Addressing the Interoperability of Electronic Health Records: The Technical and Semantic Interoperability, Preserving Privacy and Security Framework
Abstract
:1. Introduction
1.1. Overview
1.2. Existing Interoperability Frameworks
1.3. The Need for a Novel Conceptual Interoperability Framework for EHR
1.4. Requirements for a New Conceptual Interoperability Framework
- (a)
- Modern and Scalable Technology: Interoperability frameworks should utilize modern and scalable technologies to ensure that they can manage a large volume of data and participants without compromising performance. This includes avoiding single points of failure, as these can lead to significant downtime [32,33].
- (b)
- Data Privacy and Security: Ensuring the privacy and security of patient data is paramount. The framework must have robust mechanisms for access control, data obfuscation, encryption, and compliance with data protection regulations such as the UK DPA (GDPR) and the US Health Insurance Portability and Accountability Act (HIPAA) [34].
- (c)
- Standardized Terminology: The consistent use of standardized healthcare terminology is crucial for successful data sharing and interpretation. Addressing the challenges of inconsistent healthcare terminology is essential for achieving semantic interoperability.
- (d)
- Flexibility and Adaptability: The framework should be adaptable to different healthcare settings and EHR systems. It should support various data modalities and allow for customization to accommodate diverse clinical applications as well as diverse input and output formats [35].
- (e)
- Support for Right of Erasure: Compliance with data protection regulations like GDPR and HIPAA, including the right of erasure, should be part of the framework. It should provide users with control over the data that have been captured and processed [36].
- (f)
- Progressive Resistance against Data Breaches: The framework should implement measures like dynamic data-masking techniques and transparent database encryption to actively resist data breaches [36].
- (g)
- (h)
- Real-Time Capabilities: Frameworks should prioritize real-time data exchange capabilities to support immediate decision-making processes and provide up-to-date information [37].
- (i)
- Compatibility: A well-structured architecture with orchestration capabilities should be integral to the framework, ensuring that different components can work harmoniously despite their differences. This will also ensure that legacy systems can be integrated into the conceptual framework [21].
- (j)
- Practical Applicability beyond the Original Context: The framework should be designed with the ability to be implemented beyond its original context or region. It should address various technical, semantic, and regulatory concerns [38].
2. The TASIPPS Conceptual Framework
2.1. The TASIPPS Framework Components
2.1.1. The Middleware Server Module
2.1.2. The Semantic Interoperability Module
How Semantic Interoperability Is Achieved
2.1.3. The Privacy Module
- A notification is sent to the patient explaining the query.
- The patient can review the query and either approve or deny the request.
- Access is only granted if the patient explicitly approves the request.
- If the patient does not approve the request, the system will log the denial and notify the requesting party that access has been denied.
2.1.4. The Security Module
Application Security
Network Security
Database Security
2.1.5. The Policy Module
2.2. Case Study of the TASIPPS Framework
- A doctor initiates query for patient history: During a consultation, if the doctor at Hospital A needs to review a patient’s medical history, stored by Hospital B, they initiate a query request to the central platform. The doctor’s role-based access control (RBAC) permissions are verified within Hospital A’s system to confirm they are authorized to make this request.
- Request sent to central platform: The request (from Hospital A) is securely transmitted to the central platform, which acts as a mediator between the two connected prototype (hospital) systems. The central platform identifies the patient’s unique ID and prepares to fetch the patient’s medical records from both Hospital A (current) and Hospital B (connected).
- Verification of doctor’s role: The central platform checks the RBAC policies of both systems to ensure that a user who is a doctor is making the request, adhering to the security protocols of each institution. This RBAC verification helps maintain the data access restrictions, allowing only qualified healthcare practitioners to access patient information.
- Display of patient’s medical history: The central platform retrieves a list of the patient’s previous visitations from both Hospital A and Hospital B. The list includes details such as the visit date, hospital name, attending doctor’s name, and any relevant clinical notes. This information is presented in a consolidated view on the doctor’s interface, allowing for a quick overview of the patient’s history across institutions.
- Patient consent request via OTP: Once the doctor selects a specific medical record to view, the central platform triggers a consent request to the patient’s registered phone number. An OTP (one-time password) is sent to the patient, along with a secure link that allows them to approve or decline the data view request.
- Patient consent approval/denial: The patient receives the OTP and link, allowing them to verify the access request. By entering the OTP and selecting “Approve” or “Decline,” the patient controls the sharing of their medical information, in compliance with privacy regulations.
- At this stage, the central platform ensures semantic interoperability by aligning the medical terminology and data structures across Hospital A and Hospital B. This alignment allows for data from disparate EMR systems to be accurately interpreted and presented in a consistent format on the doctor’s interface. By standardizing terminologies and data models (see Section 2.1.2), the central platform ensures that the medical information from both hospitals is meaningful and accessible, providing the doctor with a unified view of the patient’s medical history.
- Access granted to the doctor (upon approval): If the patient approves the request, the central platform grants the doctor access to view the selected medical record. The doctor can then review the patient’s full details, which may contain critical information for the ongoing treatment.
- Audit logging for compliance: the central platform logs the entire transaction, including the identities of the requesting doctor, the patient’s approval or denial, the time of access, and the specific records accessed. This audit trail helps ensure accountability and compliance with healthcare privacy/data protection regulations.
2.3. Evaluation and Discussion
- 1.
- Semantic Interoperability: the framework excels by utilizing standardized healthcare terminologies, ensuring consistent and accurate data interpretation across systems. This addresses a major limitation seen in other frameworks.
- 2.
- Technical Interoperability: The framework is highly adaptable, allowing for seamless integration with various EHR systems and clinical applications, making it suitable for diverse healthcare environments.
- 3.
- Reusability: With its modular architecture, the framework supports the reuse of components, which enables flexibility and reduces system redundancy. This reusability enhances system maintenance and expansion.
- 4.
- Scalability: The framework is built on a cloud-based infrastructure with dynamic resource allocation and load-balancing, allowing the framework to scale efficiently as data volumes and workflow complexities grow.
- 5.
- Compliance with Standards: By leveraging widely accepted standards like SOA, FHIR, and SAML, TASIPPS ensures compliance, reducing the risk of obsolescence and maintaining compatibility with future systems.
- 6.
- Consent Management: The framework integrates comprehensive privacy controls, including consent management, to ensure that patients have control over their healthcare data, aligning with regulations like the GDPR and HIPAA.
- 7.
- Access Control: Through advanced mechanisms like OAuth 2.0-based authentication and authorization, TASIPPS ensures that only authorized personnel can access sensitive patient data, providing strong access control.
- 8.
- Network Security: The framework employs advanced encryption techniques such as AES-256 and SHA-512, maintaining high levels of security in terms of data transmission and storage, which ensures the protection of healthcare data.
- 9.
- Identity and Access Management: The framework provides robust identity and access management solutions to secure sensitive healthcare data, enhancing security across interconnected systems.
- 10.
- Threat Detection and Prevention: With built-in threat detection and prevention mechanisms, the framework safeguards healthcare data against cyber-attacks and breaches, ensuring a high level of system protection.
- 11.
- Legal Compliance: The framework also complies with legal frameworks by offering mechanisms for dynamic data masking and data erasure, ensuring adherence to privacy regulations like GDPR.
- 12.
- Privacy: Finally, the framework provides enhanced privacy features such as data obfuscation and masking, ensuring that sensitive patient data remain secure while ensuring compliance with key data protection regulations.
3. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- IEEE. Standards Glossary. 2013. Available online: http://www.ieee.org/education_careers/education/standards/standards_glossary.html (accessed on 13 August 2024).
- Young, P.; Chaki, N.; Berzins, V.; Luqi, L. Evaluation of middleware architectures in achieving system interoperability. In Proceedings of the 14th IEEE International Workshop on Rapid Systems Prototyping Proceedings, San Diego, CA, USA, 9–11 June 2003; pp. 108–116. [Google Scholar]
- Reis, Z.S.N.; Maia, T.A.; Marcolino, M.S.; Becerra-Posada, F.; Novillo-Ortiz, D.; Ribeiro, A.L.P. Is there evidence of cost benefits of electronic medical records, Standards, or Interoperability in hospital information systems? Overview of systematic reviews. JMIR Med. Inform. 2017, 5, e7400. [Google Scholar] [CrossRef]
- Abernethy, A.; Adams, L.; Barrett, M.; Bechtel, C.; Brennan, P.; Butte, A.; Faulkner, J.; Fontaine, E.; Friedhoff, S.; Halamka, J.; et al. The Promise of Digital Health: Then, Now, and the Future. NAM Perspect. 2022, 6, 108–116. [Google Scholar] [CrossRef] [PubMed]
- World Health Organization. Digital Health and Innovation. 2024. Available online: https://www.who.int/publications/m/item/digital-health-and-innovation (accessed on 20 July 2024).
- Shinozaki, A. Electronic Medical Records and Machine Learning in Approaches to Drug Development. In Artificial Intelligence in Oncology Drug Discovery and Development; IntechOpen: London, UK, 2020. [Google Scholar] [CrossRef]
- Ntafi, C.; Spyrou, S.; Bamidis, P.; Theodorou, M. The legal aspect of interoperability of cross border electronic health services: A study of the european and national legal framework. Health Inform. J. 2022, 28, 146045822211287. [Google Scholar] [CrossRef] [PubMed]
- Kouroubali, A.; Katehakis, D.G. The new European interoperability framework as a facilitator of digital transformation for citizen empowerment. J. Biomed. Inform. 2019, 94, 103166. [Google Scholar] [CrossRef] [PubMed]
- Peterson, K.J.; Deeduvanu, R.; Kanjamala, P.; Mayo, K. A Blockchain-Based Approach to Health Information Exchange Networks. 2016. Available online: https://www.semanticscholar.org/paper/A-Blockchain-Based-Approach-to-Health-Information-Peterson-Deeduvanu/c1b189c81b6fda71a471adec11cfe72f6067c1ad (accessed on 13 August 2024).
- Yang, H.; Yang, B. A Blockchain-Based Approach to the Secure Sharing of Healthcare Data. In Proceedings of the Norwegian Information Security Conference 2017, Oslo, Norway, 27–29 November 2017; pp. 100–111. [Google Scholar]
- Lin, Q.; Wang, H.; Pei, X.; Wang, J. Food Safety Traceability System Based on Blockchain and EPCIS. IEEE Access 2019, 7, 20698–20707. [Google Scholar] [CrossRef]
- Yan, X.; Wu, Q.; Sun, Y. A Homomorphic Encryption and Privacy Protection Method Based on Blockchain and Edge Computing. Wirel. Commun. Mob. Comput. 2020, 2020, 8832341. [Google Scholar] [CrossRef]
- Dagher, G.G.; Mohler, J.; Milojkovic, M.; Marella, P.B. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 2018, 39, 283–297. [Google Scholar] [CrossRef]
- Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. MedRec: Using Blockchain for Medical Data Access and Permission Management. In Proceedings of the 2016 2nd International Conference on Open and Big Data (OBD), Vienna, Austria, 22–24 August 2016; pp. 25–30. [Google Scholar] [CrossRef]
- Linn, L.A.; Koo, M.B. A Blockchain for Healthcare: The Solution to Trustworthy Health Data. Office of the National Coordinator for Health Information Technology, U.S. Department of Health and Human Services. 2016. Available online: https://www.healthit.gov/sites/default/files/11-74-ablockchainforhealthcare.pdf (accessed on 20 July 2024).
- Ivan, D. Moving toward a blockchain-based method for the secure storage of patient records. In Proceedings of the ONC/NIST Use of Blockchain for Healthcare and Research Workshop, Gaithersburg, MD, USA, 22–24 August 2016; pp. 1–11. [Google Scholar]
- Brodersen, C.; Kalis, B.; Leong, C.; Mitchell, E.; Pupo, E.; Truscott, A. Blockchain Technology: Opportunities for Healthcare. Office of the National Coordinator for Health Information Technology, U.S. Department of Health and Human Services. 2016. Available online: https://www.truevaluemetrics.org/DBpdfs/Technology/Blockchain/2-49-accenture_onc_blockchain_challenge_response_august8_final.pdf (accessed on 20 July 2024).
- Rajput, A.R.; Li, Q.; Ahvanooey, M.T. A blockchain-based secret-data sharing framework for personal health records in emergency condition. Healthcare 2021, 9, 206. [Google Scholar] [CrossRef]
- Mwogosi, A. Digital Transformation in Tanzania’s Healthcare Sector: A Systematic Review of Robust Electronic Health Records Systems’ Critical Success Factors. Res. Sq. 2023. [Google Scholar] [CrossRef]
- Semantha, F.H.; Azam, S.; Shanmugam, B.; Yeo, K.C. PbDinEHR: A Novel Privacy by Design Developed Framework Using Distributed Data Storage and Sharing for Secure and Scalable Electronic Health Records Management. J. Sens. Actuator Netw. 2023, 12, 36. [Google Scholar] [CrossRef]
- Corbin, C.K.; Maclay, R.; Acharya, A.; Mony, S.; Soumya Punnathanam Thapa, R.; Kotecha, N.; Shah, N.H.; Chen, J. DEPLOYR: A technical framework for deploying custom real-time machine learning models into the electronic medical record. J. Am. Med. Inform. Assoc. 2023, 30, 1532–1542. [Google Scholar] [CrossRef] [PubMed]
- Mishra, R.; Kaur, I.; Sahu, S.; Saxena, S.; Malsa, N.; Narwaria, M. Establishing three layer architecture to improve interoperability in Medicare using smart and strategic API led integration. SoftwareX 2023, 22, 101376. [Google Scholar] [CrossRef]
- Singh, S. What Is a Conceptual Framework and How to Make It (with Examples). Researcher Life. 2023. Available online: https://researcher.life/blog/article/what-is-a-conceptual-framework-and-how-to-make-it-with-examples/ (accessed on 19 September 2024).
- Camp, W.G. Formulating and Evaluating Theoretical Frameworks for Career and Technical Education Research. J. Vocat. Educ. Res. 2001, 26, 27–39. [Google Scholar] [CrossRef]
- Grant, C.; Osanloo, A. Understanding, Selecting, and Integrating a Theoretical Framework in Dissertation Research: Creating the Blue print for ‘House’. Adm. Issues J. Connect. Educ. Pract. Res. 2014, 4, 12–22. [Google Scholar] [CrossRef]
- Liehr, P.; Smith, M.J. Middle Range Theory: Spinning Research and Practice to Create Knowledge for the New Millennium. Adv. Nurs. Sci. 1999, 21, 81–91. [Google Scholar] [CrossRef]
- Luse, A.; Mennecke, B.; Townsend, A. Selecting a Research Topic: A Framework for Doctoral Students. Int. J. Dr. Stud. 2012, 7, 143–152. [Google Scholar] [CrossRef]
- Miles, M.B.; Huberman, A.M. Qualitative Data Analysis An Expanded Sourcebook; Sage Publications: Thousand Oaks, CA, USA, 1994; Available online: https://www.scirp.org/reference/referencespapers?referenceid=1423956 (accessed on 15 August 2024).
- Christodoulakis, C.; Asgarian, A.; Easterbrook, S. Barriers to adoption of information technology in healthcare. In Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering, Toronto, ON, Canada, 4–6 November 2019; pp. 66–75. [Google Scholar]
- Spanakis, E.G.; Sfakianakis, S.; Bonomi, S.; Ciccotelli, C.; Magalini, S.; Sakkalis, V. Emerging and Established Trends to Support Secure Health Information Exchange. Front. Digit. Health 2021, 3, 636082. [Google Scholar] [CrossRef]
- Sharma, P.; Borah, M.D.; Namasudra, S. Improving security of medical big data by using Blockchain technology. Comput. Electr. Eng. 2021, 96, 107529. [Google Scholar] [CrossRef]
- Oikonomou, E.K.; Khera, R. Designing medical artificial intelligence systems for global use: Focus on interoperability, scalability, and accessibility. Hell. J. Cardiol. 2024. [Google Scholar] [CrossRef]
- Thantharate, P.; Thantharate, A. ZeroTrustBlock: Enhancing Security, Privacy, and Interoperability of Sensitive Data through ZeroTrust Permissioned Blockchain. Big Data Cogn. Comput. 2023, 7, 165. [Google Scholar] [CrossRef]
- Williamson, S.M.; Prybutok, V. Balancing Privacy and Progress: A Review of Privacy Challenges, Systemic Oversight, and Patient Perceptions in AI-Driven Healthcare. Appl. Sci. 2024, 14, 675. [Google Scholar] [CrossRef]
- López, D.M.; González, C.; Blobel, B. Ontology-based interoperability service for HL7 interfaces implementation. In Seamless Care–Safe Care; IOS Press: Amsterdam, The Netherlands, 2010; pp. 108–114. [Google Scholar]
- Tikkinen-Piri, C.; Rohunen, A.; Jormanainen, I. EU General Data Protection Regulation: Changes and Implications for Personal Data Collecting Companies. Comput. Priv. Data Prot. 2018, 34, 134–153. [Google Scholar] [CrossRef]
- Sultan, T. Compliance with the GDPR and HIPAA: A Comparative Study in Healthcare Sector. J. Priv. Data Prot. 2020, 23, 56–72. [Google Scholar]
- ISO/TR 20514:2005; Health Informatics—Electronic Health Record—Definition, Scope and Context. ISO—International Organization for Standardization: Geneva, Switzerland, 2020. Available online: https://www.iso.org/standard/39525.html (accessed on 12 August 2024).
- Selvapriya, E.S.; Suganthi, L. Design and implementation of low power Advanced Encryption Standard cryptocore utilizing dynamic pipelined asynchronous model. Integration 2023, 93, 102057. [Google Scholar] [CrossRef]
- Wang, K.; Wu, X.; Wang, H.; Kan, H.; Kurths, J. New color image cryptosystem via SHA-512 and hybrid domain. Multimed. Tools Appl. 2021, 80, 18875–18899. [Google Scholar] [CrossRef]
- IBM. What Is a REST API?|IBM. 2023. Available online: https://www.ibm.com/topics/rest-apis (accessed on 12 August 2024).
- Palma, F.; Olsson, T.; Wingkvist, A.; Gonzalez-Huerta, J. Assessing the linguistic quality of REST APIs for IoT applications. J. Syst. Softw. 2022, 191, 111369. [Google Scholar] [CrossRef]
- Itirra. What Is HL7? Advantages and Disadvantages Explained|Blog. 2023. Available online: https://itirra.com/blog/hl7-advantagesdisadvantages/ (accessed on 24 June 2023).
- Gdpr-text.com. Article 5 GDPR. Principles Relating to Processing of Personal Data|GDPR-Text.com. Available online: https://gdpr-text.com/read/article-5/ (accessed on 15 August 2024).
- Eder, E.; Wiegand, M.; Krieg-Holz, U.; Hahn, U. “beste grüße, maria meyer”—Pseudonymization of privacy-sensitive information in emails. In Proceedings of the Thirteenth Language Resources and Evaluation Conference, Marseille, France, 20–25 June 2022; European Language Resources Association: Marseille, France, 2022; pp. 741–752. [Google Scholar]
- Ertmer, P.A.; Newby, T.J. Behaviorism, cognitivism, constructivism: Comparing critical features from an instructional design perspective. Perform. Improv. Q. 2013, 26, 43–71. [Google Scholar] [CrossRef]
- Pierre, L.; Ildikó, P.; David, S.; Montserrat, B.; Lilja, Ø. Anonymization models for text data: State of the art, challenges and future directions. In Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers), Virtual Event, 1–6 August 2021; Association for Computational Linguistics: Stroudsburg, PA, USA, 2021; pp. 4188–4203. [Google Scholar]
- Pilán, I.; Lison, P.; Øvrelid, L.; Papadopoulou, A.; Sánchez, D.; Batet, M. The Text Anonymization Benchmark (TAB): A Dedicated Corpus and Evaluation Framework for Text Anonymization. Comput. Linguist. 2022, 48, 1053–1101. [Google Scholar] [CrossRef]
- Yue, Z.; Ding, S.; Zhao, L.; Zhang, Y.; Cao, Z.; Tanveer, M.; Jolfaei, A.; Zheng, X. Privacy-preserving time-series medical images analysis using a hybrid deep learning framework. ACM Trans. Internet Technol. (TOIT) 2021, 21, 1–21. [Google Scholar] [CrossRef]
- Ross, G.M.S.; Zhao, Y.; Bosman, A.J.; Geballa-Koukoula, A.; Zhou, H.; Elliott, C.T.; Nielen, M.W.F.; Rafferty, K.; Salentijn, G.I.J. Best practices and current implementation of emerging smartphonebased (bio)sensors—Part 1: Data handling and ethics. TrAC Trends Anal. Chem. 2023, 158, 116863. [Google Scholar] [CrossRef]
- Yuan, H.; Wang, Z.; Chen, Z.; Gong, Y.; Lu, J.; Hu, Y.; Li, L.; Qian, F. A Fine-Grained Access Control Method Based on Role Permission Management. In Proceedings of the 2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), Ballar, India, 29–30 April 2023. [Google Scholar] [CrossRef]
- Bincoletto, G. Data protection issues in cross-border interoperability of Electronic Health Record systems within the European Union. Data Policy 2020, 2, e3. [Google Scholar] [CrossRef]
- Oracle.com. Risk and Compliance. 2023. Available online: https://docs.oracle.com/en-us/iaas/Content/cloud-adoption-framework/risk-and-compliance.htm (accessed on 15 August 2024).
Criteria | eEIF | Blockchain-Based (Sharma et al., 2021 [31]) | Ancile | Hyperledger-Based (Access Control) | Tanzanian EHR Framework | PbDinEHR | DEPLOYR | API-Led Integration | TASIPPS |
---|---|---|---|---|---|---|---|---|---|
Semantic Interoperability | Yes | No | No | No | Yes | Yes | No | No | Yes |
Technical Interoperability | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Reusability | No | No | No | No | No | No | No | Yes | Yes |
Scalability | No | No | No | No | No | No | No | Yes | Yes |
Compliance to Standards | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Consent Management (Privacy) | No | Yes | Yes | Yes | No | No | No | Yes | Yes |
Access Control (Security) | Yes | Yes | Yes | Yes | No | No | No | Yes | Yes |
Network Security | Yes | Yes | Yes | Yes | No | No | No | Yes | Yes |
Identity and Access Management (Security) | Yes | Yes | Yes | Yes | No | No | No | Yes | Yes |
Threat Detection and Prevention (Security) | No | Yes | Yes | Yes | No | No | No | Yes | Yes |
Legal Interoperability | Yes | No | Yes | Yes | No | No | No | Yes | Yes |
Privacy | Yes | Yes | Yes | Yes | No | No | No | Yes | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Published by MDPI on behalf of the International Institute of Knowledge Innovation and Invention. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ademola, A.; George, C.; Mapp, G. Addressing the Interoperability of Electronic Health Records: The Technical and Semantic Interoperability, Preserving Privacy and Security Framework. Appl. Syst. Innov. 2024, 7, 116. https://doi.org/10.3390/asi7060116
Ademola A, George C, Mapp G. Addressing the Interoperability of Electronic Health Records: The Technical and Semantic Interoperability, Preserving Privacy and Security Framework. Applied System Innovation. 2024; 7(6):116. https://doi.org/10.3390/asi7060116
Chicago/Turabian StyleAdemola, Adetunji, Carlisle George, and Glenford Mapp. 2024. "Addressing the Interoperability of Electronic Health Records: The Technical and Semantic Interoperability, Preserving Privacy and Security Framework" Applied System Innovation 7, no. 6: 116. https://doi.org/10.3390/asi7060116
APA StyleAdemola, A., George, C., & Mapp, G. (2024). Addressing the Interoperability of Electronic Health Records: The Technical and Semantic Interoperability, Preserving Privacy and Security Framework. Applied System Innovation, 7(6), 116. https://doi.org/10.3390/asi7060116