SlideShare a Scribd company logo
Noah Pearson
 Health information system security lacks
management framework when incorporating
procedures, standards, and practices for
organizations that utilize information systems
on a daily bases
 Leadership Strategy
 Strategy Guidelines
 Government Compliance
 Ensuring Compliance
 Threats
 Measuring Employee Awareness Research
 IT Security Implantation Research
 Build strong security culture
 Emphasis patient privacy and rights
 Disseminate information
“The information security process starts with
leadership supporting the security strategies
proposed by the information security
department and then having the strategies
introduced to the health care organization's
staff-level employees”.
 Organizations vision, mission, objectives are
clearly understood
 Incorporate IT steering committee
 Include personal who operate information
technology systems (IT) systems
 Develop procedures
 Identify weaknesses
 Education-training
HITECH HIPAA
 Health Information
Technology for
Economic and
Clinical Health
(HITECH) Act
 Health Insurance
Portability and
Accountability
(HIPPA) Act
Ensuring Compliance
Internal audits
Education
Training
Instill policy
Checklists
Data Flow Diagrams
(DFDs)
According to Narayana et al (2010) the top five
critical threats to HISs include:
 Power failure/loss
 Acts of human error of failure
 Technological obsolesce
 Hardware failures and errors
 Software errors and failures
 Purpose-Measure threat awareness levels of employees who work and operate computer
systems on a daily bases
 Design -Two part questionnaire vocabulary test
 Findings-Utilizing a vocabulary test as a measuring tool for threat awareness proved vital to
the gathering and collecting of employee threat awareness levels, in turn, managers could
know build specific training criteria geared more towards employees specific needs.
 Purpose-examine the relationship between information security strategy and organization
performance, with organizational capabilities as important factors influencing successful
implementation of information security strategy and organization performance
 Design-Based on existing literature in strategic management and information security, a
theoretical model was proposed and validated
 Findings-Evidence suggests that organizational capabilities, encompassing the ability to
develop high-quality situational awareness of the current and future threat environment, the
ability to possess appropriate means, and the ability to orchestrate the means to respond to
information security threats, are positively associated with effective implementation of
information security strategy, which in turn positively affects organization performance.
)
 IT security management systems must be
unique to meet the needs of the ever evolving
cyber criminal. Mangers must instill, broaden,
and educate employees on the paramount
obligations they hold when dealing with
patient’s data. Security implementation must
encompass an offensive framework that takes
an proactive approach at identifying and
neutralizing threats
Cooper, T. (2008). Organizational repertoires and rites in health information security.
Cambridge Quarterly of Healthcare Ethics, 1(1), 441-452.
Kruger, H., Drevin, L., & Steyn, T. (2010). A vocabulary test to assess information security
awareness. Information Management & Computer Security, 18(5), 316-327. doi:
http://dx.doi.org/10.1108/09685221011095236
Ma, Q., Johnston, A. C., & Pearson, J. M. (2008). Information security management objectives
and practices: A parsimonious framework. Information Management & Computer Security,
16(3), 251-270. doi: http://dx.doi.org/10.1108/09685220810893207
Narayana Samy, G., Ahmad, R., & Ismail, Z. (2010). Security threats categories in healthcare
information systems. Health Informatics Journal, 16(3), 201-209. doi:
http://dx.doi.org/10.1605/01.301-0012163897.2010

More Related Content

What's hot

Rauch Transatlantic Connections Med humanities Handout
Rauch  Transatlantic Connections Med humanities HandoutRauch  Transatlantic Connections Med humanities Handout
Rauch Transatlantic Connections Med humanities Handout
Susan Rauch, PhD
 
Design & Managing HIS
Design & Managing HISDesign & Managing HIS
Design & Managing HIS
Phil Nonyane-Ingram
 
Patient Record System
Patient Record SystemPatient Record System
Patient Record System
Jocelyn Garcia
 
HealthCare Information Security Program Guidelines
HealthCare Information Security Program GuidelinesHealthCare Information Security Program Guidelines
HealthCare Information Security Program Guidelines
Seema Mozaffar
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
Tammy Clark
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Jacqueline Fick
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
Tammy Clark
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
Hta & Hit Evaluation
Hta & Hit EvaluationHta & Hit Evaluation
Hta & Hit Evaluation
Alberta Health Services
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
DaneWarren
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
Maganathin Veeraragaloo
 
Dept. of defense driving toward 0
Dept. of defense   driving toward 0Dept. of defense   driving toward 0
Dept. of defense driving toward 0
Vaibhav Patni
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
Timir Shah
 

What's hot (13)

Rauch Transatlantic Connections Med humanities Handout
Rauch  Transatlantic Connections Med humanities HandoutRauch  Transatlantic Connections Med humanities Handout
Rauch Transatlantic Connections Med humanities Handout
 
Design & Managing HIS
Design & Managing HISDesign & Managing HIS
Design & Managing HIS
 
Patient Record System
Patient Record SystemPatient Record System
Patient Record System
 
HealthCare Information Security Program Guidelines
HealthCare Information Security Program GuidelinesHealthCare Information Security Program Guidelines
HealthCare Information Security Program Guidelines
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Hta & Hit Evaluation
Hta & Hit EvaluationHta & Hit Evaluation
Hta & Hit Evaluation
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Dept. of defense driving toward 0
Dept. of defense   driving toward 0Dept. of defense   driving toward 0
Dept. of defense driving toward 0
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
 

Similar to Health Information System Security_v2

Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
wacasr
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
Dam Frank
 
MITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s NaMITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s Na
EvonCanales257
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
ijtsrd
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Angie Miller
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
AISHA232980
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
ashley2k
 
BME 307 - HMIS - Data Management Systems 24112021 Final.pdf
BME 307 - HMIS - Data Management Systems 24112021 Final.pdfBME 307 - HMIS - Data Management Systems 24112021 Final.pdf
BME 307 - HMIS - Data Management Systems 24112021 Final.pdf
edwardlowassa1
 
Assignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docxAssignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docx
salmonpybus
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
SusanaFurman449
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Diana Fernandez
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
IJCNCJournal
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
IJCNCJournal
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
toltonkendal
 
Research health data stewardship and in your post show why it is imp.pdf
Research health data stewardship and in your post show why it is imp.pdfResearch health data stewardship and in your post show why it is imp.pdf
Research health data stewardship and in your post show why it is imp.pdf
bharatchawla141
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
damilolasunmola
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
priyanshamadhwal2
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]
romill0700
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
susanschei
 

Similar to Health Information System Security_v2 (20)

Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
MITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s NaMITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s Na
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
BME 307 - HMIS - Data Management Systems 24112021 Final.pdf
BME 307 - HMIS - Data Management Systems 24112021 Final.pdfBME 307 - HMIS - Data Management Systems 24112021 Final.pdf
BME 307 - HMIS - Data Management Systems 24112021 Final.pdf
 
Assignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docxAssignment 2 Complementary Partners Imagine you are working wit.docx
Assignment 2 Complementary Partners Imagine you are working wit.docx
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Research health data stewardship and in your post show why it is imp.pdf
Research health data stewardship and in your post show why it is imp.pdfResearch health data stewardship and in your post show why it is imp.pdf
Research health data stewardship and in your post show why it is imp.pdf
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
 

Health Information System Security_v2

  • 2.  Health information system security lacks management framework when incorporating procedures, standards, and practices for organizations that utilize information systems on a daily bases
  • 3.  Leadership Strategy  Strategy Guidelines  Government Compliance  Ensuring Compliance  Threats  Measuring Employee Awareness Research  IT Security Implantation Research
  • 4.  Build strong security culture  Emphasis patient privacy and rights  Disseminate information “The information security process starts with leadership supporting the security strategies proposed by the information security department and then having the strategies introduced to the health care organization's staff-level employees”.
  • 5.  Organizations vision, mission, objectives are clearly understood  Incorporate IT steering committee  Include personal who operate information technology systems (IT) systems  Develop procedures  Identify weaknesses  Education-training
  • 6. HITECH HIPAA  Health Information Technology for Economic and Clinical Health (HITECH) Act  Health Insurance Portability and Accountability (HIPPA) Act
  • 7. Ensuring Compliance Internal audits Education Training Instill policy Checklists Data Flow Diagrams (DFDs)
  • 8. According to Narayana et al (2010) the top five critical threats to HISs include:  Power failure/loss  Acts of human error of failure  Technological obsolesce  Hardware failures and errors  Software errors and failures
  • 9.  Purpose-Measure threat awareness levels of employees who work and operate computer systems on a daily bases  Design -Two part questionnaire vocabulary test  Findings-Utilizing a vocabulary test as a measuring tool for threat awareness proved vital to the gathering and collecting of employee threat awareness levels, in turn, managers could know build specific training criteria geared more towards employees specific needs.
  • 10.  Purpose-examine the relationship between information security strategy and organization performance, with organizational capabilities as important factors influencing successful implementation of information security strategy and organization performance  Design-Based on existing literature in strategic management and information security, a theoretical model was proposed and validated  Findings-Evidence suggests that organizational capabilities, encompassing the ability to develop high-quality situational awareness of the current and future threat environment, the ability to possess appropriate means, and the ability to orchestrate the means to respond to information security threats, are positively associated with effective implementation of information security strategy, which in turn positively affects organization performance. )
  • 11.  IT security management systems must be unique to meet the needs of the ever evolving cyber criminal. Mangers must instill, broaden, and educate employees on the paramount obligations they hold when dealing with patient’s data. Security implementation must encompass an offensive framework that takes an proactive approach at identifying and neutralizing threats
  • 12. Cooper, T. (2008). Organizational repertoires and rites in health information security. Cambridge Quarterly of Healthcare Ethics, 1(1), 441-452. Kruger, H., Drevin, L., & Steyn, T. (2010). A vocabulary test to assess information security awareness. Information Management & Computer Security, 18(5), 316-327. doi: http://dx.doi.org/10.1108/09685221011095236 Ma, Q., Johnston, A. C., & Pearson, J. M. (2008). Information security management objectives and practices: A parsimonious framework. Information Management & Computer Security, 16(3), 251-270. doi: http://dx.doi.org/10.1108/09685220810893207 Narayana Samy, G., Ahmad, R., & Ismail, Z. (2010). Security threats categories in healthcare information systems. Health Informatics Journal, 16(3), 201-209. doi: http://dx.doi.org/10.1605/01.301-0012163897.2010