutical Error Prevention - Bioinformatics for PharmacyIT in Pharmaceutical Error Prevention - Bioinformatics for Pharmacy
IT in Pharmaceutical Error Prevention - Bioinformatics for Pharmacy
 
eHealth for Africa
eHealth for AfricaeHealth for Africa
eHealth for Africa
 
EHR Quality Measurement In Its Infancy, Study Says
EHR Quality Measurement In Its Infancy, Study SaysEHR Quality Measurement In Its Infancy, Study Says
EHR Quality Measurement In Its Infancy, Study Says
 
Long Term Care - Improving Patient care and decreasing costs through EHRs
Long Term Care - Improving Patient care and decreasing costs through EHRsLong Term Care - Improving Patient care and decreasing costs through EHRs
Long Term Care - Improving Patient care and decreasing costs through EHRs
 
EMR Innovations in Eye Care lit review
EMR Innovations in Eye Care   lit reviewEMR Innovations in Eye Care   lit review
EMR Innovations in Eye Care lit review
 
EMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective SolutionEMR and EHR - The Cost Effective Solution
EMR and EHR - The Cost Effective Solution
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Health information security system
Health information security systemHealth information security system
Health information security system
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
 
Consumer Health Informatics & Pharmacy
Consumer Health Informatics & PharmacyConsumer Health Informatics & Pharmacy
Consumer Health Informatics & Pharmacy
 
Policy Related to Health Information Systems: A U.S. Case Study
Policy Related to Health Information Systems: A U.S. Case StudyPolicy Related to Health Information Systems: A U.S. Case Study
Policy Related to Health Information Systems: A U.S. Case Study
 
Hci capstone
Hci capstoneHci capstone
Hci capstone
 
Emerging technologies final.
Emerging technologies final.Emerging technologies final.
Emerging technologies final.
 

Viewers also liked

hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
Kumar Goud
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
eSAT Journals
 
Finger vein identification system
Finger vein identification systemFinger vein identification system
Finger vein identification system
lunchNtouch
 
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Editor IJCATR
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
Viraj Rajopadhye
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
Harisankar U K
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
Ankan Biswas
 

Viewers also liked (17)

hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Finger vein identification system
Finger vein identification systemFinger vein identification system
Finger vein identification system
 
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 

Similar to Biometric Authentication Systems in Healthcare

An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )
Tracy Huang
 
Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzania
IJCSEA Journal
 
Role of Health Information Systems in Health CareIn the articl.docx
Role of Health Information Systems in Health CareIn the articl.docxRole of Health Information Systems in Health CareIn the articl.docx
Role of Health Information Systems in Health CareIn the articl.docx
healdkathaleen
 
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
IJCSEA Journal
 
Pg2 Beginning in 1991, the IOM (which stands for the Institute o.docx
Pg2   Beginning in 1991, the IOM (which stands for the Institute o.docxPg2   Beginning in 1991, the IOM (which stands for the Institute o.docx
Pg2 Beginning in 1991, the IOM (which stands for the Institute o.docx
randymartin91030
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
Tasha Holloway
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
ijsptm
 
Challenges of the Healthcare Industry in India
Challenges of the Healthcare Industry in IndiaChallenges of the Healthcare Industry in India
Challenges of the Healthcare Industry in India
drparul6375
 
Factors Affecting the Adoption of Electronic Health Records by Nurse
Factors Affecting the Adoption of Electronic Health Records by NurseFactors Affecting the Adoption of Electronic Health Records by Nurse
Factors Affecting the Adoption of Electronic Health Records by Nurse
paperpublications3
 
Page 1 Executive Summary Policy makers are looking.docx
Page 1   Executive Summary Policy makers are looking.docxPage 1   Executive Summary Policy makers are looking.docx
Page 1 Executive Summary Policy makers are looking.docx
smile790243
 
Nursing informatic'spresentation
Nursing informatic'spresentationNursing informatic'spresentation
Nursing informatic'spresentationqueeniejoy
 
Ethical Implications Of Electronic Health Records
Ethical Implications Of Electronic Health RecordsEthical Implications Of Electronic Health Records
Ethical Implications Of Electronic Health Records
Leslie Lee
 
Respond to at least two of your colleagues offering additionalal.docx
Respond to at least two of your colleagues offering additionalal.docxRespond to at least two of your colleagues offering additionalal.docx
Respond to at least two of your colleagues offering additionalal.docx
audeleypearl
 
Mining Health Examination Records A Graph Based Approach
Mining Health Examination Records A Graph Based ApproachMining Health Examination Records A Graph Based Approach
Mining Health Examination Records A Graph Based Approach
ijtsrd
 
Running head MEDICAL TECHNOLOGY 1MEDICA.docx
Running head MEDICAL TECHNOLOGY                        1MEDICA.docxRunning head MEDICAL TECHNOLOGY                        1MEDICA.docx
Running head MEDICAL TECHNOLOGY 1MEDICA.docx
cowinhelen
 
Evaluation of A CIS
Evaluation of A CISEvaluation of A CIS
Evaluation of A CIS
nursemichelle
 
Evolution of Health Care Paper and TimelineThere are specifi.docx
Evolution of Health Care Paper and TimelineThere are specifi.docxEvolution of Health Care Paper and TimelineThere are specifi.docx
Evolution of Health Care Paper and TimelineThere are specifi.docx
SANSKAR20
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
Michelle Love
 
EHR- 2016 Eeshika Mitra
EHR- 2016 Eeshika MitraEHR- 2016 Eeshika Mitra
EHR- 2016 Eeshika MitraEeshika Mitra
 
Electronic Health Records - Market Landscape
Electronic Health Records - Market LandscapeElectronic Health Records - Market Landscape
Electronic Health Records - Market Landscape
Harrison Hayes, LLC
 

Similar to Biometric Authentication Systems in Healthcare (20)

An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )
 
Towards ehr interoperability in tanzania
Towards ehr interoperability in tanzaniaTowards ehr interoperability in tanzania
Towards ehr interoperability in tanzania
 
Role of Health Information Systems in Health CareIn the articl.docx
Role of Health Information Systems in Health CareIn the articl.docxRole of Health Information Systems in Health CareIn the articl.docx
Role of Health Information Systems in Health CareIn the articl.docx
 
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
Towards EHR Interoperability in Tanzania Hospitals : Issues, Challenges and O...
 
Pg2 Beginning in 1991, the IOM (which stands for the Institute o.docx
Pg2   Beginning in 1991, the IOM (which stands for the Institute o.docxPg2   Beginning in 1991, the IOM (which stands for the Institute o.docx
Pg2 Beginning in 1991, the IOM (which stands for the Institute o.docx
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDSMANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS
 
Challenges of the Healthcare Industry in India
Challenges of the Healthcare Industry in IndiaChallenges of the Healthcare Industry in India
Challenges of the Healthcare Industry in India
 
Factors Affecting the Adoption of Electronic Health Records by Nurse
Factors Affecting the Adoption of Electronic Health Records by NurseFactors Affecting the Adoption of Electronic Health Records by Nurse
Factors Affecting the Adoption of Electronic Health Records by Nurse
 
Page 1 Executive Summary Policy makers are looking.docx
Page 1   Executive Summary Policy makers are looking.docxPage 1   Executive Summary Policy makers are looking.docx
Page 1 Executive Summary Policy makers are looking.docx
 
Nursing informatic'spresentation
Nursing informatic'spresentationNursing informatic'spresentation
Nursing informatic'spresentation
 
Ethical Implications Of Electronic Health Records
Ethical Implications Of Electronic Health RecordsEthical Implications Of Electronic Health Records
Ethical Implications Of Electronic Health Records
 
Respond to at least two of your colleagues offering additionalal.docx
Respond to at least two of your colleagues offering additionalal.docxRespond to at least two of your colleagues offering additionalal.docx
Respond to at least two of your colleagues offering additionalal.docx
 
Mining Health Examination Records A Graph Based Approach
Mining Health Examination Records A Graph Based ApproachMining Health Examination Records A Graph Based Approach
Mining Health Examination Records A Graph Based Approach
 
Running head MEDICAL TECHNOLOGY 1MEDICA.docx
Running head MEDICAL TECHNOLOGY                        1MEDICA.docxRunning head MEDICAL TECHNOLOGY                        1MEDICA.docx
Running head MEDICAL TECHNOLOGY 1MEDICA.docx
 
Evaluation of A CIS
Evaluation of A CISEvaluation of A CIS
Evaluation of A CIS
 
Evolution of Health Care Paper and TimelineThere are specifi.docx
Evolution of Health Care Paper and TimelineThere are specifi.docxEvolution of Health Care Paper and TimelineThere are specifi.docx
Evolution of Health Care Paper and TimelineThere are specifi.docx
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
 
EHR- 2016 Eeshika Mitra
EHR- 2016 Eeshika MitraEHR- 2016 Eeshika Mitra
EHR- 2016 Eeshika Mitra
 
Electronic Health Records - Market Landscape
Electronic Health Records - Market LandscapeElectronic Health Records - Market Landscape
Electronic Health Records - Market Landscape
 

Biometric Authentication Systems in Healthcare

  • 1.