Preview

Summary of Teaching of Information Security in the "Health Care and Nursing" Postgraduate Program

Better Essays
Open Document
Open Document
1300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary of Teaching of Information Security in the "Health Care and Nursing" Postgraduate Program
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program

Authors: Tatjana Welzer, Marko Hölbl’, Ana Habjanič, Boštjan Brumen, Marjan Družovec

Introduction
The improper usage of information technology has become a big problem in the medical field. Securing information assets is a fundamental part of proper information technology usage and thus, critical towards protecting users against harms. As a result of this, many educational programs were developed to educate the medical staff and try to limit this problem.
Motivation for choosing the article
There is no doubt that information management plays an important role in all life aspects today . With great increase in communication technology there is real need to improve data and information management process. So ,I feel great interest when browsing articles about informatics and I found this article which talks about interesting and important topic that attracted me to choose it.
Summary of the article
With the extensive use of information technology now there is a great need of information security which should include fast and secure information processing, data gathering , decision support applications and data mining .To cope with that we need to have well educated staff who can deal properly with all of these considerations. In the health care field there is a clear need for nurses to learn about information technology (IT) and information security (IS). They are usually deal with huge number of information that obtained from the patients which need to be secured and safe and to achieve this they have to be trained in a proper way . So, to reach this goal a project called NICE– Nursing Informatics and Computer aided Education was established at the end of the 1990 's in which information technology (IT) and information security (IS) can be addressed and taught. The project partners came from Austria, France, Greece, Italy, and Slovenia. The team members were



References: 1-Welzer,T., Hölbl,M., Habjanič.A., Brumen,B.,and Družovec,M.,2007,in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds.Venter,H.,Eloff,M.,Labuschagne,L.,Eloff,j.,von Solms,R.,(Bosten:Springer),pp 479-484 2-Siddharth Kalla (Jun 18, 2009). Statistical Significance And Sample Size. Retrieved Mar 22, 2013 from Explorable.com: http://explorable.com/statistical-significance-sample-size 3- Al Barrak , A. Introduction To Medical Informatics [PDF document]. Retrieved from Lecture Notes Web site: http://www.ksums.net/files/3rd/Medical%20informatics/1%20st%20semester/

You May Also Find These Documents Helpful

  • Best Essays

    Govern), N. H. (2004, summer). Informatics. Vanderbilt Medicine vol. 21 num. 11, pp. 11 - 12.…

    • 2833 Words
    • 12 Pages
    Best Essays
  • Good Essays

    The medical group could face significant penalties due to security breaches of medical information. Physical safeguards should have been implemented to assure that equipment with electronic information systems that contained patient data are safe from unauthorized intrusion. Technical safeguards cover the electronic protected health information and control access to it. Advocate Medical Group has failed to ensure proper HIPAA policies and procedures were implemented in the…

    • 808 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Hrm/531 Week 1

    • 2047 Words
    • 9 Pages

    As a health care organization, it is important that the Saint John’s Hospital takes the security and privacy of its patients’ information very seriously. Patient information in the Saint John’s Hospital is electronic and managed by the information systems department. In the organization, the security and privacy of all information is the responsibility of the Information Systems (IS) Manager. As the IS Manager, based on the following information on security and privacy, a Management Plan has been developed to be used as the process for the maintenance of patient information privacy and security.…

    • 2047 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    As the nursing profession continue to evolve in a technology advanced environment, the need for informatics competency is deemed vital in order for nurses to execute their daily roles and functions effectively. It is necessary for all nurses to continue to upgrade their knowledge and skills to provide quality nursing care to all their clients. The benefits of possessing these skills allows…

    • 307 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    I totally agree with you, Natalie. As you mentioned the tremendous impact of informatics in today's health care facility, you indicated the challenges before and how we are able to overcome those hurdles with the help of technology. Definitely, informatics has secured vast aspect of health care system by improving patient care & safety, minimizing errors, privacy, confidentiality and information security. Password protection system that you mentioned above is the very accepted technique to secure the information. Every health care facility need their employee to log on before accessing client information. I agree with you that being a health care provider it is very important to earn client's trust. The way you explained in your discussion…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Prior to the Information Age, medical records were all stored in folders in secure filing cabinets at doctor’s offices, hospitals, or health departments. The information within the folders was confidential, and shared solely amongst the patient and physician. Today these files are fragmented across multiple treatment sites due to the branching out of specialty centers such as urgent care centers, magnetic resonance imaging, outpatient surgical centers, and other diagnostic centers. Today’s ability to store medical records electronically has made it possible to easily send these files from one location to another. However, the same technology which can unify the fragmented pieces of a patient’s medical record has the ability to also create a path for privacy and security breaches. This paper will examine how electronic medical records are used, how they are secured, how security is enforced, and what the consequences of security breaches are.…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Best Essays

    Wgu Nut1 Task 1

    • 4110 Words
    • 17 Pages

    The 2012 HIMSS analytics report: security of patient data [White paper ]. (2012, April). Retrieved from Kroll Cyber Security website: http://www.krollcybersecurity.com What are the benefits of electronic medical records ? (n.d.). Retrieved from http://www.medicalrecords.com/physicians/what-are-the-benefits-of-working-withemr…

    • 4110 Words
    • 17 Pages
    Best Essays
  • Better Essays

    This section is going to talk about Security and how it’s going to be involved with the overall process and what impacts it will have on the system, the cloud, and anything else the company decides to use for that matter because security will always be a big impact and should always be the first thought when trying something new or doing anything online. I will also go into detail about preventative measures, and some devices that will be helpful when setting up a secure system.…

    • 1446 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The AMA further discusses issues related confidentiality with the online functions of a computer. It is extremely important that computerized medical database should be online to the computer terminal only when authorized computer programs requiring the medical data are being used (AMA). It is also extremely important, that organizations and individuals outside the facility should not be allowed online access to a computerized data base containing identifiable data from medical records concerning patients (AMA). When a computer bureau seeks to erase records it is also important the erasure should be verified by the…

    • 565 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Iphone Keychain Faq

    • 4396 Words
    • 18 Pages

    Jens Heider, Rachid El Khayari Fraunhofer Institute for Secure Information Technology (SIT) December 5, 2012…

    • 4396 Words
    • 18 Pages
    Satisfactory Essays
  • Powerful Essays

    Sw Security

    • 3001 Words
    • 13 Pages

    Building Security In Editor: Gary McGraw, gem@cigital.com Software Security S oftware security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking’s importance, but they need some help in understanding how to tackle it. This new department GARY MCG RAW Cigital 80 aims to provide that help by exploring software security best practices. The software security field is a relatively new one. The first books and academic classes on the topic appeared in 2001, demonstrating how recently developers, architects, and computer scientists have started systematically studying how to build secure software.…

    • 3001 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Information Security

    • 1359 Words
    • 4 Pages

    One of the biggest issues in the Information Technology field these days is information security. Today almost anything can be found on the internet. Even like how to videos on how to put in a window, break-into a house, or even hack computers. The digital age has many perks but it also has many down falls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity theft and company information theft. This gives Information Technology professionals a lot to think about when they consider Information Technology.…

    • 1359 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Using technology allows for a quicker responds and for a better collaboration. The integrated databased used in hospital based allows healthcare providers have access to critical patient information from multiple providers 24 hours a day for better coordinated care. The implementation of nursing informatics reduces the risk of errors because now there are scanners that requires a nurse or a caregiver to scan a patient’s armband before administrating any type of medication. Nursing Informatics will continue to grow and it will allow for a more efficient and effective quality of care. Nursing informatics will be a great tool in minimizing documentation from nurses and other healthcare professionals to allow them to spend more time with the…

    • 297 Words
    • 2 Pages
    Good Essays