Cargando…

Security Techniques for the Electronic Health Records

The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques f...

Descripción completa

Detalles Bibliográficos
Autores principales: Kruse, Clemens Scott, Smith, Brenna, Vanderlinden, Hannah, Nealand, Alexandra
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5522514/
https://www.ncbi.nlm.nih.gov/pubmed/28733949
http://dx.doi.org/10.1007/s10916-017-0778-4
_version_ 1783252186199752704
author Kruse, Clemens Scott
Smith, Brenna
Vanderlinden, Hannah
Nealand, Alexandra
author_facet Kruse, Clemens Scott
Smith, Brenna
Vanderlinden, Hannah
Nealand, Alexandra
author_sort Kruse, Clemens Scott
collection PubMed
description The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.
format Online
Article
Text
id pubmed-5522514
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-55225142017-08-17 Security Techniques for the Electronic Health Records Kruse, Clemens Scott Smith, Brenna Vanderlinden, Hannah Nealand, Alexandra J Med Syst Education & Training The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare. Springer US 2017-07-21 2017 /pmc/articles/PMC5522514/ /pubmed/28733949 http://dx.doi.org/10.1007/s10916-017-0778-4 Text en © The Author(s) 2017 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Education & Training
Kruse, Clemens Scott
Smith, Brenna
Vanderlinden, Hannah
Nealand, Alexandra
Security Techniques for the Electronic Health Records
title Security Techniques for the Electronic Health Records
title_full Security Techniques for the Electronic Health Records
title_fullStr Security Techniques for the Electronic Health Records
title_full_unstemmed Security Techniques for the Electronic Health Records
title_short Security Techniques for the Electronic Health Records
title_sort security techniques for the electronic health records
topic Education & Training
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5522514/
https://www.ncbi.nlm.nih.gov/pubmed/28733949
http://dx.doi.org/10.1007/s10916-017-0778-4
work_keys_str_mv AT kruseclemensscott securitytechniquesfortheelectronichealthrecords
AT smithbrenna securitytechniquesfortheelectronichealthrecords
AT vanderlindenhannah securitytechniquesfortheelectronichealthrecords
AT nealandalexandra securitytechniquesfortheelectronichealthrecords