2013
DOI: 10.2345/0899-8205-47.3.202
|View full text |Cite
|
Sign up to set email alerts
|

Technology Risk Assessment In Healthcare Facilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The exchange process of health information has a set specification provided by the meaningful use criteria, which requires the exchange process to be recorded by the organizations when the encryptions are being enabled or inhibited [14, 23]. The Health Insurance Portability and Accountability Act (HIPAA) designed a method for the use of cryptography to ensure security [16]. HIPAA expanded its security and privacy standards when the US Department of Health and Human Services (DHHS) created the Final Rule in 2003 [20].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The exchange process of health information has a set specification provided by the meaningful use criteria, which requires the exchange process to be recorded by the organizations when the encryptions are being enabled or inhibited [14, 23]. The Health Insurance Portability and Accountability Act (HIPAA) designed a method for the use of cryptography to ensure security [16]. HIPAA expanded its security and privacy standards when the US Department of Health and Human Services (DHHS) created the Final Rule in 2003 [20].…”
Section: Resultsmentioning
confidence: 99%
“…The ISO/IEC 80001 was created to improve safety, effectiveness, and data system security, in turn recognizing a 10-step process of basic risk management, the initial five specifically outlining risk assessment. These five steps are to: identify initial hazards, identify cause and effect situations from these hazards, estimate the potential harm, estimate the probability of harm, and then evaluate overall risk [16]. As modern technology advances, healthcare organizations are going to continue to be targeted for security breaches.…”
Section: Resultsmentioning
confidence: 99%
“…There is an increase in the use of devices that are attached to medical IT networks, including medical devices and wireless mobile technologies (Cooper & Fuchs, 2013). While all medical devices require jurisdictional approval, for instance, the US has the Federal Drug Administrations (FDA) and Australia has the Therapeutic Goods Administration (TGA), they are rarely tested from a cybersecurity systematic perspective upon integration into a medical IT network.…”
Section: Introductionmentioning
confidence: 99%
“…However, HDOs face challenges when implementing the requirements of this standard . These challenges include the following: HDOs vary in size and in terms of the capability of their risk management processes HDOs provide care in different regulatory environments meaning that the implementation of the requirements of the standard will vary depending on the regulation of the region in which the HDO provides care. Effective performance of risk management activities requires interaction between different stakeholder groups to understand the context of the HDO and manage identified risks accordingly . HDOs may be unprepared for the organisational changes that are required to facilitate this level of interaction among stakeholders who typically operate in silos . …”
Section: Introductionmentioning
confidence: 99%