Difference between revisions of "Securing Health Information"

From Clinfowiki
Jump to: navigation, search
(Created page with "This is a review for Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13 == Introdu...")
 
Line 2: Line 2:
  
 
== Introduction ==
 
== Introduction ==
<ref name="Burns et al., 2015"> Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13
+
Protecting health information is critical, yet the security implications of healthcare workers’ IT usage remain largely unexamined. Burns et al. surveys the IT-enabled healthcare ecosystem and its emerging mobility and security issues.<ref name="Burns et al., 2015"> Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13
 
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030196&isnumber=7030137</ref>
 
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030196&isnumber=7030137</ref>
 
<ref name="Burns et al., 2015"></ref>
 
<ref name="Burns et al., 2015"></ref>
 
== Healthcare in the Digital Age==
 
== Healthcare in the Digital Age==
<ref name="Burns et al., 2015"></ref>
+
[[Meaningful use]] and other healthcare regulations are causing an increased uptake of HIT in healthcare. The line between the personal, public, and corporate networks is becoming blurred.<ref name="Burns et al., 2015"></ref>
== Behavioral Information Security==
+
== Behavioral Information [[Security]]==
<ref name="Burns et al., 2015"></ref>
+
According to Burns et al., behavioral information security has been broadly defined as the study of human actions that influence the confidentiality, integrity, and availability of information and information systems.<ref name="Burns et al., 2015"></ref>
 
== Evolving Issues in Mobility and Security==
 
== Evolving Issues in Mobility and Security==
<ref name="Burns et al., 2015"></ref>
+
Byod, Bring your own device and Health Information economy of information present two important issues of security today.<ref name="Burns et al., 2015"></ref>
 
==Reviewer’s Comments==
 
==Reviewer’s Comments==
 
=== Jonzy’s Comments ===
 
=== Jonzy’s Comments ===
This article is an excellent companion, I think, to Improving Outcomes with Clinical Decision Support: An Implementer’s Guide by Dean Sittig. I would go so far as to recommend it as material for any course regarding CDS development and implementation.
+
I thought this article captured the current state of security in healthcare today. I recommend it for anyone in the healthcare field.
  
 
== References ==
 
== References ==
 
<references/>
 
<references/>
 +
 +
 +
[[Category:Security]]
 +
[[Category:Reviews]]

Revision as of 20:45, 4 April 2015

This is a review for Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13

Introduction

Protecting health information is critical, yet the security implications of healthcare workers’ IT usage remain largely unexamined. Burns et al. surveys the IT-enabled healthcare ecosystem and its emerging mobility and security issues.[1] [1]

Healthcare in the Digital Age

Meaningful use and other healthcare regulations are causing an increased uptake of HIT in healthcare. The line between the personal, public, and corporate networks is becoming blurred.[1]

Behavioral Information Security

According to Burns et al., behavioral information security has been broadly defined as the study of human actions that influence the confidentiality, integrity, and availability of information and information systems.[1]

Evolving Issues in Mobility and Security

Byod, Bring your own device and Health Information economy of information present two important issues of security today.[1]

Reviewer’s Comments

Jonzy’s Comments

I thought this article captured the current state of security in healthcare today. I recommend it for anyone in the healthcare field.

References

  1. 1.0 1.1 1.2 1.3 1.4 Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030196&isnumber=7030137