Risk

Shared Electronic Health Records: A Changing Landscape for Security in Medical Practice

ABSTRACT

The advances in networking and communications have created a landscape of change for information security in medical practice with the use of electronic health records. Whilst the benefits of improved quality are accepted, the ethical, logistical and security demands have increased. To resolve the problems faced, mapping how medical practice has to adapt to the shifting nature of security in this environment is necessary. The solutions are far from uncomplicated and include education, information governance and policy. Despite the benefits, the success of nationally shared electronic health records requires demonstration of security assurance and recognition medical practice will need assistance to adapt. 

I Want My Smartphone. I Want It Now. And I Want to Connect to Everything from Anywhere… Now!

ABSTRACT

Even the classified enterprise is going mobile. Trolls and Luddites cannot prevent it. But the bridge to be crossed to mobility nirvana (a secure, cheap, and user-beloved system) is still rickety with many places where one can fall into the chasm of lost data. The forces of malware, user sloth, shoddy component design, and poor system architecture are arrayed against safe passage. But one is not alone. Assisting the crossing are a number of laws requiring privacy and security measures, government programs that induce superior products, policies written for both public and private sector enterprises, standards bodies, and, most of all customers demanding security from vendors. This paper will look at the mobility mission, the threat to mobile, the secure enterprise architectures using defense in depth, the state of security in system components and how that is being improved through a number of efforts, and the impact of new technology.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com