Cargando…

Managing the Security of Nursing Data in the Electronic Health Record

BACKGROUND: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the...

Descripción completa

Detalles Bibliográficos
Autores principales: Samadbeik, Mahnaz, Gorzin, Zahra, Khoshkam, Masomeh, Roudbari, Masoud
Formato: Online Artículo Texto
Lenguaje:English
Publicado: AVICENA, d.o.o., Sarajevo 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4384867/
https://www.ncbi.nlm.nih.gov/pubmed/25870490
http://dx.doi.org/10.5455/aim.2015.23.39-43
_version_ 1782364971920785408
author Samadbeik, Mahnaz
Gorzin, Zahra
Khoshkam, Masomeh
Roudbari, Masoud
author_facet Samadbeik, Mahnaz
Gorzin, Zahra
Khoshkam, Masomeh
Roudbari, Masoud
author_sort Samadbeik, Mahnaz
collection PubMed
description BACKGROUND: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. METHODS: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. RESULTS: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. CONCLUSIONS: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research.
format Online
Article
Text
id pubmed-4384867
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher AVICENA, d.o.o., Sarajevo
record_format MEDLINE/PubMed
spelling pubmed-43848672015-04-13 Managing the Security of Nursing Data in the Electronic Health Record Samadbeik, Mahnaz Gorzin, Zahra Khoshkam, Masomeh Roudbari, Masoud Acta Inform Med Original Paper BACKGROUND: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. METHODS: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. RESULTS: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. CONCLUSIONS: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. AVICENA, d.o.o., Sarajevo 2015-02 2015-02-22 /pmc/articles/PMC4384867/ /pubmed/25870490 http://dx.doi.org/10.5455/aim.2015.23.39-43 Text en Copyright: © Mahnaz Samadbeik, Zahra Gorzin, Masomeh Khoshkam, Masoud Roudbari http://creativecommons.org/licenses/by-nc/4.0/ This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Original Paper
Samadbeik, Mahnaz
Gorzin, Zahra
Khoshkam, Masomeh
Roudbari, Masoud
Managing the Security of Nursing Data in the Electronic Health Record
title Managing the Security of Nursing Data in the Electronic Health Record
title_full Managing the Security of Nursing Data in the Electronic Health Record
title_fullStr Managing the Security of Nursing Data in the Electronic Health Record
title_full_unstemmed Managing the Security of Nursing Data in the Electronic Health Record
title_short Managing the Security of Nursing Data in the Electronic Health Record
title_sort managing the security of nursing data in the electronic health record
topic Original Paper
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4384867/
https://www.ncbi.nlm.nih.gov/pubmed/25870490
http://dx.doi.org/10.5455/aim.2015.23.39-43
work_keys_str_mv AT samadbeikmahnaz managingthesecurityofnursingdataintheelectronichealthrecord
AT gorzinzahra managingthesecurityofnursingdataintheelectronichealthrecord
AT khoshkammasomeh managingthesecurityofnursingdataintheelectronichealthrecord
AT roudbarimasoud managingthesecurityofnursingdataintheelectronichealthrecord