scholarly journals Bring-Your-Own-Device Usage Trends in Australian Hospitals – A National Survey

Author(s):  
Tafheem Ahmad Wani ◽  
Antonette Mendoza ◽  
Kathleen Gray

Background: Healthcare is among the leading industries which drives the use of personal devices for work purposes (BYOD). However, allowing BYOD for healthcare workers comes at a cost, as it puts sensitive information assets such as patient data residing on personal devices at risk of potential data breaches. Objective: Previous review of the literature has highlighted the dearth of empirical studies in hospital settings regarding BYOD usage. As such, this paper aims to report BYOD usage trends in Australian hospitals through a national survey, first of its kind in Australia. Methods: An anonymous survey was conducted online among health IT personnel, asking them about their experiences about BYOD usage in their hospitals. 28 responses were collected based on public Australian hospitals, which included 21 hospital groups and 7 standalone hospitals, likely to represent more than 100 hospitals in total. Survey responses were quantitatively analysed through descriptive statistical analysis and cross tabulation. Results: BYOD is allowed in majority of the hospitals, and among all major staff groups, with doctors being the leading group. Participants ranked reasons for allowing BYOD, and most of them were related to improvement in clinical productivity, efficiency and mobility for clinical staff. Challenges were generally related to data security such as patient data breaches and compliance with data security laws, according to them. More than two thirds of hospitals had a cybersecurity officer employed, and CIOs were the most dominant group who held responsibility for managing BYOD within the hospital. Conclusion: This paper provides a starting point for better understanding of BYOD usage in a complex healthcare environment based on empirical evidence, one which highlights the security-usability conundrum, confirming previous literature themes.

2021 ◽  
pp. 936-948
Author(s):  
Chirantan Chatterjee ◽  
D. Daniel Sokol
Keyword(s):  

2020 ◽  
Vol 12 (23) ◽  
pp. 13
Author(s):  
Gavin Smith ◽  
Olivia Vila

This article describes the findings of a national survey of State Hazard Mitigation Officers (SHMOs) in U.S. states and territories in order to gain a greater understanding of the roles that they play in assisting local governments to build the capacity required to successfully develop and implement Federal Emergency Management Agency (FEMA)-funded Hazard Mitigation Assistance (HMA) grants, an important but understudied aspect of hazard mitigation governance. The research questions focus on: (1) How states and territories enable local governments to develop and implement HMA grants and (2) SHMOs’ opinions regarding their perceived capacity and effectiveness in assisting local governments to develop and implement HMA grants. Results show that while states and territories are relatively well-equipped to perform general administrative duties required by FEMA, SHMOs expressed wide variation in their capacity to assist local governments to develop and implement HMA grants. This was particularly evident with regard to the delivery of specific technical assistance measures required to develop HMA grants. Survey responses also highlight modest levels of participation in FEMA-designed efforts to delegate responsibility to states and territories and low levels of participation in programs that offer pre-application funding to local governments to help them develop HMA grant applications. These findings should concern FEMA as the agency embarks on the implementation of the Building Resilient Infrastructure and Communities program, an ambitious pre-disaster hazard mitigation grant initiative.


2021 ◽  
pp. 174701612110540
Author(s):  
Laurel E Meyer ◽  
Lauren Porter ◽  
Meghan E Reilly ◽  
Caroline Johnson ◽  
Salman Safir ◽  
...  

Automated, wearable cameras can benefit health-related research by capturing accurate and objective information about individuals’ daily experiences. However, wearable cameras present unique privacy- and confidentiality-related risks due to the possibility of the images capturing identifying or sensitive information from participants and third parties. Although best practice guidelines for ethical research with wearable cameras have been published, limited information exists on the risks of studies using wearable cameras. The aim of this literature review was to survey risks related to using wearable cameras, and precautions taken to reduce those risks, as reported in empirical research. Forty-five publications, comprising 36 independent studies, were reviewed, and findings revealed that participants’ primary concerns with using wearable cameras included physical inconvenience and discomfort in certain situations (e.g. public settings). None of the studies reviewed reported any serious adverse events. Although it is possible that reported findings do not include all risks experienced by participants in research with wearable cameras, our findings suggest a low level of risk to participants. However, it is important that investigators adopt recommended precautions, which can promote autonomy and reduce risks, including participant discomfort.


2021 ◽  
Vol 29 (6) ◽  
pp. 0-0

Data security incidents are continually increasing; hackers, governments, and other actors increasingly attempt to gain unauthorized access to confidential data. Information Systems (IS) users are becoming more vulnerable to the risks of data breaches. Many stakeholders perceive cybersecurity incidents as indicators of firms' operational and technological internal deficiencies. Previous research has revealed that investors react negatively to data breaches, yet little is known about investors' reactions to material data security incidents. Using a sample of 232 data security incidents for 132 publicly traded companies in the United States, we applied an event study methodology to discern investors' reactions to material versus immaterial incidents. We also use multivariate regression and time-to-event analysis to examine what determines the degree of investors' reactions, considering several intervals around the event day. Our results show that investors perceive material data security incidents as a deficiency of breached companies in comparison to immaterial incidents.


Author(s):  
Ailton Moreira ◽  
Carlos Filipe da Silva Portela ◽  
Manuel Filipe Santos

Bring your own device (BYOD) policies have become a very popular topic in information technology, as this approach allows employees to bring their devices into their organizations and use them to access information. This trend has some benefits both for the organization and to employees. This paper aims to identify those benefits as well as the advantages and disadvantages of BYOD usage in organizations. In addition, SWOT analysis of BYOD usage is presented and discussed. Finally, it is introduced as an approach to BYOD in healthcare. Utilizing personal devices at work is beneficial to organizational employees as they are in some way satisfied, and they have more freedom and choice to use their devices. This can easily lead the employees to be more productive and flexible. Organizations who embrace BYOD policies have noticed that their employees are happier, more productive, and more collaborative.


Author(s):  
Amavey Tamunobarafiri ◽  
Shaun Aghili ◽  
Sergey Butakov

Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.


2004 ◽  
Vol 51 (3) ◽  
pp. 286-289 ◽  
Author(s):  
B Schütze ◽  
M Kroll ◽  
T Geisbe ◽  
T.J Filler

BMJ ◽  
1999 ◽  
Vol 319 (7221) ◽  
pp. 1366-1366 ◽  
Author(s):  
J. Walton ◽  
R. Doll ◽  
W. Asscher ◽  
R. Hurley ◽  
M. Langman ◽  
...  
Keyword(s):  

2015 ◽  
Vol 36 (5) ◽  
pp. 18-24 ◽  
Author(s):  
Aurelie Leclercq-Vandelannoitte

Purpose – The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their consequences. For young, tech-savvy workers, using their own devices at work represents a right, rather than a privilege, leading them to initiate a growing, yet under-researched, drive toward IT consumerization. Some companies already deploy BYOD programs, allowing employees to use personal devices for work-related activities, but other managers remain hesitant of the implications of such programs. Design/methodology/approach – To provide an overview of this growing phenomenon, this paper presents an in-depth analysis of existing literature and identifies organizational changes induced by this reversed adoption logic. A case study of Volvo reveals how one organization has coped successfully with this phenomenon. Findings – These analyses shed more light on the stakes involved in BYOD and IT consumerization, as well as the changes they imply for organizations and IT departments. Practical implications – Both BYOD and IT consumerization have deep and broad consequences for organizations, some of which are very positive, as long as the trends are well-managed and carefully addressed. Originality/value – This paper covers a topic that has attracted scant attention in prior academic research, despite widely acknowledged concerns about security and reliability in practitioner studies. By going beyond a classic discourse focused solely on the security threats of BYOD, this paper investigates both business challenges and implications associated with a reversed adoption logic.


Data security is the most predominant measure that should be followed in any organization to prevent uncertified access to user’s data. A data breach is a security event in which sensitive data is viewed, transmitted, stolen or used by an unauthorized individual. A number of breaches include compromised password files which reveal the passwords of millions of users in an organization. The paper is intended to identify such password breaches through honey encryption technique. Using the concept of honey words, each user has a list of sweet words corresponding to their account, out of which only one is original password and remaining are fake passwords. During Honey Encryption, Distribution-transforming encoder (DTE) is applied on the password to acquire the seed space which is then encrypted by using secret key. The proposed model can be efficiently implemented in cloud applications to highly reduce cloud data breaches.


Sign in / Sign up

Export Citation Format

Share Document