Tony Sahama

Tony Sahama
University of Victoria | UVIC · School of Health Information Science

BSc., MPhil., PhD., MEd(HE). M.Law

About

118
Publications
49,186
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,156
Citations
Introduction
I am an open-minded transdisciplinary researcher. My research engagements are Information Accountability, Health Information Privacy, and Security, Cybersecurity and Healthcare Information Technology (e.g., Digital Health, Health Informatics, Medical Informatics, eHealth and Health Information Systems Design, Development and Deployment). I am committed to sharing knowledge and experiences that I have acquired with people and society. I am a team player, passionate academic, dedicated mentor and research supervisor engaging in transdisciplinary research activities to facilitate collaborative practice-based inquiry of learning and research endeavours.
Additional affiliations
October 2016 - August 2021
University of Victoria, BC, Canada
Position
  • Professor (Associate)
Description
  • Research collaboration at http://www.uvic.ca/hsd/hinf/faculty-staff/faculty/adjunct/index.php
January 1999 - November 2016
Queensland University of Technology
Position
  • Professor (Associate)
Description
  • Please visit my academic profile for further information and publications: www.staff.qut.edu.au/staff/sahama
Education
August 2008 - August 2010
Master of Education (Higher Education)
Field of study
  • Higher Education
November 2007 - August 2010
Master of Law
Field of study
  • Migration Law and Practices
February 1996 - September 1999
PhD - Victoria University Melbourne
Field of study
  • Computer Science, Information Systems and Statistical Computing

Publications

Publications (118)
Article
Full-text available
Health data have enormous potential to transform healthcare, health service design, research, and individual health management. However, health data collected by institutions tend to remain siloed within those institutions limiting access by other services, individuals or researchers. Further, health data generated outside health services (e.g., fr...
Article
Full-text available
Electronic Health Records (EHRs) constitute evidence of online health information management. Critical healthcare information technology (HIT) infrastructure facilitates health information exchange of 'modern' health systems. The growth and implementation of EHRs are progressing in many countries while the adoption rate is lagging and lacking momen...
Conference Paper
With the need for employee-directed health management in organisations, employers have started to utilise personal health records' (PHRs) potential to shift health management responsibility to employees. Whilst the overall well-being of employees in organisations has become the trend in wellness activities at work, existing literature has paid less...
Conference Paper
The healthcare industry establishes policies and standards to improve the quality of health processes and their delivery. Auditing and monitoring can be used to measure the quality of healthcare and check compliance with the health policies. Appropriate logging mechanisms can be considered as a key component to manage compliance initiatives because...
Conference Paper
Full-text available
The widespread adoption of Information and Communication Technologies (ICT) in the healthcare industries have given rise to the increase in the generation of valuable Electronic Health Records (EHRs). This brings potential in the secondary uses of EHRs for research, analysis and decision making support. Clinical Decision Support System (CDSS) has b...
Chapter
When considering the use of mobile or wearable health technologies to collect health data, a majority of users state security and privacy of their data is a primary concern. With users being connected 24/7, there is a higher risk today of data theft or the misappropriate use of health data. Furthermore, data ownership is often a misunderstood topic...
Chapter
When considering the use of mobile or wearable health technologies to collect health data, a majority of users state security and privacy of their data is a primary concern. With users being connected 24/7, there is a higher risk today of data theft or the misappropriate use of health data. Furthermore, data ownership is often a misunderstood topic...
Chapter
Cough is an important protective reflex that is essential to protect the airways yet can also signify disease as a symptom of airway disease. It is the most common symptom that results in new medical consultations at least in regions where data is available. Both children and adults can cough for a myriad of reasons. This ranges from cough associat...
Conference Paper
Employers are still grappling with the decision to use electronic personal health record (PHR) systems as an added corporate benefit to employees. Prior research has shown a significant impact on the employer-employee relationship depending on an employee's decision to accept and use PHR systems. Though emerging consumer health information technolo...
Conference Paper
The adoption of Electronic Health Record (EHR) systems has been widespread both locally and globally. The result of such adoptions has been the generation of huge amounts of digital healthcare data, assets which are valuable towards providing better care and management of patients. While studies conducted on secondary use of EHR data have found to...
Article
Many complementary and alternative medical practices (CAM) are readily assessable in Australia alongside Allopathic practitioners. Although CAM practices are prevalent, little is known about how patients seek and use information when deciding which system to consult. We report some preliminary findings of a longitudinal study, designed to solicit f...
Chapter
Full-text available
©2017, IGI Global.When considering the use of mobile or wearable health technologies to collect health data, a majority of users state security and privacy of their data is a primary concern. With users being connected 24/7, there is a higher risk today of data theft or the misappropriate use of health data. Furthermore, data ownership is often a m...
Conference Paper
Full-text available
Tablet computers can be an effective tool to improve education. While there is an abundance of studies showcasing the use of tablets for education in the developed countries, such a use of tablets is under-studied in the developing countries. In this paper we present the findings of a study done in rural Sri Lanka, which aimed at developing a groun...
Conference Paper
Fully integrated electronic health records EHR provide healthcare providers and patients access to records across a health care system and promise efficient and effective provision of health care. However, fully integrated records have proven to be very expensive and difficult to establish. The only EHR’s to have been developed solely accommodate W...
Chapter
Decision making is such an integral aspect in health care routine that the ability to make the right decisions at crucial moments can lead to patient health improvements. Evidence-based practice, the paradigm used to make those informed decisions, relies on the use of current best evidence from systematic research such as randomized controlled tria...
Conference Paper
Effective decision-making plays an important role in promoting optimal care delivery. Factors such as availability of data, timely access to data and organised information greatly influences the quality of decision-making as illustrated in a causal loop diagram. The contribution of practice-based evidence thus aims at structuring an approach where...
Conference Paper
The readily available and accessible large collection of electronic health records has encouraged an increasing interest on its secondary use. It is especially true for the approach of practice-based evidence where the secondary use of EHR data, collected during routine care, has the potential to improve healthcare professionals’ decision-making ca...
Conference Paper
Due to the growing use of digital technologies and Electronic Health Record systems, new auditing mechanisms are needed to help protect stakeholders from information misuse, both deliberate and accidental. Electronic storage of health records and use of sensor networks, wearable and ubiquitous health tracking devices raise numerous privacy related...
Article
Full-text available
The explosive growth in the development of Traditional Chinese Medicine (TCM) has resulted in the continued increase in clinical and research data. The lack of standardised terminology, flaws in data quality planning and management of TCM informatics are preventing clinical decision-making, drug discovery and education. This paper argues that the i...
Conference Paper
Full-text available
The collaboration between universities and industries has become increasingly important for the development of Science and Technology. This is particularly more prominent in the Science Technology Engineering and Mathematics (STEM) disciplines. Literature suggest that the key element of University-Industry Partnership (UIP) is the exchange of knowl...
Article
Full-text available
To identify the efficacy of short message service (SMS) reminders in health care appointment attendance. A systematic review was undertaken to identify studies published between 2005 and 2015 that compared the attendance rates of patients receiving SMS reminders compared to patients not receiving a reminder. Each article was examined for informatio...
Article
This paper provides a first look at the acceptance of Accountable-eHealth (AeH) systems—a new genre of eHealth systems designed to manage information privacy concerns that hinder the proliferation of eHealth. The underlying concept of AeH systems is appropriate use of information through after-the-fact accountability for intentional misuse of infor...
Conference Paper
Full-text available
With the introduction of the PCEHR (Personally Controlled Electronic Health Record), the Australian public is being asked to accept greater responsibility for the management of their health information. However, the implementation of the PCEHR has occasioned poor adoption rates underscored by criticism from stakeholders with concerns about transpar...
Conference Paper
Shared eHealth records systems offer promising benefits for improving healthcare through high availability of information and improved decision making; however, their uptake has been hindered by concerns over the privacy of patient information. To address these privacy concerns while balancing the requirements of healthcare professionals to have ac...
Article
Full-text available
A survey was conducted across three Australian universities to identify the types and format of support services available for higher degree research (HDR, or MA and Ph.D.) students. The services were classified with regards to availability, location and accessibility. A comparative tool was developed to help institutions categorise their services...
Conference Paper
Full-text available
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security metrics and performance of those cryptographic functions in their embedded context needs to be understood in detail. Understanding t...
Conference Paper
Full-text available
Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control...
Conference Paper
Full-text available
With the ever increasing amount of eHealth data available from various eHealth systems and sources, Health Big Data Analytics promises enticing benefits such as enabling the discovery of new treatment options and improved decision making. However, concerns over the privacy of information have hindered the aggregation of this information. To address...
Chapter
Full-text available
Decision making is such an integral aspect in health care routine that the ability to make the right decisions at crucial moments can lead to patient health improvements. Evidence-based practice, the paradigm used to make those informed decisions, relies on the use of current best evidence from systematic research such as randomized controlled tria...
Conference Paper
Full-text available
This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services. The advantages of this architecture scheme is that it is far more scalable, not another certifi...
Article
Large volumes of heterogeneous health data silos pose a big challenge when exploring for information to allow for evidence based decision making and ensuring quality outcomes. In this paper, we present a proof of concept for adopting data warehousing technology to aggregate and analyse disparate health data in order to understand the impact various...
Article
Full-text available
This paper provides a first look at the acceptance of Accountable-eHealth systems, a new genre of eHealth systems, designed to manage information privacy concerns that hinder the proliferation of eHealth. The underlying concept of AeH systems is appropriate use of information through after-The-fact accountability for intentional misuse of informati...
Article
Full-text available
This conceptual paper is a preliminary part of an ongoing study into take-up of electronic personal health records (ePHRs). The purpose of this work is to contextually 'operationalise' Grönroos' (2012) model of value co-creation in service for ePHRs. Using findings in the extant literature we enhance theoretical and practical understanding of the p...
Article
Full-text available
With the introduction of the Personally Controlled Health Record (PCEHR), the Australian public is being asked to accept greater responsibility for their healthcare. Although well designed, constructed and intentioned, policy and privacy concerns have resulted in an eHealth model that may impact future health information sharing requirements. Thus...
Article
Full-text available
Culturally, philosophically and religiously diverse medical systems including Western medicine, Traditional Chinese Medicine, Ayurvedic Medicine and Homeopathic Medicine, once situated in places and times relatively unconnected from each other, currently co-exist to a point where patients must choose which system to consult. These decisions require...
Chapter
Information accountability is seen as a mode of usage control on the Web. Due to its many dimensions, information accountability has been expressed in various ways by computer scientists to address security and privacy in recent times. Information accountability is focused on how users participate in a system and the underlying policies that govern...
Chapter
Information and communications technologies are a significant component of the healthcare domain, and electronic health records play a major role in it. Therefore, it is important that they are accepted en masse by healthcare professionals. How healthcare professionals perceive the usefulness of electronic health records and their attitudes towards...
Article
Full-text available
Information and communications technologies are a significant component of the healthcare domain, and electronic health records play a major role in it. Therefore, it is important that they are accepted en masse by healthcare professionals. How healthcare professionals perceive the usefulness of electronic health records and their attitudes towards...
Article
Full-text available
A commitment in 2010 by the Australian Federal Government to spend $466.7 million dollars on the implementation of personally controlled electronic health records (PCEHR) heralded a shift to a more effective and safer patient centric eHealth system. However, deployment of the PCEHR has met with much criticism, emphasised by poor adoption rates over...
Article
Full-text available
In this paper, we present the results of a survey conducted to measure the attitudes of eHealth consumers towards Accountable-eHealth systems, which are designed for information privacy management. We developed a research model that identify the factors contributing to system acceptance from quantitative data of 187 completed survey responses from...
Article
Full-text available
This paper strives to identify barriers that hamper eHealth implementation from different perspectives. The benefits offered by eHealth and the need for eHealth preparedness is first discussed. This is followed by a discussion on the integral components of a robust eHealth infrastructure. Then, the barriers to eHealth such as technical interoperabi...
Article
Full-text available
Information accountability is seen as a mode of usage control on the Web. Due to its many dimensions, information accountability has been expressed in various ways by computer scientists to address security and privacy in recent times. Information accountability is focused on how users participate in a system and the underlying policies that govern...
Conference Paper
Full-text available
The security and privacy of patient information is one of the biggest hindrances to the wide adoption of eHealth systems. For eHealth systems to be successful they must provide protection for patients' privacy while ensuring healthcare professionals are able to access the information necessary to provide appropriate care. Accountable-eHealth system...
Article
Full-text available
Modern health information systems can generate several exabytes of patient data, the so called 'health big data', per year. Many health managers and experts believe that with the data, it is possible to easily discover useful knowledge to improve health policies, increase patient safety and eliminate redundancies and unnecessary costs. The objectiv...
Article
Full-text available
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to s...
Article
Full-text available
eHealth systems promise enviable benefits and capabilities for healthcare delivery. However, the technologies that make these capabilities possible introduce undesirable drawbacks such as information security related threats, which need to be appropriately addressed. Lurking in these threats are information privacy concerns. Addressing them has pro...
Conference Paper
Full-text available
This paper is a work in progress that examines current consumer engagement with eHealth information through Smartphones or tablets. We focus on three activity types: seeking, posting and 'other' engagement activity and compare two age groups, 25-40s and over 40-50s. Findings show that around 30% of the younger age group is engaging with Government...
Conference Paper
Full-text available
Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record...
Conference Paper
Full-text available
Big Data is one of rising IT trends such as cloud computing, social networking or ubiquitous computing. Big Data can offer beneficial scenarios in the e-health arena. However, one of the scenarios can be that Big Data needs to be kept secured for a long time in order to gain its benefits such as finding cures for infectious diseases and keeping pat...
Chapter
Full-text available
The concept of non-destructive testing (NDT) of materials and ­structures is of immense importance in engineering and medicine. Several NDT methods including electromagnetic (EM)-based e.g. X-ray and Infrared; ­ultrasound; and S-waves have been proposed for medical applications. This paper evaluates the viability of near infrared (NIR) spectroscopy...
Article
Full-text available
The availability of health information is rapidly increasing; its expansion and proliferation is inevitable. At the same time, breeding of health information silos is an unstoppable and relentless exercise. Information security and privacy concerns are therefore major barriers in the eHealth socio-eco system. We proposed Information Accountability...
Article
Full-text available
Meticulous planning and preparation do not always guarantee that e-health programs unfold as predicted. e-health entails interdependent social interactions which are difficult to predict without past experience or reference to lessons learned. Judicious insight into past case studies and eventualities, therefore, is essential towards building a suc...
Chapter
Full-text available
Database security techniques are available widely. Among those techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and an approach for searching...
Article
Full-text available
Availability of health information is rapidly increasing and the expansion and proliferation of health information is inevitable. The Electronic Healthcare Record, Electronic Medical Record and Personal Health Record are at the core of this trend and are required for appropriate and practicable exchange and sharing of health information. However, i...
Article
Full-text available
Health information systems are being implemented in countries by governments and regional health authorities in an effort to modernize healthcare. With these changes, there has emerged a demand by healthcare organizations for nurses graduating from college and university programs to have acquired nursing informatics competencies that would allow th...