Securing Health Information

From Clinfowiki
Jump to: navigation, search

This is a review for Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13

Introduction

Protecting health information is critical, yet the security implications of healthcare workers’ IT usage remain largely unexamined. Burns et al. surveys the IT-enabled healthcare ecosystem and its emerging mobility and security issues.[1] [1]

Healthcare in the Digital Age

Meaningful use and other healthcare regulations are causing an increased uptake of HIT in healthcare. The line between the personal, public, and corporate networks is becoming blurred.[1]

Behavioral Information Security

According to Burns et al., behavioral information security has been broadly defined as the study of human actions that influence the confidentiality, integrity, and availability of information and information systems.[1]

Evolving Issues in Mobility and Security

Bring Your Own Device (BYOD) and mHealth application ecosystem presents two important issues of security today.[1] when using healthcare applications on a mobile device verify that the app will perform only the functions that you approve of and uses websites that are trusted sources.[2]

Reviewer’s Comments

Jonzy’s Comments

I thought this article captured the current state of security in healthcare today. I recommend it for anyone in the healthcare field.

References

  1. 1.0 1.1 1.2 1.3 1.4 Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030196&isnumber=7030137
  2. Mobile Device Privacy and Security.http://www.healthit.gov/providers-professionals/how-can-you-protect-and-secure-health-information-when-using-mobile-device