Bring-your-own-device in medical schools and healthcare facilities: A review of the literature (Preprint)

2018 ◽  
Author(s):  
Khutsafalo Kadimo ◽  
Masego B. Kebaetse ◽  
Dineo Ketshogileng ◽  
Lovie Edwin Seru ◽  
Kagiso B. Sebina ◽  
...  

BACKGROUND The ‘culture’ or ‘habit’ of using personal mobile devices for work and learning is expected to continue growing with advances in information and communication and network technologies. Even with the benefits of users bringing their personal devices to working and learning spaces, the fluid relationship and user movement between medical schools and healthcare facilities can pose challenges for data security, particularly patient information security. The bring-your-own device (BYOD) policy is perceived as a driver for balancing user needs for convenience and institutional needs for security. OBJECTIVE This review sought to explore the literature to identify BYOD policy components (issues, interventions, and guidelines) that could potentially inform BYOD policy development and implementation in healthcare facilities and medical schools. METHODS A literature search on PubMed, Web of Science, and Ebscohost (Academic Search Premier, ERIC, CINAHL, and MEDLINE) was conducted using the following search terms and their synonyms: healthcare facilities, mobile devices, BYOD, privacy and confidentiality, and health records. We developed a review matrix to capture the main aspects of each article and coded the matrix for emerging themes. The database and hand search yielded 1 594 articles, 14 of which were deemed as meeting the inclusion criteria. RESULTS Themes emerging from the study include: device management, data security, medical applications, information technology, education and/or curriculum, policy, and guidelines. The guidelines theme seems to provide a direction for BYOD policy development and implementation. CONCLUSIONS A more feasible approach towards achieving a safe mobile device use environment is through the development of comprehensive BYOD policies that would balance users’ need for convenience with organizational security and patient privacy. The paucity in peer-reviewed literature calls for robust research that uses socio-technical approaches to development and evaluation of BYOD policies in healthcare facilities and medical schools. CLINICALTRIAL none

2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Khutsafalo Kadimo ◽  
Athulang Mutshewa ◽  
Masego B. Kebaetse

Purpose Seeking to leverage on benefits of personal mobile device use, medical schools and healthcare facilities are increasingly embracing the use of personal mobile devices for medical education and healthcare delivery through bring-your-own-device (BYOD) policies. However, empirical research findings that could guide the development of BYOD policies are scarce. Available research is dominated by studies that were guided by technocentric approaches, hence seemingly overlooking the complexities of the interactions of actors in mobile device technologies implementation. The purpose of this study was to use the actor–network theory to explore the potential role of a BYOD policy at the University of Botswana’s Faculty of Medicine. Design/methodology/approach Purposive sampling was used to select the participants and interviews, focus group discussions, observations and document analysis were used to collect data. Data were collected from 27 participants and analysed using grounded theory techniques. Emerging themes were continually compared and contrasted with incoming data to create broad themes and sub-themes and to establish relationships or patterns from the data. Findings The results suggest that the potential roles for BYOD policy include promoting appropriate mobile device use, promoting equitable access to mobile devices and content, and integrating mobile devices into medical education, healthcare delivery and other institutional processes. Research limitations/implications BYOD policy could be conceptualized and researched as a “script” that binds actors/actants into a “network” of constituents (with shared interests) such as medical schools and healthcare facilities, mobile devices, internet/WiFi, computers, software, computer systems, medical students, clinical teachers or doctors, nurses, information technology technicians, patients, curriculum, information sources or content, classrooms, computer labs and infections. Practical implications BYOD is a policy that seeks to represent the interests (presents as a solution to their problems) of the key stakeholders such as medical schools, healthcare facilities and mobile device users. BYOD is introduced in medical schools and healthcare facilities to promote equitable access to mobile devices and content, appropriate mobile device use and ensure distribution of liability between the mobile device users and the institution and address the implication of mobile device use in teaching and learning. Originality/value The BYOD policy is a comprehensive solution that transcends other institutional policies and regulations to fully integrate mobile devices in medical education and healthcare delivery.


2017 ◽  
Vol 8 (1) ◽  
pp. 17-29 ◽  
Author(s):  
B-Abee Toperesu ◽  
Jean-Paul Van Belle

Abstract Background: Mobile device adoption is on the rise and people are increasingly using mobile devices as a part of their lives. Studies have shown that people can use mobile devices to perform their work duties from anywhere. Organisations are now exploring ways of enabling and supporting mobility for employees’ mobile devices, including BYOD (Bring-Your-Own-Device) policies. Objective: The objective of this study is to identify the main capabilities required for enterprise mobility. Methods/Approach: This qualitative research study presents empirical results based on interviews with selected senior IS managers of large organizations. Results: The main findings of this study suggest that information security and mobile device management are among the main capabilities required for enterprise mobility. Conclusions: Enterprise mobility is an emerging field which has received very little research attention. More research in the field will help organisations make informed decisions on how to increase productivity, sales and efficiency while achieving employee satisfaction through enterprise mobility.


2018 ◽  
Vol 119 ◽  
pp. 94-102 ◽  
Author(s):  
Khutsafalo Kadimo ◽  
Masego B. Kebaetse ◽  
Dineo Ketshogileng ◽  
Lovie Edwin Seru ◽  
Kagiso B. Sebina ◽  
...  

2020 ◽  
Vol 10 (2) ◽  
Author(s):  
Sambo Sisala ◽  
Siti Hajar Othman

With cybercrime on the rise, the healthcare environment has been listed as the top 5 of the most targeted industries for information security breaches. This is due to the current migration from physical to Electronic Health Records (EHR). The challenges of controlling the database costs also continue to escalate. As a result, measures such as Bring Your Own Device (BYOD) policies are commonly utilized to minimize costs and create convenience for hospital staff to use a device they are more comfortable with. However, BYOD can be used as a major entry point for gaining access to Health Information Systems (HIS) by cyber attackers/hackers despite the struggles of many hospitals to put in place effective mobile security policies. Several researches have been done to show on how to create effective mobile device BYOD strategies by using device management, data security, medical applications, information technology, education, policy, guidelines and a few others. But there is still a lack of literature about BYOD policy development in hospitals especially when it comes to Mobile Device Management (MDM), policy evaluation, and mobile device evaluation. To help address this issue, an MDM security metamodels has been proposed to help bridge this gap of knowledge between security professionals and shareholders within the healthcare environment. With awareness to the proposed solution, the elementary stage is to identify any existing MDM models that have been created for BYOD in healthcare and use the metamodel to represent some of the important existing concepts. Therefore, the context of this research paper aims to concentrate on improving existing BYOD security policies through the awareness of these existing MDM concepts that are represented through a metamodel syntax. This paper aims to discuss important MDM security concepts from various sources that have been used in healthcare, create a MDM security metamodel prototype called MDMSec ver 1.0 for the healthcare sector, using a selected metamodeling process, and lastly, to validate the prototype metamodel through two validation techniques.


Author(s):  
Keri K. Stephens

Mobile devices have diffused into work by transitioning from being organizational assets to personal communication tools. This chapter examines the perceptions and practices of diverse types of workers, located around the globe, and reveals the often-hidden complexities surrounding mobile use at work. People can use their mobiles to be productive and connected on the job, but they also face challenges. The shift in control over communication means that organizations have reacted by creating bring-your-own-device-to-work policies, banning their employees from using personal mobiles, and practically forcing workers to provide their own devices and be accessible 24/7. Along the way, workers have had to negotiate with co-workers, managers, clients, friends, strangers, and family concerning how and when they use their mobiles. As they try to build bridges between work and personal life, struggles with self-management and temporal mismatches in the form of reachability can emerge.


Author(s):  
Masoomeh Shabazi ◽  
Mostafa Amini Rarani ◽  
Sharam Tahmasebian ◽  
Maryam Jahanbakhsh

In recent years, the number of people who use mobile devices for business and organizational purposes has increased. This phenomenon is now known as “bring your own device” (BYOD), and it is rapidly entering the health industry, which makes clear the necessity of studying its various dimensions for its implementation and application. Recently, the use of mobile devices is increasing due to the social tendencies of people. Rapid changes in modern gadgets and smartphones have also encouraged organizations to use their mobile devices in the workplace for business purposes, creating related opportunities and challenges. These cases have made the expansion of BYOD inevitable so that the only way to control BYOD’s threats is to accept its process and finally formulate related strategies and policies before using it.


2020 ◽  
pp. 197-218
Author(s):  
Bojana Trivunović ◽  
Olivera Gajić

With the development of mobile technology emerge fundamental changes in all spheres of human endeavor. In education, new methods of remote studying are being developed, with a particular emphasis on "m-learning" (learning with the help of mobile devices). Taking into consideration that mobile devices are one of the fastest-developing forms of technology, the importance of their assistance in the process of teaching and studying has been recognized. The goal of this paper is to introduce the concept of Bring Your Own Device (BYOD) in the context of industry and education as an example of disruptive technology. This concept implies that students bring their own mobile devices to the classroom and use them when learning. Using a descriptive research method and analysis of the relevant bibliography, the authors of the paper distinguish the implications for the change of university practices on the basis of critical analysis of positive and negative consequences of their use, redefined positions of the teachers and the students in the educational process, as well as the modified educational design.


2016 ◽  
Vol 24 (e1) ◽  
pp. e69-e78 ◽  
Author(s):  
Aude Motulsky ◽  
Jenna Wong ◽  
Jean-Pierre Cordeau ◽  
Jorge Pomalaza ◽  
Jeffrey Barkun ◽  
...  

Objective: To describe the usage of a novel application (The FLOW) that allows mobile devices to be used for rounding and handoffs. Materials and Methods: The FLOW provides a view of patient data and the capacity to enter short notes via personal mobile devices. It was deployed using a “bring-your-own-device” model in 4 pilot units. Social network analysis (SNA) was applied to audit trails in order to visualize usage patterns. A questionnaire was used to describe user experience. Results: Overall, 253 health professionals used The FLOW with their personal mobile devices from October 2013 to March 2015. In pediatric and neonatal intensive care units (ICUs), a median of 26–26.5 notes were entered per user per day. Visual network representation of app entries showed that usage patterns were different between the ICUs. In 127 questionnaires (50%), respondents reported using The FLOW most often to enter notes and for handoffs. The FLOW was perceived as having improved patient care by 57% of respondents, compared to usual care. Most respondents (86%) wished to continue using The FLOW. Discussion: This study shows how a handoff and rounding tool was quickly adopted in pediatric and neonatal ICUs in a hospital setting where patient charts were still paper-based. Originally developed as a tool to support informal documentation using smartphones, it was adapted to local practices and expanded to print sign-out documents and import notes within the medicolegal record with desktop computers. Interestingly, even if not supported by the nursing administrative authorities, the level of use for data entry among nurses and doctors was similar in all units, indicating close collaboration in documentation practices in these ICUs.


Author(s):  
Ieda M. Santos

More and more students are bringing personal mobile devices such as smart phones and iPads to university campuses. Widespread mobile device ownership among students offers Higher Education (HE) institutions with opportunities to explore those devices to support teaching and learning practices. The idea of using students' personal devices is referred to as “Bring Your Own Device,” or BYOD. This chapter examines opportunities and key challenges often discussed in the literature and associated with a BYOD program. Outcomes suggest that a cultural change is necessary to effectively accommodate BYOD in the classroom. The chapter proposes a BYOD joint enterprise consisting of main stakeholders—administrators, faculty, students, and information technology personnel—working together to help minimize the impact of key challenges while maximizing the opportunities afforded by students' everyday mobile devices.


Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Prabhakar Rontala Subramaniam

As the adoption of bring your own device (BYOD) phenomenon by businesses and other sectors continues to grow. Employees find it desirable to use their personally owned mobile devices for work without the need to differentiate between their carrier services and their organizations' network. However, this practice makes such businesses vulnerable to various security threats. Nigeria banking institutions, like other businesses globally, have adopted the BYOD phenomenon. However, BYOD trend constitutes heterogeneity, and there is large diversity in mobile devices, hence the risk of corporate data being exposed to threats increases. Thus, this paper investigates the influence of technical and social threats as it relates to BYOD phenomenon in the banking institutions. Data was collected from the employees of four banks in Nigeria that supported BYOD trend. The study found out that there are some security threats that are integrated, and the existing security measures are not sufficient to mitigate those threats. Hence, this study has presented an integrated solution to curb these threats.


Sign in / Sign up

Export Citation Format

Share Document