Leveraging intrinsic resources for the protection of health information assets
The prevailing state of rural economies continues to constrain the use of digital applications for improved healthcare. These constraints are attributed to the unavailability of key infrastructure and financial resources. Moreover, a prevailing shortage of skilled health workers highlights the critical role digital solutions have to play in alleviating health service delivery challenges. Resource-constrained settings need secure low cost and long shelf-life solutions that leverage existing resources to provide adequate and secure health services. The objective of this paper is to identify the existing resources that can be engaged in the protection of the broader health information assets (including digital applications). To meet the objective, a single case study was conducted. Questionnaires were distributed to twenty-five Community Health Workers to identify existing stressors and resources in the context. The paper leads with a description of resource-constrained settings, highlights the challenges facing healthcare systems in these contexts and emphasizes the need for health information asset protection. The findings, recommendations and conclusions are subsequently presented. The contribution of this paper is a set of recommendations for improving health information asset protection in resource-constrained settings as informed by stressors and resources identified in the case study.
- Authors retain copyright and grant SACJ right of first publication. The work is additionally licensed under a Creative Commons Attribution Non-Commercial License that requires others who share the work to acknowledge the work’s authorship and initial publication in SACJ. Should anyone else wish to make commercial use of the work, SACJ cedes the right to the author to negotiate terms and does not expect to be paid any royalties.
- Authors may enter into additional arrangements for non-exclusive distribution of the SACJ-published version of the work (e.g., post it to a repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are required to refrain from posting their work online prior to completion of reviews so as not to compromise double-blind reviewing or confuse plagiarism checks.