| Literature DB >> 30907732 |
Sylvestre Uwizeyemungu1, Placide Poba-Nzaou2, Michael Cantinotti3.
Abstract
BACKGROUND: Traditionally, health information has been mainly kept in paper-based records. This has deeply changed throughout approximately the last three decades with the widespread use of multiple health information technologies. The digitization of health care systems contributes to improving health care delivery. However, it also exposes health records to security and privacy breaches inherently related to information technology (IT). Thus, health care organizations willing to leverage IT for improved health care delivery need to put in place IT security and privacy measures consistent with their use of IT resources.Entities:
Keywords: data security; electronic health records; health information technology; health services; patient data privacy
Year: 2019 PMID: 30907732 PMCID: PMC6452275 DOI: 10.2196/11211
Source DB: PubMed Journal: JMIR Med Inform
Characteristics of sampled versus nonsampled hospitals.
| Variable and characteristics | % of nonsampled (n=variable), n (%) | % of sampled (n=variable), n (%) | Chi-square ( | ||
| 0.2 (2) | .91 | ||||
| Public | 20 (71) | 1188 (70.38) | |||
| Private | 5 (18) | 335 (19.85) | |||
| Not for Profit | 3 (11) | 165 (9.77) | |||
| 1.3 (1) | .42 | ||||
| Yes | 2 (7) | 238 (13.81) | |||
| No | 28 (93) | 1485 (86.19) | |||
| 1.7 (4) | .77 | ||||
| Independent/One site | 14 (47) | 710 (41.21) | |||
| Independent/Multiple sites | 9 (30) | 542 (31.46) | |||
| Part of a group of hospitals | 4 (13) | 341 (19.79) | |||
| Part of a group of care institutions | 2 (7) | 78 (4.53) | |||
| Other | 1 (3) | 52 (3.02) | |||
| 7.4 (3) | .05 | ||||
| <101 | 11 (44) | 363 (23.15) | |||
| 101 to 250 | 8 (32) | 494 (31.51) | |||
| 251 to 750 | 6 (24) | 544 (34.69) | |||
| >750 | 0 (0) | 167 (10.65) | |||
| 1.6 (3) | .62 | ||||
| <1% | 10 (53) | 486 (38.57) | |||
| 1% to 3% | 7 (37) | 600 (47.62) | |||
| 3.1% to 5% | 2 (11) | 122 (9.68) | |||
| >5% | 0 (0) | 52 (4.13) | |||
| National | 11 (48) | 997 (59.88) | 1.4 (1) | .29 | |
| Regional | 3 (13) | 475 (28.53) | 2.7 (1) | .16 | |
| Hospital | 13 (57) | 1159 (69.61) | 1.8 (1) | .18 | |
aIT: information technology.
Security and privacy practices measures.
| Variable | Measure (Yes or no) | |
| Stored data | Encryption of stored data | |
| Transmitted data | Encryption of transmitted data | |
| Access control | Workstations with access only through health professional cards or codes | |
| Integrity | Is data entry in the hospital’s IT system certified with digital signature? | |
| Availability | Is your IT team able to immediately restore critical clinical information system operations if a disaster causes the complete loss of data at your hospital’s primary data center? | |
aIT: information technology.
Information technology security index level statistics.
| ITa security index level | n (%) | Cumulative % |
| 0.00 | 225 (13.06) | 13.06 |
| 0.33 | 186 (10.80) | 23.86 |
| 0.67 | 104 (6.04) | 29.90 |
| 1.00 | 269 (15.61) | 45.51 |
| 1.33 | 287 (16.66) | 62.17 |
| 1.67 | 276 (16.02) | 78.19 |
| 2.00 | 95 (5.51) | 83.70 |
| 2.33 | 101 (5.86) | 89.56 |
| 2.67 | 130 (7.54) | 97.10 |
| 3.00 | 50 (2.90) | 100.00 |
| Total | 1723 (100.00) | —b |
aIT: information technology.
bNot applicable.
Figure 1Transition level toward electronic-based system versus information technology security index-1.
Figure 2Transition level toward electronic-based system versus information technology security index-2. IT: information technology.
Regression analyses (dependent variable: information technology security level).
| Model | R | R2 | Adjusted R2 | Delta R2 | ||
| 1a | .294 | .086 | .078 | .086 | 10.052 (16) | <.001 |
| 2b | .346 | .120 | .111 | .034 | 65.116 (1) | <.001 |
| 3c | .346 | .120 | .111 | .000 | 0.104 (1) | .75 |
| 4d | .348 | .121 | .111 | .001 | 1.911 (1) | .17 |
aModel 1 predictors: contextual variables (see Table 1).
bModel 2 predictors: contextual variables+ transition level toward electronic system.
cModel 3 predictors: contextual variables+(transition level toward electronic system)2.
dModel 4 predictors: contextual variables+(transition level toward electronic system)3.
Health information technology security patterns from cluster analysis. Within rows, different superscripts (*, †, and ‡) indicate significant (P<.05) pair-wise differences between means on Tamhane’s T2 (post hoc) test.
| Variable (grand mean) | Cluster | Analysis of variance | ||||
| 1, n (%)=513 (29.77) | 2, n (%)=533 (30.93) | 3, n (%)=677 (39.29) | ||||
| Stored data (0.37) | 0.53* | 0.47* | 0.18† | 106.6 (2) | <.001 | |
| Transmitted data (0.59) | 0.93† | 1.00* | 0.00‡ | 9614.0 (2) | <.001 | |
| Access control (0.18) | 0.48* | 0.00‡ | 0.10† | 303.9 (2) | <.001 | |
| Integrity (0.31) | 0.78* | 0.00‡ | 0.20† | 763.7 (2) | <.001 | |
| Availability (0.57) | 0.58 | 0.59 | 0.54 | 1.7 (2) | .18 | |
Figure 3Implementation levels of information technology security practices in hospitals by cluster.
Figure 4Health information technology security index across clusters. IT: information technology.
Transition toward an electronic-based system and health information technology security patterns.
| Transition level | Number of hospitals | ||||||||||
| Cluster 1, n (%)=513 (29.77) | Cluster 2, n (%)=533 (30.93) | Cluster 3, n (%)=677 (39.29) | Chi-square ( | ||||||||
| Oa | Eb | Rc | O | E | R | O | E | R | |||
| Paper-dominant, n (%)=214 (12.42) | 45 | 63.7 | −18.7 | 60 | 66.2 | −6.2 | 109 | 84.1 | 24.9 | 13.4 | .001 |
| Hybrid, n (%)=1056 (61.28) | 302 | 314.4 | −12.4 | 329 | 326.7 | 2.3 | 425 | 414.9 | 10.1 | 0.8 | .69 |
| Electronic-dominant, n (%)=453 (26.29) | 166 | 134.9 | 31.1 | 144 | 140.1 | 3.9 | 143 | 178 | −35.0 | 14.2 | .001 |
aO: observed.
bE: expected.
cR: residual.