Literature DB >> 22955497

Security practices and regulatory compliance in the healthcare industry.

Juhee Kwon1, M Eric Johnson.   

Abstract

OBJECTIVE: Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance.
DESIGN: We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. MEASUREMENT: We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security.
RESULTS: Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices).
CONCLUSIONS: Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.

Entities:  

Mesh:

Year:  2012        PMID: 22955497      PMCID: PMC3555315          DOI: 10.1136/amiajnl-2012-000906

Source DB:  PubMed          Journal:  J Am Med Inform Assoc        ISSN: 1067-5027            Impact factor:   4.497


  3 in total

1.  The challenges in making electronic health records accessible to patients.

Authors:  Leslie Beard; Rebecca Schein; Dante Morra; Kumanan Wilson; Jennifer Keelan
Journal:  J Am Med Inform Assoc       Date:  2011-11-25       Impact factor: 4.497

2.  Strategies for maintaining patient privacy in i2b2.

Authors:  Shawn N Murphy; Vivian Gainer; Michael Mendis; Susanne Churchill; Isaac Kohane
Journal:  J Am Med Inform Assoc       Date:  2011-10-07       Impact factor: 4.497

3.  Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

Authors:  Jeff Collmann; Ted Cooper
Journal:  J Am Med Inform Assoc       Date:  2007-01-09       Impact factor: 4.497

  3 in total
  11 in total

1.  Biomedical data privacy: problems, perspectives, and recent advances.

Authors:  Bradley A Malin; Khaled El Emam; Christine M O'Keefe
Journal:  J Am Med Inform Assoc       Date:  2012-12-06       Impact factor: 4.497

2.  Patterns of health information exchange strategies underlying health information technologies capabilities building.

Authors:  Placide Poba-Nzaou; Sylvestre Uwizeyemungu; Mamadou Dakouo; Anicet Tchibozo; Bocar Mboup
Journal:  Health Syst (Basingstoke)       Date:  2021-07-16

3.  Privacy and Security in Multi-User Health Kiosks.

Authors:  Harold Takyi; Valerie Watzlaf; Judith Tabolt Matthews; Leming Zhou; Dilhari Dealmeida
Journal:  Int J Telerehabil       Date:  2017-06-29

4.  Orchestrating differential data access for translational research: a pilot implementation.

Authors:  Marco Brandizi; Olga Melnichuk; Raffael Bild; Florian Kohlmayer; Benedicto Rodriguez-Castro; Helmut Spengler; Klaus A Kuhn; Wolfgang Kuchinke; Christian Ohmann; Timo Mustonen; Mikael Linden; Tommi Nyrönen; Ilkka Lappalainen; Alvis Brazma; Ugis Sarkans
Journal:  BMC Med Inform Decis Mak       Date:  2017-03-23       Impact factor: 2.796

5.  Adoption and Performance of Complementary Clinical Information Technologies: Analysis of a Survey of General Practitioners.

Authors:  Placide Poba-Nzaou; Sylvestre Uwizeyemungu; Xuecheng Liu
Journal:  J Med Internet Res       Date:  2020-07-23       Impact factor: 5.428

6.  The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.

Authors:  Salem T Argaw; Nefti-Eboni Bempong; Bruce Eshaya-Chauvin; Antoine Flahault
Journal:  BMC Med Inform Decis Mak       Date:  2019-01-11       Impact factor: 2.796

7.  Fulfilling Ethical Responsibility: Moving Beyond the Minimal Standards of Protecting Human Subjects from Research Harm.

Authors:  James R Hébert; William A Satariano; Daniela B Friedman; Cheryl A Armstead; Allen Greiner; Tisha M Felder; Thomas A Coggins; Sora Tanjasiri; Kathryn L Braun
Journal:  Prog Community Health Partnersh       Date:  2015

8.  Privacy and security of patient data in the pathology laboratory.

Authors:  Ioan C Cucoranu; Anil V Parwani; Andrew J West; Gonzalo Romero-Lauro; Kevin Nauman; Alexis B Carter; Ulysses J Balis; Mark J Tuthill; Liron Pantanowitz
Journal:  J Pathol Inform       Date:  2013-03-14

Review 9.  Proposal for a security management in cloud computing for health care.

Authors:  Knut Haufe; Srdan Dzombeta; Knud Brandis
Journal:  ScientificWorldJournal       Date:  2014-02-19

10.  Health Information Security in Hospitals: the Application of Security Safeguards.

Authors:  Esmaeil Mehraeen; Haleh Ayatollahi; Maryam Ahmadi
Journal:  Acta Inform Med       Date:  2016-02-02
View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.