scholarly journals Protocole of a controlled before-after evaluation of a national health information technology-based program to improve healthcare coordination and access to information

2017 ◽  
Vol 17 (1) ◽  
Author(s):  
Florence Saillour-Glénisson ◽  
◽  
Sylvie Duhamel ◽  
Emmanuelle Fourneyron ◽  
Laetitia Huiart ◽  
...  
2013 ◽  
Vol 82 (5) ◽  
pp. e139-e148 ◽  
Author(s):  
Farah Magrabi ◽  
Jos Aarts ◽  
Christian Nohr ◽  
Maureen Baker ◽  
Stuart Harrison ◽  
...  

2021 ◽  
pp. 026839622110405
Author(s):  
Wendy L Currie ◽  
Jonathan JJM Seddon

The concepts field and habitus are used widely and variably in institutional theory. The intellectual antecedents are found in the work of the French Sociologist, Pierre Bourdieu. This study presents a field-level analysis of pan-European policy on cross-border health information technology. Using field theory and institutional theory, we situate field as a multi-level concept which extends institutional and organizational levels of analysis. Empirical data is gathered from European policymakers, health professionals and patient advocacy groups on the diffusion of supra-national health information technology across European Member States. Findings reveal four scenarios depicting field tensions, as ideological and practical imperatives of supra-national health information technology policy mis-align with Member State health systems. This study has implications for policy-makers and other stakeholders, who seek to narrow the digital divide across health fields and sub-fields.


Author(s):  
Karl E. Misulis ◽  
Mark E. Frisse

Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality. Access systems must be flexible enough to be applicable regardless of device and location. While access must be secure, it cannot obstruct the efficient care of patients. Access controls depend on position because privileges and permissions depend on position. These controls are the method of enforcing authorization through mechanisms and policies. This chapter discusses some of the mechanisms of controlling access. Also discussed are some practical considerations for client and device strategy.


2010 ◽  
Vol 29 (6) ◽  
pp. 1214-1219 ◽  
Author(s):  
Melinda Beeuwkes Buntin ◽  
Sachin H. Jain ◽  
David Blumenthal

Sign in / Sign up

Export Citation Format

Share Document