Practice-Based Discourse Analysis of Information Security Policy in Health Care
نویسندگان
چکیده
Information security is an understudied area within electronic government. In this study, we examine the quality of information security policy design in health care. Employees cause a majority of the security breaches in health care, and many of them are unintentional. In order to support the formulation of practical, from the employees’ perspective, information security policies, we propose eight tentative quality criteria. These criteria were developed using practice-based discourse analysis on three information security policy documents from a health care organisation.
منابع مشابه
New 2016 MeSH Addressing Information Gap, Poverty, Violence and Danger of Medicine Set the Tone for Policy-Makers in Patient Care
متن کامل
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملSoft Systems Methodology for Implementing Clinical Practice Guidelines in A General Hospital: A study protocol
Background: It is notoriously challenging to implement evidence-based care and to update and improve health care policy. Adhering to evidence-based Clinical Practice Guidelines (CPGs) serves as the driving force behind making decisions based on the best evidence and making efforts for improving the quality of patient care and outcomes. Despite requiring Iranian hospitals to implement CPGs in Ja...
متن کاملSecurity Practices and Regulatory Compliance in the Healthcare Industry
OBJECTIVE Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. DESIGN We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کامل