Difference between revisions of "Securing Health Information"
(Created page with "This is a review for Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13 == Introdu...") |
|||
Line 2: | Line 2: | ||
== Introduction == | == Introduction == | ||
− | <ref name="Burns et al., 2015"> Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13 | + | Protecting health information is critical, yet the security implications of healthcare workers’ IT usage remain largely unexamined. Burns et al. surveys the IT-enabled healthcare ecosystem and its emerging mobility and security issues.<ref name="Burns et al., 2015"> Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13 |
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030196&isnumber=7030137</ref> | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7030196&isnumber=7030137</ref> | ||
<ref name="Burns et al., 2015"></ref> | <ref name="Burns et al., 2015"></ref> | ||
== Healthcare in the Digital Age== | == Healthcare in the Digital Age== | ||
− | <ref name="Burns et al., 2015"></ref> | + | [[Meaningful use]] and other healthcare regulations are causing an increased uptake of HIT in healthcare. The line between the personal, public, and corporate networks is becoming blurred.<ref name="Burns et al., 2015"></ref> |
− | == Behavioral Information Security== | + | == Behavioral Information [[Security]]== |
− | <ref name="Burns et al., 2015"></ref> | + | According to Burns et al., behavioral information security has been broadly defined as the study of human actions that influence the confidentiality, integrity, and availability of information and information systems.<ref name="Burns et al., 2015"></ref> |
== Evolving Issues in Mobility and Security== | == Evolving Issues in Mobility and Security== | ||
− | <ref name="Burns et al., 2015"></ref> | + | Byod, Bring your own device and Health Information economy of information present two important issues of security today.<ref name="Burns et al., 2015"></ref> |
==Reviewer’s Comments== | ==Reviewer’s Comments== | ||
=== Jonzy’s Comments === | === Jonzy’s Comments === | ||
− | + | I thought this article captured the current state of security in healthcare today. I recommend it for anyone in the healthcare field. | |
== References == | == References == | ||
<references/> | <references/> | ||
+ | |||
+ | |||
+ | [[Category:Security]] | ||
+ | [[Category:Reviews]] |
Revision as of 20:45, 4 April 2015
This is a review for Burns, A.J.; Johnson, M.E., "Securing Health Information," IT Professional , vol.17, no.1, pp.23,29, Jan.-Feb. 2015. doi: 10.1109/MITP.2015.13
Contents
Introduction
Protecting health information is critical, yet the security implications of healthcare workers’ IT usage remain largely unexamined. Burns et al. surveys the IT-enabled healthcare ecosystem and its emerging mobility and security issues.[1] [1]
Healthcare in the Digital Age
Meaningful use and other healthcare regulations are causing an increased uptake of HIT in healthcare. The line between the personal, public, and corporate networks is becoming blurred.[1]
Behavioral Information Security
According to Burns et al., behavioral information security has been broadly defined as the study of human actions that influence the confidentiality, integrity, and availability of information and information systems.[1]
Evolving Issues in Mobility and Security
Byod, Bring your own device and Health Information economy of information present two important issues of security today.[1]
Reviewer’s Comments
Jonzy’s Comments
I thought this article captured the current state of security in healthcare today. I recommend it for anyone in the healthcare field.