Difference between revisions of "Securing Health Information"

From Clinfowiki
Jump to: navigation, search
(Evolving Issues in Mobility and Security)
 
Line 11: Line 11:
  
 
== Evolving Issues in Mobility and Security==
 
== Evolving Issues in Mobility and Security==
Bring Your Own Device (BYOD) and mHealth application ecosystem presents two important issues of security today.<ref name="Burns et al., 2015"></ref>
+
Bring Your Own Device (BYOD) and mHealth application ecosystem presents two important issues of security today.<ref name="Burns et al., 2015"></ref> when using healthcare applications on a mobile device verify that the app will perform only the functions that you approve of and uses websites that are trusted sources.<ref name="Mobile Device Privacy and Security">Mobile Device Privacy and Security.http://www.healthit.gov/providers-professionals/how-can-you-protect-and-secure-health-information-when-using-mobile-device</ref>
 +
 
 
==Reviewer’s Comments==
 
==Reviewer’s Comments==
 
=== Jonzy’s Comments ===
 
=== Jonzy’s Comments ===

Latest revision as of 18:40, 7 April 2015

This is a review for Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13

Introduction

Protecting health information is critical, yet the security implications of healthcare workers’ IT usage remain largely unexamined. Burns et al. surveys the IT-enabled healthcare ecosystem and its emerging mobility and security issues.[1] [1]

Healthcare in the Digital Age

Meaningful use and other healthcare regulations are causing an increased uptake of HIT in healthcare. The line between the personal, public, and corporate networks is becoming blurred.[1]

Behavioral Information Security

According to Burns et al., behavioral information security has been broadly defined as the study of human actions that influence the confidentiality, integrity, and availability of information and information systems.[1]

Evolving Issues in Mobility and Security

Bring Your Own Device (BYOD) and mHealth application ecosystem presents two important issues of security today.[1] when using healthcare applications on a mobile device verify that the app will perform only the functions that you approve of and uses websites that are trusted sources.[2]

Reviewer’s Comments

Jonzy’s Comments

I thought this article captured the current state of security in healthcare today. I recommend it for anyone in the healthcare field.

References

  1. 1.0 1.1 1.2 1.3 1.4 Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030196&isnumber=7030137
  2. Mobile Device Privacy and Security.http://www.healthit.gov/providers-professionals/how-can-you-protect-and-secure-health-information-when-using-mobile-device