Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Comparative Study
. 2011 Sep 30:11:244.
doi: 10.1186/1472-6963-11-244.

Video calls from lay bystanders to dispatch centers - risk assessment of information security

Affiliations
Comparative Study

Video calls from lay bystanders to dispatch centers - risk assessment of information security

Stein R Bolle et al. BMC Health Serv Res. .

Abstract

Background: Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed.

Methods: Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability.

Results: Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level.

Conclusions: Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

PubMed Disclaimer

Figures

Figure 1
Figure 1
The workflow of risk assessment according to the information security standard ISO/IEC 27005:2008.
Figure 2
Figure 2
Risk matrix presenting the identified threats with identifier and short description. Darker shades of grey indicates higher level of risk: light grey low risk, medium grey moderate risk and darkest grey severe risk. White background is used for threats with unknown risk.

References

    1. World Health Organization. Global health risks. 2009. http://www.who.int/healthinfo/global_burden_disease/global_health_risks/...
    1. Murray CJ, Lopez AD. Mortality by cause for eight regions of the world: Global Burden of Disease Study. Lancet. 1997;349(9061):1269–1276. doi: 10.1016/S0140-6736(96)07493-4. - DOI - PubMed
    1. Krug EG, Sharma GK, Lozano R. The global burden of injuries. Am J Public Health. 2000;90(4):523–526. doi: 10.2105/AJPH.90.4.523. - DOI - PMC - PubMed
    1. Tjora A. Calls for Care Coordination, compentence, and computers in medical emergency call centres. VDM Verlag Dr. Müller; 2009.
    1. Heward A, Damiani M, Hartley-Sharpe C. Does the use of the Advanced Medical Priority Dispatch System affect cardiac arrest detection? Emerg Med J. 2004;21:115–118. doi: 10.1136/emj.2003.006940. - DOI - PMC - PubMed

Publication types