Comprehensive Competency Assessment: EHR Security and Privacy

Verified

Added on  2022/08/21

|4
|805
|20
Discussion Board Post
AI Summary
This discussion post focuses on the critical aspects of Electronic Health Record (EHR) security and privacy, particularly within the context of a Health Information Manager's responsibilities. The student, working as a Health Information Manager, discusses the vital role of EHRs in providing better patient care and supporting healthcare providers through efficient data storage and retrieval. The post highlights the importance of the Health Insurance Portability and Accountability Act (HIPAA) in setting security standards for data management, including both office-based and cloud-based EHR systems. The student's experience with EHR software development, system integration, and patient portals informs the discussion, emphasizing the challenges and considerations involved in maintaining patient data privacy and security, especially when retrieving and transferring health information across different systems. The author also expresses a desire to learn more about the topic through further research, indicating a commitment to continuous improvement in this critical area of healthcare management.
Document Page
Running head: COMPREHENSIVE COMPETENCY ASSESSMENT
COMPREHENSIVE COMPETENCY ASSESSMENT
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
COMPREHENSIVE COMPETENCY ASSESSMENT
REFERENCES:
AbuKhousa, E., Mohamed, N., & Al-Jaroodi, J. (2012). e-Health cloud: opportunities and
challenges. Future internet, 4(3), 621-645.
Appari, A., & Johnson, M. E. (2010). Information security and privacy in healthcare: current
state of research. International journal of Internet and enterprise management, 6(4), 279-
314.
Boulos, M. N. K., Brewer, A. C., Karimkhani, C., Buller, D. B., & Dellavalle, R. P. (2014).
Mobile medical and health apps: state of the art, concerns, regulatory control and
certification. Online journal of public health informatics, 5(3), 229.
Chen, Y. Y., Lu, J. C., & Jan, J. K. (2012). A secure EHR system based on hybrid
clouds. Journal of medical systems, 36(5), 3375-3384.
Dagher, G. G., Mohler, J., Milojkovic, M., & Marella, P. B. (2018). Ancile: Privacy-preserving
framework for access control and interoperability of electronic health records using
blockchain technology. Sustainable cities and society, 39, 283-297.
Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and
privacy in electronic health records: A systematic literature review. Journal of
biomedical informatics, 46(3), 541-562.
Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., ... &
Steinhubl, S. R. (2016). Privacy and security in the era of digital health: what should
Document Page
2
COMPREHENSIVE COMPETENCY ASSESSMENT
translational researchers know and do about it?. American journal of translational
research, 8(3), 1560.A
Gavrilov, G., & Trajkovik, V. (2012). Security and privacy issues and requirements for
healthcare cloud computing. ICT Innovations, 143-152.
Guadarrama, A. (2017). Mind the Gap: Addressing Gaps in HIPAA Coverage in the Mobile
Health Apps Industry. Hous. L. Rev., 55, 999.
Helm, A. M., & Georgatos, D. (2014). Privacy and mHealth: How mobile health apps fit into a
privacy framework not limited to HIPAA. Syracuse L. Rev., 64, 131.
Hoffman, S., & Podgurski, A. (2007). In sickness, health, and cyberspace: protecting the security
of electronic private health information. BCL Rev., 48, 331.
Holden, R. J., Karanam, Y. L., Cavalcanti, L. H., Parmar, T., Kodthala, P., Fowler, N. R., &
Bateman, D. R. (2018). Health information management practices in informal caregiving:
An artifacts analysis and implications for IT design. International journal of medical
informatics, 120, 31-41.
Martínez-Pérez, B., De La Torre-Díez, I., & López-Coronado, M. (2015). Privacy and security in
mobile health apps: a review and recommendations. Journal of medical systems, 39(1),
181.
Pussewalage, H. S. G., & Oleshchuk, V. A. (2016). Privacy preserving mechanisms for enforcing
security and privacy requirements in E-health solutions. International Journal of
Information Management, 36(6), 1161-1173.
Document Page
3
COMPREHENSIVE COMPETENCY ASSESSMENT
Rodrigues, J. J., de la Torre, I., Fernández, G., & López-Coronado, M. (2013). Analysis of the
security and privacy requirements of cloud-based electronic health records
systems. Journal of medical Internet research, 15(8), e186.
Schnall, R., Higgins, T., Brown, W., Carballo-Dieguez, A., & Bakken, S. (2015). Trust,
perceived risk, perceived ease of use and perceived usefulness as factors related to
mHealth technology use. Studies in health technology and informatics, 216, 467
Wang, C. J., & Huang, D. J. (2013). The HIPAA conundrum in the era of mobile health and
communications. JAMA, 310(11), 1121-1122.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]