This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations of HIPAA involving vulne...
Agile project management is most often examined in relation to software development, while informati...
Across the United States, the question of patient privacy and security issues continue to present ch...
The HIPAA Security Rule is far less familiar to the public than the HIPAA Privacy Rule, but it is eq...
The healthcare system in the United States has a sophisticated and an industry-unique set of legal r...
Increasingly there are security breaches in U.S. Healthcare organizations that result in billions of...
Abstract — Hemorrhages of confidential patient health data create privacy and security concerns. Whi...
The health care industry is one of the most vital areas of critical infrastructure in the United Sta...
As part of INFO I499 Readings and Research in Informatics. Faculty advisor: Sara Anne Hook.In the ...
Healthcare informatics affirm that healthcare presents most problems of user control with disparate,...
While decision analysis and treatment protocols have begun to move from health insurance companies i...
Providing security to Health Information is considered to be the topmost priority when compared to a...
Each day the health care sector is subjected to an onslaught of thousands of ransomware virus attack...
The electronic processing of health information provides considerable benefits to patients and healt...
The increased use of health information technology (health IT) is a common element of nearly every h...
Both patients and health care providers have much to gain from the electronic processing of health d...
Agile project management is most often examined in relation to software development, while informati...
Across the United States, the question of patient privacy and security issues continue to present ch...
The HIPAA Security Rule is far less familiar to the public than the HIPAA Privacy Rule, but it is eq...
The healthcare system in the United States has a sophisticated and an industry-unique set of legal r...
Increasingly there are security breaches in U.S. Healthcare organizations that result in billions of...
Abstract — Hemorrhages of confidential patient health data create privacy and security concerns. Whi...
The health care industry is one of the most vital areas of critical infrastructure in the United Sta...
As part of INFO I499 Readings and Research in Informatics. Faculty advisor: Sara Anne Hook.In the ...
Healthcare informatics affirm that healthcare presents most problems of user control with disparate,...
While decision analysis and treatment protocols have begun to move from health insurance companies i...
Providing security to Health Information is considered to be the topmost priority when compared to a...
Each day the health care sector is subjected to an onslaught of thousands of ransomware virus attack...
The electronic processing of health information provides considerable benefits to patients and healt...
The increased use of health information technology (health IT) is a common element of nearly every h...
Both patients and health care providers have much to gain from the electronic processing of health d...
Agile project management is most often examined in relation to software development, while informati...
Across the United States, the question of patient privacy and security issues continue to present ch...
The HIPAA Security Rule is far less familiar to the public than the HIPAA Privacy Rule, but it is eq...