The electronic security partnership of safety/security and information systems departments
Yow, J.Art.
Journal of Healthcare Protection Management: Publication of the International Association for Hospital Security 28(1): 108-111
2012
ISSN/ISBN: 0891-7930
PMID: 22423530
Accession: 056328456
The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.
PDF emailed within 1 workday: $29.90
Related References
Shahri, A.B.; Ismail, Z.; Mohanna, S. 2016: The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran Journal of Medical Systems 40(11): 241Aura, T.; Roe, M. 2006: Designing the mobile IPv6 security protocol : Network and information systems security Annales des Telecommunications 61(3-4): 332-356
Patel, A.; Kantzavelou, I. 1996: Issues of security and network security in Health Care Information Systems Studies in Health Technology and Informatics 27: 216-223
Ohara, H. 1996: From defensive security to offensive security : current status and future issues of information system security Ntt Review 8(1): 18-23
Shaw, R. 1996: Safety and security of information systems Studies in Health Technology and Informatics 27: 190-199
Bostock, R.M.; Thomas, C. 2003: The National Plant Diagnostics Network A partnership with the USDA, land grant universities and state departments of agriculture for security of crops and natural plant systems Abstracts of Papers American Chemical Society 226(1-2): AGRO 58
Barber, B.; Jensen, O.A.; Lamberts, H.; Roger-France, F.; De Schouwer, P.; Zöllner, H. 1991: The six safety first principles of health information systems: a programme of implementation. Part 1. Safety and security Studies in Health Technology and Informatics 1: 296-301
Barber, B. 2003: Security, safety and quality in Health Information Systems Studies in Health Technology and Informatics 96: 91-97
Peek-Asa, C.; Cubbin, L.; Hubbell, K. 2002: Violent events and security programs in California Emergency Departments before and after the 1993 Hospital Security Act Journal of Emergency Nursing 28(5): 420-426
Sheikhtaheri, A.; Hashemi, N.; Hashemi, N-Sadat. 2019: Performance of Hospitals in Protecting the Confidentiality and Information Security of Patients in Health Information Departments Studies in Health Technology and Informatics 260: 202-209
Chen, L.; Xie, Z.; Zhen, J.; Dong, K. 2022: The Impact of Challenge Information Security Stress on Information Security Policy Compliance: the Mediating Roles of Emotions Psychology Research and Behavior Management 15: 1177-1191
Kim, Y-Woon.; Cho, N.; Jang, H-Jung. 2018: Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals Healthcare Informatics Research 24(1): 61-68
Genserik, L.L. Reniers; Kristof Cremer; Jan Buytaert 2011: Continuously and simultaneously optimizing an organizations safety and security culture and climate: the Improvement Diamond for Excellence Achievement and Leadership in Safety & Security (IDEAL S&S) model Journal of Cleaner Production 19(11): 1239-1249
Uwizeyemungu, S.; Poba-Nzaou, P.; Cantinotti, M. 2019: European Hospitals' Transition Toward Fully Electronic-Based Systems: Do Information Technology Security and Privacy Practices Follow? Jmir Medical Informatics 7(1): E11211
Klaas, M. 2005: Security, stat! ED safety requires cooperation between departments Health Facilities Management 18(1): 22-26
Hong, K.S.; Chi, Y.P.; Chao, L.R.; Tang, J.H. 2006: An empirical study of information security policy on information security elevation in Taiwan Information Management and Computer Security 14(2-3): 104-115
Kessler, S.R.; Pindek, S.; Kleinman, G.; Andel, S.A.; Spector, P.E. 2020: Information security climate and the assessment of information security risk among healthcare employees Health Informatics Journal 26(1): 461-473
Cox, A.; Connolly, S.; Currall, J. 2001: Raising information security awareness in the academic setting : Information security Vine. very Informal Newsletter on Library Automation (123): 11-16
Weiss, P.N. 1993: Security requirements and evidentiary issues in the interchange of electronic documents: steps toward developing a security policy The John Marshall Journal of Computer and Information Law 12(3): 425-444
Wu, H.; Wang, X. 2016: ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership Plos one 11(3): E0151002